xref: /openbmc/linux/arch/s390/kvm/kvm-s390.c (revision 0e237e44699465139c07f969b051f83066a2ec1d)
1d809aa23SGreg Kroah-Hartman // SPDX-License-Identifier: GPL-2.0
2b0c632dbSHeiko Carstens /*
3bb64da9aSChristian Borntraeger  * hosting IBM Z kernel virtual machines (s390x)
4b0c632dbSHeiko Carstens  *
5a37cb07aSChristian Borntraeger  * Copyright IBM Corp. 2008, 2018
6b0c632dbSHeiko Carstens  *
7b0c632dbSHeiko Carstens  *    Author(s): Carsten Otte <cotte@de.ibm.com>
8b0c632dbSHeiko Carstens  *               Christian Borntraeger <borntraeger@de.ibm.com>
9b0c632dbSHeiko Carstens  *               Heiko Carstens <heiko.carstens@de.ibm.com>
10628eb9b8SChristian Ehrhardt  *               Christian Ehrhardt <ehrhardt@de.ibm.com>
1115f36ebdSJason J. Herne  *               Jason J. Herne <jjherne@us.ibm.com>
12b0c632dbSHeiko Carstens  */
13b0c632dbSHeiko Carstens 
14b0c632dbSHeiko Carstens #include <linux/compiler.h>
15b0c632dbSHeiko Carstens #include <linux/err.h>
16b0c632dbSHeiko Carstens #include <linux/fs.h>
17ca872302SChristian Borntraeger #include <linux/hrtimer.h>
18b0c632dbSHeiko Carstens #include <linux/init.h>
19b0c632dbSHeiko Carstens #include <linux/kvm.h>
20b0c632dbSHeiko Carstens #include <linux/kvm_host.h>
21b2d73b2aSMartin Schwidefsky #include <linux/mman.h>
22b0c632dbSHeiko Carstens #include <linux/module.h>
23d3217967SPaul Gortmaker #include <linux/moduleparam.h>
24a374e892STony Krowiak #include <linux/random.h>
25b0c632dbSHeiko Carstens #include <linux/slab.h>
26ba5c1e9bSCarsten Otte #include <linux/timer.h>
2741408c28SThomas Huth #include <linux/vmalloc.h>
2815c9705fSDavid Hildenbrand #include <linux/bitmap.h>
29174cd4b1SIngo Molnar #include <linux/sched/signal.h>
30190df4a2SClaudio Imbrenda #include <linux/string.h>
31174cd4b1SIngo Molnar 
32cbb870c8SHeiko Carstens #include <asm/asm-offsets.h>
33b0c632dbSHeiko Carstens #include <asm/lowcore.h>
34fd5ada04SMartin Schwidefsky #include <asm/stp.h>
35b0c632dbSHeiko Carstens #include <asm/pgtable.h>
361e133ab2SMartin Schwidefsky #include <asm/gmap.h>
37f5daba1dSHeiko Carstens #include <asm/nmi.h>
38a0616cdeSDavid Howells #include <asm/switch_to.h>
396d3da241SJens Freimann #include <asm/isc.h>
401526bf9cSChristian Borntraeger #include <asm/sclp.h>
410a763c78SDavid Hildenbrand #include <asm/cpacf.h>
42221bb8a4SLinus Torvalds #include <asm/timex.h>
43e585b24aSTony Krowiak #include <asm/ap.h>
448f2abe6aSChristian Borntraeger #include "kvm-s390.h"
45b0c632dbSHeiko Carstens #include "gaccess.h"
46b0c632dbSHeiko Carstens 
47ea2cdd27SDavid Hildenbrand #define KMSG_COMPONENT "kvm-s390"
48ea2cdd27SDavid Hildenbrand #undef pr_fmt
49ea2cdd27SDavid Hildenbrand #define pr_fmt(fmt) KMSG_COMPONENT ": " fmt
50ea2cdd27SDavid Hildenbrand 
515786fffaSCornelia Huck #define CREATE_TRACE_POINTS
525786fffaSCornelia Huck #include "trace.h"
53ade38c31SCornelia Huck #include "trace-s390.h"
545786fffaSCornelia Huck 
5541408c28SThomas Huth #define MEM_OP_MAX_SIZE 65536	/* Maximum transfer size for KVM_S390_MEM_OP */
56816c7667SJens Freimann #define LOCAL_IRQS 32
57816c7667SJens Freimann #define VCPU_IRQS_MAX_BUF (sizeof(struct kvm_s390_irq) * \
58816c7667SJens Freimann 			   (KVM_MAX_VCPUS + LOCAL_IRQS))
5941408c28SThomas Huth 
60b0c632dbSHeiko Carstens #define VCPU_STAT(x) offsetof(struct kvm_vcpu, stat.x), KVM_STAT_VCPU
61ccc40c53SChristian Borntraeger #define VM_STAT(x) offsetof(struct kvm, stat.x), KVM_STAT_VM
62b0c632dbSHeiko Carstens 
63b0c632dbSHeiko Carstens struct kvm_stats_debugfs_item debugfs_entries[] = {
64b0c632dbSHeiko Carstens 	{ "userspace_handled", VCPU_STAT(exit_userspace) },
650eaeafa1SChristian Borntraeger 	{ "exit_null", VCPU_STAT(exit_null) },
668f2abe6aSChristian Borntraeger 	{ "exit_validity", VCPU_STAT(exit_validity) },
678f2abe6aSChristian Borntraeger 	{ "exit_stop_request", VCPU_STAT(exit_stop_request) },
688f2abe6aSChristian Borntraeger 	{ "exit_external_request", VCPU_STAT(exit_external_request) },
69a5e0aceaSChristian Borntraeger 	{ "exit_io_request", VCPU_STAT(exit_io_request) },
708f2abe6aSChristian Borntraeger 	{ "exit_external_interrupt", VCPU_STAT(exit_external_interrupt) },
71ba5c1e9bSCarsten Otte 	{ "exit_instruction", VCPU_STAT(exit_instruction) },
729ec6de19SAlexander Yarygin 	{ "exit_pei", VCPU_STAT(exit_pei) },
73ba5c1e9bSCarsten Otte 	{ "exit_program_interruption", VCPU_STAT(exit_program_interruption) },
74ba5c1e9bSCarsten Otte 	{ "exit_instr_and_program_int", VCPU_STAT(exit_instr_and_program) },
75a011eeb2SJanosch Frank 	{ "exit_operation_exception", VCPU_STAT(exit_operation_exception) },
76f7819512SPaolo Bonzini 	{ "halt_successful_poll", VCPU_STAT(halt_successful_poll) },
7762bea5bfSPaolo Bonzini 	{ "halt_attempted_poll", VCPU_STAT(halt_attempted_poll) },
783491caf2SChristian Borntraeger 	{ "halt_poll_invalid", VCPU_STAT(halt_poll_invalid) },
79ce2e4f0bSDavid Hildenbrand 	{ "halt_wakeup", VCPU_STAT(halt_wakeup) },
80f5e10b09SChristian Borntraeger 	{ "instruction_lctlg", VCPU_STAT(instruction_lctlg) },
81ba5c1e9bSCarsten Otte 	{ "instruction_lctl", VCPU_STAT(instruction_lctl) },
82aba07508SDavid Hildenbrand 	{ "instruction_stctl", VCPU_STAT(instruction_stctl) },
83aba07508SDavid Hildenbrand 	{ "instruction_stctg", VCPU_STAT(instruction_stctg) },
84ccc40c53SChristian Borntraeger 	{ "deliver_ckc", VCPU_STAT(deliver_ckc) },
85ccc40c53SChristian Borntraeger 	{ "deliver_cputm", VCPU_STAT(deliver_cputm) },
86ba5c1e9bSCarsten Otte 	{ "deliver_emergency_signal", VCPU_STAT(deliver_emergency_signal) },
877697e71fSChristian Ehrhardt 	{ "deliver_external_call", VCPU_STAT(deliver_external_call) },
88ba5c1e9bSCarsten Otte 	{ "deliver_service_signal", VCPU_STAT(deliver_service_signal) },
89ccc40c53SChristian Borntraeger 	{ "deliver_virtio", VCPU_STAT(deliver_virtio) },
90ba5c1e9bSCarsten Otte 	{ "deliver_stop_signal", VCPU_STAT(deliver_stop_signal) },
91ba5c1e9bSCarsten Otte 	{ "deliver_prefix_signal", VCPU_STAT(deliver_prefix_signal) },
92ba5c1e9bSCarsten Otte 	{ "deliver_restart_signal", VCPU_STAT(deliver_restart_signal) },
93ccc40c53SChristian Borntraeger 	{ "deliver_program", VCPU_STAT(deliver_program) },
94ccc40c53SChristian Borntraeger 	{ "deliver_io", VCPU_STAT(deliver_io) },
9532de0749SQingFeng Hao 	{ "deliver_machine_check", VCPU_STAT(deliver_machine_check) },
96ba5c1e9bSCarsten Otte 	{ "exit_wait_state", VCPU_STAT(exit_wait_state) },
97ccc40c53SChristian Borntraeger 	{ "inject_ckc", VCPU_STAT(inject_ckc) },
98ccc40c53SChristian Borntraeger 	{ "inject_cputm", VCPU_STAT(inject_cputm) },
99ccc40c53SChristian Borntraeger 	{ "inject_external_call", VCPU_STAT(inject_external_call) },
100ccc40c53SChristian Borntraeger 	{ "inject_float_mchk", VM_STAT(inject_float_mchk) },
101ccc40c53SChristian Borntraeger 	{ "inject_emergency_signal", VCPU_STAT(inject_emergency_signal) },
102ccc40c53SChristian Borntraeger 	{ "inject_io", VM_STAT(inject_io) },
103ccc40c53SChristian Borntraeger 	{ "inject_mchk", VCPU_STAT(inject_mchk) },
104ccc40c53SChristian Borntraeger 	{ "inject_pfault_done", VM_STAT(inject_pfault_done) },
105ccc40c53SChristian Borntraeger 	{ "inject_program", VCPU_STAT(inject_program) },
106ccc40c53SChristian Borntraeger 	{ "inject_restart", VCPU_STAT(inject_restart) },
107ccc40c53SChristian Borntraeger 	{ "inject_service_signal", VM_STAT(inject_service_signal) },
108ccc40c53SChristian Borntraeger 	{ "inject_set_prefix", VCPU_STAT(inject_set_prefix) },
109ccc40c53SChristian Borntraeger 	{ "inject_stop_signal", VCPU_STAT(inject_stop_signal) },
110ccc40c53SChristian Borntraeger 	{ "inject_pfault_init", VCPU_STAT(inject_pfault_init) },
111ccc40c53SChristian Borntraeger 	{ "inject_virtio", VM_STAT(inject_virtio) },
112a37cb07aSChristian Borntraeger 	{ "instruction_epsw", VCPU_STAT(instruction_epsw) },
113a37cb07aSChristian Borntraeger 	{ "instruction_gs", VCPU_STAT(instruction_gs) },
114a37cb07aSChristian Borntraeger 	{ "instruction_io_other", VCPU_STAT(instruction_io_other) },
115a37cb07aSChristian Borntraeger 	{ "instruction_lpsw", VCPU_STAT(instruction_lpsw) },
116a37cb07aSChristian Borntraeger 	{ "instruction_lpswe", VCPU_STAT(instruction_lpswe) },
11769d0d3a3SChristian Borntraeger 	{ "instruction_pfmf", VCPU_STAT(instruction_pfmf) },
118a37cb07aSChristian Borntraeger 	{ "instruction_ptff", VCPU_STAT(instruction_ptff) },
119453423dcSChristian Borntraeger 	{ "instruction_stidp", VCPU_STAT(instruction_stidp) },
120a37cb07aSChristian Borntraeger 	{ "instruction_sck", VCPU_STAT(instruction_sck) },
121a37cb07aSChristian Borntraeger 	{ "instruction_sckpf", VCPU_STAT(instruction_sckpf) },
122453423dcSChristian Borntraeger 	{ "instruction_spx", VCPU_STAT(instruction_spx) },
123453423dcSChristian Borntraeger 	{ "instruction_stpx", VCPU_STAT(instruction_stpx) },
124453423dcSChristian Borntraeger 	{ "instruction_stap", VCPU_STAT(instruction_stap) },
125a37cb07aSChristian Borntraeger 	{ "instruction_iske", VCPU_STAT(instruction_iske) },
126a37cb07aSChristian Borntraeger 	{ "instruction_ri", VCPU_STAT(instruction_ri) },
127a37cb07aSChristian Borntraeger 	{ "instruction_rrbe", VCPU_STAT(instruction_rrbe) },
128a37cb07aSChristian Borntraeger 	{ "instruction_sske", VCPU_STAT(instruction_sske) },
1298a242234SHeiko Carstens 	{ "instruction_ipte_interlock", VCPU_STAT(instruction_ipte_interlock) },
130b31288faSKonstantin Weitz 	{ "instruction_essa", VCPU_STAT(instruction_essa) },
131453423dcSChristian Borntraeger 	{ "instruction_stsi", VCPU_STAT(instruction_stsi) },
132453423dcSChristian Borntraeger 	{ "instruction_stfl", VCPU_STAT(instruction_stfl) },
133a37cb07aSChristian Borntraeger 	{ "instruction_tb", VCPU_STAT(instruction_tb) },
134a37cb07aSChristian Borntraeger 	{ "instruction_tpi", VCPU_STAT(instruction_tpi) },
135bb25b9baSChristian Borntraeger 	{ "instruction_tprot", VCPU_STAT(instruction_tprot) },
136a37cb07aSChristian Borntraeger 	{ "instruction_tsch", VCPU_STAT(instruction_tsch) },
13795ca2cb5SJanosch Frank 	{ "instruction_sthyi", VCPU_STAT(instruction_sthyi) },
138a3508fbeSDavid Hildenbrand 	{ "instruction_sie", VCPU_STAT(instruction_sie) },
1395288fbf0SChristian Borntraeger 	{ "instruction_sigp_sense", VCPU_STAT(instruction_sigp_sense) },
140bd59d3a4SCornelia Huck 	{ "instruction_sigp_sense_running", VCPU_STAT(instruction_sigp_sense_running) },
1417697e71fSChristian Ehrhardt 	{ "instruction_sigp_external_call", VCPU_STAT(instruction_sigp_external_call) },
1425288fbf0SChristian Borntraeger 	{ "instruction_sigp_emergency", VCPU_STAT(instruction_sigp_emergency) },
14342cb0c9fSDavid Hildenbrand 	{ "instruction_sigp_cond_emergency", VCPU_STAT(instruction_sigp_cond_emergency) },
14442cb0c9fSDavid Hildenbrand 	{ "instruction_sigp_start", VCPU_STAT(instruction_sigp_start) },
1455288fbf0SChristian Borntraeger 	{ "instruction_sigp_stop", VCPU_STAT(instruction_sigp_stop) },
14642cb0c9fSDavid Hildenbrand 	{ "instruction_sigp_stop_store_status", VCPU_STAT(instruction_sigp_stop_store_status) },
14742cb0c9fSDavid Hildenbrand 	{ "instruction_sigp_store_status", VCPU_STAT(instruction_sigp_store_status) },
148cd7b4b61SEric Farman 	{ "instruction_sigp_store_adtl_status", VCPU_STAT(instruction_sigp_store_adtl_status) },
1495288fbf0SChristian Borntraeger 	{ "instruction_sigp_set_arch", VCPU_STAT(instruction_sigp_arch) },
1505288fbf0SChristian Borntraeger 	{ "instruction_sigp_set_prefix", VCPU_STAT(instruction_sigp_prefix) },
1515288fbf0SChristian Borntraeger 	{ "instruction_sigp_restart", VCPU_STAT(instruction_sigp_restart) },
15242cb0c9fSDavid Hildenbrand 	{ "instruction_sigp_cpu_reset", VCPU_STAT(instruction_sigp_cpu_reset) },
15342cb0c9fSDavid Hildenbrand 	{ "instruction_sigp_init_cpu_reset", VCPU_STAT(instruction_sigp_init_cpu_reset) },
15442cb0c9fSDavid Hildenbrand 	{ "instruction_sigp_unknown", VCPU_STAT(instruction_sigp_unknown) },
155866c138cSChristian Borntraeger 	{ "instruction_diag_10", VCPU_STAT(diagnose_10) },
156866c138cSChristian Borntraeger 	{ "instruction_diag_44", VCPU_STAT(diagnose_44) },
157866c138cSChristian Borntraeger 	{ "instruction_diag_9c", VCPU_STAT(diagnose_9c) },
158866c138cSChristian Borntraeger 	{ "instruction_diag_258", VCPU_STAT(diagnose_258) },
159866c138cSChristian Borntraeger 	{ "instruction_diag_308", VCPU_STAT(diagnose_308) },
160866c138cSChristian Borntraeger 	{ "instruction_diag_500", VCPU_STAT(diagnose_500) },
161a37cb07aSChristian Borntraeger 	{ "instruction_diag_other", VCPU_STAT(diagnose_other) },
162b0c632dbSHeiko Carstens 	{ NULL }
163b0c632dbSHeiko Carstens };
164b0c632dbSHeiko Carstens 
1658fa1696eSCollin L. Walling struct kvm_s390_tod_clock_ext {
1668fa1696eSCollin L. Walling 	__u8 epoch_idx;
1678fa1696eSCollin L. Walling 	__u64 tod;
1688fa1696eSCollin L. Walling 	__u8 reserved[7];
1698fa1696eSCollin L. Walling } __packed;
1708fa1696eSCollin L. Walling 
171a411edf1SDavid Hildenbrand /* allow nested virtualization in KVM (if enabled by user space) */
172a411edf1SDavid Hildenbrand static int nested;
173a411edf1SDavid Hildenbrand module_param(nested, int, S_IRUGO);
174a411edf1SDavid Hildenbrand MODULE_PARM_DESC(nested, "Nested virtualization support");
175a411edf1SDavid Hildenbrand 
176a4499382SJanosch Frank /* allow 1m huge page guest backing, if !nested */
177a4499382SJanosch Frank static int hpage;
178a4499382SJanosch Frank module_param(hpage, int, 0444);
179a4499382SJanosch Frank MODULE_PARM_DESC(hpage, "1m huge page backing support");
180b0c632dbSHeiko Carstens 
181c3b9e3e1SChristian Borntraeger /*
182c3b9e3e1SChristian Borntraeger  * For now we handle at most 16 double words as this is what the s390 base
183c3b9e3e1SChristian Borntraeger  * kernel handles and stores in the prefix page. If we ever need to go beyond
184c3b9e3e1SChristian Borntraeger  * this, this requires changes to code, but the external uapi can stay.
185c3b9e3e1SChristian Borntraeger  */
186c3b9e3e1SChristian Borntraeger #define SIZE_INTERNAL 16
187c3b9e3e1SChristian Borntraeger 
188c3b9e3e1SChristian Borntraeger /*
189c3b9e3e1SChristian Borntraeger  * Base feature mask that defines default mask for facilities. Consists of the
190c3b9e3e1SChristian Borntraeger  * defines in FACILITIES_KVM and the non-hypervisor managed bits.
191c3b9e3e1SChristian Borntraeger  */
192c3b9e3e1SChristian Borntraeger static unsigned long kvm_s390_fac_base[SIZE_INTERNAL] = { FACILITIES_KVM };
193c3b9e3e1SChristian Borntraeger /*
194c3b9e3e1SChristian Borntraeger  * Extended feature mask. Consists of the defines in FACILITIES_KVM_CPUMODEL
195c3b9e3e1SChristian Borntraeger  * and defines the facilities that can be enabled via a cpu model.
196c3b9e3e1SChristian Borntraeger  */
197c3b9e3e1SChristian Borntraeger static unsigned long kvm_s390_fac_ext[SIZE_INTERNAL] = { FACILITIES_KVM_CPUMODEL };
198c3b9e3e1SChristian Borntraeger 
199c3b9e3e1SChristian Borntraeger static unsigned long kvm_s390_fac_size(void)
20078c4b59fSMichael Mueller {
201c3b9e3e1SChristian Borntraeger 	BUILD_BUG_ON(SIZE_INTERNAL > S390_ARCH_FAC_MASK_SIZE_U64);
202c3b9e3e1SChristian Borntraeger 	BUILD_BUG_ON(SIZE_INTERNAL > S390_ARCH_FAC_LIST_SIZE_U64);
203c3b9e3e1SChristian Borntraeger 	BUILD_BUG_ON(SIZE_INTERNAL * sizeof(unsigned long) >
204c3b9e3e1SChristian Borntraeger 		sizeof(S390_lowcore.stfle_fac_list));
205c3b9e3e1SChristian Borntraeger 
206c3b9e3e1SChristian Borntraeger 	return SIZE_INTERNAL;
20778c4b59fSMichael Mueller }
20878c4b59fSMichael Mueller 
20915c9705fSDavid Hildenbrand /* available cpu features supported by kvm */
21015c9705fSDavid Hildenbrand static DECLARE_BITMAP(kvm_s390_available_cpu_feat, KVM_S390_VM_CPU_FEAT_NR_BITS);
2110a763c78SDavid Hildenbrand /* available subfunctions indicated via query / "test bit" */
2120a763c78SDavid Hildenbrand static struct kvm_s390_vm_cpu_subfunc kvm_s390_available_subfunc;
21315c9705fSDavid Hildenbrand 
2149d8d5786SMichael Mueller static struct gmap_notifier gmap_notifier;
215a3508fbeSDavid Hildenbrand static struct gmap_notifier vsie_gmap_notifier;
21678f26131SChristian Borntraeger debug_info_t *kvm_s390_dbf;
2179d8d5786SMichael Mueller 
218b0c632dbSHeiko Carstens /* Section: not file related */
21913a34e06SRadim Krčmář int kvm_arch_hardware_enable(void)
220b0c632dbSHeiko Carstens {
221b0c632dbSHeiko Carstens 	/* every s390 is virtualization enabled ;-) */
22210474ae8SAlexander Graf 	return 0;
223b0c632dbSHeiko Carstens }
224b0c632dbSHeiko Carstens 
225414d3b07SMartin Schwidefsky static void kvm_gmap_notifier(struct gmap *gmap, unsigned long start,
226414d3b07SMartin Schwidefsky 			      unsigned long end);
2272c70fe44SChristian Borntraeger 
2281575767eSDavid Hildenbrand static void kvm_clock_sync_scb(struct kvm_s390_sie_block *scb, u64 delta)
2291575767eSDavid Hildenbrand {
2301575767eSDavid Hildenbrand 	u8 delta_idx = 0;
2311575767eSDavid Hildenbrand 
2321575767eSDavid Hildenbrand 	/*
2331575767eSDavid Hildenbrand 	 * The TOD jumps by delta, we have to compensate this by adding
2341575767eSDavid Hildenbrand 	 * -delta to the epoch.
2351575767eSDavid Hildenbrand 	 */
2361575767eSDavid Hildenbrand 	delta = -delta;
2371575767eSDavid Hildenbrand 
2381575767eSDavid Hildenbrand 	/* sign-extension - we're adding to signed values below */
2391575767eSDavid Hildenbrand 	if ((s64)delta < 0)
2401575767eSDavid Hildenbrand 		delta_idx = -1;
2411575767eSDavid Hildenbrand 
2421575767eSDavid Hildenbrand 	scb->epoch += delta;
2431575767eSDavid Hildenbrand 	if (scb->ecd & ECD_MEF) {
2441575767eSDavid Hildenbrand 		scb->epdx += delta_idx;
2451575767eSDavid Hildenbrand 		if (scb->epoch < delta)
2461575767eSDavid Hildenbrand 			scb->epdx += 1;
2471575767eSDavid Hildenbrand 	}
2481575767eSDavid Hildenbrand }
2491575767eSDavid Hildenbrand 
250fdf03650SFan Zhang /*
251fdf03650SFan Zhang  * This callback is executed during stop_machine(). All CPUs are therefore
252fdf03650SFan Zhang  * temporarily stopped. In order not to change guest behavior, we have to
253fdf03650SFan Zhang  * disable preemption whenever we touch the epoch of kvm and the VCPUs,
254fdf03650SFan Zhang  * so a CPU won't be stopped while calculating with the epoch.
255fdf03650SFan Zhang  */
256fdf03650SFan Zhang static int kvm_clock_sync(struct notifier_block *notifier, unsigned long val,
257fdf03650SFan Zhang 			  void *v)
258fdf03650SFan Zhang {
259fdf03650SFan Zhang 	struct kvm *kvm;
260fdf03650SFan Zhang 	struct kvm_vcpu *vcpu;
261fdf03650SFan Zhang 	int i;
262fdf03650SFan Zhang 	unsigned long long *delta = v;
263fdf03650SFan Zhang 
264fdf03650SFan Zhang 	list_for_each_entry(kvm, &vm_list, vm_list) {
265fdf03650SFan Zhang 		kvm_for_each_vcpu(i, vcpu, kvm) {
2661575767eSDavid Hildenbrand 			kvm_clock_sync_scb(vcpu->arch.sie_block, *delta);
2671575767eSDavid Hildenbrand 			if (i == 0) {
2681575767eSDavid Hildenbrand 				kvm->arch.epoch = vcpu->arch.sie_block->epoch;
2691575767eSDavid Hildenbrand 				kvm->arch.epdx = vcpu->arch.sie_block->epdx;
2701575767eSDavid Hildenbrand 			}
271db0758b2SDavid Hildenbrand 			if (vcpu->arch.cputm_enabled)
272db0758b2SDavid Hildenbrand 				vcpu->arch.cputm_start += *delta;
27391473b48SDavid Hildenbrand 			if (vcpu->arch.vsie_block)
2741575767eSDavid Hildenbrand 				kvm_clock_sync_scb(vcpu->arch.vsie_block,
2751575767eSDavid Hildenbrand 						   *delta);
276fdf03650SFan Zhang 		}
277fdf03650SFan Zhang 	}
278fdf03650SFan Zhang 	return NOTIFY_OK;
279fdf03650SFan Zhang }
280fdf03650SFan Zhang 
281fdf03650SFan Zhang static struct notifier_block kvm_clock_notifier = {
282fdf03650SFan Zhang 	.notifier_call = kvm_clock_sync,
283fdf03650SFan Zhang };
284fdf03650SFan Zhang 
285b0c632dbSHeiko Carstens int kvm_arch_hardware_setup(void)
286b0c632dbSHeiko Carstens {
2872c70fe44SChristian Borntraeger 	gmap_notifier.notifier_call = kvm_gmap_notifier;
288b2d73b2aSMartin Schwidefsky 	gmap_register_pte_notifier(&gmap_notifier);
289a3508fbeSDavid Hildenbrand 	vsie_gmap_notifier.notifier_call = kvm_s390_vsie_gmap_notifier;
290a3508fbeSDavid Hildenbrand 	gmap_register_pte_notifier(&vsie_gmap_notifier);
291fdf03650SFan Zhang 	atomic_notifier_chain_register(&s390_epoch_delta_notifier,
292fdf03650SFan Zhang 				       &kvm_clock_notifier);
293b0c632dbSHeiko Carstens 	return 0;
294b0c632dbSHeiko Carstens }
295b0c632dbSHeiko Carstens 
296b0c632dbSHeiko Carstens void kvm_arch_hardware_unsetup(void)
297b0c632dbSHeiko Carstens {
298b2d73b2aSMartin Schwidefsky 	gmap_unregister_pte_notifier(&gmap_notifier);
299a3508fbeSDavid Hildenbrand 	gmap_unregister_pte_notifier(&vsie_gmap_notifier);
300fdf03650SFan Zhang 	atomic_notifier_chain_unregister(&s390_epoch_delta_notifier,
301fdf03650SFan Zhang 					 &kvm_clock_notifier);
302b0c632dbSHeiko Carstens }
303b0c632dbSHeiko Carstens 
30422be5a13SDavid Hildenbrand static void allow_cpu_feat(unsigned long nr)
30522be5a13SDavid Hildenbrand {
30622be5a13SDavid Hildenbrand 	set_bit_inv(nr, kvm_s390_available_cpu_feat);
30722be5a13SDavid Hildenbrand }
30822be5a13SDavid Hildenbrand 
3090a763c78SDavid Hildenbrand static inline int plo_test_bit(unsigned char nr)
3100a763c78SDavid Hildenbrand {
3110a763c78SDavid Hildenbrand 	register unsigned long r0 asm("0") = (unsigned long) nr | 0x100;
312d051ae53SHeiko Carstens 	int cc;
3130a763c78SDavid Hildenbrand 
3140a763c78SDavid Hildenbrand 	asm volatile(
3150a763c78SDavid Hildenbrand 		/* Parameter registers are ignored for "test bit" */
3160a763c78SDavid Hildenbrand 		"	plo	0,0,0,0(0)\n"
3170a763c78SDavid Hildenbrand 		"	ipm	%0\n"
3180a763c78SDavid Hildenbrand 		"	srl	%0,28\n"
3190a763c78SDavid Hildenbrand 		: "=d" (cc)
3200a763c78SDavid Hildenbrand 		: "d" (r0)
3210a763c78SDavid Hildenbrand 		: "cc");
3220a763c78SDavid Hildenbrand 	return cc == 0;
3230a763c78SDavid Hildenbrand }
3240a763c78SDavid Hildenbrand 
32522be5a13SDavid Hildenbrand static void kvm_s390_cpu_feat_init(void)
32622be5a13SDavid Hildenbrand {
3270a763c78SDavid Hildenbrand 	int i;
3280a763c78SDavid Hildenbrand 
3290a763c78SDavid Hildenbrand 	for (i = 0; i < 256; ++i) {
3300a763c78SDavid Hildenbrand 		if (plo_test_bit(i))
3310a763c78SDavid Hildenbrand 			kvm_s390_available_subfunc.plo[i >> 3] |= 0x80 >> (i & 7);
3320a763c78SDavid Hildenbrand 	}
3330a763c78SDavid Hildenbrand 
3340a763c78SDavid Hildenbrand 	if (test_facility(28)) /* TOD-clock steering */
335221bb8a4SLinus Torvalds 		ptff(kvm_s390_available_subfunc.ptff,
336221bb8a4SLinus Torvalds 		     sizeof(kvm_s390_available_subfunc.ptff),
337221bb8a4SLinus Torvalds 		     PTFF_QAF);
3380a763c78SDavid Hildenbrand 
3390a763c78SDavid Hildenbrand 	if (test_facility(17)) { /* MSA */
34069c0e360SMartin Schwidefsky 		__cpacf_query(CPACF_KMAC, (cpacf_mask_t *)
34169c0e360SMartin Schwidefsky 			      kvm_s390_available_subfunc.kmac);
34269c0e360SMartin Schwidefsky 		__cpacf_query(CPACF_KMC, (cpacf_mask_t *)
34369c0e360SMartin Schwidefsky 			      kvm_s390_available_subfunc.kmc);
34469c0e360SMartin Schwidefsky 		__cpacf_query(CPACF_KM, (cpacf_mask_t *)
34569c0e360SMartin Schwidefsky 			      kvm_s390_available_subfunc.km);
34669c0e360SMartin Schwidefsky 		__cpacf_query(CPACF_KIMD, (cpacf_mask_t *)
34769c0e360SMartin Schwidefsky 			      kvm_s390_available_subfunc.kimd);
34869c0e360SMartin Schwidefsky 		__cpacf_query(CPACF_KLMD, (cpacf_mask_t *)
34969c0e360SMartin Schwidefsky 			      kvm_s390_available_subfunc.klmd);
3500a763c78SDavid Hildenbrand 	}
3510a763c78SDavid Hildenbrand 	if (test_facility(76)) /* MSA3 */
35269c0e360SMartin Schwidefsky 		__cpacf_query(CPACF_PCKMO, (cpacf_mask_t *)
35369c0e360SMartin Schwidefsky 			      kvm_s390_available_subfunc.pckmo);
3540a763c78SDavid Hildenbrand 	if (test_facility(77)) { /* MSA4 */
35569c0e360SMartin Schwidefsky 		__cpacf_query(CPACF_KMCTR, (cpacf_mask_t *)
35669c0e360SMartin Schwidefsky 			      kvm_s390_available_subfunc.kmctr);
35769c0e360SMartin Schwidefsky 		__cpacf_query(CPACF_KMF, (cpacf_mask_t *)
35869c0e360SMartin Schwidefsky 			      kvm_s390_available_subfunc.kmf);
35969c0e360SMartin Schwidefsky 		__cpacf_query(CPACF_KMO, (cpacf_mask_t *)
36069c0e360SMartin Schwidefsky 			      kvm_s390_available_subfunc.kmo);
36169c0e360SMartin Schwidefsky 		__cpacf_query(CPACF_PCC, (cpacf_mask_t *)
36269c0e360SMartin Schwidefsky 			      kvm_s390_available_subfunc.pcc);
3630a763c78SDavid Hildenbrand 	}
3640a763c78SDavid Hildenbrand 	if (test_facility(57)) /* MSA5 */
365985a9d20SHarald Freudenberger 		__cpacf_query(CPACF_PRNO, (cpacf_mask_t *)
36669c0e360SMartin Schwidefsky 			      kvm_s390_available_subfunc.ppno);
3670a763c78SDavid Hildenbrand 
368e000b8e0SJason J. Herne 	if (test_facility(146)) /* MSA8 */
369e000b8e0SJason J. Herne 		__cpacf_query(CPACF_KMA, (cpacf_mask_t *)
370e000b8e0SJason J. Herne 			      kvm_s390_available_subfunc.kma);
371e000b8e0SJason J. Herne 
37222be5a13SDavid Hildenbrand 	if (MACHINE_HAS_ESOP)
37322be5a13SDavid Hildenbrand 		allow_cpu_feat(KVM_S390_VM_CPU_FEAT_ESOP);
374a3508fbeSDavid Hildenbrand 	/*
375a3508fbeSDavid Hildenbrand 	 * We need SIE support, ESOP (PROT_READ protection for gmap_shadow),
376a3508fbeSDavid Hildenbrand 	 * 64bit SCAO (SCA passthrough) and IDTE (for gmap_shadow unshadowing).
377a3508fbeSDavid Hildenbrand 	 */
378a3508fbeSDavid Hildenbrand 	if (!sclp.has_sief2 || !MACHINE_HAS_ESOP || !sclp.has_64bscao ||
379a411edf1SDavid Hildenbrand 	    !test_facility(3) || !nested)
380a3508fbeSDavid Hildenbrand 		return;
381a3508fbeSDavid Hildenbrand 	allow_cpu_feat(KVM_S390_VM_CPU_FEAT_SIEF2);
38219c439b5SDavid Hildenbrand 	if (sclp.has_64bscao)
38319c439b5SDavid Hildenbrand 		allow_cpu_feat(KVM_S390_VM_CPU_FEAT_64BSCAO);
3840615a326SDavid Hildenbrand 	if (sclp.has_siif)
3850615a326SDavid Hildenbrand 		allow_cpu_feat(KVM_S390_VM_CPU_FEAT_SIIF);
38677d18f6dSDavid Hildenbrand 	if (sclp.has_gpere)
38777d18f6dSDavid Hildenbrand 		allow_cpu_feat(KVM_S390_VM_CPU_FEAT_GPERE);
388a1b7b9b2SDavid Hildenbrand 	if (sclp.has_gsls)
389a1b7b9b2SDavid Hildenbrand 		allow_cpu_feat(KVM_S390_VM_CPU_FEAT_GSLS);
3905630a8e8SDavid Hildenbrand 	if (sclp.has_ib)
3915630a8e8SDavid Hildenbrand 		allow_cpu_feat(KVM_S390_VM_CPU_FEAT_IB);
39213ee3f67SDavid Hildenbrand 	if (sclp.has_cei)
39313ee3f67SDavid Hildenbrand 		allow_cpu_feat(KVM_S390_VM_CPU_FEAT_CEI);
3947fd7f39dSDavid Hildenbrand 	if (sclp.has_ibs)
3957fd7f39dSDavid Hildenbrand 		allow_cpu_feat(KVM_S390_VM_CPU_FEAT_IBS);
396730cd632SFarhan Ali 	if (sclp.has_kss)
397730cd632SFarhan Ali 		allow_cpu_feat(KVM_S390_VM_CPU_FEAT_KSS);
3985d3876a8SDavid Hildenbrand 	/*
3995d3876a8SDavid Hildenbrand 	 * KVM_S390_VM_CPU_FEAT_SKEY: Wrong shadow of PTE.I bits will make
4005d3876a8SDavid Hildenbrand 	 * all skey handling functions read/set the skey from the PGSTE
4015d3876a8SDavid Hildenbrand 	 * instead of the real storage key.
4025d3876a8SDavid Hildenbrand 	 *
4035d3876a8SDavid Hildenbrand 	 * KVM_S390_VM_CPU_FEAT_CMMA: Wrong shadow of PTE.I bits will make
4045d3876a8SDavid Hildenbrand 	 * pages being detected as preserved although they are resident.
4055d3876a8SDavid Hildenbrand 	 *
4065d3876a8SDavid Hildenbrand 	 * KVM_S390_VM_CPU_FEAT_PFMFI: Wrong shadow of PTE.I bits will
4075d3876a8SDavid Hildenbrand 	 * have the same effect as for KVM_S390_VM_CPU_FEAT_SKEY.
4085d3876a8SDavid Hildenbrand 	 *
4095d3876a8SDavid Hildenbrand 	 * For KVM_S390_VM_CPU_FEAT_SKEY, KVM_S390_VM_CPU_FEAT_CMMA and
4105d3876a8SDavid Hildenbrand 	 * KVM_S390_VM_CPU_FEAT_PFMFI, all PTE.I and PGSTE bits have to be
4115d3876a8SDavid Hildenbrand 	 * correctly shadowed. We can do that for the PGSTE but not for PTE.I.
4125d3876a8SDavid Hildenbrand 	 *
4135d3876a8SDavid Hildenbrand 	 * KVM_S390_VM_CPU_FEAT_SIGPIF: Wrong SCB addresses in the SCA. We
4145d3876a8SDavid Hildenbrand 	 * cannot easily shadow the SCA because of the ipte lock.
