]> git.proxmox.com Git - mirror_ubuntu-jammy-kernel.git/blame - arch/s390/kvm/kvm-s390.c
s390/sclp: detect intervention bypass facility
[mirror_ubuntu-jammy-kernel.git] / arch / s390 / kvm / kvm-s390.c
CommitLineData
b0c632db 1/*
a53c8fab 2 * hosting zSeries kernel virtual machines
b0c632db 3 *
a53c8fab 4 * Copyright IBM Corp. 2008, 2009
b0c632db
HC
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License (version 2 only)
8 * as published by the Free Software Foundation.
9 *
10 * Author(s): Carsten Otte <cotte@de.ibm.com>
11 * Christian Borntraeger <borntraeger@de.ibm.com>
12 * Heiko Carstens <heiko.carstens@de.ibm.com>
628eb9b8 13 * Christian Ehrhardt <ehrhardt@de.ibm.com>
15f36ebd 14 * Jason J. Herne <jjherne@us.ibm.com>
b0c632db
HC
15 */
16
17#include <linux/compiler.h>
18#include <linux/err.h>
19#include <linux/fs.h>
ca872302 20#include <linux/hrtimer.h>
b0c632db
HC
21#include <linux/init.h>
22#include <linux/kvm.h>
23#include <linux/kvm_host.h>
24#include <linux/module.h>
a374e892 25#include <linux/random.h>
b0c632db 26#include <linux/slab.h>
ba5c1e9b 27#include <linux/timer.h>
41408c28 28#include <linux/vmalloc.h>
15c9705f 29#include <linux/bitmap.h>
cbb870c8 30#include <asm/asm-offsets.h>
b0c632db 31#include <asm/lowcore.h>
fdf03650 32#include <asm/etr.h>
b0c632db 33#include <asm/pgtable.h>
1e133ab2 34#include <asm/gmap.h>
f5daba1d 35#include <asm/nmi.h>
a0616cde 36#include <asm/switch_to.h>
6d3da241 37#include <asm/isc.h>
1526bf9c 38#include <asm/sclp.h>
0a763c78
DH
39#include <asm/cpacf.h>
40#include <asm/etr.h>
8f2abe6a 41#include "kvm-s390.h"
b0c632db
HC
42#include "gaccess.h"
43
ea2cdd27
DH
44#define KMSG_COMPONENT "kvm-s390"
45#undef pr_fmt
46#define pr_fmt(fmt) KMSG_COMPONENT ": " fmt
47
5786fffa
CH
48#define CREATE_TRACE_POINTS
49#include "trace.h"
ade38c31 50#include "trace-s390.h"
5786fffa 51
41408c28 52#define MEM_OP_MAX_SIZE 65536 /* Maximum transfer size for KVM_S390_MEM_OP */
816c7667
JF
53#define LOCAL_IRQS 32
54#define VCPU_IRQS_MAX_BUF (sizeof(struct kvm_s390_irq) * \
55 (KVM_MAX_VCPUS + LOCAL_IRQS))
41408c28 56
b0c632db
HC
57#define VCPU_STAT(x) offsetof(struct kvm_vcpu, stat.x), KVM_STAT_VCPU
58
59struct kvm_stats_debugfs_item debugfs_entries[] = {
60 { "userspace_handled", VCPU_STAT(exit_userspace) },
0eaeafa1 61 { "exit_null", VCPU_STAT(exit_null) },
8f2abe6a
CB
62 { "exit_validity", VCPU_STAT(exit_validity) },
63 { "exit_stop_request", VCPU_STAT(exit_stop_request) },
64 { "exit_external_request", VCPU_STAT(exit_external_request) },
65 { "exit_external_interrupt", VCPU_STAT(exit_external_interrupt) },
ba5c1e9b
CO
66 { "exit_instruction", VCPU_STAT(exit_instruction) },
67 { "exit_program_interruption", VCPU_STAT(exit_program_interruption) },
68 { "exit_instr_and_program_int", VCPU_STAT(exit_instr_and_program) },
a011eeb2 69 { "exit_operation_exception", VCPU_STAT(exit_operation_exception) },
f7819512 70 { "halt_successful_poll", VCPU_STAT(halt_successful_poll) },
62bea5bf 71 { "halt_attempted_poll", VCPU_STAT(halt_attempted_poll) },
3491caf2 72 { "halt_poll_invalid", VCPU_STAT(halt_poll_invalid) },
ce2e4f0b 73 { "halt_wakeup", VCPU_STAT(halt_wakeup) },
f5e10b09 74 { "instruction_lctlg", VCPU_STAT(instruction_lctlg) },
ba5c1e9b 75 { "instruction_lctl", VCPU_STAT(instruction_lctl) },
aba07508
DH
76 { "instruction_stctl", VCPU_STAT(instruction_stctl) },
77 { "instruction_stctg", VCPU_STAT(instruction_stctg) },
ba5c1e9b 78 { "deliver_emergency_signal", VCPU_STAT(deliver_emergency_signal) },
7697e71f 79 { "deliver_external_call", VCPU_STAT(deliver_external_call) },
ba5c1e9b
CO
80 { "deliver_service_signal", VCPU_STAT(deliver_service_signal) },
81 { "deliver_virtio_interrupt", VCPU_STAT(deliver_virtio_interrupt) },
82 { "deliver_stop_signal", VCPU_STAT(deliver_stop_signal) },
83 { "deliver_prefix_signal", VCPU_STAT(deliver_prefix_signal) },
84 { "deliver_restart_signal", VCPU_STAT(deliver_restart_signal) },
85 { "deliver_program_interruption", VCPU_STAT(deliver_program_int) },
86 { "exit_wait_state", VCPU_STAT(exit_wait_state) },
69d0d3a3 87 { "instruction_pfmf", VCPU_STAT(instruction_pfmf) },
453423dc
CB
88 { "instruction_stidp", VCPU_STAT(instruction_stidp) },
89 { "instruction_spx", VCPU_STAT(instruction_spx) },
90 { "instruction_stpx", VCPU_STAT(instruction_stpx) },
91 { "instruction_stap", VCPU_STAT(instruction_stap) },
92 { "instruction_storage_key", VCPU_STAT(instruction_storage_key) },
8a242234 93 { "instruction_ipte_interlock", VCPU_STAT(instruction_ipte_interlock) },
453423dc
CB
94 { "instruction_stsch", VCPU_STAT(instruction_stsch) },
95 { "instruction_chsc", VCPU_STAT(instruction_chsc) },
b31288fa 96 { "instruction_essa", VCPU_STAT(instruction_essa) },
453423dc
CB
97 { "instruction_stsi", VCPU_STAT(instruction_stsi) },
98 { "instruction_stfl", VCPU_STAT(instruction_stfl) },
bb25b9ba 99 { "instruction_tprot", VCPU_STAT(instruction_tprot) },
95ca2cb5 100 { "instruction_sthyi", VCPU_STAT(instruction_sthyi) },
5288fbf0 101 { "instruction_sigp_sense", VCPU_STAT(instruction_sigp_sense) },
bd59d3a4 102 { "instruction_sigp_sense_running", VCPU_STAT(instruction_sigp_sense_running) },
7697e71f 103 { "instruction_sigp_external_call", VCPU_STAT(instruction_sigp_external_call) },
5288fbf0 104 { "instruction_sigp_emergency", VCPU_STAT(instruction_sigp_emergency) },
42cb0c9f
DH
105 { "instruction_sigp_cond_emergency", VCPU_STAT(instruction_sigp_cond_emergency) },
106 { "instruction_sigp_start", VCPU_STAT(instruction_sigp_start) },
5288fbf0 107 { "instruction_sigp_stop", VCPU_STAT(instruction_sigp_stop) },
42cb0c9f
DH
108 { "instruction_sigp_stop_store_status", VCPU_STAT(instruction_sigp_stop_store_status) },
109 { "instruction_sigp_store_status", VCPU_STAT(instruction_sigp_store_status) },
cd7b4b61 110 { "instruction_sigp_store_adtl_status", VCPU_STAT(instruction_sigp_store_adtl_status) },
5288fbf0
CB
111 { "instruction_sigp_set_arch", VCPU_STAT(instruction_sigp_arch) },
112 { "instruction_sigp_set_prefix", VCPU_STAT(instruction_sigp_prefix) },
113 { "instruction_sigp_restart", VCPU_STAT(instruction_sigp_restart) },
42cb0c9f
DH
114 { "instruction_sigp_cpu_reset", VCPU_STAT(instruction_sigp_cpu_reset) },
115 { "instruction_sigp_init_cpu_reset", VCPU_STAT(instruction_sigp_init_cpu_reset) },
116 { "instruction_sigp_unknown", VCPU_STAT(instruction_sigp_unknown) },
388186bc 117 { "diagnose_10", VCPU_STAT(diagnose_10) },
e28acfea 118 { "diagnose_44", VCPU_STAT(diagnose_44) },
41628d33 119 { "diagnose_9c", VCPU_STAT(diagnose_9c) },
175a5c9e
CB
120 { "diagnose_258", VCPU_STAT(diagnose_258) },
121 { "diagnose_308", VCPU_STAT(diagnose_308) },
122 { "diagnose_500", VCPU_STAT(diagnose_500) },
b0c632db
HC
123 { NULL }
124};
125
9d8d5786 126/* upper facilities limit for kvm */
60a37709
AY
127unsigned long kvm_s390_fac_list_mask[16] = {
128 0xffe6000000000000UL,
129 0x005e000000000000UL,
9d8d5786 130};
b0c632db 131
9d8d5786 132unsigned long kvm_s390_fac_list_mask_size(void)
78c4b59f 133{
9d8d5786
MM
134 BUILD_BUG_ON(ARRAY_SIZE(kvm_s390_fac_list_mask) > S390_ARCH_FAC_MASK_SIZE_U64);
135 return ARRAY_SIZE(kvm_s390_fac_list_mask);
78c4b59f
MM
136}
137
15c9705f
DH
138/* available cpu features supported by kvm */
139static DECLARE_BITMAP(kvm_s390_available_cpu_feat, KVM_S390_VM_CPU_FEAT_NR_BITS);
0a763c78
DH
140/* available subfunctions indicated via query / "test bit" */
141static struct kvm_s390_vm_cpu_subfunc kvm_s390_available_subfunc;
15c9705f 142
9d8d5786 143static struct gmap_notifier gmap_notifier;
78f26131 144debug_info_t *kvm_s390_dbf;
9d8d5786 145
b0c632db 146/* Section: not file related */
13a34e06 147int kvm_arch_hardware_enable(void)
b0c632db
HC
148{
149 /* every s390 is virtualization enabled ;-) */
10474ae8 150 return 0;
b0c632db
HC
151}
152
2c70fe44
CB
153static void kvm_gmap_notifier(struct gmap *gmap, unsigned long address);
154
fdf03650
FZ
155/*
156 * This callback is executed during stop_machine(). All CPUs are therefore
157 * temporarily stopped. In order not to change guest behavior, we have to
158 * disable preemption whenever we touch the epoch of kvm and the VCPUs,
159 * so a CPU won't be stopped while calculating with the epoch.
160 */
161static int kvm_clock_sync(struct notifier_block *notifier, unsigned long val,
162 void *v)
163{
164 struct kvm *kvm;
165 struct kvm_vcpu *vcpu;
166 int i;
167 unsigned long long *delta = v;
168
169 list_for_each_entry(kvm, &vm_list, vm_list) {
170 kvm->arch.epoch -= *delta;
171 kvm_for_each_vcpu(i, vcpu, kvm) {
172 vcpu->arch.sie_block->epoch -= *delta;
db0758b2
DH
173 if (vcpu->arch.cputm_enabled)
174 vcpu->arch.cputm_start += *delta;
fdf03650
FZ
175 }
176 }
177 return NOTIFY_OK;
178}
179
180static struct notifier_block kvm_clock_notifier = {
181 .notifier_call = kvm_clock_sync,
182};
183
b0c632db
HC
184int kvm_arch_hardware_setup(void)
185{
2c70fe44
CB
186 gmap_notifier.notifier_call = kvm_gmap_notifier;
187 gmap_register_ipte_notifier(&gmap_notifier);
fdf03650
FZ
188 atomic_notifier_chain_register(&s390_epoch_delta_notifier,
189 &kvm_clock_notifier);
b0c632db
HC
190 return 0;
191}
192
193void kvm_arch_hardware_unsetup(void)
194{
2c70fe44 195 gmap_unregister_ipte_notifier(&gmap_notifier);
fdf03650
FZ
196 atomic_notifier_chain_unregister(&s390_epoch_delta_notifier,
197 &kvm_clock_notifier);
b0c632db
HC
198}
199
22be5a13
DH
200static void allow_cpu_feat(unsigned long nr)
201{
202 set_bit_inv(nr, kvm_s390_available_cpu_feat);
203}
204
0a763c78
DH
205static inline int plo_test_bit(unsigned char nr)
206{
207 register unsigned long r0 asm("0") = (unsigned long) nr | 0x100;
208 int cc = 3; /* subfunction not available */
209
210 asm volatile(
211 /* Parameter registers are ignored for "test bit" */
212 " plo 0,0,0,0(0)\n"
213 " ipm %0\n"
214 " srl %0,28\n"
215 : "=d" (cc)
216 : "d" (r0)
217 : "cc");
218 return cc == 0;
219}
220
22be5a13
DH
221static void kvm_s390_cpu_feat_init(void)
222{
0a763c78
DH
223 int i;
224
225 for (i = 0; i < 256; ++i) {
226 if (plo_test_bit(i))
227 kvm_s390_available_subfunc.plo[i >> 3] |= 0x80 >> (i & 7);
228 }
229
230 if (test_facility(28)) /* TOD-clock steering */
231 etr_ptff(kvm_s390_available_subfunc.ptff, ETR_PTFF_QAF);
232
233 if (test_facility(17)) { /* MSA */
234 __cpacf_query(CPACF_KMAC, kvm_s390_available_subfunc.kmac);
235 __cpacf_query(CPACF_KMC, kvm_s390_available_subfunc.kmc);
236 __cpacf_query(CPACF_KM, kvm_s390_available_subfunc.km);
237 __cpacf_query(CPACF_KIMD, kvm_s390_available_subfunc.kimd);
238 __cpacf_query(CPACF_KLMD, kvm_s390_available_subfunc.klmd);
239 }
240 if (test_facility(76)) /* MSA3 */
241 __cpacf_query(CPACF_PCKMO, kvm_s390_available_subfunc.pckmo);
242 if (test_facility(77)) { /* MSA4 */
243 __cpacf_query(CPACF_KMCTR, kvm_s390_available_subfunc.kmctr);
244 __cpacf_query(CPACF_KMF, kvm_s390_available_subfunc.kmf);
245 __cpacf_query(CPACF_KMO, kvm_s390_available_subfunc.kmo);
246 __cpacf_query(CPACF_PCC, kvm_s390_available_subfunc.pcc);
247 }
248 if (test_facility(57)) /* MSA5 */
249 __cpacf_query(CPACF_PPNO, kvm_s390_available_subfunc.ppno);
250
22be5a13
DH
251 if (MACHINE_HAS_ESOP)
252 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_ESOP);
253}
254
b0c632db
HC
255int kvm_arch_init(void *opaque)
256{
78f26131
CB
257 kvm_s390_dbf = debug_register("kvm-trace", 32, 1, 7 * sizeof(long));
258 if (!kvm_s390_dbf)
259 return -ENOMEM;
260
261 if (debug_register_view(kvm_s390_dbf, &debug_sprintf_view)) {
262 debug_unregister(kvm_s390_dbf);
263 return -ENOMEM;
264 }
265
22be5a13
DH
266 kvm_s390_cpu_feat_init();
267
84877d93
CH
268 /* Register floating interrupt controller interface. */
269 return kvm_register_device_ops(&kvm_flic_ops, KVM_DEV_TYPE_FLIC);
b0c632db
HC
270}
271
78f26131
CB
272void kvm_arch_exit(void)
273{
274 debug_unregister(kvm_s390_dbf);
275}
276
b0c632db
HC
277/* Section: device related */
278long kvm_arch_dev_ioctl(struct file *filp,
279 unsigned int ioctl, unsigned long arg)
280{
281 if (ioctl == KVM_S390_ENABLE_SIE)
282 return s390_enable_sie();
283 return -EINVAL;
284}
285
784aa3d7 286int kvm_vm_ioctl_check_extension(struct kvm *kvm, long ext)
b0c632db 287{
d7b0b5eb
CO
288 int r;
289
2bd0ac4e 290 switch (ext) {
d7b0b5eb 291 case KVM_CAP_S390_PSW:
b6cf8788 292 case KVM_CAP_S390_GMAP:
52e16b18 293 case KVM_CAP_SYNC_MMU:
1efd0f59
CO
294#ifdef CONFIG_KVM_S390_UCONTROL
295 case KVM_CAP_S390_UCONTROL:
296#endif
3c038e6b 297 case KVM_CAP_ASYNC_PF:
60b413c9 298 case KVM_CAP_SYNC_REGS:
14eebd91 299 case KVM_CAP_ONE_REG:
d6712df9 300 case KVM_CAP_ENABLE_CAP:
fa6b7fe9 301 case KVM_CAP_S390_CSS_SUPPORT:
10ccaa1e 302 case KVM_CAP_IOEVENTFD:
c05c4186 303 case KVM_CAP_DEVICE_CTRL:
d938dc55 304 case KVM_CAP_ENABLE_CAP_VM:
78599d90 305 case KVM_CAP_S390_IRQCHIP:
f2061656 306 case KVM_CAP_VM_ATTRIBUTES:
6352e4d2 307 case KVM_CAP_MP_STATE:
47b43c52 308 case KVM_CAP_S390_INJECT_IRQ:
2444b352 309 case KVM_CAP_S390_USER_SIGP:
e44fc8c9 310 case KVM_CAP_S390_USER_STSI:
30ee2a98 311 case KVM_CAP_S390_SKEYS:
816c7667 312 case KVM_CAP_S390_IRQ_STATE:
d7b0b5eb
CO
313 r = 1;
314 break;
41408c28
TH
315 case KVM_CAP_S390_MEM_OP:
316 r = MEM_OP_MAX_SIZE;
317 break;
e726b1bd
CB
318 case KVM_CAP_NR_VCPUS:
319 case KVM_CAP_MAX_VCPUS:
76a6dd72
DH
320 r = KVM_S390_BSCA_CPU_SLOTS;
321 if (sclp.has_esca && sclp.has_64bscao)
322 r = KVM_S390_ESCA_CPU_SLOTS;
e726b1bd 323 break;
e1e2e605
NW
324 case KVM_CAP_NR_MEMSLOTS:
325 r = KVM_USER_MEM_SLOTS;
326 break;
1526bf9c 327 case KVM_CAP_S390_COW:
abf09bed 328 r = MACHINE_HAS_ESOP;
1526bf9c 329 break;
68c55750
EF
330 case KVM_CAP_S390_VECTOR_REGISTERS:
331 r = MACHINE_HAS_VX;
332 break;
c6e5f166
FZ
333 case KVM_CAP_S390_RI:
334 r = test_facility(64);
335 break;
2bd0ac4e 336 default:
d7b0b5eb 337 r = 0;
2bd0ac4e 338 }
d7b0b5eb 339 return r;
b0c632db
HC
340}
341
15f36ebd
JH
342static void kvm_s390_sync_dirty_log(struct kvm *kvm,
343 struct kvm_memory_slot *memslot)
344{
345 gfn_t cur_gfn, last_gfn;
346 unsigned long address;
347 struct gmap *gmap = kvm->arch.gmap;
348
15f36ebd
JH
349 /* Loop over all guest pages */
350 last_gfn = memslot->base_gfn + memslot->npages;
351 for (cur_gfn = memslot->base_gfn; cur_gfn <= last_gfn; cur_gfn++) {
352 address = gfn_to_hva_memslot(memslot, cur_gfn);
353
1e133ab2 354 if (test_and_clear_guest_dirty(gmap->mm, address))
15f36ebd 355 mark_page_dirty(kvm, cur_gfn);
1763f8d0
CB
356 if (fatal_signal_pending(current))
357 return;
70c88a00 358 cond_resched();
15f36ebd 359 }
15f36ebd
JH
360}
361
b0c632db 362/* Section: vm related */
a6e2f683
ED
363static void sca_del_vcpu(struct kvm_vcpu *vcpu);
364
b0c632db
HC
365/*
366 * Get (and clear) the dirty memory log for a memory slot.
