1d809aa23SGreg Kroah-Hartman // SPDX-License-Identifier: GPL-2.0 2b0c632dbSHeiko Carstens /* 3bb64da9aSChristian Borntraeger * hosting IBM Z kernel virtual machines (s390x) 4b0c632dbSHeiko Carstens * 5a37cb07aSChristian Borntraeger * Copyright IBM Corp. 2008, 2018 6b0c632dbSHeiko Carstens * 7b0c632dbSHeiko Carstens * Author(s): Carsten Otte <cotte@de.ibm.com> 8b0c632dbSHeiko Carstens * Christian Borntraeger <borntraeger@de.ibm.com> 9b0c632dbSHeiko Carstens * Heiko Carstens <heiko.carstens@de.ibm.com> 10628eb9b8SChristian Ehrhardt * Christian Ehrhardt <ehrhardt@de.ibm.com> 1115f36ebdSJason J. Herne * Jason J. Herne <jjherne@us.ibm.com> 12b0c632dbSHeiko Carstens */ 13b0c632dbSHeiko Carstens 14b0c632dbSHeiko Carstens #include <linux/compiler.h> 15b0c632dbSHeiko Carstens #include <linux/err.h> 16b0c632dbSHeiko Carstens #include <linux/fs.h> 17ca872302SChristian Borntraeger #include <linux/hrtimer.h> 18b0c632dbSHeiko Carstens #include <linux/init.h> 19b0c632dbSHeiko Carstens #include <linux/kvm.h> 20b0c632dbSHeiko Carstens #include <linux/kvm_host.h> 21b2d73b2aSMartin Schwidefsky #include <linux/mman.h> 22b0c632dbSHeiko Carstens #include <linux/module.h> 23d3217967SPaul Gortmaker #include <linux/moduleparam.h> 24a374e892STony Krowiak #include <linux/random.h> 25b0c632dbSHeiko Carstens #include <linux/slab.h> 26ba5c1e9bSCarsten Otte #include <linux/timer.h> 2741408c28SThomas Huth #include <linux/vmalloc.h> 2815c9705fSDavid Hildenbrand #include <linux/bitmap.h> 29174cd4b1SIngo Molnar #include <linux/sched/signal.h> 30190df4a2SClaudio Imbrenda #include <linux/string.h> 31174cd4b1SIngo Molnar 32cbb870c8SHeiko Carstens #include <asm/asm-offsets.h> 33b0c632dbSHeiko Carstens #include <asm/lowcore.h> 34fd5ada04SMartin Schwidefsky #include <asm/stp.h> 35b0c632dbSHeiko Carstens #include <asm/pgtable.h> 361e133ab2SMartin Schwidefsky #include <asm/gmap.h> 37f5daba1dSHeiko Carstens #include <asm/nmi.h> 38a0616cdeSDavid Howells #include <asm/switch_to.h> 396d3da241SJens Freimann #include <asm/isc.h> 401526bf9cSChristian Borntraeger #include <asm/sclp.h> 410a763c78SDavid Hildenbrand #include <asm/cpacf.h> 42221bb8a4SLinus Torvalds #include <asm/timex.h> 43e585b24aSTony Krowiak #include <asm/ap.h> 448f2abe6aSChristian Borntraeger #include "kvm-s390.h" 45b0c632dbSHeiko Carstens #include "gaccess.h" 46b0c632dbSHeiko Carstens 47ea2cdd27SDavid Hildenbrand #define KMSG_COMPONENT "kvm-s390" 48ea2cdd27SDavid Hildenbrand #undef pr_fmt 49ea2cdd27SDavid Hildenbrand #define pr_fmt(fmt) KMSG_COMPONENT ": " fmt 50ea2cdd27SDavid Hildenbrand 515786fffaSCornelia Huck #define CREATE_TRACE_POINTS 525786fffaSCornelia Huck #include "trace.h" 53ade38c31SCornelia Huck #include "trace-s390.h" 545786fffaSCornelia Huck 5541408c28SThomas Huth #define MEM_OP_MAX_SIZE 65536 /* Maximum transfer size for KVM_S390_MEM_OP */ 56816c7667SJens Freimann #define LOCAL_IRQS 32 57816c7667SJens Freimann #define VCPU_IRQS_MAX_BUF (sizeof(struct kvm_s390_irq) * \ 58816c7667SJens Freimann (KVM_MAX_VCPUS + LOCAL_IRQS)) 5941408c28SThomas Huth 60b0c632dbSHeiko Carstens #define VCPU_STAT(x) offsetof(struct kvm_vcpu, stat.x), KVM_STAT_VCPU 61ccc40c53SChristian Borntraeger #define VM_STAT(x) offsetof(struct kvm, stat.x), KVM_STAT_VM 62b0c632dbSHeiko Carstens 63b0c632dbSHeiko Carstens struct kvm_stats_debugfs_item debugfs_entries[] = { 64b0c632dbSHeiko Carstens { "userspace_handled", VCPU_STAT(exit_userspace) }, 650eaeafa1SChristian Borntraeger { "exit_null", VCPU_STAT(exit_null) }, 668f2abe6aSChristian Borntraeger { "exit_validity", VCPU_STAT(exit_validity) }, 678f2abe6aSChristian Borntraeger { "exit_stop_request", VCPU_STAT(exit_stop_request) }, 688f2abe6aSChristian Borntraeger { "exit_external_request", VCPU_STAT(exit_external_request) }, 69a5e0aceaSChristian Borntraeger { "exit_io_request", VCPU_STAT(exit_io_request) }, 708f2abe6aSChristian Borntraeger { "exit_external_interrupt", VCPU_STAT(exit_external_interrupt) }, 71ba5c1e9bSCarsten Otte { "exit_instruction", VCPU_STAT(exit_instruction) }, 729ec6de19SAlexander Yarygin { "exit_pei", VCPU_STAT(exit_pei) }, 73ba5c1e9bSCarsten Otte { "exit_program_interruption", VCPU_STAT(exit_program_interruption) }, 74ba5c1e9bSCarsten Otte { "exit_instr_and_program_int", VCPU_STAT(exit_instr_and_program) }, 75a011eeb2SJanosch Frank { "exit_operation_exception", VCPU_STAT(exit_operation_exception) }, 76f7819512SPaolo Bonzini { "halt_successful_poll", VCPU_STAT(halt_successful_poll) }, 7762bea5bfSPaolo Bonzini { "halt_attempted_poll", VCPU_STAT(halt_attempted_poll) }, 783491caf2SChristian Borntraeger { "halt_poll_invalid", VCPU_STAT(halt_poll_invalid) }, 79ce2e4f0bSDavid Hildenbrand { "halt_wakeup", VCPU_STAT(halt_wakeup) }, 80f5e10b09SChristian Borntraeger { "instruction_lctlg", VCPU_STAT(instruction_lctlg) }, 81ba5c1e9bSCarsten Otte { "instruction_lctl", VCPU_STAT(instruction_lctl) }, 82aba07508SDavid Hildenbrand { "instruction_stctl", VCPU_STAT(instruction_stctl) }, 83aba07508SDavid Hildenbrand { "instruction_stctg", VCPU_STAT(instruction_stctg) }, 84ccc40c53SChristian Borntraeger { "deliver_ckc", VCPU_STAT(deliver_ckc) }, 85ccc40c53SChristian Borntraeger { "deliver_cputm", VCPU_STAT(deliver_cputm) }, 86ba5c1e9bSCarsten Otte { "deliver_emergency_signal", VCPU_STAT(deliver_emergency_signal) }, 877697e71fSChristian Ehrhardt { "deliver_external_call", VCPU_STAT(deliver_external_call) }, 88ba5c1e9bSCarsten Otte { "deliver_service_signal", VCPU_STAT(deliver_service_signal) }, 89ccc40c53SChristian Borntraeger { "deliver_virtio", VCPU_STAT(deliver_virtio) }, 90ba5c1e9bSCarsten Otte { "deliver_stop_signal", VCPU_STAT(deliver_stop_signal) }, 91ba5c1e9bSCarsten Otte { "deliver_prefix_signal", VCPU_STAT(deliver_prefix_signal) }, 92ba5c1e9bSCarsten Otte { "deliver_restart_signal", VCPU_STAT(deliver_restart_signal) }, 93ccc40c53SChristian Borntraeger { "deliver_program", VCPU_STAT(deliver_program) }, 94ccc40c53SChristian Borntraeger { "deliver_io", VCPU_STAT(deliver_io) }, 9532de0749SQingFeng Hao { "deliver_machine_check", VCPU_STAT(deliver_machine_check) }, 96ba5c1e9bSCarsten Otte { "exit_wait_state", VCPU_STAT(exit_wait_state) }, 97ccc40c53SChristian Borntraeger { "inject_ckc", VCPU_STAT(inject_ckc) }, 98ccc40c53SChristian Borntraeger { "inject_cputm", VCPU_STAT(inject_cputm) }, 99ccc40c53SChristian Borntraeger { "inject_external_call", VCPU_STAT(inject_external_call) }, 100ccc40c53SChristian Borntraeger { "inject_float_mchk", VM_STAT(inject_float_mchk) }, 101ccc40c53SChristian Borntraeger { "inject_emergency_signal", VCPU_STAT(inject_emergency_signal) }, 102ccc40c53SChristian Borntraeger { "inject_io", VM_STAT(inject_io) }, 103ccc40c53SChristian Borntraeger { "inject_mchk", VCPU_STAT(inject_mchk) }, 104ccc40c53SChristian Borntraeger { "inject_pfault_done", VM_STAT(inject_pfault_done) }, 105ccc40c53SChristian Borntraeger { "inject_program", VCPU_STAT(inject_program) }, 106ccc40c53SChristian Borntraeger { "inject_restart", VCPU_STAT(inject_restart) }, 107ccc40c53SChristian Borntraeger { "inject_service_signal", VM_STAT(inject_service_signal) }, 108ccc40c53SChristian Borntraeger { "inject_set_prefix", VCPU_STAT(inject_set_prefix) }, 109ccc40c53SChristian Borntraeger { "inject_stop_signal", VCPU_STAT(inject_stop_signal) }, 110ccc40c53SChristian Borntraeger { "inject_pfault_init", VCPU_STAT(inject_pfault_init) }, 111ccc40c53SChristian Borntraeger { "inject_virtio", VM_STAT(inject_virtio) }, 112a37cb07aSChristian Borntraeger { "instruction_epsw", VCPU_STAT(instruction_epsw) }, 113a37cb07aSChristian Borntraeger { "instruction_gs", VCPU_STAT(instruction_gs) }, 114a37cb07aSChristian Borntraeger { "instruction_io_other", VCPU_STAT(instruction_io_other) }, 115a37cb07aSChristian Borntraeger { "instruction_lpsw", VCPU_STAT(instruction_lpsw) }, 116a37cb07aSChristian Borntraeger { "instruction_lpswe", VCPU_STAT(instruction_lpswe) }, 11769d0d3a3SChristian Borntraeger { "instruction_pfmf", VCPU_STAT(instruction_pfmf) }, 118a37cb07aSChristian Borntraeger { "instruction_ptff", VCPU_STAT(instruction_ptff) }, 119453423dcSChristian Borntraeger { "instruction_stidp", VCPU_STAT(instruction_stidp) }, 120a37cb07aSChristian Borntraeger { "instruction_sck", VCPU_STAT(instruction_sck) }, 121a37cb07aSChristian Borntraeger { "instruction_sckpf", VCPU_STAT(instruction_sckpf) }, 122453423dcSChristian Borntraeger { "instruction_spx", VCPU_STAT(instruction_spx) }, 123453423dcSChristian Borntraeger { "instruction_stpx", VCPU_STAT(instruction_stpx) }, 124453423dcSChristian Borntraeger { "instruction_stap", VCPU_STAT(instruction_stap) }, 125a37cb07aSChristian Borntraeger { "instruction_iske", VCPU_STAT(instruction_iske) }, 126a37cb07aSChristian Borntraeger { "instruction_ri", VCPU_STAT(instruction_ri) }, 127a37cb07aSChristian Borntraeger { "instruction_rrbe", VCPU_STAT(instruction_rrbe) }, 128a37cb07aSChristian Borntraeger { "instruction_sske", VCPU_STAT(instruction_sske) }, 1298a242234SHeiko Carstens { "instruction_ipte_interlock", VCPU_STAT(instruction_ipte_interlock) }, 130b31288faSKonstantin Weitz { "instruction_essa", VCPU_STAT(instruction_essa) }, 131453423dcSChristian Borntraeger { "instruction_stsi", VCPU_STAT(instruction_stsi) }, 132453423dcSChristian Borntraeger { "instruction_stfl", VCPU_STAT(instruction_stfl) }, 133a37cb07aSChristian Borntraeger { "instruction_tb", VCPU_STAT(instruction_tb) }, 134a37cb07aSChristian Borntraeger { "instruction_tpi", VCPU_STAT(instruction_tpi) }, 135bb25b9baSChristian Borntraeger { "instruction_tprot", VCPU_STAT(instruction_tprot) }, 136a37cb07aSChristian Borntraeger { "instruction_tsch", VCPU_STAT(instruction_tsch) }, 13795ca2cb5SJanosch Frank { "instruction_sthyi", VCPU_STAT(instruction_sthyi) }, 138a3508fbeSDavid Hildenbrand { "instruction_sie", VCPU_STAT(instruction_sie) }, 1395288fbf0SChristian Borntraeger { "instruction_sigp_sense", VCPU_STAT(instruction_sigp_sense) }, 140bd59d3a4SCornelia Huck { "instruction_sigp_sense_running", VCPU_STAT(instruction_sigp_sense_running) }, 1417697e71fSChristian Ehrhardt { "instruction_sigp_external_call", VCPU_STAT(instruction_sigp_external_call) }, 1425288fbf0SChristian Borntraeger { "instruction_sigp_emergency", VCPU_STAT(instruction_sigp_emergency) }, 14342cb0c9fSDavid Hildenbrand { "instruction_sigp_cond_emergency", VCPU_STAT(instruction_sigp_cond_emergency) }, 14442cb0c9fSDavid Hildenbrand { "instruction_sigp_start", VCPU_STAT(instruction_sigp_start) }, 1455288fbf0SChristian Borntraeger { "instruction_sigp_stop", VCPU_STAT(instruction_sigp_stop) }, 14642cb0c9fSDavid Hildenbrand { "instruction_sigp_stop_store_status", VCPU_STAT(instruction_sigp_stop_store_status) }, 14742cb0c9fSDavid Hildenbrand { "instruction_sigp_store_status", VCPU_STAT(instruction_sigp_store_status) }, 148cd7b4b61SEric Farman { "instruction_sigp_store_adtl_status", VCPU_STAT(instruction_sigp_store_adtl_status) }, 1495288fbf0SChristian Borntraeger { "instruction_sigp_set_arch", VCPU_STAT(instruction_sigp_arch) }, 1505288fbf0SChristian Borntraeger { "instruction_sigp_set_prefix", VCPU_STAT(instruction_sigp_prefix) }, 1515288fbf0SChristian Borntraeger { "instruction_sigp_restart", VCPU_STAT(instruction_sigp_restart) }, 15242cb0c9fSDavid Hildenbrand { "instruction_sigp_cpu_reset", VCPU_STAT(instruction_sigp_cpu_reset) }, 15342cb0c9fSDavid Hildenbrand { "instruction_sigp_init_cpu_reset", VCPU_STAT(instruction_sigp_init_cpu_reset) }, 15442cb0c9fSDavid Hildenbrand { "instruction_sigp_unknown", VCPU_STAT(instruction_sigp_unknown) }, 155866c138cSChristian Borntraeger { "instruction_diag_10", VCPU_STAT(diagnose_10) }, 156866c138cSChristian Borntraeger { "instruction_diag_44", VCPU_STAT(diagnose_44) }, 157866c138cSChristian Borntraeger { "instruction_diag_9c", VCPU_STAT(diagnose_9c) }, 158866c138cSChristian Borntraeger { "instruction_diag_258", VCPU_STAT(diagnose_258) }, 159866c138cSChristian Borntraeger { "instruction_diag_308", VCPU_STAT(diagnose_308) }, 160866c138cSChristian Borntraeger { "instruction_diag_500", VCPU_STAT(diagnose_500) }, 161a37cb07aSChristian Borntraeger { "instruction_diag_other", VCPU_STAT(diagnose_other) }, 162b0c632dbSHeiko Carstens { NULL } 163b0c632dbSHeiko Carstens }; 164b0c632dbSHeiko Carstens 1658fa1696eSCollin L. Walling struct kvm_s390_tod_clock_ext { 1668fa1696eSCollin L. Walling __u8 epoch_idx; 1678fa1696eSCollin L. Walling __u64 tod; 1688fa1696eSCollin L. Walling __u8 reserved[7]; 1698fa1696eSCollin L. Walling } __packed; 1708fa1696eSCollin L. Walling 171a411edf1SDavid Hildenbrand /* allow nested virtualization in KVM (if enabled by user space) */ 172a411edf1SDavid Hildenbrand static int nested; 173a411edf1SDavid Hildenbrand module_param(nested, int, S_IRUGO); 174a411edf1SDavid Hildenbrand MODULE_PARM_DESC(nested, "Nested virtualization support"); 175a411edf1SDavid Hildenbrand 176a4499382SJanosch Frank /* allow 1m huge page guest backing, if !nested */ 177a4499382SJanosch Frank static int hpage; 178a4499382SJanosch Frank module_param(hpage, int, 0444); 179a4499382SJanosch Frank MODULE_PARM_DESC(hpage, "1m huge page backing support"); 180b0c632dbSHeiko Carstens 181c3b9e3e1SChristian Borntraeger /* 182c3b9e3e1SChristian Borntraeger * For now we handle at most 16 double words as this is what the s390 base 183c3b9e3e1SChristian Borntraeger * kernel handles and stores in the prefix page. If we ever need to go beyond 184c3b9e3e1SChristian Borntraeger * this, this requires changes to code, but the external uapi can stay. 185c3b9e3e1SChristian Borntraeger */ 186c3b9e3e1SChristian Borntraeger #define SIZE_INTERNAL 16 187c3b9e3e1SChristian Borntraeger 188c3b9e3e1SChristian Borntraeger /* 189c3b9e3e1SChristian Borntraeger * Base feature mask that defines default mask for facilities. Consists of the 190c3b9e3e1SChristian Borntraeger * defines in FACILITIES_KVM and the non-hypervisor managed bits. 191c3b9e3e1SChristian Borntraeger */ 192c3b9e3e1SChristian Borntraeger static unsigned long kvm_s390_fac_base[SIZE_INTERNAL] = { FACILITIES_KVM }; 193c3b9e3e1SChristian Borntraeger /* 194c3b9e3e1SChristian Borntraeger * Extended feature mask. Consists of the defines in FACILITIES_KVM_CPUMODEL 195c3b9e3e1SChristian Borntraeger * and defines the facilities that can be enabled via a cpu model. 196c3b9e3e1SChristian Borntraeger */ 197c3b9e3e1SChristian Borntraeger static unsigned long kvm_s390_fac_ext[SIZE_INTERNAL] = { FACILITIES_KVM_CPUMODEL }; 198c3b9e3e1SChristian Borntraeger 199c3b9e3e1SChristian Borntraeger static unsigned long kvm_s390_fac_size(void) 20078c4b59fSMichael Mueller { 201c3b9e3e1SChristian Borntraeger BUILD_BUG_ON(SIZE_INTERNAL > S390_ARCH_FAC_MASK_SIZE_U64); 202c3b9e3e1SChristian Borntraeger BUILD_BUG_ON(SIZE_INTERNAL > S390_ARCH_FAC_LIST_SIZE_U64); 203c3b9e3e1SChristian Borntraeger BUILD_BUG_ON(SIZE_INTERNAL * sizeof(unsigned long) > 204c3b9e3e1SChristian Borntraeger sizeof(S390_lowcore.stfle_fac_list)); 205c3b9e3e1SChristian Borntraeger 206c3b9e3e1SChristian Borntraeger return SIZE_INTERNAL; 20778c4b59fSMichael Mueller } 20878c4b59fSMichael Mueller 20915c9705fSDavid Hildenbrand /* available cpu features supported by kvm */ 21015c9705fSDavid Hildenbrand static DECLARE_BITMAP(kvm_s390_available_cpu_feat, KVM_S390_VM_CPU_FEAT_NR_BITS); 2110a763c78SDavid Hildenbrand /* available subfunctions indicated via query / "test bit" */ 2120a763c78SDavid Hildenbrand static struct kvm_s390_vm_cpu_subfunc kvm_s390_available_subfunc; 21315c9705fSDavid Hildenbrand 2149d8d5786SMichael Mueller static struct gmap_notifier gmap_notifier; 215a3508fbeSDavid Hildenbrand static struct gmap_notifier vsie_gmap_notifier; 21678f26131SChristian Borntraeger debug_info_t *kvm_s390_dbf; 2179d8d5786SMichael Mueller 218b0c632dbSHeiko Carstens /* Section: not file related */ 21913a34e06SRadim Krčmář int kvm_arch_hardware_enable(void) 220b0c632dbSHeiko Carstens { 221b0c632dbSHeiko Carstens /* every s390 is virtualization enabled ;-) */ 22210474ae8SAlexander Graf return 0; 223b0c632dbSHeiko Carstens } 224b0c632dbSHeiko Carstens 225414d3b07SMartin Schwidefsky static void kvm_gmap_notifier(struct gmap *gmap, unsigned long start, 226414d3b07SMartin Schwidefsky unsigned long end); 2272c70fe44SChristian Borntraeger 2281575767eSDavid Hildenbrand static void kvm_clock_sync_scb(struct kvm_s390_sie_block *scb, u64 delta) 2291575767eSDavid Hildenbrand { 2301575767eSDavid Hildenbrand u8 delta_idx = 0; 2311575767eSDavid Hildenbrand 2321575767eSDavid Hildenbrand /* 2331575767eSDavid Hildenbrand * The TOD jumps by delta, we have to compensate this by adding 2341575767eSDavid Hildenbrand * -delta to the epoch. 2351575767eSDavid Hildenbrand */ 2361575767eSDavid Hildenbrand delta = -delta; 2371575767eSDavid Hildenbrand 2381575767eSDavid Hildenbrand /* sign-extension - we're adding to signed values below */ 2391575767eSDavid Hildenbrand if ((s64)delta < 0) 2401575767eSDavid Hildenbrand delta_idx = -1; 2411575767eSDavid Hildenbrand 2421575767eSDavid Hildenbrand scb->epoch += delta; 2431575767eSDavid Hildenbrand if (scb->ecd & ECD_MEF) { 2441575767eSDavid Hildenbrand scb->epdx += delta_idx; 2451575767eSDavid Hildenbrand if (scb->epoch < delta) 2461575767eSDavid Hildenbrand scb->epdx += 1; 2471575767eSDavid Hildenbrand } 2481575767eSDavid Hildenbrand } 2491575767eSDavid Hildenbrand 250fdf03650SFan Zhang /* 251fdf03650SFan Zhang * This callback is executed during stop_machine(). All CPUs are therefore 252fdf03650SFan Zhang * temporarily stopped. In order not to change guest behavior, we have to 253fdf03650SFan Zhang * disable preemption whenever we touch the epoch of kvm and the VCPUs, 254fdf03650SFan Zhang * so a CPU won't be stopped while calculating with the epoch. 255fdf03650SFan Zhang */ 256fdf03650SFan Zhang static int kvm_clock_sync(struct notifier_block *notifier, unsigned long val, 257fdf03650SFan Zhang void *v) 258fdf03650SFan Zhang { 259fdf03650SFan Zhang struct kvm *kvm; 260fdf03650SFan Zhang struct kvm_vcpu *vcpu; 261fdf03650SFan Zhang int i; 262fdf03650SFan Zhang unsigned long long *delta = v; 263fdf03650SFan Zhang 264fdf03650SFan Zhang list_for_each_entry(kvm, &vm_list, vm_list) { 265fdf03650SFan Zhang kvm_for_each_vcpu(i, vcpu, kvm) { 2661575767eSDavid Hildenbrand kvm_clock_sync_scb(vcpu->arch.sie_block, *delta); 2671575767eSDavid Hildenbrand if (i == 0) { 2681575767eSDavid Hildenbrand kvm->arch.epoch = vcpu->arch.sie_block->epoch; 2691575767eSDavid Hildenbrand kvm->arch.epdx = vcpu->arch.sie_block->epdx; 2701575767eSDavid Hildenbrand } 271db0758b2SDavid Hildenbrand if (vcpu->arch.cputm_enabled) 272db0758b2SDavid Hildenbrand vcpu->arch.cputm_start += *delta; 27391473b48SDavid Hildenbrand if (vcpu->arch.vsie_block) 2741575767eSDavid Hildenbrand kvm_clock_sync_scb(vcpu->arch.vsie_block, 2751575767eSDavid Hildenbrand *delta); 276fdf03650SFan Zhang } 277fdf03650SFan Zhang } 278fdf03650SFan Zhang return NOTIFY_OK; 279fdf03650SFan Zhang } 280fdf03650SFan Zhang 281fdf03650SFan Zhang static struct notifier_block kvm_clock_notifier = { 282fdf03650SFan Zhang .notifier_call = kvm_clock_sync, 283fdf03650SFan Zhang }; 284fdf03650SFan Zhang 285b0c632dbSHeiko Carstens int kvm_arch_hardware_setup(void) 286b0c632dbSHeiko Carstens { 2872c70fe44SChristian Borntraeger gmap_notifier.notifier_call = kvm_gmap_notifier; 288b2d73b2aSMartin Schwidefsky gmap_register_pte_notifier(&gmap_notifier); 289a3508fbeSDavid Hildenbrand vsie_gmap_notifier.notifier_call = kvm_s390_vsie_gmap_notifier; 290a3508fbeSDavid Hildenbrand gmap_register_pte_notifier(&vsie_gmap_notifier); 291fdf03650SFan Zhang atomic_notifier_chain_register(&s390_epoch_delta_notifier, 292fdf03650SFan Zhang &kvm_clock_notifier); 293b0c632dbSHeiko Carstens return 0; 294b0c632dbSHeiko Carstens } 295b0c632dbSHeiko Carstens 296b0c632dbSHeiko Carstens void kvm_arch_hardware_unsetup(void) 297b0c632dbSHeiko Carstens { 298b2d73b2aSMartin Schwidefsky gmap_unregister_pte_notifier(&gmap_notifier); 299a3508fbeSDavid Hildenbrand gmap_unregister_pte_notifier(&vsie_gmap_notifier); 300fdf03650SFan Zhang atomic_notifier_chain_unregister(&s390_epoch_delta_notifier, 301fdf03650SFan Zhang &kvm_clock_notifier); 302b0c632dbSHeiko Carstens } 303b0c632dbSHeiko Carstens 30422be5a13SDavid Hildenbrand static void allow_cpu_feat(unsigned long nr) 30522be5a13SDavid Hildenbrand { 30622be5a13SDavid Hildenbrand set_bit_inv(nr, kvm_s390_available_cpu_feat); 30722be5a13SDavid Hildenbrand } 30822be5a13SDavid Hildenbrand 3090a763c78SDavid Hildenbrand static inline int plo_test_bit(unsigned char nr) 3100a763c78SDavid Hildenbrand { 3110a763c78SDavid Hildenbrand register unsigned long r0 asm("0") = (unsigned long) nr | 0x100; 312d051ae53SHeiko Carstens int cc; 3130a763c78SDavid Hildenbrand 3140a763c78SDavid Hildenbrand asm volatile( 3150a763c78SDavid Hildenbrand /* Parameter registers are ignored for "test bit" */ 3160a763c78SDavid Hildenbrand " plo 0,0,0,0(0)\n" 3170a763c78SDavid Hildenbrand " ipm %0\n" 3180a763c78SDavid Hildenbrand " srl %0,28\n" 3190a763c78SDavid Hildenbrand : "=d" (cc) 3200a763c78SDavid Hildenbrand : "d" (r0) 3210a763c78SDavid Hildenbrand : "cc"); 3220a763c78SDavid Hildenbrand return cc == 0; 3230a763c78SDavid Hildenbrand } 3240a763c78SDavid Hildenbrand 32522be5a13SDavid Hildenbrand static void kvm_s390_cpu_feat_init(void) 32622be5a13SDavid Hildenbrand { 3270a763c78SDavid Hildenbrand int i; 3280a763c78SDavid Hildenbrand 3290a763c78SDavid Hildenbrand for (i = 0; i < 256; ++i) { 3300a763c78SDavid Hildenbrand if (plo_test_bit(i)) 3310a763c78SDavid Hildenbrand kvm_s390_available_subfunc.plo[i >> 3] |= 0x80 >> (i & 7); 3320a763c78SDavid Hildenbrand } 3330a763c78SDavid Hildenbrand 3340a763c78SDavid Hildenbrand if (test_facility(28)) /* TOD-clock steering */ 335221bb8a4SLinus Torvalds ptff(kvm_s390_available_subfunc.ptff, 336221bb8a4SLinus Torvalds sizeof(kvm_s390_available_subfunc.ptff), 337221bb8a4SLinus Torvalds PTFF_QAF); 3380a763c78SDavid Hildenbrand 3390a763c78SDavid Hildenbrand if (test_facility(17)) { /* MSA */ 34069c0e360SMartin Schwidefsky __cpacf_query(CPACF_KMAC, (cpacf_mask_t *) 34169c0e360SMartin Schwidefsky kvm_s390_available_subfunc.kmac); 34269c0e360SMartin Schwidefsky __cpacf_query(CPACF_KMC, (cpacf_mask_t *) 34369c0e360SMartin Schwidefsky kvm_s390_available_subfunc.kmc); 34469c0e360SMartin Schwidefsky __cpacf_query(CPACF_KM, (cpacf_mask_t *) 34569c0e360SMartin Schwidefsky kvm_s390_available_subfunc.km); 34669c0e360SMartin Schwidefsky __cpacf_query(CPACF_KIMD, (cpacf_mask_t *) 34769c0e360SMartin Schwidefsky kvm_s390_available_subfunc.kimd); 34869c0e360SMartin Schwidefsky __cpacf_query(CPACF_KLMD, (cpacf_mask_t *) 34969c0e360SMartin Schwidefsky kvm_s390_available_subfunc.klmd); 3500a763c78SDavid Hildenbrand } 3510a763c78SDavid Hildenbrand if (test_facility(76)) /* MSA3 */ 35269c0e360SMartin Schwidefsky __cpacf_query(CPACF_PCKMO, (cpacf_mask_t *) 35369c0e360SMartin Schwidefsky kvm_s390_available_subfunc.pckmo); 3540a763c78SDavid Hildenbrand if (test_facility(77)) { /* MSA4 */ 35569c0e360SMartin Schwidefsky __cpacf_query(CPACF_KMCTR, (cpacf_mask_t *) 35669c0e360SMartin Schwidefsky kvm_s390_available_subfunc.kmctr); 35769c0e360SMartin Schwidefsky __cpacf_query(CPACF_KMF, (cpacf_mask_t *) 35869c0e360SMartin Schwidefsky kvm_s390_available_subfunc.kmf); 35969c0e360SMartin Schwidefsky __cpacf_query(CPACF_KMO, (cpacf_mask_t *) 36069c0e360SMartin Schwidefsky kvm_s390_available_subfunc.kmo); 36169c0e360SMartin Schwidefsky __cpacf_query(CPACF_PCC, (cpacf_mask_t *) 36269c0e360SMartin Schwidefsky kvm_s390_available_subfunc.pcc); 3630a763c78SDavid Hildenbrand } 3640a763c78SDavid Hildenbrand if (test_facility(57)) /* MSA5 */ 365985a9d20SHarald Freudenberger __cpacf_query(CPACF_PRNO, (cpacf_mask_t *) 36669c0e360SMartin Schwidefsky kvm_s390_available_subfunc.ppno); 3670a763c78SDavid Hildenbrand 368e000b8e0SJason J. Herne if (test_facility(146)) /* MSA8 */ 369e000b8e0SJason J. Herne __cpacf_query(CPACF_KMA, (cpacf_mask_t *) 370e000b8e0SJason J. Herne kvm_s390_available_subfunc.kma); 371e000b8e0SJason J. Herne 37222be5a13SDavid Hildenbrand if (MACHINE_HAS_ESOP) 37322be5a13SDavid Hildenbrand allow_cpu_feat(KVM_S390_VM_CPU_FEAT_ESOP); 374a3508fbeSDavid Hildenbrand /* 375a3508fbeSDavid Hildenbrand * We need SIE support, ESOP (PROT_READ protection for gmap_shadow), 376a3508fbeSDavid Hildenbrand * 64bit SCAO (SCA passthrough) and IDTE (for gmap_shadow unshadowing). 377a3508fbeSDavid Hildenbrand */ 378a3508fbeSDavid Hildenbrand if (!sclp.has_sief2 || !MACHINE_HAS_ESOP || !sclp.has_64bscao || 379a411edf1SDavid Hildenbrand !test_facility(3) || !nested) 380a3508fbeSDavid Hildenbrand return; 381a3508fbeSDavid Hildenbrand allow_cpu_feat(KVM_S390_VM_CPU_FEAT_SIEF2); 38219c439b5SDavid Hildenbrand if (sclp.has_64bscao) 38319c439b5SDavid Hildenbrand allow_cpu_feat(KVM_S390_VM_CPU_FEAT_64BSCAO); 3840615a326SDavid Hildenbrand if (sclp.has_siif) 3850615a326SDavid Hildenbrand allow_cpu_feat(KVM_S390_VM_CPU_FEAT_SIIF); 38677d18f6dSDavid Hildenbrand if (sclp.has_gpere) 38777d18f6dSDavid Hildenbrand allow_cpu_feat(KVM_S390_VM_CPU_FEAT_GPERE); 388a1b7b9b2SDavid Hildenbrand if (sclp.has_gsls) 389a1b7b9b2SDavid Hildenbrand allow_cpu_feat(KVM_S390_VM_CPU_FEAT_GSLS); 3905630a8e8SDavid Hildenbrand if (sclp.has_ib) 3915630a8e8SDavid Hildenbrand allow_cpu_feat(KVM_S390_VM_CPU_FEAT_IB); 39213ee3f67SDavid Hildenbrand if (sclp.has_cei) 39313ee3f67SDavid Hildenbrand allow_cpu_feat(KVM_S390_VM_CPU_FEAT_CEI); 3947fd7f39dSDavid Hildenbrand if (sclp.has_ibs) 3957fd7f39dSDavid Hildenbrand allow_cpu_feat(KVM_S390_VM_CPU_FEAT_IBS); 396730cd632SFarhan Ali if (sclp.has_kss) 397730cd632SFarhan Ali allow_cpu_feat(KVM_S390_VM_CPU_FEAT_KSS); 3985d3876a8SDavid Hildenbrand /* 3995d3876a8SDavid Hildenbrand * KVM_S390_VM_CPU_FEAT_SKEY: Wrong shadow of PTE.I bits will make 4005d3876a8SDavid Hildenbrand * all skey handling functions read/set the skey from the PGSTE 4015d3876a8SDavid Hildenbrand * instead of the real storage key. 4025d3876a8SDavid Hildenbrand * 4035d3876a8SDavid Hildenbrand * KVM_S390_VM_CPU_FEAT_CMMA: Wrong shadow of PTE.I bits will make 4045d3876a8SDavid Hildenbrand * pages being detected as preserved although they are resident. 