4155d3876a8SDavid Hildenbrand 	 */
41622be5a13SDavid Hildenbrand }
41722be5a13SDavid Hildenbrand 
418b0c632dbSHeiko Carstens int kvm_arch_init(void *opaque)
419b0c632dbSHeiko Carstens {
42078f26131SChristian Borntraeger 	kvm_s390_dbf = debug_register("kvm-trace", 32, 1, 7 * sizeof(long));
42178f26131SChristian Borntraeger 	if (!kvm_s390_dbf)
42278f26131SChristian Borntraeger 		return -ENOMEM;
42378f26131SChristian Borntraeger 
42478f26131SChristian Borntraeger 	if (debug_register_view(kvm_s390_dbf, &debug_sprintf_view)) {
42578f26131SChristian Borntraeger 		debug_unregister(kvm_s390_dbf);
42678f26131SChristian Borntraeger 		return -ENOMEM;
42778f26131SChristian Borntraeger 	}
42878f26131SChristian Borntraeger 
42922be5a13SDavid Hildenbrand 	kvm_s390_cpu_feat_init();
43022be5a13SDavid Hildenbrand 
43184877d93SCornelia Huck 	/* Register floating interrupt controller interface. */
43284877d93SCornelia Huck 	return kvm_register_device_ops(&kvm_flic_ops, KVM_DEV_TYPE_FLIC);
433b0c632dbSHeiko Carstens }
434b0c632dbSHeiko Carstens 
43578f26131SChristian Borntraeger void kvm_arch_exit(void)
43678f26131SChristian Borntraeger {
43778f26131SChristian Borntraeger 	debug_unregister(kvm_s390_dbf);
43878f26131SChristian Borntraeger }
43978f26131SChristian Borntraeger 
440b0c632dbSHeiko Carstens /* Section: device related */
441b0c632dbSHeiko Carstens long kvm_arch_dev_ioctl(struct file *filp,
442b0c632dbSHeiko Carstens 			unsigned int ioctl, unsigned long arg)
443b0c632dbSHeiko Carstens {
444b0c632dbSHeiko Carstens 	if (ioctl == KVM_S390_ENABLE_SIE)
445b0c632dbSHeiko Carstens 		return s390_enable_sie();
446b0c632dbSHeiko Carstens 	return -EINVAL;
447b0c632dbSHeiko Carstens }
448b0c632dbSHeiko Carstens 
449784aa3d7SAlexander Graf int kvm_vm_ioctl_check_extension(struct kvm *kvm, long ext)
450b0c632dbSHeiko Carstens {
451d7b0b5ebSCarsten Otte 	int r;
452d7b0b5ebSCarsten Otte 
4532bd0ac4eSCarsten Otte 	switch (ext) {
454d7b0b5ebSCarsten Otte 	case KVM_CAP_S390_PSW:
455b6cf8788SChristian Borntraeger 	case KVM_CAP_S390_GMAP:
45652e16b18SChristian Borntraeger 	case KVM_CAP_SYNC_MMU:
4571efd0f59SCarsten Otte #ifdef CONFIG_KVM_S390_UCONTROL
4581efd0f59SCarsten Otte 	case KVM_CAP_S390_UCONTROL:
4591efd0f59SCarsten Otte #endif
4603c038e6bSDominik Dingel 	case KVM_CAP_ASYNC_PF:
46160b413c9SChristian Borntraeger 	case KVM_CAP_SYNC_REGS:
46214eebd91SCarsten Otte 	case KVM_CAP_ONE_REG:
463d6712df9SCornelia Huck 	case KVM_CAP_ENABLE_CAP:
464fa6b7fe9SCornelia Huck 	case KVM_CAP_S390_CSS_SUPPORT:
46510ccaa1eSCornelia Huck 	case KVM_CAP_IOEVENTFD:
466c05c4186SJens Freimann 	case KVM_CAP_DEVICE_CTRL:
467d938dc55SCornelia Huck 	case KVM_CAP_ENABLE_CAP_VM:
46878599d90SCornelia Huck 	case KVM_CAP_S390_IRQCHIP:
469f2061656SDominik Dingel 	case KVM_CAP_VM_ATTRIBUTES:
4706352e4d2SDavid Hildenbrand 	case KVM_CAP_MP_STATE:
471460df4c1SPaolo Bonzini 	case KVM_CAP_IMMEDIATE_EXIT:
47247b43c52SJens Freimann 	case KVM_CAP_S390_INJECT_IRQ:
4732444b352SDavid Hildenbrand 	case KVM_CAP_S390_USER_SIGP:
474e44fc8c9SEkaterina Tumanova 	case KVM_CAP_S390_USER_STSI:
47530ee2a98SJason J. Herne 	case KVM_CAP_S390_SKEYS:
476816c7667SJens Freimann 	case KVM_CAP_S390_IRQ_STATE:
4776502a34cSDavid Hildenbrand 	case KVM_CAP_S390_USER_INSTR0:
4784036e387SClaudio Imbrenda 	case KVM_CAP_S390_CMMA_MIGRATION:
47947a4693eSYi Min Zhao 	case KVM_CAP_S390_AIS:
480da9a1446SChristian Borntraeger 	case KVM_CAP_S390_AIS_MIGRATION:
481d7b0b5ebSCarsten Otte 		r = 1;
482d7b0b5ebSCarsten Otte 		break;
483a4499382SJanosch Frank 	case KVM_CAP_S390_HPAGE_1M:
484a4499382SJanosch Frank 		r = 0;
485a4499382SJanosch Frank 		if (hpage)
486a4499382SJanosch Frank 			r = 1;
487a4499382SJanosch Frank 		break;
48841408c28SThomas Huth 	case KVM_CAP_S390_MEM_OP:
48941408c28SThomas Huth 		r = MEM_OP_MAX_SIZE;
49041408c28SThomas Huth 		break;
491e726b1bdSChristian Borntraeger 	case KVM_CAP_NR_VCPUS:
492e726b1bdSChristian Borntraeger 	case KVM_CAP_MAX_VCPUS:
49376a6dd72SDavid Hildenbrand 		r = KVM_S390_BSCA_CPU_SLOTS;
494a6940674SDavid Hildenbrand 		if (!kvm_s390_use_sca_entries())
495a6940674SDavid Hildenbrand 			r = KVM_MAX_VCPUS;
496a6940674SDavid Hildenbrand 		else if (sclp.has_esca && sclp.has_64bscao)
49776a6dd72SDavid Hildenbrand 			r = KVM_S390_ESCA_CPU_SLOTS;
498e726b1bdSChristian Borntraeger 		break;
499e1e2e605SNick Wang 	case KVM_CAP_NR_MEMSLOTS:
500e1e2e605SNick Wang 		r = KVM_USER_MEM_SLOTS;
501e1e2e605SNick Wang 		break;
5021526bf9cSChristian Borntraeger 	case KVM_CAP_S390_COW:
503abf09bedSMartin Schwidefsky 		r = MACHINE_HAS_ESOP;
5041526bf9cSChristian Borntraeger 		break;
50568c55750SEric Farman 	case KVM_CAP_S390_VECTOR_REGISTERS:
50668c55750SEric Farman 		r = MACHINE_HAS_VX;
50768c55750SEric Farman 		break;
508c6e5f166SFan Zhang 	case KVM_CAP_S390_RI:
509c6e5f166SFan Zhang 		r = test_facility(64);
510c6e5f166SFan Zhang 		break;
5114e0b1ab7SFan Zhang 	case KVM_CAP_S390_GS:
5124e0b1ab7SFan Zhang 		r = test_facility(133);
5134e0b1ab7SFan Zhang 		break;
51435b3fde6SChristian Borntraeger 	case KVM_CAP_S390_BPB:
51535b3fde6SChristian Borntraeger 		r = test_facility(82);
51635b3fde6SChristian Borntraeger 		break;
5172bd0ac4eSCarsten Otte 	default:
518d7b0b5ebSCarsten Otte 		r = 0;
519b0c632dbSHeiko Carstens 	}
520d7b0b5ebSCarsten Otte 	return r;
5212bd0ac4eSCarsten Otte }
522b0c632dbSHeiko Carstens 
52315f36ebdSJason J. Herne static void kvm_s390_sync_dirty_log(struct kvm *kvm,
52415f36ebdSJason J. Herne 				    struct kvm_memory_slot *memslot)
52515f36ebdSJason J. Herne {
5260959e168SJanosch Frank 	int i;
52715f36ebdSJason J. Herne 	gfn_t cur_gfn, last_gfn;
5280959e168SJanosch Frank 	unsigned long gaddr, vmaddr;
52915f36ebdSJason J. Herne 	struct gmap *gmap = kvm->arch.gmap;
5300959e168SJanosch Frank 	DECLARE_BITMAP(bitmap, _PAGE_ENTRIES);
53115f36ebdSJason J. Herne 
5320959e168SJanosch Frank 	/* Loop over all guest segments */
5330959e168SJanosch Frank 	cur_gfn = memslot->base_gfn;
53415f36ebdSJason J. Herne 	last_gfn = memslot->base_gfn + memslot->npages;
5350959e168SJanosch Frank 	for (; cur_gfn <= last_gfn; cur_gfn += _PAGE_ENTRIES) {
5360959e168SJanosch Frank 		gaddr = gfn_to_gpa(cur_gfn);
5370959e168SJanosch Frank 		vmaddr = gfn_to_hva_memslot(memslot, cur_gfn);
5380959e168SJanosch Frank 		if (kvm_is_error_hva(vmaddr))
5390959e168SJanosch Frank 			continue;
54015f36ebdSJason J. Herne 
5410959e168SJanosch Frank 		bitmap_zero(bitmap, _PAGE_ENTRIES);
5420959e168SJanosch Frank 		gmap_sync_dirty_log_pmd(gmap, bitmap, gaddr, vmaddr);
5430959e168SJanosch Frank 		for (i = 0; i < _PAGE_ENTRIES; i++) {
5440959e168SJanosch Frank 			if (test_bit(i, bitmap))
5450959e168SJanosch Frank 				mark_page_dirty(kvm, cur_gfn + i);
5460959e168SJanosch Frank 		}
5470959e168SJanosch Frank 
5481763f8d0SChristian Borntraeger 		if (fatal_signal_pending(current))
5491763f8d0SChristian Borntraeger 			return;
55070c88a00SChristian Borntraeger 		cond_resched();
55115f36ebdSJason J. Herne 	}
55215f36ebdSJason J. Herne }
55315f36ebdSJason J. Herne 
554b0c632dbSHeiko Carstens /* Section: vm related */
555a6e2f683SEugene (jno) Dvurechenski static void sca_del_vcpu(struct kvm_vcpu *vcpu);
556a6e2f683SEugene (jno) Dvurechenski 
557b0c632dbSHeiko Carstens /*
558b0c632dbSHeiko Carstens  * Get (and clear) the dirty memory log for a memory slot.
559b0c632dbSHeiko Carstens  */
560b0c632dbSHeiko Carstens int kvm_vm_ioctl_get_dirty_log(struct kvm *kvm,
561b0c632dbSHeiko Carstens 			       struct kvm_dirty_log *log)
562b0c632dbSHeiko Carstens {
56315f36ebdSJason J. Herne 	int r;
56415f36ebdSJason J. Herne 	unsigned long n;
5659f6b8029SPaolo Bonzini 	struct kvm_memslots *slots;
56615f36ebdSJason J. Herne 	struct kvm_memory_slot *memslot;
56715f36ebdSJason J. Herne 	int is_dirty = 0;
56815f36ebdSJason J. Herne 
569e1e8a962SJanosch Frank 	if (kvm_is_ucontrol(kvm))
570e1e8a962SJanosch Frank 		return -EINVAL;
571e1e8a962SJanosch Frank 
57215f36ebdSJason J. Herne 	mutex_lock(&kvm->slots_lock);
57315f36ebdSJason J. Herne 
57415f36ebdSJason J. Herne 	r = -EINVAL;
57515f36ebdSJason J. Herne 	if (log->slot >= KVM_USER_MEM_SLOTS)
57615f36ebdSJason J. Herne 		goto out;
57715f36ebdSJason J. Herne 
5789f6b8029SPaolo Bonzini 	slots = kvm_memslots(kvm);
5799f6b8029SPaolo Bonzini 	memslot = id_to_memslot(slots, log->slot);
58015f36ebdSJason J. Herne 	r = -ENOENT;
58115f36ebdSJason J. Herne 	if (!memslot->dirty_bitmap)
58215f36ebdSJason J. Herne 		goto out;
58315f36ebdSJason J. Herne 
58415f36ebdSJason J. Herne 	kvm_s390_sync_dirty_log(kvm, memslot);
58515f36ebdSJason J. Herne 	r = kvm_get_dirty_log(kvm, log, &is_dirty);
58615f36ebdSJason J. Herne 	if (r)
58715f36ebdSJason J. Herne 		goto out;
58815f36ebdSJason J. Herne 
58915f36ebdSJason J. Herne 	/* Clear the dirty log */
59015f36ebdSJason J. Herne 	if (is_dirty) {
59115f36ebdSJason J. Herne 		n = kvm_dirty_bitmap_bytes(memslot);
59215f36ebdSJason J. Herne 		memset(memslot->dirty_bitmap, 0, n);
59315f36ebdSJason J. Herne 	}
59415f36ebdSJason J. Herne 	r = 0;
59515f36ebdSJason J. Herne out:
59615f36ebdSJason J. Herne 	mutex_unlock(&kvm->slots_lock);
59715f36ebdSJason J. Herne 	return r;
598b0c632dbSHeiko Carstens }
599b0c632dbSHeiko Carstens 
6006502a34cSDavid Hildenbrand static void icpt_operexc_on_all_vcpus(struct kvm *kvm)
6016502a34cSDavid Hildenbrand {
6026502a34cSDavid Hildenbrand 	unsigned int i;
6036502a34cSDavid Hildenbrand 	struct kvm_vcpu *vcpu;
6046502a34cSDavid Hildenbrand 
6056502a34cSDavid Hildenbrand 	kvm_for_each_vcpu(i, vcpu, kvm) {
6066502a34cSDavid Hildenbrand 		kvm_s390_sync_request(KVM_REQ_ICPT_OPEREXC, vcpu);
6076502a34cSDavid Hildenbrand 	}
6086502a34cSDavid Hildenbrand }
6096502a34cSDavid Hildenbrand 
610d938dc55SCornelia Huck static int kvm_vm_ioctl_enable_cap(struct kvm *kvm, struct kvm_enable_cap *cap)
611d938dc55SCornelia Huck {
612d938dc55SCornelia Huck 	int r;
613d938dc55SCornelia Huck 
614d938dc55SCornelia Huck 	if (cap->flags)
615d938dc55SCornelia Huck 		return -EINVAL;
616d938dc55SCornelia Huck 
617d938dc55SCornelia Huck 	switch (cap->cap) {
61884223598SCornelia Huck 	case KVM_CAP_S390_IRQCHIP:
619c92ea7b9SChristian Borntraeger 		VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_IRQCHIP");
62084223598SCornelia Huck 		kvm->arch.use_irqchip = 1;
62184223598SCornelia Huck 		r = 0;
62284223598SCornelia Huck 		break;
6232444b352SDavid Hildenbrand 	case KVM_CAP_S390_USER_SIGP:
624c92ea7b9SChristian Borntraeger 		VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_USER_SIGP");
6252444b352SDavid Hildenbrand 		kvm->arch.user_sigp = 1;
6262444b352SDavid Hildenbrand 		r = 0;
6272444b352SDavid Hildenbrand 		break;
62868c55750SEric Farman 	case KVM_CAP_S390_VECTOR_REGISTERS:
6295967c17bSDavid Hildenbrand 		mutex_lock(&kvm->lock);
630a03825bbSPaolo Bonzini 		if (kvm->created_vcpus) {
6315967c17bSDavid Hildenbrand 			r = -EBUSY;
6325967c17bSDavid Hildenbrand 		} else if (MACHINE_HAS_VX) {
633c54f0d6aSDavid Hildenbrand 			set_kvm_facility(kvm->arch.model.fac_mask, 129);
634c54f0d6aSDavid Hildenbrand 			set_kvm_facility(kvm->arch.model.fac_list, 129);
6352f87d942SGuenther Hutzl 			if (test_facility(134)) {
6362f87d942SGuenther Hutzl 				set_kvm_facility(kvm->arch.model.fac_mask, 134);
6372f87d942SGuenther Hutzl 				set_kvm_facility(kvm->arch.model.fac_list, 134);
6382f87d942SGuenther Hutzl 			}
63953743aa7SMaxim Samoylov 			if (test_facility(135)) {
64053743aa7SMaxim Samoylov 				set_kvm_facility(kvm->arch.model.fac_mask, 135);
64153743aa7SMaxim Samoylov 				set_kvm_facility(kvm->arch.model.fac_list, 135);
64253743aa7SMaxim Samoylov 			}
64318280d8bSMichael Mueller 			r = 0;
64418280d8bSMichael Mueller 		} else
64518280d8bSMichael Mueller 			r = -EINVAL;
6465967c17bSDavid Hildenbrand 		mutex_unlock(&kvm->lock);
647c92ea7b9SChristian Borntraeger 		VM_EVENT(kvm, 3, "ENABLE: CAP_S390_VECTOR_REGISTERS %s",
648c92ea7b9SChristian Borntraeger 			 r ? "(not available)" : "(success)");
64968c55750SEric Farman 		break;
650c6e5f166SFan Zhang 	case KVM_CAP_S390_RI:
651c6e5f166SFan Zhang 		r = -EINVAL;
652c6e5f166SFan Zhang 		mutex_lock(&kvm->lock);
653a03825bbSPaolo Bonzini 		if (kvm->created_vcpus) {
654c6e5f166SFan Zhang 			r = -EBUSY;
655c6e5f166SFan Zhang 		} else if (test_facility(64)) {
656c54f0d6aSDavid Hildenbrand 			set_kvm_facility(kvm->arch.model.fac_mask, 64);
657c54f0d6aSDavid Hildenbrand 			set_kvm_facility(kvm->arch.model.fac_list, 64);
658c6e5f166SFan Zhang 			r = 0;
659c6e5f166SFan Zhang 		}
660c6e5f166SFan Zhang 		mutex_unlock(&kvm->lock);
661c6e5f166SFan Zhang 		VM_EVENT(kvm, 3, "ENABLE: CAP_S390_RI %s",
662c6e5f166SFan Zhang 			 r ? "(not available)" : "(success)");
663c6e5f166SFan Zhang 		break;
66447a4693eSYi Min Zhao 	case KVM_CAP_S390_AIS:
66547a4693eSYi Min Zhao 		mutex_lock(&kvm->lock);
66647a4693eSYi Min Zhao 		if (kvm->created_vcpus) {
66747a4693eSYi Min Zhao 			r = -EBUSY;
66847a4693eSYi Min Zhao 		} else {
66947a4693eSYi Min Zhao 			set_kvm_facility(kvm->arch.model.fac_mask, 72);
67047a4693eSYi Min Zhao 			set_kvm_facility(kvm->arch.model.fac_list, 72);
67147a4693eSYi Min Zhao 			r = 0;
67247a4693eSYi Min Zhao 		}
67347a4693eSYi Min Zhao 		mutex_unlock(&kvm->lock);
67447a4693eSYi Min Zhao 		VM_EVENT(kvm, 3, "ENABLE: AIS %s",
67547a4693eSYi Min Zhao 			 r ? "(not available)" : "(success)");
67647a4693eSYi Min Zhao 		break;
6774e0b1ab7SFan Zhang 	case KVM_CAP_S390_GS:
6784e0b1ab7SFan Zhang 		r = -EINVAL;
6794e0b1ab7SFan Zhang 		mutex_lock(&kvm->lock);
680241e3ec0SChristian Borntraeger 		if (kvm->created_vcpus) {
6814e0b1ab7SFan Zhang 			r = -EBUSY;
6824e0b1ab7SFan Zhang 		} else if (test_facility(133)) {
6834e0b1ab7SFan Zhang 			set_kvm_facility(kvm->arch.model.fac_mask, 133);
6844e0b1ab7SFan Zhang 			set_kvm_facility(kvm->arch.model.fac_list, 133);
6854e0b1ab7SFan Zhang 			r = 0;
6864e0b1ab7SFan Zhang 		}
6874e0b1ab7SFan Zhang 		mutex_unlock(&kvm->lock);
6884e0b1ab7SFan Zhang 		VM_EVENT(kvm, 3, "ENABLE: CAP_S390_GS %s",
6894e0b1ab7SFan Zhang 			 r ? "(not available)" : "(success)");
6904e0b1ab7SFan Zhang 		break;
691a4499382SJanosch Frank 	case KVM_CAP_S390_HPAGE_1M:
692a4499382SJanosch Frank 		mutex_lock(&kvm->lock);
693a4499382SJanosch Frank 		if (kvm->created_vcpus)
694a4499382SJanosch Frank 			r = -EBUSY;
695a4499382SJanosch Frank 		else if (!hpage || kvm->arch.use_cmma)
696a4499382SJanosch Frank 			r = -EINVAL;
697a4499382SJanosch Frank 		else {
698a4499382SJanosch Frank 			r = 0;
699df88f318SJanosch Frank 			down_write(&kvm->mm->mmap_sem);
700a4499382SJanosch Frank 			kvm->mm->context.allow_gmap_hpage_1m = 1;
701df88f318SJanosch Frank 			up_write(&kvm->mm->mmap_sem);
702a4499382SJanosch Frank 			/*
703a4499382SJanosch Frank 			 * We might have to create fake 4k page
704a4499382SJanosch Frank 			 * tables. To avoid that the hardware works on
705a4499382SJanosch Frank 			 * stale PGSTEs, we emulate these instructions.
706a4499382SJanosch Frank 			 */
707a4499382SJanosch Frank 			kvm->arch.use_skf = 0;
708a4499382SJanosch Frank 			kvm->arch.use_pfmfi = 0;
709a4499382SJanosch Frank 		}
710a4499382SJanosch Frank 		mutex_unlock(&kvm->lock);
711a4499382SJanosch Frank 		VM_EVENT(kvm, 3, "ENABLE: CAP_S390_HPAGE %s",
712a4499382SJanosch Frank 			 r ? "(not available)" : "(success)");
713a4499382SJanosch Frank 		break;
714e44fc8c9SEkaterina Tumanova 	case KVM_CAP_S390_USER_STSI:
715c92ea7b9SChristian Borntraeger 		VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_USER_STSI");
716e44fc8c9SEkaterina Tumanova 		kvm->arch.user_stsi = 1;
717e44fc8c9SEkaterina Tumanova 		r = 0;
718e44fc8c9SEkaterina Tumanova 		break;
7196502a34cSDavid Hildenbrand 	case KVM_CAP_S390_USER_INSTR0:
7206502a34cSDavid Hildenbrand 		VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_USER_INSTR0");
7216502a34cSDavid Hildenbrand 		kvm->arch.user_instr0 = 1;
7226502a34cSDavid Hildenbrand 		icpt_operexc_on_all_vcpus(kvm);
7236502a34cSDavid Hildenbrand 		r = 0;
7246502a34cSDavid Hildenbrand 		break;
725d938dc55SCornelia Huck 	default:
726d938dc55SCornelia Huck 		r = -EINVAL;
727d938dc55SCornelia Huck 		break;
728d938dc55SCornelia Huck 	}
729d938dc55SCornelia Huck 	return r;
730d938dc55SCornelia Huck }
731d938dc55SCornelia Huck 
7328c0a7ce6SDominik Dingel static int kvm_s390_get_mem_control(struct kvm *kvm, struct kvm_device_attr *attr)
7338c0a7ce6SDominik Dingel {
7348c0a7ce6SDominik Dingel 	int ret;
7358c0a7ce6SDominik Dingel 
7368c0a7ce6SDominik Dingel 	switch (attr->attr) {
7378c0a7ce6SDominik Dingel 	case KVM_S390_VM_MEM_LIMIT_SIZE:
7388c0a7ce6SDominik Dingel 		ret = 0;
739c92ea7b9SChristian Borntraeger 		VM_EVENT(kvm, 3, "QUERY: max guest memory: %lu bytes",
740a3a92c31SDominik Dingel 			 kvm->arch.mem_limit);
741a3a92c31SDominik Dingel 		if (put_user(kvm->arch.mem_limit, (u64 __user *)attr->addr))
7428c0a7ce6SDominik Dingel 			ret = -EFAULT;
7438c0a7ce6SDominik Dingel 		break;
7448c0a7ce6SDominik Dingel 	default:
7458c0a7ce6SDominik Dingel 		ret = -ENXIO;
7468c0a7ce6SDominik Dingel 		break;
7478c0a7ce6SDominik Dingel 	}
7488c0a7ce6SDominik Dingel 	return ret;
7498c0a7ce6SDominik Dingel }
7508c0a7ce6SDominik Dingel 
7518c0a7ce6SDominik Dingel static int kvm_s390_set_mem_control(struct kvm *kvm, struct kvm_device_attr *attr)
7524f718eabSDominik Dingel {
7534f718eabSDominik Dingel 	int ret;
7544f718eabSDominik Dingel 	unsigned int idx;
7554f718eabSDominik Dingel 	switch (attr->attr) {
7564f718eabSDominik Dingel 	case KVM_S390_VM_MEM_ENABLE_CMMA:
757f9cbd9b0SDavid Hildenbrand 		ret = -ENXIO;
758c24cc9c8SDavid Hildenbrand 		if (!sclp.has_cmma)
759e6db1d61SDominik Dingel 			break;
760e6db1d61SDominik Dingel 
761c92ea7b9SChristian Borntraeger 		VM_EVENT(kvm, 3, "%s", "ENABLE: CMMA support");
7624f718eabSDominik Dingel 		mutex_lock(&kvm->lock);
763a4499382SJanosch Frank 		if (kvm->created_vcpus)
764a4499382SJanosch Frank 			ret = -EBUSY;
765a4499382SJanosch Frank 		else if (kvm->mm->context.allow_gmap_hpage_1m)
766a4499382SJanosch Frank 			ret = -EINVAL;
767a4499382SJanosch Frank 		else {
7684f718eabSDominik Dingel 			kvm->arch.use_cmma = 1;
769c9f0a2b8SJanosch Frank 			/* Not compatible with cmma. */
770c9f0a2b8SJanosch Frank 			kvm->arch.use_pfmfi = 0;
7714f718eabSDominik Dingel 			ret = 0;
7724f718eabSDominik Dingel 		}
7734f718eabSDominik Dingel 		mutex_unlock(&kvm->lock);
7744f718eabSDominik Dingel 		break;
7754f718eabSDominik Dingel 	case KVM_S390_VM_MEM_CLR_CMMA:
776f9cbd9b0SDavid Hildenbrand 		ret = -ENXIO;
777f9cbd9b0SDavid Hildenbrand 		if (!sclp.has_cmma)
778f9cbd9b0SDavid Hildenbrand 			break;
779c3489155SDominik Dingel 		ret = -EINVAL;
780c3489155SDominik Dingel 		if (!kvm->arch.use_cmma)
781c3489155SDominik Dingel 			break;
782c3489155SDominik Dingel 
783c92ea7b9SChristian Borntraeger 		VM_EVENT(kvm, 3, "%s", "RESET: CMMA states");
7844f718eabSDominik Dingel 		mutex_lock(&kvm->lock);
7854f718eabSDominik Dingel 		idx = srcu_read_lock(&kvm->srcu);
786a13cff31SDominik Dingel 		s390_reset_cmma(kvm->arch.gmap->mm);
7874f718eabSDominik Dingel 		srcu_read_unlock(&kvm->srcu, idx);
7884f718eabSDominik Dingel 		mutex_unlock(&kvm->lock);
7894f718eabSDominik Dingel 		ret = 0;
7904f718eabSDominik Dingel 		break;
7918c0a7ce6SDominik Dingel 	case KVM_S390_VM_MEM_LIMIT_SIZE: {
7928c0a7ce6SDominik Dingel 		unsigned long new_limit;
7938c0a7ce6SDominik Dingel 
7948c0a7ce6SDominik Dingel 		if (kvm_is_ucontrol(kvm))
7958c0a7ce6SDominik Dingel 			return -EINVAL;
7968c0a7ce6SDominik Dingel 
7978c0a7ce6SDominik Dingel 		if (get_user(new_limit, (u64 __user *)attr->addr))
7988c0a7ce6SDominik Dingel 			return -EFAULT;
7998c0a7ce6SDominik Dingel 
800a3a92c31SDominik Dingel 		if (kvm->arch.mem_limit != KVM_S390_NO_MEM_LIMIT &&
801a3a92c31SDominik Dingel 		    new_limit > kvm->arch.mem_limit)
8028c0a7ce6SDominik Dingel 			return -E2BIG;
8038c0a7ce6SDominik Dingel 
804a3a92c31SDominik Dingel 		if (!new_limit)
805a3a92c31SDominik Dingel 			return -EINVAL;
806a3a92c31SDominik Dingel 
8076ea427bbSMartin Schwidefsky 		/* gmap_create takes last usable address */
808a3a92c31SDominik Dingel 		if (new_limit != KVM_S390_NO_MEM_LIMIT)
809a3a92c31SDominik Dingel 			new_limit -= 1;
810a3a92c31SDominik Dingel 
8118c0a7ce6SDominik Dingel 		ret = -EBUSY;
8128c0a7ce6SDominik Dingel 		mutex_lock(&kvm->lock);
813a03825bbSPaolo Bonzini 		if (!kvm->created_vcpus) {
8146ea427bbSMartin Schwidefsky 			/* gmap_create will round the limit up */
8156ea427bbSMartin Schwidefsky 			struct gmap *new = gmap_create(current->mm, new_limit);
8168c0a7ce6SDominik Dingel 
8178c0a7ce6SDominik Dingel 			if (!new) {
8188c0a7ce6SDominik Dingel 				ret = -ENOMEM;
8198c0a7ce6SDominik Dingel 			} else {
8206ea427bbSMartin Schwidefsky 				gmap_remove(kvm->arch.gmap);
8218c0a7ce6SDominik Dingel 				new->private = kvm;
8228c0a7ce6SDominik Dingel 				kvm->arch.gmap = new;
8238c0a7ce6SDominik Dingel 				ret = 0;
8248c0a7ce6SDominik Dingel 			}
8258c0a7ce6SDominik Dingel 		}
8268c0a7ce6SDominik Dingel 		mutex_unlock(&kvm->lock);
827a3a92c31SDominik Dingel 		VM_EVENT(kvm, 3, "SET: max guest address: %lu", new_limit);
828a3a92c31SDominik Dingel 		VM_EVENT(kvm, 3, "New guest asce: 0x%pK",
829a3a92c31SDominik Dingel 			 (void *) kvm->arch.gmap->asce);
8308c0a7ce6SDominik Dingel 		break;
8318c0a7ce6SDominik Dingel 	}
8324f718eabSDominik Dingel 	default:
8334f718eabSDominik Dingel 		ret = -ENXIO;
8344f718eabSDominik Dingel 		break;
8354f718eabSDominik Dingel 	}
8364f718eabSDominik Dingel 	return ret;
8374f718eabSDominik Dingel }
8384f718eabSDominik Dingel 
839a374e892STony Krowiak static void kvm_s390_vcpu_crypto_setup(struct kvm_vcpu *vcpu);
840a374e892STony Krowiak 
84120c922f0STony Krowiak void kvm_s390_vcpu_crypto_reset_all(struct kvm *kvm)
842a374e892STony Krowiak {
843a374e892STony Krowiak 	struct kvm_vcpu *vcpu;
844a374e892STony Krowiak 	int i;
845a374e892STony Krowiak 
84620c922f0STony Krowiak 	kvm_s390_vcpu_block_all(kvm);
84720c922f0STony Krowiak 
8483194cdb7SDavid Hildenbrand 	kvm_for_each_vcpu(i, vcpu, kvm) {
84920c922f0STony Krowiak 		kvm_s390_vcpu_crypto_setup(vcpu);
8503194cdb7SDavid Hildenbrand 		/* recreate the shadow crycb by leaving the VSIE handler */
8513194cdb7SDavid Hildenbrand 		kvm_s390_sync_request(KVM_REQ_VSIE_RESTART, vcpu);
8523194cdb7SDavid Hildenbrand 	}
85320c922f0STony Krowiak 
85420c922f0STony Krowiak 	kvm_s390_vcpu_unblock_all(kvm);
85520c922f0STony Krowiak }
85620c922f0STony Krowiak 
85720c922f0STony Krowiak static int kvm_s390_vm_set_crypto(struct kvm *kvm, struct kvm_device_attr *attr)
85820c922f0STony Krowiak {
859a374e892STony Krowiak 	mutex_lock(&kvm->lock);
860a374e892STony Krowiak 	switch (attr->attr) {
861a374e892STony Krowiak 	case KVM_S390_VM_CRYPTO_ENABLE_AES_KW:
8628e41bd54SChristian Borntraeger 		if (!test_kvm_facility(kvm, 76)) {
8638e41bd54SChristian Borntraeger 			mutex_unlock(&kvm->lock);
86437940fb0STony Krowiak 			return -EINVAL;
8658e41bd54SChristian Borntraeger 		}
866a374e892STony Krowiak 		get_random_bytes(
867a374e892STony Krowiak 			kvm->arch.crypto.crycb->aes_wrapping_key_mask,
868a374e892STony Krowiak 			sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask));
869a374e892STony Krowiak 		kvm->arch.crypto.aes_kw = 1;
870c92ea7b9SChristian Borntraeger 		VM_EVENT(kvm, 3, "%s", "ENABLE: AES keywrapping support");
871a374e892STony Krowiak 		break;
872a374e892STony Krowiak 	case KVM_S390_VM_CRYPTO_ENABLE_DEA_KW:
8738e41bd54SChristian Borntraeger 		if (!test_kvm_facility(kvm, 76)) {
8748e41bd54SChristian Borntraeger 			mutex_unlock(&kvm->lock);
87537940fb0STony Krowiak 			return -EINVAL;
8768e41bd54SChristian Borntraeger 		}
877a374e892STony Krowiak 		get_random_bytes(
878a374e892STony Krowiak 			kvm->arch.crypto.crycb->dea_wrapping_key_mask,
879a374e892STony Krowiak 			sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask));
880a374e892STony Krowiak 		kvm->arch.crypto.dea_kw = 1;
881c92ea7b9SChristian Borntraeger 		VM_EVENT(kvm, 3, "%s", "ENABLE: DEA keywrapping support");
882a374e892STony Krowiak 		break;
883a374e892STony Krowiak 	case KVM_S390_VM_CRYPTO_DISABLE_AES_KW:
8848e41bd54SChristian Borntraeger 		if (!test_kvm_facility(kvm, 76)) {
8858e41bd54SChristian Borntraeger 			mutex_unlock(&kvm->lock);
88637940fb0STony Krowiak 			return -EINVAL;
8878e41bd54SChristian Borntraeger 		}
888a374e892STony Krowiak 		kvm->arch.crypto.aes_kw = 0;
889a374e892STony Krowiak 		memset(kvm->arch.crypto.crycb->aes_wrapping_key_mask, 0,
890a374e892STony Krowiak 			sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask));
891c92ea7b9SChristian Borntraeger 		VM_EVENT(kvm, 3, "%s", "DISABLE: AES keywrapping support");
892a374e892STony Krowiak 		break;
893a374e892STony Krowiak 	case KVM_S390_VM_CRYPTO_DISABLE_DEA_KW:
8948e41bd54SChristian Borntraeger 		if (!test_kvm_facility(kvm, 76)) {
8958e41bd54SChristian Borntraeger 			mutex_unlock(&kvm->lock);
89637940fb0STony Krowiak 			return -EINVAL;
8978e41bd54SChristian Borntraeger 		}
898a374e892STony Krowiak 		kvm->arch.crypto.dea_kw = 0;
899a374e892STony Krowiak 		memset(kvm->arch.crypto.crycb->dea_wrapping_key_mask, 0,
900a374e892STony Krowiak 			sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask));
901c92ea7b9SChristian Borntraeger 		VM_EVENT(kvm, 3, "%s", "DISABLE: DEA keywrapping support");
902a374e892STony Krowiak 		break;
90337940fb0STony Krowiak 	case KVM_S390_VM_CRYPTO_ENABLE_APIE:
90437940fb0STony Krowiak 		if (!ap_instructions_available()) {
90537940fb0STony Krowiak 			mutex_unlock(&kvm->lock);
90637940fb0STony Krowiak 			return -EOPNOTSUPP;
90737940fb0STony Krowiak 		}
90837940fb0STony Krowiak 		kvm->arch.crypto.apie = 1;
90937940fb0STony Krowiak 		break;
91037940fb0STony Krowiak 	case KVM_S390_VM_CRYPTO_DISABLE_APIE:
91137940fb0STony Krowiak 		if (!ap_instructions_available()) {
91237940fb0STony Krowiak 			mutex_unlock(&kvm->lock);
91337940fb0STony Krowiak 			return -EOPNOTSUPP;
91437940fb0STony Krowiak 		}
91537940fb0STony Krowiak 		kvm->arch.crypto.apie = 0;
91637940fb0STony Krowiak 		break;
917a374e892STony Krowiak 	default:
918a374e892STony Krowiak 		mutex_unlock(&kvm->lock);
919a374e892STony Krowiak 		return -ENXIO;
920a374e892STony Krowiak 	}
921a374e892STony Krowiak 
92220c922f0STony Krowiak 	kvm_s390_vcpu_crypto_reset_all(kvm);
923a374e892STony Krowiak 	mutex_unlock(&kvm->lock);
924a374e892STony Krowiak 	return 0;
925a374e892STony Krowiak }
926a374e892STony Krowiak 
927190df4a2SClaudio Imbrenda static void kvm_s390_sync_request_broadcast(struct kvm *kvm, int req)
928190df4a2SClaudio Imbrenda {
929190df4a2SClaudio Imbrenda 	int cx;
930190df4a2SClaudio Imbrenda 	struct kvm_vcpu *vcpu;
931190df4a2SClaudio Imbrenda 
932190df4a2SClaudio Imbrenda 	kvm_for_each_vcpu(cx, vcpu, kvm)
933190df4a2SClaudio Imbrenda 		kvm_s390_sync_request(req, vcpu);
934190df4a2SClaudio Imbrenda }
935190df4a2SClaudio Imbrenda 
936190df4a2SClaudio Imbrenda /*
937190df4a2SClaudio Imbrenda  * Must be called with kvm->srcu held to avoid races on memslots, and with
9381de1ea7eSChristian Borntraeger  * kvm->slots_lock to avoid races with ourselves and kvm_s390_vm_stop_migration.
939190df4a2SClaudio Imbrenda  */
940190df4a2SClaudio Imbrenda static int kvm_s390_vm_start_migration(struct kvm *kvm)
941190df4a2SClaudio Imbrenda {
942190df4a2SClaudio Imbrenda 	struct kvm_memory_slot *ms;
943190df4a2SClaudio Imbrenda 	struct kvm_memslots *slots;
944afdad616SClaudio Imbrenda 	unsigned long ram_pages = 0;
945190df4a2SClaudio Imbrenda 	int slotnr;
946190df4a2SClaudio Imbrenda 
947190df4a2SClaudio Imbrenda 	/* migration mode already enabled */
948afdad616SClaudio Imbrenda 	if (kvm->arch.migration_mode)
949190df4a2SClaudio Imbrenda 		return 0;
950190df4a2SClaudio Imbrenda 	slots = kvm_memslots(kvm);
951190df4a2SClaudio Imbrenda 	if (!slots || !slots->used_slots)
952190df4a2SClaudio Imbrenda 		return -EINVAL;
953190df4a2SClaudio Imbrenda 
954afdad616SClaudio Imbrenda 	if (!kvm->arch.use_cmma) {
955afdad616SClaudio Imbrenda 		kvm->arch.migration_mode = 1;
956afdad616SClaudio Imbrenda 		return 0;
957190df4a2SClaudio Imbrenda 	}
958190df4a2SClaudio Imbrenda 	/* mark all the pages in active slots as dirty */
959190df4a2SClaudio Imbrenda 	for (slotnr = 0; slotnr < slots->used_slots; slotnr++) {
960190df4a2SClaudio Imbrenda 		ms = slots->memslots + slotnr;
961afdad616SClaudio Imbrenda 		/*
962afdad616SClaudio Imbrenda 		 * The second half of the bitmap is only used on x86,
963afdad616SClaudio Imbrenda 		 * and would be wasted otherwise, so we put it to good
964afdad616SClaudio Imbrenda 		 * use here to keep track of the state of the storage
965afdad616SClaudio Imbrenda 		 * attributes.
966afdad616SClaudio Imbrenda 		 */
967afdad616SClaudio Imbrenda 		memset(kvm_second_dirty_bitmap(ms), 0xff, kvm_dirty_bitmap_bytes(ms));
968afdad616SClaudio Imbrenda 		ram_pages += ms->npages;
969190df4a2SClaudio Imbrenda 	}
970afdad616SClaudio Imbrenda 	atomic64_set(&kvm->arch.cmma_dirty_pages, ram_pages);
971afdad616SClaudio Imbrenda 	kvm->arch.migration_mode = 1;
972190df4a2SClaudio Imbrenda 	kvm_s390_sync_request_broadcast(kvm, KVM_REQ_START_MIGRATION);
973190df4a2SClaudio Imbrenda 	return 0;
974190df4a2SClaudio Imbrenda }
975190df4a2SClaudio Imbrenda 
976190df4a2SClaudio Imbrenda /*
9771de1ea7eSChristian Borntraeger  * Must be called with kvm->slots_lock to avoid races with ourselves and
978190df4a2SClaudio Imbrenda  * kvm_s390_vm_start_migration.