367 */
368int kvm_vm_ioctl_get_dirty_log(struct kvm *kvm,
369 struct kvm_dirty_log *log)
370{
15f36ebd
JH
371 int r;
372 unsigned long n;
9f6b8029 373 struct kvm_memslots *slots;
15f36ebd
JH
374 struct kvm_memory_slot *memslot;
375 int is_dirty = 0;
376
377 mutex_lock(&kvm->slots_lock);
378
379 r = -EINVAL;
380 if (log->slot >= KVM_USER_MEM_SLOTS)
381 goto out;
382
9f6b8029
PB
383 slots = kvm_memslots(kvm);
384 memslot = id_to_memslot(slots, log->slot);
15f36ebd
JH
385 r = -ENOENT;
386 if (!memslot->dirty_bitmap)
387 goto out;
388
389 kvm_s390_sync_dirty_log(kvm, memslot);
390 r = kvm_get_dirty_log(kvm, log, &is_dirty);
391 if (r)
392 goto out;
393
394 /* Clear the dirty log */
395 if (is_dirty) {
396 n = kvm_dirty_bitmap_bytes(memslot);
397 memset(memslot->dirty_bitmap, 0, n);
398 }
399 r = 0;
400out:
401 mutex_unlock(&kvm->slots_lock);
402 return r;
b0c632db
HC
403}
404
d938dc55
CH
405static int kvm_vm_ioctl_enable_cap(struct kvm *kvm, struct kvm_enable_cap *cap)
406{
407 int r;
408
409 if (cap->flags)
410 return -EINVAL;
411
412 switch (cap->cap) {
84223598 413 case KVM_CAP_S390_IRQCHIP:
c92ea7b9 414 VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_IRQCHIP");
84223598
CH
415 kvm->arch.use_irqchip = 1;
416 r = 0;
417 break;
2444b352 418 case KVM_CAP_S390_USER_SIGP:
c92ea7b9 419 VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_USER_SIGP");
2444b352
DH
420 kvm->arch.user_sigp = 1;
421 r = 0;
422 break;
68c55750 423 case KVM_CAP_S390_VECTOR_REGISTERS:
5967c17b
DH
424 mutex_lock(&kvm->lock);
425 if (atomic_read(&kvm->online_vcpus)) {
426 r = -EBUSY;
427 } else if (MACHINE_HAS_VX) {
c54f0d6a
DH
428 set_kvm_facility(kvm->arch.model.fac_mask, 129);
429 set_kvm_facility(kvm->arch.model.fac_list, 129);
18280d8b
MM
430 r = 0;
431 } else
432 r = -EINVAL;
5967c17b 433 mutex_unlock(&kvm->lock);
c92ea7b9
CB
434 VM_EVENT(kvm, 3, "ENABLE: CAP_S390_VECTOR_REGISTERS %s",
435 r ? "(not available)" : "(success)");
68c55750 436 break;
c6e5f166
FZ
437 case KVM_CAP_S390_RI:
438 r = -EINVAL;
439 mutex_lock(&kvm->lock);
440 if (atomic_read(&kvm->online_vcpus)) {
441 r = -EBUSY;
442 } else if (test_facility(64)) {
c54f0d6a
DH
443 set_kvm_facility(kvm->arch.model.fac_mask, 64);
444 set_kvm_facility(kvm->arch.model.fac_list, 64);
c6e5f166
FZ
445 r = 0;
446 }
447 mutex_unlock(&kvm->lock);
448 VM_EVENT(kvm, 3, "ENABLE: CAP_S390_RI %s",
449 r ? "(not available)" : "(success)");
450 break;
e44fc8c9 451 case KVM_CAP_S390_USER_STSI:
c92ea7b9 452 VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_USER_STSI");
e44fc8c9
ET
453 kvm->arch.user_stsi = 1;
454 r = 0;
455 break;
d938dc55
CH
456 default:
457 r = -EINVAL;
458 break;
459 }
460 return r;
461}
462
8c0a7ce6
DD
463static int kvm_s390_get_mem_control(struct kvm *kvm, struct kvm_device_attr *attr)
464{
465 int ret;
466
467 switch (attr->attr) {
468 case KVM_S390_VM_MEM_LIMIT_SIZE:
469 ret = 0;
c92ea7b9 470 VM_EVENT(kvm, 3, "QUERY: max guest memory: %lu bytes",
a3a92c31
DD
471 kvm->arch.mem_limit);
472 if (put_user(kvm->arch.mem_limit, (u64 __user *)attr->addr))
8c0a7ce6
DD
473 ret = -EFAULT;
474 break;
475 default:
476 ret = -ENXIO;
477 break;
478 }
479 return ret;
480}
481
482static int kvm_s390_set_mem_control(struct kvm *kvm, struct kvm_device_attr *attr)
4f718eab
DD
483{
484 int ret;
485 unsigned int idx;
486 switch (attr->attr) {
487 case KVM_S390_VM_MEM_ENABLE_CMMA:
f9cbd9b0 488 ret = -ENXIO;
c24cc9c8 489 if (!sclp.has_cmma)
e6db1d61
DD
490 break;
491
4f718eab 492 ret = -EBUSY;
c92ea7b9 493 VM_EVENT(kvm, 3, "%s", "ENABLE: CMMA support");
4f718eab
DD
494 mutex_lock(&kvm->lock);
495 if (atomic_read(&kvm->online_vcpus) == 0) {
496 kvm->arch.use_cmma = 1;
497 ret = 0;
498 }
499 mutex_unlock(&kvm->lock);
500 break;
501 case KVM_S390_VM_MEM_CLR_CMMA:
f9cbd9b0
DH
502 ret = -ENXIO;
503 if (!sclp.has_cmma)
504 break;
c3489155
DD
505 ret = -EINVAL;
506 if (!kvm->arch.use_cmma)
507 break;
508
c92ea7b9 509 VM_EVENT(kvm, 3, "%s", "RESET: CMMA states");
4f718eab
DD
510 mutex_lock(&kvm->lock);
511 idx = srcu_read_lock(&kvm->srcu);
a13cff31 512 s390_reset_cmma(kvm->arch.gmap->mm);
4f718eab
DD
513 srcu_read_unlock(&kvm->srcu, idx);
514 mutex_unlock(&kvm->lock);
515 ret = 0;
516 break;
8c0a7ce6
DD
517 case KVM_S390_VM_MEM_LIMIT_SIZE: {
518 unsigned long new_limit;
519
520 if (kvm_is_ucontrol(kvm))
521 return -EINVAL;
522
523 if (get_user(new_limit, (u64 __user *)attr->addr))
524 return -EFAULT;
525
a3a92c31
DD
526 if (kvm->arch.mem_limit != KVM_S390_NO_MEM_LIMIT &&
527 new_limit > kvm->arch.mem_limit)
8c0a7ce6
DD
528 return -E2BIG;
529
a3a92c31
DD
530 if (!new_limit)
531 return -EINVAL;
532
533 /* gmap_alloc takes last usable address */
534 if (new_limit != KVM_S390_NO_MEM_LIMIT)
535 new_limit -= 1;
536
8c0a7ce6
DD
537 ret = -EBUSY;
538 mutex_lock(&kvm->lock);
539 if (atomic_read(&kvm->online_vcpus) == 0) {
540 /* gmap_alloc will round the limit up */
541 struct gmap *new = gmap_alloc(current->mm, new_limit);
542
543 if (!new) {
544 ret = -ENOMEM;
545 } else {
546 gmap_free(kvm->arch.gmap);
547 new->private = kvm;
548 kvm->arch.gmap = new;
549 ret = 0;
550 }
551 }
552 mutex_unlock(&kvm->lock);
a3a92c31
DD
553 VM_EVENT(kvm, 3, "SET: max guest address: %lu", new_limit);
554 VM_EVENT(kvm, 3, "New guest asce: 0x%pK",
555 (void *) kvm->arch.gmap->asce);
8c0a7ce6
DD
556 break;
557 }
4f718eab
DD
558 default:
559 ret = -ENXIO;
560 break;
561 }
562 return ret;
563}
564
a374e892
TK
565static void kvm_s390_vcpu_crypto_setup(struct kvm_vcpu *vcpu);
566
567static int kvm_s390_vm_set_crypto(struct kvm *kvm, struct kvm_device_attr *attr)
568{
569 struct kvm_vcpu *vcpu;
570 int i;
571
9d8d5786 572 if (!test_kvm_facility(kvm, 76))
a374e892
TK
573 return -EINVAL;
574
575 mutex_lock(&kvm->lock);
576 switch (attr->attr) {
577 case KVM_S390_VM_CRYPTO_ENABLE_AES_KW:
578 get_random_bytes(
579 kvm->arch.crypto.crycb->aes_wrapping_key_mask,
580 sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask));
581 kvm->arch.crypto.aes_kw = 1;
c92ea7b9 582 VM_EVENT(kvm, 3, "%s", "ENABLE: AES keywrapping support");
a374e892
TK
583 break;
584 case KVM_S390_VM_CRYPTO_ENABLE_DEA_KW:
585 get_random_bytes(
586 kvm->arch.crypto.crycb->dea_wrapping_key_mask,
587 sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask));
588 kvm->arch.crypto.dea_kw = 1;
c92ea7b9 589 VM_EVENT(kvm, 3, "%s", "ENABLE: DEA keywrapping support");
a374e892
TK
590 break;
591 case KVM_S390_VM_CRYPTO_DISABLE_AES_KW:
592 kvm->arch.crypto.aes_kw = 0;
593 memset(kvm->arch.crypto.crycb->aes_wrapping_key_mask, 0,
594 sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask));
c92ea7b9 595 VM_EVENT(kvm, 3, "%s", "DISABLE: AES keywrapping support");
a374e892
TK
596 break;
597 case KVM_S390_VM_CRYPTO_DISABLE_DEA_KW:
598 kvm->arch.crypto.dea_kw = 0;
599 memset(kvm->arch.crypto.crycb->dea_wrapping_key_mask, 0,
600 sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask));
c92ea7b9 601 VM_EVENT(kvm, 3, "%s", "DISABLE: DEA keywrapping support");
a374e892
TK
602 break;
603 default:
604 mutex_unlock(&kvm->lock);
605 return -ENXIO;
606 }
607
608 kvm_for_each_vcpu(i, vcpu, kvm) {
609 kvm_s390_vcpu_crypto_setup(vcpu);
610 exit_sie(vcpu);
611 }
612 mutex_unlock(&kvm->lock);
613 return 0;
614}
615
72f25020
JH
616static int kvm_s390_set_tod_high(struct kvm *kvm, struct kvm_device_attr *attr)
617{
618 u8 gtod_high;
619
620 if (copy_from_user(&gtod_high, (void __user *)attr->addr,
621 sizeof(gtod_high)))
622 return -EFAULT;
623
624 if (gtod_high != 0)
625 return -EINVAL;
58c383c6 626 VM_EVENT(kvm, 3, "SET: TOD extension: 0x%x", gtod_high);
72f25020
JH
627
628 return 0;
629}
630
631static int kvm_s390_set_tod_low(struct kvm *kvm, struct kvm_device_attr *attr)
632{
5a3d883a 633 u64 gtod;
72f25020
JH
634
635 if (copy_from_user(&gtod, (void __user *)attr->addr, sizeof(gtod)))
636 return -EFAULT;
637
25ed1675 638 kvm_s390_set_tod_clock(kvm, gtod);
58c383c6 639 VM_EVENT(kvm, 3, "SET: TOD base: 0x%llx", gtod);
72f25020
JH
640 return 0;
641}
642
643static int kvm_s390_set_tod(struct kvm *kvm, struct kvm_device_attr *attr)
644{
645 int ret;
646
647 if (attr->flags)
648 return -EINVAL;
649
650 switch (attr->attr) {
651 case KVM_S390_VM_TOD_HIGH:
652 ret = kvm_s390_set_tod_high(kvm, attr);
653 break;
654 case KVM_S390_VM_TOD_LOW:
655 ret = kvm_s390_set_tod_low(kvm, attr);
656 break;
657 default:
658 ret = -ENXIO;
659 break;
660 }
661 return ret;
662}
663
664static int kvm_s390_get_tod_high(struct kvm *kvm, struct kvm_device_attr *attr)
665{
666 u8 gtod_high = 0;
667
668 if (copy_to_user((void __user *)attr->addr, &gtod_high,
669 sizeof(gtod_high)))
670 return -EFAULT;
58c383c6 671 VM_EVENT(kvm, 3, "QUERY: TOD extension: 0x%x", gtod_high);
72f25020
JH
672
673 return 0;
674}
675
676static int kvm_s390_get_tod_low(struct kvm *kvm, struct kvm_device_attr *attr)
677{
5a3d883a 678 u64 gtod;
72f25020 679
60417fcc 680 gtod = kvm_s390_get_tod_clock_fast(kvm);
72f25020
JH
681 if (copy_to_user((void __user *)attr->addr, &gtod, sizeof(gtod)))
682 return -EFAULT;
58c383c6 683 VM_EVENT(kvm, 3, "QUERY: TOD base: 0x%llx", gtod);
72f25020
JH
684
685 return 0;
686}
687
688static int kvm_s390_get_tod(struct kvm *kvm, struct kvm_device_attr *attr)
689{
690 int ret;
691
692 if (attr->flags)
693 return -EINVAL;
694
695 switch (attr->attr) {
696 case KVM_S390_VM_TOD_HIGH:
697 ret = kvm_s390_get_tod_high(kvm, attr);
698 break;
699 case KVM_S390_VM_TOD_LOW:
700 ret = kvm_s390_get_tod_low(kvm, attr);
701 break;
702 default:
703 ret = -ENXIO;
704 break;
705 }
706 return ret;
707}
708
658b6eda
MM
709static int kvm_s390_set_processor(struct kvm *kvm, struct kvm_device_attr *attr)
710{
711 struct kvm_s390_vm_cpu_processor *proc;
053dd230 712 u16 lowest_ibc, unblocked_ibc;
658b6eda
MM
713 int ret = 0;
714
715 mutex_lock(&kvm->lock);
716 if (atomic_read(&kvm->online_vcpus)) {
717 ret = -EBUSY;
718 goto out;
719 }
720 proc = kzalloc(sizeof(*proc), GFP_KERNEL);
721 if (!proc) {
722 ret = -ENOMEM;
723 goto out;
724 }
725 if (!copy_from_user(proc, (void __user *)attr->addr,
726 sizeof(*proc))) {
9bb0ec09 727 kvm->arch.model.cpuid = proc->cpuid;
053dd230
DH
728 lowest_ibc = sclp.ibc >> 16 & 0xfff;
729 unblocked_ibc = sclp.ibc & 0xfff;
730 if (lowest_ibc) {
731 if (proc->ibc > unblocked_ibc)
732 kvm->arch.model.ibc = unblocked_ibc;
733 else if (proc->ibc < lowest_ibc)
734 kvm->arch.model.ibc = lowest_ibc;
735 else
736 kvm->arch.model.ibc = proc->ibc;
737 }
c54f0d6a 738 memcpy(kvm->arch.model.fac_list, proc->fac_list,
658b6eda
MM
739 S390_ARCH_FAC_LIST_SIZE_BYTE);
740 } else
741 ret = -EFAULT;
742 kfree(proc);
743out:
744 mutex_unlock(&kvm->lock);
745 return ret;
746}
747
15c9705f
DH
748static int kvm_s390_set_processor_feat(struct kvm *kvm,
749 struct kvm_device_attr *attr)
750{
751 struct kvm_s390_vm_cpu_feat data;
752 int ret = -EBUSY;
753
754 if (copy_from_user(&data, (void __user *)attr->addr, sizeof(data)))
755 return -EFAULT;
756 if (!bitmap_subset((unsigned long *) data.feat,
757 kvm_s390_available_cpu_feat,
758 KVM_S390_VM_CPU_FEAT_NR_BITS))
759 return -EINVAL;
760
761 mutex_lock(&kvm->lock);
762 if (!atomic_read(&kvm->online_vcpus)) {
763 bitmap_copy(kvm->arch.cpu_feat, (unsigned long *) data.feat,
764 KVM_S390_VM_CPU_FEAT_NR_BITS);
765 ret = 0;
766 }
767 mutex_unlock(&kvm->lock);
768 return ret;
769}
770
0a763c78
DH
771static int kvm_s390_set_processor_subfunc(struct kvm *kvm,
772 struct kvm_device_attr *attr)
773{
774 /*
775 * Once supported by kernel + hw, we have to store the subfunctions
776 * in kvm->arch and remember that user space configured them.