4055d3876a8SDavid Hildenbrand * 4065d3876a8SDavid Hildenbrand * KVM_S390_VM_CPU_FEAT_PFMFI: Wrong shadow of PTE.I bits will 4075d3876a8SDavid Hildenbrand * have the same effect as for KVM_S390_VM_CPU_FEAT_SKEY. 4085d3876a8SDavid Hildenbrand * 4095d3876a8SDavid Hildenbrand * For KVM_S390_VM_CPU_FEAT_SKEY, KVM_S390_VM_CPU_FEAT_CMMA and 4105d3876a8SDavid Hildenbrand * KVM_S390_VM_CPU_FEAT_PFMFI, all PTE.I and PGSTE bits have to be 4115d3876a8SDavid Hildenbrand * correctly shadowed. We can do that for the PGSTE but not for PTE.I. 4125d3876a8SDavid Hildenbrand * 4135d3876a8SDavid Hildenbrand * KVM_S390_VM_CPU_FEAT_SIGPIF: Wrong SCB addresses in the SCA. We 4145d3876a8SDavid Hildenbrand * cannot easily shadow the SCA because of the ipte lock. 4155d3876a8SDavid Hildenbrand */ 41622be5a13SDavid Hildenbrand } 41722be5a13SDavid Hildenbrand 418b0c632dbSHeiko Carstens int kvm_arch_init(void *opaque) 419b0c632dbSHeiko Carstens { 42078f26131SChristian Borntraeger kvm_s390_dbf = debug_register("kvm-trace", 32, 1, 7 * sizeof(long)); 42178f26131SChristian Borntraeger if (!kvm_s390_dbf) 42278f26131SChristian Borntraeger return -ENOMEM; 42378f26131SChristian Borntraeger 42478f26131SChristian Borntraeger if (debug_register_view(kvm_s390_dbf, &debug_sprintf_view)) { 42578f26131SChristian Borntraeger debug_unregister(kvm_s390_dbf); 42678f26131SChristian Borntraeger return -ENOMEM; 42778f26131SChristian Borntraeger } 42878f26131SChristian Borntraeger 42922be5a13SDavid Hildenbrand kvm_s390_cpu_feat_init(); 43022be5a13SDavid Hildenbrand 43184877d93SCornelia Huck /* Register floating interrupt controller interface. */ 43284877d93SCornelia Huck return kvm_register_device_ops(&kvm_flic_ops, KVM_DEV_TYPE_FLIC); 433b0c632dbSHeiko Carstens } 434b0c632dbSHeiko Carstens 43578f26131SChristian Borntraeger void kvm_arch_exit(void) 43678f26131SChristian Borntraeger { 43778f26131SChristian Borntraeger debug_unregister(kvm_s390_dbf); 43878f26131SChristian Borntraeger } 43978f26131SChristian Borntraeger 440b0c632dbSHeiko Carstens /* Section: device related */ 441b0c632dbSHeiko Carstens long kvm_arch_dev_ioctl(struct file *filp, 442b0c632dbSHeiko Carstens unsigned int ioctl, unsigned long arg) 443b0c632dbSHeiko Carstens { 444b0c632dbSHeiko Carstens if (ioctl == KVM_S390_ENABLE_SIE) 445b0c632dbSHeiko Carstens return s390_enable_sie(); 446b0c632dbSHeiko Carstens return -EINVAL; 447b0c632dbSHeiko Carstens } 448b0c632dbSHeiko Carstens 449784aa3d7SAlexander Graf int kvm_vm_ioctl_check_extension(struct kvm *kvm, long ext) 450b0c632dbSHeiko Carstens { 451d7b0b5ebSCarsten Otte int r; 452d7b0b5ebSCarsten Otte 4532bd0ac4eSCarsten Otte switch (ext) { 454d7b0b5ebSCarsten Otte case KVM_CAP_S390_PSW: 455b6cf8788SChristian Borntraeger case KVM_CAP_S390_GMAP: 45652e16b18SChristian Borntraeger case KVM_CAP_SYNC_MMU: 4571efd0f59SCarsten Otte #ifdef CONFIG_KVM_S390_UCONTROL 4581efd0f59SCarsten Otte case KVM_CAP_S390_UCONTROL: 4591efd0f59SCarsten Otte #endif 4603c038e6bSDominik Dingel case KVM_CAP_ASYNC_PF: 46160b413c9SChristian Borntraeger case KVM_CAP_SYNC_REGS: 46214eebd91SCarsten Otte case KVM_CAP_ONE_REG: 463d6712df9SCornelia Huck case KVM_CAP_ENABLE_CAP: 464fa6b7fe9SCornelia Huck case KVM_CAP_S390_CSS_SUPPORT: 46510ccaa1eSCornelia Huck case KVM_CAP_IOEVENTFD: 466c05c4186SJens Freimann case KVM_CAP_DEVICE_CTRL: 467d938dc55SCornelia Huck case KVM_CAP_ENABLE_CAP_VM: 46878599d90SCornelia Huck case KVM_CAP_S390_IRQCHIP: 469f2061656SDominik Dingel case KVM_CAP_VM_ATTRIBUTES: 4706352e4d2SDavid Hildenbrand case KVM_CAP_MP_STATE: 471460df4c1SPaolo Bonzini case KVM_CAP_IMMEDIATE_EXIT: 47247b43c52SJens Freimann case KVM_CAP_S390_INJECT_IRQ: 4732444b352SDavid Hildenbrand case KVM_CAP_S390_USER_SIGP: 474e44fc8c9SEkaterina Tumanova case KVM_CAP_S390_USER_STSI: 47530ee2a98SJason J. Herne case KVM_CAP_S390_SKEYS: 476816c7667SJens Freimann case KVM_CAP_S390_IRQ_STATE: 4776502a34cSDavid Hildenbrand case KVM_CAP_S390_USER_INSTR0: 4784036e387SClaudio Imbrenda case KVM_CAP_S390_CMMA_MIGRATION: 47947a4693eSYi Min Zhao case KVM_CAP_S390_AIS: 480da9a1446SChristian Borntraeger case KVM_CAP_S390_AIS_MIGRATION: 481d7b0b5ebSCarsten Otte r = 1; 482d7b0b5ebSCarsten Otte break; 483a4499382SJanosch Frank case KVM_CAP_S390_HPAGE_1M: 484a4499382SJanosch Frank r = 0; 485a4499382SJanosch Frank if (hpage) 486a4499382SJanosch Frank r = 1; 487a4499382SJanosch Frank break; 48841408c28SThomas Huth case KVM_CAP_S390_MEM_OP: 48941408c28SThomas Huth r = MEM_OP_MAX_SIZE; 49041408c28SThomas Huth break; 491e726b1bdSChristian Borntraeger case KVM_CAP_NR_VCPUS: 492e726b1bdSChristian Borntraeger case KVM_CAP_MAX_VCPUS: 49376a6dd72SDavid Hildenbrand r = KVM_S390_BSCA_CPU_SLOTS; 494a6940674SDavid Hildenbrand if (!kvm_s390_use_sca_entries()) 495a6940674SDavid Hildenbrand r = KVM_MAX_VCPUS; 496a6940674SDavid Hildenbrand else if (sclp.has_esca && sclp.has_64bscao) 49776a6dd72SDavid Hildenbrand r = KVM_S390_ESCA_CPU_SLOTS; 498e726b1bdSChristian Borntraeger break; 499e1e2e605SNick Wang case KVM_CAP_NR_MEMSLOTS: 500e1e2e605SNick Wang r = KVM_USER_MEM_SLOTS; 501e1e2e605SNick Wang break; 5021526bf9cSChristian Borntraeger case KVM_CAP_S390_COW: 503abf09bedSMartin Schwidefsky r = MACHINE_HAS_ESOP; 5041526bf9cSChristian Borntraeger break; 50568c55750SEric Farman case KVM_CAP_S390_VECTOR_REGISTERS: 50668c55750SEric Farman r = MACHINE_HAS_VX; 50768c55750SEric Farman break; 508c6e5f166SFan Zhang case KVM_CAP_S390_RI: 509c6e5f166SFan Zhang r = test_facility(64); 510c6e5f166SFan Zhang break; 5114e0b1ab7SFan Zhang case KVM_CAP_S390_GS: 5124e0b1ab7SFan Zhang r = test_facility(133); 5134e0b1ab7SFan Zhang break; 51435b3fde6SChristian Borntraeger case KVM_CAP_S390_BPB: 51535b3fde6SChristian Borntraeger r = test_facility(82); 51635b3fde6SChristian Borntraeger break; 5172bd0ac4eSCarsten Otte default: 518d7b0b5ebSCarsten Otte r = 0; 519b0c632dbSHeiko Carstens } 520d7b0b5ebSCarsten Otte return r; 5212bd0ac4eSCarsten Otte } 522b0c632dbSHeiko Carstens 52315f36ebdSJason J. Herne static void kvm_s390_sync_dirty_log(struct kvm *kvm, 52415f36ebdSJason J. Herne struct kvm_memory_slot *memslot) 52515f36ebdSJason J. Herne { 5260959e168SJanosch Frank int i; 52715f36ebdSJason J. Herne gfn_t cur_gfn, last_gfn; 5280959e168SJanosch Frank unsigned long gaddr, vmaddr; 52915f36ebdSJason J. Herne struct gmap *gmap = kvm->arch.gmap; 5300959e168SJanosch Frank DECLARE_BITMAP(bitmap, _PAGE_ENTRIES); 53115f36ebdSJason J. Herne 5320959e168SJanosch Frank /* Loop over all guest segments */ 5330959e168SJanosch Frank cur_gfn = memslot->base_gfn; 53415f36ebdSJason J. Herne last_gfn = memslot->base_gfn + memslot->npages; 5350959e168SJanosch Frank for (; cur_gfn <= last_gfn; cur_gfn += _PAGE_ENTRIES) { 5360959e168SJanosch Frank gaddr = gfn_to_gpa(cur_gfn); 5370959e168SJanosch Frank vmaddr = gfn_to_hva_memslot(memslot, cur_gfn); 5380959e168SJanosch Frank if (kvm_is_error_hva(vmaddr)) 5390959e168SJanosch Frank continue; 54015f36ebdSJason J. Herne 5410959e168SJanosch Frank bitmap_zero(bitmap, _PAGE_ENTRIES); 5420959e168SJanosch Frank gmap_sync_dirty_log_pmd(gmap, bitmap, gaddr, vmaddr); 5430959e168SJanosch Frank for (i = 0; i < _PAGE_ENTRIES; i++) { 5440959e168SJanosch Frank if (test_bit(i, bitmap)) 5450959e168SJanosch Frank mark_page_dirty(kvm, cur_gfn + i); 5460959e168SJanosch Frank } 5470959e168SJanosch Frank 5481763f8d0SChristian Borntraeger if (fatal_signal_pending(current)) 5491763f8d0SChristian Borntraeger return; 55070c88a00SChristian Borntraeger cond_resched(); 55115f36ebdSJason J. Herne } 55215f36ebdSJason J. Herne } 55315f36ebdSJason J. Herne 554b0c632dbSHeiko Carstens /* Section: vm related */ 555a6e2f683SEugene (jno) Dvurechenski static void sca_del_vcpu(struct kvm_vcpu *vcpu); 556a6e2f683SEugene (jno) Dvurechenski 557b0c632dbSHeiko Carstens /* 558b0c632dbSHeiko Carstens * Get (and clear) the dirty memory log for a memory slot. 559b0c632dbSHeiko Carstens */ 560b0c632dbSHeiko Carstens int kvm_vm_ioctl_get_dirty_log(struct kvm *kvm, 561b0c632dbSHeiko Carstens struct kvm_dirty_log *log) 562b0c632dbSHeiko Carstens { 56315f36ebdSJason J. Herne int r; 56415f36ebdSJason J. Herne unsigned long n; 5659f6b8029SPaolo Bonzini struct kvm_memslots *slots; 56615f36ebdSJason J. Herne struct kvm_memory_slot *memslot; 56715f36ebdSJason J. Herne int is_dirty = 0; 56815f36ebdSJason J. Herne 569e1e8a962SJanosch Frank if (kvm_is_ucontrol(kvm)) 570e1e8a962SJanosch Frank return -EINVAL; 571e1e8a962SJanosch Frank 57215f36ebdSJason J. Herne mutex_lock(&kvm->slots_lock); 57315f36ebdSJason J. Herne 57415f36ebdSJason J. Herne r = -EINVAL; 57515f36ebdSJason J. Herne if (log->slot >= KVM_USER_MEM_SLOTS) 57615f36ebdSJason J. Herne goto out; 57715f36ebdSJason J. Herne 5789f6b8029SPaolo Bonzini slots = kvm_memslots(kvm); 5799f6b8029SPaolo Bonzini memslot = id_to_memslot(slots, log->slot); 58015f36ebdSJason J. Herne r = -ENOENT; 58115f36ebdSJason J. Herne if (!memslot->dirty_bitmap) 58215f36ebdSJason J. Herne goto out; 58315f36ebdSJason J. Herne 58415f36ebdSJason J. Herne kvm_s390_sync_dirty_log(kvm, memslot); 58515f36ebdSJason J. Herne r = kvm_get_dirty_log(kvm, log, &is_dirty); 58615f36ebdSJason J. Herne if (r) 58715f36ebdSJason J. Herne goto out; 58815f36ebdSJason J. Herne 58915f36ebdSJason J. Herne /* Clear the dirty log */ 59015f36ebdSJason J. Herne if (is_dirty) { 59115f36ebdSJason J. Herne n = kvm_dirty_bitmap_bytes(memslot); 59215f36ebdSJason J. Herne memset(memslot->dirty_bitmap, 0, n); 59315f36ebdSJason J. Herne } 59415f36ebdSJason J. Herne r = 0; 59515f36ebdSJason J. Herne out: 59615f36ebdSJason J. Herne mutex_unlock(&kvm->slots_lock); 59715f36ebdSJason J. Herne return r; 598b0c632dbSHeiko Carstens } 599b0c632dbSHeiko Carstens 6006502a34cSDavid Hildenbrand static void icpt_operexc_on_all_vcpus(struct kvm *kvm) 6016502a34cSDavid Hildenbrand { 6026502a34cSDavid Hildenbrand unsigned int i; 6036502a34cSDavid Hildenbrand struct kvm_vcpu *vcpu; 6046502a34cSDavid Hildenbrand 6056502a34cSDavid Hildenbrand kvm_for_each_vcpu(i, vcpu, kvm) { 6066502a34cSDavid Hildenbrand kvm_s390_sync_request(KVM_REQ_ICPT_OPEREXC, vcpu); 6076502a34cSDavid Hildenbrand } 6086502a34cSDavid Hildenbrand } 6096502a34cSDavid Hildenbrand 610d938dc55SCornelia Huck static int kvm_vm_ioctl_enable_cap(struct kvm *kvm, struct kvm_enable_cap *cap) 611d938dc55SCornelia Huck { 612d938dc55SCornelia Huck int r; 613d938dc55SCornelia Huck 614d938dc55SCornelia Huck if (cap->flags) 615d938dc55SCornelia Huck return -EINVAL; 616d938dc55SCornelia Huck 617d938dc55SCornelia Huck switch (cap->cap) { 61884223598SCornelia Huck case KVM_CAP_S390_IRQCHIP: 619c92ea7b9SChristian Borntraeger VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_IRQCHIP"); 62084223598SCornelia Huck kvm->arch.use_irqchip = 1; 62184223598SCornelia Huck r = 0; 62284223598SCornelia Huck break; 6232444b352SDavid Hildenbrand case KVM_CAP_S390_USER_SIGP: 624c92ea7b9SChristian Borntraeger VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_USER_SIGP"); 6252444b352SDavid Hildenbrand kvm->arch.user_sigp = 1; 6262444b352SDavid Hildenbrand r = 0; 6272444b352SDavid Hildenbrand break; 62868c55750SEric Farman case KVM_CAP_S390_VECTOR_REGISTERS: 6295967c17bSDavid Hildenbrand mutex_lock(&kvm->lock); 630a03825bbSPaolo Bonzini if (kvm->created_vcpus) { 6315967c17bSDavid Hildenbrand r = -EBUSY; 6325967c17bSDavid Hildenbrand } else if (MACHINE_HAS_VX) { 633c54f0d6aSDavid Hildenbrand set_kvm_facility(kvm->arch.model.fac_mask, 129); 634c54f0d6aSDavid Hildenbrand set_kvm_facility(kvm->arch.model.fac_list, 129); 6352f87d942SGuenther Hutzl if (test_facility(134)) { 6362f87d942SGuenther Hutzl set_kvm_facility(kvm->arch.model.fac_mask, 134); 6372f87d942SGuenther Hutzl set_kvm_facility(kvm->arch.model.fac_list, 134); 6382f87d942SGuenther Hutzl } 63953743aa7SMaxim Samoylov if (test_facility(135)) { 64053743aa7SMaxim Samoylov set_kvm_facility(kvm->arch.model.fac_mask, 135); 64153743aa7SMaxim Samoylov set_kvm_facility(kvm->arch.model.fac_list, 135); 64253743aa7SMaxim Samoylov } 64318280d8bSMichael Mueller r = 0; 64418280d8bSMichael Mueller } else 64518280d8bSMichael Mueller r = -EINVAL; 6465967c17bSDavid Hildenbrand mutex_unlock(&kvm->lock); 647c92ea7b9SChristian Borntraeger VM_EVENT(kvm, 3, "ENABLE: CAP_S390_VECTOR_REGISTERS %s", 648c92ea7b9SChristian Borntraeger r ? "(not available)" : "(success)"); 64968c55750SEric Farman break; 650c6e5f166SFan Zhang case KVM_CAP_S390_RI: 651c6e5f166SFan Zhang r = -EINVAL; 652c6e5f166SFan Zhang mutex_lock(&kvm->lock); 653a03825bbSPaolo Bonzini if (kvm->created_vcpus) { 654c6e5f166SFan Zhang r = -EBUSY; 655c6e5f166SFan Zhang } else if (test_facility(64)) { 656c54f0d6aSDavid Hildenbrand set_kvm_facility(kvm->arch.model.fac_mask, 64); 657c54f0d6aSDavid Hildenbrand set_kvm_facility(kvm->arch.model.fac_list, 64); 658c6e5f166SFan Zhang r = 0; 659c6e5f166SFan Zhang } 660c6e5f166SFan Zhang mutex_unlock(&kvm->lock); 661c6e5f166SFan Zhang VM_EVENT(kvm, 3, "ENABLE: CAP_S390_RI %s", 662c6e5f166SFan Zhang r ? "(not available)" : "(success)"); 663c6e5f166SFan Zhang break; 66447a4693eSYi Min Zhao case KVM_CAP_S390_AIS: 66547a4693eSYi Min Zhao mutex_lock(&kvm->lock); 66647a4693eSYi Min Zhao if (kvm->created_vcpus) { 66747a4693eSYi Min Zhao r = -EBUSY; 66847a4693eSYi Min Zhao } else { 66947a4693eSYi Min Zhao set_kvm_facility(kvm->arch.model.fac_mask, 72); 67047a4693eSYi Min Zhao set_kvm_facility(kvm->arch.model.fac_list, 72); 67147a4693eSYi Min Zhao r = 0; 67247a4693eSYi Min Zhao } 67347a4693eSYi Min Zhao mutex_unlock(&kvm->lock); 67447a4693eSYi Min Zhao VM_EVENT(kvm, 3, "ENABLE: AIS %s", 67547a4693eSYi Min Zhao r ? "(not available)" : "(success)"); 67647a4693eSYi Min Zhao break; 6774e0b1ab7SFan Zhang case KVM_CAP_S390_GS: 6784e0b1ab7SFan Zhang r = -EINVAL; 6794e0b1ab7SFan Zhang mutex_lock(&kvm->lock); 680241e3ec0SChristian Borntraeger if (kvm->created_vcpus) { 6814e0b1ab7SFan Zhang r = -EBUSY; 6824e0b1ab7SFan Zhang } else if (test_facility(133)) { 6834e0b1ab7SFan Zhang set_kvm_facility(kvm->arch.model.fac_mask, 133); 6844e0b1ab7SFan Zhang set_kvm_facility(kvm->arch.model.fac_list, 133); 6854e0b1ab7SFan Zhang r = 0; 6864e0b1ab7SFan Zhang } 6874e0b1ab7SFan Zhang mutex_unlock(&kvm->lock); 6884e0b1ab7SFan Zhang VM_EVENT(kvm, 3, "ENABLE: CAP_S390_GS %s", 6894e0b1ab7SFan Zhang r ? "(not available)" : "(success)"); 6904e0b1ab7SFan Zhang break; 691a4499382SJanosch Frank case KVM_CAP_S390_HPAGE_1M: 692a4499382SJanosch Frank mutex_lock(&kvm->lock); 693a4499382SJanosch Frank if (kvm->created_vcpus) 694a4499382SJanosch Frank r = -EBUSY; 695a4499382SJanosch Frank else if (!hpage || kvm->arch.use_cmma) 696a4499382SJanosch Frank r = -EINVAL; 697a4499382SJanosch Frank else { 698a4499382SJanosch Frank r = 0; 699df88f318SJanosch Frank down_write(&kvm->mm->mmap_sem); 700a4499382SJanosch Frank kvm->mm->context.allow_gmap_hpage_1m = 1; 701df88f318SJanosch Frank up_write(&kvm->mm->mmap_sem); 702a4499382SJanosch Frank /* 703a4499382SJanosch Frank * We might have to create fake 4k page 704a4499382SJanosch Frank * tables. To avoid that the hardware works on 705a4499382SJanosch Frank * stale PGSTEs, we emulate these instructions. 706a4499382SJanosch Frank */ 707a4499382SJanosch Frank kvm->arch.use_skf = 0; 708a4499382SJanosch Frank kvm->arch.use_pfmfi = 0; 709a4499382SJanosch Frank } 710a4499382SJanosch Frank mutex_unlock(&kvm->lock); 711a4499382SJanosch Frank VM_EVENT(kvm, 3, "ENABLE: CAP_S390_HPAGE %s", 712a4499382SJanosch Frank r ? "(not available)" : "(success)"); 713a4499382SJanosch Frank break; 714e44fc8c9SEkaterina Tumanova case KVM_CAP_S390_USER_STSI: 715c92ea7b9SChristian Borntraeger VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_USER_STSI"); 716e44fc8c9SEkaterina Tumanova kvm->arch.user_stsi = 1; 717e44fc8c9SEkaterina Tumanova r = 0; 718e44fc8c9SEkaterina Tumanova break; 7196502a34cSDavid Hildenbrand case KVM_CAP_S390_USER_INSTR0: 7206502a34cSDavid Hildenbrand VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_USER_INSTR0"); 7216502a34cSDavid Hildenbrand kvm->arch.user_instr0 = 1; 7226502a34cSDavid Hildenbrand icpt_operexc_on_all_vcpus(kvm); 7236502a34cSDavid Hildenbrand r = 0; 7246502a34cSDavid Hildenbrand break; 725d938dc55SCornelia Huck default: 726d938dc55SCornelia Huck r = -EINVAL; 727d938dc55SCornelia Huck break; 728d938dc55SCornelia Huck } 729d938dc55SCornelia Huck return r; 730d938dc55SCornelia Huck } 731d938dc55SCornelia Huck 7328c0a7ce6SDominik Dingel static int kvm_s390_get_mem_control(struct kvm *kvm, struct kvm_device_attr *attr) 7338c0a7ce6SDominik Dingel { 7348c0a7ce6SDominik Dingel int ret; 7358c0a7ce6SDominik Dingel 7368c0a7ce6SDominik Dingel switch (attr->attr) { 7378c0a7ce6SDominik Dingel case KVM_S390_VM_MEM_LIMIT_SIZE: 7388c0a7ce6SDominik Dingel ret = 0; 739c92ea7b9SChristian Borntraeger VM_EVENT(kvm, 3, "QUERY: max guest memory: %lu bytes", 740a3a92c31SDominik Dingel kvm->arch.mem_limit); 741a3a92c31SDominik Dingel if (put_user(kvm->arch.mem_limit, (u64 __user *)attr->addr)) 7428c0a7ce6SDominik Dingel ret = -EFAULT; 7438c0a7ce6SDominik Dingel break; 7448c0a7ce6SDominik Dingel default: 7458c0a7ce6SDominik Dingel ret = -ENXIO; 7468c0a7ce6SDominik Dingel break; 7478c0a7ce6SDominik Dingel } 7488c0a7ce6SDominik Dingel return ret; 7498c0a7ce6SDominik Dingel } 7508c0a7ce6SDominik Dingel 7518c0a7ce6SDominik Dingel static int kvm_s390_set_mem_control(struct kvm *kvm, struct kvm_device_attr *attr) 7524f718eabSDominik Dingel { 7534f718eabSDominik Dingel int ret; 7544f718eabSDominik Dingel unsigned int idx; 7554f718eabSDominik Dingel switch (attr->attr) { 7564f718eabSDominik Dingel case KVM_S390_VM_MEM_ENABLE_CMMA: 757f9cbd9b0SDavid Hildenbrand ret = -ENXIO; 758c24cc9c8SDavid Hildenbrand if (!sclp.has_cmma) 759e6db1d61SDominik Dingel break; 760e6db1d61SDominik Dingel 761c92ea7b9SChristian Borntraeger VM_EVENT(kvm, 3, "%s", "ENABLE: CMMA support"); 7624f718eabSDominik Dingel mutex_lock(&kvm->lock); 763a4499382SJanosch Frank if (kvm->created_vcpus) 764a4499382SJanosch Frank ret = -EBUSY; 765a4499382SJanosch Frank else if (kvm->mm->context.allow_gmap_hpage_1m) 766a4499382SJanosch Frank ret = -EINVAL; 767a4499382SJanosch Frank else { 7684f718eabSDominik Dingel kvm->arch.use_cmma = 1; 769c9f0a2b8SJanosch Frank /* Not compatible with cmma. */ 770c9f0a2b8SJanosch Frank kvm->arch.use_pfmfi = 0; 7714f718eabSDominik Dingel ret = 0; 7724f718eabSDominik Dingel } 7734f718eabSDominik Dingel mutex_unlock(&kvm->lock); 7744f718eabSDominik Dingel break; 7754f718eabSDominik Dingel case KVM_S390_VM_MEM_CLR_CMMA: 776f9cbd9b0SDavid Hildenbrand ret = -ENXIO; 777f9cbd9b0SDavid Hildenbrand if (!sclp.has_cmma) 778f9cbd9b0SDavid Hildenbrand break; 779c3489155SDominik Dingel ret = -EINVAL; 780c3489155SDominik Dingel if (!kvm->arch.use_cmma) 781c3489155SDominik Dingel break; 782c3489155SDominik Dingel 783c92ea7b9SChristian Borntraeger VM_EVENT(kvm, 3, "%s", "RESET: CMMA states"); 7844f718eabSDominik Dingel mutex_lock(&kvm->lock); 7854f718eabSDominik Dingel idx = srcu_read_lock(&kvm->srcu); 786a13cff31SDominik Dingel s390_reset_cmma(kvm->arch.gmap->mm); 7874f718eabSDominik Dingel srcu_read_unlock(&kvm->srcu, idx); 7884f718eabSDominik Dingel mutex_unlock(&kvm->lock); 7894f718eabSDominik Dingel ret = 0; 7904f718eabSDominik Dingel break; 7918c0a7ce6SDominik Dingel case KVM_S390_VM_MEM_LIMIT_SIZE: { 7928c0a7ce6SDominik Dingel unsigned long new_limit; 7938c0a7ce6SDominik Dingel 7948c0a7ce6SDominik Dingel if (kvm_is_ucontrol(kvm)) 7958c0a7ce6SDominik Dingel return -EINVAL; 7968c0a7ce6SDominik Dingel 7978c0a7ce6SDominik Dingel if (get_user(new_limit, (u64 __user *)attr->addr)) 7988c0a7ce6SDominik Dingel return -EFAULT; 7998c0a7ce6SDominik Dingel 800a3a92c31SDominik Dingel if (kvm->arch.mem_limit != KVM_S390_NO_MEM_LIMIT && 801a3a92c31SDominik Dingel new_limit > kvm->arch.mem_limit) 8028c0a7ce6SDominik Dingel return -E2BIG; 8038c0a7ce6SDominik Dingel 804a3a92c31SDominik Dingel if (!new_limit) 805a3a92c31SDominik Dingel return -EINVAL; 806a3a92c31SDominik Dingel 8076ea427bbSMartin Schwidefsky /* gmap_create takes last usable address */ 808a3a92c31SDominik Dingel if (new_limit != KVM_S390_NO_MEM_LIMIT) 809a3a92c31SDominik Dingel new_limit -= 1; 810a3a92c31SDominik Dingel 8118c0a7ce6SDominik Dingel ret = -EBUSY; 8128c0a7ce6SDominik Dingel mutex_lock(&kvm->lock); 813a03825bbSPaolo Bonzini if (!kvm->created_vcpus) { 8146ea427bbSMartin Schwidefsky /* gmap_create will round the limit up */ 8156ea427bbSMartin Schwidefsky struct gmap *new = gmap_create(current->mm, new_limit); 8168c0a7ce6SDominik Dingel 8178c0a7ce6SDominik Dingel if (!new) { 8188c0a7ce6SDominik Dingel ret = -ENOMEM; 8198c0a7ce6SDominik Dingel } else { 8206ea427bbSMartin Schwidefsky gmap_remove(kvm->arch.gmap); 8218c0a7ce6SDominik Dingel new->private = kvm; 8228c0a7ce6SDominik Dingel kvm->arch.gmap = new; 8238c0a7ce6SDominik Dingel ret = 0; 8248c0a7ce6SDominik Dingel } 8258c0a7ce6SDominik Dingel } 8268c0a7ce6SDominik Dingel mutex_unlock(&kvm->lock); 827a3a92c31SDominik Dingel VM_EVENT(kvm, 3, "SET: max guest address: %lu", new_limit); 828a3a92c31SDominik Dingel VM_EVENT(kvm, 3, "New guest asce: 0x%pK", 829a3a92c31SDominik Dingel (void *) kvm->arch.gmap->asce); 8308c0a7ce6SDominik Dingel break; 8318c0a7ce6SDominik Dingel } 8324f718eabSDominik Dingel default: 8334f718eabSDominik Dingel ret = -ENXIO; 8344f718eabSDominik Dingel break; 8354f718eabSDominik Dingel } 8364f718eabSDominik Dingel return ret; 8374f718eabSDominik Dingel } 8384f718eabSDominik Dingel 839a374e892STony Krowiak static void kvm_s390_vcpu_crypto_setup(struct kvm_vcpu *vcpu); 840a374e892STony Krowiak 84120c922f0STony Krowiak void kvm_s390_vcpu_crypto_reset_all(struct kvm *kvm) 842a374e892STony Krowiak { 843a374e892STony Krowiak struct kvm_vcpu *vcpu; 844a374e892STony Krowiak int i; 845a374e892STony Krowiak 84620c922f0STony Krowiak kvm_s390_vcpu_block_all(kvm); 84720c922f0STony Krowiak 8483194cdb7SDavid Hildenbrand kvm_for_each_vcpu(i, vcpu, kvm) { 84920c922f0STony Krowiak kvm_s390_vcpu_crypto_setup(vcpu); 8503194cdb7SDavid Hildenbrand /* recreate the shadow crycb by leaving the VSIE handler */ 8513194cdb7SDavid Hildenbrand kvm_s390_sync_request(KVM_REQ_VSIE_RESTART, vcpu); 8523194cdb7SDavid Hildenbrand } 85320c922f0STony Krowiak 85420c922f0STony Krowiak kvm_s390_vcpu_unblock_all(kvm); 85520c922f0STony Krowiak } 85620c922f0STony Krowiak 85720c922f0STony Krowiak static int kvm_s390_vm_set_crypto(struct kvm *kvm, struct kvm_device_attr *attr) 85820c922f0STony Krowiak { 859a374e892STony Krowiak mutex_lock(&kvm->lock); 860a374e892STony Krowiak switch (attr->attr) { 861a374e892STony Krowiak case KVM_S390_VM_CRYPTO_ENABLE_AES_KW: 862*37940fb0STony Krowiak if (!test_kvm_facility(kvm, 76)) 863*37940fb0STony Krowiak return -EINVAL; 864a374e892STony Krowiak get_random_bytes( 865a374e892STony Krowiak kvm->arch.crypto.crycb->aes_wrapping_key_mask, 866a374e892STony Krowiak sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask)); 867a374e892STony Krowiak kvm->arch.crypto.aes_kw = 1; 868c92ea7b9SChristian Borntraeger VM_EVENT(kvm, 3, "%s", "ENABLE: AES keywrapping support"); 869a374e892STony Krowiak break; 870a374e892STony Krowiak case KVM_S390_VM_CRYPTO_ENABLE_DEA_KW: 871*37940fb0STony Krowiak if (!test_kvm_facility(kvm, 76)) 872*37940fb0STony Krowiak return -EINVAL; 873a374e892STony Krowiak get_random_bytes( 874a374e892STony Krowiak kvm->arch.crypto.crycb->dea_wrapping_key_mask, 875a374e892STony Krowiak sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask)); 876a374e892STony Krowiak kvm->arch.crypto.dea_kw = 1; 877c92ea7b9SChristian Borntraeger VM_EVENT(kvm, 3, "%s", "ENABLE: DEA keywrapping support"); 878a374e892STony Krowiak break; 879a374e892STony Krowiak case KVM_S390_VM_CRYPTO_DISABLE_AES_KW: 880*37940fb0STony Krowiak if (!test_kvm_facility(kvm, 76)) 881*37940fb0STony Krowiak return -EINVAL; 882a374e892STony Krowiak kvm->arch.crypto.aes_kw = 0; 883a374e892STony Krowiak memset(kvm->arch.crypto.crycb->aes_wrapping_key_mask, 0, 884a374e892STony Krowiak sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask)); 885c92ea7b9SChristian Borntraeger VM_EVENT(kvm, 3, "%s", "DISABLE: AES keywrapping support"); 886a374e892STony Krowiak break; 887a374e892STony Krowiak case KVM_S390_VM_CRYPTO_DISABLE_DEA_KW: 888*37940fb0STony Krowiak if (!test_kvm_facility(kvm, 76)) 889*37940fb0STony Krowiak return -EINVAL; 890a374e892STony Krowiak kvm->arch.crypto.dea_kw = 0; 891a374e892STony Krowiak memset(kvm->arch.crypto.crycb->dea_wrapping_key_mask, 0, 892a374e892STony Krowiak sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask)); 893c92ea7b9SChristian Borntraeger VM_EVENT(kvm, 3, "%s", "DISABLE: DEA keywrapping support"); 894a374e892STony Krowiak break; 895*37940fb0STony Krowiak case KVM_S390_VM_CRYPTO_ENABLE_APIE: 896*37940fb0STony Krowiak if (!ap_instructions_available()) { 897*37940fb0STony Krowiak mutex_unlock(&kvm->lock); 898*37940fb0STony Krowiak return -EOPNOTSUPP; 899*37940fb0STony Krowiak } 900*37940fb0STony Krowiak kvm->arch.crypto.apie = 1; 901*37940fb0STony Krowiak break; 902*37940fb0STony Krowiak case KVM_S390_VM_CRYPTO_DISABLE_APIE: 903*37940fb0STony Krowiak if (!ap_instructions_available()) { 904*37940fb0STony Krowiak mutex_unlock(&kvm->lock); 905*37940fb0STony Krowiak return -EOPNOTSUPP; 906*37940fb0STony Krowiak } 907*37940fb0STony Krowiak kvm->arch.crypto.apie = 0; 908*37940fb0STony Krowiak break; 909a374e892STony Krowiak default: 910a374e892STony Krowiak mutex_unlock(&kvm->lock); 911a374e892STony Krowiak return -ENXIO; 912a374e892STony Krowiak } 913a374e892STony Krowiak 91420c922f0STony Krowiak kvm_s390_vcpu_crypto_reset_all(kvm); 915a374e892STony Krowiak mutex_unlock(&kvm->lock); 916a374e892STony Krowiak return 0; 917a374e892STony Krowiak } 918a374e892STony Krowiak 919190df4a2SClaudio Imbrenda static void kvm_s390_sync_request_broadcast(struct kvm *kvm, int req) 920190df4a2SClaudio Imbrenda { 921190df4a2SClaudio Imbrenda int cx; 922190df4a2SClaudio Imbrenda struct kvm_vcpu *vcpu; 923190df4a2SClaudio Imbrenda 924190df4a2SClaudio Imbrenda kvm_for_each_vcpu(cx, vcpu, kvm) 925190df4a2SClaudio Imbrenda kvm_s390_sync_request(req, vcpu); 926190df4a2SClaudio Imbrenda } 927190df4a2SClaudio Imbrenda 928190df4a2SClaudio Imbrenda /* 929190df4a2SClaudio Imbrenda * Must be called with kvm->srcu held to avoid races on memslots, and with 9301de1ea7eSChristian Borntraeger * kvm->slots_lock to avoid races with ourselves and kvm_s390_vm_stop_migration. 