979190df4a2SClaudio Imbrenda  */
980190df4a2SClaudio Imbrenda static int kvm_s390_vm_stop_migration(struct kvm *kvm)
981190df4a2SClaudio Imbrenda {
982190df4a2SClaudio Imbrenda 	/* migration mode already disabled */
983afdad616SClaudio Imbrenda 	if (!kvm->arch.migration_mode)
984190df4a2SClaudio Imbrenda 		return 0;
985afdad616SClaudio Imbrenda 	kvm->arch.migration_mode = 0;
986afdad616SClaudio Imbrenda 	if (kvm->arch.use_cmma)
987190df4a2SClaudio Imbrenda 		kvm_s390_sync_request_broadcast(kvm, KVM_REQ_STOP_MIGRATION);
988190df4a2SClaudio Imbrenda 	return 0;
989190df4a2SClaudio Imbrenda }
990190df4a2SClaudio Imbrenda 
991190df4a2SClaudio Imbrenda static int kvm_s390_vm_set_migration(struct kvm *kvm,
992190df4a2SClaudio Imbrenda 				     struct kvm_device_attr *attr)
993190df4a2SClaudio Imbrenda {
9941de1ea7eSChristian Borntraeger 	int res = -ENXIO;
995190df4a2SClaudio Imbrenda 
9961de1ea7eSChristian Borntraeger 	mutex_lock(&kvm->slots_lock);
997190df4a2SClaudio Imbrenda 	switch (attr->attr) {
998190df4a2SClaudio Imbrenda 	case KVM_S390_VM_MIGRATION_START:
999190df4a2SClaudio Imbrenda 		res = kvm_s390_vm_start_migration(kvm);
1000190df4a2SClaudio Imbrenda 		break;
1001190df4a2SClaudio Imbrenda 	case KVM_S390_VM_MIGRATION_STOP:
1002190df4a2SClaudio Imbrenda 		res = kvm_s390_vm_stop_migration(kvm);
1003190df4a2SClaudio Imbrenda 		break;
1004190df4a2SClaudio Imbrenda 	default:
1005190df4a2SClaudio Imbrenda 		break;
1006190df4a2SClaudio Imbrenda 	}
10071de1ea7eSChristian Borntraeger 	mutex_unlock(&kvm->slots_lock);
1008190df4a2SClaudio Imbrenda 
1009190df4a2SClaudio Imbrenda 	return res;
1010190df4a2SClaudio Imbrenda }
1011190df4a2SClaudio Imbrenda 
1012190df4a2SClaudio Imbrenda static int kvm_s390_vm_get_migration(struct kvm *kvm,
1013190df4a2SClaudio Imbrenda 				     struct kvm_device_attr *attr)
1014190df4a2SClaudio Imbrenda {
1015afdad616SClaudio Imbrenda 	u64 mig = kvm->arch.migration_mode;
1016190df4a2SClaudio Imbrenda 
1017190df4a2SClaudio Imbrenda 	if (attr->attr != KVM_S390_VM_MIGRATION_STATUS)
1018190df4a2SClaudio Imbrenda 		return -ENXIO;
1019190df4a2SClaudio Imbrenda 
1020190df4a2SClaudio Imbrenda 	if (copy_to_user((void __user *)attr->addr, &mig, sizeof(mig)))
1021190df4a2SClaudio Imbrenda 		return -EFAULT;
1022190df4a2SClaudio Imbrenda 	return 0;
1023190df4a2SClaudio Imbrenda }
1024190df4a2SClaudio Imbrenda 
10258fa1696eSCollin L. Walling static int kvm_s390_set_tod_ext(struct kvm *kvm, struct kvm_device_attr *attr)
10268fa1696eSCollin L. Walling {
10278fa1696eSCollin L. Walling 	struct kvm_s390_vm_tod_clock gtod;
10288fa1696eSCollin L. Walling 
10298fa1696eSCollin L. Walling 	if (copy_from_user(&gtod, (void __user *)attr->addr, sizeof(gtod)))
10308fa1696eSCollin L. Walling 		return -EFAULT;
10318fa1696eSCollin L. Walling 
10320e7def5fSDavid Hildenbrand 	if (!test_kvm_facility(kvm, 139) && gtod.epoch_idx)
10338fa1696eSCollin L. Walling 		return -EINVAL;
10340e7def5fSDavid Hildenbrand 	kvm_s390_set_tod_clock(kvm, &gtod);
10358fa1696eSCollin L. Walling 
10368fa1696eSCollin L. Walling 	VM_EVENT(kvm, 3, "SET: TOD extension: 0x%x, TOD base: 0x%llx",
10378fa1696eSCollin L. Walling 		gtod.epoch_idx, gtod.tod);
10388fa1696eSCollin L. Walling 
10398fa1696eSCollin L. Walling 	return 0;
10408fa1696eSCollin L. Walling }
10418fa1696eSCollin L. Walling 
104272f25020SJason J. Herne static int kvm_s390_set_tod_high(struct kvm *kvm, struct kvm_device_attr *attr)
104372f25020SJason J. Herne {
104472f25020SJason J. Herne 	u8 gtod_high;
104572f25020SJason J. Herne 
104672f25020SJason J. Herne 	if (copy_from_user(&gtod_high, (void __user *)attr->addr,
104772f25020SJason J. Herne 					   sizeof(gtod_high)))
104872f25020SJason J. Herne 		return -EFAULT;
104972f25020SJason J. Herne 
105072f25020SJason J. Herne 	if (gtod_high != 0)
105172f25020SJason J. Herne 		return -EINVAL;
105258c383c6SChristian Borntraeger 	VM_EVENT(kvm, 3, "SET: TOD extension: 0x%x", gtod_high);
105372f25020SJason J. Herne 
105472f25020SJason J. Herne 	return 0;
105572f25020SJason J. Herne }
105672f25020SJason J. Herne 
105772f25020SJason J. Herne static int kvm_s390_set_tod_low(struct kvm *kvm, struct kvm_device_attr *attr)
105872f25020SJason J. Herne {
10590e7def5fSDavid Hildenbrand 	struct kvm_s390_vm_tod_clock gtod = { 0 };
106072f25020SJason J. Herne 
10610e7def5fSDavid Hildenbrand 	if (copy_from_user(&gtod.tod, (void __user *)attr->addr,
10620e7def5fSDavid Hildenbrand 			   sizeof(gtod.tod)))
106372f25020SJason J. Herne 		return -EFAULT;
106472f25020SJason J. Herne 
10650e7def5fSDavid Hildenbrand 	kvm_s390_set_tod_clock(kvm, &gtod);
10660e7def5fSDavid Hildenbrand 	VM_EVENT(kvm, 3, "SET: TOD base: 0x%llx", gtod.tod);
106772f25020SJason J. Herne 	return 0;
106872f25020SJason J. Herne }
106972f25020SJason J. Herne 
107072f25020SJason J. Herne static int kvm_s390_set_tod(struct kvm *kvm, struct kvm_device_attr *attr)
107172f25020SJason J. Herne {
107272f25020SJason J. Herne 	int ret;
107372f25020SJason J. Herne 
107472f25020SJason J. Herne 	if (attr->flags)
107572f25020SJason J. Herne 		return -EINVAL;
107672f25020SJason J. Herne 
107772f25020SJason J. Herne 	switch (attr->attr) {
10788fa1696eSCollin L. Walling 	case KVM_S390_VM_TOD_EXT:
10798fa1696eSCollin L. Walling 		ret = kvm_s390_set_tod_ext(kvm, attr);
10808fa1696eSCollin L. Walling 		break;
108172f25020SJason J. Herne 	case KVM_S390_VM_TOD_HIGH:
108272f25020SJason J. Herne 		ret = kvm_s390_set_tod_high(kvm, attr);
108372f25020SJason J. Herne 		break;
108472f25020SJason J. Herne 	case KVM_S390_VM_TOD_LOW:
108572f25020SJason J. Herne 		ret = kvm_s390_set_tod_low(kvm, attr);
108672f25020SJason J. Herne 		break;
108772f25020SJason J. Herne 	default:
108872f25020SJason J. Herne 		ret = -ENXIO;
108972f25020SJason J. Herne 		break;
109072f25020SJason J. Herne 	}
109172f25020SJason J. Herne 	return ret;
109272f25020SJason J. Herne }
109372f25020SJason J. Herne 
109433d1b272SDavid Hildenbrand static void kvm_s390_get_tod_clock(struct kvm *kvm,
10958fa1696eSCollin L. Walling 				   struct kvm_s390_vm_tod_clock *gtod)
10968fa1696eSCollin L. Walling {
10978fa1696eSCollin L. Walling 	struct kvm_s390_tod_clock_ext htod;
10988fa1696eSCollin L. Walling 
10998fa1696eSCollin L. Walling 	preempt_disable();
11008fa1696eSCollin L. Walling 
11018fa1696eSCollin L. Walling 	get_tod_clock_ext((char *)&htod);
11028fa1696eSCollin L. Walling 
11038fa1696eSCollin L. Walling 	gtod->tod = htod.tod + kvm->arch.epoch;
110433d1b272SDavid Hildenbrand 	gtod->epoch_idx = 0;
110533d1b272SDavid Hildenbrand 	if (test_kvm_facility(kvm, 139)) {
11068fa1696eSCollin L. Walling 		gtod->epoch_idx = htod.epoch_idx + kvm->arch.epdx;
11078fa1696eSCollin L. Walling 		if (gtod->tod < htod.tod)
11088fa1696eSCollin L. Walling 			gtod->epoch_idx += 1;
110933d1b272SDavid Hildenbrand 	}
11108fa1696eSCollin L. Walling 
11118fa1696eSCollin L. Walling 	preempt_enable();
11128fa1696eSCollin L. Walling }
11138fa1696eSCollin L. Walling 
11148fa1696eSCollin L. Walling static int kvm_s390_get_tod_ext(struct kvm *kvm, struct kvm_device_attr *attr)
11158fa1696eSCollin L. Walling {
11168fa1696eSCollin L. Walling 	struct kvm_s390_vm_tod_clock gtod;
11178fa1696eSCollin L. Walling 
11188fa1696eSCollin L. Walling 	memset(&gtod, 0, sizeof(gtod));
111933d1b272SDavid Hildenbrand 	kvm_s390_get_tod_clock(kvm, &gtod);
11208fa1696eSCollin L. Walling 	if (copy_to_user((void __user *)attr->addr, &gtod, sizeof(gtod)))
11218fa1696eSCollin L. Walling 		return -EFAULT;
11228fa1696eSCollin L. Walling 
11238fa1696eSCollin L. Walling 	VM_EVENT(kvm, 3, "QUERY: TOD extension: 0x%x, TOD base: 0x%llx",
11248fa1696eSCollin L. Walling 		gtod.epoch_idx, gtod.tod);
11258fa1696eSCollin L. Walling 	return 0;
11268fa1696eSCollin L. Walling }
11278fa1696eSCollin L. Walling 
112872f25020SJason J. Herne static int kvm_s390_get_tod_high(struct kvm *kvm, struct kvm_device_attr *attr)
112972f25020SJason J. Herne {
113072f25020SJason J. Herne 	u8 gtod_high = 0;
113172f25020SJason J. Herne 
113272f25020SJason J. Herne 	if (copy_to_user((void __user *)attr->addr, &gtod_high,
113372f25020SJason J. Herne 					 sizeof(gtod_high)))
113472f25020SJason J. Herne 		return -EFAULT;
113558c383c6SChristian Borntraeger 	VM_EVENT(kvm, 3, "QUERY: TOD extension: 0x%x", gtod_high);
113672f25020SJason J. Herne 
113772f25020SJason J. Herne 	return 0;
113872f25020SJason J. Herne }
113972f25020SJason J. Herne 
114072f25020SJason J. Herne static int kvm_s390_get_tod_low(struct kvm *kvm, struct kvm_device_attr *attr)
114172f25020SJason J. Herne {
11425a3d883aSDavid Hildenbrand 	u64 gtod;
114372f25020SJason J. Herne 
114460417fccSDavid Hildenbrand 	gtod = kvm_s390_get_tod_clock_fast(kvm);
114572f25020SJason J. Herne 	if (copy_to_user((void __user *)attr->addr, &gtod, sizeof(gtod)))
114672f25020SJason J. Herne 		return -EFAULT;
114758c383c6SChristian Borntraeger 	VM_EVENT(kvm, 3, "QUERY: TOD base: 0x%llx", gtod);
114872f25020SJason J. Herne 
114972f25020SJason J. Herne 	return 0;
115072f25020SJason J. Herne }
115172f25020SJason J. Herne 
115272f25020SJason J. Herne static int kvm_s390_get_tod(struct kvm *kvm, struct kvm_device_attr *attr)
115372f25020SJason J. Herne {
115472f25020SJason J. Herne 	int ret;
115572f25020SJason J. Herne 
115672f25020SJason J. Herne 	if (attr->flags)
115772f25020SJason J. Herne 		return -EINVAL;
115872f25020SJason J. Herne 
115972f25020SJason J. Herne 	switch (attr->attr) {
11608fa1696eSCollin L. Walling 	case KVM_S390_VM_TOD_EXT:
11618fa1696eSCollin L. Walling 		ret = kvm_s390_get_tod_ext(kvm, attr);
11628fa1696eSCollin L. Walling 		break;
116372f25020SJason J. Herne 	case KVM_S390_VM_TOD_HIGH:
116472f25020SJason J. Herne 		ret = kvm_s390_get_tod_high(kvm, attr);
116572f25020SJason J. Herne 		break;
116672f25020SJason J. Herne 	case KVM_S390_VM_TOD_LOW:
116772f25020SJason J. Herne 		ret = kvm_s390_get_tod_low(kvm, attr);
116872f25020SJason J. Herne 		break;
116972f25020SJason J. Herne 	default:
117072f25020SJason J. Herne 		ret = -ENXIO;
117172f25020SJason J. Herne 		break;
117272f25020SJason J. Herne 	}
117372f25020SJason J. Herne 	return ret;
117472f25020SJason J. Herne }
117572f25020SJason J. Herne 
1176658b6edaSMichael Mueller static int kvm_s390_set_processor(struct kvm *kvm, struct kvm_device_attr *attr)
1177658b6edaSMichael Mueller {
1178658b6edaSMichael Mueller 	struct kvm_s390_vm_cpu_processor *proc;
1179053dd230SDavid Hildenbrand 	u16 lowest_ibc, unblocked_ibc;
1180658b6edaSMichael Mueller 	int ret = 0;
1181658b6edaSMichael Mueller 
1182658b6edaSMichael Mueller 	mutex_lock(&kvm->lock);
1183a03825bbSPaolo Bonzini 	if (kvm->created_vcpus) {
1184658b6edaSMichael Mueller 		ret = -EBUSY;
1185658b6edaSMichael Mueller 		goto out;
1186658b6edaSMichael Mueller 	}
1187658b6edaSMichael Mueller 	proc = kzalloc(sizeof(*proc), GFP_KERNEL);
1188658b6edaSMichael Mueller 	if (!proc) {
1189658b6edaSMichael Mueller 		ret = -ENOMEM;
1190658b6edaSMichael Mueller 		goto out;
1191658b6edaSMichael Mueller 	}
1192658b6edaSMichael Mueller 	if (!copy_from_user(proc, (void __user *)attr->addr,
1193658b6edaSMichael Mueller 			    sizeof(*proc))) {
11949bb0ec09SDavid Hildenbrand 		kvm->arch.model.cpuid = proc->cpuid;
1195053dd230SDavid Hildenbrand 		lowest_ibc = sclp.ibc >> 16 & 0xfff;
1196053dd230SDavid Hildenbrand 		unblocked_ibc = sclp.ibc & 0xfff;
11970487c44dSDavid Hildenbrand 		if (lowest_ibc && proc->ibc) {
1198053dd230SDavid Hildenbrand 			if (proc->ibc > unblocked_ibc)
1199053dd230SDavid Hildenbrand 				kvm->arch.model.ibc = unblocked_ibc;
1200053dd230SDavid Hildenbrand 			else if (proc->ibc < lowest_ibc)
1201053dd230SDavid Hildenbrand 				kvm->arch.model.ibc = lowest_ibc;
1202053dd230SDavid Hildenbrand 			else
1203658b6edaSMichael Mueller 				kvm->arch.model.ibc = proc->ibc;
1204053dd230SDavid Hildenbrand 		}
1205c54f0d6aSDavid Hildenbrand 		memcpy(kvm->arch.model.fac_list, proc->fac_list,
1206658b6edaSMichael Mueller 		       S390_ARCH_FAC_LIST_SIZE_BYTE);
1207a8c39dd7SChristian Borntraeger 		VM_EVENT(kvm, 3, "SET: guest ibc: 0x%4.4x, guest cpuid: 0x%16.16llx",
1208a8c39dd7SChristian Borntraeger 			 kvm->arch.model.ibc,
1209a8c39dd7SChristian Borntraeger 			 kvm->arch.model.cpuid);
1210a8c39dd7SChristian Borntraeger 		VM_EVENT(kvm, 3, "SET: guest faclist: 0x%16.16llx.%16.16llx.%16.16llx",
1211a8c39dd7SChristian Borntraeger 			 kvm->arch.model.fac_list[0],
1212a8c39dd7SChristian Borntraeger 			 kvm->arch.model.fac_list[1],
1213a8c39dd7SChristian Borntraeger 			 kvm->arch.model.fac_list[2]);
1214658b6edaSMichael Mueller 	} else
1215658b6edaSMichael Mueller 		ret = -EFAULT;
1216658b6edaSMichael Mueller 	kfree(proc);
1217658b6edaSMichael Mueller out:
1218658b6edaSMichael Mueller 	mutex_unlock(&kvm->lock);
1219658b6edaSMichael Mueller 	return ret;
1220658b6edaSMichael Mueller }
1221658b6edaSMichael Mueller 
122215c9705fSDavid Hildenbrand static int kvm_s390_set_processor_feat(struct kvm *kvm,
122315c9705fSDavid Hildenbrand 				       struct kvm_device_attr *attr)
122415c9705fSDavid Hildenbrand {
122515c9705fSDavid Hildenbrand 	struct kvm_s390_vm_cpu_feat data;
122615c9705fSDavid Hildenbrand 
122715c9705fSDavid Hildenbrand 	if (copy_from_user(&data, (void __user *)attr->addr, sizeof(data)))
122815c9705fSDavid Hildenbrand 		return -EFAULT;
122915c9705fSDavid Hildenbrand 	if (!bitmap_subset((unsigned long *) data.feat,
123015c9705fSDavid Hildenbrand 			   kvm_s390_available_cpu_feat,
123115c9705fSDavid Hildenbrand 			   KVM_S390_VM_CPU_FEAT_NR_BITS))
123215c9705fSDavid Hildenbrand 		return -EINVAL;
123315c9705fSDavid Hildenbrand 
123415c9705fSDavid Hildenbrand 	mutex_lock(&kvm->lock);
12352f8311c9SChristian Borntraeger 	if (kvm->created_vcpus) {
12362f8311c9SChristian Borntraeger 		mutex_unlock(&kvm->lock);
12372f8311c9SChristian Borntraeger 		return -EBUSY;
12382f8311c9SChristian Borntraeger 	}
123915c9705fSDavid Hildenbrand 	bitmap_copy(kvm->arch.cpu_feat, (unsigned long *) data.feat,
124015c9705fSDavid Hildenbrand 		    KVM_S390_VM_CPU_FEAT_NR_BITS);
124115c9705fSDavid Hildenbrand 	mutex_unlock(&kvm->lock);
12422f8311c9SChristian Borntraeger 	VM_EVENT(kvm, 3, "SET: guest feat: 0x%16.16llx.0x%16.16llx.0x%16.16llx",
12432f8311c9SChristian Borntraeger 			 data.feat[0],
12442f8311c9SChristian Borntraeger 			 data.feat[1],
12452f8311c9SChristian Borntraeger 			 data.feat[2]);
12462f8311c9SChristian Borntraeger 	return 0;
124715c9705fSDavid Hildenbrand }
124815c9705fSDavid Hildenbrand 
12490a763c78SDavid Hildenbrand static int kvm_s390_set_processor_subfunc(struct kvm *kvm,
12500a763c78SDavid Hildenbrand 					  struct kvm_device_attr *attr)
12510a763c78SDavid Hildenbrand {
12520a763c78SDavid Hildenbrand 	/*
12530a763c78SDavid Hildenbrand 	 * Once supported by kernel + hw, we have to store the subfunctions
12540a763c78SDavid Hildenbrand 	 * in kvm->arch and remember that user space configured them.
12550a763c78SDavid Hildenbrand 	 */
12560a763c78SDavid Hildenbrand 	return -ENXIO;
12570a763c78SDavid Hildenbrand }
12580a763c78SDavid Hildenbrand 
1259658b6edaSMichael Mueller static int kvm_s390_set_cpu_model(struct kvm *kvm, struct kvm_device_attr *attr)
1260658b6edaSMichael Mueller {
1261658b6edaSMichael Mueller 	int ret = -ENXIO;
1262658b6edaSMichael Mueller 
1263658b6edaSMichael Mueller 	switch (attr->attr) {
1264658b6edaSMichael Mueller 	case KVM_S390_VM_CPU_PROCESSOR:
1265658b6edaSMichael Mueller 		ret = kvm_s390_set_processor(kvm, attr);
1266658b6edaSMichael Mueller 		break;
126715c9705fSDavid Hildenbrand 	case KVM_S390_VM_CPU_PROCESSOR_FEAT:
126815c9705fSDavid Hildenbrand 		ret = kvm_s390_set_processor_feat(kvm, attr);
126915c9705fSDavid Hildenbrand 		break;
12700a763c78SDavid Hildenbrand 	case KVM_S390_VM_CPU_PROCESSOR_SUBFUNC:
12710a763c78SDavid Hildenbrand 		ret = kvm_s390_set_processor_subfunc(kvm, attr);
12720a763c78SDavid Hildenbrand 		break;
1273658b6edaSMichael Mueller 	}
1274658b6edaSMichael Mueller 	return ret;
1275658b6edaSMichael Mueller }
1276658b6edaSMichael Mueller 
1277658b6edaSMichael Mueller static int kvm_s390_get_processor(struct kvm *kvm, struct kvm_device_attr *attr)
1278658b6edaSMichael Mueller {
1279658b6edaSMichael Mueller 	struct kvm_s390_vm_cpu_processor *proc;
1280658b6edaSMichael Mueller 	int ret = 0;
1281658b6edaSMichael Mueller 
1282658b6edaSMichael Mueller 	proc = kzalloc(sizeof(*proc), GFP_KERNEL);
1283658b6edaSMichael Mueller 	if (!proc) {
1284658b6edaSMichael Mueller 		ret = -ENOMEM;
1285658b6edaSMichael Mueller 		goto out;
1286658b6edaSMichael Mueller 	}
12879bb0ec09SDavid Hildenbrand 	proc->cpuid = kvm->arch.model.cpuid;
1288658b6edaSMichael Mueller 	proc->ibc = kvm->arch.model.ibc;
1289c54f0d6aSDavid Hildenbrand 	memcpy(&proc->fac_list, kvm->arch.model.fac_list,
1290c54f0d6aSDavid Hildenbrand 	       S390_ARCH_FAC_LIST_SIZE_BYTE);
1291a8c39dd7SChristian Borntraeger 	VM_EVENT(kvm, 3, "GET: guest ibc: 0x%4.4x, guest cpuid: 0x%16.16llx",
1292a8c39dd7SChristian Borntraeger 		 kvm->arch.model.ibc,
1293a8c39dd7SChristian Borntraeger 		 kvm->arch.model.cpuid);
1294a8c39dd7SChristian Borntraeger 	VM_EVENT(kvm, 3, "GET: guest faclist: 0x%16.16llx.%16.16llx.%16.16llx",
1295a8c39dd7SChristian Borntraeger 		 kvm->arch.model.fac_list[0],
1296a8c39dd7SChristian Borntraeger 		 kvm->arch.model.fac_list[1],
1297a8c39dd7SChristian Borntraeger 		 kvm->arch.model.fac_list[2]);
1298658b6edaSMichael Mueller 	if (copy_to_user((void __user *)attr->addr, proc, sizeof(*proc)))
1299658b6edaSMichael Mueller 		ret = -EFAULT;
1300658b6edaSMichael Mueller 	kfree(proc);
1301658b6edaSMichael Mueller out:
1302658b6edaSMichael Mueller 	return ret;
1303658b6edaSMichael Mueller }
1304658b6edaSMichael Mueller 
1305658b6edaSMichael Mueller static int kvm_s390_get_machine(struct kvm *kvm, struct kvm_device_attr *attr)
1306658b6edaSMichael Mueller {
1307658b6edaSMichael Mueller 	struct kvm_s390_vm_cpu_machine *mach;
1308658b6edaSMichael Mueller 	int ret = 0;
1309658b6edaSMichael Mueller 
1310658b6edaSMichael Mueller 	mach = kzalloc(sizeof(*mach), GFP_KERNEL);
1311658b6edaSMichael Mueller 	if (!mach) {
1312658b6edaSMichael Mueller 		ret = -ENOMEM;
1313658b6edaSMichael Mueller 		goto out;
1314658b6edaSMichael Mueller 	}
1315658b6edaSMichael Mueller 	get_cpu_id((struct cpuid *) &mach->cpuid);
131637c5f6c8SDavid Hildenbrand 	mach->ibc = sclp.ibc;
1317c54f0d6aSDavid Hildenbrand 	memcpy(&mach->fac_mask, kvm->arch.model.fac_mask,
1318981467c9SMichael Mueller 	       S390_ARCH_FAC_LIST_SIZE_BYTE);
1319658b6edaSMichael Mueller 	memcpy((unsigned long *)&mach->fac_list, S390_lowcore.stfle_fac_list,
132004478197SChristian Borntraeger 	       sizeof(S390_lowcore.stfle_fac_list));
1321a8c39dd7SChristian Borntraeger 	VM_EVENT(kvm, 3, "GET: host ibc:  0x%4.4x, host cpuid:  0x%16.16llx",
1322a8c39dd7SChristian Borntraeger 		 kvm->arch.model.ibc,
1323a8c39dd7SChristian Borntraeger 		 kvm->arch.model.cpuid);
1324a8c39dd7SChristian Borntraeger 	VM_EVENT(kvm, 3, "GET: host facmask:  0x%16.16llx.%16.16llx.%16.16llx",
1325a8c39dd7SChristian Borntraeger 		 mach->fac_mask[0],
1326a8c39dd7SChristian Borntraeger 		 mach->fac_mask[1],
1327a8c39dd7SChristian Borntraeger 		 mach->fac_mask[2]);
1328a8c39dd7SChristian Borntraeger 	VM_EVENT(kvm, 3, "GET: host faclist:  0x%16.16llx.%16.16llx.%16.16llx",
1329a8c39dd7SChristian Borntraeger 		 mach->fac_list[0],
1330a8c39dd7SChristian Borntraeger 		 mach->fac_list[1],
1331a8c39dd7SChristian Borntraeger 		 mach->fac_list[2]);
1332658b6edaSMichael Mueller 	if (copy_to_user((void __user *)attr->addr, mach, sizeof(*mach)))
1333658b6edaSMichael Mueller 		ret = -EFAULT;
1334658b6edaSMichael Mueller 	kfree(mach);
1335658b6edaSMichael Mueller out:
1336658b6edaSMichael Mueller 	return ret;
1337658b6edaSMichael Mueller }
1338658b6edaSMichael Mueller 
133915c9705fSDavid Hildenbrand static int kvm_s390_get_processor_feat(struct kvm *kvm,
134015c9705fSDavid Hildenbrand 				       struct kvm_device_attr *attr)
134115c9705fSDavid Hildenbrand {
134215c9705fSDavid Hildenbrand 	struct kvm_s390_vm_cpu_feat data;
134315c9705fSDavid Hildenbrand 
134415c9705fSDavid Hildenbrand 	bitmap_copy((unsigned long *) data.feat, kvm->arch.cpu_feat,
134515c9705fSDavid Hildenbrand 		    KVM_S390_VM_CPU_FEAT_NR_BITS);
134615c9705fSDavid Hildenbrand 	if (copy_to_user((void __user *)attr->addr, &data, sizeof(data)))
134715c9705fSDavid Hildenbrand 		return -EFAULT;
13482f8311c9SChristian Borntraeger 	VM_EVENT(kvm, 3, "GET: guest feat: 0x%16.16llx.0x%16.16llx.0x%16.16llx",
13492f8311c9SChristian Borntraeger 			 data.feat[0],
13502f8311c9SChristian Borntraeger 			 data.feat[1],
13512f8311c9SChristian Borntraeger 			 data.feat[2]);
135215c9705fSDavid Hildenbrand 	return 0;
135315c9705fSDavid Hildenbrand }
135415c9705fSDavid Hildenbrand 
135515c9705fSDavid Hildenbrand static int kvm_s390_get_machine_feat(struct kvm *kvm,
135615c9705fSDavid Hildenbrand 				     struct kvm_device_attr *attr)
135715c9705fSDavid Hildenbrand {
135815c9705fSDavid Hildenbrand 	struct kvm_s390_vm_cpu_feat data;
135915c9705fSDavid Hildenbrand 
136015c9705fSDavid Hildenbrand 	bitmap_copy((unsigned long *) data.feat,
136115c9705fSDavid Hildenbrand 		    kvm_s390_available_cpu_feat,
136215c9705fSDavid Hildenbrand 		    KVM_S390_VM_CPU_FEAT_NR_BITS);
136315c9705fSDavid Hildenbrand 	if (copy_to_user((void __user *)attr->addr, &data, sizeof(data)))
136415c9705fSDavid Hildenbrand 		return -EFAULT;
13652f8311c9SChristian Borntraeger 	VM_EVENT(kvm, 3, "GET: host feat:  0x%16.16llx.0x%16.16llx.0x%16.16llx",
13662f8311c9SChristian Borntraeger 			 data.feat[0],
13672f8311c9SChristian Borntraeger 			 data.feat[1],
13682f8311c9SChristian Borntraeger 			 data.feat[2]);
136915c9705fSDavid Hildenbrand 	return 0;
137015c9705fSDavid Hildenbrand }
137115c9705fSDavid Hildenbrand 
13720a763c78SDavid Hildenbrand static int kvm_s390_get_processor_subfunc(struct kvm *kvm,
13730a763c78SDavid Hildenbrand 					  struct kvm_device_attr *attr)
13740a763c78SDavid Hildenbrand {
13750a763c78SDavid Hildenbrand 	/*
13760a763c78SDavid Hildenbrand 	 * Once we can actually configure subfunctions (kernel + hw support),
13770a763c78SDavid Hildenbrand 	 * we have to check if they were already set by user space, if so copy
13780a763c78SDavid Hildenbrand 	 * them from kvm->arch.
13790a763c78SDavid Hildenbrand 	 */
13800a763c78SDavid Hildenbrand 	return -ENXIO;
13810a763c78SDavid Hildenbrand }
13820a763c78SDavid Hildenbrand 
13830a763c78SDavid Hildenbrand static int kvm_s390_get_machine_subfunc(struct kvm *kvm,
13840a763c78SDavid Hildenbrand 					struct kvm_device_attr *attr)
13850a763c78SDavid Hildenbrand {
13860a763c78SDavid Hildenbrand 	if (copy_to_user((void __user *)attr->addr, &kvm_s390_available_subfunc,
13870a763c78SDavid Hildenbrand 	    sizeof(struct kvm_s390_vm_cpu_subfunc)))
13880a763c78SDavid Hildenbrand 		return -EFAULT;
13890a763c78SDavid Hildenbrand 	return 0;
13900a763c78SDavid Hildenbrand }
1391658b6edaSMichael Mueller static int kvm_s390_get_cpu_model(struct kvm *kvm, struct kvm_device_attr *attr)
1392658b6edaSMichael Mueller {
1393658b6edaSMichael Mueller 	int ret = -ENXIO;
1394658b6edaSMichael Mueller 
1395658b6edaSMichael Mueller 	switch (attr->attr) {
1396658b6edaSMichael Mueller 	case KVM_S390_VM_CPU_PROCESSOR:
1397658b6edaSMichael Mueller 		ret = kvm_s390_get_processor(kvm, attr);
1398658b6edaSMichael Mueller 		break;
1399658b6edaSMichael Mueller 	case KVM_S390_VM_CPU_MACHINE:
1400658b6edaSMichael Mueller 		ret = kvm_s390_get_machine(kvm, attr);
1401658b6edaSMichael Mueller 		break;
140215c9705fSDavid Hildenbrand 	case KVM_S390_VM_CPU_PROCESSOR_FEAT:
140315c9705fSDavid Hildenbrand 		ret = kvm_s390_get_processor_feat(kvm, attr);
140415c9705fSDavid Hildenbrand 		break;
140515c9705fSDavid Hildenbrand 	case KVM_S390_VM_CPU_MACHINE_FEAT:
140615c9705fSDavid Hildenbrand 		ret = kvm_s390_get_machine_feat(kvm, attr);
140715c9705fSDavid Hildenbrand 		break;
14080a763c78SDavid Hildenbrand 	case KVM_S390_VM_CPU_PROCESSOR_SUBFUNC:
14090a763c78SDavid Hildenbrand 		ret = kvm_s390_get_processor_subfunc(kvm, attr);
14100a763c78SDavid Hildenbrand 		break;
14110a763c78SDavid Hildenbrand 	case KVM_S390_VM_CPU_MACHINE_SUBFUNC:
14120a763c78SDavid Hildenbrand 		ret = kvm_s390_get_machine_subfunc(kvm, attr);
14130a763c78SDavid Hildenbrand 		break;
1414658b6edaSMichael Mueller 	}
1415658b6edaSMichael Mueller 	return ret;
1416658b6edaSMichael Mueller }
1417658b6edaSMichael Mueller 
1418f2061656SDominik Dingel static int kvm_s390_vm_set_attr(struct kvm *kvm, struct kvm_device_attr *attr)
1419f2061656SDominik Dingel {
1420f2061656SDominik Dingel 	int ret;
1421f2061656SDominik Dingel 
1422f2061656SDominik Dingel 	switch (attr->group) {
14234f718eabSDominik Dingel 	case KVM_S390_VM_MEM_CTRL:
14248c0a7ce6SDominik Dingel 		ret = kvm_s390_set_mem_control(kvm, attr);
14254f718eabSDominik Dingel 		break;
142672f25020SJason J. Herne 	case KVM_S390_VM_TOD:
142772f25020SJason J. Herne 		ret = kvm_s390_set_tod(kvm, attr);
142872f25020SJason J. Herne 		break;
1429658b6edaSMichael Mueller 	case KVM_S390_VM_CPU_MODEL:
1430658b6edaSMichael Mueller 		ret = kvm_s390_set_cpu_model(kvm, attr);
1431658b6edaSMichael Mueller 		break;
1432a374e892STony Krowiak 	case KVM_S390_VM_CRYPTO:
1433a374e892STony Krowiak 		ret = kvm_s390_vm_set_crypto(kvm, attr);
1434a374e892STony Krowiak 		break;
1435190df4a2SClaudio Imbrenda 	case KVM_S390_VM_MIGRATION:
1436190df4a2SClaudio Imbrenda 		ret = kvm_s390_vm_set_migration(kvm, attr);
1437190df4a2SClaudio Imbrenda 		break;
1438f2061656SDominik Dingel 	default:
1439f2061656SDominik Dingel 		ret = -ENXIO;
1440f2061656SDominik Dingel 		break;
1441f2061656SDominik Dingel 	}
1442f2061656SDominik Dingel 
1443f2061656SDominik Dingel 	return ret;
1444f2061656SDominik Dingel }
1445f2061656SDominik Dingel 
1446f2061656SDominik Dingel static int kvm_s390_vm_get_attr(struct kvm *kvm, struct kvm_device_attr *attr)
1447f2061656SDominik Dingel {
14488c0a7ce6SDominik Dingel 	int ret;
14498c0a7ce6SDominik Dingel 
14508c0a7ce6SDominik Dingel 	switch (attr->group) {
14518c0a7ce6SDominik Dingel 	case KVM_S390_VM_MEM_CTRL:
14528c0a7ce6SDominik Dingel 		ret = kvm_s390_get_mem_control(kvm, attr);
14538c0a7ce6SDominik Dingel 		break;
145472f25020SJason J. Herne 	case KVM_S390_VM_TOD:
145572f25020SJason J. Herne 		ret = kvm_s390_get_tod(kvm, attr);
145672f25020SJason J. Herne 		break;
1457658b6edaSMichael Mueller 	case KVM_S390_VM_CPU_MODEL:
1458658b6edaSMichael Mueller 		ret = kvm_s390_get_cpu_model(kvm, attr);
1459658b6edaSMichael Mueller 		break;
1460190df4a2SClaudio Imbrenda 	case KVM_S390_VM_MIGRATION:
1461190df4a2SClaudio Imbrenda 		ret = kvm_s390_vm_get_migration(kvm, attr);
1462190df4a2SClaudio Imbrenda 		break;
14638c0a7ce6SDominik Dingel 	default:
14648c0a7ce6SDominik Dingel 		ret = -ENXIO;
14658c0a7ce6SDominik Dingel 		break;
14668c0a7ce6SDominik Dingel 	}
14678c0a7ce6SDominik Dingel 
14688c0a7ce6SDominik Dingel 	return ret;
1469f2061656SDominik Dingel }
1470f2061656SDominik Dingel 
1471f2061656SDominik Dingel static int kvm_s390_vm_has_attr(struct kvm *kvm, struct kvm_device_attr *attr)
1472f2061656SDominik Dingel {
1473f2061656SDominik Dingel 	int ret;
1474f2061656SDominik Dingel 
1475f2061656SDominik Dingel 	switch (attr->group) {
14764f718eabSDominik Dingel 	case KVM_S390_VM_MEM_CTRL:
14774f718eabSDominik Dingel 		switch (attr->attr) {
14784f718eabSDominik Dingel 		case KVM_S390_VM_MEM_ENABLE_CMMA:
14794f718eabSDominik Dingel 		case KVM_S390_VM_MEM_CLR_CMMA:
1480f9cbd9b0SDavid Hildenbrand 			ret = sclp.has_cmma ? 0 : -ENXIO;
1481f9cbd9b0SDavid Hildenbrand 			break;
14828c0a7ce6SDominik Dingel 		case KVM_S390_VM_MEM_LIMIT_SIZE:
14834f718eabSDominik Dingel 			ret = 0;
14844f718eabSDominik Dingel 			break;
14854f718eabSDominik Dingel 		default:
14864f718eabSDominik Dingel 			ret = -ENXIO;
14874f718eabSDominik Dingel 			break;
14884f718eabSDominik Dingel 		}
14894f718eabSDominik Dingel 		break;
149072f25020SJason J. Herne 	case KVM_S390_VM_TOD:
149172f25020SJason J. Herne 		switch (attr->attr) {
149272f25020SJason J. Herne 		case KVM_S390_VM_TOD_LOW:
149372f25020SJason J. Herne 		case KVM_S390_VM_TOD_HIGH:
149472f25020SJason J. Herne 			ret = 0;
149572f25020SJason J. Herne 			break;
149672f25020SJason J. Herne 		default:
149772f25020SJason J. Herne 			ret = -ENXIO;
149872f25020SJason J. Herne 			break;
149972f25020SJason J. Herne 		}
150072f25020SJason J. Herne 		break;
1501658b6edaSMichael Mueller 	case KVM_S390_VM_CPU_MODEL:
1502658b6edaSMichael Mueller 		switch (attr->attr) {
1503658b6edaSMichael Mueller 		case KVM_S390_VM_CPU_PROCESSOR:
1504658b6edaSMichael Mueller 		case KVM_S390_VM_CPU_MACHINE:
150515c9705fSDavid Hildenbrand 		case KVM_S390_VM_CPU_PROCESSOR_FEAT:
150615c9705fSDavid Hildenbrand 		case KVM_S390_VM_CPU_MACHINE_FEAT:
15070a763c78SDavid Hildenbrand 		case KVM_S390_VM_CPU_MACHINE_SUBFUNC:
1508658b6edaSMichael Mueller 			ret = 0;
1509658b6edaSMichael Mueller 			break;
15100a763c78SDavid Hildenbrand 		/* configuring subfunctions is not supported yet */
15110a763c78SDavid Hildenbrand 		case KVM_S390_VM_CPU_PROCESSOR_SUBFUNC:
1512658b6edaSMichael Mueller 		default:
1513658b6edaSMichael Mueller 			ret = -ENXIO;
1514658b6edaSMichael Mueller 			break;
1515658b6edaSMichael Mueller 		}
1516658b6edaSMichael Mueller 		break;
1517a374e892STony Krowiak 	case KVM_S390_VM_CRYPTO:
1518a374e892STony Krowiak 		switch (attr->attr) {
1519a374e892STony Krowiak 		case KVM_S390_VM_CRYPTO_ENABLE_AES_KW:
1520a374e892STony Krowiak 		case KVM_S390_VM_CRYPTO_ENABLE_DEA_KW:
1521a374e892STony Krowiak 		case KVM_S390_VM_CRYPTO_DISABLE_AES_KW:
1522a374e892STony Krowiak 		case KVM_S390_VM_CRYPTO_DISABLE_DEA_KW:
1523a374e892STony Krowiak 			ret = 0;
1524a374e892STony Krowiak 			break;
152537940fb0STony Krowiak 		case KVM_S390_VM_CRYPTO_ENABLE_APIE:
152637940fb0STony Krowiak 		case KVM_S390_VM_CRYPTO_DISABLE_APIE:
152737940fb0STony Krowiak 			ret = ap_instructions_available() ? 0 : -ENXIO;
152837940fb0STony Krowiak 			break;
1529a374e892STony Krowiak 		default:
1530a374e892STony Krowiak 			ret = -ENXIO;
1531a374e892STony Krowiak 			break;
1532a374e892STony Krowiak 		}
1533a374e892STony Krowiak 		break;
1534190df4a2SClaudio Imbrenda 	case KVM_S390_VM_MIGRATION:
1535190df4a2SClaudio Imbrenda 		ret = 0;
1536190df4a2SClaudio Imbrenda 		break;
1537f2061656SDominik Dingel 	default:
1538f2061656SDominik Dingel 		ret = -ENXIO;
1539f2061656SDominik Dingel 		break;
1540f2061656SDominik Dingel 	}
1541f2061656SDominik Dingel 
1542f2061656SDominik Dingel 	return ret;
1543f2061656SDominik Dingel }
1544f2061656SDominik Dingel 
154530ee2a98SJason J. Herne static long kvm_s390_get_skeys(struct kvm *kvm, struct kvm_s390_skeys *args)
154630ee2a98SJason J. Herne {
154730ee2a98SJason J. Herne 	uint8_t *keys;
154830ee2a98SJason J. Herne 	uint64_t hva;
15494f899147SChristian Borntraeger 	int srcu_idx, i, r = 0;
155030ee2a98SJason J. Herne 
155130ee2a98SJason J. Herne 	if (args->flags != 0)
155230ee2a98SJason J. Herne 		return -EINVAL;
155330ee2a98SJason J. Herne 
155430ee2a98SJason J. Herne 	/* Is this guest using storage keys? */
155555531b74SJanosch Frank 	if (!mm_uses_skeys(current->mm))
155630ee2a98SJason J. Herne 		return KVM_S390_GET_SKEYS_NONE;
155730ee2a98SJason J. Herne 
155830ee2a98SJason J. Herne 	/* Enforce sane limit on memory allocation */
155930ee2a98SJason J. Herne 	if (args->count < 1 || args->count > KVM_S390_SKEYS_MAX)
156030ee2a98SJason J. Herne 		return -EINVAL;
156130ee2a98SJason J. Herne 
1562752ade68SMichal Hocko 	keys = kvmalloc_array(args->count, sizeof(uint8_t), GFP_KERNEL);
156330ee2a98SJason J. Herne 	if (!keys)
156430ee2a98SJason J. Herne 		return -ENOMEM;
156530ee2a98SJason J. Herne 
1566d3ed1ceeSMartin Schwidefsky 	down_read(&current->mm->mmap_sem);
15674f899147SChristian Borntraeger 	srcu_idx = srcu_read_lock(&kvm->srcu);
156830ee2a98SJason J. Herne 	for (i = 0; i < args->count; i++) {
156930ee2a98SJason J. Herne 		hva = gfn_to_hva(kvm, args->start_gfn + i);
157030ee2a98SJason J. Herne 		if (kvm_is_error_hva(hva)) {
157130ee2a98SJason J. Herne 			r = -EFAULT;
1572d3ed1ceeSMartin Schwidefsky 			break;
157330ee2a98SJason J. Herne 		}
157430ee2a98SJason J. Herne 
1575154c8c19SDavid Hildenbrand 		r = get_guest_storage_key(current->mm, hva, &keys[i]);
1576154c8c19SDavid Hildenbrand 		if (r)
1577d3ed1ceeSMartin Schwidefsky 			break;
157830ee2a98SJason J. Herne 	}
15794f899147SChristian Borntraeger 	srcu_read_unlock(&kvm->srcu, srcu_idx);
1580d3ed1ceeSMartin Schwidefsky 	up_read(&current->mm->mmap_sem);
158130ee2a98SJason J. Herne 
1582d3ed1ceeSMartin Schwidefsky 	if (!r) {
158330ee2a98SJason J. Herne 		r = copy_to_user((uint8_t __user *)args->skeydata_addr, keys,
158430ee2a98SJason J. Herne 				 sizeof(uint8_t) * args->count);
158530ee2a98SJason J. Herne 		if (r)
158630ee2a98SJason J. Herne 			r = -EFAULT;
1587d3ed1ceeSMartin Schwidefsky 	}
1588d3ed1ceeSMartin Schwidefsky 
158930ee2a98SJason J. Herne 	kvfree(keys);
159030ee2a98SJason J. Herne 	return r;
159130ee2a98SJason J. Herne }
159230ee2a98SJason J. Herne 
159330ee2a98SJason J. Herne static long kvm_s390_set_skeys(struct kvm *kvm, struct kvm_s390_skeys *args)
159430ee2a98SJason J. Herne {
159530ee2a98SJason J. Herne 	uint8_t *keys;
159630ee2a98SJason J. Herne 	uint64_t hva;
15974f899147SChristian Borntraeger 	int srcu_idx, i, r = 0;
1598bd096f64SJanosch Frank 	bool unlocked;
159930ee2a98SJason J. Herne 
160030ee2a98SJason J. Herne 	if (args->flags != 0)
160130ee2a98SJason J. Herne 		return -EINVAL;
160230ee2a98SJason J. Herne 
160330ee2a98SJason J. Herne 	/* Enforce sane limit on memory allocation */
160430ee2a98SJason J. Herne 	if (args->count < 1 || args->count > KVM_S390_SKEYS_MAX)
160530ee2a98SJason J. Herne 		return -EINVAL;
160630ee2a98SJason J. Herne 
1607752ade68SMichal Hocko 	keys = kvmalloc_array(args->count, sizeof(uint8_t), GFP_KERNEL);
160830ee2a98SJason J. Herne 	if (!keys)
160930ee2a98SJason J. Herne 		return -ENOMEM;
161030ee2a98SJason J. Herne 
161130ee2a98SJason J. Herne 	r = copy_from_user(keys, (uint8_t __user *)args->skeydata_addr,
161230ee2a98SJason J. Herne 			   sizeof(uint8_t) * args->count);
161330ee2a98SJason J. Herne 	if (r) {
161430ee2a98SJason J. Herne 		r = -EFAULT;
161530ee2a98SJason J. Herne 		goto out;
161630ee2a98SJason J. Herne 	}
161730ee2a98SJason J. Herne 
161830ee2a98SJason J. Herne 	/* Enable storage key handling for the guest */
161914d4a425SDominik Dingel 	r = s390_enable_skey();
162014d4a425SDominik Dingel 	if (r)
162114d4a425SDominik Dingel 		goto out;
162230ee2a98SJason J. Herne 
1623bd096f64SJanosch Frank 	i = 0;
1624d3ed1ceeSMartin Schwidefsky 	down_read(&current->mm->mmap_sem);
16254f899147SChristian Borntraeger 	srcu_idx = srcu_read_lock(&kvm->srcu);
1626bd096f64SJanosch Frank         while (i < args->count) {
1627bd096f64SJanosch Frank 		unlocked = false;
162830ee2a98SJason J. Herne 		hva = gfn_to_hva(kvm, args->start_gfn + i);
162930ee2a98SJason J. Herne 		if (kvm_is_error_hva(hva)) {
163030ee2a98SJason J. Herne 			r = -EFAULT;
1631d3ed1ceeSMartin Schwidefsky 			break;
163230ee2a98SJason J. Herne 		}
163330ee2a98SJason J. Herne 
163430ee2a98SJason J. Herne 		/* Lowest order bit is reserved */
163530ee2a98SJason J. Herne 		if (keys[i] & 0x01) {
163630ee2a98SJason J. Herne 			r = -EINVAL;
1637d3ed1ceeSMartin Schwidefsky 			break;
163830ee2a98SJason J. Herne 		}
163930ee2a98SJason J. Herne 
1640fe69eabfSDavid Hildenbrand 		r = set_guest_storage_key(current->mm, hva, keys[i], 0);
1641bd096f64SJanosch Frank 		if (r) {
1642bd096f64SJanosch Frank 			r = fixup_user_fault(current, current->mm, hva,
1643bd096f64SJanosch Frank 					     FAULT_FLAG_WRITE, &unlocked);
164430ee2a98SJason J. Herne 			if (r)
1645d3ed1ceeSMartin Schwidefsky 				break;
164630ee2a98SJason J. Herne 		}
1647bd096f64SJanosch Frank 		if (!r)
1648bd096f64SJanosch Frank 			i++;
1649bd096f64SJanosch Frank 	}
16504f899147SChristian Borntraeger 	srcu_read_unlock(&kvm->srcu, srcu_idx);
1651d3ed1ceeSMartin Schwidefsky 	up_read(&current->mm->mmap_sem);
165230ee2a98SJason J. Herne out:
165330ee2a98SJason J. Herne 	kvfree(keys);
165430ee2a98SJason J. Herne 	return r;
165530ee2a98SJason J. Herne }
165630ee2a98SJason J. Herne 
16574036e387SClaudio Imbrenda /*
16584036e387SClaudio Imbrenda  * Base address and length must be sent at the start of each block, therefore
16594036e387SClaudio Imbrenda  * it's cheaper to send some clean data, as long as it's less than the size of
16604036e387SClaudio Imbrenda  * two longs.