777 */
778 return -ENXIO;
779}
780
658b6eda
MM
781static int kvm_s390_set_cpu_model(struct kvm *kvm, struct kvm_device_attr *attr)
782{
783 int ret = -ENXIO;
784
785 switch (attr->attr) {
786 case KVM_S390_VM_CPU_PROCESSOR:
787 ret = kvm_s390_set_processor(kvm, attr);
788 break;
15c9705f
DH
789 case KVM_S390_VM_CPU_PROCESSOR_FEAT:
790 ret = kvm_s390_set_processor_feat(kvm, attr);
791 break;
0a763c78
DH
792 case KVM_S390_VM_CPU_PROCESSOR_SUBFUNC:
793 ret = kvm_s390_set_processor_subfunc(kvm, attr);
794 break;
658b6eda
MM
795 }
796 return ret;
797}
798
799static int kvm_s390_get_processor(struct kvm *kvm, struct kvm_device_attr *attr)
800{
801 struct kvm_s390_vm_cpu_processor *proc;
802 int ret = 0;
803
804 proc = kzalloc(sizeof(*proc), GFP_KERNEL);
805 if (!proc) {
806 ret = -ENOMEM;
807 goto out;
808 }
9bb0ec09 809 proc->cpuid = kvm->arch.model.cpuid;
658b6eda 810 proc->ibc = kvm->arch.model.ibc;
c54f0d6a
DH
811 memcpy(&proc->fac_list, kvm->arch.model.fac_list,
812 S390_ARCH_FAC_LIST_SIZE_BYTE);
658b6eda
MM
813 if (copy_to_user((void __user *)attr->addr, proc, sizeof(*proc)))
814 ret = -EFAULT;
815 kfree(proc);
816out:
817 return ret;
818}
819
820static int kvm_s390_get_machine(struct kvm *kvm, struct kvm_device_attr *attr)
821{
822 struct kvm_s390_vm_cpu_machine *mach;
823 int ret = 0;
824
825 mach = kzalloc(sizeof(*mach), GFP_KERNEL);
826 if (!mach) {
827 ret = -ENOMEM;
828 goto out;
829 }
830 get_cpu_id((struct cpuid *) &mach->cpuid);
37c5f6c8 831 mach->ibc = sclp.ibc;
c54f0d6a 832 memcpy(&mach->fac_mask, kvm->arch.model.fac_mask,
981467c9 833 S390_ARCH_FAC_LIST_SIZE_BYTE);
658b6eda 834 memcpy((unsigned long *)&mach->fac_list, S390_lowcore.stfle_fac_list,
94422ee8 835 S390_ARCH_FAC_LIST_SIZE_BYTE);
658b6eda
MM
836 if (copy_to_user((void __user *)attr->addr, mach, sizeof(*mach)))
837 ret = -EFAULT;
838 kfree(mach);
839out:
840 return ret;
841}
842
15c9705f
DH
843static int kvm_s390_get_processor_feat(struct kvm *kvm,
844 struct kvm_device_attr *attr)
845{
846 struct kvm_s390_vm_cpu_feat data;
847
848 bitmap_copy((unsigned long *) data.feat, kvm->arch.cpu_feat,
849 KVM_S390_VM_CPU_FEAT_NR_BITS);
850 if (copy_to_user((void __user *)attr->addr, &data, sizeof(data)))
851 return -EFAULT;
852 return 0;
853}
854
855static int kvm_s390_get_machine_feat(struct kvm *kvm,
856 struct kvm_device_attr *attr)
857{
858 struct kvm_s390_vm_cpu_feat data;
859
860 bitmap_copy((unsigned long *) data.feat,
861 kvm_s390_available_cpu_feat,
862 KVM_S390_VM_CPU_FEAT_NR_BITS);
863 if (copy_to_user((void __user *)attr->addr, &data, sizeof(data)))
864 return -EFAULT;
865 return 0;
866}
867
0a763c78
DH
868static int kvm_s390_get_processor_subfunc(struct kvm *kvm,
869 struct kvm_device_attr *attr)
870{
871 /*
872 * Once we can actually configure subfunctions (kernel + hw support),
873 * we have to check if they were already set by user space, if so copy
874 * them from kvm->arch.
875 */
876 return -ENXIO;
877}
878
879static int kvm_s390_get_machine_subfunc(struct kvm *kvm,
880 struct kvm_device_attr *attr)
881{
882 if (copy_to_user((void __user *)attr->addr, &kvm_s390_available_subfunc,
883 sizeof(struct kvm_s390_vm_cpu_subfunc)))
884 return -EFAULT;
885 return 0;
886}
658b6eda
MM
887static int kvm_s390_get_cpu_model(struct kvm *kvm, struct kvm_device_attr *attr)
888{
889 int ret = -ENXIO;
890
891 switch (attr->attr) {
892 case KVM_S390_VM_CPU_PROCESSOR:
893 ret = kvm_s390_get_processor(kvm, attr);
894 break;
895 case KVM_S390_VM_CPU_MACHINE:
896 ret = kvm_s390_get_machine(kvm, attr);
897 break;
15c9705f
DH
898 case KVM_S390_VM_CPU_PROCESSOR_FEAT:
899 ret = kvm_s390_get_processor_feat(kvm, attr);
900 break;
901 case KVM_S390_VM_CPU_MACHINE_FEAT:
902 ret = kvm_s390_get_machine_feat(kvm, attr);
903 break;
0a763c78
DH
904 case KVM_S390_VM_CPU_PROCESSOR_SUBFUNC:
905 ret = kvm_s390_get_processor_subfunc(kvm, attr);
906 break;
907 case KVM_S390_VM_CPU_MACHINE_SUBFUNC:
908 ret = kvm_s390_get_machine_subfunc(kvm, attr);
909 break;
658b6eda
MM
910 }
911 return ret;
912}
913
f2061656
DD
914static int kvm_s390_vm_set_attr(struct kvm *kvm, struct kvm_device_attr *attr)
915{
916 int ret;
917
918 switch (attr->group) {
4f718eab 919 case KVM_S390_VM_MEM_CTRL:
8c0a7ce6 920 ret = kvm_s390_set_mem_control(kvm, attr);
4f718eab 921 break;
72f25020
JH
922 case KVM_S390_VM_TOD:
923 ret = kvm_s390_set_tod(kvm, attr);
924 break;
658b6eda
MM
925 case KVM_S390_VM_CPU_MODEL:
926 ret = kvm_s390_set_cpu_model(kvm, attr);
927 break;
a374e892
TK
928 case KVM_S390_VM_CRYPTO:
929 ret = kvm_s390_vm_set_crypto(kvm, attr);
930 break;
f2061656
DD
931 default:
932 ret = -ENXIO;
933 break;
934 }
935
936 return ret;
937}
938
939static int kvm_s390_vm_get_attr(struct kvm *kvm, struct kvm_device_attr *attr)
940{
8c0a7ce6
DD
941 int ret;
942
943 switch (attr->group) {
944 case KVM_S390_VM_MEM_CTRL:
945 ret = kvm_s390_get_mem_control(kvm, attr);
946 break;
72f25020
JH
947 case KVM_S390_VM_TOD:
948 ret = kvm_s390_get_tod(kvm, attr);
949 break;
658b6eda
MM
950 case KVM_S390_VM_CPU_MODEL:
951 ret = kvm_s390_get_cpu_model(kvm, attr);
952 break;
8c0a7ce6
DD
953 default:
954 ret = -ENXIO;
955 break;
956 }
957
958 return ret;
f2061656
DD
959}
960
961static int kvm_s390_vm_has_attr(struct kvm *kvm, struct kvm_device_attr *attr)
962{
963 int ret;
964
965 switch (attr->group) {
4f718eab
DD
966 case KVM_S390_VM_MEM_CTRL:
967 switch (attr->attr) {
968 case KVM_S390_VM_MEM_ENABLE_CMMA:
969 case KVM_S390_VM_MEM_CLR_CMMA:
f9cbd9b0
DH
970 ret = sclp.has_cmma ? 0 : -ENXIO;
971 break;
8c0a7ce6 972 case KVM_S390_VM_MEM_LIMIT_SIZE:
4f718eab
DD
973 ret = 0;
974 break;
975 default:
976 ret = -ENXIO;
977 break;
978 }
979 break;
72f25020
JH
980 case KVM_S390_VM_TOD:
981 switch (attr->attr) {
982 case KVM_S390_VM_TOD_LOW:
983 case KVM_S390_VM_TOD_HIGH:
984 ret = 0;
985 break;
986 default:
987 ret = -ENXIO;
988 break;
989 }
990 break;
658b6eda
MM
991 case KVM_S390_VM_CPU_MODEL:
992 switch (attr->attr) {
993 case KVM_S390_VM_CPU_PROCESSOR:
994 case KVM_S390_VM_CPU_MACHINE:
15c9705f
DH
995 case KVM_S390_VM_CPU_PROCESSOR_FEAT:
996 case KVM_S390_VM_CPU_MACHINE_FEAT:
0a763c78 997 case KVM_S390_VM_CPU_MACHINE_SUBFUNC:
658b6eda
MM
998 ret = 0;
999 break;
0a763c78
DH
1000 /* configuring subfunctions is not supported yet */
1001 case KVM_S390_VM_CPU_PROCESSOR_SUBFUNC:
658b6eda
MM
1002 default:
1003 ret = -ENXIO;
1004 break;
1005 }
1006 break;
a374e892
TK
1007 case KVM_S390_VM_CRYPTO:
1008 switch (attr->attr) {
1009 case KVM_S390_VM_CRYPTO_ENABLE_AES_KW:
1010 case KVM_S390_VM_CRYPTO_ENABLE_DEA_KW:
1011 case KVM_S390_VM_CRYPTO_DISABLE_AES_KW:
1012 case KVM_S390_VM_CRYPTO_DISABLE_DEA_KW:
1013 ret = 0;
1014 break;
1015 default:
1016 ret = -ENXIO;
1017 break;
1018 }
1019 break;
f2061656
DD
1020 default:
1021 ret = -ENXIO;
1022 break;
1023 }
1024
1025 return ret;
1026}
1027
30ee2a98
JH
1028static long kvm_s390_get_skeys(struct kvm *kvm, struct kvm_s390_skeys *args)
1029{
1030 uint8_t *keys;
1031 uint64_t hva;
1032 unsigned long curkey;
1033 int i, r = 0;
1034
1035 if (args->flags != 0)
1036 return -EINVAL;
1037
1038 /* Is this guest using storage keys? */
1039 if (!mm_use_skey(current->mm))
1040 return KVM_S390_GET_SKEYS_NONE;
1041
1042 /* Enforce sane limit on memory allocation */
1043 if (args->count < 1 || args->count > KVM_S390_SKEYS_MAX)
1044 return -EINVAL;
1045
1046 keys = kmalloc_array(args->count, sizeof(uint8_t),
1047 GFP_KERNEL | __GFP_NOWARN);
1048 if (!keys)
1049 keys = vmalloc(sizeof(uint8_t) * args->count);
1050 if (!keys)
1051 return -ENOMEM;
1052
1053 for (i = 0; i < args->count; i++) {
1054 hva = gfn_to_hva(kvm, args->start_gfn + i);
1055 if (kvm_is_error_hva(hva)) {
1056 r = -EFAULT;
1057 goto out;
1058 }
1059
1060 curkey = get_guest_storage_key(current->mm, hva);
1061 if (IS_ERR_VALUE(curkey)) {
1062 r = curkey;
1063 goto out;
1064 }
1065 keys[i] = curkey;
1066 }
1067
1068 r = copy_to_user((uint8_t __user *)args->skeydata_addr, keys,
1069 sizeof(uint8_t) * args->count);
1070 if (r)
1071 r = -EFAULT;
1072out:
1073 kvfree(keys);
1074 return r;
1075}
1076
1077static long kvm_s390_set_skeys(struct kvm *kvm, struct kvm_s390_skeys *args)
1078{
1079 uint8_t *keys;
1080 uint64_t hva;
1081 int i, r = 0;
1082
1083 if (args->flags != 0)
1084 return -EINVAL;
1085
1086 /* Enforce sane limit on memory allocation */
1087 if (args->count < 1 || args->count > KVM_S390_SKEYS_MAX)
1088 return -EINVAL;
1089
1090 keys = kmalloc_array(args->count, sizeof(uint8_t),
1091 GFP_KERNEL | __GFP_NOWARN);
1092 if (!keys)
1093 keys = vmalloc(sizeof(uint8_t) * args->count);
1094 if (!keys)
1095 return -ENOMEM;
1096
1097 r = copy_from_user(keys, (uint8_t __user *)args->skeydata_addr,
1098 sizeof(uint8_t) * args->count);
1099 if (r) {
1100 r = -EFAULT;
1101 goto out;
1102 }
1103
1104 /* Enable storage key handling for the guest */
14d4a425
DD
1105 r = s390_enable_skey();
1106 if (r)
1107 goto out;
30ee2a98
JH
1108
1109 for (i = 0; i < args->count; i++) {
1110 hva = gfn_to_hva(kvm, args->start_gfn + i);
1111 if (kvm_is_error_hva(hva)) {
1112 r = -EFAULT;
1113 goto out;
1114 }
1115
1116 /* Lowest order bit is reserved */
1117 if (keys[i] & 0x01) {
1118 r = -EINVAL;
1119 goto out;
1120 }
1121
1122 r = set_guest_storage_key(current->mm, hva,
1123 (unsigned long)keys[i], 0);
1124 if (r)
1125 goto out;
1126 }
1127out:
1128 kvfree(keys);
1129 return r;
1130}
1131
b0c632db
HC
1132long kvm_arch_vm_ioctl(struct file *filp,
1133 unsigned int ioctl, unsigned long arg)
1134{
1135 struct kvm *kvm = filp->private_data;
1136 void __user *argp = (void __user *)arg;
f2061656 1137 struct kvm_device_attr attr;
b0c632db
HC
1138 int r;
1139
1140 switch (ioctl) {
ba5c1e9b
CO
1141 case KVM_S390_INTERRUPT: {
1142 struct kvm_s390_interrupt s390int;
1143
1144 r = -EFAULT;
1145 if (copy_from_user(&s390int, argp, sizeof(s390int)))
1146 break;
1147 r = kvm_s390_inject_vm(kvm, &s390int);
1148 break;
1149 }
d938dc55
CH
1150 case KVM_ENABLE_CAP: {
1151 struct kvm_enable_cap cap;
1152 r = -EFAULT;
1153 if (copy_from_user(&cap, argp, sizeof(cap)))
1154 break;
1155 r = kvm_vm_ioctl_enable_cap(kvm, &cap);
1156 break;
1157 }
84223598
CH
1158 case KVM_CREATE_IRQCHIP: {
1159 struct kvm_irq_routing_entry routing;
1160
1161 r = -EINVAL;
1162 if (kvm->arch.use_irqchip) {
1163 /* Set up dummy routing. */
1164 memset(&routing, 0, sizeof(routing));
152b2839 1165 r = kvm_set_irq_routing(kvm, &routing, 0, 0);
84223598
CH
1166 }
1167 break;
1168 }
f2061656
DD
1169 case KVM_SET_DEVICE_ATTR: {
1170 r = -EFAULT;
1171 if (copy_from_user(&attr, (void __user *)arg, sizeof(attr)))
1172 break;
1173 r = kvm_s390_vm_set_attr(kvm, &attr);
1174 break;
1175 }
1176 case KVM_GET_DEVICE_ATTR: {
1177 r = -EFAULT;
1178 if (copy_from_user(&attr, (void __user *)arg, sizeof(attr)))
1179 break;
1180 r = kvm_s390_vm_get_attr(kvm, &attr);
1181 break;
1182 }
1183 case KVM_HAS_DEVICE_ATTR: {
1184 r = -EFAULT;
1185 if (copy_from_user(&attr, (void __user *)arg, sizeof(attr)))
1186 break;
1187 r = kvm_s390_vm_has_attr(kvm, &attr);
1188 break;
1189 }
30ee2a98
JH
1190 case KVM_S390_GET_SKEYS: {
1191 struct kvm_s390_skeys args;
1192
1193 r = -EFAULT;
1194 if (copy_from_user(&args, argp,
1195 sizeof(struct kvm_s390_skeys)))
1196 break;
1197 r = kvm_s390_get_skeys(kvm, &args);
1198 break;
1199 }
1200 case KVM_S390_SET_SKEYS: {
1201 struct kvm_s390_skeys args;
1202
1203 r = -EFAULT;
1204 if (copy_from_user(&args, argp,
1205 sizeof(struct kvm_s390_skeys)))
1206 break;
1207 r = kvm_s390_set_skeys(kvm, &args);
1208 break;
1209 }
b0c632db 1210 default:
367e1319 1211 r = -ENOTTY;
b0c632db
HC
1212 }
1213
1214 return r;
1215}
1216
45c9b47c
TK
1217static int kvm_s390_query_ap_config(u8 *config)
1218{
1219 u32 fcn_code = 0x04000000UL;
86044c8c 1220 u32 cc = 0;
45c9b47c 1221
86044c8c 1222 memset(config, 0, 128);
45c9b47c
TK
1223 asm volatile(
1224 "lgr 0,%1\n"
1225 "lgr 2,%2\n"
1226 ".long 0xb2af0000\n" /* PQAP(QCI) */
86044c8c 1227 "0: ipm %0\n"
45c9b47c 1228 "srl %0,28\n"
86044c8c
CB
1229 "1:\n"
1230 EX_TABLE(0b, 1b)
1231 : "+r" (cc)
45c9b47c
TK
1232 : "r" (fcn_code), "r" (config)
1233 : "cc", "0", "2", "memory"
1234 );
1235
1236 return cc;
1237}
1238
1239static int kvm_s390_apxa_installed(void)
1240{
1241 u8 config[128];
1242 int cc;
1243
a6aacc3f 1244 if (test_facility(12)) {
45c9b47c
TK
1245 cc = kvm_s390_query_ap_config(config);
1246
1247 if (cc)
1248 pr_err("PQAP(QCI) failed with cc=%d", cc);
1249 else
1250 return config[0] & 0x40;
1251 }
1252
1253 return 0;
1254}
1255
1256static void kvm_s390_set_crycb_format(struct kvm *kvm)
1257{
1258 kvm->arch.crypto.crycbd = (__u32)(unsigned long) kvm->arch.crypto.crycb;
1259
1260 if (kvm_s390_apxa_installed())
1261 kvm->arch.crypto.crycbd |= CRYCB_FORMAT2;
1262 else
1263 kvm->arch.crypto.crycbd |= CRYCB_FORMAT1;
1264}
1265
9bb0ec09 1266static u64 kvm_s390_get_initial_cpuid(void)
9d8d5786 1267{
9bb0ec09
DH
1268 struct cpuid cpuid;
1269
1270 get_cpu_id(&cpuid);
1271 cpuid.version = 0xff;
1272 return *((u64 *) &cpuid);
9d8d5786
MM
1273}
1274
c54f0d6a 1275static void kvm_s390_crypto_init(struct kvm *kvm)
5102ee87 1276{
9d8d5786 1277 if (!test_kvm_facility(kvm, 76))
c54f0d6a 1278 return;
5102ee87 1279
c54f0d6a 1280 kvm->arch.crypto.crycb = &kvm->arch.sie_page2->crycb;
45c9b47c 1281 kvm_s390_set_crycb_format(kvm);
5102ee87 1282
ed6f76b4
TK
1283 /* Enable AES/DEA protected key functions by default */
1284 kvm->arch.crypto.aes_kw = 1;
1285 kvm->arch.crypto.dea_kw = 1;
1286 get_random_bytes(kvm->arch.crypto.crycb->aes_wrapping_key_mask,
1287 sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask));
1288 get_random_bytes(kvm->arch.crypto.crycb->dea_wrapping_key_mask,
1289 sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask));
5102ee87
TK
1290}
1291
7d43bafc
ED
1292static void sca_dispose(struct kvm *kvm)
1293{
1294 if (kvm->arch.use_esca)
5e044315 1295 free_pages_exact(kvm->arch.sca, sizeof(struct esca_block));
7d43bafc
ED
1296 else
1297 free_page((unsigned long)(kvm->arch.sca));
1298 kvm->arch.sca = NULL;
1299}
1300
e08b9637 1301int kvm_arch_init_vm(struct kvm *kvm, unsigned long type)
b0c632db 1302{
76a6dd72 1303 gfp_t alloc_flags = GFP_KERNEL;