931190df4a2SClaudio Imbrenda */ 932190df4a2SClaudio Imbrenda static int kvm_s390_vm_start_migration(struct kvm *kvm) 933190df4a2SClaudio Imbrenda { 934190df4a2SClaudio Imbrenda struct kvm_memory_slot *ms; 935190df4a2SClaudio Imbrenda struct kvm_memslots *slots; 936afdad616SClaudio Imbrenda unsigned long ram_pages = 0; 937190df4a2SClaudio Imbrenda int slotnr; 938190df4a2SClaudio Imbrenda 939190df4a2SClaudio Imbrenda /* migration mode already enabled */ 940afdad616SClaudio Imbrenda if (kvm->arch.migration_mode) 941190df4a2SClaudio Imbrenda return 0; 942190df4a2SClaudio Imbrenda slots = kvm_memslots(kvm); 943190df4a2SClaudio Imbrenda if (!slots || !slots->used_slots) 944190df4a2SClaudio Imbrenda return -EINVAL; 945190df4a2SClaudio Imbrenda 946afdad616SClaudio Imbrenda if (!kvm->arch.use_cmma) { 947afdad616SClaudio Imbrenda kvm->arch.migration_mode = 1; 948afdad616SClaudio Imbrenda return 0; 949190df4a2SClaudio Imbrenda } 950190df4a2SClaudio Imbrenda /* mark all the pages in active slots as dirty */ 951190df4a2SClaudio Imbrenda for (slotnr = 0; slotnr < slots->used_slots; slotnr++) { 952190df4a2SClaudio Imbrenda ms = slots->memslots + slotnr; 953afdad616SClaudio Imbrenda /* 954afdad616SClaudio Imbrenda * The second half of the bitmap is only used on x86, 955afdad616SClaudio Imbrenda * and would be wasted otherwise, so we put it to good 956afdad616SClaudio Imbrenda * use here to keep track of the state of the storage 957afdad616SClaudio Imbrenda * attributes. 958afdad616SClaudio Imbrenda */ 959afdad616SClaudio Imbrenda memset(kvm_second_dirty_bitmap(ms), 0xff, kvm_dirty_bitmap_bytes(ms)); 960afdad616SClaudio Imbrenda ram_pages += ms->npages; 961190df4a2SClaudio Imbrenda } 962afdad616SClaudio Imbrenda atomic64_set(&kvm->arch.cmma_dirty_pages, ram_pages); 963afdad616SClaudio Imbrenda kvm->arch.migration_mode = 1; 964190df4a2SClaudio Imbrenda kvm_s390_sync_request_broadcast(kvm, KVM_REQ_START_MIGRATION); 965190df4a2SClaudio Imbrenda return 0; 966190df4a2SClaudio Imbrenda } 967190df4a2SClaudio Imbrenda 968190df4a2SClaudio Imbrenda /* 9691de1ea7eSChristian Borntraeger * Must be called with kvm->slots_lock to avoid races with ourselves and 970190df4a2SClaudio Imbrenda * kvm_s390_vm_start_migration. 971190df4a2SClaudio Imbrenda */ 972190df4a2SClaudio Imbrenda static int kvm_s390_vm_stop_migration(struct kvm *kvm) 973190df4a2SClaudio Imbrenda { 974190df4a2SClaudio Imbrenda /* migration mode already disabled */ 975afdad616SClaudio Imbrenda if (!kvm->arch.migration_mode) 976190df4a2SClaudio Imbrenda return 0; 977afdad616SClaudio Imbrenda kvm->arch.migration_mode = 0; 978afdad616SClaudio Imbrenda if (kvm->arch.use_cmma) 979190df4a2SClaudio Imbrenda kvm_s390_sync_request_broadcast(kvm, KVM_REQ_STOP_MIGRATION); 980190df4a2SClaudio Imbrenda return 0; 981190df4a2SClaudio Imbrenda } 982190df4a2SClaudio Imbrenda 983190df4a2SClaudio Imbrenda static int kvm_s390_vm_set_migration(struct kvm *kvm, 984190df4a2SClaudio Imbrenda struct kvm_device_attr *attr) 985190df4a2SClaudio Imbrenda { 9861de1ea7eSChristian Borntraeger int res = -ENXIO; 987190df4a2SClaudio Imbrenda 9881de1ea7eSChristian Borntraeger mutex_lock(&kvm->slots_lock); 989190df4a2SClaudio Imbrenda switch (attr->attr) { 990190df4a2SClaudio Imbrenda case KVM_S390_VM_MIGRATION_START: 991190df4a2SClaudio Imbrenda res = kvm_s390_vm_start_migration(kvm); 992190df4a2SClaudio Imbrenda break; 993190df4a2SClaudio Imbrenda case KVM_S390_VM_MIGRATION_STOP: 994190df4a2SClaudio Imbrenda res = kvm_s390_vm_stop_migration(kvm); 995190df4a2SClaudio Imbrenda break; 996190df4a2SClaudio Imbrenda default: 997190df4a2SClaudio Imbrenda break; 998190df4a2SClaudio Imbrenda } 9991de1ea7eSChristian Borntraeger mutex_unlock(&kvm->slots_lock); 1000190df4a2SClaudio Imbrenda 1001190df4a2SClaudio Imbrenda return res; 1002190df4a2SClaudio Imbrenda } 1003190df4a2SClaudio Imbrenda 1004190df4a2SClaudio Imbrenda static int kvm_s390_vm_get_migration(struct kvm *kvm, 1005190df4a2SClaudio Imbrenda struct kvm_device_attr *attr) 1006190df4a2SClaudio Imbrenda { 1007afdad616SClaudio Imbrenda u64 mig = kvm->arch.migration_mode; 1008190df4a2SClaudio Imbrenda 1009190df4a2SClaudio Imbrenda if (attr->attr != KVM_S390_VM_MIGRATION_STATUS) 1010190df4a2SClaudio Imbrenda return -ENXIO; 1011190df4a2SClaudio Imbrenda 1012190df4a2SClaudio Imbrenda if (copy_to_user((void __user *)attr->addr, &mig, sizeof(mig))) 1013190df4a2SClaudio Imbrenda return -EFAULT; 1014190df4a2SClaudio Imbrenda return 0; 1015190df4a2SClaudio Imbrenda } 1016190df4a2SClaudio Imbrenda 10178fa1696eSCollin L. Walling static int kvm_s390_set_tod_ext(struct kvm *kvm, struct kvm_device_attr *attr) 10188fa1696eSCollin L. Walling { 10198fa1696eSCollin L. Walling struct kvm_s390_vm_tod_clock gtod; 10208fa1696eSCollin L. Walling 10218fa1696eSCollin L. Walling if (copy_from_user(>od, (void __user *)attr->addr, sizeof(gtod))) 10228fa1696eSCollin L. Walling return -EFAULT; 10238fa1696eSCollin L. Walling 10240e7def5fSDavid Hildenbrand if (!test_kvm_facility(kvm, 139) && gtod.epoch_idx) 10258fa1696eSCollin L. Walling return -EINVAL; 10260e7def5fSDavid Hildenbrand kvm_s390_set_tod_clock(kvm, >od); 10278fa1696eSCollin L. Walling 10288fa1696eSCollin L. Walling VM_EVENT(kvm, 3, "SET: TOD extension: 0x%x, TOD base: 0x%llx", 10298fa1696eSCollin L. Walling gtod.epoch_idx, gtod.tod); 10308fa1696eSCollin L. Walling 10318fa1696eSCollin L. Walling return 0; 10328fa1696eSCollin L. Walling } 10338fa1696eSCollin L. Walling 103472f25020SJason J. Herne static int kvm_s390_set_tod_high(struct kvm *kvm, struct kvm_device_attr *attr) 103572f25020SJason J. Herne { 103672f25020SJason J. Herne u8 gtod_high; 103772f25020SJason J. Herne 103872f25020SJason J. Herne if (copy_from_user(>od_high, (void __user *)attr->addr, 103972f25020SJason J. Herne sizeof(gtod_high))) 104072f25020SJason J. Herne return -EFAULT; 104172f25020SJason J. Herne 104272f25020SJason J. Herne if (gtod_high != 0) 104372f25020SJason J. Herne return -EINVAL; 104458c383c6SChristian Borntraeger VM_EVENT(kvm, 3, "SET: TOD extension: 0x%x", gtod_high); 104572f25020SJason J. Herne 104672f25020SJason J. Herne return 0; 104772f25020SJason J. Herne } 104872f25020SJason J. Herne 104972f25020SJason J. Herne static int kvm_s390_set_tod_low(struct kvm *kvm, struct kvm_device_attr *attr) 105072f25020SJason J. Herne { 10510e7def5fSDavid Hildenbrand struct kvm_s390_vm_tod_clock gtod = { 0 }; 105272f25020SJason J. Herne 10530e7def5fSDavid Hildenbrand if (copy_from_user(>od.tod, (void __user *)attr->addr, 10540e7def5fSDavid Hildenbrand sizeof(gtod.tod))) 105572f25020SJason J. Herne return -EFAULT; 105672f25020SJason J. Herne 10570e7def5fSDavid Hildenbrand kvm_s390_set_tod_clock(kvm, >od); 10580e7def5fSDavid Hildenbrand VM_EVENT(kvm, 3, "SET: TOD base: 0x%llx", gtod.tod); 105972f25020SJason J. Herne return 0; 106072f25020SJason J. Herne } 106172f25020SJason J. Herne 106272f25020SJason J. Herne static int kvm_s390_set_tod(struct kvm *kvm, struct kvm_device_attr *attr) 106372f25020SJason J. Herne { 106472f25020SJason J. Herne int ret; 106572f25020SJason J. Herne 106672f25020SJason J. Herne if (attr->flags) 106772f25020SJason J. Herne return -EINVAL; 106872f25020SJason J. Herne 106972f25020SJason J. Herne switch (attr->attr) { 10708fa1696eSCollin L. Walling case KVM_S390_VM_TOD_EXT: 10718fa1696eSCollin L. Walling ret = kvm_s390_set_tod_ext(kvm, attr); 10728fa1696eSCollin L. Walling break; 107372f25020SJason J. Herne case KVM_S390_VM_TOD_HIGH: 107472f25020SJason J. Herne ret = kvm_s390_set_tod_high(kvm, attr); 107572f25020SJason J. Herne break; 107672f25020SJason J. Herne case KVM_S390_VM_TOD_LOW: 107772f25020SJason J. Herne ret = kvm_s390_set_tod_low(kvm, attr); 107872f25020SJason J. Herne break; 107972f25020SJason J. Herne default: 108072f25020SJason J. Herne ret = -ENXIO; 108172f25020SJason J. Herne break; 108272f25020SJason J. Herne } 108372f25020SJason J. Herne return ret; 108472f25020SJason J. Herne } 108572f25020SJason J. Herne 108633d1b272SDavid Hildenbrand static void kvm_s390_get_tod_clock(struct kvm *kvm, 10878fa1696eSCollin L. Walling struct kvm_s390_vm_tod_clock *gtod) 10888fa1696eSCollin L. Walling { 10898fa1696eSCollin L. Walling struct kvm_s390_tod_clock_ext htod; 10908fa1696eSCollin L. Walling 10918fa1696eSCollin L. Walling preempt_disable(); 10928fa1696eSCollin L. Walling 10938fa1696eSCollin L. Walling get_tod_clock_ext((char *)&htod); 10948fa1696eSCollin L. Walling 10958fa1696eSCollin L. Walling gtod->tod = htod.tod + kvm->arch.epoch; 109633d1b272SDavid Hildenbrand gtod->epoch_idx = 0; 109733d1b272SDavid Hildenbrand if (test_kvm_facility(kvm, 139)) { 10988fa1696eSCollin L. Walling gtod->epoch_idx = htod.epoch_idx + kvm->arch.epdx; 10998fa1696eSCollin L. Walling if (gtod->tod < htod.tod) 11008fa1696eSCollin L. Walling gtod->epoch_idx += 1; 110133d1b272SDavid Hildenbrand } 11028fa1696eSCollin L. Walling 11038fa1696eSCollin L. Walling preempt_enable(); 11048fa1696eSCollin L. Walling } 11058fa1696eSCollin L. Walling 11068fa1696eSCollin L. Walling static int kvm_s390_get_tod_ext(struct kvm *kvm, struct kvm_device_attr *attr) 11078fa1696eSCollin L. Walling { 11088fa1696eSCollin L. Walling struct kvm_s390_vm_tod_clock gtod; 11098fa1696eSCollin L. Walling 11108fa1696eSCollin L. Walling memset(>od, 0, sizeof(gtod)); 111133d1b272SDavid Hildenbrand kvm_s390_get_tod_clock(kvm, >od); 11128fa1696eSCollin L. Walling if (copy_to_user((void __user *)attr->addr, >od, sizeof(gtod))) 11138fa1696eSCollin L. Walling return -EFAULT; 11148fa1696eSCollin L. Walling 11158fa1696eSCollin L. Walling VM_EVENT(kvm, 3, "QUERY: TOD extension: 0x%x, TOD base: 0x%llx", 11168fa1696eSCollin L. Walling gtod.epoch_idx, gtod.tod); 11178fa1696eSCollin L. Walling return 0; 11188fa1696eSCollin L. Walling } 11198fa1696eSCollin L. Walling 112072f25020SJason J. Herne static int kvm_s390_get_tod_high(struct kvm *kvm, struct kvm_device_attr *attr) 112172f25020SJason J. Herne { 112272f25020SJason J. Herne u8 gtod_high = 0; 112372f25020SJason J. Herne 112472f25020SJason J. Herne if (copy_to_user((void __user *)attr->addr, >od_high, 112572f25020SJason J. Herne sizeof(gtod_high))) 112672f25020SJason J. Herne return -EFAULT; 112758c383c6SChristian Borntraeger VM_EVENT(kvm, 3, "QUERY: TOD extension: 0x%x", gtod_high); 112872f25020SJason J. Herne 112972f25020SJason J. Herne return 0; 113072f25020SJason J. Herne } 113172f25020SJason J. Herne 113272f25020SJason J. Herne static int kvm_s390_get_tod_low(struct kvm *kvm, struct kvm_device_attr *attr) 113372f25020SJason J. Herne { 11345a3d883aSDavid Hildenbrand u64 gtod; 113572f25020SJason J. Herne 113660417fccSDavid Hildenbrand gtod = kvm_s390_get_tod_clock_fast(kvm); 113772f25020SJason J. Herne if (copy_to_user((void __user *)attr->addr, >od, sizeof(gtod))) 113872f25020SJason J. Herne return -EFAULT; 113958c383c6SChristian Borntraeger VM_EVENT(kvm, 3, "QUERY: TOD base: 0x%llx", gtod); 114072f25020SJason J. Herne 114172f25020SJason J. Herne return 0; 114272f25020SJason J. Herne } 114372f25020SJason J. Herne 114472f25020SJason J. Herne static int kvm_s390_get_tod(struct kvm *kvm, struct kvm_device_attr *attr) 114572f25020SJason J. Herne { 114672f25020SJason J. Herne int ret; 114772f25020SJason J. Herne 114872f25020SJason J. Herne if (attr->flags) 114972f25020SJason J. Herne return -EINVAL; 115072f25020SJason J. Herne 115172f25020SJason J. Herne switch (attr->attr) { 11528fa1696eSCollin L. Walling case KVM_S390_VM_TOD_EXT: 11538fa1696eSCollin L. Walling ret = kvm_s390_get_tod_ext(kvm, attr); 11548fa1696eSCollin L. Walling break; 115572f25020SJason J. Herne case KVM_S390_VM_TOD_HIGH: 115672f25020SJason J. Herne ret = kvm_s390_get_tod_high(kvm, attr); 115772f25020SJason J. Herne break; 115872f25020SJason J. Herne case KVM_S390_VM_TOD_LOW: 115972f25020SJason J. Herne ret = kvm_s390_get_tod_low(kvm, attr); 116072f25020SJason J. Herne break; 116172f25020SJason J. Herne default: 116272f25020SJason J. Herne ret = -ENXIO; 116372f25020SJason J. Herne break; 116472f25020SJason J. Herne } 116572f25020SJason J. Herne return ret; 116672f25020SJason J. Herne } 116772f25020SJason J. Herne 1168658b6edaSMichael Mueller static int kvm_s390_set_processor(struct kvm *kvm, struct kvm_device_attr *attr) 1169658b6edaSMichael Mueller { 1170658b6edaSMichael Mueller struct kvm_s390_vm_cpu_processor *proc; 1171053dd230SDavid Hildenbrand u16 lowest_ibc, unblocked_ibc; 1172658b6edaSMichael Mueller int ret = 0; 1173658b6edaSMichael Mueller 1174658b6edaSMichael Mueller mutex_lock(&kvm->lock); 1175a03825bbSPaolo Bonzini if (kvm->created_vcpus) { 1176658b6edaSMichael Mueller ret = -EBUSY; 1177658b6edaSMichael Mueller goto out; 1178658b6edaSMichael Mueller } 1179658b6edaSMichael Mueller proc = kzalloc(sizeof(*proc), GFP_KERNEL); 1180658b6edaSMichael Mueller if (!proc) { 1181658b6edaSMichael Mueller ret = -ENOMEM; 1182658b6edaSMichael Mueller goto out; 1183658b6edaSMichael Mueller } 1184658b6edaSMichael Mueller if (!copy_from_user(proc, (void __user *)attr->addr, 1185658b6edaSMichael Mueller sizeof(*proc))) { 11869bb0ec09SDavid Hildenbrand kvm->arch.model.cpuid = proc->cpuid; 1187053dd230SDavid Hildenbrand lowest_ibc = sclp.ibc >> 16 & 0xfff; 1188053dd230SDavid Hildenbrand unblocked_ibc = sclp.ibc & 0xfff; 11890487c44dSDavid Hildenbrand if (lowest_ibc && proc->ibc) { 1190053dd230SDavid Hildenbrand if (proc->ibc > unblocked_ibc) 1191053dd230SDavid Hildenbrand kvm->arch.model.ibc = unblocked_ibc; 1192053dd230SDavid Hildenbrand else if (proc->ibc < lowest_ibc) 1193053dd230SDavid Hildenbrand kvm->arch.model.ibc = lowest_ibc; 1194053dd230SDavid Hildenbrand else 1195658b6edaSMichael Mueller kvm->arch.model.ibc = proc->ibc; 1196053dd230SDavid Hildenbrand } 1197c54f0d6aSDavid Hildenbrand memcpy(kvm->arch.model.fac_list, proc->fac_list, 1198658b6edaSMichael Mueller S390_ARCH_FAC_LIST_SIZE_BYTE); 1199a8c39dd7SChristian Borntraeger VM_EVENT(kvm, 3, "SET: guest ibc: 0x%4.4x, guest cpuid: 0x%16.16llx", 1200a8c39dd7SChristian Borntraeger kvm->arch.model.ibc, 1201a8c39dd7SChristian Borntraeger kvm->arch.model.cpuid); 1202a8c39dd7SChristian Borntraeger VM_EVENT(kvm, 3, "SET: guest faclist: 0x%16.16llx.%16.16llx.%16.16llx", 1203a8c39dd7SChristian Borntraeger kvm->arch.model.fac_list[0], 1204a8c39dd7SChristian Borntraeger kvm->arch.model.fac_list[1], 1205a8c39dd7SChristian Borntraeger kvm->arch.model.fac_list[2]); 1206658b6edaSMichael Mueller } else 1207658b6edaSMichael Mueller ret = -EFAULT; 1208658b6edaSMichael Mueller kfree(proc); 1209658b6edaSMichael Mueller out: 1210658b6edaSMichael Mueller mutex_unlock(&kvm->lock); 1211658b6edaSMichael Mueller return ret; 1212658b6edaSMichael Mueller } 1213658b6edaSMichael Mueller 121415c9705fSDavid Hildenbrand static int kvm_s390_set_processor_feat(struct kvm *kvm, 121515c9705fSDavid Hildenbrand struct kvm_device_attr *attr) 121615c9705fSDavid Hildenbrand { 121715c9705fSDavid Hildenbrand struct kvm_s390_vm_cpu_feat data; 121815c9705fSDavid Hildenbrand 121915c9705fSDavid Hildenbrand if (copy_from_user(&data, (void __user *)attr->addr, sizeof(data))) 122015c9705fSDavid Hildenbrand return -EFAULT; 122115c9705fSDavid Hildenbrand if (!bitmap_subset((unsigned long *) data.feat, 122215c9705fSDavid Hildenbrand kvm_s390_available_cpu_feat, 122315c9705fSDavid Hildenbrand KVM_S390_VM_CPU_FEAT_NR_BITS)) 122415c9705fSDavid Hildenbrand return -EINVAL; 122515c9705fSDavid Hildenbrand 122615c9705fSDavid Hildenbrand mutex_lock(&kvm->lock); 12272f8311c9SChristian Borntraeger if (kvm->created_vcpus) { 12282f8311c9SChristian Borntraeger mutex_unlock(&kvm->lock); 12292f8311c9SChristian Borntraeger return -EBUSY; 12302f8311c9SChristian Borntraeger } 123115c9705fSDavid Hildenbrand bitmap_copy(kvm->arch.cpu_feat, (unsigned long *) data.feat, 123215c9705fSDavid Hildenbrand KVM_S390_VM_CPU_FEAT_NR_BITS); 123315c9705fSDavid Hildenbrand mutex_unlock(&kvm->lock); 12342f8311c9SChristian Borntraeger VM_EVENT(kvm, 3, "SET: guest feat: 0x%16.16llx.0x%16.16llx.0x%16.16llx", 12352f8311c9SChristian Borntraeger data.feat[0], 12362f8311c9SChristian Borntraeger data.feat[1], 12372f8311c9SChristian Borntraeger data.feat[2]); 12382f8311c9SChristian Borntraeger return 0; 123915c9705fSDavid Hildenbrand } 124015c9705fSDavid Hildenbrand 12410a763c78SDavid Hildenbrand static int kvm_s390_set_processor_subfunc(struct kvm *kvm, 12420a763c78SDavid Hildenbrand struct kvm_device_attr *attr) 12430a763c78SDavid Hildenbrand { 12440a763c78SDavid Hildenbrand /* 12450a763c78SDavid Hildenbrand * Once supported by kernel + hw, we have to store the subfunctions 12460a763c78SDavid Hildenbrand * in kvm->arch and remember that user space configured them. 12470a763c78SDavid Hildenbrand */ 12480a763c78SDavid Hildenbrand return -ENXIO; 12490a763c78SDavid Hildenbrand } 12500a763c78SDavid Hildenbrand 1251658b6edaSMichael Mueller static int kvm_s390_set_cpu_model(struct kvm *kvm, struct kvm_device_attr *attr) 1252658b6edaSMichael Mueller { 1253658b6edaSMichael Mueller int ret = -ENXIO; 1254658b6edaSMichael Mueller 1255658b6edaSMichael Mueller switch (attr->attr) { 1256658b6edaSMichael Mueller case KVM_S390_VM_CPU_PROCESSOR: 1257658b6edaSMichael Mueller ret = kvm_s390_set_processor(kvm, attr); 1258658b6edaSMichael Mueller break; 125915c9705fSDavid Hildenbrand case KVM_S390_VM_CPU_PROCESSOR_FEAT: 126015c9705fSDavid Hildenbrand ret = kvm_s390_set_processor_feat(kvm, attr); 126115c9705fSDavid Hildenbrand break; 12620a763c78SDavid Hildenbrand case KVM_S390_VM_CPU_PROCESSOR_SUBFUNC: 12630a763c78SDavid Hildenbrand ret = kvm_s390_set_processor_subfunc(kvm, attr); 12640a763c78SDavid Hildenbrand break; 1265658b6edaSMichael Mueller } 1266658b6edaSMichael Mueller return ret; 1267658b6edaSMichael Mueller } 1268658b6edaSMichael Mueller 1269658b6edaSMichael Mueller static int kvm_s390_get_processor(struct kvm *kvm, struct kvm_device_attr *attr) 1270658b6edaSMichael Mueller { 1271658b6edaSMichael Mueller struct kvm_s390_vm_cpu_processor *proc; 1272658b6edaSMichael Mueller int ret = 0; 1273658b6edaSMichael Mueller 1274658b6edaSMichael Mueller proc = kzalloc(sizeof(*proc), GFP_KERNEL); 1275658b6edaSMichael Mueller if (!proc) { 1276658b6edaSMichael Mueller ret = -ENOMEM; 1277658b6edaSMichael Mueller goto out; 1278658b6edaSMichael Mueller } 12799bb0ec09SDavid Hildenbrand proc->cpuid = kvm->arch.model.cpuid; 1280658b6edaSMichael Mueller proc->ibc = kvm->arch.model.ibc; 1281c54f0d6aSDavid Hildenbrand memcpy(&proc->fac_list, kvm->arch.model.fac_list, 1282c54f0d6aSDavid Hildenbrand S390_ARCH_FAC_LIST_SIZE_BYTE); 1283a8c39dd7SChristian Borntraeger VM_EVENT(kvm, 3, "GET: guest ibc: 0x%4.4x, guest cpuid: 0x%16.16llx", 1284a8c39dd7SChristian Borntraeger kvm->arch.model.ibc, 1285a8c39dd7SChristian Borntraeger kvm->arch.model.cpuid); 1286a8c39dd7SChristian Borntraeger VM_EVENT(kvm, 3, "GET: guest faclist: 0x%16.16llx.%16.16llx.%16.16llx", 1287a8c39dd7SChristian Borntraeger kvm->arch.model.fac_list[0], 1288a8c39dd7SChristian Borntraeger kvm->arch.model.fac_list[1], 1289a8c39dd7SChristian Borntraeger kvm->arch.model.fac_list[2]); 1290658b6edaSMichael Mueller if (copy_to_user((void __user *)attr->addr, proc, sizeof(*proc))) 1291658b6edaSMichael Mueller ret = -EFAULT; 1292658b6edaSMichael Mueller kfree(proc); 1293658b6edaSMichael Mueller out: 1294658b6edaSMichael Mueller return ret; 1295658b6edaSMichael Mueller } 1296658b6edaSMichael Mueller 1297658b6edaSMichael Mueller static int kvm_s390_get_machine(struct kvm *kvm, struct kvm_device_attr *attr) 1298658b6edaSMichael Mueller { 1299658b6edaSMichael Mueller struct kvm_s390_vm_cpu_machine *mach; 1300658b6edaSMichael Mueller int ret = 0; 1301658b6edaSMichael Mueller 1302658b6edaSMichael Mueller mach = kzalloc(sizeof(*mach), GFP_KERNEL); 1303658b6edaSMichael Mueller if (!mach) { 1304658b6edaSMichael Mueller ret = -ENOMEM; 1305658b6edaSMichael Mueller goto out; 1306658b6edaSMichael Mueller } 1307658b6edaSMichael Mueller get_cpu_id((struct cpuid *) &mach->cpuid); 130837c5f6c8SDavid Hildenbrand mach->ibc = sclp.ibc; 1309c54f0d6aSDavid Hildenbrand memcpy(&mach->fac_mask, kvm->arch.model.fac_mask, 1310981467c9SMichael Mueller S390_ARCH_FAC_LIST_SIZE_BYTE); 1311658b6edaSMichael Mueller memcpy((unsigned long *)&mach->fac_list, S390_lowcore.stfle_fac_list, 131204478197SChristian Borntraeger sizeof(S390_lowcore.stfle_fac_list)); 1313a8c39dd7SChristian Borntraeger VM_EVENT(kvm, 3, "GET: host ibc: 0x%4.4x, host cpuid: 0x%16.16llx", 1314a8c39dd7SChristian Borntraeger kvm->arch.model.ibc, 1315a8c39dd7SChristian Borntraeger kvm->arch.model.cpuid); 1316a8c39dd7SChristian Borntraeger VM_EVENT(kvm, 3, "GET: host facmask: 0x%16.16llx.%16.16llx.%16.16llx", 1317a8c39dd7SChristian Borntraeger mach->fac_mask[0], 1318a8c39dd7SChristian Borntraeger mach->fac_mask[1], 1319a8c39dd7SChristian Borntraeger mach->fac_mask[2]); 1320a8c39dd7SChristian Borntraeger VM_EVENT(kvm, 3, "GET: host faclist: 0x%16.16llx.%16.16llx.%16.16llx", 1321a8c39dd7SChristian Borntraeger mach->fac_list[0], 1322a8c39dd7SChristian Borntraeger mach->fac_list[1], 1323a8c39dd7SChristian Borntraeger mach->fac_list[2]); 1324658b6edaSMichael Mueller if (copy_to_user((void __user *)attr->addr, mach, sizeof(*mach))) 1325658b6edaSMichael Mueller ret = -EFAULT; 1326658b6edaSMichael Mueller kfree(mach); 1327658b6edaSMichael Mueller out: 1328658b6edaSMichael Mueller return ret; 1329658b6edaSMichael Mueller } 1330658b6edaSMichael Mueller 133115c9705fSDavid Hildenbrand static int kvm_s390_get_processor_feat(struct kvm *kvm, 133215c9705fSDavid Hildenbrand struct kvm_device_attr *attr) 133315c9705fSDavid Hildenbrand { 133415c9705fSDavid Hildenbrand struct kvm_s390_vm_cpu_feat data; 133515c9705fSDavid Hildenbrand 133615c9705fSDavid Hildenbrand bitmap_copy((unsigned long *) data.feat, kvm->arch.cpu_feat, 133715c9705fSDavid Hildenbrand KVM_S390_VM_CPU_FEAT_NR_BITS); 133815c9705fSDavid Hildenbrand if (copy_to_user((void __user *)attr->addr, &data, sizeof(data))) 133915c9705fSDavid Hildenbrand return -EFAULT; 13402f8311c9SChristian Borntraeger VM_EVENT(kvm, 3, "GET: guest feat: 0x%16.16llx.0x%16.16llx.0x%16.16llx", 13412f8311c9SChristian Borntraeger data.feat[0], 13422f8311c9SChristian Borntraeger data.feat[1], 13432f8311c9SChristian Borntraeger data.feat[2]); 134415c9705fSDavid Hildenbrand return 0; 134515c9705fSDavid Hildenbrand } 134615c9705fSDavid Hildenbrand 134715c9705fSDavid Hildenbrand static int kvm_s390_get_machine_feat(struct kvm *kvm, 134815c9705fSDavid Hildenbrand struct kvm_device_attr *attr) 134915c9705fSDavid Hildenbrand { 135015c9705fSDavid Hildenbrand struct kvm_s390_vm_cpu_feat data; 135115c9705fSDavid Hildenbrand 135215c9705fSDavid Hildenbrand bitmap_copy((unsigned long *) data.feat, 135315c9705fSDavid Hildenbrand kvm_s390_available_cpu_feat, 135415c9705fSDavid Hildenbrand KVM_S390_VM_CPU_FEAT_NR_BITS); 135515c9705fSDavid Hildenbrand if (copy_to_user((void __user *)attr->addr, &data, sizeof(data))) 135615c9705fSDavid Hildenbrand return -EFAULT; 13572f8311c9SChristian Borntraeger VM_EVENT(kvm, 3, "GET: host feat: 0x%16.16llx.0x%16.16llx.0x%16.16llx", 13582f8311c9SChristian Borntraeger data.feat[0], 13592f8311c9SChristian Borntraeger data.feat[1], 13602f8311c9SChristian Borntraeger data.feat[2]); 136115c9705fSDavid Hildenbrand return 0; 136215c9705fSDavid Hildenbrand } 136315c9705fSDavid Hildenbrand 13640a763c78SDavid Hildenbrand static int kvm_s390_get_processor_subfunc(struct kvm *kvm, 13650a763c78SDavid Hildenbrand struct kvm_device_attr *attr) 13660a763c78SDavid Hildenbrand { 13670a763c78SDavid Hildenbrand /* 13680a763c78SDavid Hildenbrand * Once we can actually configure subfunctions (kernel + hw support), 13690a763c78SDavid Hildenbrand * we have to check if they were already set by user space, if so copy 13700a763c78SDavid Hildenbrand * them from kvm->arch. 13710a763c78SDavid Hildenbrand */ 13720a763c78SDavid Hildenbrand return -ENXIO; 13730a763c78SDavid Hildenbrand } 13740a763c78SDavid Hildenbrand 13750a763c78SDavid Hildenbrand static int kvm_s390_get_machine_subfunc(struct kvm *kvm, 13760a763c78SDavid Hildenbrand struct kvm_device_attr *attr) 13770a763c78SDavid Hildenbrand { 13780a763c78SDavid Hildenbrand if (copy_to_user((void __user *)attr->addr, &kvm_s390_available_subfunc, 13790a763c78SDavid Hildenbrand sizeof(struct kvm_s390_vm_cpu_subfunc))) 13800a763c78SDavid Hildenbrand return -EFAULT; 13810a763c78SDavid Hildenbrand return 0; 13820a763c78SDavid Hildenbrand } 1383658b6edaSMichael Mueller static int kvm_s390_get_cpu_model(struct kvm *kvm, struct kvm_device_attr *attr) 1384658b6edaSMichael Mueller { 1385658b6edaSMichael Mueller int ret = -ENXIO; 1386658b6edaSMichael Mueller 1387658b6edaSMichael Mueller switch (attr->attr) { 1388658b6edaSMichael Mueller case KVM_S390_VM_CPU_PROCESSOR: 1389658b6edaSMichael Mueller ret = kvm_s390_get_processor(kvm, attr); 1390658b6edaSMichael Mueller break; 1391658b6edaSMichael Mueller case KVM_S390_VM_CPU_MACHINE: 1392658b6edaSMichael Mueller ret = kvm_s390_get_machine(kvm, attr); 1393658b6edaSMichael Mueller break; 139415c9705fSDavid Hildenbrand case KVM_S390_VM_CPU_PROCESSOR_FEAT: 139515c9705fSDavid Hildenbrand ret = kvm_s390_get_processor_feat(kvm, attr); 139615c9705fSDavid Hildenbrand break; 139715c9705fSDavid Hildenbrand case KVM_S390_VM_CPU_MACHINE_FEAT: 139815c9705fSDavid Hildenbrand ret = kvm_s390_get_machine_feat(kvm, attr); 139915c9705fSDavid Hildenbrand break; 14000a763c78SDavid Hildenbrand case KVM_S390_VM_CPU_PROCESSOR_SUBFUNC: 14010a763c78SDavid Hildenbrand ret = kvm_s390_get_processor_subfunc(kvm, attr); 14020a763c78SDavid Hildenbrand break; 14030a763c78SDavid Hildenbrand case KVM_S390_VM_CPU_MACHINE_SUBFUNC: 14040a763c78SDavid Hildenbrand ret = kvm_s390_get_machine_subfunc(kvm, attr); 14050a763c78SDavid Hildenbrand break; 1406658b6edaSMichael Mueller } 1407658b6edaSMichael Mueller return ret; 1408658b6edaSMichael Mueller } 1409658b6edaSMichael Mueller 1410f2061656SDominik Dingel static int kvm_s390_vm_set_attr(struct kvm *kvm, struct kvm_device_attr *attr) 1411f2061656SDominik Dingel { 1412f2061656SDominik Dingel int ret; 1413f2061656SDominik Dingel 1414f2061656SDominik Dingel switch (attr->group) { 14154f718eabSDominik Dingel case KVM_S390_VM_MEM_CTRL: 14168c0a7ce6SDominik Dingel ret = kvm_s390_set_mem_control(kvm, attr); 14174f718eabSDominik Dingel break; 141872f25020SJason J. Herne case KVM_S390_VM_TOD: 141972f25020SJason J. Herne ret = kvm_s390_set_tod(kvm, attr); 142072f25020SJason J. Herne break; 1421658b6edaSMichael Mueller case KVM_S390_VM_CPU_MODEL: 1422658b6edaSMichael Mueller ret = kvm_s390_set_cpu_model(kvm, attr); 1423658b6edaSMichael Mueller break; 1424a374e892STony Krowiak case KVM_S390_VM_CRYPTO: 1425a374e892STony Krowiak ret = kvm_s390_vm_set_crypto(kvm, attr); 1426a374e892STony Krowiak break; 1427190df4a2SClaudio Imbrenda case KVM_S390_VM_MIGRATION: 1428190df4a2SClaudio Imbrenda ret = kvm_s390_vm_set_migration(kvm, attr); 1429190df4a2SClaudio Imbrenda break; 1430f2061656SDominik Dingel default: 1431f2061656SDominik Dingel ret = -ENXIO; 1432f2061656SDominik Dingel break; 1433f2061656SDominik Dingel } 1434f2061656SDominik Dingel 1435f2061656SDominik Dingel return ret; 1436f2061656SDominik Dingel } 1437f2061656SDominik Dingel 1438f2061656SDominik Dingel static int kvm_s390_vm_get_attr(struct kvm *kvm, struct kvm_device_attr *attr) 1439f2061656SDominik Dingel { 14408c0a7ce6SDominik Dingel int ret; 14418c0a7ce6SDominik Dingel 14428c0a7ce6SDominik Dingel switch (attr->group) { 14438c0a7ce6SDominik Dingel case KVM_S390_VM_MEM_CTRL: 14448c0a7ce6SDominik Dingel ret = kvm_s390_get_mem_control(kvm, attr); 14458c0a7ce6SDominik Dingel break; 144672f25020SJason J. Herne case KVM_S390_VM_TOD: 144772f25020SJason J. Herne ret = kvm_s390_get_tod(kvm, attr); 144872f25020SJason J. Herne break; 1449658b6edaSMichael Mueller case KVM_S390_VM_CPU_MODEL: 1450658b6edaSMichael Mueller ret = kvm_s390_get_cpu_model(kvm, attr); 1451658b6edaSMichael Mueller break; 1452190df4a2SClaudio Imbrenda case KVM_S390_VM_MIGRATION: 1453190df4a2SClaudio Imbrenda ret = kvm_s390_vm_get_migration(kvm, attr); 1454190df4a2SClaudio Imbrenda break; 14558c0a7ce6SDominik Dingel default: 14568c0a7ce6SDominik Dingel ret = -ENXIO; 14578c0a7ce6SDominik Dingel break; 14588c0a7ce6SDominik Dingel } 14598c0a7ce6SDominik Dingel 14608c0a7ce6SDominik Dingel return ret; 1461f2061656SDominik Dingel } 1462f2061656SDominik Dingel 1463f2061656SDominik Dingel static int kvm_s390_vm_has_attr(struct kvm *kvm, struct kvm_device_attr *attr) 1464f2061656SDominik Dingel { 1465f2061656SDominik Dingel int ret; 1466f2061656SDominik Dingel 1467f2061656SDominik Dingel switch (attr->group) { 14684f718eabSDominik Dingel case KVM_S390_VM_MEM_CTRL: 14694f718eabSDominik Dingel switch (attr->attr) { 14704f718eabSDominik Dingel case KVM_S390_VM_MEM_ENABLE_CMMA: 14714f718eabSDominik Dingel case KVM_S390_VM_MEM_CLR_CMMA: 1472f9cbd9b0SDavid Hildenbrand ret = sclp.has_cmma ? 