16614036e387SClaudio Imbrenda  */
16624036e387SClaudio Imbrenda #define KVM_S390_MAX_BIT_DISTANCE (2 * sizeof(void *))
16634036e387SClaudio Imbrenda /* for consistency */
16644036e387SClaudio Imbrenda #define KVM_S390_CMMA_SIZE_MAX ((u32)KVM_S390_SKEYS_MAX)
16654036e387SClaudio Imbrenda 
16664036e387SClaudio Imbrenda /*
1667afdad616SClaudio Imbrenda  * Similar to gfn_to_memslot, but returns the index of a memslot also when the
1668afdad616SClaudio Imbrenda  * address falls in a hole. In that case the index of one of the memslots
1669afdad616SClaudio Imbrenda  * bordering the hole is returned.
1670afdad616SClaudio Imbrenda  */
1671afdad616SClaudio Imbrenda static int gfn_to_memslot_approx(struct kvm_memslots *slots, gfn_t gfn)
1672afdad616SClaudio Imbrenda {
1673afdad616SClaudio Imbrenda 	int start = 0, end = slots->used_slots;
1674afdad616SClaudio Imbrenda 	int slot = atomic_read(&slots->lru_slot);
1675afdad616SClaudio Imbrenda 	struct kvm_memory_slot *memslots = slots->memslots;
1676afdad616SClaudio Imbrenda 
1677afdad616SClaudio Imbrenda 	if (gfn >= memslots[slot].base_gfn &&
1678afdad616SClaudio Imbrenda 	    gfn < memslots[slot].base_gfn + memslots[slot].npages)
1679afdad616SClaudio Imbrenda 		return slot;
1680afdad616SClaudio Imbrenda 
1681afdad616SClaudio Imbrenda 	while (start < end) {
1682afdad616SClaudio Imbrenda 		slot = start + (end - start) / 2;
1683afdad616SClaudio Imbrenda 
1684afdad616SClaudio Imbrenda 		if (gfn >= memslots[slot].base_gfn)
1685afdad616SClaudio Imbrenda 			end = slot;
1686afdad616SClaudio Imbrenda 		else
1687afdad616SClaudio Imbrenda 			start = slot + 1;
1688afdad616SClaudio Imbrenda 	}
1689afdad616SClaudio Imbrenda 
1690afdad616SClaudio Imbrenda 	if (gfn >= memslots[start].base_gfn &&
1691afdad616SClaudio Imbrenda 	    gfn < memslots[start].base_gfn + memslots[start].npages) {
1692afdad616SClaudio Imbrenda 		atomic_set(&slots->lru_slot, start);
1693afdad616SClaudio Imbrenda 	}
1694afdad616SClaudio Imbrenda 
1695afdad616SClaudio Imbrenda 	return start;
1696afdad616SClaudio Imbrenda }
1697afdad616SClaudio Imbrenda 
1698afdad616SClaudio Imbrenda static int kvm_s390_peek_cmma(struct kvm *kvm, struct kvm_s390_cmma_log *args,
1699afdad616SClaudio Imbrenda 			      u8 *res, unsigned long bufsize)
1700afdad616SClaudio Imbrenda {
1701afdad616SClaudio Imbrenda 	unsigned long pgstev, hva, cur_gfn = args->start_gfn;
1702afdad616SClaudio Imbrenda 
1703afdad616SClaudio Imbrenda 	args->count = 0;
1704afdad616SClaudio Imbrenda 	while (args->count < bufsize) {
1705afdad616SClaudio Imbrenda 		hva = gfn_to_hva(kvm, cur_gfn);
1706afdad616SClaudio Imbrenda 		/*
1707afdad616SClaudio Imbrenda 		 * We return an error if the first value was invalid, but we
1708afdad616SClaudio Imbrenda 		 * return successfully if at least one value was copied.
1709afdad616SClaudio Imbrenda 		 */
1710afdad616SClaudio Imbrenda 		if (kvm_is_error_hva(hva))
1711afdad616SClaudio Imbrenda 			return args->count ? 0 : -EFAULT;
1712afdad616SClaudio Imbrenda 		if (get_pgste(kvm->mm, hva, &pgstev) < 0)
1713afdad616SClaudio Imbrenda 			pgstev = 0;
1714afdad616SClaudio Imbrenda 		res[args->count++] = (pgstev >> 24) & 0x43;
1715afdad616SClaudio Imbrenda 		cur_gfn++;
1716afdad616SClaudio Imbrenda 	}
1717afdad616SClaudio Imbrenda 
1718afdad616SClaudio Imbrenda 	return 0;
1719afdad616SClaudio Imbrenda }
1720afdad616SClaudio Imbrenda 
1721afdad616SClaudio Imbrenda static unsigned long kvm_s390_next_dirty_cmma(struct kvm_memslots *slots,
1722afdad616SClaudio Imbrenda 					      unsigned long cur_gfn)
1723afdad616SClaudio Imbrenda {
1724afdad616SClaudio Imbrenda 	int slotidx = gfn_to_memslot_approx(slots, cur_gfn);
1725afdad616SClaudio Imbrenda 	struct kvm_memory_slot *ms = slots->memslots + slotidx;
1726afdad616SClaudio Imbrenda 	unsigned long ofs = cur_gfn - ms->base_gfn;
1727afdad616SClaudio Imbrenda 
1728afdad616SClaudio Imbrenda 	if (ms->base_gfn + ms->npages <= cur_gfn) {
1729afdad616SClaudio Imbrenda 		slotidx--;
1730afdad616SClaudio Imbrenda 		/* If we are above the highest slot, wrap around */
1731afdad616SClaudio Imbrenda 		if (slotidx < 0)
1732afdad616SClaudio Imbrenda 			slotidx = slots->used_slots - 1;
1733afdad616SClaudio Imbrenda 
1734afdad616SClaudio Imbrenda 		ms = slots->memslots + slotidx;
1735afdad616SClaudio Imbrenda 		ofs = 0;
1736afdad616SClaudio Imbrenda 	}
1737afdad616SClaudio Imbrenda 	ofs = find_next_bit(kvm_second_dirty_bitmap(ms), ms->npages, ofs);
1738afdad616SClaudio Imbrenda 	while ((slotidx > 0) && (ofs >= ms->npages)) {
1739afdad616SClaudio Imbrenda 		slotidx--;
1740afdad616SClaudio Imbrenda 		ms = slots->memslots + slotidx;
1741afdad616SClaudio Imbrenda 		ofs = find_next_bit(kvm_second_dirty_bitmap(ms), ms->npages, 0);
1742afdad616SClaudio Imbrenda 	}
1743afdad616SClaudio Imbrenda 	return ms->base_gfn + ofs;
1744afdad616SClaudio Imbrenda }
1745afdad616SClaudio Imbrenda 
1746afdad616SClaudio Imbrenda static int kvm_s390_get_cmma(struct kvm *kvm, struct kvm_s390_cmma_log *args,
1747afdad616SClaudio Imbrenda 			     u8 *res, unsigned long bufsize)
1748afdad616SClaudio Imbrenda {
1749afdad616SClaudio Imbrenda 	unsigned long mem_end, cur_gfn, next_gfn, hva, pgstev;
1750afdad616SClaudio Imbrenda 	struct kvm_memslots *slots = kvm_memslots(kvm);
1751afdad616SClaudio Imbrenda 	struct kvm_memory_slot *ms;
1752afdad616SClaudio Imbrenda 
1753afdad616SClaudio Imbrenda 	cur_gfn = kvm_s390_next_dirty_cmma(slots, args->start_gfn);
1754afdad616SClaudio Imbrenda 	ms = gfn_to_memslot(kvm, cur_gfn);
1755afdad616SClaudio Imbrenda 	args->count = 0;
1756afdad616SClaudio Imbrenda 	args->start_gfn = cur_gfn;
1757afdad616SClaudio Imbrenda 	if (!ms)
1758afdad616SClaudio Imbrenda 		return 0;
1759afdad616SClaudio Imbrenda 	next_gfn = kvm_s390_next_dirty_cmma(slots, cur_gfn + 1);
1760afdad616SClaudio Imbrenda 	mem_end = slots->memslots[0].base_gfn + slots->memslots[0].npages;
1761afdad616SClaudio Imbrenda 
1762afdad616SClaudio Imbrenda 	while (args->count < bufsize) {
1763afdad616SClaudio Imbrenda 		hva = gfn_to_hva(kvm, cur_gfn);
1764afdad616SClaudio Imbrenda 		if (kvm_is_error_hva(hva))
1765afdad616SClaudio Imbrenda 			return 0;
1766afdad616SClaudio Imbrenda 		/* Decrement only if we actually flipped the bit to 0 */
1767afdad616SClaudio Imbrenda 		if (test_and_clear_bit(cur_gfn - ms->base_gfn, kvm_second_dirty_bitmap(ms)))
1768afdad616SClaudio Imbrenda 			atomic64_dec(&kvm->arch.cmma_dirty_pages);
1769afdad616SClaudio Imbrenda 		if (get_pgste(kvm->mm, hva, &pgstev) < 0)
1770afdad616SClaudio Imbrenda 			pgstev = 0;
1771afdad616SClaudio Imbrenda 		/* Save the value */
1772afdad616SClaudio Imbrenda 		res[args->count++] = (pgstev >> 24) & 0x43;
1773afdad616SClaudio Imbrenda 		/* If the next bit is too far away, stop. */
1774afdad616SClaudio Imbrenda 		if (next_gfn > cur_gfn + KVM_S390_MAX_BIT_DISTANCE)
1775afdad616SClaudio Imbrenda 			return 0;
1776afdad616SClaudio Imbrenda 		/* If we reached the previous "next", find the next one */
1777afdad616SClaudio Imbrenda 		if (cur_gfn == next_gfn)
1778afdad616SClaudio Imbrenda 			next_gfn = kvm_s390_next_dirty_cmma(slots, cur_gfn + 1);
1779afdad616SClaudio Imbrenda 		/* Reached the end of memory or of the buffer, stop */
1780afdad616SClaudio Imbrenda 		if ((next_gfn >= mem_end) ||
1781afdad616SClaudio Imbrenda 		    (next_gfn - args->start_gfn >= bufsize))
1782afdad616SClaudio Imbrenda 			return 0;
1783afdad616SClaudio Imbrenda 		cur_gfn++;
1784afdad616SClaudio Imbrenda 		/* Reached the end of the current memslot, take the next one. */
1785afdad616SClaudio Imbrenda 		if (cur_gfn - ms->base_gfn >= ms->npages) {
1786afdad616SClaudio Imbrenda 			ms = gfn_to_memslot(kvm, cur_gfn);
1787afdad616SClaudio Imbrenda 			if (!ms)
1788afdad616SClaudio Imbrenda 				return 0;
1789afdad616SClaudio Imbrenda 		}
1790afdad616SClaudio Imbrenda 	}
1791afdad616SClaudio Imbrenda 	return 0;
1792afdad616SClaudio Imbrenda }
1793afdad616SClaudio Imbrenda 
1794afdad616SClaudio Imbrenda /*
17954036e387SClaudio Imbrenda  * This function searches for the next page with dirty CMMA attributes, and
17964036e387SClaudio Imbrenda  * saves the attributes in the buffer up to either the end of the buffer or
17974036e387SClaudio Imbrenda  * until a block of at least KVM_S390_MAX_BIT_DISTANCE clean bits is found;
17984036e387SClaudio Imbrenda  * no trailing clean bytes are saved.
17994036e387SClaudio Imbrenda  * In case no dirty bits were found, or if CMMA was not enabled or used, the
18004036e387SClaudio Imbrenda  * output buffer will indicate 0 as length.
18014036e387SClaudio Imbrenda  */
18024036e387SClaudio Imbrenda static int kvm_s390_get_cmma_bits(struct kvm *kvm,
18034036e387SClaudio Imbrenda 				  struct kvm_s390_cmma_log *args)
18044036e387SClaudio Imbrenda {
1805afdad616SClaudio Imbrenda 	unsigned long bufsize;
1806afdad616SClaudio Imbrenda 	int srcu_idx, peek, ret;
1807afdad616SClaudio Imbrenda 	u8 *values;
18084036e387SClaudio Imbrenda 
1809afdad616SClaudio Imbrenda 	if (!kvm->arch.use_cmma)
18104036e387SClaudio Imbrenda 		return -ENXIO;
18114036e387SClaudio Imbrenda 	/* Invalid/unsupported flags were specified */
18124036e387SClaudio Imbrenda 	if (args->flags & ~KVM_S390_CMMA_PEEK)
18134036e387SClaudio Imbrenda 		return -EINVAL;
18144036e387SClaudio Imbrenda 	/* Migration mode query, and we are not doing a migration */
18154036e387SClaudio Imbrenda 	peek = !!(args->flags & KVM_S390_CMMA_PEEK);
1816afdad616SClaudio Imbrenda 	if (!peek && !kvm->arch.migration_mode)
18174036e387SClaudio Imbrenda 		return -EINVAL;
18184036e387SClaudio Imbrenda 	/* CMMA is disabled or was not used, or the buffer has length zero */
18194036e387SClaudio Imbrenda 	bufsize = min(args->count, KVM_S390_CMMA_SIZE_MAX);
1820c9f0a2b8SJanosch Frank 	if (!bufsize || !kvm->mm->context.uses_cmm) {
18214036e387SClaudio Imbrenda 		memset(args, 0, sizeof(*args));
18224036e387SClaudio Imbrenda 		return 0;
18234036e387SClaudio Imbrenda 	}
18244036e387SClaudio Imbrenda 	/* We are not peeking, and there are no dirty pages */
1825afdad616SClaudio Imbrenda 	if (!peek && !atomic64_read(&kvm->arch.cmma_dirty_pages)) {
18264036e387SClaudio Imbrenda 		memset(args, 0, sizeof(*args));
18274036e387SClaudio Imbrenda 		return 0;
18284036e387SClaudio Imbrenda 	}
18294036e387SClaudio Imbrenda 
1830afdad616SClaudio Imbrenda 	values = vmalloc(bufsize);
1831afdad616SClaudio Imbrenda 	if (!values)
18324036e387SClaudio Imbrenda 		return -ENOMEM;
18334036e387SClaudio Imbrenda 
18344036e387SClaudio Imbrenda 	down_read(&kvm->mm->mmap_sem);
18354036e387SClaudio Imbrenda 	srcu_idx = srcu_read_lock(&kvm->srcu);
1836afdad616SClaudio Imbrenda 	if (peek)
1837afdad616SClaudio Imbrenda 		ret = kvm_s390_peek_cmma(kvm, args, values, bufsize);
1838afdad616SClaudio Imbrenda 	else
1839afdad616SClaudio Imbrenda 		ret = kvm_s390_get_cmma(kvm, args, values, bufsize);
18404036e387SClaudio Imbrenda 	srcu_read_unlock(&kvm->srcu, srcu_idx);
18414036e387SClaudio Imbrenda 	up_read(&kvm->mm->mmap_sem);
18424036e387SClaudio Imbrenda 
1843afdad616SClaudio Imbrenda 	if (kvm->arch.migration_mode)
1844afdad616SClaudio Imbrenda 		args->remaining = atomic64_read(&kvm->arch.cmma_dirty_pages);
1845afdad616SClaudio Imbrenda 	else
1846afdad616SClaudio Imbrenda 		args->remaining = 0;
18474036e387SClaudio Imbrenda 
1848afdad616SClaudio Imbrenda 	if (copy_to_user((void __user *)args->values, values, args->count))
1849afdad616SClaudio Imbrenda 		ret = -EFAULT;
1850afdad616SClaudio Imbrenda 
1851afdad616SClaudio Imbrenda 	vfree(values);
1852afdad616SClaudio Imbrenda 	return ret;
18534036e387SClaudio Imbrenda }
18544036e387SClaudio Imbrenda 
18554036e387SClaudio Imbrenda /*
18564036e387SClaudio Imbrenda  * This function sets the CMMA attributes for the given pages. If the input
18574036e387SClaudio Imbrenda  * buffer has zero length, no action is taken, otherwise the attributes are
1858c9f0a2b8SJanosch Frank  * set and the mm->context.uses_cmm flag is set.
18594036e387SClaudio Imbrenda  */
18604036e387SClaudio Imbrenda static int kvm_s390_set_cmma_bits(struct kvm *kvm,
18614036e387SClaudio Imbrenda 				  const struct kvm_s390_cmma_log *args)
18624036e387SClaudio Imbrenda {
18634036e387SClaudio Imbrenda 	unsigned long hva, mask, pgstev, i;
18644036e387SClaudio Imbrenda 	uint8_t *bits;
18654036e387SClaudio Imbrenda 	int srcu_idx, r = 0;
18664036e387SClaudio Imbrenda 
18674036e387SClaudio Imbrenda 	mask = args->mask;
18684036e387SClaudio Imbrenda 
18694036e387SClaudio Imbrenda 	if (!kvm->arch.use_cmma)
18704036e387SClaudio Imbrenda 		return -ENXIO;
18714036e387SClaudio Imbrenda 	/* invalid/unsupported flags */
18724036e387SClaudio Imbrenda 	if (args->flags != 0)
18734036e387SClaudio Imbrenda 		return -EINVAL;
18744036e387SClaudio Imbrenda 	/* Enforce sane limit on memory allocation */
18754036e387SClaudio Imbrenda 	if (args->count > KVM_S390_CMMA_SIZE_MAX)
18764036e387SClaudio Imbrenda 		return -EINVAL;
18774036e387SClaudio Imbrenda 	/* Nothing to do */
18784036e387SClaudio Imbrenda 	if (args->count == 0)
18794036e387SClaudio Imbrenda 		return 0;
18804036e387SClaudio Imbrenda 
188142bc47b3SKees Cook 	bits = vmalloc(array_size(sizeof(*bits), args->count));
18824036e387SClaudio Imbrenda 	if (!bits)
18834036e387SClaudio Imbrenda 		return -ENOMEM;
18844036e387SClaudio Imbrenda 
18854036e387SClaudio Imbrenda 	r = copy_from_user(bits, (void __user *)args->values, args->count);
18864036e387SClaudio Imbrenda 	if (r) {
18874036e387SClaudio Imbrenda 		r = -EFAULT;
18884036e387SClaudio Imbrenda 		goto out;
18894036e387SClaudio Imbrenda 	}
18904036e387SClaudio Imbrenda 
18914036e387SClaudio Imbrenda 	down_read(&kvm->mm->mmap_sem);
18924036e387SClaudio Imbrenda 	srcu_idx = srcu_read_lock(&kvm->srcu);
18934036e387SClaudio Imbrenda 	for (i = 0; i < args->count; i++) {
18944036e387SClaudio Imbrenda 		hva = gfn_to_hva(kvm, args->start_gfn + i);
18954036e387SClaudio Imbrenda 		if (kvm_is_error_hva(hva)) {
18964036e387SClaudio Imbrenda 			r = -EFAULT;
18974036e387SClaudio Imbrenda 			break;
18984036e387SClaudio Imbrenda 		}
18994036e387SClaudio Imbrenda 
19004036e387SClaudio Imbrenda 		pgstev = bits[i];
19014036e387SClaudio Imbrenda 		pgstev = pgstev << 24;
19021bab1c02SClaudio Imbrenda 		mask &= _PGSTE_GPS_USAGE_MASK | _PGSTE_GPS_NODAT;
19034036e387SClaudio Imbrenda 		set_pgste_bits(kvm->mm, hva, mask, pgstev);
19044036e387SClaudio Imbrenda 	}
19054036e387SClaudio Imbrenda 	srcu_read_unlock(&kvm->srcu, srcu_idx);
19064036e387SClaudio Imbrenda 	up_read(&kvm->mm->mmap_sem);
19074036e387SClaudio Imbrenda 
1908c9f0a2b8SJanosch Frank 	if (!kvm->mm->context.uses_cmm) {
19094036e387SClaudio Imbrenda 		down_write(&kvm->mm->mmap_sem);
1910c9f0a2b8SJanosch Frank 		kvm->mm->context.uses_cmm = 1;
19114036e387SClaudio Imbrenda 		up_write(&kvm->mm->mmap_sem);
19124036e387SClaudio Imbrenda 	}
19134036e387SClaudio Imbrenda out:
19144036e387SClaudio Imbrenda 	vfree(bits);
19154036e387SClaudio Imbrenda 	return r;
19164036e387SClaudio Imbrenda }
19174036e387SClaudio Imbrenda 
1918b0c632dbSHeiko Carstens long kvm_arch_vm_ioctl(struct file *filp,
1919b0c632dbSHeiko Carstens 		       unsigned int ioctl, unsigned long arg)
1920b0c632dbSHeiko Carstens {
1921b0c632dbSHeiko Carstens 	struct kvm *kvm = filp->private_data;
1922b0c632dbSHeiko Carstens 	void __user *argp = (void __user *)arg;
1923f2061656SDominik Dingel 	struct kvm_device_attr attr;
1924b0c632dbSHeiko Carstens 	int r;
1925b0c632dbSHeiko Carstens 
1926b0c632dbSHeiko Carstens 	switch (ioctl) {
1927ba5c1e9bSCarsten Otte 	case KVM_S390_INTERRUPT: {
1928ba5c1e9bSCarsten Otte 		struct kvm_s390_interrupt s390int;
1929ba5c1e9bSCarsten Otte 
1930ba5c1e9bSCarsten Otte 		r = -EFAULT;
1931ba5c1e9bSCarsten Otte 		if (copy_from_user(&s390int, argp, sizeof(s390int)))
1932ba5c1e9bSCarsten Otte 			break;
1933ba5c1e9bSCarsten Otte 		r = kvm_s390_inject_vm(kvm, &s390int);
1934ba5c1e9bSCarsten Otte 		break;
1935ba5c1e9bSCarsten Otte 	}
1936d938dc55SCornelia Huck 	case KVM_ENABLE_CAP: {
1937d938dc55SCornelia Huck 		struct kvm_enable_cap cap;
1938d938dc55SCornelia Huck 		r = -EFAULT;
1939d938dc55SCornelia Huck 		if (copy_from_user(&cap, argp, sizeof(cap)))
1940d938dc55SCornelia Huck 			break;
1941d938dc55SCornelia Huck 		r = kvm_vm_ioctl_enable_cap(kvm, &cap);
1942d938dc55SCornelia Huck 		break;
1943d938dc55SCornelia Huck 	}
194484223598SCornelia Huck 	case KVM_CREATE_IRQCHIP: {
194584223598SCornelia Huck 		struct kvm_irq_routing_entry routing;
194684223598SCornelia Huck 
194784223598SCornelia Huck 		r = -EINVAL;
194884223598SCornelia Huck 		if (kvm->arch.use_irqchip) {
194984223598SCornelia Huck 			/* Set up dummy routing. */
195084223598SCornelia Huck 			memset(&routing, 0, sizeof(routing));
1951152b2839SNicholas Krause 			r = kvm_set_irq_routing(kvm, &routing, 0, 0);
195284223598SCornelia Huck 		}
195384223598SCornelia Huck 		break;
195484223598SCornelia Huck 	}
1955f2061656SDominik Dingel 	case KVM_SET_DEVICE_ATTR: {
1956f2061656SDominik Dingel 		r = -EFAULT;
1957f2061656SDominik Dingel 		if (copy_from_user(&attr, (void __user *)arg, sizeof(attr)))
1958f2061656SDominik Dingel 			break;
1959f2061656SDominik Dingel 		r = kvm_s390_vm_set_attr(kvm, &attr);
1960f2061656SDominik Dingel 		break;
1961f2061656SDominik Dingel 	}
1962f2061656SDominik Dingel 	case KVM_GET_DEVICE_ATTR: {
1963f2061656SDominik Dingel 		r = -EFAULT;
1964f2061656SDominik Dingel 		if (copy_from_user(&attr, (void __user *)arg, sizeof(attr)))
1965f2061656SDominik Dingel 			break;
1966f2061656SDominik Dingel 		r = kvm_s390_vm_get_attr(kvm, &attr);
1967f2061656SDominik Dingel 		break;
1968f2061656SDominik Dingel 	}
1969f2061656SDominik Dingel 	case KVM_HAS_DEVICE_ATTR: {
1970f2061656SDominik Dingel 		r = -EFAULT;
1971f2061656SDominik Dingel 		if (copy_from_user(&attr, (void __user *)arg, sizeof(attr)))
1972f2061656SDominik Dingel 			break;
1973f2061656SDominik Dingel 		r = kvm_s390_vm_has_attr(kvm, &attr);
1974f2061656SDominik Dingel 		break;
1975f2061656SDominik Dingel 	}
197630ee2a98SJason J. Herne 	case KVM_S390_GET_SKEYS: {
197730ee2a98SJason J. Herne 		struct kvm_s390_skeys args;
197830ee2a98SJason J. Herne 
197930ee2a98SJason J. Herne 		r = -EFAULT;
198030ee2a98SJason J. Herne 		if (copy_from_user(&args, argp,
198130ee2a98SJason J. Herne 				   sizeof(struct kvm_s390_skeys)))
198230ee2a98SJason J. Herne 			break;
198330ee2a98SJason J. Herne 		r = kvm_s390_get_skeys(kvm, &args);
198430ee2a98SJason J. Herne 		break;
198530ee2a98SJason J. Herne 	}
198630ee2a98SJason J. Herne 	case KVM_S390_SET_SKEYS: {
198730ee2a98SJason J. Herne 		struct kvm_s390_skeys args;
198830ee2a98SJason J. Herne 
198930ee2a98SJason J. Herne 		r = -EFAULT;
199030ee2a98SJason J. Herne 		if (copy_from_user(&args, argp,
199130ee2a98SJason J. Herne 				   sizeof(struct kvm_s390_skeys)))
199230ee2a98SJason J. Herne 			break;
199330ee2a98SJason J. Herne 		r = kvm_s390_set_skeys(kvm, &args);
199430ee2a98SJason J. Herne 		break;
199530ee2a98SJason J. Herne 	}
19964036e387SClaudio Imbrenda 	case KVM_S390_GET_CMMA_BITS: {
19974036e387SClaudio Imbrenda 		struct kvm_s390_cmma_log args;
19984036e387SClaudio Imbrenda 
19994036e387SClaudio Imbrenda 		r = -EFAULT;
20004036e387SClaudio Imbrenda 		if (copy_from_user(&args, argp, sizeof(args)))
20014036e387SClaudio Imbrenda 			break;
20021de1ea7eSChristian Borntraeger 		mutex_lock(&kvm->slots_lock);
20034036e387SClaudio Imbrenda 		r = kvm_s390_get_cmma_bits(kvm, &args);
20041de1ea7eSChristian Borntraeger 		mutex_unlock(&kvm->slots_lock);
20054036e387SClaudio Imbrenda 		if (!r) {
20064036e387SClaudio Imbrenda 			r = copy_to_user(argp, &args, sizeof(args));
20074036e387SClaudio Imbrenda 			if (r)
20084036e387SClaudio Imbrenda 				r = -EFAULT;
20094036e387SClaudio Imbrenda 		}
20104036e387SClaudio Imbrenda 		break;
20114036e387SClaudio Imbrenda 	}
20124036e387SClaudio Imbrenda 	case KVM_S390_SET_CMMA_BITS: {
20134036e387SClaudio Imbrenda 		struct kvm_s390_cmma_log args;
20144036e387SClaudio Imbrenda 
20154036e387SClaudio Imbrenda 		r = -EFAULT;
20164036e387SClaudio Imbrenda 		if (copy_from_user(&args, argp, sizeof(args)))
20174036e387SClaudio Imbrenda 			break;
20181de1ea7eSChristian Borntraeger 		mutex_lock(&kvm->slots_lock);
20194036e387SClaudio Imbrenda 		r = kvm_s390_set_cmma_bits(kvm, &args);
20201de1ea7eSChristian Borntraeger 		mutex_unlock(&kvm->slots_lock);
20214036e387SClaudio Imbrenda 		break;
20224036e387SClaudio Imbrenda 	}
2023b0c632dbSHeiko Carstens 	default:
2024367e1319SAvi Kivity 		r = -ENOTTY;
2025b0c632dbSHeiko Carstens 	}
2026b0c632dbSHeiko Carstens 
2027b0c632dbSHeiko Carstens 	return r;
2028b0c632dbSHeiko Carstens }
2029b0c632dbSHeiko Carstens 
203045c9b47cSTony Krowiak static int kvm_s390_apxa_installed(void)
203145c9b47cSTony Krowiak {
2032e585b24aSTony Krowiak 	struct ap_config_info info;
203345c9b47cSTony Krowiak 
2034e585b24aSTony Krowiak 	if (ap_instructions_available()) {
2035e585b24aSTony Krowiak 		if (ap_qci(&info) == 0)
2036e585b24aSTony Krowiak 			return info.apxa;
203745c9b47cSTony Krowiak 	}
203845c9b47cSTony Krowiak 
203945c9b47cSTony Krowiak 	return 0;
204045c9b47cSTony Krowiak }
204145c9b47cSTony Krowiak 
2042e585b24aSTony Krowiak /*
2043e585b24aSTony Krowiak  * The format of the crypto control block (CRYCB) is specified in the 3 low
2044e585b24aSTony Krowiak  * order bits of the CRYCB designation (CRYCBD) field as follows:
2045e585b24aSTony Krowiak  * Format 0: Neither the message security assist extension 3 (MSAX3) nor the
2046e585b24aSTony Krowiak  *	     AP extended addressing (APXA) facility are installed.
2047e585b24aSTony Krowiak  * Format 1: The APXA facility is not installed but the MSAX3 facility is.