9d8d5786 1304 int i, rc;
b0c632db 1305 char debug_name[16];
f6c137ff 1306 static unsigned long sca_offset;
b0c632db 1307
e08b9637
CO
1308 rc = -EINVAL;
1309#ifdef CONFIG_KVM_S390_UCONTROL
1310 if (type & ~KVM_VM_S390_UCONTROL)
1311 goto out_err;
1312 if ((type & KVM_VM_S390_UCONTROL) && (!capable(CAP_SYS_ADMIN)))
1313 goto out_err;
1314#else
1315 if (type)
1316 goto out_err;
1317#endif
1318
b0c632db
HC
1319 rc = s390_enable_sie();
1320 if (rc)
d89f5eff 1321 goto out_err;
b0c632db 1322
b290411a
CO
1323 rc = -ENOMEM;
1324
7d0a5e62
JF
1325 ratelimit_state_init(&kvm->arch.sthyi_limit, 5 * HZ, 500);
1326
7d43bafc 1327 kvm->arch.use_esca = 0; /* start with basic SCA */
76a6dd72
DH
1328 if (!sclp.has_64bscao)
1329 alloc_flags |= GFP_DMA;
5e044315 1330 rwlock_init(&kvm->arch.sca_lock);
76a6dd72 1331 kvm->arch.sca = (struct bsca_block *) get_zeroed_page(alloc_flags);
b0c632db 1332 if (!kvm->arch.sca)
d89f5eff 1333 goto out_err;
f6c137ff 1334 spin_lock(&kvm_lock);
c5c2c393 1335 sca_offset += 16;
bc784cce 1336 if (sca_offset + sizeof(struct bsca_block) > PAGE_SIZE)
c5c2c393 1337 sca_offset = 0;
bc784cce
ED
1338 kvm->arch.sca = (struct bsca_block *)
1339 ((char *) kvm->arch.sca + sca_offset);
f6c137ff 1340 spin_unlock(&kvm_lock);
b0c632db
HC
1341
1342 sprintf(debug_name, "kvm-%u", current->pid);
1343
1cb9cf72 1344 kvm->arch.dbf = debug_register(debug_name, 32, 1, 7 * sizeof(long));
b0c632db 1345 if (!kvm->arch.dbf)
40f5b735 1346 goto out_err;
b0c632db 1347
c54f0d6a
DH
1348 kvm->arch.sie_page2 =
1349 (struct sie_page2 *) get_zeroed_page(GFP_KERNEL | GFP_DMA);
1350 if (!kvm->arch.sie_page2)
40f5b735 1351 goto out_err;
9d8d5786 1352
fb5bf93f 1353 /* Populate the facility mask initially. */
c54f0d6a 1354 memcpy(kvm->arch.model.fac_mask, S390_lowcore.stfle_fac_list,
94422ee8 1355 S390_ARCH_FAC_LIST_SIZE_BYTE);
9d8d5786
MM
1356 for (i = 0; i < S390_ARCH_FAC_LIST_SIZE_U64; i++) {
1357 if (i < kvm_s390_fac_list_mask_size())
c54f0d6a 1358 kvm->arch.model.fac_mask[i] &= kvm_s390_fac_list_mask[i];
9d8d5786 1359 else
c54f0d6a 1360 kvm->arch.model.fac_mask[i] = 0UL;
9d8d5786
MM
1361 }
1362
981467c9 1363 /* Populate the facility list initially. */
c54f0d6a
DH
1364 kvm->arch.model.fac_list = kvm->arch.sie_page2->fac_list;
1365 memcpy(kvm->arch.model.fac_list, kvm->arch.model.fac_mask,
981467c9
MM
1366 S390_ARCH_FAC_LIST_SIZE_BYTE);
1367
95ca2cb5
JF
1368 set_kvm_facility(kvm->arch.model.fac_mask, 74);
1369 set_kvm_facility(kvm->arch.model.fac_list, 74);
1370
9bb0ec09 1371 kvm->arch.model.cpuid = kvm_s390_get_initial_cpuid();
37c5f6c8 1372 kvm->arch.model.ibc = sclp.ibc & 0x0fff;
9d8d5786 1373
c54f0d6a 1374 kvm_s390_crypto_init(kvm);
5102ee87 1375
ba5c1e9b 1376 spin_lock_init(&kvm->arch.float_int.lock);
6d3da241
JF
1377 for (i = 0; i < FIRQ_LIST_COUNT; i++)
1378 INIT_LIST_HEAD(&kvm->arch.float_int.lists[i]);
8a242234 1379 init_waitqueue_head(&kvm->arch.ipte_wq);
a6b7e459 1380 mutex_init(&kvm->arch.ipte_mutex);
ba5c1e9b 1381
b0c632db 1382 debug_register_view(kvm->arch.dbf, &debug_sprintf_view);
78f26131 1383 VM_EVENT(kvm, 3, "vm created with type %lu", type);
b0c632db 1384
e08b9637
CO
1385 if (type & KVM_VM_S390_UCONTROL) {
1386 kvm->arch.gmap = NULL;
a3a92c31 1387 kvm->arch.mem_limit = KVM_S390_NO_MEM_LIMIT;
e08b9637 1388 } else {
32e6b236
GH
1389 if (sclp.hamax == U64_MAX)
1390 kvm->arch.mem_limit = TASK_MAX_SIZE;
1391 else
1392 kvm->arch.mem_limit = min_t(unsigned long, TASK_MAX_SIZE,
1393 sclp.hamax + 1);
a3a92c31 1394 kvm->arch.gmap = gmap_alloc(current->mm, kvm->arch.mem_limit - 1);
e08b9637 1395 if (!kvm->arch.gmap)
40f5b735 1396 goto out_err;
2c70fe44 1397 kvm->arch.gmap->private = kvm;
24eb3a82 1398 kvm->arch.gmap->pfault_enabled = 0;
e08b9637 1399 }
fa6b7fe9
CH
1400
1401 kvm->arch.css_support = 0;
84223598 1402 kvm->arch.use_irqchip = 0;
72f25020 1403 kvm->arch.epoch = 0;
fa6b7fe9 1404
8ad35755 1405 spin_lock_init(&kvm->arch.start_stop_lock);
8335713a 1406 KVM_EVENT(3, "vm 0x%pK created by pid %u", kvm, current->pid);
8ad35755 1407
d89f5eff 1408 return 0;
40f5b735 1409out_err:
c54f0d6a 1410 free_page((unsigned long)kvm->arch.sie_page2);
598841ca 1411 debug_unregister(kvm->arch.dbf);
7d43bafc 1412 sca_dispose(kvm);
78f26131 1413 KVM_EVENT(3, "creation of vm failed: %d", rc);
d89f5eff 1414 return rc;
b0c632db
HC
1415}
1416
d329c035
CB
1417void kvm_arch_vcpu_destroy(struct kvm_vcpu *vcpu)
1418{
1419 VCPU_EVENT(vcpu, 3, "%s", "free cpu");
ade38c31 1420 trace_kvm_s390_destroy_vcpu(vcpu->vcpu_id);
67335e63 1421 kvm_s390_clear_local_irqs(vcpu);
3c038e6b 1422 kvm_clear_async_pf_completion_queue(vcpu);
bc784cce 1423 if (!kvm_is_ucontrol(vcpu->kvm))
a6e2f683 1424 sca_del_vcpu(vcpu);
27e0393f
CO
1425
1426 if (kvm_is_ucontrol(vcpu->kvm))
1427 gmap_free(vcpu->arch.gmap);
1428
e6db1d61 1429 if (vcpu->kvm->arch.use_cmma)
b31605c1 1430 kvm_s390_vcpu_unsetup_cmma(vcpu);
d329c035 1431 free_page((unsigned long)(vcpu->arch.sie_block));
b31288fa 1432
6692cef3 1433 kvm_vcpu_uninit(vcpu);
b110feaf 1434 kmem_cache_free(kvm_vcpu_cache, vcpu);
d329c035
CB
1435}
1436
1437static void kvm_free_vcpus(struct kvm *kvm)
1438{
1439 unsigned int i;
988a2cae 1440 struct kvm_vcpu *vcpu;
d329c035 1441
988a2cae
GN
1442 kvm_for_each_vcpu(i, vcpu, kvm)
1443 kvm_arch_vcpu_destroy(vcpu);
1444
1445 mutex_lock(&kvm->lock);
1446 for (i = 0; i < atomic_read(&kvm->online_vcpus); i++)
1447 kvm->vcpus[i] = NULL;
1448
1449 atomic_set(&kvm->online_vcpus, 0);
1450 mutex_unlock(&kvm->lock);
d329c035
CB
1451}
1452
b0c632db
HC
1453void kvm_arch_destroy_vm(struct kvm *kvm)
1454{
d329c035 1455 kvm_free_vcpus(kvm);
7d43bafc 1456 sca_dispose(kvm);
d329c035 1457 debug_unregister(kvm->arch.dbf);
c54f0d6a 1458 free_page((unsigned long)kvm->arch.sie_page2);
27e0393f
CO
1459 if (!kvm_is_ucontrol(kvm))
1460 gmap_free(kvm->arch.gmap);
841b91c5 1461 kvm_s390_destroy_adapters(kvm);
67335e63 1462 kvm_s390_clear_float_irqs(kvm);
8335713a 1463 KVM_EVENT(3, "vm 0x%pK destroyed", kvm);
b0c632db
HC
1464}
1465
1466/* Section: vcpu related */
dafd032a
DD
1467static int __kvm_ucontrol_vcpu_init(struct kvm_vcpu *vcpu)
1468{
1469 vcpu->arch.gmap = gmap_alloc(current->mm, -1UL);
1470 if (!vcpu->arch.gmap)
1471 return -ENOMEM;
1472 vcpu->arch.gmap->private = vcpu->kvm;
1473
1474 return 0;
1475}
1476
a6e2f683
ED
1477static void sca_del_vcpu(struct kvm_vcpu *vcpu)
1478{
5e044315 1479 read_lock(&vcpu->kvm->arch.sca_lock);
7d43bafc
ED
1480 if (vcpu->kvm->arch.use_esca) {
1481 struct esca_block *sca = vcpu->kvm->arch.sca;
a6e2f683 1482
7d43bafc 1483 clear_bit_inv(vcpu->vcpu_id, (unsigned long *) sca->mcn);
10ce32d5 1484 sca->cpu[vcpu->vcpu_id].sda = 0;
7d43bafc
ED
1485 } else {
1486 struct bsca_block *sca = vcpu->kvm->arch.sca;
1487
1488 clear_bit_inv(vcpu->vcpu_id, (unsigned long *) &sca->mcn);
10ce32d5 1489 sca->cpu[vcpu->vcpu_id].sda = 0;
7d43bafc 1490 }
5e044315 1491 read_unlock(&vcpu->kvm->arch.sca_lock);
a6e2f683
ED
1492}
1493
eaa78f34 1494static void sca_add_vcpu(struct kvm_vcpu *vcpu)
a6e2f683 1495{
eaa78f34
DH
1496 read_lock(&vcpu->kvm->arch.sca_lock);
1497 if (vcpu->kvm->arch.use_esca) {
1498 struct esca_block *sca = vcpu->kvm->arch.sca;
7d43bafc 1499
eaa78f34 1500 sca->cpu[vcpu->vcpu_id].sda = (__u64) vcpu->arch.sie_block;
7d43bafc
ED
1501 vcpu->arch.sie_block->scaoh = (__u32)(((__u64)sca) >> 32);
1502 vcpu->arch.sie_block->scaol = (__u32)(__u64)sca & ~0x3fU;
25508824 1503 vcpu->arch.sie_block->ecb2 |= 0x04U;
eaa78f34 1504 set_bit_inv(vcpu->vcpu_id, (unsigned long *) sca->mcn);
7d43bafc 1505 } else {
eaa78f34 1506 struct bsca_block *sca = vcpu->kvm->arch.sca;
a6e2f683 1507
eaa78f34 1508 sca->cpu[vcpu->vcpu_id].sda = (__u64) vcpu->arch.sie_block;
7d43bafc
ED
1509 vcpu->arch.sie_block->scaoh = (__u32)(((__u64)sca) >> 32);
1510 vcpu->arch.sie_block->scaol = (__u32)(__u64)sca;
eaa78f34 1511 set_bit_inv(vcpu->vcpu_id, (unsigned long *) &sca->mcn);
7d43bafc 1512 }
eaa78f34 1513 read_unlock(&vcpu->kvm->arch.sca_lock);
5e044315
ED
1514}
1515
1516/* Basic SCA to Extended SCA data copy routines */
1517static inline void sca_copy_entry(struct esca_entry *d, struct bsca_entry *s)
1518{
1519 d->sda = s->sda;
1520 d->sigp_ctrl.c = s->sigp_ctrl.c;
1521 d->sigp_ctrl.scn = s->sigp_ctrl.scn;
1522}
1523
1524static void sca_copy_b_to_e(struct esca_block *d, struct bsca_block *s)
1525{
1526 int i;
1527
1528 d->ipte_control = s->ipte_control;
1529 d->mcn[0] = s->mcn;
1530 for (i = 0; i < KVM_S390_BSCA_CPU_SLOTS; i++)
1531 sca_copy_entry(&d->cpu[i], &s->cpu[i]);
1532}
1533
1534static int sca_switch_to_extended(struct kvm *kvm)
1535{
1536 struct bsca_block *old_sca = kvm->arch.sca;
1537 struct esca_block *new_sca;
1538 struct kvm_vcpu *vcpu;
1539 unsigned int vcpu_idx;
1540 u32 scaol, scaoh;
1541
1542 new_sca = alloc_pages_exact(sizeof(*new_sca), GFP_KERNEL|__GFP_ZERO);
1543 if (!new_sca)
1544 return -ENOMEM;
1545
1546 scaoh = (u32)((u64)(new_sca) >> 32);
1547 scaol = (u32)(u64)(new_sca) & ~0x3fU;
1548
1549 kvm_s390_vcpu_block_all(kvm);
1550 write_lock(&kvm->arch.sca_lock);
1551
1552 sca_copy_b_to_e(new_sca, old_sca);
1553
1554 kvm_for_each_vcpu(vcpu_idx, vcpu, kvm) {
1555 vcpu->arch.sie_block->scaoh = scaoh;
1556 vcpu->arch.sie_block->scaol = scaol;
1557 vcpu->arch.sie_block->ecb2 |= 0x04U;
1558 }
1559 kvm->arch.sca = new_sca;
1560 kvm->arch.use_esca = 1;
1561
1562 write_unlock(&kvm->arch.sca_lock);
1563 kvm_s390_vcpu_unblock_all(kvm);
1564
1565 free_page((unsigned long)old_sca);
1566
8335713a
CB
1567 VM_EVENT(kvm, 2, "Switched to ESCA (0x%pK -> 0x%pK)",
1568 old_sca, kvm->arch.sca);
5e044315 1569 return 0;
a6e2f683
ED
1570}
1571
1572static int sca_can_add_vcpu(struct kvm *kvm, unsigned int id)
1573{
5e044315
ED
1574 int rc;
1575
1576 if (id < KVM_S390_BSCA_CPU_SLOTS)
1577 return true;
76a6dd72 1578 if (!sclp.has_esca || !sclp.has_64bscao)
5e044315
ED
1579 return false;
1580
1581 mutex_lock(&kvm->lock);
1582 rc = kvm->arch.use_esca ? 0 : sca_switch_to_extended(kvm);
1583 mutex_unlock(&kvm->lock);
1584
1585 return rc == 0 && id < KVM_S390_ESCA_CPU_SLOTS;
a6e2f683
ED
1586}
1587
b0c632db
HC
1588int kvm_arch_vcpu_init(struct kvm_vcpu *vcpu)
1589{
3c038e6b
DD
1590 vcpu->arch.pfault_token = KVM_S390_PFAULT_TOKEN_INVALID;
1591 kvm_clear_async_pf_completion_queue(vcpu);
59674c1a
CB
1592 vcpu->run->kvm_valid_regs = KVM_SYNC_PREFIX |
1593 KVM_SYNC_GPRS |
9eed0735 1594 KVM_SYNC_ACRS |
b028ee3e
DH
1595 KVM_SYNC_CRS |
1596 KVM_SYNC_ARCH0 |
1597 KVM_SYNC_PFAULT;
c6e5f166
FZ
1598 if (test_kvm_facility(vcpu->kvm, 64))
1599 vcpu->run->kvm_valid_regs |= KVM_SYNC_RICCB;
f6aa6dc4
DH
1600 /* fprs can be synchronized via vrs, even if the guest has no vx. With
1601 * MACHINE_HAS_VX, (load|store)_fpu_regs() will work with vrs format.
1602 */
1603 if (MACHINE_HAS_VX)
68c55750 1604 vcpu->run->kvm_valid_regs |= KVM_SYNC_VRS;
6fd8e67d
DH
1605 else
1606 vcpu->run->kvm_valid_regs |= KVM_SYNC_FPRS;
dafd032a
DD
1607
1608 if (kvm_is_ucontrol(vcpu->kvm))
1609 return __kvm_ucontrol_vcpu_init(vcpu);
1610
b0c632db
HC
1611 return 0;
1612}
1613
db0758b2
DH
1614/* needs disabled preemption to protect from TOD sync and vcpu_load/put */
1615static void __start_cpu_timer_accounting(struct kvm_vcpu *vcpu)
1616{
1617 WARN_ON_ONCE(vcpu->arch.cputm_start != 0);
9c23a131 1618 raw_write_seqcount_begin(&vcpu->arch.cputm_seqcount);
db0758b2 1619 vcpu->arch.cputm_start = get_tod_clock_fast();
9c23a131 1620 raw_write_seqcount_end(&vcpu->arch.cputm_seqcount);
db0758b2
DH
1621}
1622
1623/* needs disabled preemption to protect from TOD sync and vcpu_load/put */
1624static void __stop_cpu_timer_accounting(struct kvm_vcpu *vcpu)
1625{
1626 WARN_ON_ONCE(vcpu->arch.cputm_start == 0);
9c23a131 1627 raw_write_seqcount_begin(&vcpu->arch.cputm_seqcount);
db0758b2
DH
1628 vcpu->arch.sie_block->cputm -= get_tod_clock_fast() - vcpu->arch.cputm_start;
1629 vcpu->arch.cputm_start = 0;
9c23a131 1630 raw_write_seqcount_end(&vcpu->arch.cputm_seqcount);
db0758b2
DH
1631}
1632
1633/* needs disabled preemption to protect from TOD sync and vcpu_load/put */
1634static void __enable_cpu_timer_accounting(struct kvm_vcpu *vcpu)
1635{
1636 WARN_ON_ONCE(vcpu->arch.cputm_enabled);
1637 vcpu->arch.cputm_enabled = true;
1638 __start_cpu_timer_accounting(vcpu);
1639}
1640
1641/* needs disabled preemption to protect from TOD sync and vcpu_load/put */
1642static void __disable_cpu_timer_accounting(struct kvm_vcpu *vcpu)
1643{
1644 WARN_ON_ONCE(!vcpu->arch.cputm_enabled);
1645 __stop_cpu_timer_accounting(vcpu);
1646 vcpu->arch.cputm_enabled = false;
1647}
1648
1649static void enable_cpu_timer_accounting(struct kvm_vcpu *vcpu)
1650{
1651 preempt_disable(); /* protect from TOD sync and vcpu_load/put */
1652 __enable_cpu_timer_accounting(vcpu);
1653 preempt_enable();
1654}
1655
1656static void disable_cpu_timer_accounting(struct kvm_vcpu *vcpu)
1657{
1658 preempt_disable(); /* protect from TOD sync and vcpu_load/put */
1659 __disable_cpu_timer_accounting(vcpu);
1660 preempt_enable();
1661}
1662
4287f247
DH
1663/* set the cpu timer - may only be called from the VCPU thread itself */
1664void kvm_s390_set_cpu_timer(struct kvm_vcpu *vcpu, __u64 cputm)
1665{
db0758b2 1666 preempt_disable(); /* protect from TOD sync and vcpu_load/put */
9c23a131 1667 raw_write_seqcount_begin(&vcpu->arch.cputm_seqcount);
db0758b2
DH
1668 if (vcpu->arch.cputm_enabled)
1669 vcpu->arch.cputm_start = get_tod_clock_fast();
4287f247 1670 vcpu->arch.sie_block->cputm = cputm;
9c23a131 1671 raw_write_seqcount_end(&vcpu->arch.cputm_seqcount);
db0758b2 1672 preempt_enable();
4287f247
DH
1673}
1674
db0758b2 1675/* update and get the cpu timer - can also be called from other VCPU threads */
4287f247
DH
1676__u64 kvm_s390_get_cpu_timer(struct kvm_vcpu *vcpu)
1677{
9c23a131 1678 unsigned int seq;
db0758b2 1679 __u64 value;
db0758b2
DH
1680
1681 if (unlikely(!vcpu->arch.cputm_enabled))
1682 return vcpu->arch.sie_block->cputm;
1683
9c23a131
DH
1684 preempt_disable(); /* protect from TOD sync and vcpu_load/put */
1685 do {
1686 seq = raw_read_seqcount(&vcpu->arch.cputm_seqcount);
1687 /*
1688 * If the writer would ever execute a read in the critical
1689 * section, e.g. in irq context, we have a deadlock.