0 : -ENXIO; 1473f9cbd9b0SDavid Hildenbrand break; 14748c0a7ce6SDominik Dingel case KVM_S390_VM_MEM_LIMIT_SIZE: 14754f718eabSDominik Dingel ret = 0; 14764f718eabSDominik Dingel break; 14774f718eabSDominik Dingel default: 14784f718eabSDominik Dingel ret = -ENXIO; 14794f718eabSDominik Dingel break; 14804f718eabSDominik Dingel } 14814f718eabSDominik Dingel break; 148272f25020SJason J. Herne case KVM_S390_VM_TOD: 148372f25020SJason J. Herne switch (attr->attr) { 148472f25020SJason J. Herne case KVM_S390_VM_TOD_LOW: 148572f25020SJason J. Herne case KVM_S390_VM_TOD_HIGH: 148672f25020SJason J. Herne ret = 0; 148772f25020SJason J. Herne break; 148872f25020SJason J. Herne default: 148972f25020SJason J. Herne ret = -ENXIO; 149072f25020SJason J. Herne break; 149172f25020SJason J. Herne } 149272f25020SJason J. Herne break; 1493658b6edaSMichael Mueller case KVM_S390_VM_CPU_MODEL: 1494658b6edaSMichael Mueller switch (attr->attr) { 1495658b6edaSMichael Mueller case KVM_S390_VM_CPU_PROCESSOR: 1496658b6edaSMichael Mueller case KVM_S390_VM_CPU_MACHINE: 149715c9705fSDavid Hildenbrand case KVM_S390_VM_CPU_PROCESSOR_FEAT: 149815c9705fSDavid Hildenbrand case KVM_S390_VM_CPU_MACHINE_FEAT: 14990a763c78SDavid Hildenbrand case KVM_S390_VM_CPU_MACHINE_SUBFUNC: 1500658b6edaSMichael Mueller ret = 0; 1501658b6edaSMichael Mueller break; 15020a763c78SDavid Hildenbrand /* configuring subfunctions is not supported yet */ 15030a763c78SDavid Hildenbrand case KVM_S390_VM_CPU_PROCESSOR_SUBFUNC: 1504658b6edaSMichael Mueller default: 1505658b6edaSMichael Mueller ret = -ENXIO; 1506658b6edaSMichael Mueller break; 1507658b6edaSMichael Mueller } 1508658b6edaSMichael Mueller break; 1509a374e892STony Krowiak case KVM_S390_VM_CRYPTO: 1510a374e892STony Krowiak switch (attr->attr) { 1511a374e892STony Krowiak case KVM_S390_VM_CRYPTO_ENABLE_AES_KW: 1512a374e892STony Krowiak case KVM_S390_VM_CRYPTO_ENABLE_DEA_KW: 1513a374e892STony Krowiak case KVM_S390_VM_CRYPTO_DISABLE_AES_KW: 1514a374e892STony Krowiak case KVM_S390_VM_CRYPTO_DISABLE_DEA_KW: 1515a374e892STony Krowiak ret = 0; 1516a374e892STony Krowiak break; 1517*37940fb0STony Krowiak case KVM_S390_VM_CRYPTO_ENABLE_APIE: 1518*37940fb0STony Krowiak case KVM_S390_VM_CRYPTO_DISABLE_APIE: 1519*37940fb0STony Krowiak ret = ap_instructions_available() ? 0 : -ENXIO; 1520*37940fb0STony Krowiak break; 1521a374e892STony Krowiak default: 1522a374e892STony Krowiak ret = -ENXIO; 1523a374e892STony Krowiak break; 1524a374e892STony Krowiak } 1525a374e892STony Krowiak break; 1526190df4a2SClaudio Imbrenda case KVM_S390_VM_MIGRATION: 1527190df4a2SClaudio Imbrenda ret = 0; 1528190df4a2SClaudio Imbrenda break; 1529f2061656SDominik Dingel default: 1530f2061656SDominik Dingel ret = -ENXIO; 1531f2061656SDominik Dingel break; 1532f2061656SDominik Dingel } 1533f2061656SDominik Dingel 1534f2061656SDominik Dingel return ret; 1535f2061656SDominik Dingel } 1536f2061656SDominik Dingel 153730ee2a98SJason J. Herne static long kvm_s390_get_skeys(struct kvm *kvm, struct kvm_s390_skeys *args) 153830ee2a98SJason J. Herne { 153930ee2a98SJason J. Herne uint8_t *keys; 154030ee2a98SJason J. Herne uint64_t hva; 15414f899147SChristian Borntraeger int srcu_idx, i, r = 0; 154230ee2a98SJason J. Herne 154330ee2a98SJason J. Herne if (args->flags != 0) 154430ee2a98SJason J. Herne return -EINVAL; 154530ee2a98SJason J. Herne 154630ee2a98SJason J. Herne /* Is this guest using storage keys? */ 154755531b74SJanosch Frank if (!mm_uses_skeys(current->mm)) 154830ee2a98SJason J. Herne return KVM_S390_GET_SKEYS_NONE; 154930ee2a98SJason J. Herne 155030ee2a98SJason J. Herne /* Enforce sane limit on memory allocation */ 155130ee2a98SJason J. Herne if (args->count < 1 || args->count > KVM_S390_SKEYS_MAX) 155230ee2a98SJason J. Herne return -EINVAL; 155330ee2a98SJason J. Herne 1554752ade68SMichal Hocko keys = kvmalloc_array(args->count, sizeof(uint8_t), GFP_KERNEL); 155530ee2a98SJason J. Herne if (!keys) 155630ee2a98SJason J. Herne return -ENOMEM; 155730ee2a98SJason J. Herne 1558d3ed1ceeSMartin Schwidefsky down_read(¤t->mm->mmap_sem); 15594f899147SChristian Borntraeger srcu_idx = srcu_read_lock(&kvm->srcu); 156030ee2a98SJason J. Herne for (i = 0; i < args->count; i++) { 156130ee2a98SJason J. Herne hva = gfn_to_hva(kvm, args->start_gfn + i); 156230ee2a98SJason J. Herne if (kvm_is_error_hva(hva)) { 156330ee2a98SJason J. Herne r = -EFAULT; 1564d3ed1ceeSMartin Schwidefsky break; 156530ee2a98SJason J. Herne } 156630ee2a98SJason J. Herne 1567154c8c19SDavid Hildenbrand r = get_guest_storage_key(current->mm, hva, &keys[i]); 1568154c8c19SDavid Hildenbrand if (r) 1569d3ed1ceeSMartin Schwidefsky break; 157030ee2a98SJason J. Herne } 15714f899147SChristian Borntraeger srcu_read_unlock(&kvm->srcu, srcu_idx); 1572d3ed1ceeSMartin Schwidefsky up_read(¤t->mm->mmap_sem); 157330ee2a98SJason J. Herne 1574d3ed1ceeSMartin Schwidefsky if (!r) { 157530ee2a98SJason J. Herne r = copy_to_user((uint8_t __user *)args->skeydata_addr, keys, 157630ee2a98SJason J. Herne sizeof(uint8_t) * args->count); 157730ee2a98SJason J. Herne if (r) 157830ee2a98SJason J. Herne r = -EFAULT; 1579d3ed1ceeSMartin Schwidefsky } 1580d3ed1ceeSMartin Schwidefsky 158130ee2a98SJason J. Herne kvfree(keys); 158230ee2a98SJason J. Herne return r; 158330ee2a98SJason J. Herne } 158430ee2a98SJason J. Herne 158530ee2a98SJason J. Herne static long kvm_s390_set_skeys(struct kvm *kvm, struct kvm_s390_skeys *args) 158630ee2a98SJason J. Herne { 158730ee2a98SJason J. Herne uint8_t *keys; 158830ee2a98SJason J. Herne uint64_t hva; 15894f899147SChristian Borntraeger int srcu_idx, i, r = 0; 1590bd096f64SJanosch Frank bool unlocked; 159130ee2a98SJason J. Herne 159230ee2a98SJason J. Herne if (args->flags != 0) 159330ee2a98SJason J. Herne return -EINVAL; 159430ee2a98SJason J. Herne 159530ee2a98SJason J. Herne /* Enforce sane limit on memory allocation */ 159630ee2a98SJason J. Herne if (args->count < 1 || args->count > KVM_S390_SKEYS_MAX) 159730ee2a98SJason J. Herne return -EINVAL; 159830ee2a98SJason J. Herne 1599752ade68SMichal Hocko keys = kvmalloc_array(args->count, sizeof(uint8_t), GFP_KERNEL); 160030ee2a98SJason J. Herne if (!keys) 160130ee2a98SJason J. Herne return -ENOMEM; 160230ee2a98SJason J. Herne 160330ee2a98SJason J. Herne r = copy_from_user(keys, (uint8_t __user *)args->skeydata_addr, 160430ee2a98SJason J. Herne sizeof(uint8_t) * args->count); 160530ee2a98SJason J. Herne if (r) { 160630ee2a98SJason J. Herne r = -EFAULT; 160730ee2a98SJason J. Herne goto out; 160830ee2a98SJason J. Herne } 160930ee2a98SJason J. Herne 161030ee2a98SJason J. Herne /* Enable storage key handling for the guest */ 161114d4a425SDominik Dingel r = s390_enable_skey(); 161214d4a425SDominik Dingel if (r) 161314d4a425SDominik Dingel goto out; 161430ee2a98SJason J. Herne 1615bd096f64SJanosch Frank i = 0; 1616d3ed1ceeSMartin Schwidefsky down_read(¤t->mm->mmap_sem); 16174f899147SChristian Borntraeger srcu_idx = srcu_read_lock(&kvm->srcu); 1618bd096f64SJanosch Frank while (i < args->count) { 1619bd096f64SJanosch Frank unlocked = false; 162030ee2a98SJason J. Herne hva = gfn_to_hva(kvm, args->start_gfn + i); 162130ee2a98SJason J. Herne if (kvm_is_error_hva(hva)) { 162230ee2a98SJason J. Herne r = -EFAULT; 1623d3ed1ceeSMartin Schwidefsky break; 162430ee2a98SJason J. Herne } 162530ee2a98SJason J. Herne 162630ee2a98SJason J. Herne /* Lowest order bit is reserved */ 162730ee2a98SJason J. Herne if (keys[i] & 0x01) { 162830ee2a98SJason J. Herne r = -EINVAL; 1629d3ed1ceeSMartin Schwidefsky break; 163030ee2a98SJason J. Herne } 163130ee2a98SJason J. Herne 1632fe69eabfSDavid Hildenbrand r = set_guest_storage_key(current->mm, hva, keys[i], 0); 1633bd096f64SJanosch Frank if (r) { 1634bd096f64SJanosch Frank r = fixup_user_fault(current, current->mm, hva, 1635bd096f64SJanosch Frank FAULT_FLAG_WRITE, &unlocked); 163630ee2a98SJason J. Herne if (r) 1637d3ed1ceeSMartin Schwidefsky break; 163830ee2a98SJason J. Herne } 1639bd096f64SJanosch Frank if (!r) 1640bd096f64SJanosch Frank i++; 1641bd096f64SJanosch Frank } 16424f899147SChristian Borntraeger srcu_read_unlock(&kvm->srcu, srcu_idx); 1643d3ed1ceeSMartin Schwidefsky up_read(¤t->mm->mmap_sem); 164430ee2a98SJason J. Herne out: 164530ee2a98SJason J. Herne kvfree(keys); 164630ee2a98SJason J. Herne return r; 164730ee2a98SJason J. Herne } 164830ee2a98SJason J. Herne 16494036e387SClaudio Imbrenda /* 16504036e387SClaudio Imbrenda * Base address and length must be sent at the start of each block, therefore 16514036e387SClaudio Imbrenda * it's cheaper to send some clean data, as long as it's less than the size of 16524036e387SClaudio Imbrenda * two longs. 16534036e387SClaudio Imbrenda */ 16544036e387SClaudio Imbrenda #define KVM_S390_MAX_BIT_DISTANCE (2 * sizeof(void *)) 16554036e387SClaudio Imbrenda /* for consistency */ 16564036e387SClaudio Imbrenda #define KVM_S390_CMMA_SIZE_MAX ((u32)KVM_S390_SKEYS_MAX) 16574036e387SClaudio Imbrenda 16584036e387SClaudio Imbrenda /* 1659afdad616SClaudio Imbrenda * Similar to gfn_to_memslot, but returns the index of a memslot also when the 1660afdad616SClaudio Imbrenda * address falls in a hole. In that case the index of one of the memslots 1661afdad616SClaudio Imbrenda * bordering the hole is returned. 1662afdad616SClaudio Imbrenda */ 1663afdad616SClaudio Imbrenda static int gfn_to_memslot_approx(struct kvm_memslots *slots, gfn_t gfn) 1664afdad616SClaudio Imbrenda { 1665afdad616SClaudio Imbrenda int start = 0, end = slots->used_slots; 1666afdad616SClaudio Imbrenda int slot = atomic_read(&slots->lru_slot); 1667afdad616SClaudio Imbrenda struct kvm_memory_slot *memslots = slots->memslots; 1668afdad616SClaudio Imbrenda 1669afdad616SClaudio Imbrenda if (gfn >= memslots[slot].base_gfn && 1670afdad616SClaudio Imbrenda gfn < memslots[slot].base_gfn + memslots[slot].npages) 1671afdad616SClaudio Imbrenda return slot; 1672afdad616SClaudio Imbrenda 1673afdad616SClaudio Imbrenda while (start < end) { 1674afdad616SClaudio Imbrenda slot = start + (end - start) / 2; 1675afdad616SClaudio Imbrenda 1676afdad616SClaudio Imbrenda if (gfn >= memslots[slot].base_gfn) 1677afdad616SClaudio Imbrenda end = slot; 1678afdad616SClaudio Imbrenda else 1679afdad616SClaudio Imbrenda start = slot + 1; 1680afdad616SClaudio Imbrenda } 1681afdad616SClaudio Imbrenda 1682afdad616SClaudio Imbrenda if (gfn >= memslots[start].base_gfn && 1683afdad616SClaudio Imbrenda gfn < memslots[start].base_gfn + memslots[start].npages) { 1684afdad616SClaudio Imbrenda atomic_set(&slots->lru_slot, start); 1685afdad616SClaudio Imbrenda } 1686afdad616SClaudio Imbrenda 1687afdad616SClaudio Imbrenda return start; 1688afdad616SClaudio Imbrenda } 1689afdad616SClaudio Imbrenda 1690afdad616SClaudio Imbrenda static int kvm_s390_peek_cmma(struct kvm *kvm, struct kvm_s390_cmma_log *args, 1691afdad616SClaudio Imbrenda u8 *res, unsigned long bufsize) 1692afdad616SClaudio Imbrenda { 1693afdad616SClaudio Imbrenda unsigned long pgstev, hva, cur_gfn = args->start_gfn; 1694afdad616SClaudio Imbrenda 1695afdad616SClaudio Imbrenda args->count = 0; 1696afdad616SClaudio Imbrenda while (args->count < bufsize) { 1697afdad616SClaudio Imbrenda hva = gfn_to_hva(kvm, cur_gfn); 1698afdad616SClaudio Imbrenda /* 1699afdad616SClaudio Imbrenda * We return an error if the first value was invalid, but we 1700afdad616SClaudio Imbrenda * return successfully if at least one value was copied. 1701afdad616SClaudio Imbrenda */ 1702afdad616SClaudio Imbrenda if (kvm_is_error_hva(hva)) 1703afdad616SClaudio Imbrenda return args->count ? 0 : -EFAULT; 1704afdad616SClaudio Imbrenda if (get_pgste(kvm->mm, hva, &pgstev) < 0) 1705afdad616SClaudio Imbrenda pgstev = 0; 1706afdad616SClaudio Imbrenda res[args->count++] = (pgstev >> 24) & 0x43; 1707afdad616SClaudio Imbrenda cur_gfn++; 1708afdad616SClaudio Imbrenda } 1709afdad616SClaudio Imbrenda 1710afdad616SClaudio Imbrenda return 0; 1711afdad616SClaudio Imbrenda } 1712afdad616SClaudio Imbrenda 1713afdad616SClaudio Imbrenda static unsigned long kvm_s390_next_dirty_cmma(struct kvm_memslots *slots, 1714afdad616SClaudio Imbrenda unsigned long cur_gfn) 1715afdad616SClaudio Imbrenda { 1716afdad616SClaudio Imbrenda int slotidx = gfn_to_memslot_approx(slots, cur_gfn); 1717afdad616SClaudio Imbrenda struct kvm_memory_slot *ms = slots->memslots + slotidx; 1718afdad616SClaudio Imbrenda unsigned long ofs = cur_gfn - ms->base_gfn; 1719afdad616SClaudio Imbrenda 1720afdad616SClaudio Imbrenda if (ms->base_gfn + ms->npages <= cur_gfn) { 1721afdad616SClaudio Imbrenda slotidx--; 1722afdad616SClaudio Imbrenda /* If we are above the highest slot, wrap around */ 1723afdad616SClaudio Imbrenda if (slotidx < 0) 1724afdad616SClaudio Imbrenda slotidx = slots->used_slots - 1; 1725afdad616SClaudio Imbrenda 1726afdad616SClaudio Imbrenda ms = slots->memslots + slotidx; 1727afdad616SClaudio Imbrenda ofs = 0; 1728afdad616SClaudio Imbrenda } 1729afdad616SClaudio Imbrenda ofs = find_next_bit(kvm_second_dirty_bitmap(ms), ms->npages, ofs); 1730afdad616SClaudio Imbrenda while ((slotidx > 0) && (ofs >= ms->npages)) { 1731afdad616SClaudio Imbrenda slotidx--; 1732afdad616SClaudio Imbrenda ms = slots->memslots + slotidx; 1733afdad616SClaudio Imbrenda ofs = find_next_bit(kvm_second_dirty_bitmap(ms), ms->npages, 0); 1734afdad616SClaudio Imbrenda } 1735afdad616SClaudio Imbrenda return ms->base_gfn + ofs; 1736afdad616SClaudio Imbrenda } 1737afdad616SClaudio Imbrenda 1738afdad616SClaudio Imbrenda static int kvm_s390_get_cmma(struct kvm *kvm, struct kvm_s390_cmma_log *args, 1739afdad616SClaudio Imbrenda u8 *res, unsigned long bufsize) 1740afdad616SClaudio Imbrenda { 1741afdad616SClaudio Imbrenda unsigned long mem_end, cur_gfn, next_gfn, hva, pgstev; 1742afdad616SClaudio Imbrenda struct kvm_memslots *slots = kvm_memslots(kvm); 1743afdad616SClaudio Imbrenda struct kvm_memory_slot *ms; 1744afdad616SClaudio Imbrenda 1745afdad616SClaudio Imbrenda cur_gfn = kvm_s390_next_dirty_cmma(slots, args->start_gfn); 1746afdad616SClaudio Imbrenda ms = gfn_to_memslot(kvm, cur_gfn); 1747afdad616SClaudio Imbrenda args->count = 0; 1748afdad616SClaudio Imbrenda args->start_gfn = cur_gfn; 1749afdad616SClaudio Imbrenda if (!ms) 1750afdad616SClaudio Imbrenda return 0; 1751afdad616SClaudio Imbrenda next_gfn = kvm_s390_next_dirty_cmma(slots, cur_gfn + 1); 1752afdad616SClaudio Imbrenda mem_end = slots->memslots[0].base_gfn + slots->memslots[0].npages; 1753afdad616SClaudio Imbrenda 1754afdad616SClaudio Imbrenda while (args->count < bufsize) { 1755afdad616SClaudio Imbrenda hva = gfn_to_hva(kvm, cur_gfn); 1756afdad616SClaudio Imbrenda if (kvm_is_error_hva(hva)) 1757afdad616SClaudio Imbrenda return 0; 1758afdad616SClaudio Imbrenda /* Decrement only if we actually flipped the bit to 0 */ 1759afdad616SClaudio Imbrenda if (test_and_clear_bit(cur_gfn - ms->base_gfn, kvm_second_dirty_bitmap(ms))) 1760afdad616SClaudio Imbrenda atomic64_dec(&kvm->arch.cmma_dirty_pages); 1761afdad616SClaudio Imbrenda if (get_pgste(kvm->mm, hva, &pgstev) < 0) 1762afdad616SClaudio Imbrenda pgstev = 0; 1763afdad616SClaudio Imbrenda /* Save the value */ 1764afdad616SClaudio Imbrenda res[args->count++] = (pgstev >> 24) & 0x43; 1765afdad616SClaudio Imbrenda /* If the next bit is too far away, stop. */ 1766afdad616SClaudio Imbrenda if (next_gfn > cur_gfn + KVM_S390_MAX_BIT_DISTANCE) 1767afdad616SClaudio Imbrenda return 0; 1768afdad616SClaudio Imbrenda /* If we reached the previous "next", find the next one */ 1769afdad616SClaudio Imbrenda if (cur_gfn == next_gfn) 1770afdad616SClaudio Imbrenda next_gfn = kvm_s390_next_dirty_cmma(slots, cur_gfn + 1); 1771afdad616SClaudio Imbrenda /* Reached the end of memory or of the buffer, stop */ 1772afdad616SClaudio Imbrenda if ((next_gfn >= mem_end) || 1773afdad616SClaudio Imbrenda (next_gfn - args->start_gfn >= bufsize)) 1774afdad616SClaudio Imbrenda return 0; 1775afdad616SClaudio Imbrenda cur_gfn++; 1776afdad616SClaudio Imbrenda /* Reached the end of the current memslot, take the next one. */ 1777afdad616SClaudio Imbrenda if (cur_gfn - ms->base_gfn >= ms->npages) { 1778afdad616SClaudio Imbrenda ms = gfn_to_memslot(kvm, cur_gfn); 1779afdad616SClaudio Imbrenda if (!ms) 1780afdad616SClaudio Imbrenda return 0; 1781afdad616SClaudio Imbrenda } 1782afdad616SClaudio Imbrenda } 1783afdad616SClaudio Imbrenda return 0; 1784afdad616SClaudio Imbrenda } 1785afdad616SClaudio Imbrenda 1786afdad616SClaudio Imbrenda /* 17874036e387SClaudio Imbrenda * This function searches for the next page with dirty CMMA attributes, and 17884036e387SClaudio Imbrenda * saves the attributes in the buffer up to either the end of the buffer or 17894036e387SClaudio Imbrenda * until a block of at least KVM_S390_MAX_BIT_DISTANCE clean bits is found; 17904036e387SClaudio Imbrenda * no trailing clean bytes are saved. 17914036e387SClaudio Imbrenda * In case no dirty bits were found, or if CMMA was not enabled or used, the 17924036e387SClaudio Imbrenda * output buffer will indicate 0 as length. 17934036e387SClaudio Imbrenda */ 17944036e387SClaudio Imbrenda static int kvm_s390_get_cmma_bits(struct kvm *kvm, 17954036e387SClaudio Imbrenda struct kvm_s390_cmma_log *args) 17964036e387SClaudio Imbrenda { 1797afdad616SClaudio Imbrenda unsigned long bufsize; 1798afdad616SClaudio Imbrenda int srcu_idx, peek, ret; 1799afdad616SClaudio Imbrenda u8 *values; 18004036e387SClaudio Imbrenda 1801afdad616SClaudio Imbrenda if (!kvm->arch.use_cmma) 18024036e387SClaudio Imbrenda return -ENXIO; 18034036e387SClaudio Imbrenda /* Invalid/unsupported flags were specified */ 18044036e387SClaudio Imbrenda if (args->flags & ~KVM_S390_CMMA_PEEK) 18054036e387SClaudio Imbrenda return -EINVAL; 18064036e387SClaudio Imbrenda /* Migration mode query, and we are not doing a migration */ 18074036e387SClaudio Imbrenda peek = !!(args->flags & KVM_S390_CMMA_PEEK); 1808afdad616SClaudio Imbrenda if (!peek && !kvm->arch.migration_mode) 18094036e387SClaudio Imbrenda return -EINVAL; 18104036e387SClaudio Imbrenda /* CMMA is disabled or was not used, or the buffer has length zero */ 18114036e387SClaudio Imbrenda bufsize = min(args->count, KVM_S390_CMMA_SIZE_MAX); 1812c9f0a2b8SJanosch Frank if (!bufsize || !kvm->mm->context.uses_cmm) { 18134036e387SClaudio Imbrenda memset(args, 0, sizeof(*args)); 18144036e387SClaudio Imbrenda return 0; 18154036e387SClaudio Imbrenda } 18164036e387SClaudio Imbrenda /* We are not peeking, and there are no dirty pages */ 1817afdad616SClaudio Imbrenda if (!peek && !atomic64_read(&kvm->arch.cmma_dirty_pages)) { 18184036e387SClaudio Imbrenda memset(args, 0, sizeof(*args)); 18194036e387SClaudio Imbrenda return 0; 18204036e387SClaudio Imbrenda } 18214036e387SClaudio Imbrenda 1822afdad616SClaudio Imbrenda values = vmalloc(bufsize); 1823afdad616SClaudio Imbrenda if (!values) 18244036e387SClaudio Imbrenda return -ENOMEM; 18254036e387SClaudio Imbrenda 18264036e387SClaudio Imbrenda down_read(&kvm->mm->mmap_sem); 18274036e387SClaudio Imbrenda srcu_idx = srcu_read_lock(&kvm->srcu); 1828afdad616SClaudio Imbrenda if (peek) 1829afdad616SClaudio Imbrenda ret = kvm_s390_peek_cmma(kvm, args, values, bufsize); 1830afdad616SClaudio Imbrenda else 1831afdad616SClaudio Imbrenda ret = kvm_s390_get_cmma(kvm, args, values, bufsize); 18324036e387SClaudio Imbrenda srcu_read_unlock(&kvm->srcu, srcu_idx); 18334036e387SClaudio Imbrenda up_read(&kvm->mm->mmap_sem); 18344036e387SClaudio Imbrenda 1835afdad616SClaudio Imbrenda if (kvm->arch.migration_mode) 1836afdad616SClaudio Imbrenda args->remaining = atomic64_read(&kvm->arch.cmma_dirty_pages); 1837afdad616SClaudio Imbrenda else 1838afdad616SClaudio Imbrenda args->remaining = 0; 18394036e387SClaudio Imbrenda 1840afdad616SClaudio Imbrenda if (copy_to_user((void __user *)args->values, values, args->count)) 1841afdad616SClaudio Imbrenda ret = -EFAULT; 1842afdad616SClaudio Imbrenda 1843afdad616SClaudio Imbrenda vfree(values); 1844afdad616SClaudio Imbrenda return ret; 18454036e387SClaudio Imbrenda } 18464036e387SClaudio Imbrenda 18474036e387SClaudio Imbrenda /* 18484036e387SClaudio Imbrenda * This function sets the CMMA attributes for the given pages. If the input 18494036e387SClaudio Imbrenda * buffer has zero length, no action is taken, otherwise the attributes are 1850c9f0a2b8SJanosch Frank * set and the mm->context.uses_cmm flag is set. 18514036e387SClaudio Imbrenda */ 18524036e387SClaudio Imbrenda static int kvm_s390_set_cmma_bits(struct kvm *kvm, 18534036e387SClaudio Imbrenda const struct kvm_s390_cmma_log *args) 18544036e387SClaudio Imbrenda { 18554036e387SClaudio Imbrenda unsigned long hva, mask, pgstev, i; 18564036e387SClaudio Imbrenda uint8_t *bits; 18574036e387SClaudio Imbrenda int srcu_idx, r = 0; 18584036e387SClaudio Imbrenda 18594036e387SClaudio Imbrenda mask = args->mask; 18604036e387SClaudio Imbrenda 18614036e387SClaudio Imbrenda if (!kvm->arch.use_cmma) 18624036e387SClaudio Imbrenda return -ENXIO; 18634036e387SClaudio Imbrenda /* invalid/unsupported flags */ 18644036e387SClaudio Imbrenda if (args->flags != 0) 18654036e387SClaudio Imbrenda return -EINVAL; 18664036e387SClaudio Imbrenda /* Enforce sane limit on memory allocation */ 18674036e387SClaudio Imbrenda if (args->count > KVM_S390_CMMA_SIZE_MAX) 18684036e387SClaudio Imbrenda return -EINVAL; 18694036e387SClaudio Imbrenda /* Nothing to do */ 18704036e387SClaudio Imbrenda if (args->count == 0) 18714036e387SClaudio Imbrenda return 0; 18724036e387SClaudio Imbrenda 187342bc47b3SKees Cook bits = vmalloc(array_size(sizeof(*bits), args->count)); 18744036e387SClaudio Imbrenda if (!bits) 18754036e387SClaudio Imbrenda return -ENOMEM; 18764036e387SClaudio Imbrenda 18774036e387SClaudio Imbrenda r = copy_from_user(bits, (void __user *)args->values, args->count); 18784036e387SClaudio Imbrenda if (r) { 18794036e387SClaudio Imbrenda r = -EFAULT; 18804036e387SClaudio Imbrenda goto out; 18814036e387SClaudio Imbrenda } 18824036e387SClaudio Imbrenda 18834036e387SClaudio Imbrenda down_read(&kvm->mm->mmap_sem); 18844036e387SClaudio Imbrenda srcu_idx = srcu_read_lock(&kvm->srcu); 18854036e387SClaudio Imbrenda for (i = 0; i < args->count; i++) { 18864036e387SClaudio Imbrenda hva = gfn_to_hva(kvm, args->start_gfn + i); 18874036e387SClaudio Imbrenda if (kvm_is_error_hva(hva)) { 18884036e387SClaudio Imbrenda r = -EFAULT; 18894036e387SClaudio Imbrenda break; 18904036e387SClaudio Imbrenda } 18914036e387SClaudio Imbrenda 18924036e387SClaudio Imbrenda pgstev = bits[i]; 18934036e387SClaudio Imbrenda pgstev = pgstev << 24; 18941bab1c02SClaudio Imbrenda mask &= _PGSTE_GPS_USAGE_MASK | _PGSTE_GPS_NODAT; 18954036e387SClaudio Imbrenda set_pgste_bits(kvm->mm, hva, mask, pgstev); 18964036e387SClaudio Imbrenda } 18974036e387SClaudio Imbrenda srcu_read_unlock(&kvm->srcu, srcu_idx); 18984036e387SClaudio Imbrenda up_read(&kvm->mm->mmap_sem); 18994036e387SClaudio Imbrenda 1900c9f0a2b8SJanosch Frank if (!kvm->mm->context.uses_cmm) { 19014036e387SClaudio Imbrenda down_write(&kvm->mm->mmap_sem); 1902c9f0a2b8SJanosch Frank kvm->mm->context.uses_cmm = 1; 19034036e387SClaudio Imbrenda up_write(&kvm->mm->mmap_sem); 19044036e387SClaudio Imbrenda } 19054036e387SClaudio Imbrenda out: 19064036e387SClaudio Imbrenda vfree(bits); 19074036e387SClaudio Imbrenda return r; 19084036e387SClaudio Imbrenda } 19094036e387SClaudio Imbrenda 1910b0c632dbSHeiko Carstens long kvm_arch_vm_ioctl(struct file *filp, 1911b0c632dbSHeiko Carstens unsigned int ioctl, unsigned long arg) 1912b0c632dbSHeiko Carstens { 1913b0c632dbSHeiko Carstens struct kvm *kvm = filp->private_data; 1914b0c632dbSHeiko Carstens void __user *argp = (void __user *)arg; 1915f2061656SDominik Dingel struct kvm_device_attr attr; 1916b0c632dbSHeiko Carstens int r; 1917b0c632dbSHeiko Carstens 1918b0c632dbSHeiko Carstens switch (ioctl) { 1919ba5c1e9bSCarsten Otte case KVM_S390_INTERRUPT: { 1920ba5c1e9bSCarsten Otte struct kvm_s390_interrupt s390int; 1921ba5c1e9bSCarsten Otte 1922ba5c1e9bSCarsten Otte r = -EFAULT; 1923ba5c1e9bSCarsten Otte if (copy_from_user(&s390int, argp, sizeof(s390int))) 1924ba5c1e9bSCarsten Otte break; 1925ba5c1e9bSCarsten Otte r = kvm_s390_inject_vm(kvm, &s390int); 1926ba5c1e9bSCarsten Otte break; 1927ba5c1e9bSCarsten Otte } 1928d938dc55SCornelia Huck case KVM_ENABLE_CAP: { 1929d938dc55SCornelia Huck struct kvm_enable_cap cap; 1930d938dc55SCornelia Huck r = -EFAULT; 1931d938dc55SCornelia Huck if (copy_from_user(&cap, argp, sizeof(cap))) 1932d938dc55SCornelia Huck break; 1933d938dc55SCornelia Huck r = kvm_vm_ioctl_enable_cap(kvm, &cap); 1934d938dc55SCornelia Huck break; 1935d938dc55SCornelia Huck } 193684223598SCornelia Huck case KVM_CREATE_IRQCHIP: { 193784223598SCornelia Huck struct kvm_irq_routing_entry routing; 193884223598SCornelia Huck 193984223598SCornelia Huck r = -EINVAL; 194084223598SCornelia Huck if (kvm->arch.use_irqchip) { 194184223598SCornelia Huck /* Set up dummy routing. */ 194284223598SCornelia Huck memset(&routing, 0, sizeof(routing)); 1943152b2839SNicholas Krause r = kvm_set_irq_routing(kvm, &routing, 0, 0); 194484223598SCornelia Huck } 194584223598SCornelia Huck break; 194684223598SCornelia Huck } 1947f2061656SDominik Dingel case KVM_SET_DEVICE_ATTR: { 1948f2061656SDominik Dingel r = -EFAULT; 1949f2061656SDominik Dingel if (copy_from_user(&attr, (void __user *)arg, sizeof(attr))) 1950f2061656SDominik Dingel break; 1951f2061656SDominik Dingel r = kvm_s390_vm_set_attr(kvm, &attr); 1952f2061656SDominik Dingel break; 1953f2061656SDominik Dingel } 1954f2061656SDominik Dingel case KVM_GET_DEVICE_ATTR: { 1955f2061656SDominik Dingel r = -EFAULT; 1956f2061656SDominik Dingel if (copy_from_user(&attr, (void __user *)arg, sizeof(attr))) 1957f2061656SDominik Dingel break; 1958f2061656SDominik Dingel r = kvm_s390_vm_get_attr(kvm, &attr); 1959f2061656SDominik Dingel break; 1960f2061656SDominik Dingel } 1961f2061656SDominik Dingel case KVM_HAS_DEVICE_ATTR: { 1962f2061656SDominik Dingel r = -EFAULT; 1963f2061656SDominik Dingel if (copy_from_user(&attr, (void __user *)arg, sizeof(attr))) 1964f2061656SDominik Dingel break; 1965f2061656SDominik Dingel r = kvm_s390_vm_has_attr(kvm, &attr); 1966f2061656SDominik Dingel break; 1967f2061656SDominik Dingel } 196830ee2a98SJason J. Herne case KVM_S390_GET_SKEYS: { 196930ee2a98SJason J. Herne struct kvm_s390_skeys args; 197030ee2a98SJason J. Herne 197130ee2a98SJason J. Herne r = -EFAULT; 197230ee2a98SJason J. Herne if (copy_from_user(&args, argp, 197330ee2a98SJason J. Herne sizeof(struct kvm_s390_skeys))) 197430ee2a98SJason J. Herne break; 197530ee2a98SJason J. Herne r = kvm_s390_get_skeys(kvm, &args); 197630ee2a98SJason J. Herne break; 197730ee2a98SJason J. Herne } 197830ee2a98SJason J. Herne case KVM_S390_SET_SKEYS: { 197930ee2a98SJason J. Herne struct kvm_s390_skeys args; 198030ee2a98SJason J. Herne 198130ee2a98SJason J. Herne r = -EFAULT; 198230ee2a98SJason J. Herne if (copy_from_user(&args, argp, 198330ee2a98SJason J. Herne sizeof(struct kvm_s390_skeys))) 198430ee2a98SJason J. Herne break; 198530ee2a98SJason J. Herne r = kvm_s390_set_skeys(kvm, &args); 198630ee2a98SJason J. Herne break; 198730ee2a98SJason J. Herne } 19884036e387SClaudio Imbrenda case KVM_S390_GET_CMMA_BITS: { 19894036e387SClaudio Imbrenda struct kvm_s390_cmma_log args; 19904036e387SClaudio Imbrenda 19914036e387SClaudio Imbrenda r = -EFAULT; 19924036e387SClaudio Imbrenda if (copy_from_user(&args, argp, sizeof(args))) 19934036e387SClaudio Imbrenda break; 19941de1ea7eSChristian Borntraeger mutex_lock(&kvm->slots_lock); 19954036e387SClaudio Imbrenda r = kvm_s390_get_cmma_bits(kvm, &args); 19961de1ea7eSChristian Borntraeger mutex_unlock(&kvm->slots_lock); 19974036e387SClaudio Imbrenda if (!r) { 19984036e387SClaudio Imbrenda r = copy_to_user(argp, &args, sizeof(args)); 19994036e387SClaudio Imbrenda if (r) 20004036e387SClaudio Imbrenda r = -EFAULT; 20014036e387SClaudio Imbrenda } 20024036e387SClaudio Imbrenda break; 20034036e387SClaudio Imbrenda } 20044036e387SClaudio Imbrenda case KVM_S390_SET_CMMA_BITS: { 20054036e387SClaudio Imbrenda struct kvm_s390_cmma_log args; 20064036e387SClaudio Imbrenda 20074036e387SClaudio Imbrenda r = -EFAULT; 20084036e387SClaudio Imbrenda if (copy_from_user(&args, argp, sizeof(args))) 20094036e387SClaudio Imbrenda break; 20101de1ea7eSChristian Borntraeger mutex_lock(&kvm->slots_lock); 20114036e387SClaudio Imbrenda r = kvm_s390_set_cmma_bits(kvm, &args); 20121de1ea7eSChristian Borntraeger mutex_unlock(&kvm->slots_lock); 20134036e387SClaudio Imbrenda break; 20144036e387SClaudio Imbrenda } 2015b0c632dbSHeiko Carstens default: 2016367e1319SAvi Kivity r = -ENOTTY; 2017b0c632dbSHeiko Carstens } 2018b0c632dbSHeiko Carstens 2019b0c632dbSHeiko Carstens return r; 2020b0c632dbSHeiko Carstens } 2021b0c632dbSHeiko Carstens 202245c9b47cSTony Krowiak static int kvm_s390_apxa_installed(void) 202345c9b47cSTony Krowiak { 2024e585b24aSTony Krowiak struct ap_config_info info; 202545c9b47cSTony Krowiak 2026e585b24aSTony Krowiak if (ap_instructions_available()) { 2027e585b24aSTony Krowiak if (ap_qci(&info) == 0) 2028e585b24aSTony Krowiak return info.apxa; 202945c9b47cSTony Krowiak } 203045c9b47cSTony Krowiak 203145c9b47cSTony Krowiak return 0; 203245c9b47cSTony Krowiak } 203345c9b47cSTony Krowiak 2034e585b24aSTony Krowiak /* 2035e585b24aSTony Krowiak * The format of the crypto control block (CRYCB) is specified in the 3 low 2036e585b24aSTony Krowiak * order bits of the CRYCB designation (CRYCBD) field as follows: 2037e585b24aSTony Krowiak * Format 0: Neither the message security assist extension 3 (MSAX3) nor the 2038e585b24aSTony Krowiak * AP extended addressing (APXA) facility are installed. 2039e585b24aSTony Krowiak * Format 1: The APXA facility is not installed but the MSAX3 facility is. 2040e585b24aSTony Krowiak * Format 2: Both the APXA and MSAX3 facilities are installed 2041e585b24aSTony Krowiak */ 204245c9b47cSTony Krowiak static void kvm_s390_set_crycb_format(struct kvm *kvm) 204345c9b47cSTony Krowiak { 204445c9b47cSTony Krowiak kvm->arch.crypto.crycbd = (__u32)(unsigned long) kvm->arch.crypto.crycb; 204545c9b47cSTony Krowiak 2046e585b24aSTony Krowiak /* Clear the CRYCB format bits - i.e., set format 0 by default */ 2047e585b24aSTony Krowiak kvm->arch.crypto.crycbd &= ~(CRYCB_FORMAT_MASK); 2048e585b24aSTony Krowiak 2049e585b24aSTony Krowiak /* Check whether MSAX3 is installed */ 2050e585b24aSTony Krowiak if (!test_kvm_facility(kvm, 76)) 2051e585b24aSTony Krowiak return; 2052e585b24aSTony Krowiak 205345c9b47cSTony Krowiak if (kvm_s390_apxa_installed()) 205445c9b47cSTony Krowiak kvm->arch.crypto.crycbd |= CRYCB_FORMAT2; 205545c9b47cSTony Krowiak else 205645c9b47cSTony Krowiak kvm->arch.crypto.crycbd |= CRYCB_FORMAT1; 205745c9b47cSTony Krowiak } 205845c9b47cSTony Krowiak 205942104598STony Krowiak void kvm_arch_crypto_clear_masks(struct kvm *kvm) 206042104598STony Krowiak { 206142104598STony Krowiak mutex_lock(&kvm->lock); 206242104598STony Krowiak kvm_s390_vcpu_block_all(kvm); 206342104598STony Krowiak 206442104598STony Krowiak memset(&kvm->arch.crypto.crycb->apcb0, 0, 206542104598STony Krowiak sizeof(kvm->arch.crypto.crycb->apcb0)); 206642104598STony Krowiak memset(&kvm->arch.crypto.crycb->apcb1, 0, 206742104598STony Krowiak sizeof(kvm->arch.crypto.crycb->apcb1)); 206842104598STony Krowiak 20696cc571b1SPierre Morel /* recreate the shadow crycb for each vcpu */ 20706cc571b1SPierre Morel kvm_s390_sync_request_broadcast(kvm, KVM_REQ_VSIE_RESTART); 207142104598STony Krowiak kvm_s390_vcpu_unblock_all(kvm); 207242104598STony Krowiak mutex_unlock(&kvm->lock); 207342104598STony Krowiak } 207442104598STony Krowiak EXPORT_SYMBOL_GPL(kvm_arch_crypto_clear_masks); 207542104598STony Krowiak 20769bb0ec09SDavid Hildenbrand static u64 kvm_s390_get_initial_cpuid(void) 20779d8d5786SMichael Mueller { 20789bb0ec09SDavid Hildenbrand struct cpuid cpuid; 20799bb0ec09SDavid Hildenbrand 20809bb0ec09SDavid Hildenbrand get_cpu_id(&cpuid); 20819bb0ec09SDavid Hildenbrand cpuid.version = 0xff; 20829bb0ec09SDavid Hildenbrand return *((u64 *) &cpuid); 20839d8d5786SMichael Mueller } 20849d8d5786SMichael Mueller 2085c54f0d6aSDavid Hildenbrand static void kvm_s390_crypto_init(struct kvm *kvm) 20865102ee87STony Krowiak { 2087c54f0d6aSDavid Hildenbrand kvm->arch.crypto.crycb = &kvm->arch.sie_page2->crycb; 208845c9b47cSTony Krowiak kvm_s390_set_crycb_format(kvm); 20895102ee87STony Krowiak 2090e585b24aSTony Krowiak if (!test_kvm_facility(kvm, 76)) 2091e585b24aSTony Krowiak return; 2092e585b24aSTony Krowiak 2093ed6f76b4STony Krowiak /* Enable AES/DEA protected key functions by default */ 2094ed6f76b4STony Krowiak kvm->arch.crypto.aes_kw = 1; 2095ed6f76b4STony Krowiak kvm->arch.crypto.dea_kw = 1; 2096ed6f76b4STony Krowiak get_random_bytes(kvm->arch.crypto.crycb->aes_wrapping_key_mask, 2097ed6f76b4STony Krowiak sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask)); 2098ed6f76b4STony Krowiak get_random_bytes(kvm->arch.crypto.crycb->dea_wrapping_key_mask, 2099ed6f76b4STony Krowiak sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask)); 21005102ee87STony Krowiak } 21015102ee87STony Krowiak 21027d43bafcSEugene (jno) Dvurechenski static void sca_dispose(struct kvm *kvm) 21037d43bafcSEugene (jno) Dvurechenski { 21047d43bafcSEugene (jno) Dvurechenski if (kvm->arch.use_esca) 21055e044315SEugene (jno) Dvurechenski free_pages_exact(kvm->arch.sca, sizeof(struct esca_block)); 21067d43bafcSEugene (jno) Dvurechenski else 21077d43bafcSEugene (jno) Dvurechenski free_page((unsigned long)(kvm->arch.sca)); 21087d43bafcSEugene (jno) Dvurechenski kvm->arch.sca = NULL; 21097d43bafcSEugene (jno) Dvurechenski } 21107d43bafcSEugene (jno) Dvurechenski 2111e08b9637SCarsten Otte int kvm_arch_init_vm(struct kvm *kvm, unsigned long type) 2112b0c632dbSHeiko Carstens { 211376a6dd72SDavid Hildenbrand gfp_t alloc_flags = GFP_KERNEL; 21149d8d5786SMichael Mueller int i, rc; 2115b0c632dbSHeiko Carstens char debug_name[16]; 2116f6c137ffSChristian Borntraeger static unsigned long sca_offset; 2117b0c632dbSHeiko Carstens 2118e08b9637SCarsten Otte rc = -EINVAL; 2119e08b9637SCarsten Otte #ifdef CONFIG_KVM_S390_UCONTROL 2120e08b9637SCarsten Otte if (type & ~KVM_VM_S390_UCONTROL) 2121e08b9637SCarsten Otte goto out_err; 2122e08b9637SCarsten Otte if ((type & KVM_VM_S390_UCONTROL) && (!capable(CAP_SYS_ADMIN))) 2123e08b9637SCarsten Otte goto out_err; 2124e08b9637SCarsten Otte #else 2125e08b9637SCarsten Otte if (type) 2126e08b9637SCarsten Otte goto out_err; 2127e08b9637SCarsten Otte #endif 2128e08b9637SCarsten Otte 2129b0c632dbSHeiko Carstens rc = s390_enable_sie(); 2130b0c632dbSHeiko Carstens if (rc) 2131d89f5effSJan Kiszka goto out_err; 2132b0c632dbSHeiko Carstens 2133b290411aSCarsten Otte rc = -ENOMEM; 2134b290411aSCarsten Otte 213576a6dd72SDavid Hildenbrand if (!sclp.has_64bscao) 213676a6dd72SDavid Hildenbrand alloc_flags |= GFP_DMA; 21375e044315SEugene (jno) Dvurechenski rwlock_init(&kvm->arch.sca_lock); 21389ac96d75SDavid Hildenbrand /* start with basic SCA */ 213976a6dd72SDavid Hildenbrand kvm->arch.sca = (struct bsca_block *) get_zeroed_page(alloc_flags); 2140b0c632dbSHeiko Carstens if (!kvm->arch.sca) 2141d89f5effSJan Kiszka goto out_err; 2142f6c137ffSChristian Borntraeger spin_lock(&kvm_lock); 2143c5c2c393SDavid Hildenbrand sca_offset += 16; 2144bc784cceSEugene (jno) Dvurechenski if (sca_offset + sizeof(struct bsca_block) > PAGE_SIZE) 2145c5c2c393SDavid Hildenbrand sca_offset = 0; 2146bc784cceSEugene (jno) Dvurechenski kvm->arch.sca = (struct bsca_block *) 2147bc784cceSEugene (jno) Dvurechenski ((char *) kvm->arch.sca + sca_offset); 2148f6c137ffSChristian Borntraeger spin_unlock(&kvm_lock); 2149b0c632dbSHeiko Carstens 2150b0c632dbSHeiko Carstens sprintf(debug_name, "kvm-%u", current->pid); 2151b0c632dbSHeiko Carstens 21521cb9cf72SChristian Borntraeger kvm->arch.dbf = debug_register(debug_name, 32, 1, 7 * sizeof(long)); 2153b0c632dbSHeiko Carstens if (!kvm->arch.dbf) 215440f5b735SDominik Dingel goto out_err; 2155b0c632dbSHeiko Carstens 215619114bebSMichael Mueller BUILD_BUG_ON(sizeof(struct sie_page2) != 4096); 2157c54f0d6aSDavid Hildenbrand kvm->arch.sie_page2 = 2158c54f0d6aSDavid Hildenbrand (struct sie_page2 *) get_zeroed_page(GFP_KERNEL | GFP_DMA); 2159c54f0d6aSDavid Hildenbrand if (!kvm->arch.sie_page2) 216040f5b735SDominik Dingel goto out_err; 21619d8d5786SMichael Mueller 2162c54f0d6aSDavid Hildenbrand kvm->arch.model.fac_list = kvm->arch.sie_page2->fac_list; 2163c3b9e3e1SChristian Borntraeger 2164c3b9e3e1SChristian Borntraeger for (i = 0; i < kvm_s390_fac_size(); i++) { 2165c3b9e3e1SChristian Borntraeger kvm->arch.model.fac_mask[i] = S390_lowcore.stfle_fac_list[i] & 2166c3b9e3e1SChristian Borntraeger (kvm_s390_fac_base[i] | 2167c3b9e3e1SChristian Borntraeger kvm_s390_fac_ext[i]); 2168c3b9e3e1SChristian Borntraeger kvm->arch.model.fac_list[i] = S390_lowcore.stfle_fac_list[i] & 2169c3b9e3e1SChristian Borntraeger kvm_s390_fac_base[i]; 2170c3b9e3e1SChristian Borntraeger } 2171981467c9SMichael Mueller 21721935222dSDavid Hildenbrand /* we are always in czam mode - even on pre z14 machines */ 21731935222dSDavid Hildenbrand set_kvm_facility(kvm->arch.model.fac_mask, 138); 21741935222dSDavid Hildenbrand set_kvm_facility(kvm->arch.model.fac_list, 138); 21751935222dSDavid Hildenbrand /* we emulate STHYI in kvm */ 217695ca2cb5SJanosch Frank set_kvm_facility(kvm->arch.model.fac_mask, 74); 217795ca2cb5SJanosch Frank set_kvm_facility(kvm->arch.model.fac_list, 74); 21781bab1c02SClaudio Imbrenda if (MACHINE_HAS_TLB_GUEST) { 21791bab1c02SClaudio Imbrenda set_kvm_facility(kvm->arch.model.fac_mask, 147); 21801bab1c02SClaudio Imbrenda set_kvm_facility(kvm->arch.model.fac_list, 147); 21811bab1c02SClaudio Imbrenda } 218295ca2cb5SJanosch Frank 21839bb0ec09SDavid Hildenbrand kvm->arch.model.cpuid = kvm_s390_get_initial_cpuid(); 218437c5f6c8SDavid Hildenbrand kvm->arch.model.ibc = sclp.ibc & 0x0fff; 21859d8d5786SMichael Mueller 2186c54f0d6aSDavid Hildenbrand kvm_s390_crypto_init(kvm); 21875102ee87STony Krowiak 218851978393SFei Li mutex_init(&kvm->arch.float_int.ais_lock); 2189ba5c1e9bSCarsten Otte spin_lock_init(&kvm->arch.float_int.lock); 21906d3da241SJens Freimann for (i = 0; i < FIRQ_LIST_COUNT; i++) 21916d3da241SJens Freimann INIT_LIST_HEAD(&kvm->arch.float_int.lists[i]); 21928a242234SHeiko Carstens init_waitqueue_head(&kvm->arch.ipte_wq); 2193a6b7e459SThomas Huth mutex_init(&kvm->arch.ipte_mutex); 2194ba5c1e9bSCarsten Otte 2195b0c632dbSHeiko Carstens debug_register_view(kvm->arch.dbf, &debug_sprintf_view); 219678f26131SChristian Borntraeger VM_EVENT(kvm, 3, "vm created with type %lu", type); 2197b0c632dbSHeiko Carstens 2198e08b9637SCarsten Otte if (type & KVM_VM_S390_UCONTROL) { 2199e08b9637SCarsten Otte kvm->arch.gmap = NULL; 2200a3a92c31SDominik Dingel kvm->arch.mem_limit = KVM_S390_NO_MEM_LIMIT; 2201e08b9637SCarsten Otte } else { 220232e6b236SGuenther Hutzl if (sclp.hamax == U64_MAX) 2203ee71d16dSMartin Schwidefsky kvm->arch.mem_limit = TASK_SIZE_MAX; 220432e6b236SGuenther Hutzl else 2205ee71d16dSMartin Schwidefsky kvm->arch.mem_limit = min_t(unsigned long, TASK_SIZE_MAX, 220632e6b236SGuenther Hutzl sclp.hamax + 1); 22076ea427bbSMartin Schwidefsky kvm->arch.gmap = gmap_create(current->mm, kvm->arch.mem_limit - 1); 2208598841caSCarsten Otte if (!kvm->arch.gmap) 220940f5b735SDominik Dingel goto out_err; 22102c70fe44SChristian Borntraeger kvm->arch.gmap->private = kvm; 221124eb3a82SDominik Dingel kvm->arch.gmap->pfault_enabled = 0; 2212e08b9637SCarsten Otte } 2213fa6b7fe9SCornelia Huck 2214c9f0a2b8SJanosch Frank kvm->arch.use_pfmfi = sclp.has_pfmfi; 221555531b74SJanosch Frank kvm->arch.use_skf = sclp.has_skey; 22168ad35755SDavid Hildenbrand spin_lock_init(&kvm->arch.start_stop_lock); 2217a3508fbeSDavid Hildenbrand kvm_s390_vsie_init(kvm); 2218d7c5cb01SMichael Mueller kvm_s390_gisa_init(kvm); 22198335713aSChristian Borntraeger KVM_EVENT(3, "vm 0x%pK created by pid %u", kvm, current->pid); 22208ad35755SDavid Hildenbrand 2221d89f5effSJan Kiszka return 0; 2222d89f5effSJan Kiszka out_err: 2223c54f0d6aSDavid Hildenbrand free_page((unsigned long)kvm->arch.sie_page2); 222440f5b735SDominik Dingel debug_unregister(kvm->arch.dbf); 22257d43bafcSEugene (jno) Dvurechenski sca_dispose(kvm); 222678f26131SChristian Borntraeger KVM_EVENT(3, "creation of vm failed: %d", rc); 2227d89f5effSJan Kiszka return rc; 2228b0c632dbSHeiko Carstens } 2229b0c632dbSHeiko Carstens 2230235539b4SLuiz Capitulino bool kvm_arch_has_vcpu_debugfs(void) 2231235539b4SLuiz Capitulino { 2232235539b4SLuiz Capitulino return false; 2233235539b4SLuiz Capitulino } 2234235539b4SLuiz Capitulino 2235235539b4SLuiz Capitulino int kvm_arch_create_vcpu_debugfs(struct kvm_vcpu *vcpu) 2236235539b4SLuiz Capitulino { 2237235539b4SLuiz Capitulino return 0; 2238235539b4SLuiz Capitulino } 2239235539b4SLuiz Capitulino 2240d329c035SChristian Borntraeger void kvm_arch_vcpu_destroy(struct kvm_vcpu *vcpu) 2241d329c035SChristian Borntraeger { 2242d329c035SChristian Borntraeger VCPU_EVENT(vcpu, 3, "%s", "free cpu"); 2243ade38c31SCornelia Huck trace_kvm_s390_destroy_vcpu(vcpu->vcpu_id); 224467335e63SChristian Borntraeger kvm_s390_clear_local_irqs(vcpu); 22453c038e6bSDominik Dingel kvm_clear_async_pf_completion_queue(vcpu); 2246bc784cceSEugene (jno) Dvurechenski if (!kvm_is_ucontrol(vcpu->kvm)) 2247a6e2f683SEugene (jno) Dvurechenski sca_del_vcpu(vcpu); 224827e0393fSCarsten Otte 224927e0393fSCarsten Otte if (kvm_is_ucontrol(vcpu->kvm)) 22506ea427bbSMartin Schwidefsky gmap_remove(vcpu->arch.gmap); 225127e0393fSCarsten Otte 2252e6db1d61SDominik Dingel if (vcpu->kvm->arch.use_cmma) 2253b31605c1SDominik Dingel kvm_s390_vcpu_unsetup_cmma(vcpu); 2254d329c035SChristian Borntraeger free_page((unsigned long)(vcpu->arch.sie_block)); 2255b31288faSKonstantin Weitz 22566692cef3SChristian Borntraeger kvm_vcpu_uninit(vcpu); 2257b110feafSMichael Mueller kmem_cache_free(kvm_vcpu_cache, vcpu); 2258d329c035SChristian Borntraeger } 2259d329c035SChristian Borntraeger 2260d329c035SChristian Borntraeger static void kvm_free_vcpus(struct kvm *kvm) 2261d329c035SChristian Borntraeger { 2262d329c035SChristian Borntraeger unsigned int i; 2263988a2caeSGleb Natapov struct kvm_vcpu *vcpu; 2264d329c035SChristian Borntraeger 2265988a2caeSGleb Natapov kvm_for_each_vcpu(i, vcpu, kvm) 2266988a2caeSGleb Natapov kvm_arch_vcpu_destroy(vcpu); 2267988a2caeSGleb Natapov 2268988a2caeSGleb Natapov mutex_lock(&kvm->lock); 2269988a2caeSGleb Natapov for (i = 0; i < atomic_read(&kvm->online_vcpus); i++) 2270d329c035SChristian Borntraeger kvm->vcpus[i] = NULL; 2271988a2caeSGleb Natapov 2272988a2caeSGleb Natapov atomic_set(&kvm->online_vcpus, 0); 2273988a2caeSGleb Natapov mutex_unlock(&kvm->lock); 2274d329c035SChristian Borntraeger } 2275d329c035SChristian Borntraeger 2276b0c632dbSHeiko Carstens void kvm_arch_destroy_vm(struct kvm *kvm) 2277b0c632dbSHeiko Carstens { 2278d329c035SChristian Borntraeger kvm_free_vcpus(kvm); 22797d43bafcSEugene (jno) Dvurechenski sca_dispose(kvm); 2280d329c035SChristian Borntraeger debug_unregister(kvm->arch.dbf); 2281d7c5cb01SMichael Mueller kvm_s390_gisa_destroy(kvm); 2282c54f0d6aSDavid Hildenbrand free_page((unsigned long)kvm->arch.sie_page2); 228327e0393fSCarsten Otte if (!kvm_is_ucontrol(kvm)) 22846ea427bbSMartin Schwidefsky gmap_remove(kvm->arch.gmap); 2285841b91c5SCornelia Huck kvm_s390_destroy_adapters(kvm); 228667335e63SChristian Borntraeger kvm_s390_clear_float_irqs(kvm); 2287a3508fbeSDavid Hildenbrand kvm_s390_vsie_destroy(kvm); 22888335713aSChristian Borntraeger KVM_EVENT(3, "vm 0x%pK destroyed", kvm); 2289b0c632dbSHeiko Carstens } 2290b0c632dbSHeiko Carstens 2291b0c632dbSHeiko Carstens /* Section: vcpu related */ 2292dafd032aSDominik Dingel static int __kvm_ucontrol_vcpu_init(struct kvm_vcpu *vcpu) 2293b0c632dbSHeiko Carstens { 22946ea427bbSMartin Schwidefsky vcpu->arch.gmap = gmap_create(current->mm, -1UL); 229527e0393fSCarsten Otte if (!vcpu->arch.gmap) 229627e0393fSCarsten Otte return -ENOMEM; 22972c70fe44SChristian Borntraeger vcpu->arch.gmap->private = vcpu->kvm; 2298dafd032aSDominik Dingel 229927e0393fSCarsten Otte return 0; 230027e0393fSCarsten Otte } 230127e0393fSCarsten Otte 2302a6e2f683SEugene (jno) Dvurechenski static void sca_del_vcpu(struct kvm_vcpu *vcpu) 2303a6e2f683SEugene (jno) Dvurechenski { 2304a6940674SDavid Hildenbrand if (!kvm_s390_use_sca_entries()) 2305a6940674SDavid Hildenbrand return; 23065e044315SEugene (jno) Dvurechenski read_lock(&vcpu->kvm->arch.sca_lock); 23077d43bafcSEugene (jno) Dvurechenski if (vcpu->kvm->arch.use_esca) { 23087d43bafcSEugene (jno) Dvurechenski struct esca_block *sca = vcpu->kvm->arch.sca; 23097d43bafcSEugene (jno) Dvurechenski 23107d43bafcSEugene (jno) Dvurechenski clear_bit_inv(vcpu->vcpu_id, (unsigned long *) sca->mcn); 23117d43bafcSEugene (jno) Dvurechenski sca->cpu[vcpu->vcpu_id].sda = 0; 23127d43bafcSEugene (jno) Dvurechenski } else { 2313bc784cceSEugene (jno) Dvurechenski struct bsca_block *sca = vcpu->kvm->arch.sca; 2314a6e2f683SEugene (jno) Dvurechenski 2315a6e2f683SEugene (jno) Dvurechenski clear_bit_inv(vcpu->vcpu_id, (unsigned long *) &sca->mcn); 2316a6e2f683SEugene (jno) Dvurechenski sca->cpu[vcpu->vcpu_id].sda = 0; 2317a6e2f683SEugene (jno) Dvurechenski } 23185e044315SEugene (jno) Dvurechenski read_unlock(&vcpu->kvm->arch.sca_lock); 23197d43bafcSEugene (jno) Dvurechenski } 2320a6e2f683SEugene (jno) Dvurechenski 2321eaa78f34SDavid Hildenbrand static void sca_add_vcpu(struct kvm_vcpu *vcpu) 2322a6e2f683SEugene (jno) Dvurechenski { 2323a6940674SDavid Hildenbrand if (!kvm_s390_use_sca_entries()) { 2324a6940674SDavid Hildenbrand struct bsca_block *sca = vcpu->kvm->arch.sca; 2325a6940674SDavid Hildenbrand 2326a6940674SDavid Hildenbrand /* we still need the basic sca for the ipte control */ 2327a6940674SDavid Hildenbrand vcpu->arch.sie_block->scaoh = (__u32)(((__u64)sca) >> 32); 2328a6940674SDavid Hildenbrand vcpu->arch.sie_block->scaol = (__u32)(__u64)sca; 2329f07afa04SDavid Hildenbrand return; 2330a6940674SDavid Hildenbrand } 2331eaa78f34SDavid Hildenbrand read_lock(&vcpu->kvm->arch.sca_lock); 2332eaa78f34SDavid Hildenbrand if (vcpu->kvm->arch.use_esca) { 2333eaa78f34SDavid Hildenbrand struct esca_block *sca = vcpu->kvm->arch.sca; 23347d43bafcSEugene (jno) Dvurechenski 2335eaa78f34SDavid Hildenbrand sca->cpu[vcpu->vcpu_id].sda = (__u64) vcpu->arch.sie_block; 23367d43bafcSEugene (jno) Dvurechenski vcpu->arch.sie_block->scaoh = (__u32)(((__u64)sca) >> 32); 23377d43bafcSEugene (jno) Dvurechenski vcpu->arch.sie_block->scaol = (__u32)(__u64)sca & ~0x3fU; 23380c9d8683SDavid Hildenbrand vcpu->arch.sie_block->ecb2 |= ECB2_ESCA; 2339eaa78f34SDavid Hildenbrand set_bit_inv(vcpu->vcpu_id, (unsigned long *) sca->mcn); 23407d43bafcSEugene (jno) Dvurechenski } else { 2341eaa78f34SDavid Hildenbrand struct bsca_block *sca = vcpu->kvm->arch.sca; 2342a6e2f683SEugene (jno) Dvurechenski 2343eaa78f34SDavid Hildenbrand sca->cpu[vcpu->vcpu_id].sda = (__u64) vcpu->arch.sie_block; 2344a6e2f683SEugene (jno) Dvurechenski vcpu->arch.sie_block->scaoh = (__u32)(((__u64)sca) >> 32); 2345a6e2f683SEugene (jno) Dvurechenski vcpu->arch.sie_block->scaol = (__u32)(__u64)sca; 2346eaa78f34SDavid Hildenbrand set_bit_inv(vcpu->vcpu_id, (unsigned long *) &sca->mcn); 2347a6e2f683SEugene (jno) Dvurechenski } 2348eaa78f34SDavid Hildenbrand read_unlock(&vcpu->kvm->arch.sca_lock); 23495e044315SEugene (jno) Dvurechenski } 23505e044315SEugene (jno) Dvurechenski 23515e044315SEugene (jno) Dvurechenski /* Basic SCA to Extended SCA data copy routines */ 23525e044315SEugene (jno) Dvurechenski static inline void sca_copy_entry(struct esca_entry *d, struct bsca_entry *s) 23535e044315SEugene (jno) Dvurechenski { 23545e044315SEugene (jno) Dvurechenski d->sda = s->sda; 23555e044315SEugene (jno) Dvurechenski d->sigp_ctrl.c = s->sigp_ctrl.c; 23565e044315SEugene (jno) Dvurechenski d->sigp_ctrl.scn = s->sigp_ctrl.scn; 23575e044315SEugene (jno) Dvurechenski } 23585e044315SEugene (jno) Dvurechenski 23595e044315SEugene (jno) Dvurechenski static void sca_copy_b_to_e(struct esca_block *d, struct bsca_block *s) 23605e044315SEugene (jno) Dvurechenski { 23615e044315SEugene (jno) Dvurechenski int i; 23625e044315SEugene (jno) Dvurechenski 23635e044315SEugene (jno) Dvurechenski d->ipte_control = s->ipte_control; 23645e044315SEugene (jno) Dvurechenski d->mcn[0] = s->mcn; 23655e044315SEugene (jno) Dvurechenski for (i = 0; i < KVM_S390_BSCA_CPU_SLOTS; i++) 23665e044315SEugene (jno) Dvurechenski sca_copy_entry(&d->cpu[i], &s->cpu[i]); 23675e044315SEugene (jno) Dvurechenski } 23685e044315SEugene (jno) Dvurechenski 23695e044315SEugene (jno) Dvurechenski static int sca_switch_to_extended(struct kvm *kvm) 23705e044315SEugene (jno) Dvurechenski { 23715e044315SEugene (jno) Dvurechenski struct bsca_block *old_sca = kvm->arch.sca; 23725e044315SEugene (jno) Dvurechenski struct esca_block *new_sca; 23735e044315SEugene (jno) Dvurechenski struct kvm_vcpu *vcpu; 23745e044315SEugene (jno) Dvurechenski unsigned int vcpu_idx; 23755e044315SEugene (jno) Dvurechenski u32 scaol, scaoh; 23765e044315SEugene (jno) Dvurechenski 23775e044315SEugene (jno) Dvurechenski new_sca = alloc_pages_exact(sizeof(*new_sca), GFP_KERNEL|__GFP_ZERO); 23785e044315SEugene (jno) Dvurechenski if (!new_sca) 23795e044315SEugene (jno) Dvurechenski return -ENOMEM; 23805e044315SEugene (jno) Dvurechenski 23815e044315SEugene (jno) Dvurechenski scaoh = (u32)((u64)(new_sca) >> 32); 23825e044315SEugene (jno) Dvurechenski scaol = (u32)(u64)(new_sca) & ~0x3fU; 23835e044315SEugene (jno) Dvurechenski 23845e044315SEugene (jno) Dvurechenski kvm_s390_vcpu_block_all(kvm); 23855e044315SEugene (jno) Dvurechenski write_lock(&kvm->arch.sca_lock); 23865e044315SEugene (jno) Dvurechenski 23875e044315SEugene (jno) Dvurechenski sca_copy_b_to_e(new_sca, old_sca); 23885e044315SEugene (jno) Dvurechenski 23895e044315SEugene (jno) Dvurechenski kvm_for_each_vcpu(vcpu_idx, vcpu, kvm) { 23905e044315SEugene (jno) Dvurechenski vcpu->arch.sie_block->scaoh = scaoh; 23915e044315SEugene (jno) Dvurechenski vcpu->arch.sie_block->scaol = scaol; 23920c9d8683SDavid Hildenbrand vcpu->arch.sie_block->ecb2 |= ECB2_ESCA; 23935e044315SEugene (jno) Dvurechenski } 23945e044315SEugene (jno) Dvurechenski kvm->arch.sca = new_sca; 23955e044315SEugene (jno) Dvurechenski kvm->arch.use_esca = 1; 23965e044315SEugene (jno) Dvurechenski 23975e044315SEugene (jno) Dvurechenski write_unlock(&kvm->arch.sca_lock); 23985e044315SEugene (jno) Dvurechenski kvm_s390_vcpu_unblock_all(kvm); 23995e044315SEugene (jno) Dvurechenski 24005e044315SEugene (jno) Dvurechenski free_page((unsigned long)old_sca); 24015e044315SEugene (jno) Dvurechenski 24028335713aSChristian Borntraeger VM_EVENT(kvm, 2, "Switched to ESCA (0x%pK -> 0x%pK)", 24038335713aSChristian Borntraeger old_sca, kvm->arch.sca); 24045e044315SEugene (jno) Dvurechenski return 0; 24057d43bafcSEugene (jno) Dvurechenski } 2406a6e2f683SEugene (jno) Dvurechenski 2407a6e2f683SEugene (jno) Dvurechenski static int sca_can_add_vcpu(struct kvm *kvm, unsigned int id) 2408a6e2f683SEugene (jno) Dvurechenski { 24095e044315SEugene (jno) Dvurechenski int rc; 24105e044315SEugene (jno) Dvurechenski 2411a6940674SDavid Hildenbrand if (!kvm_s390_use_sca_entries()) { 2412a6940674SDavid Hildenbrand if (id < KVM_MAX_VCPUS) 2413a6940674SDavid Hildenbrand return true; 2414a6940674SDavid Hildenbrand return false; 2415a6940674SDavid Hildenbrand } 24165e044315SEugene (jno) Dvurechenski if (id < KVM_S390_BSCA_CPU_SLOTS) 24175e044315SEugene (jno) Dvurechenski return true; 241876a6dd72SDavid Hildenbrand if (!sclp.has_esca || !sclp.has_64bscao) 24195e044315SEugene (jno) Dvurechenski return false; 24205e044315SEugene (jno) Dvurechenski 24215e044315SEugene (jno) Dvurechenski mutex_lock(&kvm->lock); 24225e044315SEugene (jno) Dvurechenski rc = kvm->arch.use_esca ? 