2048e585b24aSTony Krowiak  * Format 2: Both the APXA and MSAX3 facilities are installed
2049e585b24aSTony Krowiak  */
205045c9b47cSTony Krowiak static void kvm_s390_set_crycb_format(struct kvm *kvm)
205145c9b47cSTony Krowiak {
205245c9b47cSTony Krowiak 	kvm->arch.crypto.crycbd = (__u32)(unsigned long) kvm->arch.crypto.crycb;
205345c9b47cSTony Krowiak 
2054e585b24aSTony Krowiak 	/* Clear the CRYCB format bits - i.e., set format 0 by default */
2055e585b24aSTony Krowiak 	kvm->arch.crypto.crycbd &= ~(CRYCB_FORMAT_MASK);
2056e585b24aSTony Krowiak 
2057e585b24aSTony Krowiak 	/* Check whether MSAX3 is installed */
2058e585b24aSTony Krowiak 	if (!test_kvm_facility(kvm, 76))
2059e585b24aSTony Krowiak 		return;
2060e585b24aSTony Krowiak 
206145c9b47cSTony Krowiak 	if (kvm_s390_apxa_installed())
206245c9b47cSTony Krowiak 		kvm->arch.crypto.crycbd |= CRYCB_FORMAT2;
206345c9b47cSTony Krowiak 	else
206445c9b47cSTony Krowiak 		kvm->arch.crypto.crycbd |= CRYCB_FORMAT1;
206545c9b47cSTony Krowiak }
206645c9b47cSTony Krowiak 
2067*0e237e44SPierre Morel void kvm_arch_crypto_set_masks(struct kvm *kvm, unsigned long *apm,
2068*0e237e44SPierre Morel 			       unsigned long *aqm, unsigned long *adm)
2069*0e237e44SPierre Morel {
2070*0e237e44SPierre Morel 	struct kvm_s390_crypto_cb *crycb = kvm->arch.crypto.crycb;
2071*0e237e44SPierre Morel 
2072*0e237e44SPierre Morel 	mutex_lock(&kvm->lock);
2073*0e237e44SPierre Morel 	kvm_s390_vcpu_block_all(kvm);
2074*0e237e44SPierre Morel 
2075*0e237e44SPierre Morel 	switch (kvm->arch.crypto.crycbd & CRYCB_FORMAT_MASK) {
2076*0e237e44SPierre Morel 	case CRYCB_FORMAT2: /* APCB1 use 256 bits */
2077*0e237e44SPierre Morel 		memcpy(crycb->apcb1.apm, apm, 32);
2078*0e237e44SPierre Morel 		VM_EVENT(kvm, 3, "SET CRYCB: apm %016lx %016lx %016lx %016lx",
2079*0e237e44SPierre Morel 			 apm[0], apm[1], apm[2], apm[3]);
2080*0e237e44SPierre Morel 		memcpy(crycb->apcb1.aqm, aqm, 32);
2081*0e237e44SPierre Morel 		VM_EVENT(kvm, 3, "SET CRYCB: aqm %016lx %016lx %016lx %016lx",
2082*0e237e44SPierre Morel 			 aqm[0], aqm[1], aqm[2], aqm[3]);
2083*0e237e44SPierre Morel 		memcpy(crycb->apcb1.adm, adm, 32);
2084*0e237e44SPierre Morel 		VM_EVENT(kvm, 3, "SET CRYCB: adm %016lx %016lx %016lx %016lx",
2085*0e237e44SPierre Morel 			 adm[0], adm[1], adm[2], adm[3]);
2086*0e237e44SPierre Morel 		break;
2087*0e237e44SPierre Morel 	case CRYCB_FORMAT1:
2088*0e237e44SPierre Morel 	case CRYCB_FORMAT0: /* Fall through both use APCB0 */
2089*0e237e44SPierre Morel 		memcpy(crycb->apcb0.apm, apm, 8);
2090*0e237e44SPierre Morel 		memcpy(crycb->apcb0.aqm, aqm, 2);
2091*0e237e44SPierre Morel 		memcpy(crycb->apcb0.adm, adm, 2);
2092*0e237e44SPierre Morel 		VM_EVENT(kvm, 3, "SET CRYCB: apm %016lx aqm %04x adm %04x",
2093*0e237e44SPierre Morel 			 apm[0], *((unsigned short *)aqm),
2094*0e237e44SPierre Morel 			 *((unsigned short *)adm));
2095*0e237e44SPierre Morel 		break;
2096*0e237e44SPierre Morel 	default:	/* Can not happen */
2097*0e237e44SPierre Morel 		break;
2098*0e237e44SPierre Morel 	}
2099*0e237e44SPierre Morel 
2100*0e237e44SPierre Morel 	/* recreate the shadow crycb for each vcpu */
2101*0e237e44SPierre Morel 	kvm_s390_sync_request_broadcast(kvm, KVM_REQ_VSIE_RESTART);
2102*0e237e44SPierre Morel 	kvm_s390_vcpu_unblock_all(kvm);
2103*0e237e44SPierre Morel 	mutex_unlock(&kvm->lock);
2104*0e237e44SPierre Morel }
2105*0e237e44SPierre Morel EXPORT_SYMBOL_GPL(kvm_arch_crypto_set_masks);
2106*0e237e44SPierre Morel 
210742104598STony Krowiak void kvm_arch_crypto_clear_masks(struct kvm *kvm)
210842104598STony Krowiak {
210942104598STony Krowiak 	mutex_lock(&kvm->lock);
211042104598STony Krowiak 	kvm_s390_vcpu_block_all(kvm);
211142104598STony Krowiak 
211242104598STony Krowiak 	memset(&kvm->arch.crypto.crycb->apcb0, 0,
211342104598STony Krowiak 	       sizeof(kvm->arch.crypto.crycb->apcb0));
211442104598STony Krowiak 	memset(&kvm->arch.crypto.crycb->apcb1, 0,
211542104598STony Krowiak 	       sizeof(kvm->arch.crypto.crycb->apcb1));
211642104598STony Krowiak 
2117*0e237e44SPierre Morel 	VM_EVENT(kvm, 3, "%s", "CLR CRYCB:");
21186cc571b1SPierre Morel 	/* recreate the shadow crycb for each vcpu */
21196cc571b1SPierre Morel 	kvm_s390_sync_request_broadcast(kvm, KVM_REQ_VSIE_RESTART);
212042104598STony Krowiak 	kvm_s390_vcpu_unblock_all(kvm);
212142104598STony Krowiak 	mutex_unlock(&kvm->lock);
212242104598STony Krowiak }
212342104598STony Krowiak EXPORT_SYMBOL_GPL(kvm_arch_crypto_clear_masks);
212442104598STony Krowiak 
21259bb0ec09SDavid Hildenbrand static u64 kvm_s390_get_initial_cpuid(void)
21269d8d5786SMichael Mueller {
21279bb0ec09SDavid Hildenbrand 	struct cpuid cpuid;
21289bb0ec09SDavid Hildenbrand 
21299bb0ec09SDavid Hildenbrand 	get_cpu_id(&cpuid);
21309bb0ec09SDavid Hildenbrand 	cpuid.version = 0xff;
21319bb0ec09SDavid Hildenbrand 	return *((u64 *) &cpuid);
21329d8d5786SMichael Mueller }
21339d8d5786SMichael Mueller 
2134c54f0d6aSDavid Hildenbrand static void kvm_s390_crypto_init(struct kvm *kvm)
21355102ee87STony Krowiak {
2136c54f0d6aSDavid Hildenbrand 	kvm->arch.crypto.crycb = &kvm->arch.sie_page2->crycb;
213745c9b47cSTony Krowiak 	kvm_s390_set_crycb_format(kvm);
21385102ee87STony Krowiak 
2139e585b24aSTony Krowiak 	if (!test_kvm_facility(kvm, 76))
2140e585b24aSTony Krowiak 		return;
2141e585b24aSTony Krowiak 
2142ed6f76b4STony Krowiak 	/* Enable AES/DEA protected key functions by default */
2143ed6f76b4STony Krowiak 	kvm->arch.crypto.aes_kw = 1;
2144ed6f76b4STony Krowiak 	kvm->arch.crypto.dea_kw = 1;
2145ed6f76b4STony Krowiak 	get_random_bytes(kvm->arch.crypto.crycb->aes_wrapping_key_mask,
2146ed6f76b4STony Krowiak 			 sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask));
2147ed6f76b4STony Krowiak 	get_random_bytes(kvm->arch.crypto.crycb->dea_wrapping_key_mask,
2148ed6f76b4STony Krowiak 			 sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask));
21495102ee87STony Krowiak }
21505102ee87STony Krowiak 
21517d43bafcSEugene (jno) Dvurechenski static void sca_dispose(struct kvm *kvm)
21527d43bafcSEugene (jno) Dvurechenski {
21537d43bafcSEugene (jno) Dvurechenski 	if (kvm->arch.use_esca)
21545e044315SEugene (jno) Dvurechenski 		free_pages_exact(kvm->arch.sca, sizeof(struct esca_block));
21557d43bafcSEugene (jno) Dvurechenski 	else
21567d43bafcSEugene (jno) Dvurechenski 		free_page((unsigned long)(kvm->arch.sca));
21577d43bafcSEugene (jno) Dvurechenski 	kvm->arch.sca = NULL;
21587d43bafcSEugene (jno) Dvurechenski }
21597d43bafcSEugene (jno) Dvurechenski 
2160e08b9637SCarsten Otte int kvm_arch_init_vm(struct kvm *kvm, unsigned long type)
2161b0c632dbSHeiko Carstens {
216276a6dd72SDavid Hildenbrand 	gfp_t alloc_flags = GFP_KERNEL;
21639d8d5786SMichael Mueller 	int i, rc;
2164b0c632dbSHeiko Carstens 	char debug_name[16];
2165f6c137ffSChristian Borntraeger 	static unsigned long sca_offset;
2166b0c632dbSHeiko Carstens 
2167e08b9637SCarsten Otte 	rc = -EINVAL;
2168e08b9637SCarsten Otte #ifdef CONFIG_KVM_S390_UCONTROL
2169e08b9637SCarsten Otte 	if (type & ~KVM_VM_S390_UCONTROL)
2170e08b9637SCarsten Otte 		goto out_err;
2171e08b9637SCarsten Otte 	if ((type & KVM_VM_S390_UCONTROL) && (!capable(CAP_SYS_ADMIN)))
2172e08b9637SCarsten Otte 		goto out_err;
2173e08b9637SCarsten Otte #else
2174e08b9637SCarsten Otte 	if (type)
2175e08b9637SCarsten Otte 		goto out_err;
2176e08b9637SCarsten Otte #endif
2177e08b9637SCarsten Otte 
2178b0c632dbSHeiko Carstens 	rc = s390_enable_sie();
2179b0c632dbSHeiko Carstens 	if (rc)
2180d89f5effSJan Kiszka 		goto out_err;
2181b0c632dbSHeiko Carstens 
2182b290411aSCarsten Otte 	rc = -ENOMEM;
2183b290411aSCarsten Otte 
218476a6dd72SDavid Hildenbrand 	if (!sclp.has_64bscao)
218576a6dd72SDavid Hildenbrand 		alloc_flags |= GFP_DMA;
21865e044315SEugene (jno) Dvurechenski 	rwlock_init(&kvm->arch.sca_lock);
21879ac96d75SDavid Hildenbrand 	/* start with basic SCA */
218876a6dd72SDavid Hildenbrand 	kvm->arch.sca = (struct bsca_block *) get_zeroed_page(alloc_flags);
2189b0c632dbSHeiko Carstens 	if (!kvm->arch.sca)
2190d89f5effSJan Kiszka 		goto out_err;
2191f6c137ffSChristian Borntraeger 	spin_lock(&kvm_lock);
2192c5c2c393SDavid Hildenbrand 	sca_offset += 16;
2193bc784cceSEugene (jno) Dvurechenski 	if (sca_offset + sizeof(struct bsca_block) > PAGE_SIZE)
2194c5c2c393SDavid Hildenbrand 		sca_offset = 0;
2195bc784cceSEugene (jno) Dvurechenski 	kvm->arch.sca = (struct bsca_block *)
2196bc784cceSEugene (jno) Dvurechenski 			((char *) kvm->arch.sca + sca_offset);
2197f6c137ffSChristian Borntraeger 	spin_unlock(&kvm_lock);
2198b0c632dbSHeiko Carstens 
2199b0c632dbSHeiko Carstens 	sprintf(debug_name, "kvm-%u", current->pid);
2200b0c632dbSHeiko Carstens 
22011cb9cf72SChristian Borntraeger 	kvm->arch.dbf = debug_register(debug_name, 32, 1, 7 * sizeof(long));
2202b0c632dbSHeiko Carstens 	if (!kvm->arch.dbf)
220340f5b735SDominik Dingel 		goto out_err;
2204b0c632dbSHeiko Carstens 
220519114bebSMichael Mueller 	BUILD_BUG_ON(sizeof(struct sie_page2) != 4096);
2206c54f0d6aSDavid Hildenbrand 	kvm->arch.sie_page2 =
2207c54f0d6aSDavid Hildenbrand 	     (struct sie_page2 *) get_zeroed_page(GFP_KERNEL | GFP_DMA);
2208c54f0d6aSDavid Hildenbrand 	if (!kvm->arch.sie_page2)
220940f5b735SDominik Dingel 		goto out_err;
22109d8d5786SMichael Mueller 
2211c54f0d6aSDavid Hildenbrand 	kvm->arch.model.fac_list = kvm->arch.sie_page2->fac_list;
2212c3b9e3e1SChristian Borntraeger 
2213c3b9e3e1SChristian Borntraeger 	for (i = 0; i < kvm_s390_fac_size(); i++) {
2214c3b9e3e1SChristian Borntraeger 		kvm->arch.model.fac_mask[i] = S390_lowcore.stfle_fac_list[i] &
2215c3b9e3e1SChristian Borntraeger 					      (kvm_s390_fac_base[i] |
2216c3b9e3e1SChristian Borntraeger 					       kvm_s390_fac_ext[i]);
2217c3b9e3e1SChristian Borntraeger 		kvm->arch.model.fac_list[i] = S390_lowcore.stfle_fac_list[i] &
2218c3b9e3e1SChristian Borntraeger 					      kvm_s390_fac_base[i];
2219c3b9e3e1SChristian Borntraeger 	}
2220981467c9SMichael Mueller 
22211935222dSDavid Hildenbrand 	/* we are always in czam mode - even on pre z14 machines */
22221935222dSDavid Hildenbrand 	set_kvm_facility(kvm->arch.model.fac_mask, 138);
22231935222dSDavid Hildenbrand 	set_kvm_facility(kvm->arch.model.fac_list, 138);
22241935222dSDavid Hildenbrand 	/* we emulate STHYI in kvm */
222595ca2cb5SJanosch Frank 	set_kvm_facility(kvm->arch.model.fac_mask, 74);
222695ca2cb5SJanosch Frank 	set_kvm_facility(kvm->arch.model.fac_list, 74);
22271bab1c02SClaudio Imbrenda 	if (MACHINE_HAS_TLB_GUEST) {
22281bab1c02SClaudio Imbrenda 		set_kvm_facility(kvm->arch.model.fac_mask, 147);
22291bab1c02SClaudio Imbrenda 		set_kvm_facility(kvm->arch.model.fac_list, 147);
22301bab1c02SClaudio Imbrenda 	}
223195ca2cb5SJanosch Frank 
22329bb0ec09SDavid Hildenbrand 	kvm->arch.model.cpuid = kvm_s390_get_initial_cpuid();
223337c5f6c8SDavid Hildenbrand 	kvm->arch.model.ibc = sclp.ibc & 0x0fff;
22349d8d5786SMichael Mueller 
2235c54f0d6aSDavid Hildenbrand 	kvm_s390_crypto_init(kvm);
22365102ee87STony Krowiak 
223751978393SFei Li 	mutex_init(&kvm->arch.float_int.ais_lock);
2238ba5c1e9bSCarsten Otte 	spin_lock_init(&kvm->arch.float_int.lock);
22396d3da241SJens Freimann 	for (i = 0; i < FIRQ_LIST_COUNT; i++)
22406d3da241SJens Freimann 		INIT_LIST_HEAD(&kvm->arch.float_int.lists[i]);
22418a242234SHeiko Carstens 	init_waitqueue_head(&kvm->arch.ipte_wq);
2242a6b7e459SThomas Huth 	mutex_init(&kvm->arch.ipte_mutex);
2243ba5c1e9bSCarsten Otte 
2244b0c632dbSHeiko Carstens 	debug_register_view(kvm->arch.dbf, &debug_sprintf_view);
224578f26131SChristian Borntraeger 	VM_EVENT(kvm, 3, "vm created with type %lu", type);
2246b0c632dbSHeiko Carstens 
2247e08b9637SCarsten Otte 	if (type & KVM_VM_S390_UCONTROL) {
2248e08b9637SCarsten Otte 		kvm->arch.gmap = NULL;
2249a3a92c31SDominik Dingel 		kvm->arch.mem_limit = KVM_S390_NO_MEM_LIMIT;
2250e08b9637SCarsten Otte 	} else {
225132e6b236SGuenther Hutzl 		if (sclp.hamax == U64_MAX)
2252ee71d16dSMartin Schwidefsky 			kvm->arch.mem_limit = TASK_SIZE_MAX;
225332e6b236SGuenther Hutzl 		else
2254ee71d16dSMartin Schwidefsky 			kvm->arch.mem_limit = min_t(unsigned long, TASK_SIZE_MAX,
225532e6b236SGuenther Hutzl 						    sclp.hamax + 1);
22566ea427bbSMartin Schwidefsky 		kvm->arch.gmap = gmap_create(current->mm, kvm->arch.mem_limit - 1);
2257598841caSCarsten Otte 		if (!kvm->arch.gmap)
225840f5b735SDominik Dingel 			goto out_err;
22592c70fe44SChristian Borntraeger 		kvm->arch.gmap->private = kvm;
226024eb3a82SDominik Dingel 		kvm->arch.gmap->pfault_enabled = 0;
2261e08b9637SCarsten Otte 	}
2262fa6b7fe9SCornelia Huck 
2263c9f0a2b8SJanosch Frank 	kvm->arch.use_pfmfi = sclp.has_pfmfi;
226455531b74SJanosch Frank 	kvm->arch.use_skf = sclp.has_skey;
22658ad35755SDavid Hildenbrand 	spin_lock_init(&kvm->arch.start_stop_lock);
2266a3508fbeSDavid Hildenbrand 	kvm_s390_vsie_init(kvm);
2267d7c5cb01SMichael Mueller 	kvm_s390_gisa_init(kvm);
22688335713aSChristian Borntraeger 	KVM_EVENT(3, "vm 0x%pK created by pid %u", kvm, current->pid);
22698ad35755SDavid Hildenbrand 
2270d89f5effSJan Kiszka 	return 0;
2271d89f5effSJan Kiszka out_err:
2272c54f0d6aSDavid Hildenbrand 	free_page((unsigned long)kvm->arch.sie_page2);
227340f5b735SDominik Dingel 	debug_unregister(kvm->arch.dbf);
22747d43bafcSEugene (jno) Dvurechenski 	sca_dispose(kvm);
227578f26131SChristian Borntraeger 	KVM_EVENT(3, "creation of vm failed: %d", rc);
2276d89f5effSJan Kiszka 	return rc;
2277b0c632dbSHeiko Carstens }
2278b0c632dbSHeiko Carstens 
2279235539b4SLuiz Capitulino bool kvm_arch_has_vcpu_debugfs(void)
2280235539b4SLuiz Capitulino {
2281235539b4SLuiz Capitulino 	return false;
2282235539b4SLuiz Capitulino }
2283235539b4SLuiz Capitulino 
2284235539b4SLuiz Capitulino int kvm_arch_create_vcpu_debugfs(struct kvm_vcpu *vcpu)
2285235539b4SLuiz Capitulino {
2286235539b4SLuiz Capitulino 	return 0;
2287235539b4SLuiz Capitulino }
2288235539b4SLuiz Capitulino 
2289d329c035SChristian Borntraeger void kvm_arch_vcpu_destroy(struct kvm_vcpu *vcpu)
2290d329c035SChristian Borntraeger {
2291d329c035SChristian Borntraeger 	VCPU_EVENT(vcpu, 3, "%s", "free cpu");
2292ade38c31SCornelia Huck 	trace_kvm_s390_destroy_vcpu(vcpu->vcpu_id);
229367335e63SChristian Borntraeger 	kvm_s390_clear_local_irqs(vcpu);
22943c038e6bSDominik Dingel 	kvm_clear_async_pf_completion_queue(vcpu);
2295bc784cceSEugene (jno) Dvurechenski 	if (!kvm_is_ucontrol(vcpu->kvm))
2296a6e2f683SEugene (jno) Dvurechenski 		sca_del_vcpu(vcpu);
229727e0393fSCarsten Otte 
229827e0393fSCarsten Otte 	if (kvm_is_ucontrol(vcpu->kvm))
22996ea427bbSMartin Schwidefsky 		gmap_remove(vcpu->arch.gmap);
230027e0393fSCarsten Otte 
2301e6db1d61SDominik Dingel 	if (vcpu->kvm->arch.use_cmma)
2302b31605c1SDominik Dingel 		kvm_s390_vcpu_unsetup_cmma(vcpu);
2303d329c035SChristian Borntraeger 	free_page((unsigned long)(vcpu->arch.sie_block));
2304b31288faSKonstantin Weitz 
23056692cef3SChristian Borntraeger 	kvm_vcpu_uninit(vcpu);
2306b110feafSMichael Mueller 	kmem_cache_free(kvm_vcpu_cache, vcpu);
2307d329c035SChristian Borntraeger }
2308d329c035SChristian Borntraeger 
2309d329c035SChristian Borntraeger static void kvm_free_vcpus(struct kvm *kvm)
2310d329c035SChristian Borntraeger {
2311d329c035SChristian Borntraeger 	unsigned int i;
2312988a2caeSGleb Natapov 	struct kvm_vcpu *vcpu;
2313d329c035SChristian Borntraeger 
2314988a2caeSGleb Natapov 	kvm_for_each_vcpu(i, vcpu, kvm)
2315988a2caeSGleb Natapov 		kvm_arch_vcpu_destroy(vcpu);
2316988a2caeSGleb Natapov 
2317988a2caeSGleb Natapov 	mutex_lock(&kvm->lock);
2318988a2caeSGleb Natapov 	for (i = 0; i < atomic_read(&kvm->online_vcpus); i++)
2319d329c035SChristian Borntraeger 		kvm->vcpus[i] = NULL;
2320988a2caeSGleb Natapov 
2321988a2caeSGleb Natapov 	atomic_set(&kvm->online_vcpus, 0);
2322988a2caeSGleb Natapov 	mutex_unlock(&kvm->lock);
2323d329c035SChristian Borntraeger }
2324d329c035SChristian Borntraeger 
2325b0c632dbSHeiko Carstens void kvm_arch_destroy_vm(struct kvm *kvm)
2326b0c632dbSHeiko Carstens {
2327d329c035SChristian Borntraeger 	kvm_free_vcpus(kvm);
23287d43bafcSEugene (jno) Dvurechenski 	sca_dispose(kvm);
2329d329c035SChristian Borntraeger 	debug_unregister(kvm->arch.dbf);
2330d7c5cb01SMichael Mueller 	kvm_s390_gisa_destroy(kvm);
2331c54f0d6aSDavid Hildenbrand 	free_page((unsigned long)kvm->arch.sie_page2);
233227e0393fSCarsten Otte 	if (!kvm_is_ucontrol(kvm))
23336ea427bbSMartin Schwidefsky 		gmap_remove(kvm->arch.gmap);
2334841b91c5SCornelia Huck 	kvm_s390_destroy_adapters(kvm);
233567335e63SChristian Borntraeger 	kvm_s390_clear_float_irqs(kvm);
2336a3508fbeSDavid Hildenbrand 	kvm_s390_vsie_destroy(kvm);
23378335713aSChristian Borntraeger 	KVM_EVENT(3, "vm 0x%pK destroyed", kvm);
2338b0c632dbSHeiko Carstens }
2339b0c632dbSHeiko Carstens 
2340b0c632dbSHeiko Carstens /* Section: vcpu related */
2341dafd032aSDominik Dingel static int __kvm_ucontrol_vcpu_init(struct kvm_vcpu *vcpu)
2342b0c632dbSHeiko Carstens {
23436ea427bbSMartin Schwidefsky 	vcpu->arch.gmap = gmap_create(current->mm, -1UL);
234427e0393fSCarsten Otte 	if (!vcpu->arch.gmap)
234527e0393fSCarsten Otte 		return -ENOMEM;
23462c70fe44SChristian Borntraeger 	vcpu->arch.gmap->private = vcpu->kvm;
2347dafd032aSDominik Dingel 
234827e0393fSCarsten Otte 	return 0;
234927e0393fSCarsten Otte }
235027e0393fSCarsten Otte 
2351a6e2f683SEugene (jno) Dvurechenski static void sca_del_vcpu(struct kvm_vcpu *vcpu)
2352a6e2f683SEugene (jno) Dvurechenski {
2353a6940674SDavid Hildenbrand 	if (!kvm_s390_use_sca_entries())
2354a6940674SDavid Hildenbrand 		return;
23555e044315SEugene (jno) Dvurechenski 	read_lock(&vcpu->kvm->arch.sca_lock);
23567d43bafcSEugene (jno) Dvurechenski 	if (vcpu->kvm->arch.use_esca) {
23577d43bafcSEugene (jno) Dvurechenski 		struct esca_block *sca = vcpu->kvm->arch.sca;
23587d43bafcSEugene (jno) Dvurechenski 
23597d43bafcSEugene (jno) Dvurechenski 		clear_bit_inv(vcpu->vcpu_id, (unsigned long *) sca->mcn);
23607d43bafcSEugene (jno) Dvurechenski 		sca->cpu[vcpu->vcpu_id].sda = 0;
23617d43bafcSEugene (jno) Dvurechenski 	} else {
2362bc784cceSEugene (jno) Dvurechenski 		struct bsca_block *sca = vcpu->kvm->arch.sca;
2363a6e2f683SEugene (jno) Dvurechenski 
2364a6e2f683SEugene (jno) Dvurechenski 		clear_bit_inv(vcpu->vcpu_id, (unsigned long *) &sca->mcn);
2365a6e2f683SEugene (jno) Dvurechenski 		sca->cpu[vcpu->vcpu_id].sda = 0;
2366a6e2f683SEugene (jno) Dvurechenski 	}
23675e044315SEugene (jno) Dvurechenski 	read_unlock(&vcpu->kvm->arch.sca_lock);
23687d43bafcSEugene (jno) Dvurechenski }
2369a6e2f683SEugene (jno) Dvurechenski 
2370eaa78f34SDavid Hildenbrand static void sca_add_vcpu(struct kvm_vcpu *vcpu)
2371a6e2f683SEugene (jno) Dvurechenski {
2372a6940674SDavid Hildenbrand 	if (!kvm_s390_use_sca_entries()) {
2373a6940674SDavid Hildenbrand 		struct bsca_block *sca = vcpu->kvm->arch.sca;
2374a6940674SDavid Hildenbrand 
2375a6940674SDavid Hildenbrand 		/* we still need the basic sca for the ipte control */
2376a6940674SDavid Hildenbrand 		vcpu->arch.sie_block->scaoh = (__u32)(((__u64)sca) >> 32);
2377a6940674SDavid Hildenbrand 		vcpu->arch.sie_block->scaol = (__u32)(__u64)sca;
2378f07afa04SDavid Hildenbrand 		return;
2379a6940674SDavid Hildenbrand 	}
2380eaa78f34SDavid Hildenbrand 	read_lock(&vcpu->kvm->arch.sca_lock);
2381eaa78f34SDavid Hildenbrand 	if (vcpu->kvm->arch.use_esca) {
2382eaa78f34SDavid Hildenbrand 		struct esca_block *sca = vcpu->kvm->arch.sca;
23837d43bafcSEugene (jno) Dvurechenski 
2384eaa78f34SDavid Hildenbrand 		sca->cpu[vcpu->vcpu_id].sda = (__u64) vcpu->arch.sie_block;
23857d43bafcSEugene (jno) Dvurechenski 		vcpu->arch.sie_block->scaoh = (__u32)(((__u64)sca) >> 32);
23867d43bafcSEugene (jno) Dvurechenski 		vcpu->arch.sie_block->scaol = (__u32)(__u64)sca & ~0x3fU;
23870c9d8683SDavid Hildenbrand 		vcpu->arch.sie_block->ecb2 |= ECB2_ESCA;
2388eaa78f34SDavid Hildenbrand 		set_bit_inv(vcpu->vcpu_id, (unsigned long *) sca->mcn);
23897d43bafcSEugene (jno) Dvurechenski 	} else {
2390eaa78f34SDavid Hildenbrand 		struct bsca_block *sca = vcpu->kvm->arch.sca;
2391a6e2f683SEugene (jno) Dvurechenski 
2392eaa78f34SDavid Hildenbrand 		sca->cpu[vcpu->vcpu_id].sda = (__u64) vcpu->arch.sie_block;
2393a6e2f683SEugene (jno) Dvurechenski 		vcpu->arch.sie_block->scaoh = (__u32)(((__u64)sca) >> 32);
2394a6e2f683SEugene (jno) Dvurechenski 		vcpu->arch.sie_block->scaol = (__u32)(__u64)sca;
2395eaa78f34SDavid Hildenbrand 		set_bit_inv(vcpu->vcpu_id, (unsigned long *) &sca->mcn);
2396a6e2f683SEugene (jno) Dvurechenski 	}
2397eaa78f34SDavid Hildenbrand 	read_unlock(&vcpu->kvm->arch.sca_lock);
23985e044315SEugene (jno) Dvurechenski }
23995e044315SEugene (jno) Dvurechenski 
24005e044315SEugene (jno) Dvurechenski /* Basic SCA to Extended SCA data copy routines */
24015e044315SEugene (jno) Dvurechenski static inline void sca_copy_entry(struct esca_entry *d, struct bsca_entry *s)
24025e044315SEugene (jno) Dvurechenski {
24035e044315SEugene (jno) Dvurechenski 	d->sda = s->sda;
24045e044315SEugene (jno) Dvurechenski 	d->sigp_ctrl.c = s->sigp_ctrl.c;
24055e044315SEugene (jno) Dvurechenski 	d->sigp_ctrl.scn = s->sigp_ctrl.scn;
24065e044315SEugene (jno) Dvurechenski }
24075e044315SEugene (jno) Dvurechenski 
24085e044315SEugene (jno) Dvurechenski static void sca_copy_b_to_e(struct esca_block *d, struct bsca_block *s)
24095e044315SEugene (jno) Dvurechenski {
24105e044315SEugene (jno) Dvurechenski 	int i;
24115e044315SEugene (jno) Dvurechenski 
24125e044315SEugene (jno) Dvurechenski 	d->ipte_control = s->ipte_control;
24135e044315SEugene (jno) Dvurechenski 	d->mcn[0] = s->mcn;
24145e044315SEugene (jno) Dvurechenski 	for (i = 0; i < KVM_S390_BSCA_CPU_SLOTS; i++)
24155e044315SEugene (jno) Dvurechenski 		sca_copy_entry(&d->cpu[i], &s->cpu[i]);
24165e044315SEugene (jno) Dvurechenski }
24175e044315SEugene (jno) Dvurechenski 
24185e044315SEugene (jno) Dvurechenski static int sca_switch_to_extended(struct kvm *kvm)
24195e044315SEugene (jno) Dvurechenski {
24205e044315SEugene (jno) Dvurechenski 	struct bsca_block *old_sca = kvm->arch.sca;
24215e044315SEugene (jno) Dvurechenski 	struct esca_block *new_sca;
24225e044315SEugene (jno) Dvurechenski 	struct kvm_vcpu *vcpu;
24235e044315SEugene (jno) Dvurechenski 	unsigned int vcpu_idx;
24245e044315SEugene (jno) Dvurechenski 	u32 scaol, scaoh;
24255e044315SEugene (jno) Dvurechenski 
24265e044315SEugene (jno) Dvurechenski 	new_sca = alloc_pages_exact(sizeof(*new_sca), GFP_KERNEL|__GFP_ZERO);
24275e044315SEugene (jno) Dvurechenski 	if (!new_sca)
24285e044315SEugene (jno) Dvurechenski 		return -ENOMEM;
24295e044315SEugene (jno) Dvurechenski 
24305e044315SEugene (jno) Dvurechenski 	scaoh = (u32)((u64)(new_sca) >> 32);
24315e044315SEugene (jno) Dvurechenski 	scaol = (u32)(u64)(new_sca) & ~0x3fU;
24325e044315SEugene (jno) Dvurechenski 
24335e044315SEugene (jno) Dvurechenski 	kvm_s390_vcpu_block_all(kvm);
24345e044315SEugene (jno) Dvurechenski 	write_lock(&kvm->arch.sca_lock);
24355e044315SEugene (jno) Dvurechenski 
24365e044315SEugene (jno) Dvurechenski 	sca_copy_b_to_e(new_sca, old_sca);
24375e044315SEugene (jno) Dvurechenski 
24385e044315SEugene (jno) Dvurechenski 	kvm_for_each_vcpu(vcpu_idx, vcpu, kvm) {
24395e044315SEugene (jno) Dvurechenski 		vcpu->arch.sie_block->scaoh = scaoh;
24405e044315SEugene (jno) Dvurechenski 		vcpu->arch.sie_block->scaol = scaol;
24410c9d8683SDavid Hildenbrand 		vcpu->arch.sie_block->ecb2 |= ECB2_ESCA;
24425e044315SEugene (jno) Dvurechenski 	}
24435e044315SEugene (jno) Dvurechenski 	kvm->arch.sca = new_sca;
24445e044315SEugene (jno) Dvurechenski 	kvm->arch.use_esca = 1;
24455e044315SEugene (jno) Dvurechenski 
24465e044315SEugene (jno) Dvurechenski 	write_unlock(&kvm->arch.sca_lock);
24475e044315SEugene (jno) Dvurechenski 	kvm_s390_vcpu_unblock_all(kvm);
24485e044315SEugene (jno) Dvurechenski 
24495e044315SEugene (jno) Dvurechenski 	free_page((unsigned long)old_sca);
24505e044315SEugene (jno) Dvurechenski 
24518335713aSChristian Borntraeger 	VM_EVENT(kvm, 2, "Switched to ESCA (0x%pK -> 0x%pK)",
24528335713aSChristian Borntraeger 		 old_sca, kvm->arch.sca);
24535e044315SEugene (jno) Dvurechenski 	return 0;
24547d43bafcSEugene (jno) Dvurechenski }
2455a6e2f683SEugene (jno) Dvurechenski 
2456a6e2f683SEugene (jno) Dvurechenski static int sca_can_add_vcpu(struct kvm *kvm, unsigned int id)
2457a6e2f683SEugene (jno) Dvurechenski {
24585e044315SEugene (jno) Dvurechenski 	int rc;
24595e044315SEugene (jno) Dvurechenski 
2460a6940674SDavid Hildenbrand 	if (!kvm_s390_use_sca_entries()) {
2461a6940674SDavid Hildenbrand 		if (id < KVM_MAX_VCPUS)
2462a6940674SDavid Hildenbrand 			return true;
2463a6940674SDavid Hildenbrand 		return false;
2464a6940674SDavid Hildenbrand 	}
24655e044315SEugene (jno) Dvurechenski 	if (id < KVM_S390_BSCA_CPU_SLOTS)
24665e044315SEugene (jno) Dvurechenski 		return true;
246776a6dd72SDavid Hildenbrand 	if (!sclp.has_esca || !sclp.has_64bscao)
24685e044315SEugene (jno) Dvurechenski 		return false;
24695e044315SEugene (jno) Dvurechenski 
24705e044315SEugene (jno) Dvurechenski 	mutex_lock(&kvm->lock);
24715e044315SEugene (jno) Dvurechenski 	rc = kvm->arch.use_esca ? 0 : sca_switch_to_extended(kvm);
24725e044315SEugene (jno) Dvurechenski 	mutex_unlock(&kvm->lock);
24735e044315SEugene (jno) Dvurechenski 
24745e044315SEugene (jno) Dvurechenski 	return rc == 0 && id < KVM_S390_ESCA_CPU_SLOTS;
2475a6e2f683SEugene (jno) Dvurechenski }
2476a6e2f683SEugene (jno) Dvurechenski 
2477dafd032aSDominik Dingel int kvm_arch_vcpu_init(struct kvm_vcpu *vcpu)
2478dafd032aSDominik Dingel {
2479dafd032aSDominik Dingel 	vcpu->arch.pfault_token = KVM_S390_PFAULT_TOKEN_INVALID;
2480dafd032aSDominik Dingel 	kvm_clear_async_pf_completion_queue(vcpu);
248159674c1aSChristian Borntraeger 	vcpu->run->kvm_valid_regs = KVM_SYNC_PREFIX |
248259674c1aSChristian Borntraeger 				    KVM_SYNC_GPRS |
24839eed0735SChristian Borntraeger 				    KVM_SYNC_ACRS |
2484b028ee3eSDavid Hildenbrand 				    KVM_SYNC_CRS |
2485b028ee3eSDavid Hildenbrand 				    KVM_SYNC_ARCH0 |
2486b028ee3eSDavid Hildenbrand 				    KVM_SYNC_PFAULT;
248775a4615cSJulius Niedworok 	kvm_s390_set_prefix(vcpu, 0);
2488c6e5f166SFan Zhang 	if (test_kvm_facility(vcpu->kvm, 64))
2489c6e5f166SFan Zhang 		vcpu->run->kvm_valid_regs |= KVM_SYNC_RICCB;
249035b3fde6SChristian Borntraeger 	if (test_kvm_facility(vcpu->kvm, 82))
249135b3fde6SChristian Borntraeger 		vcpu->run->kvm_valid_regs |= KVM_SYNC_BPBC;
24924e0b1ab7SFan Zhang 	if (test_kvm_facility(vcpu->kvm, 133))
24934e0b1ab7SFan Zhang 		vcpu->run->kvm_valid_regs |= KVM_SYNC_GSCB;
2494a3da7b4aSChristian Borntraeger 	if (test_kvm_facility(vcpu->kvm, 156))
2495a3da7b4aSChristian Borntraeger 		vcpu->run->kvm_valid_regs |= KVM_SYNC_ETOKEN;
2496f6aa6dc4SDavid Hildenbrand 	/* fprs can be synchronized via vrs, even if the guest has no vx. With
2497f6aa6dc4SDavid Hildenbrand 	 * MACHINE_HAS_VX, (load|store)_fpu_regs() will work with vrs format.
2498f6aa6dc4SDavid Hildenbrand 	 */
2499f6aa6dc4SDavid Hildenbrand 	if (MACHINE_HAS_VX)
250068c55750SEric Farman 		vcpu->run->kvm_valid_regs |= KVM_SYNC_VRS;
25016fd8e67dSDavid Hildenbrand 	else
25026fd8e67dSDavid Hildenbrand 		vcpu->run->kvm_valid_regs |= KVM_SYNC_FPRS;
2503dafd032aSDominik Dingel 
2504dafd032aSDominik Dingel 	if (kvm_is_ucontrol(vcpu->kvm))
2505dafd032aSDominik Dingel 		return __kvm_ucontrol_vcpu_init(vcpu);
2506dafd032aSDominik Dingel 
2507b0c632dbSHeiko Carstens 	return 0;
2508b0c632dbSHeiko Carstens }
2509b0c632dbSHeiko Carstens 
2510db0758b2SDavid Hildenbrand /* needs disabled preemption to protect from TOD sync and vcpu_load/put */
2511db0758b2SDavid Hildenbrand static void __start_cpu_timer_accounting(struct kvm_vcpu *vcpu)
2512db0758b2SDavid Hildenbrand {
2513db0758b2SDavid Hildenbrand 	WARN_ON_ONCE(vcpu->arch.cputm_start != 0);
25149c23a131SDavid Hildenbrand 	raw_write_seqcount_begin(&vcpu->arch.cputm_seqcount);
2515db0758b2SDavid Hildenbrand 	vcpu->arch.cputm_start = get_tod_clock_fast();
25169c23a131SDavid Hildenbrand 	raw_write_seqcount_end(&vcpu->arch.cputm_seqcount);
2517db0758b2SDavid Hildenbrand }
2518db0758b2SDavid Hildenbrand 
2519db0758b2SDavid Hildenbrand /* needs disabled preemption to protect from TOD sync and vcpu_load/put */
2520db0758b2SDavid Hildenbrand static void __stop_cpu_timer_accounting(struct kvm_vcpu *vcpu)
2521db0758b2SDavid Hildenbrand {
2522db0758b2SDavid Hildenbrand 	WARN_ON_ONCE(vcpu->arch.cputm_start == 0);
25239c23a131SDavid Hildenbrand 	raw_write_seqcount_begin(&vcpu->arch.cputm_seqcount);
2524db0758b2SDavid Hildenbrand 	vcpu->arch.sie_block->cputm -= get_tod_clock_fast() - vcpu->arch.cputm_start;
2525db0758b2SDavid Hildenbrand 	vcpu->arch.cputm_start = 0;
25269c23a131SDavid Hildenbrand 	raw_write_seqcount_end(&vcpu->arch.cputm_seqcount);
2527db0758b2SDavid Hildenbrand }
2528db0758b2SDavid Hildenbrand 
2529db0758b2SDavid Hildenbrand /* needs disabled preemption to protect from TOD sync and vcpu_load/put */
2530db0758b2SDavid Hildenbrand static void __enable_cpu_timer_accounting(struct kvm_vcpu *vcpu)
2531db0758b2SDavid Hildenbrand {
2532db0758b2SDavid Hildenbrand 	WARN_ON_ONCE(vcpu->arch.cputm_enabled);
2533db0758b2SDavid Hildenbrand 	vcpu->arch.cputm_enabled = true;
2534db0758b2SDavid Hildenbrand 	__start_cpu_timer_accounting(vcpu);
2535db0758b2SDavid Hildenbrand }
2536db0758b2SDavid Hildenbrand 
2537db0758b2SDavid Hildenbrand /* needs disabled preemption to protect from TOD sync and vcpu_load/put */
2538db0758b2SDavid Hildenbrand static void __disable_cpu_timer_accounting(struct kvm_vcpu *vcpu)
2539db0758b2SDavid Hildenbrand {
2540db0758b2SDavid Hildenbrand 	WARN_ON_ONCE(!vcpu->arch.cputm_enabled);
2541db0758b2SDavid Hildenbrand 	__stop_cpu_timer_accounting(vcpu);
2542db0758b2SDavid Hildenbrand 	vcpu->arch.cputm_enabled = false;
2543db0758b2SDavid Hildenbrand }
2544db0758b2SDavid Hildenbrand 
2545db0758b2SDavid Hildenbrand static void enable_cpu_timer_accounting(struct kvm_vcpu *vcpu)
2546db0758b2SDavid Hildenbrand {
2547db0758b2SDavid Hildenbrand 	preempt_disable(); /* protect from TOD sync and vcpu_load/put */
2548db0758b2SDavid Hildenbrand 	__enable_cpu_timer_accounting(vcpu);
2549db0758b2SDavid Hildenbrand 	preempt_enable();
2550db0758b2SDavid Hildenbrand }
2551db0758b2SDavid Hildenbrand 
2552db0758b2SDavid Hildenbrand static void disable_cpu_timer_accounting(struct kvm_vcpu *vcpu)
2553db0758b2SDavid Hildenbrand {
2554db0758b2SDavid Hildenbrand 	preempt_disable(); /* protect from TOD sync and vcpu_load/put */
2555db0758b2SDavid Hildenbrand 	__disable_cpu_timer_accounting(vcpu);
2556db0758b2SDavid Hildenbrand 	preempt_enable();
2557db0758b2SDavid Hildenbrand }
2558db0758b2SDavid Hildenbrand 
25594287f247SDavid Hildenbrand /* set the cpu timer - may only be called from the VCPU thread itself */
25604287f247SDavid Hildenbrand void kvm_s390_set_cpu_timer(struct kvm_vcpu *vcpu, __u64 cputm)
25614287f247SDavid Hildenbrand {
2562db0758b2SDavid Hildenbrand 	preempt_disable(); /* protect from TOD sync and vcpu_load/put */
25639c23a131SDavid Hildenbrand 	raw_write_seqcount_begin(&vcpu->arch.cputm_seqcount);
2564db0758b2SDavid Hildenbrand 	if (vcpu->arch.cputm_enabled)
2565db0758b2SDavid Hildenbrand 		vcpu->arch.cputm_start = get_tod_clock_fast();
25664287f247SDavid Hildenbrand 	vcpu->arch.sie_block->cputm = cputm;
25679c23a131SDavid Hildenbrand 	raw_write_seqcount_end(&vcpu->arch.cputm_seqcount);
2568db0758b2SDavid Hildenbrand 	preempt_enable();
25694287f247SDavid Hildenbrand }
25704287f247SDavid Hildenbrand 
2571db0758b2SDavid Hildenbrand /* update and get the cpu timer - can also be called from other VCPU threads */
25724287f247SDavid Hildenbrand __u64 kvm_s390_get_cpu_timer(struct kvm_vcpu *vcpu)
25734287f247SDavid Hildenbrand {
25749c23a131SDavid Hildenbrand 	unsigned int seq;
2575db0758b2SDavid Hildenbrand 	__u64 value;
2576db0758b2SDavid Hildenbrand 
2577db0758b2SDavid Hildenbrand 	if (unlikely(!vcpu->arch.cputm_enabled))
25784287f247SDavid Hildenbrand 		return vcpu->arch.sie_block->cputm;
2579db0758b2SDavid Hildenbrand 
25809c23a131SDavid Hildenbrand 	preempt_disable(); /* protect from TOD sync and vcpu_load/put */
25819c23a131SDavid Hildenbrand 	do {
25829c23a131SDavid Hildenbrand 		seq = raw_read_seqcount(&vcpu->arch.cputm_seqcount);
25839c23a131SDavid Hildenbrand 		/*
25849c23a131SDavid Hildenbrand 		 * If the writer would ever execute a read in the critical
25859c23a131SDavid Hildenbrand 		 * section, e.g. in irq context, we have a deadlock.
25869c23a131SDavid Hildenbrand 		 */
25879c23a131SDavid Hildenbrand 		WARN_ON_ONCE((seq & 1) && smp_processor_id() == vcpu->cpu);
2588db0758b2SDavid Hildenbrand 		value = vcpu->arch.sie_block->cputm;
25899c23a131SDavid Hildenbrand 		/* if cputm_start is 0, accounting is being started/stopped */
25909c23a131SDavid Hildenbrand 		if (likely(vcpu->arch.cputm_start))
2591db0758b2SDavid Hildenbrand 			value -= get_tod_clock_fast() - vcpu->arch.cputm_start;
25929c23a131SDavid Hildenbrand 	} while (read_seqcount_retry(&vcpu->arch.cputm_seqcount, seq & ~1));
25939c23a131SDavid Hildenbrand 	preempt_enable();
2594db0758b2SDavid Hildenbrand 	return value;
25954287f247SDavid Hildenbrand }
25964287f247SDavid Hildenbrand 
2597b0c632dbSHeiko Carstens void kvm_arch_vcpu_load(struct kvm_vcpu *vcpu, int cpu)
2598b0c632dbSHeiko Carstens {
25999977e886SHendrik Brueckner 
260037d9df98SDavid Hildenbrand 	gmap_enable(vcpu->arch.enabled_gmap);
2601ef8f4f49SDavid Hildenbrand 	kvm_s390_set_cpuflags(vcpu, CPUSTAT_RUNNING);
26025ebda316SDavid Hildenbrand 	if (vcpu->arch.cputm_enabled && !is_vcpu_idle(vcpu))
2603db0758b2SDavid Hildenbrand 		__start_cpu_timer_accounting(vcpu);
260401a745acSDavid Hildenbrand 	vcpu->cpu = cpu;
2605b0c632dbSHeiko Carstens }
2606b0c632dbSHeiko Carstens 
2607b0c632dbSHeiko Carstens void kvm_arch_vcpu_put(struct kvm_vcpu *vcpu)
2608b0c632dbSHeiko Carstens {
260901a745acSDavid Hildenbrand 	vcpu->cpu = -1;
26105ebda316SDavid Hildenbrand 	if (vcpu->arch.cputm_enabled && !is_vcpu_idle(vcpu))
2611db0758b2SDavid Hildenbrand 		__stop_cpu_timer_accounting(vcpu);
26129daecfc6SDavid Hildenbrand 	kvm_s390_clear_cpuflags(vcpu, CPUSTAT_RUNNING);
261337d9df98SDavid Hildenbrand 	vcpu->arch.enabled_gmap = gmap_get_enabled();
261437d9df98SDavid Hildenbrand 	gmap_disable(vcpu->arch.enabled_gmap);
26159977e886SHendrik Brueckner 
2616b0c632dbSHeiko Carstens }
2617b0c632dbSHeiko Carstens 
2618b0c632dbSHeiko Carstens static void kvm_s390_vcpu_initial_reset(struct kvm_vcpu *vcpu)
2619b0c632dbSHeiko Carstens {
2620b0c632dbSHeiko Carstens 	/* this equals initial cpu reset in pop, but we don't switch to ESA */
2621b0c632dbSHeiko Carstens 	vcpu->arch.sie_block->gpsw.mask = 0UL;
2622b0c632dbSHeiko Carstens 	vcpu->arch.sie_block->gpsw.addr = 0UL;
26238d26cf7bSChristian Borntraeger 	kvm_s390_set_prefix(vcpu, 0);
26244287f247SDavid Hildenbrand 	kvm_s390_set_cpu_timer(vcpu, 0);
2625b0c632dbSHeiko Carstens 	vcpu->arch.sie_block->ckc       = 0UL;
2626b0c632dbSHeiko Carstens 	vcpu->arch.sie_block->todpr     = 0;
2627b0c632dbSHeiko Carstens 	memset(vcpu->arch.sie_block->gcr, 0, 16 * sizeof(__u64));
2628b9224cd7SDavid Hildenbrand 	vcpu->arch.sie_block->gcr[0]  = CR0_UNUSED_56 |
2629b9224cd7SDavid Hildenbrand 					CR0_INTERRUPT_KEY_SUBMASK |
2630b9224cd7SDavid Hildenbrand 					CR0_MEASUREMENT_ALERT_SUBMASK;
2631b9224cd7SDavid Hildenbrand 	vcpu->arch.sie_block->gcr[14] = CR14_UNUSED_32 |
2632b9224cd7SDavid Hildenbrand 					CR14_UNUSED_33 |
2633b9224cd7SDavid Hildenbrand 					CR14_EXTERNAL_DAMAGE_SUBMASK;
26349abc2a08SDavid Hildenbrand 	/* make sure the new fpc will be lazily loaded */
26359abc2a08SDavid Hildenbrand 	save_fpu_regs();
26369abc2a08SDavid Hildenbrand 	current->thread.fpu.fpc = 0;
2637b0c632dbSHeiko Carstens 	vcpu->arch.sie_block->gbea = 1;
2638672550fbSChristian Borntraeger 	vcpu->arch.sie_block->pp = 0;
263935b3fde6SChristian Borntraeger 	vcpu->arch.sie_block->fpf &= ~FPF_BPBC;
26403c038e6bSDominik Dingel 	vcpu->arch.pfault_token = KVM_S390_PFAULT_TOKEN_INVALID;
26413c038e6bSDominik Dingel 	kvm_clear_async_pf_completion_queue(vcpu);
26426352e4d2SDavid Hildenbrand 	if (!kvm_s390_user_cpu_state_ctrl(vcpu->kvm))
26436852d7b6SDavid Hildenbrand 		kvm_s390_vcpu_stop(vcpu);
26442ed10cc1SJens Freimann 	kvm_s390_clear_local_irqs(vcpu);
2645b0c632dbSHeiko Carstens }
2646b0c632dbSHeiko Carstens 
264731928aa5SDominik Dingel void kvm_arch_vcpu_postcreate(struct kvm_vcpu *vcpu)
264842897d86SMarcelo Tosatti {
264972f25020SJason J. Herne 	mutex_lock(&vcpu->kvm->lock);
2650fdf03650SFan Zhang 	preempt_disable();
265172f25020SJason J. Herne 	vcpu->arch.sie_block->epoch = vcpu->kvm->arch.epoch;
2652d16b52cbSDavid Hildenbrand 	vcpu->arch.sie_block->epdx = vcpu->kvm->arch.epdx;
2653fdf03650SFan Zhang 	preempt_enable();
265472f25020SJason J. Herne 	mutex_unlock(&vcpu->kvm->lock);
265525508824SDavid Hildenbrand 	if (!kvm_is_ucontrol(vcpu->kvm)) {
2656dafd032aSDominik Dingel 		vcpu->arch.gmap = vcpu->kvm->arch.gmap;
2657eaa78f34SDavid Hildenbrand 		sca_add_vcpu(vcpu);
265825508824SDavid Hildenbrand 	}
26596502a34cSDavid Hildenbrand 	if (test_kvm_facility(vcpu->kvm, 74) || vcpu->kvm->arch.user_instr0)
26606502a34cSDavid Hildenbrand 		vcpu->arch.sie_block->ictl |= ICTL_OPEREXC;
266137d9df98SDavid Hildenbrand 	/* make vcpu_load load the right gmap on the first trigger */
266237d9df98SDavid Hildenbrand 	vcpu->arch.enabled_gmap = vcpu->arch.gmap;
266342897d86SMarcelo Tosatti }
266442897d86SMarcelo Tosatti 
26655102ee87STony Krowiak static void kvm_s390_vcpu_crypto_setup(struct kvm_vcpu *vcpu)
26665102ee87STony Krowiak {
2667e585b24aSTony Krowiak 	/*
2668e585b24aSTony Krowiak 	 * If the AP instructions are not being interpreted and the MSAX3
2669e585b24aSTony Krowiak 	 * facility is not configured for the guest, there is nothing to set up.