1690 */
1691 WARN_ON_ONCE((seq & 1) && smp_processor_id() == vcpu->cpu);
1692 value = vcpu->arch.sie_block->cputm;
1693 /* if cputm_start is 0, accounting is being started/stopped */
1694 if (likely(vcpu->arch.cputm_start))
1695 value -= get_tod_clock_fast() - vcpu->arch.cputm_start;
1696 } while (read_seqcount_retry(&vcpu->arch.cputm_seqcount, seq & ~1));
1697 preempt_enable();
db0758b2 1698 return value;
4287f247
DH
1699}
1700
b0c632db
HC
1701void kvm_arch_vcpu_load(struct kvm_vcpu *vcpu, int cpu)
1702{
9977e886 1703 /* Save host register state */
d0164ee2 1704 save_fpu_regs();
9abc2a08
DH
1705 vcpu->arch.host_fpregs.fpc = current->thread.fpu.fpc;
1706 vcpu->arch.host_fpregs.regs = current->thread.fpu.regs;
9977e886 1707
6fd8e67d
DH
1708 if (MACHINE_HAS_VX)
1709 current->thread.fpu.regs = vcpu->run->s.regs.vrs;
1710 else
1711 current->thread.fpu.regs = vcpu->run->s.regs.fprs;
9abc2a08 1712 current->thread.fpu.fpc = vcpu->run->s.regs.fpc;
9977e886 1713 if (test_fp_ctl(current->thread.fpu.fpc))
96b2d7a8 1714 /* User space provided an invalid FPC, let's clear it */
9977e886
HB
1715 current->thread.fpu.fpc = 0;
1716
1717 save_access_regs(vcpu->arch.host_acrs);
59674c1a 1718 restore_access_regs(vcpu->run->s.regs.acrs);
480e5926 1719 gmap_enable(vcpu->arch.gmap);
805de8f4 1720 atomic_or(CPUSTAT_RUNNING, &vcpu->arch.sie_block->cpuflags);
5ebda316 1721 if (vcpu->arch.cputm_enabled && !is_vcpu_idle(vcpu))
db0758b2 1722 __start_cpu_timer_accounting(vcpu);
01a745ac 1723 vcpu->cpu = cpu;
b0c632db
HC
1724}
1725
1726void kvm_arch_vcpu_put(struct kvm_vcpu *vcpu)
1727{
01a745ac 1728 vcpu->cpu = -1;
5ebda316 1729 if (vcpu->arch.cputm_enabled && !is_vcpu_idle(vcpu))
db0758b2 1730 __stop_cpu_timer_accounting(vcpu);
805de8f4 1731 atomic_andnot(CPUSTAT_RUNNING, &vcpu->arch.sie_block->cpuflags);
480e5926 1732 gmap_disable(vcpu->arch.gmap);
9977e886 1733
9abc2a08 1734 /* Save guest register state */
d0164ee2 1735 save_fpu_regs();
9abc2a08 1736 vcpu->run->s.regs.fpc = current->thread.fpu.fpc;
9977e886 1737
9abc2a08
DH
1738 /* Restore host register state */
1739 current->thread.fpu.fpc = vcpu->arch.host_fpregs.fpc;
1740 current->thread.fpu.regs = vcpu->arch.host_fpregs.regs;
9977e886
HB
1741
1742 save_access_regs(vcpu->run->s.regs.acrs);
b0c632db
HC
1743 restore_access_regs(vcpu->arch.host_acrs);
1744}
1745
1746static void kvm_s390_vcpu_initial_reset(struct kvm_vcpu *vcpu)
1747{
1748 /* this equals initial cpu reset in pop, but we don't switch to ESA */
1749 vcpu->arch.sie_block->gpsw.mask = 0UL;
1750 vcpu->arch.sie_block->gpsw.addr = 0UL;
8d26cf7b 1751 kvm_s390_set_prefix(vcpu, 0);
4287f247 1752 kvm_s390_set_cpu_timer(vcpu, 0);
b0c632db
HC
1753 vcpu->arch.sie_block->ckc = 0UL;
1754 vcpu->arch.sie_block->todpr = 0;
1755 memset(vcpu->arch.sie_block->gcr, 0, 16 * sizeof(__u64));
1756 vcpu->arch.sie_block->gcr[0] = 0xE0UL;
1757 vcpu->arch.sie_block->gcr[14] = 0xC2000000UL;
9abc2a08
DH
1758 /* make sure the new fpc will be lazily loaded */
1759 save_fpu_regs();
1760 current->thread.fpu.fpc = 0;
b0c632db 1761 vcpu->arch.sie_block->gbea = 1;
672550fb 1762 vcpu->arch.sie_block->pp = 0;
3c038e6b
DD
1763 vcpu->arch.pfault_token = KVM_S390_PFAULT_TOKEN_INVALID;
1764 kvm_clear_async_pf_completion_queue(vcpu);
6352e4d2
DH
1765 if (!kvm_s390_user_cpu_state_ctrl(vcpu->kvm))
1766 kvm_s390_vcpu_stop(vcpu);
2ed10cc1 1767 kvm_s390_clear_local_irqs(vcpu);
b0c632db
HC
1768}
1769
31928aa5 1770void kvm_arch_vcpu_postcreate(struct kvm_vcpu *vcpu)
42897d86 1771{
72f25020 1772 mutex_lock(&vcpu->kvm->lock);
fdf03650 1773 preempt_disable();
72f25020 1774 vcpu->arch.sie_block->epoch = vcpu->kvm->arch.epoch;
fdf03650 1775 preempt_enable();
72f25020 1776 mutex_unlock(&vcpu->kvm->lock);
25508824 1777 if (!kvm_is_ucontrol(vcpu->kvm)) {
dafd032a 1778 vcpu->arch.gmap = vcpu->kvm->arch.gmap;
eaa78f34 1779 sca_add_vcpu(vcpu);
25508824
DH
1780 }
1781
42897d86
MT
1782}
1783
5102ee87
TK
1784static void kvm_s390_vcpu_crypto_setup(struct kvm_vcpu *vcpu)
1785{
9d8d5786 1786 if (!test_kvm_facility(vcpu->kvm, 76))
5102ee87
TK
1787 return;
1788
a374e892
TK
1789 vcpu->arch.sie_block->ecb3 &= ~(ECB3_AES | ECB3_DEA);
1790
1791 if (vcpu->kvm->arch.crypto.aes_kw)
1792 vcpu->arch.sie_block->ecb3 |= ECB3_AES;
1793 if (vcpu->kvm->arch.crypto.dea_kw)
1794 vcpu->arch.sie_block->ecb3 |= ECB3_DEA;
1795
5102ee87
TK
1796 vcpu->arch.sie_block->crycbd = vcpu->kvm->arch.crypto.crycbd;
1797}
1798
b31605c1
DD
1799void kvm_s390_vcpu_unsetup_cmma(struct kvm_vcpu *vcpu)
1800{
1801 free_page(vcpu->arch.sie_block->cbrlo);
1802 vcpu->arch.sie_block->cbrlo = 0;
1803}
1804
1805int kvm_s390_vcpu_setup_cmma(struct kvm_vcpu *vcpu)
1806{
1807 vcpu->arch.sie_block->cbrlo = get_zeroed_page(GFP_KERNEL);
1808 if (!vcpu->arch.sie_block->cbrlo)
1809 return -ENOMEM;
1810
1811 vcpu->arch.sie_block->ecb2 |= 0x80;
1812 vcpu->arch.sie_block->ecb2 &= ~0x08;
1813 return 0;
1814}
1815
91520f1a
MM
1816static void kvm_s390_vcpu_setup_model(struct kvm_vcpu *vcpu)
1817{
1818 struct kvm_s390_cpu_model *model = &vcpu->kvm->arch.model;
1819
91520f1a 1820 vcpu->arch.sie_block->ibc = model->ibc;
80bc79dc 1821 if (test_kvm_facility(vcpu->kvm, 7))
c54f0d6a 1822 vcpu->arch.sie_block->fac = (u32)(u64) model->fac_list;
91520f1a
MM
1823}
1824
b0c632db
HC
1825int kvm_arch_vcpu_setup(struct kvm_vcpu *vcpu)
1826{
b31605c1 1827 int rc = 0;
b31288fa 1828
9e6dabef
CH
1829 atomic_set(&vcpu->arch.sie_block->cpuflags, CPUSTAT_ZARCH |
1830 CPUSTAT_SM |
a4a4f191
GH
1831 CPUSTAT_STOPPED);
1832
53df84f8 1833 if (test_kvm_facility(vcpu->kvm, 78))
805de8f4 1834 atomic_or(CPUSTAT_GED2, &vcpu->arch.sie_block->cpuflags);
53df84f8 1835 else if (test_kvm_facility(vcpu->kvm, 8))
805de8f4 1836 atomic_or(CPUSTAT_GED, &vcpu->arch.sie_block->cpuflags);
a4a4f191 1837
91520f1a
MM
1838 kvm_s390_vcpu_setup_model(vcpu);
1839
bd50e8ec
DH
1840 vcpu->arch.sie_block->ecb = 0x02;
1841 if (test_kvm_facility(vcpu->kvm, 9))
1842 vcpu->arch.sie_block->ecb |= 0x04;
9d8d5786 1843 if (test_kvm_facility(vcpu->kvm, 50) && test_kvm_facility(vcpu->kvm, 73))
7feb6bb8
MM
1844 vcpu->arch.sie_block->ecb |= 0x10;
1845
d6af0b49
DH
1846 if (test_kvm_facility(vcpu->kvm, 8))
1847 vcpu->arch.sie_block->ecb2 |= 0x08;
ea5f4969 1848 vcpu->arch.sie_block->eca = 0xC1002000U;
37c5f6c8 1849 if (sclp.has_siif)
217a4406 1850 vcpu->arch.sie_block->eca |= 1;
37c5f6c8 1851 if (sclp.has_sigpif)
ea5f4969 1852 vcpu->arch.sie_block->eca |= 0x10000000U;
c6e5f166
FZ
1853 if (test_kvm_facility(vcpu->kvm, 64))
1854 vcpu->arch.sie_block->ecb3 |= 0x01;
18280d8b 1855 if (test_kvm_facility(vcpu->kvm, 129)) {
13211ea7
EF
1856 vcpu->arch.sie_block->eca |= 0x00020000;
1857 vcpu->arch.sie_block->ecd |= 0x20000000;
1858 }
c6e5f166 1859 vcpu->arch.sie_block->riccbd = (unsigned long) &vcpu->run->s.regs.riccb;
492d8642 1860 vcpu->arch.sie_block->ictl |= ICTL_ISKE | ICTL_SSKE | ICTL_RRBE;
95ca2cb5
JF
1861 if (test_kvm_facility(vcpu->kvm, 74))
1862 vcpu->arch.sie_block->ictl |= ICTL_OPEREXC;
5a5e6536 1863
e6db1d61 1864 if (vcpu->kvm->arch.use_cmma) {
b31605c1
DD
1865 rc = kvm_s390_vcpu_setup_cmma(vcpu);
1866 if (rc)
1867 return rc;
b31288fa 1868 }
0ac96caf 1869 hrtimer_init(&vcpu->arch.ckc_timer, CLOCK_MONOTONIC, HRTIMER_MODE_REL);
ca872302 1870 vcpu->arch.ckc_timer.function = kvm_s390_idle_wakeup;
9d8d5786 1871
5102ee87
TK
1872 kvm_s390_vcpu_crypto_setup(vcpu);
1873
b31605c1 1874 return rc;
b0c632db
HC
1875}
1876
1877struct kvm_vcpu *kvm_arch_vcpu_create(struct kvm *kvm,
1878 unsigned int id)
1879{
4d47555a 1880 struct kvm_vcpu *vcpu;
7feb6bb8 1881 struct sie_page *sie_page;
4d47555a
CO
1882 int rc = -EINVAL;
1883
4215825e 1884 if (!kvm_is_ucontrol(kvm) && !sca_can_add_vcpu(kvm, id))
4d47555a
CO
1885 goto out;
1886
1887 rc = -ENOMEM;
b0c632db 1888
b110feaf 1889 vcpu = kmem_cache_zalloc(kvm_vcpu_cache, GFP_KERNEL);
b0c632db 1890 if (!vcpu)
4d47555a 1891 goto out;
b0c632db 1892
7feb6bb8
MM
1893 sie_page = (struct sie_page *) get_zeroed_page(GFP_KERNEL);
1894 if (!sie_page)
b0c632db
HC
1895 goto out_free_cpu;
1896
7feb6bb8
MM
1897 vcpu->arch.sie_block = &sie_page->sie_block;
1898 vcpu->arch.sie_block->itdba = (unsigned long) &sie_page->itdb;
1899
efed1104
DH
1900 /* the real guest size will always be smaller than msl */
1901 vcpu->arch.sie_block->mso = 0;
1902 vcpu->arch.sie_block->msl = sclp.hamax;
1903
b0c632db 1904 vcpu->arch.sie_block->icpua = id;
ba5c1e9b 1905 spin_lock_init(&vcpu->arch.local_int.lock);
ba5c1e9b 1906 vcpu->arch.local_int.float_int = &kvm->arch.float_int;
d0321a24 1907 vcpu->arch.local_int.wq = &vcpu->wq;
5288fbf0 1908 vcpu->arch.local_int.cpuflags = &vcpu->arch.sie_block->cpuflags;
9c23a131 1909 seqcount_init(&vcpu->arch.cputm_seqcount);
ba5c1e9b 1910
b0c632db
HC
1911 rc = kvm_vcpu_init(vcpu, kvm, id);
1912 if (rc)
9abc2a08 1913 goto out_free_sie_block;
8335713a 1914 VM_EVENT(kvm, 3, "create cpu %d at 0x%pK, sie block at 0x%pK", id, vcpu,
b0c632db 1915 vcpu->arch.sie_block);
ade38c31 1916 trace_kvm_s390_create_vcpu(id, vcpu, vcpu->arch.sie_block);
b0c632db 1917
b0c632db 1918 return vcpu;
7b06bf2f
WY
1919out_free_sie_block:
1920 free_page((unsigned long)(vcpu->arch.sie_block));
b0c632db 1921out_free_cpu:
b110feaf 1922 kmem_cache_free(kvm_vcpu_cache, vcpu);
4d47555a 1923out:
b0c632db
HC
1924 return ERR_PTR(rc);
1925}
1926
b0c632db
HC
1927int kvm_arch_vcpu_runnable(struct kvm_vcpu *vcpu)
1928{
9a022067 1929 return kvm_s390_vcpu_has_irq(vcpu, 0);
b0c632db
HC
1930}
1931
27406cd5 1932void kvm_s390_vcpu_block(struct kvm_vcpu *vcpu)
49b99e1e 1933{
805de8f4 1934 atomic_or(PROG_BLOCK_SIE, &vcpu->arch.sie_block->prog20);
61a6df54 1935 exit_sie(vcpu);
49b99e1e
CB
1936}
1937
27406cd5 1938void kvm_s390_vcpu_unblock(struct kvm_vcpu *vcpu)
49b99e1e 1939{
805de8f4 1940 atomic_andnot(PROG_BLOCK_SIE, &vcpu->arch.sie_block->prog20);
49b99e1e
CB
1941}
1942
8e236546
CB
1943static void kvm_s390_vcpu_request(struct kvm_vcpu *vcpu)
1944{
805de8f4 1945 atomic_or(PROG_REQUEST, &vcpu->arch.sie_block->prog20);
61a6df54 1946 exit_sie(vcpu);
8e236546
CB
1947}
1948
1949static void kvm_s390_vcpu_request_handled(struct kvm_vcpu *vcpu)
1950{
9bf9fde2 1951 atomic_andnot(PROG_REQUEST, &vcpu->arch.sie_block->prog20);
8e236546
CB
1952}
1953
49b99e1e
CB
1954/*
1955 * Kick a guest cpu out of SIE and wait until SIE is not running.