0 : sca_switch_to_extended(kvm); 24235e044315SEugene (jno) Dvurechenski mutex_unlock(&kvm->lock); 24245e044315SEugene (jno) Dvurechenski 24255e044315SEugene (jno) Dvurechenski return rc == 0 && id < KVM_S390_ESCA_CPU_SLOTS; 2426a6e2f683SEugene (jno) Dvurechenski } 2427a6e2f683SEugene (jno) Dvurechenski 2428dafd032aSDominik Dingel int kvm_arch_vcpu_init(struct kvm_vcpu *vcpu) 2429dafd032aSDominik Dingel { 2430dafd032aSDominik Dingel vcpu->arch.pfault_token = KVM_S390_PFAULT_TOKEN_INVALID; 2431dafd032aSDominik Dingel kvm_clear_async_pf_completion_queue(vcpu); 243259674c1aSChristian Borntraeger vcpu->run->kvm_valid_regs = KVM_SYNC_PREFIX | 243359674c1aSChristian Borntraeger KVM_SYNC_GPRS | 24349eed0735SChristian Borntraeger KVM_SYNC_ACRS | 2435b028ee3eSDavid Hildenbrand KVM_SYNC_CRS | 2436b028ee3eSDavid Hildenbrand KVM_SYNC_ARCH0 | 2437b028ee3eSDavid Hildenbrand KVM_SYNC_PFAULT; 243875a4615cSJulius Niedworok kvm_s390_set_prefix(vcpu, 0); 2439c6e5f166SFan Zhang if (test_kvm_facility(vcpu->kvm, 64)) 2440c6e5f166SFan Zhang vcpu->run->kvm_valid_regs |= KVM_SYNC_RICCB; 244135b3fde6SChristian Borntraeger if (test_kvm_facility(vcpu->kvm, 82)) 244235b3fde6SChristian Borntraeger vcpu->run->kvm_valid_regs |= KVM_SYNC_BPBC; 24434e0b1ab7SFan Zhang if (test_kvm_facility(vcpu->kvm, 133)) 24444e0b1ab7SFan Zhang vcpu->run->kvm_valid_regs |= KVM_SYNC_GSCB; 2445a3da7b4aSChristian Borntraeger if (test_kvm_facility(vcpu->kvm, 156)) 2446a3da7b4aSChristian Borntraeger vcpu->run->kvm_valid_regs |= KVM_SYNC_ETOKEN; 2447f6aa6dc4SDavid Hildenbrand /* fprs can be synchronized via vrs, even if the guest has no vx. With 2448f6aa6dc4SDavid Hildenbrand * MACHINE_HAS_VX, (load|store)_fpu_regs() will work with vrs format. 2449f6aa6dc4SDavid Hildenbrand */ 2450f6aa6dc4SDavid Hildenbrand if (MACHINE_HAS_VX) 245168c55750SEric Farman vcpu->run->kvm_valid_regs |= KVM_SYNC_VRS; 24526fd8e67dSDavid Hildenbrand else 24536fd8e67dSDavid Hildenbrand vcpu->run->kvm_valid_regs |= KVM_SYNC_FPRS; 2454dafd032aSDominik Dingel 2455dafd032aSDominik Dingel if (kvm_is_ucontrol(vcpu->kvm)) 2456dafd032aSDominik Dingel return __kvm_ucontrol_vcpu_init(vcpu); 2457dafd032aSDominik Dingel 2458b0c632dbSHeiko Carstens return 0; 2459b0c632dbSHeiko Carstens } 2460b0c632dbSHeiko Carstens 2461db0758b2SDavid Hildenbrand /* needs disabled preemption to protect from TOD sync and vcpu_load/put */ 2462db0758b2SDavid Hildenbrand static void __start_cpu_timer_accounting(struct kvm_vcpu *vcpu) 2463db0758b2SDavid Hildenbrand { 2464db0758b2SDavid Hildenbrand WARN_ON_ONCE(vcpu->arch.cputm_start != 0); 24659c23a131SDavid Hildenbrand raw_write_seqcount_begin(&vcpu->arch.cputm_seqcount); 2466db0758b2SDavid Hildenbrand vcpu->arch.cputm_start = get_tod_clock_fast(); 24679c23a131SDavid Hildenbrand raw_write_seqcount_end(&vcpu->arch.cputm_seqcount); 2468db0758b2SDavid Hildenbrand } 2469db0758b2SDavid Hildenbrand 2470db0758b2SDavid Hildenbrand /* needs disabled preemption to protect from TOD sync and vcpu_load/put */ 2471db0758b2SDavid Hildenbrand static void __stop_cpu_timer_accounting(struct kvm_vcpu *vcpu) 2472db0758b2SDavid Hildenbrand { 2473db0758b2SDavid Hildenbrand WARN_ON_ONCE(vcpu->arch.cputm_start == 0); 24749c23a131SDavid Hildenbrand raw_write_seqcount_begin(&vcpu->arch.cputm_seqcount); 2475db0758b2SDavid Hildenbrand vcpu->arch.sie_block->cputm -= get_tod_clock_fast() - vcpu->arch.cputm_start; 2476db0758b2SDavid Hildenbrand vcpu->arch.cputm_start = 0; 24779c23a131SDavid Hildenbrand raw_write_seqcount_end(&vcpu->arch.cputm_seqcount); 2478db0758b2SDavid Hildenbrand } 2479db0758b2SDavid Hildenbrand 2480db0758b2SDavid Hildenbrand /* needs disabled preemption to protect from TOD sync and vcpu_load/put */ 2481db0758b2SDavid Hildenbrand static void __enable_cpu_timer_accounting(struct kvm_vcpu *vcpu) 2482db0758b2SDavid Hildenbrand { 2483db0758b2SDavid Hildenbrand WARN_ON_ONCE(vcpu->arch.cputm_enabled); 2484db0758b2SDavid Hildenbrand vcpu->arch.cputm_enabled = true; 2485db0758b2SDavid Hildenbrand __start_cpu_timer_accounting(vcpu); 2486db0758b2SDavid Hildenbrand } 2487db0758b2SDavid Hildenbrand 2488db0758b2SDavid Hildenbrand /* needs disabled preemption to protect from TOD sync and vcpu_load/put */ 2489db0758b2SDavid Hildenbrand static void __disable_cpu_timer_accounting(struct kvm_vcpu *vcpu) 2490db0758b2SDavid Hildenbrand { 2491db0758b2SDavid Hildenbrand WARN_ON_ONCE(!vcpu->arch.cputm_enabled); 2492db0758b2SDavid Hildenbrand __stop_cpu_timer_accounting(vcpu); 2493db0758b2SDavid Hildenbrand vcpu->arch.cputm_enabled = false; 2494db0758b2SDavid Hildenbrand } 2495db0758b2SDavid Hildenbrand 2496db0758b2SDavid Hildenbrand static void enable_cpu_timer_accounting(struct kvm_vcpu *vcpu) 2497db0758b2SDavid Hildenbrand { 2498db0758b2SDavid Hildenbrand preempt_disable(); /* protect from TOD sync and vcpu_load/put */ 2499db0758b2SDavid Hildenbrand __enable_cpu_timer_accounting(vcpu); 2500db0758b2SDavid Hildenbrand preempt_enable(); 2501db0758b2SDavid Hildenbrand } 2502db0758b2SDavid Hildenbrand 2503db0758b2SDavid Hildenbrand static void disable_cpu_timer_accounting(struct kvm_vcpu *vcpu) 2504db0758b2SDavid Hildenbrand { 2505db0758b2SDavid Hildenbrand preempt_disable(); /* protect from TOD sync and vcpu_load/put */ 2506db0758b2SDavid Hildenbrand __disable_cpu_timer_accounting(vcpu); 2507db0758b2SDavid Hildenbrand preempt_enable(); 2508db0758b2SDavid Hildenbrand } 2509db0758b2SDavid Hildenbrand 25104287f247SDavid Hildenbrand /* set the cpu timer - may only be called from the VCPU thread itself */ 25114287f247SDavid Hildenbrand void kvm_s390_set_cpu_timer(struct kvm_vcpu *vcpu, __u64 cputm) 25124287f247SDavid Hildenbrand { 2513db0758b2SDavid Hildenbrand preempt_disable(); /* protect from TOD sync and vcpu_load/put */ 25149c23a131SDavid Hildenbrand raw_write_seqcount_begin(&vcpu->arch.cputm_seqcount); 2515db0758b2SDavid Hildenbrand if (vcpu->arch.cputm_enabled) 2516db0758b2SDavid Hildenbrand vcpu->arch.cputm_start = get_tod_clock_fast(); 25174287f247SDavid Hildenbrand vcpu->arch.sie_block->cputm = cputm; 25189c23a131SDavid Hildenbrand raw_write_seqcount_end(&vcpu->arch.cputm_seqcount); 2519db0758b2SDavid Hildenbrand preempt_enable(); 25204287f247SDavid Hildenbrand } 25214287f247SDavid Hildenbrand 2522db0758b2SDavid Hildenbrand /* update and get the cpu timer - can also be called from other VCPU threads */ 25234287f247SDavid Hildenbrand __u64 kvm_s390_get_cpu_timer(struct kvm_vcpu *vcpu) 25244287f247SDavid Hildenbrand { 25259c23a131SDavid Hildenbrand unsigned int seq; 2526db0758b2SDavid Hildenbrand __u64 value; 2527db0758b2SDavid Hildenbrand 2528db0758b2SDavid Hildenbrand if (unlikely(!vcpu->arch.cputm_enabled)) 25294287f247SDavid Hildenbrand return vcpu->arch.sie_block->cputm; 2530db0758b2SDavid Hildenbrand 25319c23a131SDavid Hildenbrand preempt_disable(); /* protect from TOD sync and vcpu_load/put */ 25329c23a131SDavid Hildenbrand do { 25339c23a131SDavid Hildenbrand seq = raw_read_seqcount(&vcpu->arch.cputm_seqcount); 25349c23a131SDavid Hildenbrand /* 25359c23a131SDavid Hildenbrand * If the writer would ever execute a read in the critical 25369c23a131SDavid Hildenbrand * section, e.g. in irq context, we have a deadlock. 25379c23a131SDavid Hildenbrand */ 25389c23a131SDavid Hildenbrand WARN_ON_ONCE((seq & 1) && smp_processor_id() == vcpu->cpu); 2539db0758b2SDavid Hildenbrand value = vcpu->arch.sie_block->cputm; 25409c23a131SDavid Hildenbrand /* if cputm_start is 0, accounting is being started/stopped */ 25419c23a131SDavid Hildenbrand if (likely(vcpu->arch.cputm_start)) 2542db0758b2SDavid Hildenbrand value -= get_tod_clock_fast() - vcpu->arch.cputm_start; 25439c23a131SDavid Hildenbrand } while (read_seqcount_retry(&vcpu->arch.cputm_seqcount, seq & ~1)); 25449c23a131SDavid Hildenbrand preempt_enable(); 2545db0758b2SDavid Hildenbrand return value; 25464287f247SDavid Hildenbrand } 25474287f247SDavid Hildenbrand 2548b0c632dbSHeiko Carstens void kvm_arch_vcpu_load(struct kvm_vcpu *vcpu, int cpu) 2549b0c632dbSHeiko Carstens { 25509977e886SHendrik Brueckner 255137d9df98SDavid Hildenbrand gmap_enable(vcpu->arch.enabled_gmap); 2552ef8f4f49SDavid Hildenbrand kvm_s390_set_cpuflags(vcpu, CPUSTAT_RUNNING); 25535ebda316SDavid Hildenbrand if (vcpu->arch.cputm_enabled && !is_vcpu_idle(vcpu)) 2554db0758b2SDavid Hildenbrand __start_cpu_timer_accounting(vcpu); 255501a745acSDavid Hildenbrand vcpu->cpu = cpu; 2556b0c632dbSHeiko Carstens } 2557b0c632dbSHeiko Carstens 2558b0c632dbSHeiko Carstens void kvm_arch_vcpu_put(struct kvm_vcpu *vcpu) 2559b0c632dbSHeiko Carstens { 256001a745acSDavid Hildenbrand vcpu->cpu = -1; 25615ebda316SDavid Hildenbrand if (vcpu->arch.cputm_enabled && !is_vcpu_idle(vcpu)) 2562db0758b2SDavid Hildenbrand __stop_cpu_timer_accounting(vcpu); 25639daecfc6SDavid Hildenbrand kvm_s390_clear_cpuflags(vcpu, CPUSTAT_RUNNING); 256437d9df98SDavid Hildenbrand vcpu->arch.enabled_gmap = gmap_get_enabled(); 256537d9df98SDavid Hildenbrand gmap_disable(vcpu->arch.enabled_gmap); 25669977e886SHendrik Brueckner 2567b0c632dbSHeiko Carstens } 2568b0c632dbSHeiko Carstens 2569b0c632dbSHeiko Carstens static void kvm_s390_vcpu_initial_reset(struct kvm_vcpu *vcpu) 2570b0c632dbSHeiko Carstens { 2571b0c632dbSHeiko Carstens /* this equals initial cpu reset in pop, but we don't switch to ESA */ 2572b0c632dbSHeiko Carstens vcpu->arch.sie_block->gpsw.mask = 0UL; 2573b0c632dbSHeiko Carstens vcpu->arch.sie_block->gpsw.addr = 0UL; 25748d26cf7bSChristian Borntraeger kvm_s390_set_prefix(vcpu, 0); 25754287f247SDavid Hildenbrand kvm_s390_set_cpu_timer(vcpu, 0); 2576b0c632dbSHeiko Carstens vcpu->arch.sie_block->ckc = 0UL; 2577b0c632dbSHeiko Carstens vcpu->arch.sie_block->todpr = 0; 2578b0c632dbSHeiko Carstens memset(vcpu->arch.sie_block->gcr, 0, 16 * sizeof(__u64)); 2579b9224cd7SDavid Hildenbrand vcpu->arch.sie_block->gcr[0] = CR0_UNUSED_56 | 2580b9224cd7SDavid Hildenbrand CR0_INTERRUPT_KEY_SUBMASK | 2581b9224cd7SDavid Hildenbrand CR0_MEASUREMENT_ALERT_SUBMASK; 2582b9224cd7SDavid Hildenbrand vcpu->arch.sie_block->gcr[14] = CR14_UNUSED_32 | 2583b9224cd7SDavid Hildenbrand CR14_UNUSED_33 | 2584b9224cd7SDavid Hildenbrand CR14_EXTERNAL_DAMAGE_SUBMASK; 25859abc2a08SDavid Hildenbrand /* make sure the new fpc will be lazily loaded */ 25869abc2a08SDavid Hildenbrand save_fpu_regs(); 25879abc2a08SDavid Hildenbrand current->thread.fpu.fpc = 0; 2588b0c632dbSHeiko Carstens vcpu->arch.sie_block->gbea = 1; 2589672550fbSChristian Borntraeger vcpu->arch.sie_block->pp = 0; 259035b3fde6SChristian Borntraeger vcpu->arch.sie_block->fpf &= ~FPF_BPBC; 25913c038e6bSDominik Dingel vcpu->arch.pfault_token = KVM_S390_PFAULT_TOKEN_INVALID; 25923c038e6bSDominik Dingel kvm_clear_async_pf_completion_queue(vcpu); 25936352e4d2SDavid Hildenbrand if (!kvm_s390_user_cpu_state_ctrl(vcpu->kvm)) 25946852d7b6SDavid Hildenbrand kvm_s390_vcpu_stop(vcpu); 25952ed10cc1SJens Freimann kvm_s390_clear_local_irqs(vcpu); 2596b0c632dbSHeiko Carstens } 2597b0c632dbSHeiko Carstens 259831928aa5SDominik Dingel void kvm_arch_vcpu_postcreate(struct kvm_vcpu *vcpu) 259942897d86SMarcelo Tosatti { 260072f25020SJason J. Herne mutex_lock(&vcpu->kvm->lock); 2601fdf03650SFan Zhang preempt_disable(); 260272f25020SJason J. Herne vcpu->arch.sie_block->epoch = vcpu->kvm->arch.epoch; 2603d16b52cbSDavid Hildenbrand vcpu->arch.sie_block->epdx = vcpu->kvm->arch.epdx; 2604fdf03650SFan Zhang preempt_enable(); 260572f25020SJason J. Herne mutex_unlock(&vcpu->kvm->lock); 260625508824SDavid Hildenbrand if (!kvm_is_ucontrol(vcpu->kvm)) { 2607dafd032aSDominik Dingel vcpu->arch.gmap = vcpu->kvm->arch.gmap; 2608eaa78f34SDavid Hildenbrand sca_add_vcpu(vcpu); 260925508824SDavid Hildenbrand } 26106502a34cSDavid Hildenbrand if (test_kvm_facility(vcpu->kvm, 74) || vcpu->kvm->arch.user_instr0) 26116502a34cSDavid Hildenbrand vcpu->arch.sie_block->ictl |= ICTL_OPEREXC; 261237d9df98SDavid Hildenbrand /* make vcpu_load load the right gmap on the first trigger */ 261337d9df98SDavid Hildenbrand vcpu->arch.enabled_gmap = vcpu->arch.gmap; 261442897d86SMarcelo Tosatti } 261542897d86SMarcelo Tosatti 26165102ee87STony Krowiak static void kvm_s390_vcpu_crypto_setup(struct kvm_vcpu *vcpu) 26175102ee87STony Krowiak { 2618e585b24aSTony Krowiak /* 2619e585b24aSTony Krowiak * If the AP instructions are not being interpreted and the MSAX3 2620e585b24aSTony Krowiak * facility is not configured for the guest, there is nothing to set up. 2621e585b24aSTony Krowiak */ 2622e585b24aSTony Krowiak if (!vcpu->kvm->arch.crypto.apie && !test_kvm_facility(vcpu->kvm, 76)) 26235102ee87STony Krowiak return; 26245102ee87STony Krowiak 2625e585b24aSTony Krowiak vcpu->arch.sie_block->crycbd = vcpu->kvm->arch.crypto.crycbd; 2626a374e892STony Krowiak vcpu->arch.sie_block->ecb3 &= ~(ECB3_AES | ECB3_DEA); 2627*37940fb0STony Krowiak vcpu->arch.sie_block->eca &= ~ECA_APIE; 2628a374e892STony Krowiak 2629e585b24aSTony Krowiak if (vcpu->kvm->arch.crypto.apie) 2630e585b24aSTony Krowiak vcpu->arch.sie_block->eca |= ECA_APIE; 2631e585b24aSTony Krowiak 2632e585b24aSTony Krowiak /* Set up protected key support */ 2633a374e892STony Krowiak if (vcpu->kvm->arch.crypto.aes_kw) 2634a374e892STony Krowiak vcpu->arch.sie_block->ecb3 |= ECB3_AES; 2635a374e892STony Krowiak if (vcpu->kvm->arch.crypto.dea_kw) 2636a374e892STony Krowiak vcpu->arch.sie_block->ecb3 |= ECB3_DEA; 26375102ee87STony Krowiak } 26385102ee87STony Krowiak 2639b31605c1SDominik Dingel void kvm_s390_vcpu_unsetup_cmma(struct kvm_vcpu *vcpu) 2640b31605c1SDominik Dingel { 2641b31605c1SDominik Dingel free_page(vcpu->arch.sie_block->cbrlo); 2642b31605c1SDominik Dingel vcpu->arch.sie_block->cbrlo = 0; 2643b31605c1SDominik Dingel } 2644b31605c1SDominik Dingel 2645b31605c1SDominik Dingel int kvm_s390_vcpu_setup_cmma(struct kvm_vcpu *vcpu) 2646b31605c1SDominik Dingel { 2647b31605c1SDominik Dingel vcpu->arch.sie_block->cbrlo = get_zeroed_page(GFP_KERNEL); 2648b31605c1SDominik Dingel if (!vcpu->arch.sie_block->cbrlo) 2649b31605c1SDominik Dingel return -ENOMEM; 2650b31605c1SDominik Dingel return 0; 2651b31605c1SDominik Dingel } 2652b31605c1SDominik Dingel 265391520f1aSMichael Mueller static void kvm_s390_vcpu_setup_model(struct kvm_vcpu *vcpu) 265491520f1aSMichael Mueller { 265591520f1aSMichael Mueller struct kvm_s390_cpu_model *model = &vcpu->kvm->arch.model; 265691520f1aSMichael Mueller 265791520f1aSMichael Mueller vcpu->arch.sie_block->ibc = model->ibc; 265880bc79dcSDavid Hildenbrand if (test_kvm_facility(vcpu->kvm, 7)) 2659c54f0d6aSDavid Hildenbrand vcpu->arch.sie_block->fac = (u32)(u64) model->fac_list; 266091520f1aSMichael Mueller } 266191520f1aSMichael Mueller 2662b0c632dbSHeiko Carstens int kvm_arch_vcpu_setup(struct kvm_vcpu *vcpu) 2663b0c632dbSHeiko Carstens { 2664b31605c1SDominik Dingel int rc = 0; 2665b31288faSKonstantin Weitz 26669e6dabefSCornelia Huck atomic_set(&vcpu->arch.sie_block->cpuflags, CPUSTAT_ZARCH | 26679e6dabefSCornelia Huck CPUSTAT_SM | 2668a4a4f191SGuenther Hutzl CPUSTAT_STOPPED); 2669a4a4f191SGuenther Hutzl 267053df84f8SGuenther Hutzl if (test_kvm_facility(vcpu->kvm, 78)) 2671ef8f4f49SDavid Hildenbrand kvm_s390_set_cpuflags(vcpu, CPUSTAT_GED2); 267253df84f8SGuenther Hutzl else if (test_kvm_facility(vcpu->kvm, 8)) 2673ef8f4f49SDavid Hildenbrand kvm_s390_set_cpuflags(vcpu, CPUSTAT_GED); 2674a4a4f191SGuenther Hutzl 267591520f1aSMichael Mueller kvm_s390_vcpu_setup_model(vcpu); 267691520f1aSMichael Mueller 2677bdab09f3SDavid Hildenbrand /* pgste_set_pte has special handling for !MACHINE_HAS_ESOP */ 2678bdab09f3SDavid Hildenbrand if (MACHINE_HAS_ESOP) 26790c9d8683SDavid Hildenbrand vcpu->arch.sie_block->ecb |= ECB_HOSTPROTINT; 2680bd50e8ecSDavid Hildenbrand if (test_kvm_facility(vcpu->kvm, 9)) 26810c9d8683SDavid Hildenbrand vcpu->arch.sie_block->ecb |= ECB_SRSI; 2682f597d24eSDavid Hildenbrand if (test_kvm_facility(vcpu->kvm, 73)) 26830c9d8683SDavid Hildenbrand vcpu->arch.sie_block->ecb |= ECB_TE; 26847feb6bb8SMichael Mueller 2685c9f0a2b8SJanosch Frank if (test_kvm_facility(vcpu->kvm, 8) && vcpu->kvm->arch.use_pfmfi) 26860c9d8683SDavid Hildenbrand vcpu->arch.sie_block->ecb2 |= ECB2_PFMFI; 2687cd1836f5SJanosch Frank if (test_kvm_facility(vcpu->kvm, 130)) 26880c9d8683SDavid Hildenbrand vcpu->arch.sie_block->ecb2 |= ECB2_IEP; 26890c9d8683SDavid Hildenbrand vcpu->arch.sie_block->eca = ECA_MVPGI | ECA_PROTEXCI; 269048ee7d3aSDavid Hildenbrand if (sclp.has_cei) 26910c9d8683SDavid Hildenbrand vcpu->arch.sie_block->eca |= ECA_CEI; 269211ad65b7SDavid Hildenbrand if (sclp.has_ib) 26930c9d8683SDavid Hildenbrand vcpu->arch.sie_block->eca |= ECA_IB; 269437c5f6c8SDavid Hildenbrand if (sclp.has_siif) 26950c9d8683SDavid Hildenbrand vcpu->arch.sie_block->eca |= ECA_SII; 269637c5f6c8SDavid Hildenbrand if (sclp.has_sigpif) 26970c9d8683SDavid Hildenbrand vcpu->arch.sie_block->eca |= ECA_SIGPI; 269818280d8bSMichael Mueller if (test_kvm_facility(vcpu->kvm, 129)) { 26990c9d8683SDavid Hildenbrand vcpu->arch.sie_block->eca |= ECA_VX; 27000c9d8683SDavid Hildenbrand vcpu->arch.sie_block->ecd |= ECD_HOSTREGMGMT; 270113211ea7SEric Farman } 27028fa1696eSCollin L. Walling if (test_kvm_facility(vcpu->kvm, 139)) 27038fa1696eSCollin L. Walling vcpu->arch.sie_block->ecd |= ECD_MEF; 2704a3da7b4aSChristian Borntraeger if (test_kvm_facility(vcpu->kvm, 156)) 2705a3da7b4aSChristian Borntraeger vcpu->arch.sie_block->ecd |= ECD_ETOKENF; 2706d7c5cb01SMichael Mueller if (vcpu->arch.sie_block->gd) { 2707d7c5cb01SMichael Mueller vcpu->arch.sie_block->eca |= ECA_AIV; 2708d7c5cb01SMichael Mueller VCPU_EVENT(vcpu, 3, "AIV gisa format-%u enabled for cpu %03u", 2709d7c5cb01SMichael Mueller vcpu->arch.sie_block->gd & 0x3, vcpu->vcpu_id); 2710d7c5cb01SMichael Mueller } 27114e0b1ab7SFan Zhang vcpu->arch.sie_block->sdnxo = ((unsigned long) &vcpu->run->s.regs.sdnx) 27124e0b1ab7SFan Zhang | SDNXC; 2713c6e5f166SFan Zhang vcpu->arch.sie_block->riccbd = (unsigned long) &vcpu->run->s.regs.riccb; 2714730cd632SFarhan Ali 2715730cd632SFarhan Ali if (sclp.has_kss) 2716ef8f4f49SDavid Hildenbrand kvm_s390_set_cpuflags(vcpu, CPUSTAT_KSS); 2717730cd632SFarhan Ali else 2718492d8642SThomas Huth vcpu->arch.sie_block->ictl |= ICTL_ISKE | ICTL_SSKE | ICTL_RRBE; 27195a5e6536SMatthew Rosato 2720e6db1d61SDominik Dingel if (vcpu->kvm->arch.use_cmma) { 2721b31605c1SDominik Dingel rc = kvm_s390_vcpu_setup_cmma(vcpu); 2722b31605c1SDominik Dingel if (rc) 2723b31605c1SDominik Dingel return rc; 2724b31288faSKonstantin Weitz } 27250ac96cafSDavid Hildenbrand hrtimer_init(&vcpu->arch.ckc_timer, CLOCK_MONOTONIC, HRTIMER_MODE_REL); 2726ca872302SChristian Borntraeger vcpu->arch.ckc_timer.function = kvm_s390_idle_wakeup; 27279d8d5786SMichael Mueller 27285102ee87STony Krowiak kvm_s390_vcpu_crypto_setup(vcpu); 27295102ee87STony Krowiak 2730b31605c1SDominik Dingel return rc; 2731b0c632dbSHeiko Carstens } 2732b0c632dbSHeiko Carstens 2733b0c632dbSHeiko Carstens struct kvm_vcpu *kvm_arch_vcpu_create(struct kvm *kvm, 2734b0c632dbSHeiko Carstens unsigned int id) 2735b0c632dbSHeiko Carstens { 27364d47555aSCarsten Otte struct kvm_vcpu *vcpu; 27377feb6bb8SMichael Mueller struct sie_page *sie_page; 27384d47555aSCarsten Otte int rc = -EINVAL; 2739b0c632dbSHeiko Carstens 27404215825eSDavid Hildenbrand if (!kvm_is_ucontrol(kvm) && !sca_can_add_vcpu(kvm, id)) 27414d47555aSCarsten Otte goto out; 27424d47555aSCarsten Otte 27434d47555aSCarsten Otte rc = -ENOMEM; 27444d47555aSCarsten Otte 2745b110feafSMichael Mueller vcpu = kmem_cache_zalloc(kvm_vcpu_cache, GFP_KERNEL); 2746b0c632dbSHeiko Carstens if (!vcpu) 27474d47555aSCarsten Otte goto out; 2748b0c632dbSHeiko Carstens 2749da72ca4dSQingFeng Hao BUILD_BUG_ON(sizeof(struct sie_page) != 4096); 27507feb6bb8SMichael Mueller sie_page = (struct sie_page *) get_zeroed_page(GFP_KERNEL); 27517feb6bb8SMichael Mueller if (!sie_page) 2752b0c632dbSHeiko Carstens goto out_free_cpu; 2753b0c632dbSHeiko Carstens 27547feb6bb8SMichael Mueller vcpu->arch.sie_block = &sie_page->sie_block; 27557feb6bb8SMichael Mueller vcpu->arch.sie_block->itdba = (unsigned long) &sie_page->itdb; 27567feb6bb8SMichael Mueller 2757efed1104SDavid Hildenbrand /* the real guest size will always be smaller than msl */ 2758efed1104SDavid Hildenbrand vcpu->arch.sie_block->mso = 0; 2759efed1104SDavid Hildenbrand vcpu->arch.sie_block->msl = sclp.hamax; 2760efed1104SDavid Hildenbrand 2761b0c632dbSHeiko Carstens vcpu->arch.sie_block->icpua = id; 2762ba5c1e9bSCarsten Otte spin_lock_init(&vcpu->arch.local_int.lock); 2763d7c5cb01SMichael Mueller vcpu->arch.sie_block->gd = (u32)(u64)kvm->arch.gisa; 27644b9f9525SMichael Mueller if (vcpu->arch.sie_block->gd && sclp.has_gisaf) 27654b9f9525SMichael Mueller vcpu->arch.sie_block->gd |= GISA_FORMAT1; 27669c23a131SDavid Hildenbrand seqcount_init(&vcpu->arch.cputm_seqcount); 2767ba5c1e9bSCarsten Otte 2768b0c632dbSHeiko Carstens rc = kvm_vcpu_init(vcpu, kvm, id); 2769b0c632dbSHeiko Carstens if (rc) 27709abc2a08SDavid Hildenbrand goto out_free_sie_block; 27718335713aSChristian Borntraeger VM_EVENT(kvm, 3, "create cpu %d at 0x%pK, sie block at 0x%pK", id, vcpu, 2772b0c632dbSHeiko Carstens vcpu->arch.sie_block); 2773ade38c31SCornelia Huck trace_kvm_s390_create_vcpu(id, vcpu, vcpu->arch.sie_block); 2774b0c632dbSHeiko Carstens 2775b0c632dbSHeiko Carstens return vcpu; 27767b06bf2fSWei Yongjun out_free_sie_block: 27777b06bf2fSWei Yongjun free_page((unsigned long)(vcpu->arch.sie_block)); 2778b0c632dbSHeiko Carstens out_free_cpu: 2779b110feafSMichael Mueller kmem_cache_free(kvm_vcpu_cache, vcpu); 27804d47555aSCarsten Otte out: 2781b0c632dbSHeiko Carstens return ERR_PTR(rc); 2782b0c632dbSHeiko Carstens } 2783b0c632dbSHeiko Carstens 2784b0c632dbSHeiko Carstens int kvm_arch_vcpu_runnable(struct kvm_vcpu *vcpu) 2785b0c632dbSHeiko Carstens { 27869a022067SDavid Hildenbrand return kvm_s390_vcpu_has_irq(vcpu, 0); 2787b0c632dbSHeiko Carstens } 2788b0c632dbSHeiko Carstens 2789199b5763SLongpeng(Mike) bool kvm_arch_vcpu_in_kernel(struct kvm_vcpu *vcpu) 2790199b5763SLongpeng(Mike) { 27910546c63dSLongpeng(Mike) return !(vcpu->arch.sie_block->gpsw.mask & PSW_MASK_PSTATE); 2792199b5763SLongpeng(Mike) } 2793199b5763SLongpeng(Mike) 279427406cd5SChristian Borntraeger void kvm_s390_vcpu_block(struct kvm_vcpu *vcpu) 279549b99e1eSChristian Borntraeger { 2796805de8f4SPeter Zijlstra atomic_or(PROG_BLOCK_SIE, &vcpu->arch.sie_block->prog20); 279761a6df54SDavid Hildenbrand exit_sie(vcpu); 279849b99e1eSChristian Borntraeger } 279949b99e1eSChristian Borntraeger 280027406cd5SChristian Borntraeger void kvm_s390_vcpu_unblock(struct kvm_vcpu *vcpu) 280149b99e1eSChristian Borntraeger { 2802805de8f4SPeter Zijlstra atomic_andnot(PROG_BLOCK_SIE, &vcpu->arch.sie_block->prog20); 280349b99e1eSChristian Borntraeger } 280449b99e1eSChristian Borntraeger 28058e236546SChristian Borntraeger static void kvm_s390_vcpu_request(struct kvm_vcpu *vcpu) 28068e236546SChristian Borntraeger { 2807805de8f4SPeter Zijlstra atomic_or(PROG_REQUEST, &vcpu->arch.sie_block->prog20); 280861a6df54SDavid Hildenbrand exit_sie(vcpu); 28098e236546SChristian Borntraeger } 28108e236546SChristian Borntraeger 28119ea59728SDavid Hildenbrand bool kvm_s390_vcpu_sie_inhibited(struct kvm_vcpu *vcpu) 28129ea59728SDavid Hildenbrand { 28139ea59728SDavid Hildenbrand return atomic_read(&vcpu->arch.sie_block->prog20) & 28149ea59728SDavid Hildenbrand (PROG_BLOCK_SIE | PROG_REQUEST); 28159ea59728SDavid Hildenbrand } 28169ea59728SDavid Hildenbrand 28178e236546SChristian Borntraeger static void kvm_s390_vcpu_request_handled(struct kvm_vcpu *vcpu) 28188e236546SChristian Borntraeger { 28199bf9fde2SJason J. Herne atomic_andnot(PROG_REQUEST, &vcpu->arch.sie_block->prog20); 28208e236546SChristian Borntraeger } 28218e236546SChristian Borntraeger 282249b99e1eSChristian Borntraeger /* 28239ea59728SDavid Hildenbrand * Kick a guest cpu out of (v)SIE and wait until (v)SIE is not running. 