2670e585b24aSTony Krowiak 	 */
2671e585b24aSTony Krowiak 	if (!vcpu->kvm->arch.crypto.apie && !test_kvm_facility(vcpu->kvm, 76))
26725102ee87STony Krowiak 		return;
26735102ee87STony Krowiak 
2674e585b24aSTony Krowiak 	vcpu->arch.sie_block->crycbd = vcpu->kvm->arch.crypto.crycbd;
2675a374e892STony Krowiak 	vcpu->arch.sie_block->ecb3 &= ~(ECB3_AES | ECB3_DEA);
267637940fb0STony Krowiak 	vcpu->arch.sie_block->eca &= ~ECA_APIE;
2677a374e892STony Krowiak 
2678e585b24aSTony Krowiak 	if (vcpu->kvm->arch.crypto.apie)
2679e585b24aSTony Krowiak 		vcpu->arch.sie_block->eca |= ECA_APIE;
2680e585b24aSTony Krowiak 
2681e585b24aSTony Krowiak 	/* Set up protected key support */
2682a374e892STony Krowiak 	if (vcpu->kvm->arch.crypto.aes_kw)
2683a374e892STony Krowiak 		vcpu->arch.sie_block->ecb3 |= ECB3_AES;
2684a374e892STony Krowiak 	if (vcpu->kvm->arch.crypto.dea_kw)
2685a374e892STony Krowiak 		vcpu->arch.sie_block->ecb3 |= ECB3_DEA;
26865102ee87STony Krowiak }
26875102ee87STony Krowiak 
2688b31605c1SDominik Dingel void kvm_s390_vcpu_unsetup_cmma(struct kvm_vcpu *vcpu)
2689b31605c1SDominik Dingel {
2690b31605c1SDominik Dingel 	free_page(vcpu->arch.sie_block->cbrlo);
2691b31605c1SDominik Dingel 	vcpu->arch.sie_block->cbrlo = 0;
2692b31605c1SDominik Dingel }
2693b31605c1SDominik Dingel 
2694b31605c1SDominik Dingel int kvm_s390_vcpu_setup_cmma(struct kvm_vcpu *vcpu)
2695b31605c1SDominik Dingel {
2696b31605c1SDominik Dingel 	vcpu->arch.sie_block->cbrlo = get_zeroed_page(GFP_KERNEL);
2697b31605c1SDominik Dingel 	if (!vcpu->arch.sie_block->cbrlo)
2698b31605c1SDominik Dingel 		return -ENOMEM;
2699b31605c1SDominik Dingel 	return 0;
2700b31605c1SDominik Dingel }
2701b31605c1SDominik Dingel 
270291520f1aSMichael Mueller static void kvm_s390_vcpu_setup_model(struct kvm_vcpu *vcpu)
270391520f1aSMichael Mueller {
270491520f1aSMichael Mueller 	struct kvm_s390_cpu_model *model = &vcpu->kvm->arch.model;
270591520f1aSMichael Mueller 
270691520f1aSMichael Mueller 	vcpu->arch.sie_block->ibc = model->ibc;
270780bc79dcSDavid Hildenbrand 	if (test_kvm_facility(vcpu->kvm, 7))
2708c54f0d6aSDavid Hildenbrand 		vcpu->arch.sie_block->fac = (u32)(u64) model->fac_list;
270991520f1aSMichael Mueller }
271091520f1aSMichael Mueller 
2711b0c632dbSHeiko Carstens int kvm_arch_vcpu_setup(struct kvm_vcpu *vcpu)
2712b0c632dbSHeiko Carstens {
2713b31605c1SDominik Dingel 	int rc = 0;
2714b31288faSKonstantin Weitz 
27159e6dabefSCornelia Huck 	atomic_set(&vcpu->arch.sie_block->cpuflags, CPUSTAT_ZARCH |
27169e6dabefSCornelia Huck 						    CPUSTAT_SM |
2717a4a4f191SGuenther Hutzl 						    CPUSTAT_STOPPED);
2718a4a4f191SGuenther Hutzl 
271953df84f8SGuenther Hutzl 	if (test_kvm_facility(vcpu->kvm, 78))
2720ef8f4f49SDavid Hildenbrand 		kvm_s390_set_cpuflags(vcpu, CPUSTAT_GED2);
272153df84f8SGuenther Hutzl 	else if (test_kvm_facility(vcpu->kvm, 8))
2722ef8f4f49SDavid Hildenbrand 		kvm_s390_set_cpuflags(vcpu, CPUSTAT_GED);
2723a4a4f191SGuenther Hutzl 
272491520f1aSMichael Mueller 	kvm_s390_vcpu_setup_model(vcpu);
272591520f1aSMichael Mueller 
2726bdab09f3SDavid Hildenbrand 	/* pgste_set_pte has special handling for !MACHINE_HAS_ESOP */
2727bdab09f3SDavid Hildenbrand 	if (MACHINE_HAS_ESOP)
27280c9d8683SDavid Hildenbrand 		vcpu->arch.sie_block->ecb |= ECB_HOSTPROTINT;
2729bd50e8ecSDavid Hildenbrand 	if (test_kvm_facility(vcpu->kvm, 9))
27300c9d8683SDavid Hildenbrand 		vcpu->arch.sie_block->ecb |= ECB_SRSI;
2731f597d24eSDavid Hildenbrand 	if (test_kvm_facility(vcpu->kvm, 73))
27320c9d8683SDavid Hildenbrand 		vcpu->arch.sie_block->ecb |= ECB_TE;
27337feb6bb8SMichael Mueller 
2734c9f0a2b8SJanosch Frank 	if (test_kvm_facility(vcpu->kvm, 8) && vcpu->kvm->arch.use_pfmfi)
27350c9d8683SDavid Hildenbrand 		vcpu->arch.sie_block->ecb2 |= ECB2_PFMFI;
2736cd1836f5SJanosch Frank 	if (test_kvm_facility(vcpu->kvm, 130))
27370c9d8683SDavid Hildenbrand 		vcpu->arch.sie_block->ecb2 |= ECB2_IEP;
27380c9d8683SDavid Hildenbrand 	vcpu->arch.sie_block->eca = ECA_MVPGI | ECA_PROTEXCI;
273948ee7d3aSDavid Hildenbrand 	if (sclp.has_cei)
27400c9d8683SDavid Hildenbrand 		vcpu->arch.sie_block->eca |= ECA_CEI;
274111ad65b7SDavid Hildenbrand 	if (sclp.has_ib)
27420c9d8683SDavid Hildenbrand 		vcpu->arch.sie_block->eca |= ECA_IB;
274337c5f6c8SDavid Hildenbrand 	if (sclp.has_siif)
27440c9d8683SDavid Hildenbrand 		vcpu->arch.sie_block->eca |= ECA_SII;
274537c5f6c8SDavid Hildenbrand 	if (sclp.has_sigpif)
27460c9d8683SDavid Hildenbrand 		vcpu->arch.sie_block->eca |= ECA_SIGPI;
274718280d8bSMichael Mueller 	if (test_kvm_facility(vcpu->kvm, 129)) {
27480c9d8683SDavid Hildenbrand 		vcpu->arch.sie_block->eca |= ECA_VX;
27490c9d8683SDavid Hildenbrand 		vcpu->arch.sie_block->ecd |= ECD_HOSTREGMGMT;
275013211ea7SEric Farman 	}
27518fa1696eSCollin L. Walling 	if (test_kvm_facility(vcpu->kvm, 139))
27528fa1696eSCollin L. Walling 		vcpu->arch.sie_block->ecd |= ECD_MEF;
2753a3da7b4aSChristian Borntraeger 	if (test_kvm_facility(vcpu->kvm, 156))
2754a3da7b4aSChristian Borntraeger 		vcpu->arch.sie_block->ecd |= ECD_ETOKENF;
2755d7c5cb01SMichael Mueller 	if (vcpu->arch.sie_block->gd) {
2756d7c5cb01SMichael Mueller 		vcpu->arch.sie_block->eca |= ECA_AIV;
2757d7c5cb01SMichael Mueller 		VCPU_EVENT(vcpu, 3, "AIV gisa format-%u enabled for cpu %03u",
2758d7c5cb01SMichael Mueller 			   vcpu->arch.sie_block->gd & 0x3, vcpu->vcpu_id);
2759d7c5cb01SMichael Mueller 	}
27604e0b1ab7SFan Zhang 	vcpu->arch.sie_block->sdnxo = ((unsigned long) &vcpu->run->s.regs.sdnx)
27614e0b1ab7SFan Zhang 					| SDNXC;
2762c6e5f166SFan Zhang 	vcpu->arch.sie_block->riccbd = (unsigned long) &vcpu->run->s.regs.riccb;
2763730cd632SFarhan Ali 
2764730cd632SFarhan Ali 	if (sclp.has_kss)
2765ef8f4f49SDavid Hildenbrand 		kvm_s390_set_cpuflags(vcpu, CPUSTAT_KSS);
2766730cd632SFarhan Ali 	else
2767492d8642SThomas Huth 		vcpu->arch.sie_block->ictl |= ICTL_ISKE | ICTL_SSKE | ICTL_RRBE;
27685a5e6536SMatthew Rosato 
2769e6db1d61SDominik Dingel 	if (vcpu->kvm->arch.use_cmma) {
2770b31605c1SDominik Dingel 		rc = kvm_s390_vcpu_setup_cmma(vcpu);
2771b31605c1SDominik Dingel 		if (rc)
2772b31605c1SDominik Dingel 			return rc;
2773b31288faSKonstantin Weitz 	}
27740ac96cafSDavid Hildenbrand 	hrtimer_init(&vcpu->arch.ckc_timer, CLOCK_MONOTONIC, HRTIMER_MODE_REL);
2775ca872302SChristian Borntraeger 	vcpu->arch.ckc_timer.function = kvm_s390_idle_wakeup;
27769d8d5786SMichael Mueller 
27775102ee87STony Krowiak 	kvm_s390_vcpu_crypto_setup(vcpu);
27785102ee87STony Krowiak 
2779b31605c1SDominik Dingel 	return rc;
2780b0c632dbSHeiko Carstens }
2781b0c632dbSHeiko Carstens 
2782b0c632dbSHeiko Carstens struct kvm_vcpu *kvm_arch_vcpu_create(struct kvm *kvm,
2783b0c632dbSHeiko Carstens 				      unsigned int id)
2784b0c632dbSHeiko Carstens {
27854d47555aSCarsten Otte 	struct kvm_vcpu *vcpu;
27867feb6bb8SMichael Mueller 	struct sie_page *sie_page;
27874d47555aSCarsten Otte 	int rc = -EINVAL;
2788b0c632dbSHeiko Carstens 
27894215825eSDavid Hildenbrand 	if (!kvm_is_ucontrol(kvm) && !sca_can_add_vcpu(kvm, id))
27904d47555aSCarsten Otte 		goto out;
27914d47555aSCarsten Otte 
27924d47555aSCarsten Otte 	rc = -ENOMEM;
27934d47555aSCarsten Otte 
2794b110feafSMichael Mueller 	vcpu = kmem_cache_zalloc(kvm_vcpu_cache, GFP_KERNEL);
2795b0c632dbSHeiko Carstens 	if (!vcpu)
27964d47555aSCarsten Otte 		goto out;
2797b0c632dbSHeiko Carstens 
2798da72ca4dSQingFeng Hao 	BUILD_BUG_ON(sizeof(struct sie_page) != 4096);
27997feb6bb8SMichael Mueller 	sie_page = (struct sie_page *) get_zeroed_page(GFP_KERNEL);
28007feb6bb8SMichael Mueller 	if (!sie_page)
2801b0c632dbSHeiko Carstens 		goto out_free_cpu;
2802b0c632dbSHeiko Carstens 
28037feb6bb8SMichael Mueller 	vcpu->arch.sie_block = &sie_page->sie_block;
28047feb6bb8SMichael Mueller 	vcpu->arch.sie_block->itdba = (unsigned long) &sie_page->itdb;
28057feb6bb8SMichael Mueller 
2806efed1104SDavid Hildenbrand 	/* the real guest size will always be smaller than msl */
2807efed1104SDavid Hildenbrand 	vcpu->arch.sie_block->mso = 0;
2808efed1104SDavid Hildenbrand 	vcpu->arch.sie_block->msl = sclp.hamax;
2809efed1104SDavid Hildenbrand 
2810b0c632dbSHeiko Carstens 	vcpu->arch.sie_block->icpua = id;
2811ba5c1e9bSCarsten Otte 	spin_lock_init(&vcpu->arch.local_int.lock);
2812d7c5cb01SMichael Mueller 	vcpu->arch.sie_block->gd = (u32)(u64)kvm->arch.gisa;
28134b9f9525SMichael Mueller 	if (vcpu->arch.sie_block->gd && sclp.has_gisaf)
28144b9f9525SMichael Mueller 		vcpu->arch.sie_block->gd |= GISA_FORMAT1;
28159c23a131SDavid Hildenbrand 	seqcount_init(&vcpu->arch.cputm_seqcount);
2816ba5c1e9bSCarsten Otte 
2817b0c632dbSHeiko Carstens 	rc = kvm_vcpu_init(vcpu, kvm, id);
2818b0c632dbSHeiko Carstens 	if (rc)
28199abc2a08SDavid Hildenbrand 		goto out_free_sie_block;
28208335713aSChristian Borntraeger 	VM_EVENT(kvm, 3, "create cpu %d at 0x%pK, sie block at 0x%pK", id, vcpu,
2821b0c632dbSHeiko Carstens 		 vcpu->arch.sie_block);
2822ade38c31SCornelia Huck 	trace_kvm_s390_create_vcpu(id, vcpu, vcpu->arch.sie_block);
2823b0c632dbSHeiko Carstens 
2824b0c632dbSHeiko Carstens 	return vcpu;
28257b06bf2fSWei Yongjun out_free_sie_block:
28267b06bf2fSWei Yongjun 	free_page((unsigned long)(vcpu->arch.sie_block));
2827b0c632dbSHeiko Carstens out_free_cpu:
2828b110feafSMichael Mueller 	kmem_cache_free(kvm_vcpu_cache, vcpu);
28294d47555aSCarsten Otte out:
2830b0c632dbSHeiko Carstens 	return ERR_PTR(rc);
2831b0c632dbSHeiko Carstens }
2832b0c632dbSHeiko Carstens 
2833b0c632dbSHeiko Carstens int kvm_arch_vcpu_runnable(struct kvm_vcpu *vcpu)
2834b0c632dbSHeiko Carstens {
28359a022067SDavid Hildenbrand 	return kvm_s390_vcpu_has_irq(vcpu, 0);
2836b0c632dbSHeiko Carstens }
2837b0c632dbSHeiko Carstens 
2838199b5763SLongpeng(Mike) bool kvm_arch_vcpu_in_kernel(struct kvm_vcpu *vcpu)
2839199b5763SLongpeng(Mike) {
28400546c63dSLongpeng(Mike) 	return !(vcpu->arch.sie_block->gpsw.mask & PSW_MASK_PSTATE);
2841199b5763SLongpeng(Mike) }
2842199b5763SLongpeng(Mike) 
284327406cd5SChristian Borntraeger void kvm_s390_vcpu_block(struct kvm_vcpu *vcpu)
284449b99e1eSChristian Borntraeger {
2845805de8f4SPeter Zijlstra 	atomic_or(PROG_BLOCK_SIE, &vcpu->arch.sie_block->prog20);
284661a6df54SDavid Hildenbrand 	exit_sie(vcpu);
284749b99e1eSChristian Borntraeger }
284849b99e1eSChristian Borntraeger 
284927406cd5SChristian Borntraeger void kvm_s390_vcpu_unblock(struct kvm_vcpu *vcpu)
285049b99e1eSChristian Borntraeger {
2851805de8f4SPeter Zijlstra 	atomic_andnot(PROG_BLOCK_SIE, &vcpu->arch.sie_block->prog20);
285249b99e1eSChristian Borntraeger }
285349b99e1eSChristian Borntraeger 
28548e236546SChristian Borntraeger static void kvm_s390_vcpu_request(struct kvm_vcpu *vcpu)
28558e236546SChristian Borntraeger {
2856805de8f4SPeter Zijlstra 	atomic_or(PROG_REQUEST, &vcpu->arch.sie_block->prog20);
285761a6df54SDavid Hildenbrand 	exit_sie(vcpu);
28588e236546SChristian Borntraeger }
28598e236546SChristian Borntraeger 
28609ea59728SDavid Hildenbrand bool kvm_s390_vcpu_sie_inhibited(struct kvm_vcpu *vcpu)
28619ea59728SDavid Hildenbrand {
28629ea59728SDavid Hildenbrand 	return atomic_read(&vcpu->arch.sie_block->prog20) &
28639ea59728SDavid Hildenbrand 	       (PROG_BLOCK_SIE | PROG_REQUEST);
28649ea59728SDavid Hildenbrand }
28659ea59728SDavid Hildenbrand 
28668e236546SChristian Borntraeger static void kvm_s390_vcpu_request_handled(struct kvm_vcpu *vcpu)
28678e236546SChristian Borntraeger {
28689bf9fde2SJason J. Herne 	atomic_andnot(PROG_REQUEST, &vcpu->arch.sie_block->prog20);
28698e236546SChristian Borntraeger }
28708e236546SChristian Borntraeger 
287149b99e1eSChristian Borntraeger /*
28729ea59728SDavid Hildenbrand  * Kick a guest cpu out of (v)SIE and wait until (v)SIE is not running.
287349b99e1eSChristian Borntraeger  * If the CPU is not running (e.g. waiting as idle) the function will
287449b99e1eSChristian Borntraeger  * return immediately. */
287549b99e1eSChristian Borntraeger void exit_sie(struct kvm_vcpu *vcpu)
287649b99e1eSChristian Borntraeger {
2877ef8f4f49SDavid Hildenbrand 	kvm_s390_set_cpuflags(vcpu, CPUSTAT_STOP_INT);
28789ea59728SDavid Hildenbrand 	kvm_s390_vsie_kick(vcpu);
287949b99e1eSChristian Borntraeger 	while (vcpu->arch.sie_block->prog0c & PROG_IN_SIE)
288049b99e1eSChristian Borntraeger 		cpu_relax();
288149b99e1eSChristian Borntraeger }
288249b99e1eSChristian Borntraeger 
28838e236546SChristian Borntraeger /* Kick a guest cpu out of SIE to process a request synchronously */
28848e236546SChristian Borntraeger void kvm_s390_sync_request(int req, struct kvm_vcpu *vcpu)
288549b99e1eSChristian Borntraeger {
28868e236546SChristian Borntraeger 	kvm_make_request(req, vcpu);
28878e236546SChristian Borntraeger 	kvm_s390_vcpu_request(vcpu);
288849b99e1eSChristian Borntraeger }
288949b99e1eSChristian Borntraeger 
2890414d3b07SMartin Schwidefsky static void kvm_gmap_notifier(struct gmap *gmap, unsigned long start,
2891414d3b07SMartin Schwidefsky 			      unsigned long end)
28922c70fe44SChristian Borntraeger {
28932c70fe44SChristian Borntraeger 	struct kvm *kvm = gmap->private;
28942c70fe44SChristian Borntraeger 	struct kvm_vcpu *vcpu;
2895414d3b07SMartin Schwidefsky 	unsigned long prefix;
2896414d3b07SMartin Schwidefsky 	int i;
28972c70fe44SChristian Borntraeger 
289865d0b0d4SDavid Hildenbrand 	if (gmap_is_shadow(gmap))
289965d0b0d4SDavid Hildenbrand 		return;
2900414d3b07SMartin Schwidefsky 	if (start >= 1UL << 31)
2901414d3b07SMartin Schwidefsky 		/* We are only interested in prefix pages */
2902414d3b07SMartin Schwidefsky 		return;
29032c70fe44SChristian Borntraeger 	kvm_for_each_vcpu(i, vcpu, kvm) {
29042c70fe44SChristian Borntraeger 		/* match against both prefix pages */
2905414d3b07SMartin Schwidefsky 		prefix = kvm_s390_get_prefix(vcpu);
2906414d3b07SMartin Schwidefsky 		if (prefix <= end && start <= prefix + 2*PAGE_SIZE - 1) {
2907414d3b07SMartin Schwidefsky 			VCPU_EVENT(vcpu, 2, "gmap notifier for %lx-%lx",
2908414d3b07SMartin Schwidefsky 				   start, end);
29098e236546SChristian Borntraeger 			kvm_s390_sync_request(KVM_REQ_MMU_RELOAD, vcpu);
29102c70fe44SChristian Borntraeger 		}
29112c70fe44SChristian Borntraeger 	}
29122c70fe44SChristian Borntraeger }
29132c70fe44SChristian Borntraeger 
2914b6d33834SChristoffer Dall int kvm_arch_vcpu_should_kick(struct kvm_vcpu *vcpu)
2915b6d33834SChristoffer Dall {
2916b6d33834SChristoffer Dall 	/* kvm common code refers to this, but never calls it */
2917b6d33834SChristoffer Dall 	BUG();
2918b6d33834SChristoffer Dall 	return 0;
2919b6d33834SChristoffer Dall }
2920b6d33834SChristoffer Dall 
292114eebd91SCarsten Otte static int kvm_arch_vcpu_ioctl_get_one_reg(struct kvm_vcpu *vcpu,
292214eebd91SCarsten Otte 					   struct kvm_one_reg *reg)
292314eebd91SCarsten Otte {
292414eebd91SCarsten Otte 	int r = -EINVAL;
292514eebd91SCarsten Otte 
292614eebd91SCarsten Otte 	switch (reg->id) {
292729b7c71bSCarsten Otte 	case KVM_REG_S390_TODPR:
292829b7c71bSCarsten Otte 		r = put_user(vcpu->arch.sie_block->todpr,
292929b7c71bSCarsten Otte 			     (u32 __user *)reg->addr);
293029b7c71bSCarsten Otte 		break;
293129b7c71bSCarsten Otte 	case KVM_REG_S390_EPOCHDIFF:
293229b7c71bSCarsten Otte 		r = put_user(vcpu->arch.sie_block->epoch,
293329b7c71bSCarsten Otte 			     (u64 __user *)reg->addr);
293429b7c71bSCarsten Otte 		break;
293546a6dd1cSJason J. herne 	case KVM_REG_S390_CPU_TIMER:
29364287f247SDavid Hildenbrand 		r = put_user(kvm_s390_get_cpu_timer(vcpu),
293746a6dd1cSJason J. herne 			     (u64 __user *)reg->addr);
293846a6dd1cSJason J. herne 		break;
293946a6dd1cSJason J. herne 	case KVM_REG_S390_CLOCK_COMP:
294046a6dd1cSJason J. herne 		r = put_user(vcpu->arch.sie_block->ckc,
294146a6dd1cSJason J. herne 			     (u64 __user *)reg->addr);
294246a6dd1cSJason J. herne 		break;
2943536336c2SDominik Dingel 	case KVM_REG_S390_PFTOKEN:
2944536336c2SDominik Dingel 		r = put_user(vcpu->arch.pfault_token,
2945536336c2SDominik Dingel 			     (u64 __user *)reg->addr);
2946536336c2SDominik Dingel 		break;
2947536336c2SDominik Dingel 	case KVM_REG_S390_PFCOMPARE:
2948536336c2SDominik Dingel 		r = put_user(vcpu->arch.pfault_compare,
2949536336c2SDominik Dingel 			     (u64 __user *)reg->addr);
2950536336c2SDominik Dingel 		break;
2951536336c2SDominik Dingel 	case KVM_REG_S390_PFSELECT:
2952536336c2SDominik Dingel 		r = put_user(vcpu->arch.pfault_select,
2953536336c2SDominik Dingel 			     (u64 __user *)reg->addr);
2954536336c2SDominik Dingel 		break;
2955672550fbSChristian Borntraeger 	case KVM_REG_S390_PP:
2956672550fbSChristian Borntraeger 		r = put_user(vcpu->arch.sie_block->pp,
2957672550fbSChristian Borntraeger 			     (u64 __user *)reg->addr);
2958672550fbSChristian Borntraeger 		break;
2959afa45ff5SChristian Borntraeger 	case KVM_REG_S390_GBEA:
2960afa45ff5SChristian Borntraeger 		r = put_user(vcpu->arch.sie_block->gbea,
2961afa45ff5SChristian Borntraeger 			     (u64 __user *)reg->addr);
2962afa45ff5SChristian Borntraeger 		break;
296314eebd91SCarsten Otte 	default:
296414eebd91SCarsten Otte 		break;
296514eebd91SCarsten Otte 	}
296614eebd91SCarsten Otte 
296714eebd91SCarsten Otte 	return r;
296814eebd91SCarsten Otte }
296914eebd91SCarsten Otte 
297014eebd91SCarsten Otte static int kvm_arch_vcpu_ioctl_set_one_reg(struct kvm_vcpu *vcpu,
297114eebd91SCarsten Otte 					   struct kvm_one_reg *reg)
297214eebd91SCarsten Otte {
297314eebd91SCarsten Otte 	int r = -EINVAL;
29744287f247SDavid Hildenbrand 	__u64 val;
297514eebd91SCarsten Otte 
297614eebd91SCarsten Otte 	switch (reg->id) {
297729b7c71bSCarsten Otte 	case KVM_REG_S390_TODPR:
297829b7c71bSCarsten Otte 		r = get_user(vcpu->arch.sie_block->todpr,
297929b7c71bSCarsten Otte 			     (u32 __user *)reg->addr);
298029b7c71bSCarsten Otte 		break;
298129b7c71bSCarsten Otte 	case KVM_REG_S390_EPOCHDIFF:
298229b7c71bSCarsten Otte 		r = get_user(vcpu->arch.sie_block->epoch,
298329b7c71bSCarsten Otte 			     (u64 __user *)reg->addr);
298429b7c71bSCarsten Otte 		break;
298546a6dd1cSJason J. herne 	case KVM_REG_S390_CPU_TIMER:
29864287f247SDavid Hildenbrand 		r = get_user(val, (u64 __user *)reg->addr);
29874287f247SDavid Hildenbrand 		if (!r)
29884287f247SDavid Hildenbrand 			kvm_s390_set_cpu_timer(vcpu, val);
298946a6dd1cSJason J. herne 		break;
299046a6dd1cSJason J. herne 	case KVM_REG_S390_CLOCK_COMP:
299146a6dd1cSJason J. herne 		r = get_user(vcpu->arch.sie_block->ckc,
299246a6dd1cSJason J. herne 			     (u64 __user *)reg->addr);
299346a6dd1cSJason J. herne 		break;
2994536336c2SDominik Dingel 	case KVM_REG_S390_PFTOKEN:
2995536336c2SDominik Dingel 		r = get_user(vcpu->arch.pfault_token,
2996536336c2SDominik Dingel 			     (u64 __user *)reg->addr);
29979fbd8082SDavid Hildenbrand 		if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID)
29989fbd8082SDavid Hildenbrand 			kvm_clear_async_pf_completion_queue(vcpu);
2999536336c2SDominik Dingel 		break;
3000536336c2SDominik Dingel 	case KVM_REG_S390_PFCOMPARE:
3001536336c2SDominik Dingel 		r = get_user(vcpu->arch.pfault_compare,
3002536336c2SDominik Dingel 			     (u64 __user *)reg->addr);
3003536336c2SDominik Dingel 		break;
3004536336c2SDominik Dingel 	case KVM_REG_S390_PFSELECT:
3005536336c2SDominik Dingel 		r = get_user(vcpu->arch.pfault_select,
3006536336c2SDominik Dingel 			     (u64 __user *)reg->addr);
3007536336c2SDominik Dingel 		break;
3008672550fbSChristian Borntraeger 	case KVM_REG_S390_PP:
3009672550fbSChristian Borntraeger 		r = get_user(vcpu->arch.sie_block->pp,
3010672550fbSChristian Borntraeger 			     (u64 __user *)reg->addr);
3011672550fbSChristian Borntraeger 		break;
3012afa45ff5SChristian Borntraeger 	case KVM_REG_S390_GBEA:
3013afa45ff5SChristian Borntraeger 		r = get_user(vcpu->arch.sie_block->gbea,
3014afa45ff5SChristian Borntraeger 			     (u64 __user *)reg->addr);
3015afa45ff5SChristian Borntraeger 		break;
301614eebd91SCarsten Otte 	default:
301714eebd91SCarsten Otte 		break;
301814eebd91SCarsten Otte 	}
301914eebd91SCarsten Otte 
302014eebd91SCarsten Otte 	return r;
302114eebd91SCarsten Otte }
3022b6d33834SChristoffer Dall 
3023b0c632dbSHeiko Carstens static int kvm_arch_vcpu_ioctl_initial_reset(struct kvm_vcpu *vcpu)
3024b0c632dbSHeiko Carstens {
3025b0c632dbSHeiko Carstens 	kvm_s390_vcpu_initial_reset(vcpu);
3026b0c632dbSHeiko Carstens 	return 0;
3027b0c632dbSHeiko Carstens }
3028b0c632dbSHeiko Carstens 
3029b0c632dbSHeiko Carstens int kvm_arch_vcpu_ioctl_set_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs)
3030b0c632dbSHeiko Carstens {
3031875656feSChristoffer Dall 	vcpu_load(vcpu);
30325a32c1afSChristian Borntraeger 	memcpy(&vcpu->run->s.regs.gprs, &regs->gprs, sizeof(regs->gprs));
3033875656feSChristoffer Dall 	vcpu_put(vcpu);
3034b0c632dbSHeiko Carstens 	return 0;
3035b0c632dbSHeiko Carstens }
3036b0c632dbSHeiko Carstens 
3037b0c632dbSHeiko Carstens int kvm_arch_vcpu_ioctl_get_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs)
3038b0c632dbSHeiko Carstens {
30391fc9b76bSChristoffer Dall 	vcpu_load(vcpu);
30405a32c1afSChristian Borntraeger 	memcpy(&regs->gprs, &vcpu->run->s.regs.gprs, sizeof(regs->gprs));
30411fc9b76bSChristoffer Dall 	vcpu_put(vcpu);
3042b0c632dbSHeiko Carstens 	return 0;
3043b0c632dbSHeiko Carstens }
3044b0c632dbSHeiko Carstens 
3045b0c632dbSHeiko Carstens int kvm_arch_vcpu_ioctl_set_sregs(struct kvm_vcpu *vcpu,
3046b0c632dbSHeiko Carstens 				  struct kvm_sregs *sregs)
3047b0c632dbSHeiko Carstens {
3048b4ef9d4eSChristoffer Dall 	vcpu_load(vcpu);
3049b4ef9d4eSChristoffer Dall 
305059674c1aSChristian Borntraeger 	memcpy(&vcpu->run->s.regs.acrs, &sregs->acrs, sizeof(sregs->acrs));
3051b0c632dbSHeiko Carstens 	memcpy(&vcpu->arch.sie_block->gcr, &sregs->crs, sizeof(sregs->crs));
3052b4ef9d4eSChristoffer Dall 
3053b4ef9d4eSChristoffer Dall 	vcpu_put(vcpu);
3054b0c632dbSHeiko Carstens 	return 0;
3055b0c632dbSHeiko Carstens }
3056b0c632dbSHeiko Carstens 
3057b0c632dbSHeiko Carstens int kvm_arch_vcpu_ioctl_get_sregs(struct kvm_vcpu *vcpu,
3058b0c632dbSHeiko Carstens 				  struct kvm_sregs *sregs)
3059b0c632dbSHeiko Carstens {
3060bcdec41cSChristoffer Dall 	vcpu_load(vcpu);
3061bcdec41cSChristoffer Dall 
306259674c1aSChristian Borntraeger 	memcpy(&sregs->acrs, &vcpu->run->s.regs.acrs, sizeof(sregs->acrs));
3063b0c632dbSHeiko Carstens 	memcpy(&sregs->crs, &vcpu->arch.sie_block->gcr, sizeof(sregs->crs));
3064bcdec41cSChristoffer Dall 
3065bcdec41cSChristoffer Dall 	vcpu_put(vcpu);
3066b0c632dbSHeiko Carstens 	return 0;
3067b0c632dbSHeiko Carstens }
3068b0c632dbSHeiko Carstens 
3069b0c632dbSHeiko Carstens int kvm_arch_vcpu_ioctl_set_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu)
3070b0c632dbSHeiko Carstens {
30716a96bc7fSChristoffer Dall 	int ret = 0;
30726a96bc7fSChristoffer Dall 
30736a96bc7fSChristoffer Dall 	vcpu_load(vcpu);
30746a96bc7fSChristoffer Dall 
30756a96bc7fSChristoffer Dall 	if (test_fp_ctl(fpu->fpc)) {
30766a96bc7fSChristoffer Dall 		ret = -EINVAL;
30776a96bc7fSChristoffer Dall 		goto out;
30786a96bc7fSChristoffer Dall 	}
3079e1788bb9SChristian Borntraeger 	vcpu->run->s.regs.fpc = fpu->fpc;
30809abc2a08SDavid Hildenbrand 	if (MACHINE_HAS_VX)
3081a7d4b8f2SDavid Hildenbrand 		convert_fp_to_vx((__vector128 *) vcpu->run->s.regs.vrs,
3082a7d4b8f2SDavid Hildenbrand 				 (freg_t *) fpu->fprs);
30839abc2a08SDavid Hildenbrand 	else
3084a7d4b8f2SDavid Hildenbrand 		memcpy(vcpu->run->s.regs.fprs, &fpu->fprs, sizeof(fpu->fprs));
30856a96bc7fSChristoffer Dall 
30866a96bc7fSChristoffer Dall out:
30876a96bc7fSChristoffer Dall 	vcpu_put(vcpu);
30886a96bc7fSChristoffer Dall 	return ret;
3089b0c632dbSHeiko Carstens }
3090b0c632dbSHeiko Carstens 
3091b0c632dbSHeiko Carstens int kvm_arch_vcpu_ioctl_get_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu)
3092b0c632dbSHeiko Carstens {
30931393123eSChristoffer Dall 	vcpu_load(vcpu);
30941393123eSChristoffer Dall 
30959abc2a08SDavid Hildenbrand 	/* make sure we have the latest values */
30969abc2a08SDavid Hildenbrand 	save_fpu_regs();
30979abc2a08SDavid Hildenbrand 	if (MACHINE_HAS_VX)
3098a7d4b8f2SDavid Hildenbrand 		convert_vx_to_fp((freg_t *) fpu->fprs,
3099a7d4b8f2SDavid Hildenbrand 				 (__vector128 *) vcpu->run->s.regs.vrs);
31009abc2a08SDavid Hildenbrand 	else
3101a7d4b8f2SDavid Hildenbrand 		memcpy(fpu->fprs, vcpu->run->s.regs.fprs, sizeof(fpu->fprs));
3102e1788bb9SChristian Borntraeger 	fpu->fpc = vcpu->run->s.regs.fpc;
31031393123eSChristoffer Dall 
31041393123eSChristoffer Dall 	vcpu_put(vcpu);
3105b0c632dbSHeiko Carstens 	return 0;
3106b0c632dbSHeiko Carstens }
3107b0c632dbSHeiko Carstens 
3108b0c632dbSHeiko Carstens static int kvm_arch_vcpu_ioctl_set_initial_psw(struct kvm_vcpu *vcpu, psw_t psw)
3109b0c632dbSHeiko Carstens {
3110b0c632dbSHeiko Carstens 	int rc = 0;
3111b0c632dbSHeiko Carstens 
31127a42fdc2SDavid Hildenbrand 	if (!is_vcpu_stopped(vcpu))
3113b0c632dbSHeiko Carstens 		rc = -EBUSY;
3114d7b0b5ebSCarsten Otte 	else {
3115d7b0b5ebSCarsten Otte 		vcpu->run->psw_mask = psw.mask;
3116d7b0b5ebSCarsten Otte 		vcpu->run->psw_addr = psw.addr;
3117d7b0b5ebSCarsten Otte 	}
3118b0c632dbSHeiko Carstens 	return rc;
3119b0c632dbSHeiko Carstens }
3120b0c632dbSHeiko Carstens 
3121b0c632dbSHeiko Carstens int kvm_arch_vcpu_ioctl_translate(struct kvm_vcpu *vcpu,
3122b0c632dbSHeiko Carstens 				  struct kvm_translation *tr)
3123b0c632dbSHeiko Carstens {
3124b0c632dbSHeiko Carstens 	return -EINVAL; /* not implemented yet */
3125b0c632dbSHeiko Carstens }
3126b0c632dbSHeiko Carstens 
312727291e21SDavid Hildenbrand #define VALID_GUESTDBG_FLAGS (KVM_GUESTDBG_SINGLESTEP | \
312827291e21SDavid Hildenbrand 			      KVM_GUESTDBG_USE_HW_BP | \
312927291e21SDavid Hildenbrand 			      KVM_GUESTDBG_ENABLE)
313027291e21SDavid Hildenbrand 
3131d0bfb940SJan Kiszka int kvm_arch_vcpu_ioctl_set_guest_debug(struct kvm_vcpu *vcpu,
3132d0bfb940SJan Kiszka 					struct kvm_guest_debug *dbg)
3133b0c632dbSHeiko Carstens {
313427291e21SDavid Hildenbrand 	int rc = 0;
313527291e21SDavid Hildenbrand 
313666b56562SChristoffer Dall 	vcpu_load(vcpu);
313766b56562SChristoffer Dall 
313827291e21SDavid Hildenbrand 	vcpu->guest_debug = 0;
313927291e21SDavid Hildenbrand 	kvm_s390_clear_bp_data(vcpu);
314027291e21SDavid Hildenbrand 
314166b56562SChristoffer Dall 	if (dbg->control & ~VALID_GUESTDBG_FLAGS) {
314266b56562SChristoffer Dall 		rc = -EINVAL;
314366b56562SChristoffer Dall 		goto out;
314466b56562SChristoffer Dall 	}
314566b56562SChristoffer Dall 	if (!sclp.has_gpere) {
314666b56562SChristoffer Dall 		rc = -EINVAL;
314766b56562SChristoffer Dall 		goto out;
314866b56562SChristoffer Dall 	}
314927291e21SDavid Hildenbrand 
315027291e21SDavid Hildenbrand 	if (dbg->control & KVM_GUESTDBG_ENABLE) {
315127291e21SDavid Hildenbrand 		vcpu->guest_debug = dbg->control;
315227291e21SDavid Hildenbrand 		/* enforce guest PER */
3153ef8f4f49SDavid Hildenbrand 		kvm_s390_set_cpuflags(vcpu, CPUSTAT_P);
315427291e21SDavid Hildenbrand 
315527291e21SDavid Hildenbrand 		if (dbg->control & KVM_GUESTDBG_USE_HW_BP)
315627291e21SDavid Hildenbrand 			rc = kvm_s390_import_bp_data(vcpu, dbg);
315727291e21SDavid Hildenbrand 	} else {
31589daecfc6SDavid Hildenbrand 		kvm_s390_clear_cpuflags(vcpu, CPUSTAT_P);
315927291e21SDavid Hildenbrand 		vcpu->arch.guestdbg.last_bp = 0;
316027291e21SDavid Hildenbrand 	}
316127291e21SDavid Hildenbrand 
316227291e21SDavid Hildenbrand 	if (rc) {
316327291e21SDavid Hildenbrand 		vcpu->guest_debug = 0;
316427291e21SDavid Hildenbrand 		kvm_s390_clear_bp_data(vcpu);
31659daecfc6SDavid Hildenbrand 		kvm_s390_clear_cpuflags(vcpu, CPUSTAT_P);
316627291e21SDavid Hildenbrand 	}
316727291e21SDavid Hildenbrand 
316866b56562SChristoffer Dall out:
316966b56562SChristoffer Dall 	vcpu_put(vcpu);
317027291e21SDavid Hildenbrand 	return rc;
3171b0c632dbSHeiko Carstens }
3172b0c632dbSHeiko Carstens 
317362d9f0dbSMarcelo Tosatti int kvm_arch_vcpu_ioctl_get_mpstate(struct kvm_vcpu *vcpu,
317462d9f0dbSMarcelo Tosatti 				    struct kvm_mp_state *mp_state)
317562d9f0dbSMarcelo Tosatti {
3176fd232561SChristoffer Dall 	int ret;
3177fd232561SChristoffer Dall 
3178fd232561SChristoffer Dall 	vcpu_load(vcpu);
3179fd232561SChristoffer Dall 
31806352e4d2SDavid Hildenbrand 	/* CHECK_STOP and LOAD are not supported yet */
3181fd232561SChristoffer Dall 	ret = is_vcpu_stopped(vcpu) ? KVM_MP_STATE_STOPPED :
31826352e4d2SDavid Hildenbrand 				      KVM_MP_STATE_OPERATING;
3183fd232561SChristoffer Dall 
3184fd232561SChristoffer Dall 	vcpu_put(vcpu);
3185fd232561SChristoffer Dall 	return ret;
318662d9f0dbSMarcelo Tosatti }
318762d9f0dbSMarcelo Tosatti 
318862d9f0dbSMarcelo Tosatti int kvm_arch_vcpu_ioctl_set_mpstate(struct kvm_vcpu *vcpu,
318962d9f0dbSMarcelo Tosatti 				    struct kvm_mp_state *mp_state)
319062d9f0dbSMarcelo Tosatti {
31916352e4d2SDavid Hildenbrand 	int rc = 0;
31926352e4d2SDavid Hildenbrand 
3193e83dff5eSChristoffer Dall 	vcpu_load(vcpu);
3194e83dff5eSChristoffer Dall 
31956352e4d2SDavid Hildenbrand 	/* user space knows about this interface - let it control the state */
31966352e4d2SDavid Hildenbrand 	vcpu->kvm->arch.user_cpu_state_ctrl = 1;
31976352e4d2SDavid Hildenbrand 
31986352e4d2SDavid Hildenbrand 	switch (mp_state->mp_state) {
31996352e4d2SDavid Hildenbrand 	case KVM_MP_STATE_STOPPED:
32006352e4d2SDavid Hildenbrand 		kvm_s390_vcpu_stop(vcpu);
32016352e4d2SDavid Hildenbrand 		break;
32026352e4d2SDavid Hildenbrand 	case KVM_MP_STATE_OPERATING:
32036352e4d2SDavid Hildenbrand 		kvm_s390_vcpu_start(vcpu);
32046352e4d2SDavid Hildenbrand 		break;
32056352e4d2SDavid Hildenbrand 	case KVM_MP_STATE_LOAD:
32066352e4d2SDavid Hildenbrand 	case KVM_MP_STATE_CHECK_STOP:
32076352e4d2SDavid Hildenbrand 		/* fall through - CHECK_STOP and LOAD are not supported yet */
32086352e4d2SDavid Hildenbrand 	default:
32096352e4d2SDavid Hildenbrand 		rc = -ENXIO;
32106352e4d2SDavid Hildenbrand 	}
32116352e4d2SDavid Hildenbrand 
3212e83dff5eSChristoffer Dall 	vcpu_put(vcpu);
32136352e4d2SDavid Hildenbrand 	return rc;
321462d9f0dbSMarcelo Tosatti }
321562d9f0dbSMarcelo Tosatti 
32168ad35755SDavid Hildenbrand static bool ibs_enabled(struct kvm_vcpu *vcpu)
32178ad35755SDavid Hildenbrand {
32188d5fb0dcSDavid Hildenbrand 	return kvm_s390_test_cpuflags(vcpu, CPUSTAT_IBS);
32198ad35755SDavid Hildenbrand }
32208ad35755SDavid Hildenbrand 
32212c70fe44SChristian Borntraeger static int kvm_s390_handle_requests(struct kvm_vcpu *vcpu)
32222c70fe44SChristian Borntraeger {
32238ad35755SDavid Hildenbrand retry:
32248e236546SChristian Borntraeger 	kvm_s390_vcpu_request_handled(vcpu);
32252fa6e1e1SRadim Krčmář 	if (!kvm_request_pending(vcpu))
3226586b7ccdSChristian Borntraeger 		return 0;
32272c70fe44SChristian Borntraeger 	/*
32282c70fe44SChristian Borntraeger 	 * We use MMU_RELOAD just to re-arm the ipte notifier for the
3229b2d73b2aSMartin Schwidefsky 	 * guest prefix page. gmap_mprotect_notify will wait on the ptl lock.
32302c70fe44SChristian Borntraeger 	 * This ensures that the ipte instruction for this request has
32312c70fe44SChristian Borntraeger 	 * already finished. We might race against a second unmapper that
32322c70fe44SChristian Borntraeger 	 * wants to set the blocking bit. Lets just retry the request loop.