1956 * If the CPU is not running (e.g. waiting as idle) the function will
1957 * return immediately. */
1958void exit_sie(struct kvm_vcpu *vcpu)
1959{
805de8f4 1960 atomic_or(CPUSTAT_STOP_INT, &vcpu->arch.sie_block->cpuflags);
49b99e1e
CB
1961 while (vcpu->arch.sie_block->prog0c & PROG_IN_SIE)
1962 cpu_relax();
1963}
1964
8e236546
CB
1965/* Kick a guest cpu out of SIE to process a request synchronously */
1966void kvm_s390_sync_request(int req, struct kvm_vcpu *vcpu)
49b99e1e 1967{
8e236546
CB
1968 kvm_make_request(req, vcpu);
1969 kvm_s390_vcpu_request(vcpu);
49b99e1e
CB
1970}
1971
2c70fe44
CB
1972static void kvm_gmap_notifier(struct gmap *gmap, unsigned long address)
1973{
1974 int i;
1975 struct kvm *kvm = gmap->private;
1976 struct kvm_vcpu *vcpu;
1977
1978 kvm_for_each_vcpu(i, vcpu, kvm) {
1979 /* match against both prefix pages */
fda902cb 1980 if (kvm_s390_get_prefix(vcpu) == (address & ~0x1000UL)) {
2c70fe44 1981 VCPU_EVENT(vcpu, 2, "gmap notifier for %lx", address);
8e236546 1982 kvm_s390_sync_request(KVM_REQ_MMU_RELOAD, vcpu);
2c70fe44
CB
1983 }
1984 }
1985}
1986
b6d33834
CD
1987int kvm_arch_vcpu_should_kick(struct kvm_vcpu *vcpu)
1988{
1989 /* kvm common code refers to this, but never calls it */
1990 BUG();
1991 return 0;
1992}
1993
14eebd91
CO
1994static int kvm_arch_vcpu_ioctl_get_one_reg(struct kvm_vcpu *vcpu,
1995 struct kvm_one_reg *reg)
1996{
1997 int r = -EINVAL;
1998
1999 switch (reg->id) {
29b7c71b
CO
2000 case KVM_REG_S390_TODPR:
2001 r = put_user(vcpu->arch.sie_block->todpr,
2002 (u32 __user *)reg->addr);
2003 break;
2004 case KVM_REG_S390_EPOCHDIFF:
2005 r = put_user(vcpu->arch.sie_block->epoch,
2006 (u64 __user *)reg->addr);
2007 break;
46a6dd1c 2008 case KVM_REG_S390_CPU_TIMER:
4287f247 2009 r = put_user(kvm_s390_get_cpu_timer(vcpu),
46a6dd1c
J
2010 (u64 __user *)reg->addr);
2011 break;
2012 case KVM_REG_S390_CLOCK_COMP:
2013 r = put_user(vcpu->arch.sie_block->ckc,
2014 (u64 __user *)reg->addr);
2015 break;
536336c2
DD
2016 case KVM_REG_S390_PFTOKEN:
2017 r = put_user(vcpu->arch.pfault_token,
2018 (u64 __user *)reg->addr);
2019 break;
2020 case KVM_REG_S390_PFCOMPARE:
2021 r = put_user(vcpu->arch.pfault_compare,
2022 (u64 __user *)reg->addr);
2023 break;
2024 case KVM_REG_S390_PFSELECT:
2025 r = put_user(vcpu->arch.pfault_select,
2026 (u64 __user *)reg->addr);
2027 break;
672550fb
CB
2028 case KVM_REG_S390_PP:
2029 r = put_user(vcpu->arch.sie_block->pp,
2030 (u64 __user *)reg->addr);
2031 break;
afa45ff5
CB
2032 case KVM_REG_S390_GBEA:
2033 r = put_user(vcpu->arch.sie_block->gbea,
2034 (u64 __user *)reg->addr);
2035 break;
14eebd91
CO
2036 default:
2037 break;
2038 }
2039
2040 return r;
2041}
2042
2043static int kvm_arch_vcpu_ioctl_set_one_reg(struct kvm_vcpu *vcpu,
2044 struct kvm_one_reg *reg)
2045{
2046 int r = -EINVAL;
4287f247 2047 __u64 val;
14eebd91
CO
2048
2049 switch (reg->id) {
29b7c71b
CO
2050 case KVM_REG_S390_TODPR:
2051 r = get_user(vcpu->arch.sie_block->todpr,
2052 (u32 __user *)reg->addr);
2053 break;
2054 case KVM_REG_S390_EPOCHDIFF:
2055 r = get_user(vcpu->arch.sie_block->epoch,
2056 (u64 __user *)reg->addr);
2057 break;
46a6dd1c 2058 case KVM_REG_S390_CPU_TIMER:
4287f247
DH
2059 r = get_user(val, (u64 __user *)reg->addr);
2060 if (!r)
2061 kvm_s390_set_cpu_timer(vcpu, val);
46a6dd1c
J
2062 break;
2063 case KVM_REG_S390_CLOCK_COMP:
2064 r = get_user(vcpu->arch.sie_block->ckc,
2065 (u64 __user *)reg->addr);
2066 break;
536336c2
DD
2067 case KVM_REG_S390_PFTOKEN:
2068 r = get_user(vcpu->arch.pfault_token,
2069 (u64 __user *)reg->addr);
9fbd8082
DH
2070 if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID)
2071 kvm_clear_async_pf_completion_queue(vcpu);
536336c2
DD
2072 break;
2073 case KVM_REG_S390_PFCOMPARE:
2074 r = get_user(vcpu->arch.pfault_compare,
2075 (u64 __user *)reg->addr);
2076 break;
2077 case KVM_REG_S390_PFSELECT:
2078 r = get_user(vcpu->arch.pfault_select,
2079 (u64 __user *)reg->addr);
2080 break;
672550fb
CB
2081 case KVM_REG_S390_PP:
2082 r = get_user(vcpu->arch.sie_block->pp,
2083 (u64 __user *)reg->addr);
2084 break;
afa45ff5
CB
2085 case KVM_REG_S390_GBEA:
2086 r = get_user(vcpu->arch.sie_block->gbea,
2087 (u64 __user *)reg->addr);
2088 break;
14eebd91
CO
2089 default:
2090 break;
2091 }
2092
2093 return r;
2094}
b6d33834 2095
b0c632db
HC
2096static int kvm_arch_vcpu_ioctl_initial_reset(struct kvm_vcpu *vcpu)
2097{
b0c632db 2098 kvm_s390_vcpu_initial_reset(vcpu);
b0c632db
HC
2099 return 0;
2100}
2101
2102int kvm_arch_vcpu_ioctl_set_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs)
2103{
5a32c1af 2104 memcpy(&vcpu->run->s.regs.gprs, &regs->gprs, sizeof(regs->gprs));
b0c632db
HC
2105 return 0;
2106}
2107
2108int kvm_arch_vcpu_ioctl_get_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs)
2109{
5a32c1af 2110 memcpy(&regs->gprs, &vcpu->run->s.regs.gprs, sizeof(regs->gprs));
b0c632db
HC
2111 return 0;
2112}
2113
2114int kvm_arch_vcpu_ioctl_set_sregs(struct kvm_vcpu *vcpu,
2115 struct kvm_sregs *sregs)
2116{
59674c1a 2117 memcpy(&vcpu->run->s.regs.acrs, &sregs->acrs, sizeof(sregs->acrs));
b0c632db 2118 memcpy(&vcpu->arch.sie_block->gcr, &sregs->crs, sizeof(sregs->crs));
59674c1a 2119 restore_access_regs(vcpu->run->s.regs.acrs);
b0c632db
HC
2120 return 0;
2121}
2122
2123int kvm_arch_vcpu_ioctl_get_sregs(struct kvm_vcpu *vcpu,
2124 struct kvm_sregs *sregs)
2125{
59674c1a 2126 memcpy(&sregs->acrs, &vcpu->run->s.regs.acrs, sizeof(sregs->acrs));
b0c632db 2127 memcpy(&sregs->crs, &vcpu->arch.sie_block->gcr, sizeof(sregs->crs));
b0c632db
HC
2128 return 0;
2129}
2130
2131int kvm_arch_vcpu_ioctl_set_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu)
2132{
9abc2a08
DH
2133 /* make sure the new values will be lazily loaded */
2134 save_fpu_regs();
4725c860
MS
2135 if (test_fp_ctl(fpu->fpc))
2136 return -EINVAL;
9abc2a08
DH
2137 current->thread.fpu.fpc = fpu->fpc;
2138 if (MACHINE_HAS_VX)
2139 convert_fp_to_vx(current->thread.fpu.vxrs, (freg_t *)fpu->fprs);
2140 else
2141 memcpy(current->thread.fpu.fprs, &fpu->fprs, sizeof(fpu->fprs));
b0c632db
HC
2142 return 0;
2143}
2144
2145int kvm_arch_vcpu_ioctl_get_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu)
2146{
9abc2a08
DH
2147 /* make sure we have the latest values */
2148 save_fpu_regs();
2149 if (MACHINE_HAS_VX)
2150 convert_vx_to_fp((freg_t *)fpu->fprs, current->thread.fpu.vxrs);
2151 else
2152 memcpy(fpu->fprs, current->thread.fpu.fprs, sizeof(fpu->fprs));
2153 fpu->fpc = current->thread.fpu.fpc;
b0c632db
HC
2154 return 0;
2155}
2156
2157static int kvm_arch_vcpu_ioctl_set_initial_psw(struct kvm_vcpu *vcpu, psw_t psw)
2158{
2159 int rc = 0;
2160
7a42fdc2 2161 if (!is_vcpu_stopped(vcpu))
b0c632db 2162 rc = -EBUSY;
d7b0b5eb
CO
2163 else {
2164 vcpu->run->psw_mask = psw.mask;
2165 vcpu->run->psw_addr = psw.addr;
2166 }
b0c632db
HC
2167 return rc;
2168}
2169
2170int kvm_arch_vcpu_ioctl_translate(struct kvm_vcpu *vcpu,
2171 struct kvm_translation *tr)
2172{
2173 return -EINVAL; /* not implemented yet */
2174}
2175
27291e21
DH
2176#define VALID_GUESTDBG_FLAGS (KVM_GUESTDBG_SINGLESTEP | \
2177 KVM_GUESTDBG_USE_HW_BP | \
2178 KVM_GUESTDBG_ENABLE)
2179
d0bfb940
JK
2180int kvm_arch_vcpu_ioctl_set_guest_debug(struct kvm_vcpu *vcpu,
2181 struct kvm_guest_debug *dbg)
b0c632db 2182{
27291e21
DH
2183 int rc = 0;
2184
2185 vcpu->guest_debug = 0;
2186 kvm_s390_clear_bp_data(vcpu);
2187
2de3bfc2 2188 if (dbg->control & ~VALID_GUESTDBG_FLAGS)
27291e21 2189 return -EINVAL;
89b5b4de
DH
2190 if (!sclp.has_gpere)
2191 return -EINVAL;
27291e21
DH
2192
2193 if (dbg->control & KVM_GUESTDBG_ENABLE) {
2194 vcpu->guest_debug = dbg->control;
2195 /* enforce guest PER */
805de8f4 2196 atomic_or(CPUSTAT_P, &vcpu->arch.sie_block->cpuflags);
27291e21
DH
2197
2198 if (dbg->control & KVM_GUESTDBG_USE_HW_BP)
2199 rc = kvm_s390_import_bp_data(vcpu, dbg);
2200 } else {
805de8f4 2201 atomic_andnot(CPUSTAT_P, &vcpu->arch.sie_block->cpuflags);
27291e21
DH
2202 vcpu->arch.guestdbg.last_bp = 0;
2203 }
2204
2205 if (rc) {
2206 vcpu->guest_debug = 0;
2207 kvm_s390_clear_bp_data(vcpu);
805de8f4 2208 atomic_andnot(CPUSTAT_P, &vcpu->arch.sie_block->cpuflags);
27291e21
DH
2209 }
2210
2211 return rc;
b0c632db
HC
2212}
2213
62d9f0db
MT
2214int kvm_arch_vcpu_ioctl_get_mpstate(struct kvm_vcpu *vcpu,
2215 struct kvm_mp_state *mp_state)
2216{
6352e4d2
DH
2217 /* CHECK_STOP and LOAD are not supported yet */
2218 return is_vcpu_stopped(vcpu) ? KVM_MP_STATE_STOPPED :
2219 KVM_MP_STATE_OPERATING;
62d9f0db
MT
2220}
2221
2222int kvm_arch_vcpu_ioctl_set_mpstate(struct kvm_vcpu *vcpu,
2223 struct kvm_mp_state *mp_state)
2224{
6352e4d2
DH
2225 int rc = 0;
2226
2227 /* user space knows about this interface - let it control the state */
2228 vcpu->kvm->arch.user_cpu_state_ctrl = 1;
2229
2230 switch (mp_state->mp_state) {
2231 case KVM_MP_STATE_STOPPED:
2232 kvm_s390_vcpu_stop(vcpu);
2233 break;
2234 case KVM_MP_STATE_OPERATING:
2235 kvm_s390_vcpu_start(vcpu);
2236 break;
2237 case KVM_MP_STATE_LOAD:
2238 case KVM_MP_STATE_CHECK_STOP:
2239 /* fall through - CHECK_STOP and LOAD are not supported yet */
2240 default:
2241 rc = -ENXIO;
2242 }
2243
2244 return rc;
62d9f0db
MT
2245}
2246
8ad35755
DH
2247static bool ibs_enabled(struct kvm_vcpu *vcpu)
2248{
2249 return atomic_read(&vcpu->arch.sie_block->cpuflags) & CPUSTAT_IBS;
2250}
2251
2c70fe44
CB
2252static int kvm_s390_handle_requests(struct kvm_vcpu *vcpu)
2253{
8ad35755 2254retry:
8e236546 2255 kvm_s390_vcpu_request_handled(vcpu);
586b7ccd
CB
2256 if (!vcpu->requests)
2257 return 0;
2c70fe44
CB
2258 /*
2259 * We use MMU_RELOAD just to re-arm the ipte notifier for the
2260 * guest prefix page. gmap_ipte_notify will wait on the ptl lock.
2261 * This ensures that the ipte instruction for this request has
2262 * already finished. We might race against a second unmapper that
2263 * wants to set the blocking bit. Lets just retry the request loop.
2264 */
8ad35755 2265 if (kvm_check_request(KVM_REQ_MMU_RELOAD, vcpu)) {
2c70fe44
CB
2266 int rc;
2267 rc = gmap_ipte_notify(vcpu->arch.gmap,
fda902cb 2268 kvm_s390_get_prefix(vcpu),
2c70fe44
CB
2269 PAGE_SIZE * 2);
2270 if (rc)
2271 return rc;
8ad35755 2272 goto retry;
2c70fe44 2273 }
8ad35755 2274
d3d692c8
DH
2275 if (kvm_check_request(KVM_REQ_TLB_FLUSH, vcpu)) {
2276 vcpu->arch.sie_block->ihcpu = 0xffff;
2277 goto retry;
2278 }
2279
8ad35755
DH
2280 if (kvm_check_request(KVM_REQ_ENABLE_IBS, vcpu)) {
2281 if (!ibs_enabled(vcpu)) {
2282 trace_kvm_s390_enable_disable_ibs(vcpu->vcpu_id, 1);
805de8f4 2283 atomic_or(CPUSTAT_IBS,
8ad35755
DH
2284 &vcpu->arch.sie_block->cpuflags);
2285 }
2286 goto retry;
2c70fe44 2287 }
8ad35755
DH
2288
2289 if (kvm_check_request(KVM_REQ_DISABLE_IBS, vcpu)) {
2290 if (ibs_enabled(vcpu)) {
2291 trace_kvm_s390_enable_disable_ibs(vcpu->vcpu_id, 0);
805de8f4 2292 atomic_andnot(CPUSTAT_IBS,
8ad35755
DH
2293 &vcpu->arch.sie_block->cpuflags);
2294 }
2295 goto retry;
2296 }
2297
0759d068
DH
2298 /* nothing to do, just clear the request */
2299 clear_bit(KVM_REQ_UNHALT, &vcpu->requests);
2300
2c70fe44
CB
2301 return 0;
2302}
2303
25ed1675
DH
2304void kvm_s390_set_tod_clock(struct kvm *kvm, u64 tod)
2305{
2306 struct kvm_vcpu *vcpu;
2307 int i;
2308
2309 mutex_lock(&kvm->lock);
2310 preempt_disable();
2311 kvm->arch.epoch = tod - get_tod_clock();
2312 kvm_s390_vcpu_block_all(kvm);
2313 kvm_for_each_vcpu(i, vcpu, kvm)
2314 vcpu->arch.sie_block->epoch = kvm->arch.epoch;
2315 kvm_s390_vcpu_unblock_all(kvm);
2316 preempt_enable();
2317 mutex_unlock(&kvm->lock);
2318}
2319
fa576c58
TH
2320/**
2321 * kvm_arch_fault_in_page - fault-in guest page if necessary
2322 * @vcpu: The corresponding virtual cpu
2323 * @gpa: Guest physical address
2324 * @writable: Whether the page should be writable or not
2325 *
2326 * Make sure that a guest page has been faulted-in on the host.
2327 *
2328 * Return: Zero on success, negative error code otherwise.
2329 */
2330long kvm_arch_fault_in_page(struct kvm_vcpu *vcpu, gpa_t gpa, int writable)
24eb3a82 2331{
527e30b4
MS
2332 return gmap_fault(vcpu->arch.gmap, gpa,
2333 writable ? FAULT_FLAG_WRITE : 0);
24eb3a82
DD
2334}
2335
3c038e6b
DD
2336static void __kvm_inject_pfault_token(struct kvm_vcpu *vcpu, bool start_token,
2337 unsigned long token)
2338{
2339 struct kvm_s390_interrupt inti;
383d0b05 2340 struct kvm_s390_irq irq;
3c038e6b
DD
2341
2342 if (start_token) {
383d0b05
JF
2343 irq.u.ext.ext_params2 = token;
2344 irq.type = KVM_S390_INT_PFAULT_INIT;
2345 WARN_ON_ONCE(kvm_s390_inject_vcpu(vcpu, &irq));
3c038e6b
DD
2346 } else {
2347 inti.type = KVM_S390_INT_PFAULT_DONE;
383d0b05 2348 inti.parm64 = token;
3c038e6b
DD
2349 WARN_ON_ONCE(kvm_s390_inject_vm(vcpu->kvm, &inti));
2350 }
2351}
2352
2353void kvm_arch_async_page_not_present(struct kvm_vcpu *vcpu,
2354 struct kvm_async_pf *work)
2355{
2356 trace_kvm_s390_pfault_init(vcpu, work->arch.pfault_token);
2357 __kvm_inject_pfault_token(vcpu, true, work->arch.pfault_token);
2358}
2359
2360void kvm_arch_async_page_present(struct kvm_vcpu *vcpu,
2361 struct kvm_async_pf *work)
2362{
2363 trace_kvm_s390_pfault_done(vcpu, work->arch.pfault_token);
2364 __kvm_inject_pfault_token(vcpu, false, work->arch.pfault_token);
2365}
2366
2367void kvm_arch_async_page_ready(struct kvm_vcpu *vcpu,
2368 struct kvm_async_pf *work)
2369{
2370 /* s390 will always inject the page directly */
2371}
2372
2373bool kvm_arch_can_inject_async_page_present(struct kvm_vcpu *vcpu)
2374{
2375 /*
2376 * s390 will always inject the page directly,
2377 * but we still want check_async_completion to cleanup
2378 */
2379 return true;
2380}
2381
2382static int kvm_arch_setup_async_pf(struct kvm_vcpu *vcpu)
2383{
2384 hva_t hva;
2385 struct kvm_arch_async_pf arch;
2386 int rc;
2387
2388 if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID)
2389 return 0;
2390 if ((vcpu->arch.sie_block->gpsw.mask & vcpu->arch.pfault_select) !=
2391 vcpu->arch.pfault_compare)
2392 return 0;
2393 if (psw_extint_disabled(vcpu))
2394 return 0;
9a022067 2395 if (kvm_s390_vcpu_has_irq(vcpu, 0))
3c038e6b
DD
2396 return 0;
2397 if (!(vcpu->arch.sie_block->gcr[0] & 0x200ul))
2398 return 0;
2399 if (!vcpu->arch.gmap->pfault_enabled)
2400 return 0;
2401
81480cc1
HC
2402 hva = gfn_to_hva(vcpu->kvm, gpa_to_gfn(current->thread.gmap_addr));
2403 hva += current->thread.gmap_addr & ~PAGE_MASK;
2404 if (read_guest_real(vcpu, vcpu->arch.pfault_token, &arch.pfault_token, 8))
3c038e6b
DD
2405 return 0;
2406
2407 rc = kvm_setup_async_pf(vcpu, current->thread.gmap_addr, hva, &arch);
2408 return rc;
2409}
2410
3fb4c40f 2411static int vcpu_pre_run(struct kvm_vcpu *vcpu)
b0c632db 2412{
3fb4c40f 2413 int rc, cpuflags;
e168bf8d 2414
3c038e6b
DD
2415 /*
2416 * On s390 notifications for arriving pages will be delivered directly
2417 * to the guest but the house keeping for completed pfaults is
2418 * handled outside the worker.