282449b99e1eSChristian Borntraeger * If the CPU is not running (e.g. waiting as idle) the function will 282549b99e1eSChristian Borntraeger * return immediately. */ 282649b99e1eSChristian Borntraeger void exit_sie(struct kvm_vcpu *vcpu) 282749b99e1eSChristian Borntraeger { 2828ef8f4f49SDavid Hildenbrand kvm_s390_set_cpuflags(vcpu, CPUSTAT_STOP_INT); 28299ea59728SDavid Hildenbrand kvm_s390_vsie_kick(vcpu); 283049b99e1eSChristian Borntraeger while (vcpu->arch.sie_block->prog0c & PROG_IN_SIE) 283149b99e1eSChristian Borntraeger cpu_relax(); 283249b99e1eSChristian Borntraeger } 283349b99e1eSChristian Borntraeger 28348e236546SChristian Borntraeger /* Kick a guest cpu out of SIE to process a request synchronously */ 28358e236546SChristian Borntraeger void kvm_s390_sync_request(int req, struct kvm_vcpu *vcpu) 283649b99e1eSChristian Borntraeger { 28378e236546SChristian Borntraeger kvm_make_request(req, vcpu); 28388e236546SChristian Borntraeger kvm_s390_vcpu_request(vcpu); 283949b99e1eSChristian Borntraeger } 284049b99e1eSChristian Borntraeger 2841414d3b07SMartin Schwidefsky static void kvm_gmap_notifier(struct gmap *gmap, unsigned long start, 2842414d3b07SMartin Schwidefsky unsigned long end) 28432c70fe44SChristian Borntraeger { 28442c70fe44SChristian Borntraeger struct kvm *kvm = gmap->private; 28452c70fe44SChristian Borntraeger struct kvm_vcpu *vcpu; 2846414d3b07SMartin Schwidefsky unsigned long prefix; 2847414d3b07SMartin Schwidefsky int i; 28482c70fe44SChristian Borntraeger 284965d0b0d4SDavid Hildenbrand if (gmap_is_shadow(gmap)) 285065d0b0d4SDavid Hildenbrand return; 2851414d3b07SMartin Schwidefsky if (start >= 1UL << 31) 2852414d3b07SMartin Schwidefsky /* We are only interested in prefix pages */ 2853414d3b07SMartin Schwidefsky return; 28542c70fe44SChristian Borntraeger kvm_for_each_vcpu(i, vcpu, kvm) { 28552c70fe44SChristian Borntraeger /* match against both prefix pages */ 2856414d3b07SMartin Schwidefsky prefix = kvm_s390_get_prefix(vcpu); 2857414d3b07SMartin Schwidefsky if (prefix <= end && start <= prefix + 2*PAGE_SIZE - 1) { 2858414d3b07SMartin Schwidefsky VCPU_EVENT(vcpu, 2, "gmap notifier for %lx-%lx", 2859414d3b07SMartin Schwidefsky start, end); 28608e236546SChristian Borntraeger kvm_s390_sync_request(KVM_REQ_MMU_RELOAD, vcpu); 28612c70fe44SChristian Borntraeger } 28622c70fe44SChristian Borntraeger } 28632c70fe44SChristian Borntraeger } 28642c70fe44SChristian Borntraeger 2865b6d33834SChristoffer Dall int kvm_arch_vcpu_should_kick(struct kvm_vcpu *vcpu) 2866b6d33834SChristoffer Dall { 2867b6d33834SChristoffer Dall /* kvm common code refers to this, but never calls it */ 2868b6d33834SChristoffer Dall BUG(); 2869b6d33834SChristoffer Dall return 0; 2870b6d33834SChristoffer Dall } 2871b6d33834SChristoffer Dall 287214eebd91SCarsten Otte static int kvm_arch_vcpu_ioctl_get_one_reg(struct kvm_vcpu *vcpu, 287314eebd91SCarsten Otte struct kvm_one_reg *reg) 287414eebd91SCarsten Otte { 287514eebd91SCarsten Otte int r = -EINVAL; 287614eebd91SCarsten Otte 287714eebd91SCarsten Otte switch (reg->id) { 287829b7c71bSCarsten Otte case KVM_REG_S390_TODPR: 287929b7c71bSCarsten Otte r = put_user(vcpu->arch.sie_block->todpr, 288029b7c71bSCarsten Otte (u32 __user *)reg->addr); 288129b7c71bSCarsten Otte break; 288229b7c71bSCarsten Otte case KVM_REG_S390_EPOCHDIFF: 288329b7c71bSCarsten Otte r = put_user(vcpu->arch.sie_block->epoch, 288429b7c71bSCarsten Otte (u64 __user *)reg->addr); 288529b7c71bSCarsten Otte break; 288646a6dd1cSJason J. herne case KVM_REG_S390_CPU_TIMER: 28874287f247SDavid Hildenbrand r = put_user(kvm_s390_get_cpu_timer(vcpu), 288846a6dd1cSJason J. herne (u64 __user *)reg->addr); 288946a6dd1cSJason J. herne break; 289046a6dd1cSJason J. herne case KVM_REG_S390_CLOCK_COMP: 289146a6dd1cSJason J. herne r = put_user(vcpu->arch.sie_block->ckc, 289246a6dd1cSJason J. herne (u64 __user *)reg->addr); 289346a6dd1cSJason J. herne break; 2894536336c2SDominik Dingel case KVM_REG_S390_PFTOKEN: 2895536336c2SDominik Dingel r = put_user(vcpu->arch.pfault_token, 2896536336c2SDominik Dingel (u64 __user *)reg->addr); 2897536336c2SDominik Dingel break; 2898536336c2SDominik Dingel case KVM_REG_S390_PFCOMPARE: 2899536336c2SDominik Dingel r = put_user(vcpu->arch.pfault_compare, 2900536336c2SDominik Dingel (u64 __user *)reg->addr); 2901536336c2SDominik Dingel break; 2902536336c2SDominik Dingel case KVM_REG_S390_PFSELECT: 2903536336c2SDominik Dingel r = put_user(vcpu->arch.pfault_select, 2904536336c2SDominik Dingel (u64 __user *)reg->addr); 2905536336c2SDominik Dingel break; 2906672550fbSChristian Borntraeger case KVM_REG_S390_PP: 2907672550fbSChristian Borntraeger r = put_user(vcpu->arch.sie_block->pp, 2908672550fbSChristian Borntraeger (u64 __user *)reg->addr); 2909672550fbSChristian Borntraeger break; 2910afa45ff5SChristian Borntraeger case KVM_REG_S390_GBEA: 2911afa45ff5SChristian Borntraeger r = put_user(vcpu->arch.sie_block->gbea, 2912afa45ff5SChristian Borntraeger (u64 __user *)reg->addr); 2913afa45ff5SChristian Borntraeger break; 291414eebd91SCarsten Otte default: 291514eebd91SCarsten Otte break; 291614eebd91SCarsten Otte } 291714eebd91SCarsten Otte 291814eebd91SCarsten Otte return r; 291914eebd91SCarsten Otte } 292014eebd91SCarsten Otte 292114eebd91SCarsten Otte static int kvm_arch_vcpu_ioctl_set_one_reg(struct kvm_vcpu *vcpu, 292214eebd91SCarsten Otte struct kvm_one_reg *reg) 292314eebd91SCarsten Otte { 292414eebd91SCarsten Otte int r = -EINVAL; 29254287f247SDavid Hildenbrand __u64 val; 292614eebd91SCarsten Otte 292714eebd91SCarsten Otte switch (reg->id) { 292829b7c71bSCarsten Otte case KVM_REG_S390_TODPR: 292929b7c71bSCarsten Otte r = get_user(vcpu->arch.sie_block->todpr, 293029b7c71bSCarsten Otte (u32 __user *)reg->addr); 293129b7c71bSCarsten Otte break; 293229b7c71bSCarsten Otte case KVM_REG_S390_EPOCHDIFF: 293329b7c71bSCarsten Otte r = get_user(vcpu->arch.sie_block->epoch, 293429b7c71bSCarsten Otte (u64 __user *)reg->addr); 293529b7c71bSCarsten Otte break; 293646a6dd1cSJason J. herne case KVM_REG_S390_CPU_TIMER: 29374287f247SDavid Hildenbrand r = get_user(val, (u64 __user *)reg->addr); 29384287f247SDavid Hildenbrand if (!r) 29394287f247SDavid Hildenbrand kvm_s390_set_cpu_timer(vcpu, val); 294046a6dd1cSJason J. herne break; 294146a6dd1cSJason J. herne case KVM_REG_S390_CLOCK_COMP: 294246a6dd1cSJason J. herne r = get_user(vcpu->arch.sie_block->ckc, 294346a6dd1cSJason J. herne (u64 __user *)reg->addr); 294446a6dd1cSJason J. herne break; 2945536336c2SDominik Dingel case KVM_REG_S390_PFTOKEN: 2946536336c2SDominik Dingel r = get_user(vcpu->arch.pfault_token, 2947536336c2SDominik Dingel (u64 __user *)reg->addr); 29489fbd8082SDavid Hildenbrand if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID) 29499fbd8082SDavid Hildenbrand kvm_clear_async_pf_completion_queue(vcpu); 2950536336c2SDominik Dingel break; 2951536336c2SDominik Dingel case KVM_REG_S390_PFCOMPARE: 2952536336c2SDominik Dingel r = get_user(vcpu->arch.pfault_compare, 2953536336c2SDominik Dingel (u64 __user *)reg->addr); 2954536336c2SDominik Dingel break; 2955536336c2SDominik Dingel case KVM_REG_S390_PFSELECT: 2956536336c2SDominik Dingel r = get_user(vcpu->arch.pfault_select, 2957536336c2SDominik Dingel (u64 __user *)reg->addr); 2958536336c2SDominik Dingel break; 2959672550fbSChristian Borntraeger case KVM_REG_S390_PP: 2960672550fbSChristian Borntraeger r = get_user(vcpu->arch.sie_block->pp, 2961672550fbSChristian Borntraeger (u64 __user *)reg->addr); 2962672550fbSChristian Borntraeger break; 2963afa45ff5SChristian Borntraeger case KVM_REG_S390_GBEA: 2964afa45ff5SChristian Borntraeger r = get_user(vcpu->arch.sie_block->gbea, 2965afa45ff5SChristian Borntraeger (u64 __user *)reg->addr); 2966afa45ff5SChristian Borntraeger break; 296714eebd91SCarsten Otte default: 296814eebd91SCarsten Otte break; 296914eebd91SCarsten Otte } 297014eebd91SCarsten Otte 297114eebd91SCarsten Otte return r; 297214eebd91SCarsten Otte } 2973b6d33834SChristoffer Dall 2974b0c632dbSHeiko Carstens static int kvm_arch_vcpu_ioctl_initial_reset(struct kvm_vcpu *vcpu) 2975b0c632dbSHeiko Carstens { 2976b0c632dbSHeiko Carstens kvm_s390_vcpu_initial_reset(vcpu); 2977b0c632dbSHeiko Carstens return 0; 2978b0c632dbSHeiko Carstens } 2979b0c632dbSHeiko Carstens 2980b0c632dbSHeiko Carstens int kvm_arch_vcpu_ioctl_set_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs) 2981b0c632dbSHeiko Carstens { 2982875656feSChristoffer Dall vcpu_load(vcpu); 29835a32c1afSChristian Borntraeger memcpy(&vcpu->run->s.regs.gprs, ®s->gprs, sizeof(regs->gprs)); 2984875656feSChristoffer Dall vcpu_put(vcpu); 2985b0c632dbSHeiko Carstens return 0; 2986b0c632dbSHeiko Carstens } 2987b0c632dbSHeiko Carstens 2988b0c632dbSHeiko Carstens int kvm_arch_vcpu_ioctl_get_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs) 2989b0c632dbSHeiko Carstens { 29901fc9b76bSChristoffer Dall vcpu_load(vcpu); 29915a32c1afSChristian Borntraeger memcpy(®s->gprs, &vcpu->run->s.regs.gprs, sizeof(regs->gprs)); 29921fc9b76bSChristoffer Dall vcpu_put(vcpu); 2993b0c632dbSHeiko Carstens return 0; 2994b0c632dbSHeiko Carstens } 2995b0c632dbSHeiko Carstens 2996b0c632dbSHeiko Carstens int kvm_arch_vcpu_ioctl_set_sregs(struct kvm_vcpu *vcpu, 2997b0c632dbSHeiko Carstens struct kvm_sregs *sregs) 2998b0c632dbSHeiko Carstens { 2999b4ef9d4eSChristoffer Dall vcpu_load(vcpu); 3000b4ef9d4eSChristoffer Dall 300159674c1aSChristian Borntraeger memcpy(&vcpu->run->s.regs.acrs, &sregs->acrs, sizeof(sregs->acrs)); 3002b0c632dbSHeiko Carstens memcpy(&vcpu->arch.sie_block->gcr, &sregs->crs, sizeof(sregs->crs)); 3003b4ef9d4eSChristoffer Dall 3004b4ef9d4eSChristoffer Dall vcpu_put(vcpu); 3005b0c632dbSHeiko Carstens return 0; 3006b0c632dbSHeiko Carstens } 3007b0c632dbSHeiko Carstens 3008b0c632dbSHeiko Carstens int kvm_arch_vcpu_ioctl_get_sregs(struct kvm_vcpu *vcpu, 3009b0c632dbSHeiko Carstens struct kvm_sregs *sregs) 3010b0c632dbSHeiko Carstens { 3011bcdec41cSChristoffer Dall vcpu_load(vcpu); 3012bcdec41cSChristoffer Dall 301359674c1aSChristian Borntraeger memcpy(&sregs->acrs, &vcpu->run->s.regs.acrs, sizeof(sregs->acrs)); 3014b0c632dbSHeiko Carstens memcpy(&sregs->crs, &vcpu->arch.sie_block->gcr, sizeof(sregs->crs)); 3015bcdec41cSChristoffer Dall 3016bcdec41cSChristoffer Dall vcpu_put(vcpu); 3017b0c632dbSHeiko Carstens return 0; 3018b0c632dbSHeiko Carstens } 3019b0c632dbSHeiko Carstens 3020b0c632dbSHeiko Carstens int kvm_arch_vcpu_ioctl_set_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu) 3021b0c632dbSHeiko Carstens { 30226a96bc7fSChristoffer Dall int ret = 0; 30236a96bc7fSChristoffer Dall 30246a96bc7fSChristoffer Dall vcpu_load(vcpu); 30256a96bc7fSChristoffer Dall 30266a96bc7fSChristoffer Dall if (test_fp_ctl(fpu->fpc)) { 30276a96bc7fSChristoffer Dall ret = -EINVAL; 30286a96bc7fSChristoffer Dall goto out; 30296a96bc7fSChristoffer Dall } 3030e1788bb9SChristian Borntraeger vcpu->run->s.regs.fpc = fpu->fpc; 30319abc2a08SDavid Hildenbrand if (MACHINE_HAS_VX) 3032a7d4b8f2SDavid Hildenbrand convert_fp_to_vx((__vector128 *) vcpu->run->s.regs.vrs, 3033a7d4b8f2SDavid Hildenbrand (freg_t *) fpu->fprs); 30349abc2a08SDavid Hildenbrand else 3035a7d4b8f2SDavid Hildenbrand memcpy(vcpu->run->s.regs.fprs, &fpu->fprs, sizeof(fpu->fprs)); 30366a96bc7fSChristoffer Dall 30376a96bc7fSChristoffer Dall out: 30386a96bc7fSChristoffer Dall vcpu_put(vcpu); 30396a96bc7fSChristoffer Dall return ret; 3040b0c632dbSHeiko Carstens } 3041b0c632dbSHeiko Carstens 3042b0c632dbSHeiko Carstens int kvm_arch_vcpu_ioctl_get_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu) 3043b0c632dbSHeiko Carstens { 30441393123eSChristoffer Dall vcpu_load(vcpu); 30451393123eSChristoffer Dall 30469abc2a08SDavid Hildenbrand /* make sure we have the latest values */ 30479abc2a08SDavid Hildenbrand save_fpu_regs(); 30489abc2a08SDavid Hildenbrand if (MACHINE_HAS_VX) 3049a7d4b8f2SDavid Hildenbrand convert_vx_to_fp((freg_t *) fpu->fprs, 3050a7d4b8f2SDavid Hildenbrand (__vector128 *) vcpu->run->s.regs.vrs); 30519abc2a08SDavid Hildenbrand else 3052a7d4b8f2SDavid Hildenbrand memcpy(fpu->fprs, vcpu->run->s.regs.fprs, sizeof(fpu->fprs)); 3053e1788bb9SChristian Borntraeger fpu->fpc = vcpu->run->s.regs.fpc; 30541393123eSChristoffer Dall 30551393123eSChristoffer Dall vcpu_put(vcpu); 3056b0c632dbSHeiko Carstens return 0; 3057b0c632dbSHeiko Carstens } 3058b0c632dbSHeiko Carstens 3059b0c632dbSHeiko Carstens static int kvm_arch_vcpu_ioctl_set_initial_psw(struct kvm_vcpu *vcpu, psw_t psw) 3060b0c632dbSHeiko Carstens { 3061b0c632dbSHeiko Carstens int rc = 0; 3062b0c632dbSHeiko Carstens 30637a42fdc2SDavid Hildenbrand if (!is_vcpu_stopped(vcpu)) 3064b0c632dbSHeiko Carstens rc = -EBUSY; 3065d7b0b5ebSCarsten Otte else { 3066d7b0b5ebSCarsten Otte vcpu->run->psw_mask = psw.mask; 3067d7b0b5ebSCarsten Otte vcpu->run->psw_addr = psw.addr; 3068d7b0b5ebSCarsten Otte } 3069b0c632dbSHeiko Carstens return rc; 3070b0c632dbSHeiko Carstens } 3071b0c632dbSHeiko Carstens 3072b0c632dbSHeiko Carstens int kvm_arch_vcpu_ioctl_translate(struct kvm_vcpu *vcpu, 3073b0c632dbSHeiko Carstens struct kvm_translation *tr) 3074b0c632dbSHeiko Carstens { 3075b0c632dbSHeiko Carstens return -EINVAL; /* not implemented yet */ 3076b0c632dbSHeiko Carstens } 3077b0c632dbSHeiko Carstens 307827291e21SDavid Hildenbrand #define VALID_GUESTDBG_FLAGS (KVM_GUESTDBG_SINGLESTEP | \ 307927291e21SDavid Hildenbrand KVM_GUESTDBG_USE_HW_BP | \ 308027291e21SDavid Hildenbrand KVM_GUESTDBG_ENABLE) 308127291e21SDavid Hildenbrand 3082d0bfb940SJan Kiszka int kvm_arch_vcpu_ioctl_set_guest_debug(struct kvm_vcpu *vcpu, 3083d0bfb940SJan Kiszka struct kvm_guest_debug *dbg) 3084b0c632dbSHeiko Carstens { 308527291e21SDavid Hildenbrand int rc = 0; 308627291e21SDavid Hildenbrand 308766b56562SChristoffer Dall vcpu_load(vcpu); 308866b56562SChristoffer Dall 308927291e21SDavid Hildenbrand vcpu->guest_debug = 0; 309027291e21SDavid Hildenbrand kvm_s390_clear_bp_data(vcpu); 309127291e21SDavid Hildenbrand 309266b56562SChristoffer Dall if (dbg->control & ~VALID_GUESTDBG_FLAGS) { 309366b56562SChristoffer Dall rc = -EINVAL; 309466b56562SChristoffer Dall goto out; 309566b56562SChristoffer Dall } 309666b56562SChristoffer Dall if (!sclp.has_gpere) { 309766b56562SChristoffer Dall rc = -EINVAL; 309866b56562SChristoffer Dall goto out; 309966b56562SChristoffer Dall } 310027291e21SDavid Hildenbrand 310127291e21SDavid Hildenbrand if (dbg->control & KVM_GUESTDBG_ENABLE) { 310227291e21SDavid Hildenbrand vcpu->guest_debug = dbg->control; 310327291e21SDavid Hildenbrand /* enforce guest PER */ 3104ef8f4f49SDavid Hildenbrand kvm_s390_set_cpuflags(vcpu, CPUSTAT_P); 310527291e21SDavid Hildenbrand 310627291e21SDavid Hildenbrand if (dbg->control & KVM_GUESTDBG_USE_HW_BP) 310727291e21SDavid Hildenbrand rc = kvm_s390_import_bp_data(vcpu, dbg); 310827291e21SDavid Hildenbrand } else { 31099daecfc6SDavid Hildenbrand kvm_s390_clear_cpuflags(vcpu, CPUSTAT_P); 311027291e21SDavid Hildenbrand vcpu->arch.guestdbg.last_bp = 0; 311127291e21SDavid Hildenbrand } 311227291e21SDavid Hildenbrand 311327291e21SDavid Hildenbrand if (rc) { 311427291e21SDavid Hildenbrand vcpu->guest_debug = 0; 311527291e21SDavid Hildenbrand kvm_s390_clear_bp_data(vcpu); 31169daecfc6SDavid Hildenbrand kvm_s390_clear_cpuflags(vcpu, CPUSTAT_P); 311727291e21SDavid Hildenbrand } 311827291e21SDavid Hildenbrand 311966b56562SChristoffer Dall out: 312066b56562SChristoffer Dall vcpu_put(vcpu); 312127291e21SDavid Hildenbrand return rc; 3122b0c632dbSHeiko Carstens } 3123b0c632dbSHeiko Carstens 312462d9f0dbSMarcelo Tosatti int kvm_arch_vcpu_ioctl_get_mpstate(struct kvm_vcpu *vcpu, 312562d9f0dbSMarcelo Tosatti struct kvm_mp_state *mp_state) 312662d9f0dbSMarcelo Tosatti { 3127fd232561SChristoffer Dall int ret; 3128fd232561SChristoffer Dall 3129fd232561SChristoffer Dall vcpu_load(vcpu); 3130fd232561SChristoffer Dall 31316352e4d2SDavid Hildenbrand /* CHECK_STOP and LOAD are not supported yet */ 3132fd232561SChristoffer Dall ret = is_vcpu_stopped(vcpu) ? KVM_MP_STATE_STOPPED : 31336352e4d2SDavid Hildenbrand KVM_MP_STATE_OPERATING; 3134fd232561SChristoffer Dall 3135fd232561SChristoffer Dall vcpu_put(vcpu); 3136fd232561SChristoffer Dall return ret; 313762d9f0dbSMarcelo Tosatti } 313862d9f0dbSMarcelo Tosatti 313962d9f0dbSMarcelo Tosatti int kvm_arch_vcpu_ioctl_set_mpstate(struct kvm_vcpu *vcpu, 314062d9f0dbSMarcelo Tosatti struct kvm_mp_state *mp_state) 314162d9f0dbSMarcelo Tosatti { 31426352e4d2SDavid Hildenbrand int rc = 0; 31436352e4d2SDavid Hildenbrand 3144e83dff5eSChristoffer Dall vcpu_load(vcpu); 3145e83dff5eSChristoffer Dall 31466352e4d2SDavid Hildenbrand /* user space knows about this interface - let it control the state */ 31476352e4d2SDavid Hildenbrand vcpu->kvm->arch.user_cpu_state_ctrl = 1; 31486352e4d2SDavid Hildenbrand 31496352e4d2SDavid Hildenbrand switch (mp_state->mp_state) { 31506352e4d2SDavid Hildenbrand case KVM_MP_STATE_STOPPED: 31516352e4d2SDavid Hildenbrand kvm_s390_vcpu_stop(vcpu); 31526352e4d2SDavid Hildenbrand break; 31536352e4d2SDavid Hildenbrand case KVM_MP_STATE_OPERATING: 31546352e4d2SDavid Hildenbrand kvm_s390_vcpu_start(vcpu); 31556352e4d2SDavid Hildenbrand break; 31566352e4d2SDavid Hildenbrand case KVM_MP_STATE_LOAD: 31576352e4d2SDavid Hildenbrand case KVM_MP_STATE_CHECK_STOP: 31586352e4d2SDavid Hildenbrand /* fall through - CHECK_STOP and LOAD are not supported yet */ 31596352e4d2SDavid Hildenbrand default: 31606352e4d2SDavid Hildenbrand rc = -ENXIO; 31616352e4d2SDavid Hildenbrand } 31626352e4d2SDavid Hildenbrand 3163e83dff5eSChristoffer Dall vcpu_put(vcpu); 31646352e4d2SDavid Hildenbrand return rc; 316562d9f0dbSMarcelo Tosatti } 316662d9f0dbSMarcelo Tosatti 31678ad35755SDavid Hildenbrand static bool ibs_enabled(struct kvm_vcpu *vcpu) 31688ad35755SDavid Hildenbrand { 31698d5fb0dcSDavid Hildenbrand return kvm_s390_test_cpuflags(vcpu, CPUSTAT_IBS); 31708ad35755SDavid Hildenbrand } 31718ad35755SDavid Hildenbrand 31722c70fe44SChristian Borntraeger static int kvm_s390_handle_requests(struct kvm_vcpu *vcpu) 31732c70fe44SChristian Borntraeger { 31748ad35755SDavid Hildenbrand retry: 31758e236546SChristian Borntraeger kvm_s390_vcpu_request_handled(vcpu); 31762fa6e1e1SRadim Krčmář if (!kvm_request_pending(vcpu)) 3177586b7ccdSChristian Borntraeger return 0; 31782c70fe44SChristian Borntraeger /* 31792c70fe44SChristian Borntraeger * We use MMU_RELOAD just to re-arm the ipte notifier for the 3180b2d73b2aSMartin Schwidefsky * guest prefix page. gmap_mprotect_notify will wait on the ptl lock. 31812c70fe44SChristian Borntraeger * This ensures that the ipte instruction for this request has 31822c70fe44SChristian Borntraeger * already finished. We might race against a second unmapper that 31832c70fe44SChristian Borntraeger * wants to set the blocking bit. Lets just retry the request loop. 31842c70fe44SChristian Borntraeger */ 31858ad35755SDavid Hildenbrand if (kvm_check_request(KVM_REQ_MMU_RELOAD, vcpu)) { 31862c70fe44SChristian Borntraeger int rc; 3187b2d73b2aSMartin Schwidefsky rc = gmap_mprotect_notify(vcpu->arch.gmap, 3188fda902cbSMichael Mueller kvm_s390_get_prefix(vcpu), 3189b2d73b2aSMartin Schwidefsky PAGE_SIZE * 2, PROT_WRITE); 3190aca411a4SJulius Niedworok if (rc) { 3191aca411a4SJulius Niedworok kvm_make_request(KVM_REQ_MMU_RELOAD, vcpu); 31922c70fe44SChristian Borntraeger return rc; 3193aca411a4SJulius Niedworok } 31948ad35755SDavid Hildenbrand goto retry; 31952c70fe44SChristian Borntraeger } 31968ad35755SDavid Hildenbrand 3197d3d692c8SDavid Hildenbrand if (kvm_check_request(KVM_REQ_TLB_FLUSH, vcpu)) { 3198d3d692c8SDavid Hildenbrand vcpu->arch.sie_block->ihcpu = 0xffff; 3199d3d692c8SDavid Hildenbrand goto retry; 3200d3d692c8SDavid Hildenbrand } 3201d3d692c8SDavid Hildenbrand 32028ad35755SDavid Hildenbrand if (kvm_check_request(KVM_REQ_ENABLE_IBS, vcpu)) { 32038ad35755SDavid Hildenbrand if (!ibs_enabled(vcpu)) { 32048ad35755SDavid Hildenbrand trace_kvm_s390_enable_disable_ibs(vcpu->vcpu_id, 1); 3205ef8f4f49SDavid Hildenbrand kvm_s390_set_cpuflags(vcpu, CPUSTAT_IBS); 32068ad35755SDavid Hildenbrand } 32078ad35755SDavid Hildenbrand goto retry; 32088ad35755SDavid Hildenbrand } 32098ad35755SDavid Hildenbrand 32108ad35755SDavid Hildenbrand if (kvm_check_request(KVM_REQ_DISABLE_IBS, vcpu)) { 32118ad35755SDavid Hildenbrand if (ibs_enabled(vcpu)) { 32128ad35755SDavid Hildenbrand trace_kvm_s390_enable_disable_ibs(vcpu->vcpu_id, 0); 32139daecfc6SDavid Hildenbrand kvm_s390_clear_cpuflags(vcpu, CPUSTAT_IBS); 32148ad35755SDavid Hildenbrand } 32158ad35755SDavid Hildenbrand goto retry; 32168ad35755SDavid Hildenbrand } 32178ad35755SDavid Hildenbrand 32186502a34cSDavid Hildenbrand if (kvm_check_request(KVM_REQ_ICPT_OPEREXC, vcpu)) { 32196502a34cSDavid Hildenbrand vcpu->arch.sie_block->ictl |= ICTL_OPEREXC; 32206502a34cSDavid Hildenbrand goto retry; 32216502a34cSDavid Hildenbrand } 32226502a34cSDavid Hildenbrand 3223190df4a2SClaudio Imbrenda if (kvm_check_request(KVM_REQ_START_MIGRATION, vcpu)) { 3224190df4a2SClaudio Imbrenda /* 3225c9f0a2b8SJanosch Frank * Disable CMM virtualization; we will emulate the ESSA 3226190df4a2SClaudio Imbrenda * instruction manually, in order to provide additional 3227190df4a2SClaudio Imbrenda * functionalities needed for live migration. 3228190df4a2SClaudio Imbrenda */ 3229190df4a2SClaudio Imbrenda vcpu->arch.sie_block->ecb2 &= ~ECB2_CMMA; 3230190df4a2SClaudio Imbrenda goto retry; 3231190df4a2SClaudio Imbrenda } 3232190df4a2SClaudio Imbrenda 3233190df4a2SClaudio Imbrenda if (kvm_check_request(KVM_REQ_STOP_MIGRATION, vcpu)) { 3234190df4a2SClaudio Imbrenda /* 3235c9f0a2b8SJanosch Frank * Re-enable CMM virtualization if CMMA is available and 3236c9f0a2b8SJanosch Frank * CMM has been used. 3237190df4a2SClaudio Imbrenda */ 3238190df4a2SClaudio Imbrenda if ((vcpu->kvm->arch.use_cmma) && 3239c9f0a2b8SJanosch Frank (vcpu->kvm->mm->context.uses_cmm)) 3240190df4a2SClaudio Imbrenda vcpu->arch.sie_block->ecb2 |= ECB2_CMMA; 3241190df4a2SClaudio Imbrenda goto retry; 3242190df4a2SClaudio Imbrenda } 3243190df4a2SClaudio Imbrenda 32440759d068SDavid Hildenbrand /* nothing to do, just clear the request */ 324572875d8aSRadim Krčmář kvm_clear_request(KVM_REQ_UNHALT, vcpu); 32463194cdb7SDavid Hildenbrand /* we left the vsie handler, nothing to do, just clear the request */ 32473194cdb7SDavid Hildenbrand kvm_clear_request(KVM_REQ_VSIE_RESTART, vcpu); 32480759d068SDavid Hildenbrand 32492c70fe44SChristian Borntraeger return 0; 32502c70fe44SChristian Borntraeger } 32512c70fe44SChristian Borntraeger 32520e7def5fSDavid Hildenbrand void kvm_s390_set_tod_clock(struct kvm *kvm, 32538fa1696eSCollin L. Walling const struct kvm_s390_vm_tod_clock *gtod) 32548fa1696eSCollin L. Walling { 32558fa1696eSCollin L. Walling struct kvm_vcpu *vcpu; 32568fa1696eSCollin L. Walling struct kvm_s390_tod_clock_ext htod; 32578fa1696eSCollin L. Walling int i; 32588fa1696eSCollin L. Walling 32598fa1696eSCollin L. Walling mutex_lock(&kvm->lock); 32608fa1696eSCollin L. Walling preempt_disable(); 32618fa1696eSCollin L. Walling 32628fa1696eSCollin L. Walling get_tod_clock_ext((char *)&htod); 32638fa1696eSCollin L. Walling 32648fa1696eSCollin L. Walling kvm->arch.epoch = gtod->tod - htod.tod; 32650e7def5fSDavid Hildenbrand kvm->arch.epdx = 0; 32660e7def5fSDavid Hildenbrand if (test_kvm_facility(kvm, 139)) { 32678fa1696eSCollin L. Walling kvm->arch.epdx = gtod->epoch_idx - htod.epoch_idx; 32688fa1696eSCollin L. Walling if (kvm->arch.epoch > gtod->tod) 32698fa1696eSCollin L. Walling kvm->arch.epdx -= 1; 32700e7def5fSDavid Hildenbrand } 32718fa1696eSCollin L. Walling 32728fa1696eSCollin L. Walling kvm_s390_vcpu_block_all(kvm); 32738fa1696eSCollin L. Walling kvm_for_each_vcpu(i, vcpu, kvm) { 32748fa1696eSCollin L. Walling vcpu->arch.sie_block->epoch = kvm->arch.epoch; 32758fa1696eSCollin L. Walling vcpu->arch.sie_block->epdx = kvm->arch.epdx; 32768fa1696eSCollin L. Walling } 32778fa1696eSCollin L. Walling 32788fa1696eSCollin L. Walling kvm_s390_vcpu_unblock_all(kvm); 32798fa1696eSCollin L. Walling preempt_enable(); 32808fa1696eSCollin L. Walling mutex_unlock(&kvm->lock); 32818fa1696eSCollin L. Walling } 32828fa1696eSCollin L. Walling 3283fa576c58SThomas Huth /** 3284fa576c58SThomas Huth * kvm_arch_fault_in_page - fault-in guest page if necessary 3285fa576c58SThomas Huth * @vcpu: The corresponding virtual cpu 3286fa576c58SThomas Huth * @gpa: Guest physical address 3287fa576c58SThomas Huth * @writable: Whether the page should be writable or not 3288fa576c58SThomas Huth * 3289fa576c58SThomas Huth * Make sure that a guest page has been faulted-in on the host. 3290fa576c58SThomas Huth * 3291fa576c58SThomas Huth * Return: Zero on success, negative error code otherwise. 3292fa576c58SThomas Huth */ 3293fa576c58SThomas Huth long kvm_arch_fault_in_page(struct kvm_vcpu *vcpu, gpa_t gpa, int writable) 329424eb3a82SDominik Dingel { 3295527e30b4SMartin Schwidefsky return gmap_fault(vcpu->arch.gmap, gpa, 3296527e30b4SMartin Schwidefsky writable ? FAULT_FLAG_WRITE : 0); 329724eb3a82SDominik Dingel } 329824eb3a82SDominik Dingel 32993c038e6bSDominik Dingel static void __kvm_inject_pfault_token(struct kvm_vcpu *vcpu, bool start_token, 33003c038e6bSDominik Dingel unsigned long token) 33013c038e6bSDominik Dingel { 33023c038e6bSDominik Dingel struct kvm_s390_interrupt inti; 3303383d0b05SJens Freimann struct kvm_s390_irq irq; 33043c038e6bSDominik Dingel 33053c038e6bSDominik Dingel if (start_token) { 3306383d0b05SJens Freimann irq.u.ext.ext_params2 = token; 3307383d0b05SJens Freimann irq.type = KVM_S390_INT_PFAULT_INIT; 3308383d0b05SJens Freimann WARN_ON_ONCE(kvm_s390_inject_vcpu(vcpu, &irq)); 33093c038e6bSDominik Dingel } else { 33103c038e6bSDominik Dingel inti.type = KVM_S390_INT_PFAULT_DONE; 3311383d0b05SJens Freimann inti.parm64 = token; 33123c038e6bSDominik Dingel WARN_ON_ONCE(kvm_s390_inject_vm(vcpu->kvm, &inti)); 33133c038e6bSDominik Dingel } 33143c038e6bSDominik Dingel } 33153c038e6bSDominik Dingel 33163c038e6bSDominik Dingel void kvm_arch_async_page_not_present(struct kvm_vcpu *vcpu, 33173c038e6bSDominik Dingel struct kvm_async_pf *work) 33183c038e6bSDominik Dingel { 33193c038e6bSDominik Dingel trace_kvm_s390_pfault_init(vcpu, work->arch.pfault_token); 33203c038e6bSDominik Dingel __kvm_inject_pfault_token(vcpu, true, work->arch.pfault_token); 33213c038e6bSDominik Dingel } 33223c038e6bSDominik Dingel 33233c038e6bSDominik Dingel void kvm_arch_async_page_present(struct kvm_vcpu *vcpu, 33243c038e6bSDominik Dingel struct kvm_async_pf *work) 33253c038e6bSDominik Dingel { 33263c038e6bSDominik Dingel trace_kvm_s390_pfault_done(vcpu, work->arch.pfault_token); 33273c038e6bSDominik Dingel __kvm_inject_pfault_token(vcpu, false, work->arch.pfault_token); 33283c038e6bSDominik Dingel } 33293c038e6bSDominik Dingel 33303c038e6bSDominik Dingel void kvm_arch_async_page_ready(struct kvm_vcpu *vcpu, 33313c038e6bSDominik Dingel struct kvm_async_pf *work) 33323c038e6bSDominik Dingel { 33333c038e6bSDominik Dingel /* s390 will always inject the page directly */ 33343c038e6bSDominik Dingel } 33353c038e6bSDominik Dingel 33363c038e6bSDominik Dingel bool kvm_arch_can_inject_async_page_present(struct kvm_vcpu *vcpu) 33373c038e6bSDominik Dingel { 33383c038e6bSDominik Dingel /* 33393c038e6bSDominik Dingel * s390 will always inject the page directly, 33403c038e6bSDominik Dingel * but we still want check_async_completion to cleanup 33413c038e6bSDominik Dingel */ 33423c038e6bSDominik Dingel return true; 33433c038e6bSDominik Dingel } 33443c038e6bSDominik Dingel 33453c038e6bSDominik Dingel static int kvm_arch_setup_async_pf(struct kvm_vcpu *vcpu) 33463c038e6bSDominik Dingel { 33473c038e6bSDominik Dingel hva_t hva; 33483c038e6bSDominik Dingel struct kvm_arch_async_pf arch; 33493c038e6bSDominik Dingel int rc; 33503c038e6bSDominik Dingel 33513c038e6bSDominik Dingel if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID) 33523c038e6bSDominik Dingel return 0; 33533c038e6bSDominik Dingel if ((vcpu->arch.sie_block->gpsw.mask & vcpu->arch.pfault_select) != 33543c038e6bSDominik Dingel vcpu->arch.pfault_compare) 33553c038e6bSDominik Dingel return 0; 33563c038e6bSDominik Dingel if (psw_extint_disabled(vcpu)) 33573c038e6bSDominik Dingel return 0; 33589a022067SDavid Hildenbrand if (kvm_s390_vcpu_has_irq(vcpu, 0)) 33593c038e6bSDominik Dingel return 0; 3360b9224cd7SDavid Hildenbrand if (!