32332c70fe44SChristian Borntraeger 	 */
32348ad35755SDavid Hildenbrand 	if (kvm_check_request(KVM_REQ_MMU_RELOAD, vcpu)) {
32352c70fe44SChristian Borntraeger 		int rc;
3236b2d73b2aSMartin Schwidefsky 		rc = gmap_mprotect_notify(vcpu->arch.gmap,
3237fda902cbSMichael Mueller 					  kvm_s390_get_prefix(vcpu),
3238b2d73b2aSMartin Schwidefsky 					  PAGE_SIZE * 2, PROT_WRITE);
3239aca411a4SJulius Niedworok 		if (rc) {
3240aca411a4SJulius Niedworok 			kvm_make_request(KVM_REQ_MMU_RELOAD, vcpu);
32412c70fe44SChristian Borntraeger 			return rc;
3242aca411a4SJulius Niedworok 		}
32438ad35755SDavid Hildenbrand 		goto retry;
32442c70fe44SChristian Borntraeger 	}
32458ad35755SDavid Hildenbrand 
3246d3d692c8SDavid Hildenbrand 	if (kvm_check_request(KVM_REQ_TLB_FLUSH, vcpu)) {
3247d3d692c8SDavid Hildenbrand 		vcpu->arch.sie_block->ihcpu = 0xffff;
3248d3d692c8SDavid Hildenbrand 		goto retry;
3249d3d692c8SDavid Hildenbrand 	}
3250d3d692c8SDavid Hildenbrand 
32518ad35755SDavid Hildenbrand 	if (kvm_check_request(KVM_REQ_ENABLE_IBS, vcpu)) {
32528ad35755SDavid Hildenbrand 		if (!ibs_enabled(vcpu)) {
32538ad35755SDavid Hildenbrand 			trace_kvm_s390_enable_disable_ibs(vcpu->vcpu_id, 1);
3254ef8f4f49SDavid Hildenbrand 			kvm_s390_set_cpuflags(vcpu, CPUSTAT_IBS);
32558ad35755SDavid Hildenbrand 		}
32568ad35755SDavid Hildenbrand 		goto retry;
32578ad35755SDavid Hildenbrand 	}
32588ad35755SDavid Hildenbrand 
32598ad35755SDavid Hildenbrand 	if (kvm_check_request(KVM_REQ_DISABLE_IBS, vcpu)) {
32608ad35755SDavid Hildenbrand 		if (ibs_enabled(vcpu)) {
32618ad35755SDavid Hildenbrand 			trace_kvm_s390_enable_disable_ibs(vcpu->vcpu_id, 0);
32629daecfc6SDavid Hildenbrand 			kvm_s390_clear_cpuflags(vcpu, CPUSTAT_IBS);
32638ad35755SDavid Hildenbrand 		}
32648ad35755SDavid Hildenbrand 		goto retry;
32658ad35755SDavid Hildenbrand 	}
32668ad35755SDavid Hildenbrand 
32676502a34cSDavid Hildenbrand 	if (kvm_check_request(KVM_REQ_ICPT_OPEREXC, vcpu)) {
32686502a34cSDavid Hildenbrand 		vcpu->arch.sie_block->ictl |= ICTL_OPEREXC;
32696502a34cSDavid Hildenbrand 		goto retry;
32706502a34cSDavid Hildenbrand 	}
32716502a34cSDavid Hildenbrand 
3272190df4a2SClaudio Imbrenda 	if (kvm_check_request(KVM_REQ_START_MIGRATION, vcpu)) {
3273190df4a2SClaudio Imbrenda 		/*
3274c9f0a2b8SJanosch Frank 		 * Disable CMM virtualization; we will emulate the ESSA
3275190df4a2SClaudio Imbrenda 		 * instruction manually, in order to provide additional
3276190df4a2SClaudio Imbrenda 		 * functionalities needed for live migration.
3277190df4a2SClaudio Imbrenda 		 */
3278190df4a2SClaudio Imbrenda 		vcpu->arch.sie_block->ecb2 &= ~ECB2_CMMA;
3279190df4a2SClaudio Imbrenda 		goto retry;
3280190df4a2SClaudio Imbrenda 	}
3281190df4a2SClaudio Imbrenda 
3282190df4a2SClaudio Imbrenda 	if (kvm_check_request(KVM_REQ_STOP_MIGRATION, vcpu)) {
3283190df4a2SClaudio Imbrenda 		/*
3284c9f0a2b8SJanosch Frank 		 * Re-enable CMM virtualization if CMMA is available and
3285c9f0a2b8SJanosch Frank 		 * CMM has been used.
3286190df4a2SClaudio Imbrenda 		 */
3287190df4a2SClaudio Imbrenda 		if ((vcpu->kvm->arch.use_cmma) &&
3288c9f0a2b8SJanosch Frank 		    (vcpu->kvm->mm->context.uses_cmm))
3289190df4a2SClaudio Imbrenda 			vcpu->arch.sie_block->ecb2 |= ECB2_CMMA;
3290190df4a2SClaudio Imbrenda 		goto retry;
3291190df4a2SClaudio Imbrenda 	}
3292190df4a2SClaudio Imbrenda 
32930759d068SDavid Hildenbrand 	/* nothing to do, just clear the request */
329472875d8aSRadim Krčmář 	kvm_clear_request(KVM_REQ_UNHALT, vcpu);
32953194cdb7SDavid Hildenbrand 	/* we left the vsie handler, nothing to do, just clear the request */
32963194cdb7SDavid Hildenbrand 	kvm_clear_request(KVM_REQ_VSIE_RESTART, vcpu);
32970759d068SDavid Hildenbrand 
32982c70fe44SChristian Borntraeger 	return 0;
32992c70fe44SChristian Borntraeger }
33002c70fe44SChristian Borntraeger 
33010e7def5fSDavid Hildenbrand void kvm_s390_set_tod_clock(struct kvm *kvm,
33028fa1696eSCollin L. Walling 			    const struct kvm_s390_vm_tod_clock *gtod)
33038fa1696eSCollin L. Walling {
33048fa1696eSCollin L. Walling 	struct kvm_vcpu *vcpu;
33058fa1696eSCollin L. Walling 	struct kvm_s390_tod_clock_ext htod;
33068fa1696eSCollin L. Walling 	int i;
33078fa1696eSCollin L. Walling 
33088fa1696eSCollin L. Walling 	mutex_lock(&kvm->lock);
33098fa1696eSCollin L. Walling 	preempt_disable();
33108fa1696eSCollin L. Walling 
33118fa1696eSCollin L. Walling 	get_tod_clock_ext((char *)&htod);
33128fa1696eSCollin L. Walling 
33138fa1696eSCollin L. Walling 	kvm->arch.epoch = gtod->tod - htod.tod;
33140e7def5fSDavid Hildenbrand 	kvm->arch.epdx = 0;
33150e7def5fSDavid Hildenbrand 	if (test_kvm_facility(kvm, 139)) {
33168fa1696eSCollin L. Walling 		kvm->arch.epdx = gtod->epoch_idx - htod.epoch_idx;
33178fa1696eSCollin L. Walling 		if (kvm->arch.epoch > gtod->tod)
33188fa1696eSCollin L. Walling 			kvm->arch.epdx -= 1;
33190e7def5fSDavid Hildenbrand 	}
33208fa1696eSCollin L. Walling 
33218fa1696eSCollin L. Walling 	kvm_s390_vcpu_block_all(kvm);
33228fa1696eSCollin L. Walling 	kvm_for_each_vcpu(i, vcpu, kvm) {
33238fa1696eSCollin L. Walling 		vcpu->arch.sie_block->epoch = kvm->arch.epoch;
33248fa1696eSCollin L. Walling 		vcpu->arch.sie_block->epdx  = kvm->arch.epdx;
33258fa1696eSCollin L. Walling 	}
33268fa1696eSCollin L. Walling 
33278fa1696eSCollin L. Walling 	kvm_s390_vcpu_unblock_all(kvm);
33288fa1696eSCollin L. Walling 	preempt_enable();
33298fa1696eSCollin L. Walling 	mutex_unlock(&kvm->lock);
33308fa1696eSCollin L. Walling }
33318fa1696eSCollin L. Walling 
3332fa576c58SThomas Huth /**
3333fa576c58SThomas Huth  * kvm_arch_fault_in_page - fault-in guest page if necessary
3334fa576c58SThomas Huth  * @vcpu: The corresponding virtual cpu
3335fa576c58SThomas Huth  * @gpa: Guest physical address
3336fa576c58SThomas Huth  * @writable: Whether the page should be writable or not
3337fa576c58SThomas Huth  *
3338fa576c58SThomas Huth  * Make sure that a guest page has been faulted-in on the host.
3339fa576c58SThomas Huth  *
3340fa576c58SThomas Huth  * Return: Zero on success, negative error code otherwise.
3341fa576c58SThomas Huth  */
3342fa576c58SThomas Huth long kvm_arch_fault_in_page(struct kvm_vcpu *vcpu, gpa_t gpa, int writable)
334324eb3a82SDominik Dingel {
3344527e30b4SMartin Schwidefsky 	return gmap_fault(vcpu->arch.gmap, gpa,
3345527e30b4SMartin Schwidefsky 			  writable ? FAULT_FLAG_WRITE : 0);
334624eb3a82SDominik Dingel }
334724eb3a82SDominik Dingel 
33483c038e6bSDominik Dingel static void __kvm_inject_pfault_token(struct kvm_vcpu *vcpu, bool start_token,
33493c038e6bSDominik Dingel 				      unsigned long token)
33503c038e6bSDominik Dingel {
33513c038e6bSDominik Dingel 	struct kvm_s390_interrupt inti;
3352383d0b05SJens Freimann 	struct kvm_s390_irq irq;
33533c038e6bSDominik Dingel 
33543c038e6bSDominik Dingel 	if (start_token) {
3355383d0b05SJens Freimann 		irq.u.ext.ext_params2 = token;
3356383d0b05SJens Freimann 		irq.type = KVM_S390_INT_PFAULT_INIT;
3357383d0b05SJens Freimann 		WARN_ON_ONCE(kvm_s390_inject_vcpu(vcpu, &irq));
33583c038e6bSDominik Dingel 	} else {
33593c038e6bSDominik Dingel 		inti.type = KVM_S390_INT_PFAULT_DONE;
3360383d0b05SJens Freimann 		inti.parm64 = token;
33613c038e6bSDominik Dingel 		WARN_ON_ONCE(kvm_s390_inject_vm(vcpu->kvm, &inti));
33623c038e6bSDominik Dingel 	}
33633c038e6bSDominik Dingel }
33643c038e6bSDominik Dingel 
33653c038e6bSDominik Dingel void kvm_arch_async_page_not_present(struct kvm_vcpu *vcpu,
33663c038e6bSDominik Dingel 				     struct kvm_async_pf *work)
33673c038e6bSDominik Dingel {
33683c038e6bSDominik Dingel 	trace_kvm_s390_pfault_init(vcpu, work->arch.pfault_token);
33693c038e6bSDominik Dingel 	__kvm_inject_pfault_token(vcpu, true, work->arch.pfault_token);
33703c038e6bSDominik Dingel }
33713c038e6bSDominik Dingel 
33723c038e6bSDominik Dingel void kvm_arch_async_page_present(struct kvm_vcpu *vcpu,
33733c038e6bSDominik Dingel 				 struct kvm_async_pf *work)
33743c038e6bSDominik Dingel {
33753c038e6bSDominik Dingel 	trace_kvm_s390_pfault_done(vcpu, work->arch.pfault_token);
33763c038e6bSDominik Dingel 	__kvm_inject_pfault_token(vcpu, false, work->arch.pfault_token);
33773c038e6bSDominik Dingel }
33783c038e6bSDominik Dingel 
33793c038e6bSDominik Dingel void kvm_arch_async_page_ready(struct kvm_vcpu *vcpu,
33803c038e6bSDominik Dingel 			       struct kvm_async_pf *work)
33813c038e6bSDominik Dingel {
33823c038e6bSDominik Dingel 	/* s390 will always inject the page directly */
33833c038e6bSDominik Dingel }
33843c038e6bSDominik Dingel 
33853c038e6bSDominik Dingel bool kvm_arch_can_inject_async_page_present(struct kvm_vcpu *vcpu)
33863c038e6bSDominik Dingel {
33873c038e6bSDominik Dingel 	/*
33883c038e6bSDominik Dingel 	 * s390 will always inject the page directly,
33893c038e6bSDominik Dingel 	 * but we still want check_async_completion to cleanup
33903c038e6bSDominik Dingel 	 */
33913c038e6bSDominik Dingel 	return true;
33923c038e6bSDominik Dingel }
33933c038e6bSDominik Dingel 
33943c038e6bSDominik Dingel static int kvm_arch_setup_async_pf(struct kvm_vcpu *vcpu)
33953c038e6bSDominik Dingel {
33963c038e6bSDominik Dingel 	hva_t hva;
33973c038e6bSDominik Dingel 	struct kvm_arch_async_pf arch;
33983c038e6bSDominik Dingel 	int rc;
33993c038e6bSDominik Dingel 
34003c038e6bSDominik Dingel 	if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID)
34013c038e6bSDominik Dingel 		return 0;
34023c038e6bSDominik Dingel 	if ((vcpu->arch.sie_block->gpsw.mask & vcpu->arch.pfault_select) !=
34033c038e6bSDominik Dingel 	    vcpu->arch.pfault_compare)
34043c038e6bSDominik Dingel 		return 0;
34053c038e6bSDominik Dingel 	if (psw_extint_disabled(vcpu))
34063c038e6bSDominik Dingel 		return 0;
34079a022067SDavid Hildenbrand 	if (kvm_s390_vcpu_has_irq(vcpu, 0))
34083c038e6bSDominik Dingel 		return 0;
3409b9224cd7SDavid Hildenbrand 	if (!(vcpu->arch.sie_block->gcr[0] & CR0_SERVICE_SIGNAL_SUBMASK))
34103c038e6bSDominik Dingel 		return 0;
34113c038e6bSDominik Dingel 	if (!vcpu->arch.gmap->pfault_enabled)
34123c038e6bSDominik Dingel 		return 0;
34133c038e6bSDominik Dingel 
341481480cc1SHeiko Carstens 	hva = gfn_to_hva(vcpu->kvm, gpa_to_gfn(current->thread.gmap_addr));
341581480cc1SHeiko Carstens 	hva += current->thread.gmap_addr & ~PAGE_MASK;
341681480cc1SHeiko Carstens 	if (read_guest_real(vcpu, vcpu->arch.pfault_token, &arch.pfault_token, 8))
34173c038e6bSDominik Dingel 		return 0;
34183c038e6bSDominik Dingel 
34193c038e6bSDominik Dingel 	rc = kvm_setup_async_pf(vcpu, current->thread.gmap_addr, hva, &arch);
34203c038e6bSDominik Dingel 	return rc;
34213c038e6bSDominik Dingel }
34223c038e6bSDominik Dingel 
34233fb4c40fSThomas Huth static int vcpu_pre_run(struct kvm_vcpu *vcpu)
3424b0c632dbSHeiko Carstens {
34253fb4c40fSThomas Huth 	int rc, cpuflags;
3426e168bf8dSCarsten Otte 
34273c038e6bSDominik Dingel 	/*
34283c038e6bSDominik Dingel 	 * On s390 notifications for arriving pages will be delivered directly
34293c038e6bSDominik Dingel 	 * to the guest but the house keeping for completed pfaults is
34303c038e6bSDominik Dingel 	 * handled outside the worker.
34313c038e6bSDominik Dingel 	 */
34323c038e6bSDominik Dingel 	kvm_check_async_pf_completion(vcpu);
34333c038e6bSDominik Dingel 
34347ec7c8c7SChristian Borntraeger 	vcpu->arch.sie_block->gg14 = vcpu->run->s.regs.gprs[14];
34357ec7c8c7SChristian Borntraeger 	vcpu->arch.sie_block->gg15 = vcpu->run->s.regs.gprs[15];
3436b0c632dbSHeiko Carstens 
3437b0c632dbSHeiko Carstens 	if (need_resched())
3438b0c632dbSHeiko Carstens 		schedule();
3439b0c632dbSHeiko Carstens 
3440d3a73acbSMartin Schwidefsky 	if (test_cpu_flag(CIF_MCCK_PENDING))
344171cde587SChristian Borntraeger 		s390_handle_mcck();
344271cde587SChristian Borntraeger 
344379395031SJens Freimann 	if (!kvm_is_ucontrol(vcpu->kvm)) {
344479395031SJens Freimann 		rc = kvm_s390_deliver_pending_interrupts(vcpu);
344579395031SJens Freimann 		if (rc)
344679395031SJens Freimann 			return rc;
344779395031SJens Freimann 	}
34480ff31867SCarsten Otte 
34492c70fe44SChristian Borntraeger 	rc = kvm_s390_handle_requests(vcpu);
34502c70fe44SChristian Borntraeger 	if (rc)
34512c70fe44SChristian Borntraeger 		return rc;
34522c70fe44SChristian Borntraeger 
345327291e21SDavid Hildenbrand 	if (guestdbg_enabled(vcpu)) {
345427291e21SDavid Hildenbrand 		kvm_s390_backup_guest_per_regs(vcpu);
345527291e21SDavid Hildenbrand 		kvm_s390_patch_guest_per_regs(vcpu);
345627291e21SDavid Hildenbrand 	}
345727291e21SDavid Hildenbrand 
3458b0c632dbSHeiko Carstens 	vcpu->arch.sie_block->icptcode = 0;
34593fb4c40fSThomas Huth 	cpuflags = atomic_read(&vcpu->arch.sie_block->cpuflags);
34603fb4c40fSThomas Huth 	VCPU_EVENT(vcpu, 6, "entering sie flags %x", cpuflags);
34613fb4c40fSThomas Huth 	trace_kvm_s390_sie_enter(vcpu, cpuflags);
34622b29a9fdSDominik Dingel 
34633fb4c40fSThomas Huth 	return 0;
34643fb4c40fSThomas Huth }
34653fb4c40fSThomas Huth 
3466492d8642SThomas Huth static int vcpu_post_run_fault_in_sie(struct kvm_vcpu *vcpu)
3467492d8642SThomas Huth {
346856317920SDavid Hildenbrand 	struct kvm_s390_pgm_info pgm_info = {
346956317920SDavid Hildenbrand 		.code = PGM_ADDRESSING,
347056317920SDavid Hildenbrand 	};
347156317920SDavid Hildenbrand 	u8 opcode, ilen;
3472492d8642SThomas Huth 	int rc;
3473492d8642SThomas Huth 
3474492d8642SThomas Huth 	VCPU_EVENT(vcpu, 3, "%s", "fault in sie instruction");
3475492d8642SThomas Huth 	trace_kvm_s390_sie_fault(vcpu);
3476492d8642SThomas Huth 
3477492d8642SThomas Huth 	/*
3478492d8642SThomas Huth 	 * We want to inject an addressing exception, which is defined as a
3479492d8642SThomas Huth 	 * suppressing or terminating exception. However, since we came here
3480492d8642SThomas Huth 	 * by a DAT access exception, the PSW still points to the faulting
3481492d8642SThomas Huth 	 * instruction since DAT exceptions are nullifying. So we've got
3482492d8642SThomas Huth 	 * to look up the current opcode to get the length of the instruction
3483492d8642SThomas Huth 	 * to be able to forward the PSW.
3484492d8642SThomas Huth 	 */
34853fa8cad7SDavid Hildenbrand 	rc = read_guest_instr(vcpu, vcpu->arch.sie_block->gpsw.addr, &opcode, 1);
348656317920SDavid Hildenbrand 	ilen = insn_length(opcode);
34879b0d721aSDavid Hildenbrand 	if (rc < 0) {
34889b0d721aSDavid Hildenbrand 		return rc;
34899b0d721aSDavid Hildenbrand 	} else if (rc) {
34909b0d721aSDavid Hildenbrand 		/* Instruction-Fetching Exceptions - we can't detect the ilen.
34919b0d721aSDavid Hildenbrand 		 * Forward by arbitrary ilc, injection will take care of
34929b0d721aSDavid Hildenbrand 		 * nullification if necessary.
34939b0d721aSDavid Hildenbrand 		 */
34949b0d721aSDavid Hildenbrand 		pgm_info = vcpu->arch.pgm;
34959b0d721aSDavid Hildenbrand 		ilen = 4;
34969b0d721aSDavid Hildenbrand 	}
349756317920SDavid Hildenbrand 	pgm_info.flags = ilen | KVM_S390_PGM_FLAGS_ILC_VALID;
349856317920SDavid Hildenbrand 	kvm_s390_forward_psw(vcpu, ilen);
349956317920SDavid Hildenbrand 	return kvm_s390_inject_prog_irq(vcpu, &pgm_info);
3500492d8642SThomas Huth }
3501492d8642SThomas Huth 
35023fb4c40fSThomas Huth static int vcpu_post_run(struct kvm_vcpu *vcpu, int exit_reason)
35033fb4c40fSThomas Huth {
35044d62fcc0SQingFeng Hao 	struct mcck_volatile_info *mcck_info;
35054d62fcc0SQingFeng Hao 	struct sie_page *sie_page;
35064d62fcc0SQingFeng Hao 
35072b29a9fdSDominik Dingel 	VCPU_EVENT(vcpu, 6, "exit sie icptcode %d",
35082b29a9fdSDominik Dingel 		   vcpu->arch.sie_block->icptcode);
35092b29a9fdSDominik Dingel 	trace_kvm_s390_sie_exit(vcpu, vcpu->arch.sie_block->icptcode);
35102b29a9fdSDominik Dingel 
351127291e21SDavid Hildenbrand 	if (guestdbg_enabled(vcpu))
351227291e21SDavid Hildenbrand 		kvm_s390_restore_guest_per_regs(vcpu);
351327291e21SDavid Hildenbrand 
35147ec7c8c7SChristian Borntraeger 	vcpu->run->s.regs.gprs[14] = vcpu->arch.sie_block->gg14;
35157ec7c8c7SChristian Borntraeger 	vcpu->run->s.regs.gprs[15] = vcpu->arch.sie_block->gg15;
351671f116bfSDavid Hildenbrand 
35174d62fcc0SQingFeng Hao 	if (exit_reason == -EINTR) {
35184d62fcc0SQingFeng Hao 		VCPU_EVENT(vcpu, 3, "%s", "machine check");
35194d62fcc0SQingFeng Hao 		sie_page = container_of(vcpu->arch.sie_block,
35204d62fcc0SQingFeng Hao 					struct sie_page, sie_block);
35214d62fcc0SQingFeng Hao 		mcck_info = &sie_page->mcck_info;
35224d62fcc0SQingFeng Hao 		kvm_s390_reinject_machine_check(vcpu, mcck_info);
35234d62fcc0SQingFeng Hao 		return 0;
35244d62fcc0SQingFeng Hao 	}
35254d62fcc0SQingFeng Hao 
352671f116bfSDavid Hildenbrand 	if (vcpu->arch.sie_block->icptcode > 0) {
352771f116bfSDavid Hildenbrand 		int rc = kvm_handle_sie_intercept(vcpu);
352871f116bfSDavid Hildenbrand 
352971f116bfSDavid Hildenbrand 		if (rc != -EOPNOTSUPP)
353071f116bfSDavid Hildenbrand 			return rc;
353171f116bfSDavid Hildenbrand 		vcpu->run->exit_reason = KVM_EXIT_S390_SIEIC;
353271f116bfSDavid Hildenbrand 		vcpu->run->s390_sieic.icptcode = vcpu->arch.sie_block->icptcode;
353371f116bfSDavid Hildenbrand 		vcpu->run->s390_sieic.ipa = vcpu->arch.sie_block->ipa;
353471f116bfSDavid Hildenbrand 		vcpu->run->s390_sieic.ipb = vcpu->arch.sie_block->ipb;
353571f116bfSDavid Hildenbrand 		return -EREMOTE;
353671f116bfSDavid Hildenbrand 	} else if (exit_reason != -EFAULT) {
353771f116bfSDavid Hildenbrand 		vcpu->stat.exit_null++;
353871f116bfSDavid Hildenbrand 		return 0;
3539210b1607SThomas Huth 	} else if (kvm_is_ucontrol(vcpu->kvm)) {
3540210b1607SThomas Huth 		vcpu->run->exit_reason = KVM_EXIT_S390_UCONTROL;
3541210b1607SThomas Huth 		vcpu->run->s390_ucontrol.trans_exc_code =
3542210b1607SThomas Huth 						current->thread.gmap_addr;
3543210b1607SThomas Huth 		vcpu->run->s390_ucontrol.pgm_code = 0x10;
354471f116bfSDavid Hildenbrand 		return -EREMOTE;
354524eb3a82SDominik Dingel 	} else if (current->thread.gmap_pfault) {
35463c038e6bSDominik Dingel 		trace_kvm_s390_major_guest_pfault(vcpu);
354724eb3a82SDominik Dingel 		current->thread.gmap_pfault = 0;
354871f116bfSDavid Hildenbrand 		if (kvm_arch_setup_async_pf(vcpu))
354971f116bfSDavid Hildenbrand 			return 0;
355071f116bfSDavid Hildenbrand 		return kvm_arch_fault_in_page(vcpu, current->thread.gmap_addr, 1);
3551fa576c58SThomas Huth 	}
355271f116bfSDavid Hildenbrand 	return vcpu_post_run_fault_in_sie(vcpu);
35533fb4c40fSThomas Huth }
35543fb4c40fSThomas Huth 
35553fb4c40fSThomas Huth static int __vcpu_run(struct kvm_vcpu *vcpu)
35563fb4c40fSThomas Huth {
35573fb4c40fSThomas Huth 	int rc, exit_reason;
35583fb4c40fSThomas Huth 
3559800c1065SThomas Huth 	/*
3560800c1065SThomas Huth 	 * We try to hold kvm->srcu during most of vcpu_run (except when run-
3561800c1065SThomas Huth 	 * ning the guest), so that memslots (and other stuff) are protected
3562800c1065SThomas Huth 	 */
3563800c1065SThomas Huth 	vcpu->srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
3564800c1065SThomas Huth 
3565a76ccff6SThomas Huth 	do {
35663fb4c40fSThomas Huth 		rc = vcpu_pre_run(vcpu);
35673fb4c40fSThomas Huth 		if (rc)
3568a76ccff6SThomas Huth 			break;
35693fb4c40fSThomas Huth 
3570800c1065SThomas Huth 		srcu_read_unlock(&vcpu->kvm->srcu, vcpu->srcu_idx);
35713fb4c40fSThomas Huth 		/*
3572a76ccff6SThomas Huth 		 * As PF_VCPU will be used in fault handler, between
3573a76ccff6SThomas Huth 		 * guest_enter and guest_exit should be no uaccess.
35743fb4c40fSThomas Huth 		 */
35750097d12eSChristian Borntraeger 		local_irq_disable();
35766edaa530SPaolo Bonzini 		guest_enter_irqoff();
3577db0758b2SDavid Hildenbrand 		__disable_cpu_timer_accounting(vcpu);
35780097d12eSChristian Borntraeger 		local_irq_enable();
3579a76ccff6SThomas Huth 		exit_reason = sie64a(vcpu->arch.sie_block,
3580a76ccff6SThomas Huth 				     vcpu->run->s.regs.gprs);
35810097d12eSChristian Borntraeger 		local_irq_disable();
3582db0758b2SDavid Hildenbrand 		__enable_cpu_timer_accounting(vcpu);
35836edaa530SPaolo Bonzini 		guest_exit_irqoff();
35840097d12eSChristian Borntraeger 		local_irq_enable();
3585800c1065SThomas Huth 		vcpu->srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
35863fb4c40fSThomas Huth 
35873fb4c40fSThomas Huth 		rc = vcpu_post_run(vcpu, exit_reason);
358827291e21SDavid Hildenbrand 	} while (!signal_pending(current) && !guestdbg_exit_pending(vcpu) && !rc);
35893fb4c40fSThomas Huth 
3590800c1065SThomas Huth 	srcu_read_unlock(&vcpu->kvm->srcu, vcpu->srcu_idx);
3591e168bf8dSCarsten Otte 	return rc;
3592b0c632dbSHeiko Carstens }
3593b0c632dbSHeiko Carstens 
3594b028ee3eSDavid Hildenbrand static void sync_regs(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
3595b028ee3eSDavid Hildenbrand {
35964d5f2c04SChristian Borntraeger 	struct runtime_instr_cb *riccb;
35974e0b1ab7SFan Zhang 	struct gs_cb *gscb;
35984d5f2c04SChristian Borntraeger 
35994d5f2c04SChristian Borntraeger 	riccb = (struct runtime_instr_cb *) &kvm_run->s.regs.riccb;
36004e0b1ab7SFan Zhang 	gscb = (struct gs_cb *) &kvm_run->s.regs.gscb;
3601b028ee3eSDavid Hildenbrand 	vcpu->arch.sie_block->gpsw.mask = kvm_run->psw_mask;
3602b028ee3eSDavid Hildenbrand 	vcpu->arch.sie_block->gpsw.addr = kvm_run->psw_addr;
3603b028ee3eSDavid Hildenbrand 	if (kvm_run->kvm_dirty_regs & KVM_SYNC_PREFIX)
3604b028ee3eSDavid Hildenbrand 		kvm_s390_set_prefix(vcpu, kvm_run->s.regs.prefix);
3605b028ee3eSDavid Hildenbrand 	if (kvm_run->kvm_dirty_regs & KVM_SYNC_CRS) {
3606b028ee3eSDavid Hildenbrand 		memcpy(&vcpu->arch.sie_block->gcr, &kvm_run->s.regs.crs, 128);
3607d3d692c8SDavid Hildenbrand 		/* some control register changes require a tlb flush */
3608d3d692c8SDavid Hildenbrand 		kvm_make_request(KVM_REQ_TLB_FLUSH, vcpu);
3609b028ee3eSDavid Hildenbrand 	}
3610b028ee3eSDavid Hildenbrand 	if (kvm_run->kvm_dirty_regs & KVM_SYNC_ARCH0) {
36114287f247SDavid Hildenbrand 		kvm_s390_set_cpu_timer(vcpu, kvm_run->s.regs.cputm);
3612b028ee3eSDavid Hildenbrand 		vcpu->arch.sie_block->ckc = kvm_run->s.regs.ckc;
3613b028ee3eSDavid Hildenbrand 		vcpu->arch.sie_block->todpr = kvm_run->s.regs.todpr;
3614b028ee3eSDavid Hildenbrand 		vcpu->arch.sie_block->pp = kvm_run->s.regs.pp;
3615b028ee3eSDavid Hildenbrand 		vcpu->arch.sie_block->gbea = kvm_run->s.regs.gbea;
3616b028ee3eSDavid Hildenbrand 	}
3617b028ee3eSDavid Hildenbrand 	if (kvm_run->kvm_dirty_regs & KVM_SYNC_PFAULT) {
3618b028ee3eSDavid Hildenbrand 		vcpu->arch.pfault_token = kvm_run->s.regs.pft;
3619b028ee3eSDavid Hildenbrand 		vcpu->arch.pfault_select = kvm_run->s.regs.pfs;
3620b028ee3eSDavid Hildenbrand 		vcpu->arch.pfault_compare = kvm_run->s.regs.pfc;
36219fbd8082SDavid Hildenbrand 		if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID)
36229fbd8082SDavid Hildenbrand 			kvm_clear_async_pf_completion_queue(vcpu);
3623b028ee3eSDavid Hildenbrand 	}
362480cd8763SFan Zhang 	/*
362580cd8763SFan Zhang 	 * If userspace sets the riccb (e.g. after migration) to a valid state,
362680cd8763SFan Zhang 	 * we should enable RI here instead of doing the lazy enablement.
362780cd8763SFan Zhang 	 */
362880cd8763SFan Zhang 	if ((kvm_run->kvm_dirty_regs & KVM_SYNC_RICCB) &&
36294d5f2c04SChristian Borntraeger 	    test_kvm_facility(vcpu->kvm, 64) &&
3630bb59c2daSAlice Frosi 	    riccb->v &&
36310c9d8683SDavid Hildenbrand 	    !(vcpu->arch.sie_block->ecb3 & ECB3_RI)) {
36324d5f2c04SChristian Borntraeger 		VCPU_EVENT(vcpu, 3, "%s", "ENABLE: RI (sync_regs)");
36330c9d8683SDavid Hildenbrand 		vcpu->arch.sie_block->ecb3 |= ECB3_RI;
363480cd8763SFan Zhang 	}
36354e0b1ab7SFan Zhang 	/*
36364e0b1ab7SFan Zhang 	 * If userspace sets the gscb (e.g. after migration) to non-zero,
36374e0b1ab7SFan Zhang 	 * we should enable GS here instead of doing the lazy enablement.