2419 */
2420 kvm_check_async_pf_completion(vcpu);
2421
7ec7c8c7
CB
2422 vcpu->arch.sie_block->gg14 = vcpu->run->s.regs.gprs[14];
2423 vcpu->arch.sie_block->gg15 = vcpu->run->s.regs.gprs[15];
b0c632db
HC
2424
2425 if (need_resched())
2426 schedule();
2427
d3a73acb 2428 if (test_cpu_flag(CIF_MCCK_PENDING))
71cde587
CB
2429 s390_handle_mcck();
2430
79395031
JF
2431 if (!kvm_is_ucontrol(vcpu->kvm)) {
2432 rc = kvm_s390_deliver_pending_interrupts(vcpu);
2433 if (rc)
2434 return rc;
2435 }
0ff31867 2436
2c70fe44
CB
2437 rc = kvm_s390_handle_requests(vcpu);
2438 if (rc)
2439 return rc;
2440
27291e21
DH
2441 if (guestdbg_enabled(vcpu)) {
2442 kvm_s390_backup_guest_per_regs(vcpu);
2443 kvm_s390_patch_guest_per_regs(vcpu);
2444 }
2445
b0c632db 2446 vcpu->arch.sie_block->icptcode = 0;
3fb4c40f
TH
2447 cpuflags = atomic_read(&vcpu->arch.sie_block->cpuflags);
2448 VCPU_EVENT(vcpu, 6, "entering sie flags %x", cpuflags);
2449 trace_kvm_s390_sie_enter(vcpu, cpuflags);
2b29a9fd 2450
3fb4c40f
TH
2451 return 0;
2452}
2453
492d8642
TH
2454static int vcpu_post_run_fault_in_sie(struct kvm_vcpu *vcpu)
2455{
56317920
DH
2456 struct kvm_s390_pgm_info pgm_info = {
2457 .code = PGM_ADDRESSING,
2458 };
2459 u8 opcode, ilen;
492d8642
TH
2460 int rc;
2461
2462 VCPU_EVENT(vcpu, 3, "%s", "fault in sie instruction");
2463 trace_kvm_s390_sie_fault(vcpu);
2464
2465 /*
2466 * We want to inject an addressing exception, which is defined as a
2467 * suppressing or terminating exception. However, since we came here
2468 * by a DAT access exception, the PSW still points to the faulting
2469 * instruction since DAT exceptions are nullifying. So we've got
2470 * to look up the current opcode to get the length of the instruction
2471 * to be able to forward the PSW.
2472 */
65977322 2473 rc = read_guest_instr(vcpu, &opcode, 1);
56317920 2474 ilen = insn_length(opcode);
9b0d721a
DH
2475 if (rc < 0) {
2476 return rc;
2477 } else if (rc) {
2478 /* Instruction-Fetching Exceptions - we can't detect the ilen.
2479 * Forward by arbitrary ilc, injection will take care of
2480 * nullification if necessary.
2481 */
2482 pgm_info = vcpu->arch.pgm;
2483 ilen = 4;
2484 }
56317920
DH
2485 pgm_info.flags = ilen | KVM_S390_PGM_FLAGS_ILC_VALID;
2486 kvm_s390_forward_psw(vcpu, ilen);
2487 return kvm_s390_inject_prog_irq(vcpu, &pgm_info);
492d8642
TH
2488}
2489
3fb4c40f
TH
2490static int vcpu_post_run(struct kvm_vcpu *vcpu, int exit_reason)
2491{
2b29a9fd
DD
2492 VCPU_EVENT(vcpu, 6, "exit sie icptcode %d",
2493 vcpu->arch.sie_block->icptcode);
2494 trace_kvm_s390_sie_exit(vcpu, vcpu->arch.sie_block->icptcode);
2495
27291e21
DH
2496 if (guestdbg_enabled(vcpu))
2497 kvm_s390_restore_guest_per_regs(vcpu);
2498
7ec7c8c7
CB
2499 vcpu->run->s.regs.gprs[14] = vcpu->arch.sie_block->gg14;
2500 vcpu->run->s.regs.gprs[15] = vcpu->arch.sie_block->gg15;
71f116bf
DH
2501
2502 if (vcpu->arch.sie_block->icptcode > 0) {
2503 int rc = kvm_handle_sie_intercept(vcpu);
2504
2505 if (rc != -EOPNOTSUPP)
2506 return rc;
2507 vcpu->run->exit_reason = KVM_EXIT_S390_SIEIC;
2508 vcpu->run->s390_sieic.icptcode = vcpu->arch.sie_block->icptcode;
2509 vcpu->run->s390_sieic.ipa = vcpu->arch.sie_block->ipa;
2510 vcpu->run->s390_sieic.ipb = vcpu->arch.sie_block->ipb;
2511 return -EREMOTE;
2512 } else if (exit_reason != -EFAULT) {
2513 vcpu->stat.exit_null++;
2514 return 0;
210b1607
TH
2515 } else if (kvm_is_ucontrol(vcpu->kvm)) {
2516 vcpu->run->exit_reason = KVM_EXIT_S390_UCONTROL;
2517 vcpu->run->s390_ucontrol.trans_exc_code =
2518 current->thread.gmap_addr;
2519 vcpu->run->s390_ucontrol.pgm_code = 0x10;
71f116bf 2520 return -EREMOTE;
24eb3a82 2521 } else if (current->thread.gmap_pfault) {
3c038e6b 2522 trace_kvm_s390_major_guest_pfault(vcpu);
24eb3a82 2523 current->thread.gmap_pfault = 0;
71f116bf
DH
2524 if (kvm_arch_setup_async_pf(vcpu))
2525 return 0;
2526 return kvm_arch_fault_in_page(vcpu, current->thread.gmap_addr, 1);
a76ccff6 2527 }
71f116bf 2528 return vcpu_post_run_fault_in_sie(vcpu);
3fb4c40f
TH
2529}
2530
2531static int __vcpu_run(struct kvm_vcpu *vcpu)
2532{
2533 int rc, exit_reason;
2534
800c1065
TH
2535 /*
2536 * We try to hold kvm->srcu during most of vcpu_run (except when run-
2537 * ning the guest), so that memslots (and other stuff) are protected
2538 */
2539 vcpu->srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
2540
a76ccff6
TH
2541 do {
2542 rc = vcpu_pre_run(vcpu);
2543 if (rc)
2544 break;
3fb4c40f 2545
800c1065 2546 srcu_read_unlock(&vcpu->kvm->srcu, vcpu->srcu_idx);
a76ccff6
TH
2547 /*
2548 * As PF_VCPU will be used in fault handler, between
2549 * guest_enter and guest_exit should be no uaccess.
2550 */
0097d12e
CB
2551 local_irq_disable();
2552 __kvm_guest_enter();
db0758b2 2553 __disable_cpu_timer_accounting(vcpu);
0097d12e 2554 local_irq_enable();
a76ccff6
TH
2555 exit_reason = sie64a(vcpu->arch.sie_block,
2556 vcpu->run->s.regs.gprs);
0097d12e 2557 local_irq_disable();
db0758b2 2558 __enable_cpu_timer_accounting(vcpu);
0097d12e
CB
2559 __kvm_guest_exit();
2560 local_irq_enable();
800c1065 2561 vcpu->srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
a76ccff6
TH
2562
2563 rc = vcpu_post_run(vcpu, exit_reason);
27291e21 2564 } while (!signal_pending(current) && !guestdbg_exit_pending(vcpu) && !rc);
3fb4c40f 2565
800c1065 2566 srcu_read_unlock(&vcpu->kvm->srcu, vcpu->srcu_idx);
e168bf8d 2567 return rc;
b0c632db
HC
2568}
2569
b028ee3e
DH
2570static void sync_regs(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
2571{
2572 vcpu->arch.sie_block->gpsw.mask = kvm_run->psw_mask;
2573 vcpu->arch.sie_block->gpsw.addr = kvm_run->psw_addr;
2574 if (kvm_run->kvm_dirty_regs & KVM_SYNC_PREFIX)
2575 kvm_s390_set_prefix(vcpu, kvm_run->s.regs.prefix);
2576 if (kvm_run->kvm_dirty_regs & KVM_SYNC_CRS) {
2577 memcpy(&vcpu->arch.sie_block->gcr, &kvm_run->s.regs.crs, 128);
d3d692c8
DH
2578 /* some control register changes require a tlb flush */
2579 kvm_make_request(KVM_REQ_TLB_FLUSH, vcpu);
b028ee3e
DH
2580 }
2581 if (kvm_run->kvm_dirty_regs & KVM_SYNC_ARCH0) {
4287f247 2582 kvm_s390_set_cpu_timer(vcpu, kvm_run->s.regs.cputm);
b028ee3e
DH
2583 vcpu->arch.sie_block->ckc = kvm_run->s.regs.ckc;
2584 vcpu->arch.sie_block->todpr = kvm_run->s.regs.todpr;
2585 vcpu->arch.sie_block->pp = kvm_run->s.regs.pp;
2586 vcpu->arch.sie_block->gbea = kvm_run->s.regs.gbea;
2587 }
2588 if (kvm_run->kvm_dirty_regs & KVM_SYNC_PFAULT) {
2589 vcpu->arch.pfault_token = kvm_run->s.regs.pft;
2590 vcpu->arch.pfault_select = kvm_run->s.regs.pfs;
2591 vcpu->arch.pfault_compare = kvm_run->s.regs.pfc;
9fbd8082
DH
2592 if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID)
2593 kvm_clear_async_pf_completion_queue(vcpu);
b028ee3e
DH
2594 }
2595 kvm_run->kvm_dirty_regs = 0;
2596}
2597
2598static void store_regs(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
2599{
2600 kvm_run->psw_mask = vcpu->arch.sie_block->gpsw.mask;
2601 kvm_run->psw_addr = vcpu->arch.sie_block->gpsw.addr;
2602 kvm_run->s.regs.prefix = kvm_s390_get_prefix(vcpu);
2603 memcpy(&kvm_run->s.regs.crs, &vcpu->arch.sie_block->gcr, 128);
4287f247 2604 kvm_run->s.regs.cputm = kvm_s390_get_cpu_timer(vcpu);
b028ee3e
DH
2605 kvm_run->s.regs.ckc = vcpu->arch.sie_block->ckc;
2606 kvm_run->s.regs.todpr = vcpu->arch.sie_block->todpr;
2607 kvm_run->s.regs.pp = vcpu->arch.sie_block->pp;
2608 kvm_run->s.regs.gbea = vcpu->arch.sie_block->gbea;
2609 kvm_run->s.regs.pft = vcpu->arch.pfault_token;
2610 kvm_run->s.regs.pfs = vcpu->arch.pfault_select;
2611 kvm_run->s.regs.pfc = vcpu->arch.pfault_compare;
2612}
2613
b0c632db
HC
2614int kvm_arch_vcpu_ioctl_run(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
2615{
8f2abe6a 2616 int rc;
b0c632db
HC
2617 sigset_t sigsaved;
2618
27291e21
DH
2619 if (guestdbg_exit_pending(vcpu)) {
2620 kvm_s390_prepare_debug_exit(vcpu);
2621 return 0;
2622 }
2623
b0c632db
HC
2624 if (vcpu->sigset_active)
2625 sigprocmask(SIG_SETMASK, &vcpu->sigset, &sigsaved);
2626
6352e4d2
DH
2627 if (!kvm_s390_user_cpu_state_ctrl(vcpu->kvm)) {
2628 kvm_s390_vcpu_start(vcpu);
2629 } else if (is_vcpu_stopped(vcpu)) {
ea2cdd27 2630 pr_err_ratelimited("can't run stopped vcpu %d\n",
6352e4d2
DH
2631 vcpu->vcpu_id);
2632 return -EINVAL;
2633 }
b0c632db 2634
b028ee3e 2635 sync_regs(vcpu, kvm_run);
db0758b2 2636 enable_cpu_timer_accounting(vcpu);
d7b0b5eb 2637
dab4079d 2638 might_fault();
a76ccff6 2639 rc = __vcpu_run(vcpu);
9ace903d 2640
b1d16c49
CE
2641 if (signal_pending(current) && !rc) {
2642 kvm_run->exit_reason = KVM_EXIT_INTR;
8f2abe6a 2643 rc = -EINTR;
b1d16c49 2644 }
8f2abe6a 2645
27291e21
DH
2646 if (guestdbg_exit_pending(vcpu) && !rc) {
2647 kvm_s390_prepare_debug_exit(vcpu);
2648 rc = 0;
2649 }
2650
8f2abe6a 2651 if (rc == -EREMOTE) {
71f116bf 2652 /* userspace support is needed, kvm_run has been prepared */
8f2abe6a
CB
2653 rc = 0;
2654 }
b0c632db 2655
db0758b2 2656 disable_cpu_timer_accounting(vcpu);
b028ee3e 2657 store_regs(vcpu, kvm_run);
d7b0b5eb 2658
b0c632db
HC
2659 if (vcpu->sigset_active)
2660 sigprocmask(SIG_SETMASK, &sigsaved, NULL);
2661
b0c632db 2662 vcpu->stat.exit_userspace++;
7e8e6ab4 2663 return rc;
b0c632db
HC
2664}
2665
b0c632db
HC
2666/*
2667 * store status at address
2668 * we use have two special cases:
2669 * KVM_S390_STORE_STATUS_NOADDR: -> 0x1200 on 64 bit
2670 * KVM_S390_STORE_STATUS_PREFIXED: -> prefix
2671 */
d0bce605 2672int kvm_s390_store_status_unloaded(struct kvm_vcpu *vcpu, unsigned long gpa)
b0c632db 2673{
092670cd 2674 unsigned char archmode = 1;
9abc2a08 2675 freg_t fprs[NUM_FPRS];
fda902cb 2676 unsigned int px;
4287f247 2677 u64 clkcomp, cputm;
d0bce605 2678 int rc;
b0c632db 2679
d9a3a09a 2680 px = kvm_s390_get_prefix(vcpu);
d0bce605
HC
2681 if (gpa == KVM_S390_STORE_STATUS_NOADDR) {
2682 if (write_guest_abs(vcpu, 163, &archmode, 1))
b0c632db 2683 return -EFAULT;
d9a3a09a 2684 gpa = 0;
d0bce605
HC
2685 } else if (gpa == KVM_S390_STORE_STATUS_PREFIXED) {
2686 if (write_guest_real(vcpu, 163, &archmode, 1))
b0c632db 2687 return -EFAULT;
d9a3a09a
MS
2688 gpa = px;
2689 } else
2690 gpa -= __LC_FPREGS_SAVE_AREA;
9abc2a08
DH
2691
2692 /* manually convert vector registers if necessary */
2693 if (MACHINE_HAS_VX) {
9522b37f 2694 convert_vx_to_fp(fprs, (__vector128 *) vcpu->run->s.regs.vrs);
9abc2a08
DH
2695 rc = write_guest_abs(vcpu, gpa + __LC_FPREGS_SAVE_AREA,
2696 fprs, 128);
2697 } else {
2698 rc = write_guest_abs(vcpu, gpa + __LC_FPREGS_SAVE_AREA,
6fd8e67d 2699 vcpu->run->s.regs.fprs, 128);
9abc2a08 2700 }
d9a3a09a 2701 rc |= write_guest_abs(vcpu, gpa + __LC_GPREGS_SAVE_AREA,
d0bce605 2702 vcpu->run->s.regs.gprs, 128);
d9a3a09a 2703 rc |= write_guest_abs(vcpu, gpa + __LC_PSW_SAVE_AREA,
d0bce605 2704 &vcpu->arch.sie_block->gpsw, 16);
d9a3a09a 2705 rc |= write_guest_abs(vcpu, gpa + __LC_PREFIX_SAVE_AREA,
fda902cb 2706 &px, 4);
d9a3a09a 2707 rc |= write_guest_abs(vcpu, gpa + __LC_FP_CREG_SAVE_AREA,
9abc2a08 2708 &vcpu->run->s.regs.fpc, 4);
d9a3a09a 2709 rc |= write_guest_abs(vcpu, gpa + __LC_TOD_PROGREG_SAVE_AREA,
d0bce605 2710 &vcpu->arch.sie_block->todpr, 4);
4287f247 2711 cputm = kvm_s390_get_cpu_timer(vcpu);
d9a3a09a 2712 rc |= write_guest_abs(vcpu, gpa + __LC_CPU_TIMER_SAVE_AREA,
4287f247 2713 &cputm, 8);
178bd789 2714 clkcomp = vcpu->arch.sie_block->ckc >> 8;
d9a3a09a 2715 rc |= write_guest_abs(vcpu, gpa + __LC_CLOCK_COMP_SAVE_AREA,
d0bce605 2716 &clkcomp, 8);
d9a3a09a 2717 rc |= write_guest_abs(vcpu, gpa + __LC_AREGS_SAVE_AREA,
d0bce605 2718 &vcpu->run->s.regs.acrs, 64);
d9a3a09a 2719 rc |= write_guest_abs(vcpu, gpa + __LC_CREGS_SAVE_AREA,
d0bce605
HC
2720 &vcpu->arch.sie_block->gcr, 128);
2721 return rc ? -EFAULT : 0;
b0c632db
HC
2722}
2723
e879892c
TH
2724int kvm_s390_vcpu_store_status(struct kvm_vcpu *vcpu, unsigned long addr)
2725{
2726 /*
2727 * The guest FPRS and ACRS are in the host FPRS/ACRS due to the lazy
2728 * copying in vcpu load/put. Lets update our copies before we save
2729 * it into the save area
2730 */
d0164ee2 2731 save_fpu_regs();
9abc2a08 2732 vcpu->run->s.regs.fpc = current->thread.fpu.fpc;
e879892c
TH
2733 save_access_regs(vcpu->run->s.regs.acrs);
2734
2735 return kvm_s390_store_status_unloaded(vcpu, addr);
2736}
2737
bc17de7c
EF
2738/*
2739 * store additional status at address
2740 */
2741int kvm_s390_store_adtl_status_unloaded(struct kvm_vcpu *vcpu,
2742 unsigned long gpa)
2743{
2744 /* Only bits 0-53 are used for address formation */
2745 if (!(gpa & ~0x3ff))
2746 return 0;
2747
2748 return write_guest_abs(vcpu, gpa & ~0x3ff,
2749 (void *)&vcpu->run->s.regs.vrs, 512);
2750}
2751
2752int kvm_s390_vcpu_store_adtl_status(struct kvm_vcpu *vcpu, unsigned long addr)
2753{
2754 if (!test_kvm_facility(vcpu->kvm, 129))
2755 return 0;
2756
2757 /*
2758 * The guest VXRS are in the host VXRs due to the lazy
9977e886
HB
2759 * copying in vcpu load/put. We can simply call save_fpu_regs()
2760 * to save the current register state because we are in the
2761 * middle of a load/put cycle.
2762 *
2763 * Let's update our copies before we save it into the save area.
bc17de7c 2764 */
d0164ee2 2765 save_fpu_regs();
bc17de7c
EF
2766
2767 return kvm_s390_store_adtl_status_unloaded(vcpu, addr);
2768}
2769
8ad35755
DH
2770static void __disable_ibs_on_vcpu(struct kvm_vcpu *vcpu)
2771{
2772 kvm_check_request(KVM_REQ_ENABLE_IBS, vcpu);
8e236546 2773 kvm_s390_sync_request(KVM_REQ_DISABLE_IBS, vcpu);
8ad35755
DH
2774}
2775
2776static void __disable_ibs_on_all_vcpus(struct kvm *kvm)
2777{
2778 unsigned int i;
2779 struct kvm_vcpu *vcpu;
2780
2781 kvm_for_each_vcpu(i, vcpu, kvm) {
2782 __disable_ibs_on_vcpu(vcpu);
2783 }
2784}
2785
2786static void __enable_ibs_on_vcpu(struct kvm_vcpu *vcpu)
2787{
2788 kvm_check_request(KVM_REQ_DISABLE_IBS, vcpu);
8e236546 2789 kvm_s390_sync_request(KVM_REQ_ENABLE_IBS, vcpu);
8ad35755
DH
2790}
2791
6852d7b6
DH
2792void kvm_s390_vcpu_start(struct kvm_vcpu *vcpu)
2793{
8ad35755
DH
2794 int i, online_vcpus, started_vcpus = 0;
2795
2796 if (!is_vcpu_stopped(vcpu))
2797 return;
2798
6852d7b6 2799 trace_kvm_s390_vcpu_start_stop(vcpu->vcpu_id, 1);
8ad35755 2800 /* Only one cpu at a time may enter/leave the STOPPED state. */
433b9ee4 2801 spin_lock(&vcpu->kvm->arch.start_stop_lock);
8ad35755
DH
2802 online_vcpus = atomic_read(&vcpu->kvm->online_vcpus);
2803
2804 for (i = 0; i < online_vcpus; i++) {
2805 if (!is_vcpu_stopped(vcpu->kvm->vcpus[i]))
2806 started_vcpus++;
2807 }
2808
2809 if (started_vcpus == 0) {
2810 /* we're the only active VCPU -> speed it up */
2811 __enable_ibs_on_vcpu(vcpu);
2812 } else if (started_vcpus == 1) {
2813 /*
2814 * As we are starting a second VCPU, we have to disable
2815 * the IBS facility on all VCPUs to remove potentially
2816 * oustanding ENABLE requests.
2817 */
2818 __disable_ibs_on_all_vcpus(vcpu->kvm);
2819 }
2820
805de8f4 2821 atomic_andnot(CPUSTAT_STOPPED, &vcpu->arch.sie_block->cpuflags);
8ad35755
DH
2822 /*
2823 * Another VCPU might have used IBS while we were offline.
2824 * Let's play safe and flush the VCPU at startup.
2825 */
d3d692c8 2826 kvm_make_request(KVM_REQ_TLB_FLUSH, vcpu);
433b9ee4 2827 spin_unlock(&vcpu->kvm->arch.start_stop_lock);
8ad35755 2828 return;
6852d7b6
DH
2829}
2830
2831void kvm_s390_vcpu_stop(struct kvm_vcpu *vcpu)
2832{
8ad35755
DH
2833 int i, online_vcpus, started_vcpus = 0;
2834 struct kvm_vcpu *started_vcpu = NULL;
2835
2836 if (is_vcpu_stopped(vcpu))
2837 return;
2838
6852d7b6 2839 trace_kvm_s390_vcpu_start_stop(vcpu->vcpu_id, 0);
8ad35755 2840 /* Only one cpu at a time may enter/leave the STOPPED state. */
433b9ee4 2841 spin_lock(&vcpu->kvm->arch.start_stop_lock);
8ad35755
DH
2842 online_vcpus = atomic_read(&vcpu->kvm->online_vcpus);
2843
32f5ff63 2844 /* SIGP STOP and SIGP STOP AND STORE STATUS has been fully processed */
6cddd432 2845 kvm_s390_clear_stop_irq(vcpu);
32f5ff63 2846
805de8f4 2847 atomic_or(CPUSTAT_STOPPED, &vcpu->arch.sie_block->cpuflags);
8ad35755
DH
2848 __disable_ibs_on_vcpu(vcpu);
2849
2850 for (i = 0; i < online_vcpus; i++) {
2851 if (!is_vcpu_stopped(vcpu->kvm->vcpus[i])) {
2852 started_vcpus++;
2853 started_vcpu = vcpu->kvm->vcpus[i];
2854 }
2855 }
2856
2857 if (started_vcpus == 1) {
2858 /*
2859 * As we only have one VCPU left, we want to enable the
2860 * IBS facility for that VCPU to speed it up.
2861 */
2862 __enable_ibs_on_vcpu(started_vcpu);
2863 }
2864
433b9ee4 2865 spin_unlock(&vcpu->kvm->arch.start_stop_lock);
8ad35755 2866 return;
6852d7b6
DH
2867}
2868
d6712df9
CH
2869static int kvm_vcpu_ioctl_enable_cap(struct kvm_vcpu *vcpu,
2870 struct kvm_enable_cap *cap)
2871{
2872 int r;
2873
2874 if (cap->flags)
2875 return -EINVAL;
2876
2877 switch (cap->cap) {
fa6b7fe9
CH
2878 case KVM_CAP_S390_CSS_SUPPORT:
2879 if (!vcpu->kvm->arch.css_support) {
2880 vcpu->kvm->arch.css_support = 1;
c92ea7b9 2881 VM_EVENT(vcpu->kvm, 3, "%s", "ENABLE: CSS support");
fa6b7fe9
CH
2882 trace_kvm_s390_enable_css(vcpu->kvm);
2883 }
2884 r = 0;
2885 break;
d6712df9
CH
2886 default:
2887 r = -EINVAL;
2888 break;
2889 }
2890 return r;
2891}
2892
41408c28
TH
2893static long kvm_s390_guest_mem_op(struct kvm_vcpu *vcpu,
2894 struct kvm_s390_mem_op *mop)
2895{
2896 void __user *uaddr = (void __user *)mop->buf;
2897 void *tmpbuf = NULL;
2898 int r, srcu_idx;
2899 const u64 supported_flags = KVM_S390_MEMOP_F_INJECT_EXCEPTION
2900 | KVM_S390_MEMOP_F_CHECK_ONLY;
2901
2902 if (mop->flags & ~supported_flags)
2903 return -EINVAL;
2904
2905 if (mop->size > MEM_OP_MAX_SIZE)
2906 return -E2BIG;
2907
2908 if (!(mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY)) {
2909 tmpbuf = vmalloc(mop->size);
2910 if (!tmpbuf)
2911 return -ENOMEM;
2912 }
2913
2914 srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
2915
2916 switch (mop->op) {
2917 case KVM_S390_MEMOP_LOGICAL_READ:
2918 if (mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY) {
92c96321
DH
2919 r = check_gva_range(vcpu, mop->gaddr, mop->ar,
2920 mop->size, GACC_FETCH);
41408c28
TH
2921 break;
2922 }
2923 r = read_guest(vcpu, mop->gaddr, mop->ar, tmpbuf, mop->size);
2924 if (r == 0) {
2925 if (copy_to_user(uaddr, tmpbuf, mop->size))
2926 r = -EFAULT;
2927 }
2928 break;
2929 case KVM_S390_MEMOP_LOGICAL_WRITE:
2930 if (mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY) {
92c96321
DH
2931 r = check_gva_range(vcpu, mop->gaddr, mop->ar,
2932 mop->size, GACC_STORE);
41408c28
TH
2933 break;
2934 }
2935 if (copy_from_user(tmpbuf, uaddr, mop->size)) {
2936 r = -EFAULT;
2937 break;
2938 }
2939 r = write_guest(vcpu, mop->gaddr, mop->ar, tmpbuf, mop->size);
2940 break;
2941 default:
2942 r = -EINVAL;
2943 }
2944
2945 srcu_read_unlock(&vcpu->kvm->srcu, srcu_idx);
2946
2947 if (r > 0 && (mop->flags & KVM_S390_MEMOP_F_INJECT_EXCEPTION) != 0)
2948 kvm_s390_inject_prog_irq(vcpu, &vcpu->arch.pgm);
2949
2950 vfree(tmpbuf);
2951 return r;
2952}
2953
b0c632db
HC
2954long kvm_arch_vcpu_ioctl(struct file *filp,
2955 unsigned int ioctl, unsigned long arg)
2956{
2957 struct kvm_vcpu *vcpu = filp->private_data;
2958 void __user *argp = (void __user *)arg;
800c1065 2959 int idx;
bc923cc9 2960 long r;
b0c632db 2961
93736624 2962 switch (ioctl) {
47b43c52
JF
2963 case KVM_S390_IRQ: {
2964 struct kvm_s390_irq s390irq;
2965
2966 r = -EFAULT;
2967 if (copy_from_user(&s390irq, argp, sizeof(s390irq)))
2968 break;
2969 r = kvm_s390_inject_vcpu(vcpu, &s390irq);
2970 break;
2971 }
93736624 2972 case KVM_S390_INTERRUPT: {
ba5c1e9b 2973 struct kvm_s390_interrupt s390int;
383d0b05 2974 struct kvm_s390_irq s390irq;
ba5c1e9b 2975
93736624 2976 r = -EFAULT;
ba5c1e9b 2977 if (copy_from_user(&s390int, argp, sizeof(s390int)))
93736624 2978 break;
383d0b05
JF
2979 if (s390int_to_s390irq(&s390int, &s390irq))
2980 return -EINVAL;
2981 r = kvm_s390_inject_vcpu(vcpu, &s390irq);
93736624 2982 break;
ba5c1e9b 2983 }
b0c632db 2984 case KVM_S390_STORE_STATUS:
800c1065 2985 idx = srcu_read_lock(&vcpu->kvm->srcu);
bc923cc9 2986 r = kvm_s390_vcpu_store_status(vcpu, arg);
800c1065 2987 srcu_read_unlock(&vcpu->kvm->srcu, idx);
bc923cc9 2988 break;
b0c632db
HC
2989 case KVM_S390_SET_INITIAL_PSW: {
2990 psw_t psw;
2991
bc923cc9 2992 r = -EFAULT;
b0c632db 2993 if (copy_from_user(&psw, argp, sizeof(psw)))
bc923cc9
AK
2994 break;
2995 r = kvm_arch_vcpu_ioctl_set_initial_psw(vcpu, psw);
2996 break;
b0c632db
HC
2997 }
2998 case KVM_S390_INITIAL_RESET:
bc923cc9
AK
2999 r = kvm_arch_vcpu_ioctl_initial_reset(vcpu);
3000 break;
14eebd91
CO
3001 case KVM_SET_ONE_REG:
3002 case KVM_GET_ONE_REG: {
3003 struct kvm_one_reg reg;
3004 r = -EFAULT;
3005 if (copy_from_user(&reg, argp, sizeof(reg)))
3006 break;
3007 if (ioctl == KVM_SET_ONE_REG)
3008 r = kvm_arch_vcpu_ioctl_set_one_reg(vcpu, &reg);
3009 else
3010 r = kvm_arch_vcpu_ioctl_get_one_reg(vcpu, &reg);
3011 break;
3012 }
27e0393f
CO
3013#ifdef CONFIG_KVM_S390_UCONTROL
3014 case KVM_S390_UCAS_MAP: {
3015 struct kvm_s390_ucas_mapping ucasmap;
3016
3017 if (copy_from_user(&ucasmap, argp, sizeof(ucasmap))) {
3018 r = -EFAULT;
3019 break;
3020 }
3021
3022 if (!kvm_is_ucontrol(vcpu->kvm)) {
3023 r = -EINVAL;
3024 break;
3025 }
3026
3027 r = gmap_map_segment(vcpu->arch.gmap, ucasmap.user_addr,
3028 ucasmap.vcpu_addr, ucasmap.length);
3029 break;
3030 }
3031 case KVM_S390_UCAS_UNMAP: {
3032 struct kvm_s390_ucas_mapping ucasmap;
3033
3034 if (copy_from_user(&ucasmap, argp, sizeof(ucasmap))) {
3035 r = -EFAULT;
3036 break;
3037 }
3038
3039 if (!kvm_is_ucontrol(vcpu->kvm)) {
3040 r = -EINVAL;
3041 break;
3042 }
3043
3044 r = gmap_unmap_segment(vcpu->arch.gmap, ucasmap.vcpu_addr,
3045 ucasmap.length);
3046 break;
3047 }
3048#endif
ccc7910f 3049 case KVM_S390_VCPU_FAULT: {
527e30b4 3050 r = gmap_fault(vcpu->arch.gmap, arg, 0);
ccc7910f
CO
3051 break;
3052 }
d6712df9
CH
3053 case KVM_ENABLE_CAP:
3054 {
3055 struct kvm_enable_cap cap;
3056 r = -EFAULT;
3057 if (copy_from_user(&cap, argp, sizeof(cap)))
3058 break;
3059 r = kvm_vcpu_ioctl_enable_cap(vcpu, &cap);
3060 break;
3061 }
41408c28
TH
3062 case KVM_S390_MEM_OP: {
3063 struct kvm_s390_mem_op mem_op;
3064
3065 if (copy_from_user(&mem_op, argp, sizeof(mem_op)) == 0)
3066 r = kvm_s390_guest_mem_op(vcpu, &mem_op);
3067 else
3068 r = -EFAULT;
3069 break;
3070 }
816c7667
JF
3071 case KVM_S390_SET_IRQ_STATE: {
3072 struct kvm_s390_irq_state irq_state;
3073
3074 r = -EFAULT;
3075 if (copy_from_user(&irq_state, argp, sizeof(irq_state)))
3076 break;
3077 if (irq_state.len > VCPU_IRQS_MAX_BUF ||
3078 irq_state.len == 0 ||
3079 irq_state.len % sizeof(struct kvm_s390_irq) > 0) {
3080 r = -EINVAL;
3081 break;
3082 }
3083 r = kvm_s390_set_irq_state(vcpu,
3084 (void __user *) irq_state.buf,
3085 irq_state.len);
3086 break;
3087 }
3088 case KVM_S390_GET_IRQ_STATE: {
3089 struct kvm_s390_irq_state irq_state;
3090
3091 r = -EFAULT;
3092 if (copy_from_user(&irq_state, argp, sizeof(irq_state)))
3093 break;
3094 if (irq_state.len == 0) {
3095 r = -EINVAL;
3096 break;
3097 }
3098 r = kvm_s390_get_irq_state(vcpu,
3099 (__u8 __user *) irq_state.buf,
3100 irq_state.len);
3101 break;
3102 }
b0c632db 3103 default:
3e6afcf1 3104 r = -ENOTTY;
b0c632db 3105 }
bc923cc9 3106 return r;
b0c632db
HC
3107}
3108
5b1c1493
CO
3109int kvm_arch_vcpu_fault(struct kvm_vcpu *vcpu, struct vm_fault *vmf)
3110{
3111#ifdef CONFIG_KVM_S390_UCONTROL
3112 if ((vmf->pgoff == KVM_S390_SIE_PAGE_OFFSET)
3113 && (kvm_is_ucontrol(vcpu->kvm))) {
3114 vmf->page = virt_to_page(vcpu->arch.sie_block);
3115 get_page(vmf->page);
3116 return 0;
3117 }
3118#endif
3119 return VM_FAULT_SIGBUS;
3120}
3121
5587027c
AK
3122int kvm_arch_create_memslot(struct kvm *kvm, struct kvm_memory_slot *slot,
3123 unsigned long npages)
db3fe4eb
TY
3124{
3125 return 0;
3126}
3127
b0c632db 3128/* Section: memory related */
f7784b8e
MT
3129int kvm_arch_prepare_memory_region(struct kvm *kvm,
3130 struct kvm_memory_slot *memslot,
09170a49 3131 const struct kvm_userspace_memory_region *mem,
7b6195a9 3132 enum kvm_mr_change change)
b0c632db 3133{
dd2887e7
NW
3134 /* A few sanity checks. We can have memory slots which have to be
3135 located/ended at a segment boundary (1MB). The memory in userland is
3136 ok to be fragmented into various different vmas. It is okay to mmap()
3137 and munmap() stuff in this slot after doing this call at any time */
b0c632db 3138
598841ca 3139 if (mem->userspace_addr & 0xffffful)
b0c632db
HC
3140 return -EINVAL;
3141
598841ca 3142 if (mem->memory_size & 0xffffful)
b0c632db
HC
3143 return -EINVAL;
3144
a3a92c31
DD
3145 if (mem->guest_phys_addr + mem->memory_size > kvm->arch.mem_limit)
3146 return -EINVAL;
3147
f7784b8e
MT
3148 return 0;
3149}
3150
3151void kvm_arch_commit_memory_region(struct kvm *kvm,
09170a49 3152 const struct kvm_userspace_memory_region *mem,
8482644a 3153 const struct kvm_memory_slot *old,
f36f3f28 3154 const struct kvm_memory_slot *new,
8482644a 3155 enum kvm_mr_change change)
f7784b8e 3156{
f7850c92 3157 int rc;
f7784b8e 3158
2cef4deb
CB
3159 /* If the basics of the memslot do not change, we do not want
3160 * to update the gmap. Every update causes several unnecessary
3161 * segment translation exceptions. This is usually handled just
3162 * fine by the normal fault handler + gmap, but it will also
3163 * cause faults on the prefix page of running guest CPUs.
3164 */
3165 if (old->userspace_addr == mem->userspace_addr &&
3166 old->base_gfn * PAGE_SIZE == mem->guest_phys_addr &&
3167 old->npages * PAGE_SIZE == mem->memory_size)
3168 return;
598841ca
CO
3169
3170 rc = gmap_map_segment(kvm->arch.gmap, mem->userspace_addr,
3171 mem->guest_phys_addr, mem->memory_size);
3172 if (rc)
ea2cdd27 3173 pr_warn("failed to commit memory region\n");
598841ca 3174 return;
b0c632db
HC
3175}
3176
60a37709
AY
3177static inline unsigned long nonhyp_mask(int i)
3178{
3179 unsigned int nonhyp_fai = (sclp.hmfai << i * 2) >> 30;
3180
3181 return 0x0000ffffffffffffUL >> (nonhyp_fai << 4);
3182}
3183
3491caf2
CB
3184void kvm_arch_vcpu_block_finish(struct kvm_vcpu *vcpu)
3185{
3186 vcpu->valid_wakeup = false;
3187}
3188
b0c632db
HC
3189static int __init kvm_s390_init(void)
3190{
60a37709
AY
3191 int i;
3192
07197fd0
DH
3193 if (!sclp.has_sief2) {
3194 pr_info("SIE not available\n");
3195 return -ENODEV;
3196 }
3197
60a37709
AY
3198 for (i = 0; i < 16; i++)
3199 kvm_s390_fac_list_mask[i] |=
3200 S390_lowcore.stfle_fac_list[i] & nonhyp_mask(i);
3201
9d8d5786 3202 return kvm_init(NULL, sizeof(struct kvm_vcpu), 0, THIS_MODULE);
b0c632db
HC
3203}
3204
3205static void __exit kvm_s390_exit(void)
3206{
3207 kvm_exit();
3208}
3209
3210module_init(kvm_s390_init);
3211module_exit(kvm_s390_exit);
566af940
CH
3212
3213/*
3214 * Enable autoloading of the kvm module.
3215 * Note that we add the module alias here instead of virt/kvm/kvm_main.c
3216 * since x86 takes a different approach.
3217 */
3218#include <linux/miscdevice.h>
3219MODULE_ALIAS_MISCDEV(KVM_MINOR);
3220MODULE_ALIAS("devname:kvm");