36384e0b1ab7SFan Zhang 	 */
36394e0b1ab7SFan Zhang 	if ((kvm_run->kvm_dirty_regs & KVM_SYNC_GSCB) &&
36404e0b1ab7SFan Zhang 	    test_kvm_facility(vcpu->kvm, 133) &&
36414e0b1ab7SFan Zhang 	    gscb->gssm &&
36424e0b1ab7SFan Zhang 	    !vcpu->arch.gs_enabled) {
36434e0b1ab7SFan Zhang 		VCPU_EVENT(vcpu, 3, "%s", "ENABLE: GS (sync_regs)");
36444e0b1ab7SFan Zhang 		vcpu->arch.sie_block->ecb |= ECB_GS;
36454e0b1ab7SFan Zhang 		vcpu->arch.sie_block->ecd |= ECD_HOSTREGMGMT;
36464e0b1ab7SFan Zhang 		vcpu->arch.gs_enabled = 1;
364780cd8763SFan Zhang 	}
364835b3fde6SChristian Borntraeger 	if ((kvm_run->kvm_dirty_regs & KVM_SYNC_BPBC) &&
364935b3fde6SChristian Borntraeger 	    test_kvm_facility(vcpu->kvm, 82)) {
365035b3fde6SChristian Borntraeger 		vcpu->arch.sie_block->fpf &= ~FPF_BPBC;
365135b3fde6SChristian Borntraeger 		vcpu->arch.sie_block->fpf |= kvm_run->s.regs.bpbc ? FPF_BPBC : 0;
365235b3fde6SChristian Borntraeger 	}
365331d8b8d4SChristian Borntraeger 	save_access_regs(vcpu->arch.host_acrs);
365431d8b8d4SChristian Borntraeger 	restore_access_regs(vcpu->run->s.regs.acrs);
3655e1788bb9SChristian Borntraeger 	/* save host (userspace) fprs/vrs */
3656e1788bb9SChristian Borntraeger 	save_fpu_regs();
3657e1788bb9SChristian Borntraeger 	vcpu->arch.host_fpregs.fpc = current->thread.fpu.fpc;
3658e1788bb9SChristian Borntraeger 	vcpu->arch.host_fpregs.regs = current->thread.fpu.regs;
3659e1788bb9SChristian Borntraeger 	if (MACHINE_HAS_VX)
3660e1788bb9SChristian Borntraeger 		current->thread.fpu.regs = vcpu->run->s.regs.vrs;
3661e1788bb9SChristian Borntraeger 	else
3662e1788bb9SChristian Borntraeger 		current->thread.fpu.regs = vcpu->run->s.regs.fprs;
3663e1788bb9SChristian Borntraeger 	current->thread.fpu.fpc = vcpu->run->s.regs.fpc;
3664e1788bb9SChristian Borntraeger 	if (test_fp_ctl(current->thread.fpu.fpc))
3665e1788bb9SChristian Borntraeger 		/* User space provided an invalid FPC, let's clear it */
3666e1788bb9SChristian Borntraeger 		current->thread.fpu.fpc = 0;
36674e0b1ab7SFan Zhang 	if (MACHINE_HAS_GS) {
36684e0b1ab7SFan Zhang 		preempt_disable();
36694e0b1ab7SFan Zhang 		__ctl_set_bit(2, 4);
36704e0b1ab7SFan Zhang 		if (current->thread.gs_cb) {
36714e0b1ab7SFan Zhang 			vcpu->arch.host_gscb = current->thread.gs_cb;
36724e0b1ab7SFan Zhang 			save_gs_cb(vcpu->arch.host_gscb);
36734e0b1ab7SFan Zhang 		}
36744e0b1ab7SFan Zhang 		if (vcpu->arch.gs_enabled) {
36754e0b1ab7SFan Zhang 			current->thread.gs_cb = (struct gs_cb *)
36764e0b1ab7SFan Zhang 						&vcpu->run->s.regs.gscb;
36774e0b1ab7SFan Zhang 			restore_gs_cb(current->thread.gs_cb);
36784e0b1ab7SFan Zhang 		}
36794e0b1ab7SFan Zhang 		preempt_enable();
36804e0b1ab7SFan Zhang 	}
3681a3da7b4aSChristian Borntraeger 	/* SIE will load etoken directly from SDNX and therefore kvm_run */
368280cd8763SFan Zhang 
3683b028ee3eSDavid Hildenbrand 	kvm_run->kvm_dirty_regs = 0;
3684b028ee3eSDavid Hildenbrand }
3685b028ee3eSDavid Hildenbrand 
3686b028ee3eSDavid Hildenbrand static void store_regs(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
3687b028ee3eSDavid Hildenbrand {
3688b028ee3eSDavid Hildenbrand 	kvm_run->psw_mask = vcpu->arch.sie_block->gpsw.mask;
3689b028ee3eSDavid Hildenbrand 	kvm_run->psw_addr = vcpu->arch.sie_block->gpsw.addr;
3690b028ee3eSDavid Hildenbrand 	kvm_run->s.regs.prefix = kvm_s390_get_prefix(vcpu);
3691b028ee3eSDavid Hildenbrand 	memcpy(&kvm_run->s.regs.crs, &vcpu->arch.sie_block->gcr, 128);
36924287f247SDavid Hildenbrand 	kvm_run->s.regs.cputm = kvm_s390_get_cpu_timer(vcpu);
3693b028ee3eSDavid Hildenbrand 	kvm_run->s.regs.ckc = vcpu->arch.sie_block->ckc;
3694b028ee3eSDavid Hildenbrand 	kvm_run->s.regs.todpr = vcpu->arch.sie_block->todpr;
3695b028ee3eSDavid Hildenbrand 	kvm_run->s.regs.pp = vcpu->arch.sie_block->pp;
3696b028ee3eSDavid Hildenbrand 	kvm_run->s.regs.gbea = vcpu->arch.sie_block->gbea;
3697b028ee3eSDavid Hildenbrand 	kvm_run->s.regs.pft = vcpu->arch.pfault_token;
3698b028ee3eSDavid Hildenbrand 	kvm_run->s.regs.pfs = vcpu->arch.pfault_select;
3699b028ee3eSDavid Hildenbrand 	kvm_run->s.regs.pfc = vcpu->arch.pfault_compare;
370035b3fde6SChristian Borntraeger 	kvm_run->s.regs.bpbc = (vcpu->arch.sie_block->fpf & FPF_BPBC) == FPF_BPBC;
370131d8b8d4SChristian Borntraeger 	save_access_regs(vcpu->run->s.regs.acrs);
370231d8b8d4SChristian Borntraeger 	restore_access_regs(vcpu->arch.host_acrs);
3703e1788bb9SChristian Borntraeger 	/* Save guest register state */
3704e1788bb9SChristian Borntraeger 	save_fpu_regs();
3705e1788bb9SChristian Borntraeger 	vcpu->run->s.regs.fpc = current->thread.fpu.fpc;
3706e1788bb9SChristian Borntraeger 	/* Restore will be done lazily at return */
3707e1788bb9SChristian Borntraeger 	current->thread.fpu.fpc = vcpu->arch.host_fpregs.fpc;
3708e1788bb9SChristian Borntraeger 	current->thread.fpu.regs = vcpu->arch.host_fpregs.regs;
37094e0b1ab7SFan Zhang 	if (MACHINE_HAS_GS) {
37104e0b1ab7SFan Zhang 		__ctl_set_bit(2, 4);
37114e0b1ab7SFan Zhang 		if (vcpu->arch.gs_enabled)
37124e0b1ab7SFan Zhang 			save_gs_cb(current->thread.gs_cb);
37134e0b1ab7SFan Zhang 		preempt_disable();
37144e0b1ab7SFan Zhang 		current->thread.gs_cb = vcpu->arch.host_gscb;
37154e0b1ab7SFan Zhang 		restore_gs_cb(vcpu->arch.host_gscb);
37164e0b1ab7SFan Zhang 		preempt_enable();
37174e0b1ab7SFan Zhang 		if (!vcpu->arch.host_gscb)
37184e0b1ab7SFan Zhang 			__ctl_clear_bit(2, 4);
37194e0b1ab7SFan Zhang 		vcpu->arch.host_gscb = NULL;
37204e0b1ab7SFan Zhang 	}
3721a3da7b4aSChristian Borntraeger 	/* SIE will save etoken directly into SDNX and therefore kvm_run */
3722b028ee3eSDavid Hildenbrand }
3723b028ee3eSDavid Hildenbrand 
3724b0c632dbSHeiko Carstens int kvm_arch_vcpu_ioctl_run(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
3725b0c632dbSHeiko Carstens {
37268f2abe6aSChristian Borntraeger 	int rc;
3727b0c632dbSHeiko Carstens 
3728460df4c1SPaolo Bonzini 	if (kvm_run->immediate_exit)
3729460df4c1SPaolo Bonzini 		return -EINTR;
3730460df4c1SPaolo Bonzini 
3731accb757dSChristoffer Dall 	vcpu_load(vcpu);
3732accb757dSChristoffer Dall 
373327291e21SDavid Hildenbrand 	if (guestdbg_exit_pending(vcpu)) {
373427291e21SDavid Hildenbrand 		kvm_s390_prepare_debug_exit(vcpu);
3735accb757dSChristoffer Dall 		rc = 0;
3736accb757dSChristoffer Dall 		goto out;
373727291e21SDavid Hildenbrand 	}
373827291e21SDavid Hildenbrand 
373920b7035cSJan H. Schönherr 	kvm_sigset_activate(vcpu);
3740b0c632dbSHeiko Carstens 
37416352e4d2SDavid Hildenbrand 	if (!kvm_s390_user_cpu_state_ctrl(vcpu->kvm)) {
37426852d7b6SDavid Hildenbrand 		kvm_s390_vcpu_start(vcpu);
37436352e4d2SDavid Hildenbrand 	} else if (is_vcpu_stopped(vcpu)) {
3744ea2cdd27SDavid Hildenbrand 		pr_err_ratelimited("can't run stopped vcpu %d\n",
37456352e4d2SDavid Hildenbrand 				   vcpu->vcpu_id);
3746accb757dSChristoffer Dall 		rc = -EINVAL;
3747accb757dSChristoffer Dall 		goto out;
37486352e4d2SDavid Hildenbrand 	}
3749b0c632dbSHeiko Carstens 
3750b028ee3eSDavid Hildenbrand 	sync_regs(vcpu, kvm_run);
3751db0758b2SDavid Hildenbrand 	enable_cpu_timer_accounting(vcpu);
3752d7b0b5ebSCarsten Otte 
3753dab4079dSHeiko Carstens 	might_fault();
3754e168bf8dSCarsten Otte 	rc = __vcpu_run(vcpu);
37559ace903dSChristian Ehrhardt 
3756b1d16c49SChristian Ehrhardt 	if (signal_pending(current) && !rc) {
3757b1d16c49SChristian Ehrhardt 		kvm_run->exit_reason = KVM_EXIT_INTR;
37588f2abe6aSChristian Borntraeger 		rc = -EINTR;
3759b1d16c49SChristian Ehrhardt 	}
37608f2abe6aSChristian Borntraeger 
376127291e21SDavid Hildenbrand 	if (guestdbg_exit_pending(vcpu) && !rc)  {
376227291e21SDavid Hildenbrand 		kvm_s390_prepare_debug_exit(vcpu);
376327291e21SDavid Hildenbrand 		rc = 0;
376427291e21SDavid Hildenbrand 	}
376527291e21SDavid Hildenbrand 
37668f2abe6aSChristian Borntraeger 	if (rc == -EREMOTE) {
376771f116bfSDavid Hildenbrand 		/* userspace support is needed, kvm_run has been prepared */
37688f2abe6aSChristian Borntraeger 		rc = 0;
37698f2abe6aSChristian Borntraeger 	}
37708f2abe6aSChristian Borntraeger 
3771db0758b2SDavid Hildenbrand 	disable_cpu_timer_accounting(vcpu);
3772b028ee3eSDavid Hildenbrand 	store_regs(vcpu, kvm_run);
3773d7b0b5ebSCarsten Otte 
377420b7035cSJan H. Schönherr 	kvm_sigset_deactivate(vcpu);
3775b0c632dbSHeiko Carstens 
3776b0c632dbSHeiko Carstens 	vcpu->stat.exit_userspace++;
3777accb757dSChristoffer Dall out:
3778accb757dSChristoffer Dall 	vcpu_put(vcpu);
37797e8e6ab4SHeiko Carstens 	return rc;
3780b0c632dbSHeiko Carstens }
3781b0c632dbSHeiko Carstens 
3782b0c632dbSHeiko Carstens /*
3783b0c632dbSHeiko Carstens  * store status at address
3784b0c632dbSHeiko Carstens  * we use have two special cases:
3785b0c632dbSHeiko Carstens  * KVM_S390_STORE_STATUS_NOADDR: -> 0x1200 on 64 bit
3786b0c632dbSHeiko Carstens  * KVM_S390_STORE_STATUS_PREFIXED: -> prefix
3787b0c632dbSHeiko Carstens  */
3788d0bce605SHeiko Carstens int kvm_s390_store_status_unloaded(struct kvm_vcpu *vcpu, unsigned long gpa)
3789b0c632dbSHeiko Carstens {
3790092670cdSCarsten Otte 	unsigned char archmode = 1;
37919abc2a08SDavid Hildenbrand 	freg_t fprs[NUM_FPRS];
3792fda902cbSMichael Mueller 	unsigned int px;
37934287f247SDavid Hildenbrand 	u64 clkcomp, cputm;
3794d0bce605SHeiko Carstens 	int rc;
3795b0c632dbSHeiko Carstens 
3796d9a3a09aSMartin Schwidefsky 	px = kvm_s390_get_prefix(vcpu);
3797d0bce605SHeiko Carstens 	if (gpa == KVM_S390_STORE_STATUS_NOADDR) {
3798d0bce605SHeiko Carstens 		if (write_guest_abs(vcpu, 163, &archmode, 1))
3799b0c632dbSHeiko Carstens 			return -EFAULT;
3800d9a3a09aSMartin Schwidefsky 		gpa = 0;
3801d0bce605SHeiko Carstens 	} else if (gpa == KVM_S390_STORE_STATUS_PREFIXED) {
3802d0bce605SHeiko Carstens 		if (write_guest_real(vcpu, 163, &archmode, 1))
3803b0c632dbSHeiko Carstens 			return -EFAULT;
3804d9a3a09aSMartin Schwidefsky 		gpa = px;
3805d9a3a09aSMartin Schwidefsky 	} else
3806d9a3a09aSMartin Schwidefsky 		gpa -= __LC_FPREGS_SAVE_AREA;
38079abc2a08SDavid Hildenbrand 
38089abc2a08SDavid Hildenbrand 	/* manually convert vector registers if necessary */
38099abc2a08SDavid Hildenbrand 	if (MACHINE_HAS_VX) {
38109522b37fSDavid Hildenbrand 		convert_vx_to_fp(fprs, (__vector128 *) vcpu->run->s.regs.vrs);
3811d9a3a09aSMartin Schwidefsky 		rc = write_guest_abs(vcpu, gpa + __LC_FPREGS_SAVE_AREA,
38129abc2a08SDavid Hildenbrand 				     fprs, 128);
38139abc2a08SDavid Hildenbrand 	} else {
38149abc2a08SDavid Hildenbrand 		rc = write_guest_abs(vcpu, gpa + __LC_FPREGS_SAVE_AREA,
38156fd8e67dSDavid Hildenbrand 				     vcpu->run->s.regs.fprs, 128);
38169abc2a08SDavid Hildenbrand 	}
3817d9a3a09aSMartin Schwidefsky 	rc |= write_guest_abs(vcpu, gpa + __LC_GPREGS_SAVE_AREA,
3818d0bce605SHeiko Carstens 			      vcpu->run->s.regs.gprs, 128);
3819d9a3a09aSMartin Schwidefsky 	rc |= write_guest_abs(vcpu, gpa + __LC_PSW_SAVE_AREA,
3820d0bce605SHeiko Carstens 			      &vcpu->arch.sie_block->gpsw, 16);
3821d9a3a09aSMartin Schwidefsky 	rc |= write_guest_abs(vcpu, gpa + __LC_PREFIX_SAVE_AREA,
3822fda902cbSMichael Mueller 			      &px, 4);
3823d9a3a09aSMartin Schwidefsky 	rc |= write_guest_abs(vcpu, gpa + __LC_FP_CREG_SAVE_AREA,
38249abc2a08SDavid Hildenbrand 			      &vcpu->run->s.regs.fpc, 4);
3825d9a3a09aSMartin Schwidefsky 	rc |= write_guest_abs(vcpu, gpa + __LC_TOD_PROGREG_SAVE_AREA,
3826d0bce605SHeiko Carstens 			      &vcpu->arch.sie_block->todpr, 4);
38274287f247SDavid Hildenbrand 	cputm = kvm_s390_get_cpu_timer(vcpu);
3828d9a3a09aSMartin Schwidefsky 	rc |= write_guest_abs(vcpu, gpa + __LC_CPU_TIMER_SAVE_AREA,
38294287f247SDavid Hildenbrand 			      &cputm, 8);
3830178bd789SThomas Huth 	clkcomp = vcpu->arch.sie_block->ckc >> 8;
3831d9a3a09aSMartin Schwidefsky 	rc |= write_guest_abs(vcpu, gpa + __LC_CLOCK_COMP_SAVE_AREA,
3832d0bce605SHeiko Carstens 			      &clkcomp, 8);
3833d9a3a09aSMartin Schwidefsky 	rc |= write_guest_abs(vcpu, gpa + __LC_AREGS_SAVE_AREA,
3834d0bce605SHeiko Carstens 			      &vcpu->run->s.regs.acrs, 64);
3835d9a3a09aSMartin Schwidefsky 	rc |= write_guest_abs(vcpu, gpa + __LC_CREGS_SAVE_AREA,
3836d0bce605SHeiko Carstens 			      &vcpu->arch.sie_block->gcr, 128);
3837d0bce605SHeiko Carstens 	return rc ? -EFAULT : 0;
3838b0c632dbSHeiko Carstens }
3839b0c632dbSHeiko Carstens 
3840e879892cSThomas Huth int kvm_s390_vcpu_store_status(struct kvm_vcpu *vcpu, unsigned long addr)
3841e879892cSThomas Huth {
3842e879892cSThomas Huth 	/*
3843e879892cSThomas Huth 	 * The guest FPRS and ACRS are in the host FPRS/ACRS due to the lazy
384431d8b8d4SChristian Borntraeger 	 * switch in the run ioctl. Let's update our copies before we save
3845e879892cSThomas Huth 	 * it into the save area
3846e879892cSThomas Huth 	 */
3847d0164ee2SHendrik Brueckner 	save_fpu_regs();
38489abc2a08SDavid Hildenbrand 	vcpu->run->s.regs.fpc = current->thread.fpu.fpc;
3849e879892cSThomas Huth 	save_access_regs(vcpu->run->s.regs.acrs);
3850e879892cSThomas Huth 
3851e879892cSThomas Huth 	return kvm_s390_store_status_unloaded(vcpu, addr);
3852e879892cSThomas Huth }
3853e879892cSThomas Huth 
38548ad35755SDavid Hildenbrand static void __disable_ibs_on_vcpu(struct kvm_vcpu *vcpu)
38558ad35755SDavid Hildenbrand {
38568ad35755SDavid Hildenbrand 	kvm_check_request(KVM_REQ_ENABLE_IBS, vcpu);
38578e236546SChristian Borntraeger 	kvm_s390_sync_request(KVM_REQ_DISABLE_IBS, vcpu);
38588ad35755SDavid Hildenbrand }
38598ad35755SDavid Hildenbrand 
38608ad35755SDavid Hildenbrand static void __disable_ibs_on_all_vcpus(struct kvm *kvm)
38618ad35755SDavid Hildenbrand {
38628ad35755SDavid Hildenbrand 	unsigned int i;
38638ad35755SDavid Hildenbrand 	struct kvm_vcpu *vcpu;
38648ad35755SDavid Hildenbrand 
38658ad35755SDavid Hildenbrand 	kvm_for_each_vcpu(i, vcpu, kvm) {
38668ad35755SDavid Hildenbrand 		__disable_ibs_on_vcpu(vcpu);
38678ad35755SDavid Hildenbrand 	}
38688ad35755SDavid Hildenbrand }
38698ad35755SDavid Hildenbrand 
38708ad35755SDavid Hildenbrand static void __enable_ibs_on_vcpu(struct kvm_vcpu *vcpu)
38718ad35755SDavid Hildenbrand {
387209a400e7SDavid Hildenbrand 	if (!sclp.has_ibs)
387309a400e7SDavid Hildenbrand 		return;
38748ad35755SDavid Hildenbrand 	kvm_check_request(KVM_REQ_DISABLE_IBS, vcpu);
38758e236546SChristian Borntraeger 	kvm_s390_sync_request(KVM_REQ_ENABLE_IBS, vcpu);
38768ad35755SDavid Hildenbrand }
38778ad35755SDavid Hildenbrand 
38786852d7b6SDavid Hildenbrand void kvm_s390_vcpu_start(struct kvm_vcpu *vcpu)
38796852d7b6SDavid Hildenbrand {
38808ad35755SDavid Hildenbrand 	int i, online_vcpus, started_vcpus = 0;
38818ad35755SDavid Hildenbrand 
38828ad35755SDavid Hildenbrand 	if (!is_vcpu_stopped(vcpu))
38838ad35755SDavid Hildenbrand 		return;
38848ad35755SDavid Hildenbrand 
38856852d7b6SDavid Hildenbrand 	trace_kvm_s390_vcpu_start_stop(vcpu->vcpu_id, 1);
38868ad35755SDavid Hildenbrand 	/* Only one cpu at a time may enter/leave the STOPPED state. */
3887433b9ee4SDavid Hildenbrand 	spin_lock(&vcpu->kvm->arch.start_stop_lock);
38888ad35755SDavid Hildenbrand 	online_vcpus = atomic_read(&vcpu->kvm->online_vcpus);
38898ad35755SDavid Hildenbrand 
38908ad35755SDavid Hildenbrand 	for (i = 0; i < online_vcpus; i++) {
38918ad35755SDavid Hildenbrand 		if (!is_vcpu_stopped(vcpu->kvm->vcpus[i]))
38928ad35755SDavid Hildenbrand 			started_vcpus++;
38938ad35755SDavid Hildenbrand 	}
38948ad35755SDavid Hildenbrand 
38958ad35755SDavid Hildenbrand 	if (started_vcpus == 0) {
38968ad35755SDavid Hildenbrand 		/* we're the only active VCPU -> speed it up */
38978ad35755SDavid Hildenbrand 		__enable_ibs_on_vcpu(vcpu);
38988ad35755SDavid Hildenbrand 	} else if (started_vcpus == 1) {
38998ad35755SDavid Hildenbrand 		/*
39008ad35755SDavid Hildenbrand 		 * As we are starting a second VCPU, we have to disable
39018ad35755SDavid Hildenbrand 		 * the IBS facility on all VCPUs to remove potentially
39028ad35755SDavid Hildenbrand 		 * oustanding ENABLE requests.
39038ad35755SDavid Hildenbrand 		 */
39048ad35755SDavid Hildenbrand 		__disable_ibs_on_all_vcpus(vcpu->kvm);
39058ad35755SDavid Hildenbrand 	}
39068ad35755SDavid Hildenbrand 
39079daecfc6SDavid Hildenbrand 	kvm_s390_clear_cpuflags(vcpu, CPUSTAT_STOPPED);
39088ad35755SDavid Hildenbrand 	/*
39098ad35755SDavid Hildenbrand 	 * Another VCPU might have used IBS while we were offline.
39108ad35755SDavid Hildenbrand 	 * Let's play safe and flush the VCPU at startup.
39118ad35755SDavid Hildenbrand 	 */
3912d3d692c8SDavid Hildenbrand 	kvm_make_request(KVM_REQ_TLB_FLUSH, vcpu);
3913433b9ee4SDavid Hildenbrand 	spin_unlock(&vcpu->kvm->arch.start_stop_lock);
39148ad35755SDavid Hildenbrand 	return;
39156852d7b6SDavid Hildenbrand }
39166852d7b6SDavid Hildenbrand 
39176852d7b6SDavid Hildenbrand void kvm_s390_vcpu_stop(struct kvm_vcpu *vcpu)
39186852d7b6SDavid Hildenbrand {
39198ad35755SDavid Hildenbrand 	int i, online_vcpus, started_vcpus = 0;
39208ad35755SDavid Hildenbrand 	struct kvm_vcpu *started_vcpu = NULL;
39218ad35755SDavid Hildenbrand 
39228ad35755SDavid Hildenbrand 	if (is_vcpu_stopped(vcpu))
39238ad35755SDavid Hildenbrand 		return;
39248ad35755SDavid Hildenbrand 
39256852d7b6SDavid Hildenbrand 	trace_kvm_s390_vcpu_start_stop(vcpu->vcpu_id, 0);
39268ad35755SDavid Hildenbrand 	/* Only one cpu at a time may enter/leave the STOPPED state. */
3927433b9ee4SDavid Hildenbrand 	spin_lock(&vcpu->kvm->arch.start_stop_lock);
39288ad35755SDavid Hildenbrand 	online_vcpus = atomic_read(&vcpu->kvm->online_vcpus);
39298ad35755SDavid Hildenbrand 
393032f5ff63SDavid Hildenbrand 	/* SIGP STOP and SIGP STOP AND STORE STATUS has been fully processed */
39316cddd432SDavid Hildenbrand 	kvm_s390_clear_stop_irq(vcpu);
393232f5ff63SDavid Hildenbrand 
3933ef8f4f49SDavid Hildenbrand 	kvm_s390_set_cpuflags(vcpu, CPUSTAT_STOPPED);
39348ad35755SDavid Hildenbrand 	__disable_ibs_on_vcpu(vcpu);
39358ad35755SDavid Hildenbrand 
39368ad35755SDavid Hildenbrand 	for (i = 0; i < online_vcpus; i++) {
39378ad35755SDavid Hildenbrand 		if (!is_vcpu_stopped(vcpu->kvm->vcpus[i])) {
39388ad35755SDavid Hildenbrand 			started_vcpus++;
39398ad35755SDavid Hildenbrand 			started_vcpu = vcpu->kvm->vcpus[i];
39408ad35755SDavid Hildenbrand 		}
39418ad35755SDavid Hildenbrand 	}
39428ad35755SDavid Hildenbrand 
39438ad35755SDavid Hildenbrand 	if (started_vcpus == 1) {
39448ad35755SDavid Hildenbrand 		/*
39458ad35755SDavid Hildenbrand 		 * As we only have one VCPU left, we want to enable the
39468ad35755SDavid Hildenbrand 		 * IBS facility for that VCPU to speed it up.
39478ad35755SDavid Hildenbrand 		 */
39488ad35755SDavid Hildenbrand 		__enable_ibs_on_vcpu(started_vcpu);
39498ad35755SDavid Hildenbrand 	}
39508ad35755SDavid Hildenbrand 
3951433b9ee4SDavid Hildenbrand 	spin_unlock(&vcpu->kvm->arch.start_stop_lock);
39528ad35755SDavid Hildenbrand 	return;
39536852d7b6SDavid Hildenbrand }
39546852d7b6SDavid Hildenbrand 
3955d6712df9SCornelia Huck static int kvm_vcpu_ioctl_enable_cap(struct kvm_vcpu *vcpu,
3956d6712df9SCornelia Huck 				     struct kvm_enable_cap *cap)
3957d6712df9SCornelia Huck {
3958d6712df9SCornelia Huck 	int r;
3959d6712df9SCornelia Huck 
3960d6712df9SCornelia Huck 	if (cap->flags)
3961d6712df9SCornelia Huck 		return -EINVAL;
3962d6712df9SCornelia Huck 
3963d6712df9SCornelia Huck 	switch (cap->cap) {
3964fa6b7fe9SCornelia Huck 	case KVM_CAP_S390_CSS_SUPPORT:
3965fa6b7fe9SCornelia Huck 		if (!vcpu->kvm->arch.css_support) {
3966fa6b7fe9SCornelia Huck 			vcpu->kvm->arch.css_support = 1;
3967c92ea7b9SChristian Borntraeger 			VM_EVENT(vcpu->kvm, 3, "%s", "ENABLE: CSS support");
3968fa6b7fe9SCornelia Huck 			trace_kvm_s390_enable_css(vcpu->kvm);
3969fa6b7fe9SCornelia Huck 		}
3970fa6b7fe9SCornelia Huck 		r = 0;
3971fa6b7fe9SCornelia Huck 		break;
3972d6712df9SCornelia Huck 	default:
3973d6712df9SCornelia Huck 		r = -EINVAL;
3974d6712df9SCornelia Huck 		break;
3975d6712df9SCornelia Huck 	}
3976d6712df9SCornelia Huck 	return r;
3977d6712df9SCornelia Huck }
3978d6712df9SCornelia Huck 
397941408c28SThomas Huth static long kvm_s390_guest_mem_op(struct kvm_vcpu *vcpu,
398041408c28SThomas Huth 				  struct kvm_s390_mem_op *mop)
398141408c28SThomas Huth {
398241408c28SThomas Huth 	void __user *uaddr = (void __user *)mop->buf;
398341408c28SThomas Huth 	void *tmpbuf = NULL;
398441408c28SThomas Huth 	int r, srcu_idx;
398541408c28SThomas Huth 	const u64 supported_flags = KVM_S390_MEMOP_F_INJECT_EXCEPTION
398641408c28SThomas Huth 				    | KVM_S390_MEMOP_F_CHECK_ONLY;
398741408c28SThomas Huth 
398841408c28SThomas Huth 	if (mop->flags & ~supported_flags)
398941408c28SThomas Huth 		return -EINVAL;
399041408c28SThomas Huth 
399141408c28SThomas Huth 	if (mop->size > MEM_OP_MAX_SIZE)
399241408c28SThomas Huth 		return -E2BIG;
399341408c28SThomas Huth 
399441408c28SThomas Huth 	if (!(mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY)) {
399541408c28SThomas Huth 		tmpbuf = vmalloc(mop->size);
399641408c28SThomas Huth 		if (!tmpbuf)
399741408c28SThomas Huth 			return -ENOMEM;
399841408c28SThomas Huth 	}
399941408c28SThomas Huth 
400041408c28SThomas Huth 	srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
400141408c28SThomas Huth 
400241408c28SThomas Huth 	switch (mop->op) {
400341408c28SThomas Huth 	case KVM_S390_MEMOP_LOGICAL_READ:
400441408c28SThomas Huth 		if (mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY) {
400592c96321SDavid Hildenbrand 			r = check_gva_range(vcpu, mop->gaddr, mop->ar,
400692c96321SDavid Hildenbrand 					    mop->size, GACC_FETCH);
400741408c28SThomas Huth 			break;
400841408c28SThomas Huth 		}
400941408c28SThomas Huth 		r = read_guest(vcpu, mop->gaddr, mop->ar, tmpbuf, mop->size);
401041408c28SThomas Huth 		if (r == 0) {
401141408c28SThomas Huth 			if (copy_to_user(uaddr, tmpbuf, mop->size))
401241408c28SThomas Huth 				r = -EFAULT;
401341408c28SThomas Huth 		}
401441408c28SThomas Huth 		break;
401541408c28SThomas Huth 	case KVM_S390_MEMOP_LOGICAL_WRITE:
401641408c28SThomas Huth 		if (mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY) {
401792c96321SDavid Hildenbrand 			r = check_gva_range(vcpu, mop->gaddr, mop->ar,
401892c96321SDavid Hildenbrand 					    mop->size, GACC_STORE);
401941408c28SThomas Huth 			break;
402041408c28SThomas Huth 		}
402141408c28SThomas Huth 		if (copy_from_user(tmpbuf, uaddr, mop->size)) {
402241408c28SThomas Huth 			r = -EFAULT;
402341408c28SThomas Huth 			break;
402441408c28SThomas Huth 		}
402541408c28SThomas Huth 		r = write_guest(vcpu, mop->gaddr, mop->ar, tmpbuf, mop->size);
402641408c28SThomas Huth 		break;
402741408c28SThomas Huth 	default:
402841408c28SThomas Huth 		r = -EINVAL;
402941408c28SThomas Huth 	}
403041408c28SThomas Huth 
403141408c28SThomas Huth 	srcu_read_unlock(&vcpu->kvm->srcu, srcu_idx);
403241408c28SThomas Huth 
403341408c28SThomas Huth 	if (r > 0 && (mop->flags & KVM_S390_MEMOP_F_INJECT_EXCEPTION) != 0)
403441408c28SThomas Huth 		kvm_s390_inject_prog_irq(vcpu, &vcpu->arch.pgm);
403541408c28SThomas Huth 
403641408c28SThomas Huth 	vfree(tmpbuf);
403741408c28SThomas Huth 	return r;
403841408c28SThomas Huth }
403941408c28SThomas Huth 
40405cb0944cSPaolo Bonzini long kvm_arch_vcpu_async_ioctl(struct file *filp,
4041b0c632dbSHeiko Carstens 			       unsigned int ioctl, unsigned long arg)
4042b0c632dbSHeiko Carstens {
4043b0c632dbSHeiko Carstens 	struct kvm_vcpu *vcpu = filp->private_data;
4044b0c632dbSHeiko Carstens 	void __user *argp = (void __user *)arg;
4045b0c632dbSHeiko Carstens 
404693736624SAvi Kivity 	switch (ioctl) {
404747b43c52SJens Freimann 	case KVM_S390_IRQ: {
404847b43c52SJens Freimann 		struct kvm_s390_irq s390irq;
404947b43c52SJens Freimann 
405047b43c52SJens Freimann 		if (copy_from_user(&s390irq, argp, sizeof(s390irq)))
40519b062471SChristoffer Dall 			return -EFAULT;
40529b062471SChristoffer Dall 		return kvm_s390_inject_vcpu(vcpu, &s390irq);
405347b43c52SJens Freimann 	}
405493736624SAvi Kivity 	case KVM_S390_INTERRUPT: {
4055ba5c1e9bSCarsten Otte 		struct kvm_s390_interrupt s390int;
4056383d0b05SJens Freimann 		struct kvm_s390_irq s390irq;
4057ba5c1e9bSCarsten Otte 
4058ba5c1e9bSCarsten Otte 		if (copy_from_user(&s390int, argp, sizeof(s390int)))
40599b062471SChristoffer Dall 			return -EFAULT;
4060383d0b05SJens Freimann 		if (s390int_to_s390irq(&s390int, &s390irq))
4061383d0b05SJens Freimann 			return -EINVAL;
40629b062471SChristoffer Dall 		return kvm_s390_inject_vcpu(vcpu, &s390irq);
4063ba5c1e9bSCarsten Otte 	}
40649b062471SChristoffer Dall 	}
40655cb0944cSPaolo Bonzini 	return -ENOIOCTLCMD;
40665cb0944cSPaolo Bonzini }
40675cb0944cSPaolo Bonzini 
40685cb0944cSPaolo Bonzini long kvm_arch_vcpu_ioctl(struct file *filp,
40695cb0944cSPaolo Bonzini 			 unsigned int ioctl, unsigned long arg)
40705cb0944cSPaolo Bonzini {
40715cb0944cSPaolo Bonzini 	struct kvm_vcpu *vcpu = filp->private_data;
40725cb0944cSPaolo Bonzini 	void __user *argp = (void __user *)arg;
40735cb0944cSPaolo Bonzini 	int idx;
40745cb0944cSPaolo Bonzini 	long r;
40759b062471SChristoffer Dall 
40769b062471SChristoffer Dall 	vcpu_load(vcpu);
40779b062471SChristoffer Dall 
40789b062471SChristoffer Dall 	switch (ioctl) {
4079b0c632dbSHeiko Carstens 	case KVM_S390_STORE_STATUS:
4080800c1065SThomas Huth 		idx = srcu_read_lock(&vcpu->kvm->srcu);
4081bc923cc9SAvi Kivity 		r = kvm_s390_vcpu_store_status(vcpu, arg);
4082800c1065SThomas Huth 		srcu_read_unlock(&vcpu->kvm->srcu, idx);
4083bc923cc9SAvi Kivity 		break;
4084b0c632dbSHeiko Carstens 	case KVM_S390_SET_INITIAL_PSW: {
4085b0c632dbSHeiko Carstens 		psw_t psw;
4086b0c632dbSHeiko Carstens 
4087bc923cc9SAvi Kivity 		r = -EFAULT;
4088b0c632dbSHeiko Carstens 		if (copy_from_user(&psw, argp, sizeof(psw)))
4089bc923cc9SAvi Kivity 			break;
4090bc923cc9SAvi Kivity 		r = kvm_arch_vcpu_ioctl_set_initial_psw(vcpu, psw);
4091bc923cc9SAvi Kivity 		break;
4092b0c632dbSHeiko Carstens 	}
4093b0c632dbSHeiko Carstens 	case KVM_S390_INITIAL_RESET:
4094bc923cc9SAvi Kivity 		r = kvm_arch_vcpu_ioctl_initial_reset(vcpu);
4095bc923cc9SAvi Kivity 		break;
409614eebd91SCarsten Otte 	case KVM_SET_ONE_REG:
409714eebd91SCarsten Otte 	case KVM_GET_ONE_REG: {
409814eebd91SCarsten Otte 		struct kvm_one_reg reg;
409914eebd91SCarsten Otte 		r = -EFAULT;
410014eebd91SCarsten Otte 		if (copy_from_user(&reg, argp, sizeof(reg)))
410114eebd91SCarsten Otte 			break;
410214eebd91SCarsten Otte 		if (ioctl == KVM_SET_ONE_REG)
410314eebd91SCarsten Otte 			r = kvm_arch_vcpu_ioctl_set_one_reg(vcpu, &reg);
410414eebd91SCarsten Otte 		else
410514eebd91SCarsten Otte 			r = kvm_arch_vcpu_ioctl_get_one_reg(vcpu, &reg);
410614eebd91SCarsten Otte 		break;
410714eebd91SCarsten Otte 	}
410827e0393fSCarsten Otte #ifdef CONFIG_KVM_S390_UCONTROL
410927e0393fSCarsten Otte 	case KVM_S390_UCAS_MAP: {
411027e0393fSCarsten Otte 		struct kvm_s390_ucas_mapping ucasmap;
411127e0393fSCarsten Otte 
411227e0393fSCarsten Otte 		if (copy_from_user(&ucasmap, argp, sizeof(ucasmap))) {
411327e0393fSCarsten Otte 			r = -EFAULT;
411427e0393fSCarsten Otte 			break;
411527e0393fSCarsten Otte 		}
411627e0393fSCarsten Otte 
411727e0393fSCarsten Otte 		if (!kvm_is_ucontrol(vcpu->kvm)) {
411827e0393fSCarsten Otte 			r = -EINVAL;
411927e0393fSCarsten Otte 			break;
412027e0393fSCarsten Otte 		}
412127e0393fSCarsten Otte 
412227e0393fSCarsten Otte 		r = gmap_map_segment(vcpu->arch.gmap, ucasmap.user_addr,
412327e0393fSCarsten Otte 				     ucasmap.vcpu_addr, ucasmap.length);
412427e0393fSCarsten Otte 		break;
412527e0393fSCarsten Otte 	}
412627e0393fSCarsten Otte 	case KVM_S390_UCAS_UNMAP: {
412727e0393fSCarsten Otte 		struct kvm_s390_ucas_mapping ucasmap;
412827e0393fSCarsten Otte 
412927e0393fSCarsten Otte 		if (copy_from_user(&ucasmap, argp, sizeof(ucasmap))) {
413027e0393fSCarsten Otte 			r = -EFAULT;
413127e0393fSCarsten Otte 			break;
413227e0393fSCarsten Otte 		}
413327e0393fSCarsten Otte 
413427e0393fSCarsten Otte 		if (!kvm_is_ucontrol(vcpu->kvm)) {
413527e0393fSCarsten Otte 			r = -EINVAL;
413627e0393fSCarsten Otte 			break;
413727e0393fSCarsten Otte 		}
413827e0393fSCarsten Otte 
413927e0393fSCarsten Otte 		r = gmap_unmap_segment(vcpu->arch.gmap, ucasmap.vcpu_addr,
414027e0393fSCarsten Otte 			ucasmap.length);
414127e0393fSCarsten Otte 		break;
414227e0393fSCarsten Otte 	}
414327e0393fSCarsten Otte #endif
4144ccc7910fSCarsten Otte 	case KVM_S390_VCPU_FAULT: {
4145527e30b4SMartin Schwidefsky 		r = gmap_fault(vcpu->arch.gmap, arg, 0);
4146ccc7910fSCarsten Otte 		break;
4147ccc7910fSCarsten Otte 	}
4148d6712df9SCornelia Huck 	case KVM_ENABLE_CAP:
4149d6712df9SCornelia Huck 	{
4150d6712df9SCornelia Huck 		struct kvm_enable_cap cap;
4151d6712df9SCornelia Huck 		r = -EFAULT;
4152d6712df9SCornelia Huck 		if (copy_from_user(&cap, argp, sizeof(cap)))
4153d6712df9SCornelia Huck 			break;
4154d6712df9SCornelia Huck 		r = kvm_vcpu_ioctl_enable_cap(vcpu, &cap);
4155d6712df9SCornelia Huck 		break;
4156d6712df9SCornelia Huck 	}
415741408c28SThomas Huth 	case KVM_S390_MEM_OP: {
415841408c28SThomas Huth 		struct kvm_s390_mem_op mem_op;
415941408c28SThomas Huth 
416041408c28SThomas Huth 		if (copy_from_user(&mem_op, argp, sizeof(mem_op)) == 0)
416141408c28SThomas Huth 			r = kvm_s390_guest_mem_op(vcpu, &mem_op);
416241408c28SThomas Huth 		else
416341408c28SThomas Huth 			r = -EFAULT;
416441408c28SThomas Huth 		break;
416541408c28SThomas Huth 	}
4166816c7667SJens Freimann 	case KVM_S390_SET_IRQ_STATE: {
4167816c7667SJens Freimann 		struct kvm_s390_irq_state irq_state;
4168816c7667SJens Freimann 
4169816c7667SJens Freimann 		r = -EFAULT;
4170816c7667SJens Freimann 		if (copy_from_user(&irq_state, argp, sizeof(irq_state)))
4171816c7667SJens Freimann 			break;
4172816c7667SJens Freimann 		if (irq_state.len > VCPU_IRQS_MAX_BUF ||
4173816c7667SJens Freimann 		    irq_state.len == 0 ||
4174816c7667SJens Freimann 		    irq_state.len % sizeof(struct kvm_s390_irq) > 0) {
4175816c7667SJens Freimann 			r = -EINVAL;
4176816c7667SJens Freimann 			break;
4177816c7667SJens Freimann 		}
4178bb64da9aSChristian Borntraeger 		/* do not use irq_state.flags, it will break old QEMUs */
4179816c7667SJens Freimann 		r = kvm_s390_set_irq_state(vcpu,
4180816c7667SJens Freimann 					   (void __user *) irq_state.buf,
4181816c7667SJens Freimann 					   irq_state.len);
4182816c7667SJens Freimann 		break;
4183816c7667SJens Freimann 	}
4184816c7667SJens Freimann 	case KVM_S390_GET_IRQ_STATE: {
4185816c7667SJens Freimann 		struct kvm_s390_irq_state irq_state;
4186816c7667SJens Freimann 
4187816c7667SJens Freimann 		r = -EFAULT;
4188816c7667SJens Freimann 		if (copy_from_user(&irq_state, argp, sizeof(irq_state)))
4189816c7667SJens Freimann 			break;
4190816c7667SJens Freimann 		if (irq_state.len == 0) {
4191816c7667SJens Freimann 			r = -EINVAL;
4192816c7667SJens Freimann 			break;
4193816c7667SJens Freimann 		}
4194bb64da9aSChristian Borntraeger 		/* do not use irq_state.flags, it will break old QEMUs */
4195816c7667SJens Freimann 		r = kvm_s390_get_irq_state(vcpu,
4196816c7667SJens Freimann 					   (__u8 __user *)  irq_state.buf,
4197816c7667SJens Freimann 					   irq_state.len);
4198816c7667SJens Freimann 		break;
4199816c7667SJens Freimann 	}
4200b0c632dbSHeiko Carstens 	default:
42013e6afcf1SCarsten Otte 		r = -ENOTTY;
4202b0c632dbSHeiko Carstens 	}
42039b062471SChristoffer Dall 
42049b062471SChristoffer Dall 	vcpu_put(vcpu);
4205bc923cc9SAvi Kivity 	return r;
4206b0c632dbSHeiko Carstens }
4207b0c632dbSHeiko Carstens 
42081499fa80SSouptick Joarder vm_fault_t kvm_arch_vcpu_fault(struct kvm_vcpu *vcpu, struct vm_fault *vmf)
42095b1c1493SCarsten Otte {
42105b1c1493SCarsten Otte #ifdef CONFIG_KVM_S390_UCONTROL
42115b1c1493SCarsten Otte 	if ((vmf->pgoff == KVM_S390_SIE_PAGE_OFFSET)
42125b1c1493SCarsten Otte 		 && (kvm_is_ucontrol(vcpu->kvm))) {
42135b1c1493SCarsten Otte 		vmf->page = virt_to_page(vcpu->arch.sie_block);
42145b1c1493SCarsten Otte 		get_page(vmf->page);
42155b1c1493SCarsten Otte 		return 0;
42165b1c1493SCarsten Otte 	}
42175b1c1493SCarsten Otte #endif
42185b1c1493SCarsten Otte 	return VM_FAULT_SIGBUS;
42195b1c1493SCarsten Otte }
42205b1c1493SCarsten Otte 
42215587027cSAneesh Kumar K.V int kvm_arch_create_memslot(struct kvm *kvm, struct kvm_memory_slot *slot,
42225587027cSAneesh Kumar K.V 			    unsigned long npages)
4223db3fe4ebSTakuya Yoshikawa {
4224db3fe4ebSTakuya Yoshikawa 	return 0;
4225db3fe4ebSTakuya Yoshikawa }
4226db3fe4ebSTakuya Yoshikawa 
4227b0c632dbSHeiko Carstens /* Section: memory related */
4228f7784b8eSMarcelo Tosatti int kvm_arch_prepare_memory_region(struct kvm *kvm,
4229f7784b8eSMarcelo Tosatti 				   struct kvm_memory_slot *memslot,
423009170a49SPaolo Bonzini 				   const struct kvm_userspace_memory_region *mem,
42317b6195a9STakuya Yoshikawa 				   enum kvm_mr_change change)
4232b0c632dbSHeiko Carstens {
4233dd2887e7SNick Wang 	/* A few sanity checks. We can have memory slots which have to be
4234dd2887e7SNick Wang 	   located/ended at a segment boundary (1MB). The memory in userland is
4235dd2887e7SNick Wang 	   ok to be fragmented into various different vmas. It is okay to mmap()
4236dd2887e7SNick Wang 	   and munmap() stuff in this slot after doing this call at any time */
4237b0c632dbSHeiko Carstens 
4238598841caSCarsten Otte 	if (mem->userspace_addr & 0xffffful)
4239b0c632dbSHeiko Carstens 		return -EINVAL;
4240b0c632dbSHeiko Carstens 
4241598841caSCarsten Otte 	if (mem->memory_size & 0xffffful)
4242b0c632dbSHeiko Carstens 		return -EINVAL;
4243b0c632dbSHeiko Carstens 
4244a3a92c31SDominik Dingel 	if (mem->guest_phys_addr + mem->memory_size > kvm->arch.mem_limit)
4245a3a92c31SDominik Dingel 		return -EINVAL;
4246a3a92c31SDominik Dingel 
4247f7784b8eSMarcelo Tosatti 	return 0;
4248f7784b8eSMarcelo Tosatti }
4249f7784b8eSMarcelo Tosatti 
4250f7784b8eSMarcelo Tosatti void kvm_arch_commit_memory_region(struct kvm *kvm,
425109170a49SPaolo Bonzini 				const struct kvm_userspace_memory_region *mem,
42528482644aSTakuya Yoshikawa 				const struct kvm_memory_slot *old,
4253f36f3f28SPaolo Bonzini 				const struct kvm_memory_slot *new,
42548482644aSTakuya Yoshikawa 				enum kvm_mr_change change)
4255f7784b8eSMarcelo Tosatti {
4256f7850c92SCarsten Otte 	int rc;
4257f7784b8eSMarcelo Tosatti 
42582cef4debSChristian Borntraeger 	/* If the basics of the memslot do not change, we do not want
42592cef4debSChristian Borntraeger 	 * to update the gmap. Every update causes several unnecessary
42602cef4debSChristian Borntraeger 	 * segment translation exceptions. This is usually handled just
42612cef4debSChristian Borntraeger 	 * fine by the normal fault handler + gmap, but it will also
42622cef4debSChristian Borntraeger 	 * cause faults on the prefix page of running guest CPUs.
42632cef4debSChristian Borntraeger 	 */
42642cef4debSChristian Borntraeger 	if (old->userspace_addr == mem->userspace_addr &&
42652cef4debSChristian Borntraeger 	    old->base_gfn * PAGE_SIZE == mem->guest_phys_addr &&
42662cef4debSChristian Borntraeger 	    old->npages * PAGE_SIZE == mem->memory_size)
42672cef4debSChristian Borntraeger 		return;
4268598841caSCarsten Otte 
4269598841caSCarsten Otte 	rc = gmap_map_segment(kvm->arch.gmap, mem->userspace_addr,
4270598841caSCarsten Otte 		mem->guest_phys_addr, mem->memory_size);
4271598841caSCarsten Otte 	if (rc)
4272ea2cdd27SDavid Hildenbrand 		pr_warn("failed to commit memory region\n");
4273598841caSCarsten Otte 	return;
4274b0c632dbSHeiko Carstens }
4275b0c632dbSHeiko Carstens 
427660a37709SAlexander Yarygin static inline unsigned long nonhyp_mask(int i)
427760a37709SAlexander Yarygin {
427860a37709SAlexander Yarygin 	unsigned int nonhyp_fai = (sclp.hmfai << i * 2) >> 30;
427960a37709SAlexander Yarygin 
428060a37709SAlexander Yarygin 	return 0x0000ffffffffffffUL >> (nonhyp_fai << 4);
428160a37709SAlexander Yarygin }
428260a37709SAlexander Yarygin 
42833491caf2SChristian Borntraeger void kvm_arch_vcpu_block_finish(struct kvm_vcpu *vcpu)
42843491caf2SChristian Borntraeger {
42853491caf2SChristian Borntraeger 	vcpu->valid_wakeup = false;
42863491caf2SChristian Borntraeger }
42873491caf2SChristian Borntraeger 
4288b0c632dbSHeiko Carstens static int __init kvm_s390_init(void)
4289b0c632dbSHeiko Carstens {
429060a37709SAlexander Yarygin 	int i;
429160a37709SAlexander Yarygin 
429207197fd0SDavid Hildenbrand 	if (!sclp.has_sief2) {
429307197fd0SDavid Hildenbrand 		pr_info("SIE not available\n");
429407197fd0SDavid Hildenbrand 		return -ENODEV;
429507197fd0SDavid Hildenbrand 	}
429607197fd0SDavid Hildenbrand 
4297a4499382SJanosch Frank 	if (nested && hpage) {
4298a4499382SJanosch Frank 		pr_info("nested (vSIE) and hpage (huge page backing) can currently not be activated concurrently");
4299a4499382SJanosch Frank 		return -EINVAL;
4300a4499382SJanosch Frank 	}
4301a4499382SJanosch Frank 
430260a37709SAlexander Yarygin 	for (i = 0; i < 16; i++)
4303c3b9e3e1SChristian Borntraeger 		kvm_s390_fac_base[i] |=
430460a37709SAlexander Yarygin 			S390_lowcore.stfle_fac_list[i] & nonhyp_mask(i);
430560a37709SAlexander Yarygin 
43069d8d5786SMichael Mueller 	return kvm_init(NULL, sizeof(struct kvm_vcpu), 0, THIS_MODULE);
4307b0c632dbSHeiko Carstens }
4308b0c632dbSHeiko Carstens 
4309b0c632dbSHeiko Carstens static void __exit kvm_s390_exit(void)
4310b0c632dbSHeiko Carstens {
4311b0c632dbSHeiko Carstens 	kvm_exit();
4312b0c632dbSHeiko Carstens }
4313b0c632dbSHeiko Carstens 
4314b0c632dbSHeiko Carstens module_init(kvm_s390_init);
4315b0c632dbSHeiko Carstens module_exit(kvm_s390_exit);
4316566af940SCornelia Huck 
4317566af940SCornelia Huck /*
4318566af940SCornelia Huck  * Enable autoloading of the kvm module.
4319566af940SCornelia Huck  * Note that we add the module alias here instead of virt/kvm/kvm_main.c
4320566af940SCornelia Huck  * since x86 takes a different approach.
4321566af940SCornelia Huck  */
4322566af940SCornelia Huck #include <linux/miscdevice.h>
4323566af940SCornelia Huck MODULE_ALIAS_MISCDEV(KVM_MINOR);
4324566af940SCornelia Huck MODULE_ALIAS("devname:kvm");
4325