(vcpu->arch.sie_block->gcr[0] & CR0_SERVICE_SIGNAL_SUBMASK)) 33613c038e6bSDominik Dingel return 0; 33623c038e6bSDominik Dingel if (!vcpu->arch.gmap->pfault_enabled) 33633c038e6bSDominik Dingel return 0; 33643c038e6bSDominik Dingel 336581480cc1SHeiko Carstens hva = gfn_to_hva(vcpu->kvm, gpa_to_gfn(current->thread.gmap_addr)); 336681480cc1SHeiko Carstens hva += current->thread.gmap_addr & ~PAGE_MASK; 336781480cc1SHeiko Carstens if (read_guest_real(vcpu, vcpu->arch.pfault_token, &arch.pfault_token, 8)) 33683c038e6bSDominik Dingel return 0; 33693c038e6bSDominik Dingel 33703c038e6bSDominik Dingel rc = kvm_setup_async_pf(vcpu, current->thread.gmap_addr, hva, &arch); 33713c038e6bSDominik Dingel return rc; 33723c038e6bSDominik Dingel } 33733c038e6bSDominik Dingel 33743fb4c40fSThomas Huth static int vcpu_pre_run(struct kvm_vcpu *vcpu) 3375b0c632dbSHeiko Carstens { 33763fb4c40fSThomas Huth int rc, cpuflags; 3377e168bf8dSCarsten Otte 33783c038e6bSDominik Dingel /* 33793c038e6bSDominik Dingel * On s390 notifications for arriving pages will be delivered directly 33803c038e6bSDominik Dingel * to the guest but the house keeping for completed pfaults is 33813c038e6bSDominik Dingel * handled outside the worker. 33823c038e6bSDominik Dingel */ 33833c038e6bSDominik Dingel kvm_check_async_pf_completion(vcpu); 33843c038e6bSDominik Dingel 33857ec7c8c7SChristian Borntraeger vcpu->arch.sie_block->gg14 = vcpu->run->s.regs.gprs[14]; 33867ec7c8c7SChristian Borntraeger vcpu->arch.sie_block->gg15 = vcpu->run->s.regs.gprs[15]; 3387b0c632dbSHeiko Carstens 3388b0c632dbSHeiko Carstens if (need_resched()) 3389b0c632dbSHeiko Carstens schedule(); 3390b0c632dbSHeiko Carstens 3391d3a73acbSMartin Schwidefsky if (test_cpu_flag(CIF_MCCK_PENDING)) 339271cde587SChristian Borntraeger s390_handle_mcck(); 339371cde587SChristian Borntraeger 339479395031SJens Freimann if (!kvm_is_ucontrol(vcpu->kvm)) { 339579395031SJens Freimann rc = kvm_s390_deliver_pending_interrupts(vcpu); 339679395031SJens Freimann if (rc) 339779395031SJens Freimann return rc; 339879395031SJens Freimann } 33990ff31867SCarsten Otte 34002c70fe44SChristian Borntraeger rc = kvm_s390_handle_requests(vcpu); 34012c70fe44SChristian Borntraeger if (rc) 34022c70fe44SChristian Borntraeger return rc; 34032c70fe44SChristian Borntraeger 340427291e21SDavid Hildenbrand if (guestdbg_enabled(vcpu)) { 340527291e21SDavid Hildenbrand kvm_s390_backup_guest_per_regs(vcpu); 340627291e21SDavid Hildenbrand kvm_s390_patch_guest_per_regs(vcpu); 340727291e21SDavid Hildenbrand } 340827291e21SDavid Hildenbrand 3409b0c632dbSHeiko Carstens vcpu->arch.sie_block->icptcode = 0; 34103fb4c40fSThomas Huth cpuflags = atomic_read(&vcpu->arch.sie_block->cpuflags); 34113fb4c40fSThomas Huth VCPU_EVENT(vcpu, 6, "entering sie flags %x", cpuflags); 34123fb4c40fSThomas Huth trace_kvm_s390_sie_enter(vcpu, cpuflags); 34132b29a9fdSDominik Dingel 34143fb4c40fSThomas Huth return 0; 34153fb4c40fSThomas Huth } 34163fb4c40fSThomas Huth 3417492d8642SThomas Huth static int vcpu_post_run_fault_in_sie(struct kvm_vcpu *vcpu) 3418492d8642SThomas Huth { 341956317920SDavid Hildenbrand struct kvm_s390_pgm_info pgm_info = { 342056317920SDavid Hildenbrand .code = PGM_ADDRESSING, 342156317920SDavid Hildenbrand }; 342256317920SDavid Hildenbrand u8 opcode, ilen; 3423492d8642SThomas Huth int rc; 3424492d8642SThomas Huth 3425492d8642SThomas Huth VCPU_EVENT(vcpu, 3, "%s", "fault in sie instruction"); 3426492d8642SThomas Huth trace_kvm_s390_sie_fault(vcpu); 3427492d8642SThomas Huth 3428492d8642SThomas Huth /* 3429492d8642SThomas Huth * We want to inject an addressing exception, which is defined as a 3430492d8642SThomas Huth * suppressing or terminating exception. However, since we came here 3431492d8642SThomas Huth * by a DAT access exception, the PSW still points to the faulting 3432492d8642SThomas Huth * instruction since DAT exceptions are nullifying. So we've got 3433492d8642SThomas Huth * to look up the current opcode to get the length of the instruction 3434492d8642SThomas Huth * to be able to forward the PSW. 3435492d8642SThomas Huth */ 34363fa8cad7SDavid Hildenbrand rc = read_guest_instr(vcpu, vcpu->arch.sie_block->gpsw.addr, &opcode, 1); 343756317920SDavid Hildenbrand ilen = insn_length(opcode); 34389b0d721aSDavid Hildenbrand if (rc < 0) { 34399b0d721aSDavid Hildenbrand return rc; 34409b0d721aSDavid Hildenbrand } else if (rc) { 34419b0d721aSDavid Hildenbrand /* Instruction-Fetching Exceptions - we can't detect the ilen. 34429b0d721aSDavid Hildenbrand * Forward by arbitrary ilc, injection will take care of 34439b0d721aSDavid Hildenbrand * nullification if necessary. 34449b0d721aSDavid Hildenbrand */ 34459b0d721aSDavid Hildenbrand pgm_info = vcpu->arch.pgm; 34469b0d721aSDavid Hildenbrand ilen = 4; 34479b0d721aSDavid Hildenbrand } 344856317920SDavid Hildenbrand pgm_info.flags = ilen | KVM_S390_PGM_FLAGS_ILC_VALID; 344956317920SDavid Hildenbrand kvm_s390_forward_psw(vcpu, ilen); 345056317920SDavid Hildenbrand return kvm_s390_inject_prog_irq(vcpu, &pgm_info); 3451492d8642SThomas Huth } 3452492d8642SThomas Huth 34533fb4c40fSThomas Huth static int vcpu_post_run(struct kvm_vcpu *vcpu, int exit_reason) 34543fb4c40fSThomas Huth { 34554d62fcc0SQingFeng Hao struct mcck_volatile_info *mcck_info; 34564d62fcc0SQingFeng Hao struct sie_page *sie_page; 34574d62fcc0SQingFeng Hao 34582b29a9fdSDominik Dingel VCPU_EVENT(vcpu, 6, "exit sie icptcode %d", 34592b29a9fdSDominik Dingel vcpu->arch.sie_block->icptcode); 34602b29a9fdSDominik Dingel trace_kvm_s390_sie_exit(vcpu, vcpu->arch.sie_block->icptcode); 34612b29a9fdSDominik Dingel 346227291e21SDavid Hildenbrand if (guestdbg_enabled(vcpu)) 346327291e21SDavid Hildenbrand kvm_s390_restore_guest_per_regs(vcpu); 346427291e21SDavid Hildenbrand 34657ec7c8c7SChristian Borntraeger vcpu->run->s.regs.gprs[14] = vcpu->arch.sie_block->gg14; 34667ec7c8c7SChristian Borntraeger vcpu->run->s.regs.gprs[15] = vcpu->arch.sie_block->gg15; 346771f116bfSDavid Hildenbrand 34684d62fcc0SQingFeng Hao if (exit_reason == -EINTR) { 34694d62fcc0SQingFeng Hao VCPU_EVENT(vcpu, 3, "%s", "machine check"); 34704d62fcc0SQingFeng Hao sie_page = container_of(vcpu->arch.sie_block, 34714d62fcc0SQingFeng Hao struct sie_page, sie_block); 34724d62fcc0SQingFeng Hao mcck_info = &sie_page->mcck_info; 34734d62fcc0SQingFeng Hao kvm_s390_reinject_machine_check(vcpu, mcck_info); 34744d62fcc0SQingFeng Hao return 0; 34754d62fcc0SQingFeng Hao } 34764d62fcc0SQingFeng Hao 347771f116bfSDavid Hildenbrand if (vcpu->arch.sie_block->icptcode > 0) { 347871f116bfSDavid Hildenbrand int rc = kvm_handle_sie_intercept(vcpu); 347971f116bfSDavid Hildenbrand 348071f116bfSDavid Hildenbrand if (rc != -EOPNOTSUPP) 348171f116bfSDavid Hildenbrand return rc; 348271f116bfSDavid Hildenbrand vcpu->run->exit_reason = KVM_EXIT_S390_SIEIC; 348371f116bfSDavid Hildenbrand vcpu->run->s390_sieic.icptcode = vcpu->arch.sie_block->icptcode; 348471f116bfSDavid Hildenbrand vcpu->run->s390_sieic.ipa = vcpu->arch.sie_block->ipa; 348571f116bfSDavid Hildenbrand vcpu->run->s390_sieic.ipb = vcpu->arch.sie_block->ipb; 348671f116bfSDavid Hildenbrand return -EREMOTE; 348771f116bfSDavid Hildenbrand } else if (exit_reason != -EFAULT) { 348871f116bfSDavid Hildenbrand vcpu->stat.exit_null++; 348971f116bfSDavid Hildenbrand return 0; 3490210b1607SThomas Huth } else if (kvm_is_ucontrol(vcpu->kvm)) { 3491210b1607SThomas Huth vcpu->run->exit_reason = KVM_EXIT_S390_UCONTROL; 3492210b1607SThomas Huth vcpu->run->s390_ucontrol.trans_exc_code = 3493210b1607SThomas Huth current->thread.gmap_addr; 3494210b1607SThomas Huth vcpu->run->s390_ucontrol.pgm_code = 0x10; 349571f116bfSDavid Hildenbrand return -EREMOTE; 349624eb3a82SDominik Dingel } else if (current->thread.gmap_pfault) { 34973c038e6bSDominik Dingel trace_kvm_s390_major_guest_pfault(vcpu); 349824eb3a82SDominik Dingel current->thread.gmap_pfault = 0; 349971f116bfSDavid Hildenbrand if (kvm_arch_setup_async_pf(vcpu)) 350071f116bfSDavid Hildenbrand return 0; 350171f116bfSDavid Hildenbrand return kvm_arch_fault_in_page(vcpu, current->thread.gmap_addr, 1); 3502fa576c58SThomas Huth } 350371f116bfSDavid Hildenbrand return vcpu_post_run_fault_in_sie(vcpu); 35043fb4c40fSThomas Huth } 35053fb4c40fSThomas Huth 35063fb4c40fSThomas Huth static int __vcpu_run(struct kvm_vcpu *vcpu) 35073fb4c40fSThomas Huth { 35083fb4c40fSThomas Huth int rc, exit_reason; 35093fb4c40fSThomas Huth 3510800c1065SThomas Huth /* 3511800c1065SThomas Huth * We try to hold kvm->srcu during most of vcpu_run (except when run- 3512800c1065SThomas Huth * ning the guest), so that memslots (and other stuff) are protected 3513800c1065SThomas Huth */ 3514800c1065SThomas Huth vcpu->srcu_idx = srcu_read_lock(&vcpu->kvm->srcu); 3515800c1065SThomas Huth 3516a76ccff6SThomas Huth do { 35173fb4c40fSThomas Huth rc = vcpu_pre_run(vcpu); 35183fb4c40fSThomas Huth if (rc) 3519a76ccff6SThomas Huth break; 35203fb4c40fSThomas Huth 3521800c1065SThomas Huth srcu_read_unlock(&vcpu->kvm->srcu, vcpu->srcu_idx); 35223fb4c40fSThomas Huth /* 3523a76ccff6SThomas Huth * As PF_VCPU will be used in fault handler, between 3524a76ccff6SThomas Huth * guest_enter and guest_exit should be no uaccess. 35253fb4c40fSThomas Huth */ 35260097d12eSChristian Borntraeger local_irq_disable(); 35276edaa530SPaolo Bonzini guest_enter_irqoff(); 3528db0758b2SDavid Hildenbrand __disable_cpu_timer_accounting(vcpu); 35290097d12eSChristian Borntraeger local_irq_enable(); 3530a76ccff6SThomas Huth exit_reason = sie64a(vcpu->arch.sie_block, 3531a76ccff6SThomas Huth vcpu->run->s.regs.gprs); 35320097d12eSChristian Borntraeger local_irq_disable(); 3533db0758b2SDavid Hildenbrand __enable_cpu_timer_accounting(vcpu); 35346edaa530SPaolo Bonzini guest_exit_irqoff(); 35350097d12eSChristian Borntraeger local_irq_enable(); 3536800c1065SThomas Huth vcpu->srcu_idx = srcu_read_lock(&vcpu->kvm->srcu); 35373fb4c40fSThomas Huth 35383fb4c40fSThomas Huth rc = vcpu_post_run(vcpu, exit_reason); 353927291e21SDavid Hildenbrand } while (!signal_pending(current) && !guestdbg_exit_pending(vcpu) && !rc); 35403fb4c40fSThomas Huth 3541800c1065SThomas Huth srcu_read_unlock(&vcpu->kvm->srcu, vcpu->srcu_idx); 3542e168bf8dSCarsten Otte return rc; 3543b0c632dbSHeiko Carstens } 3544b0c632dbSHeiko Carstens 3545b028ee3eSDavid Hildenbrand static void sync_regs(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run) 3546b028ee3eSDavid Hildenbrand { 35474d5f2c04SChristian Borntraeger struct runtime_instr_cb *riccb; 35484e0b1ab7SFan Zhang struct gs_cb *gscb; 35494d5f2c04SChristian Borntraeger 35504d5f2c04SChristian Borntraeger riccb = (struct runtime_instr_cb *) &kvm_run->s.regs.riccb; 35514e0b1ab7SFan Zhang gscb = (struct gs_cb *) &kvm_run->s.regs.gscb; 3552b028ee3eSDavid Hildenbrand vcpu->arch.sie_block->gpsw.mask = kvm_run->psw_mask; 3553b028ee3eSDavid Hildenbrand vcpu->arch.sie_block->gpsw.addr = kvm_run->psw_addr; 3554b028ee3eSDavid Hildenbrand if (kvm_run->kvm_dirty_regs & KVM_SYNC_PREFIX) 3555b028ee3eSDavid Hildenbrand kvm_s390_set_prefix(vcpu, kvm_run->s.regs.prefix); 3556b028ee3eSDavid Hildenbrand if (kvm_run->kvm_dirty_regs & KVM_SYNC_CRS) { 3557b028ee3eSDavid Hildenbrand memcpy(&vcpu->arch.sie_block->gcr, &kvm_run->s.regs.crs, 128); 3558d3d692c8SDavid Hildenbrand /* some control register changes require a tlb flush */ 3559d3d692c8SDavid Hildenbrand kvm_make_request(KVM_REQ_TLB_FLUSH, vcpu); 3560b028ee3eSDavid Hildenbrand } 3561b028ee3eSDavid Hildenbrand if (kvm_run->kvm_dirty_regs & KVM_SYNC_ARCH0) { 35624287f247SDavid Hildenbrand kvm_s390_set_cpu_timer(vcpu, kvm_run->s.regs.cputm); 3563b028ee3eSDavid Hildenbrand vcpu->arch.sie_block->ckc = kvm_run->s.regs.ckc; 3564b028ee3eSDavid Hildenbrand vcpu->arch.sie_block->todpr = kvm_run->s.regs.todpr; 3565b028ee3eSDavid Hildenbrand vcpu->arch.sie_block->pp = kvm_run->s.regs.pp; 3566b028ee3eSDavid Hildenbrand vcpu->arch.sie_block->gbea = kvm_run->s.regs.gbea; 3567b028ee3eSDavid Hildenbrand } 3568b028ee3eSDavid Hildenbrand if (kvm_run->kvm_dirty_regs & KVM_SYNC_PFAULT) { 3569b028ee3eSDavid Hildenbrand vcpu->arch.pfault_token = kvm_run->s.regs.pft; 3570b028ee3eSDavid Hildenbrand vcpu->arch.pfault_select = kvm_run->s.regs.pfs; 3571b028ee3eSDavid Hildenbrand vcpu->arch.pfault_compare = kvm_run->s.regs.pfc; 35729fbd8082SDavid Hildenbrand if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID) 35739fbd8082SDavid Hildenbrand kvm_clear_async_pf_completion_queue(vcpu); 3574b028ee3eSDavid Hildenbrand } 357580cd8763SFan Zhang /* 357680cd8763SFan Zhang * If userspace sets the riccb (e.g. after migration) to a valid state, 357780cd8763SFan Zhang * we should enable RI here instead of doing the lazy enablement. 357880cd8763SFan Zhang */ 357980cd8763SFan Zhang if ((kvm_run->kvm_dirty_regs & KVM_SYNC_RICCB) && 35804d5f2c04SChristian Borntraeger test_kvm_facility(vcpu->kvm, 64) && 3581bb59c2daSAlice Frosi riccb->v && 35820c9d8683SDavid Hildenbrand !(vcpu->arch.sie_block->ecb3 & ECB3_RI)) { 35834d5f2c04SChristian Borntraeger VCPU_EVENT(vcpu, 3, "%s", "ENABLE: RI (sync_regs)"); 35840c9d8683SDavid Hildenbrand vcpu->arch.sie_block->ecb3 |= ECB3_RI; 358580cd8763SFan Zhang } 35864e0b1ab7SFan Zhang /* 35874e0b1ab7SFan Zhang * If userspace sets the gscb (e.g. after migration) to non-zero, 35884e0b1ab7SFan Zhang * we should enable GS here instead of doing the lazy enablement. 35894e0b1ab7SFan Zhang */ 35904e0b1ab7SFan Zhang if ((kvm_run->kvm_dirty_regs & KVM_SYNC_GSCB) && 35914e0b1ab7SFan Zhang test_kvm_facility(vcpu->kvm, 133) && 35924e0b1ab7SFan Zhang gscb->gssm && 35934e0b1ab7SFan Zhang !vcpu->arch.gs_enabled) { 35944e0b1ab7SFan Zhang VCPU_EVENT(vcpu, 3, "%s", "ENABLE: GS (sync_regs)"); 35954e0b1ab7SFan Zhang vcpu->arch.sie_block->ecb |= ECB_GS; 35964e0b1ab7SFan Zhang vcpu->arch.sie_block->ecd |= ECD_HOSTREGMGMT; 35974e0b1ab7SFan Zhang vcpu->arch.gs_enabled = 1; 359880cd8763SFan Zhang } 359935b3fde6SChristian Borntraeger if ((kvm_run->kvm_dirty_regs & KVM_SYNC_BPBC) && 360035b3fde6SChristian Borntraeger test_kvm_facility(vcpu->kvm, 82)) { 360135b3fde6SChristian Borntraeger vcpu->arch.sie_block->fpf &= ~FPF_BPBC; 360235b3fde6SChristian Borntraeger vcpu->arch.sie_block->fpf |= kvm_run->s.regs.bpbc ? FPF_BPBC : 0; 360335b3fde6SChristian Borntraeger } 360431d8b8d4SChristian Borntraeger save_access_regs(vcpu->arch.host_acrs); 360531d8b8d4SChristian Borntraeger restore_access_regs(vcpu->run->s.regs.acrs); 3606e1788bb9SChristian Borntraeger /* save host (userspace) fprs/vrs */ 3607e1788bb9SChristian Borntraeger save_fpu_regs(); 3608e1788bb9SChristian Borntraeger vcpu->arch.host_fpregs.fpc = current->thread.fpu.fpc; 3609e1788bb9SChristian Borntraeger vcpu->arch.host_fpregs.regs = current->thread.fpu.regs; 3610e1788bb9SChristian Borntraeger if (MACHINE_HAS_VX) 3611e1788bb9SChristian Borntraeger current->thread.fpu.regs = vcpu->run->s.regs.vrs; 3612e1788bb9SChristian Borntraeger else 3613e1788bb9SChristian Borntraeger current->thread.fpu.regs = vcpu->run->s.regs.fprs; 3614e1788bb9SChristian Borntraeger current->thread.fpu.fpc = vcpu->run->s.regs.fpc; 3615e1788bb9SChristian Borntraeger if (test_fp_ctl(current->thread.fpu.fpc)) 3616e1788bb9SChristian Borntraeger /* User space provided an invalid FPC, let's clear it */ 3617e1788bb9SChristian Borntraeger current->thread.fpu.fpc = 0; 36184e0b1ab7SFan Zhang if (MACHINE_HAS_GS) { 36194e0b1ab7SFan Zhang preempt_disable(); 36204e0b1ab7SFan Zhang __ctl_set_bit(2, 4); 36214e0b1ab7SFan Zhang if (current->thread.gs_cb) { 36224e0b1ab7SFan Zhang vcpu->arch.host_gscb = current->thread.gs_cb; 36234e0b1ab7SFan Zhang save_gs_cb(vcpu->arch.host_gscb); 36244e0b1ab7SFan Zhang } 36254e0b1ab7SFan Zhang if (vcpu->arch.gs_enabled) { 36264e0b1ab7SFan Zhang current->thread.gs_cb = (struct gs_cb *) 36274e0b1ab7SFan Zhang &vcpu->run->s.regs.gscb; 36284e0b1ab7SFan Zhang restore_gs_cb(current->thread.gs_cb); 36294e0b1ab7SFan Zhang } 36304e0b1ab7SFan Zhang preempt_enable(); 36314e0b1ab7SFan Zhang } 3632a3da7b4aSChristian Borntraeger /* SIE will load etoken directly from SDNX and therefore kvm_run */ 363380cd8763SFan Zhang 3634b028ee3eSDavid Hildenbrand kvm_run->kvm_dirty_regs = 0; 3635b028ee3eSDavid Hildenbrand } 3636b028ee3eSDavid Hildenbrand 3637b028ee3eSDavid Hildenbrand static void store_regs(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run) 3638b028ee3eSDavid Hildenbrand { 3639b028ee3eSDavid Hildenbrand kvm_run->psw_mask = vcpu->arch.sie_block->gpsw.mask; 3640b028ee3eSDavid Hildenbrand kvm_run->psw_addr = vcpu->arch.sie_block->gpsw.addr; 3641b028ee3eSDavid Hildenbrand kvm_run->s.regs.prefix = kvm_s390_get_prefix(vcpu); 3642b028ee3eSDavid Hildenbrand memcpy(&kvm_run->s.regs.crs, &vcpu->arch.sie_block->gcr, 128); 36434287f247SDavid Hildenbrand kvm_run->s.regs.cputm = kvm_s390_get_cpu_timer(vcpu); 3644b028ee3eSDavid Hildenbrand kvm_run->s.regs.ckc = vcpu->arch.sie_block->ckc; 3645b028ee3eSDavid Hildenbrand kvm_run->s.regs.todpr = vcpu->arch.sie_block->todpr; 3646b028ee3eSDavid Hildenbrand kvm_run->s.regs.pp = vcpu->arch.sie_block->pp; 3647b028ee3eSDavid Hildenbrand kvm_run->s.regs.gbea = vcpu->arch.sie_block->gbea; 3648b028ee3eSDavid Hildenbrand kvm_run->s.regs.pft = vcpu->arch.pfault_token; 3649b028ee3eSDavid Hildenbrand kvm_run->s.regs.pfs = vcpu->arch.pfault_select; 3650b028ee3eSDavid Hildenbrand kvm_run->s.regs.pfc = vcpu->arch.pfault_compare; 365135b3fde6SChristian Borntraeger kvm_run->s.regs.bpbc = (vcpu->arch.sie_block->fpf & FPF_BPBC) == FPF_BPBC; 365231d8b8d4SChristian Borntraeger save_access_regs(vcpu->run->s.regs.acrs); 365331d8b8d4SChristian Borntraeger restore_access_regs(vcpu->arch.host_acrs); 3654e1788bb9SChristian Borntraeger /* Save guest register state */ 3655e1788bb9SChristian Borntraeger save_fpu_regs(); 3656e1788bb9SChristian Borntraeger vcpu->run->s.regs.fpc = current->thread.fpu.fpc; 3657e1788bb9SChristian Borntraeger /* Restore will be done lazily at return */ 3658e1788bb9SChristian Borntraeger current->thread.fpu.fpc = vcpu->arch.host_fpregs.fpc; 3659e1788bb9SChristian Borntraeger current->thread.fpu.regs = vcpu->arch.host_fpregs.regs; 36604e0b1ab7SFan Zhang if (MACHINE_HAS_GS) { 36614e0b1ab7SFan Zhang __ctl_set_bit(2, 4); 36624e0b1ab7SFan Zhang if (vcpu->arch.gs_enabled) 36634e0b1ab7SFan Zhang save_gs_cb(current->thread.gs_cb); 36644e0b1ab7SFan Zhang preempt_disable(); 36654e0b1ab7SFan Zhang current->thread.gs_cb = vcpu->arch.host_gscb; 36664e0b1ab7SFan Zhang restore_gs_cb(vcpu->arch.host_gscb); 36674e0b1ab7SFan Zhang preempt_enable(); 36684e0b1ab7SFan Zhang if (!vcpu->arch.host_gscb) 36694e0b1ab7SFan Zhang __ctl_clear_bit(2, 4); 36704e0b1ab7SFan Zhang vcpu->arch.host_gscb = NULL; 36714e0b1ab7SFan Zhang } 3672a3da7b4aSChristian Borntraeger /* SIE will save etoken directly into SDNX and therefore kvm_run */ 3673b028ee3eSDavid Hildenbrand } 3674b028ee3eSDavid Hildenbrand 3675b0c632dbSHeiko Carstens int kvm_arch_vcpu_ioctl_run(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run) 3676b0c632dbSHeiko Carstens { 36778f2abe6aSChristian Borntraeger int rc; 3678b0c632dbSHeiko Carstens 3679460df4c1SPaolo Bonzini if (kvm_run->immediate_exit) 3680460df4c1SPaolo Bonzini return -EINTR; 3681460df4c1SPaolo Bonzini 3682accb757dSChristoffer Dall vcpu_load(vcpu); 3683accb757dSChristoffer Dall 368427291e21SDavid Hildenbrand if (guestdbg_exit_pending(vcpu)) { 368527291e21SDavid Hildenbrand kvm_s390_prepare_debug_exit(vcpu); 3686accb757dSChristoffer Dall rc = 0; 3687accb757dSChristoffer Dall goto out; 368827291e21SDavid Hildenbrand } 368927291e21SDavid Hildenbrand 369020b7035cSJan H. Schönherr kvm_sigset_activate(vcpu); 3691b0c632dbSHeiko Carstens 36926352e4d2SDavid Hildenbrand if (!kvm_s390_user_cpu_state_ctrl(vcpu->kvm)) { 36936852d7b6SDavid Hildenbrand kvm_s390_vcpu_start(vcpu); 36946352e4d2SDavid Hildenbrand } else if (is_vcpu_stopped(vcpu)) { 3695ea2cdd27SDavid Hildenbrand pr_err_ratelimited("can't run stopped vcpu %d\n", 36966352e4d2SDavid Hildenbrand vcpu->vcpu_id); 3697accb757dSChristoffer Dall rc = -EINVAL; 3698accb757dSChristoffer Dall goto out; 36996352e4d2SDavid Hildenbrand } 3700b0c632dbSHeiko Carstens 3701b028ee3eSDavid Hildenbrand sync_regs(vcpu, kvm_run); 3702db0758b2SDavid Hildenbrand enable_cpu_timer_accounting(vcpu); 3703d7b0b5ebSCarsten Otte 3704dab4079dSHeiko Carstens might_fault(); 3705e168bf8dSCarsten Otte rc = __vcpu_run(vcpu); 37069ace903dSChristian Ehrhardt 3707b1d16c49SChristian Ehrhardt if (signal_pending(current) && !rc) { 3708b1d16c49SChristian Ehrhardt kvm_run->exit_reason = KVM_EXIT_INTR; 37098f2abe6aSChristian Borntraeger rc = -EINTR; 3710b1d16c49SChristian Ehrhardt } 37118f2abe6aSChristian Borntraeger 371227291e21SDavid Hildenbrand if (guestdbg_exit_pending(vcpu) && !rc) { 371327291e21SDavid Hildenbrand kvm_s390_prepare_debug_exit(vcpu); 371427291e21SDavid Hildenbrand rc = 0; 371527291e21SDavid Hildenbrand } 371627291e21SDavid Hildenbrand 37178f2abe6aSChristian Borntraeger if (rc == -EREMOTE) { 371871f116bfSDavid Hildenbrand /* userspace support is needed, kvm_run has been prepared */ 37198f2abe6aSChristian Borntraeger rc = 0; 37208f2abe6aSChristian Borntraeger } 37218f2abe6aSChristian Borntraeger 3722db0758b2SDavid Hildenbrand disable_cpu_timer_accounting(vcpu); 3723b028ee3eSDavid Hildenbrand store_regs(vcpu, kvm_run); 3724d7b0b5ebSCarsten Otte 372520b7035cSJan H. Schönherr kvm_sigset_deactivate(vcpu); 3726b0c632dbSHeiko Carstens 3727b0c632dbSHeiko Carstens vcpu->stat.exit_userspace++; 3728accb757dSChristoffer Dall out: 3729accb757dSChristoffer Dall vcpu_put(vcpu); 37307e8e6ab4SHeiko Carstens return rc; 3731b0c632dbSHeiko Carstens } 3732b0c632dbSHeiko Carstens 3733b0c632dbSHeiko Carstens /* 3734b0c632dbSHeiko Carstens * store status at address 3735b0c632dbSHeiko Carstens * we use have two special cases: 3736b0c632dbSHeiko Carstens * KVM_S390_STORE_STATUS_NOADDR: -> 0x1200 on 64 bit 3737b0c632dbSHeiko Carstens * KVM_S390_STORE_STATUS_PREFIXED: -> prefix 3738b0c632dbSHeiko Carstens */ 3739d0bce605SHeiko Carstens int kvm_s390_store_status_unloaded(struct kvm_vcpu *vcpu, unsigned long gpa) 3740b0c632dbSHeiko Carstens { 3741092670cdSCarsten Otte unsigned char archmode = 1; 37429abc2a08SDavid Hildenbrand freg_t fprs[NUM_FPRS]; 3743fda902cbSMichael Mueller unsigned int px; 37444287f247SDavid Hildenbrand u64 clkcomp, cputm; 3745d0bce605SHeiko Carstens int rc; 3746b0c632dbSHeiko Carstens 3747d9a3a09aSMartin Schwidefsky px = kvm_s390_get_prefix(vcpu); 3748d0bce605SHeiko Carstens if (gpa == KVM_S390_STORE_STATUS_NOADDR) { 3749d0bce605SHeiko Carstens if (write_guest_abs(vcpu, 163, &archmode, 1)) 3750b0c632dbSHeiko Carstens return -EFAULT; 3751d9a3a09aSMartin Schwidefsky gpa = 0; 3752d0bce605SHeiko Carstens } else if (gpa == KVM_S390_STORE_STATUS_PREFIXED) { 3753d0bce605SHeiko Carstens if (write_guest_real(vcpu, 163, &archmode, 1)) 3754b0c632dbSHeiko Carstens return -EFAULT; 3755d9a3a09aSMartin Schwidefsky gpa = px; 3756d9a3a09aSMartin Schwidefsky } else 3757d9a3a09aSMartin Schwidefsky gpa -= __LC_FPREGS_SAVE_AREA; 37589abc2a08SDavid Hildenbrand 37599abc2a08SDavid Hildenbrand /* manually convert vector registers if necessary */ 37609abc2a08SDavid Hildenbrand if (MACHINE_HAS_VX) { 37619522b37fSDavid Hildenbrand convert_vx_to_fp(fprs, (__vector128 *) vcpu->run->s.regs.vrs); 3762d9a3a09aSMartin Schwidefsky rc = write_guest_abs(vcpu, gpa + __LC_FPREGS_SAVE_AREA, 37639abc2a08SDavid Hildenbrand fprs, 128); 37649abc2a08SDavid Hildenbrand } else { 37659abc2a08SDavid Hildenbrand rc = write_guest_abs(vcpu, gpa + __LC_FPREGS_SAVE_AREA, 37666fd8e67dSDavid Hildenbrand vcpu->run->s.regs.fprs, 128); 37679abc2a08SDavid Hildenbrand } 3768d9a3a09aSMartin Schwidefsky rc |= write_guest_abs(vcpu, gpa + __LC_GPREGS_SAVE_AREA, 3769d0bce605SHeiko Carstens vcpu->run->s.regs.gprs, 128); 3770d9a3a09aSMartin Schwidefsky rc |= write_guest_abs(vcpu, gpa + __LC_PSW_SAVE_AREA, 3771d0bce605SHeiko Carstens &vcpu->arch.sie_block->gpsw, 16); 3772d9a3a09aSMartin Schwidefsky rc |= write_guest_abs(vcpu, gpa + __LC_PREFIX_SAVE_AREA, 3773fda902cbSMichael Mueller &px, 4); 3774d9a3a09aSMartin Schwidefsky rc |= write_guest_abs(vcpu, gpa + __LC_FP_CREG_SAVE_AREA, 37759abc2a08SDavid Hildenbrand &vcpu->run->s.regs.fpc, 4); 3776d9a3a09aSMartin Schwidefsky rc |= write_guest_abs(vcpu, gpa + __LC_TOD_PROGREG_SAVE_AREA, 3777d0bce605SHeiko Carstens &vcpu->arch.sie_block->todpr, 4); 37784287f247SDavid Hildenbrand cputm = kvm_s390_get_cpu_timer(vcpu); 3779d9a3a09aSMartin Schwidefsky rc |= write_guest_abs(vcpu, gpa + __LC_CPU_TIMER_SAVE_AREA, 37804287f247SDavid Hildenbrand &cputm, 8); 3781178bd789SThomas Huth clkcomp = vcpu->arch.sie_block->ckc >> 8; 3782d9a3a09aSMartin Schwidefsky rc |= write_guest_abs(vcpu, gpa + __LC_CLOCK_COMP_SAVE_AREA, 3783d0bce605SHeiko Carstens &clkcomp, 8); 3784d9a3a09aSMartin Schwidefsky rc |= write_guest_abs(vcpu, gpa + __LC_AREGS_SAVE_AREA, 3785d0bce605SHeiko Carstens &vcpu->run->s.regs.acrs, 64); 3786d9a3a09aSMartin Schwidefsky rc |= write_guest_abs(vcpu, gpa + __LC_CREGS_SAVE_AREA, 3787d0bce605SHeiko Carstens &vcpu->arch.sie_block->gcr, 128); 3788d0bce605SHeiko Carstens return rc ? -EFAULT : 0; 3789b0c632dbSHeiko Carstens } 3790b0c632dbSHeiko Carstens 3791e879892cSThomas Huth int kvm_s390_vcpu_store_status(struct kvm_vcpu *vcpu, unsigned long addr) 3792e879892cSThomas Huth { 3793e879892cSThomas Huth /* 3794e879892cSThomas Huth * The guest FPRS and ACRS are in the host FPRS/ACRS due to the lazy 379531d8b8d4SChristian Borntraeger * switch in the run ioctl. Let's update our copies before we save 3796e879892cSThomas Huth * it into the save area 3797e879892cSThomas Huth */ 3798d0164ee2SHendrik Brueckner save_fpu_regs(); 37999abc2a08SDavid Hildenbrand vcpu->run->s.regs.fpc = current->thread.fpu.fpc; 3800e879892cSThomas Huth save_access_regs(vcpu->run->s.regs.acrs); 3801e879892cSThomas Huth 3802e879892cSThomas Huth return kvm_s390_store_status_unloaded(vcpu, addr); 3803e879892cSThomas Huth } 3804e879892cSThomas Huth 38058ad35755SDavid Hildenbrand static void __disable_ibs_on_vcpu(struct kvm_vcpu *vcpu) 38068ad35755SDavid Hildenbrand { 38078ad35755SDavid Hildenbrand kvm_check_request(KVM_REQ_ENABLE_IBS, vcpu); 38088e236546SChristian Borntraeger kvm_s390_sync_request(KVM_REQ_DISABLE_IBS, vcpu); 38098ad35755SDavid Hildenbrand } 38108ad35755SDavid Hildenbrand 38118ad35755SDavid Hildenbrand static void __disable_ibs_on_all_vcpus(struct kvm *kvm) 38128ad35755SDavid Hildenbrand { 38138ad35755SDavid Hildenbrand unsigned int i; 38148ad35755SDavid Hildenbrand struct kvm_vcpu *vcpu; 38158ad35755SDavid Hildenbrand 38168ad35755SDavid Hildenbrand kvm_for_each_vcpu(i, vcpu, kvm) { 38178ad35755SDavid Hildenbrand __disable_ibs_on_vcpu(vcpu); 38188ad35755SDavid Hildenbrand } 38198ad35755SDavid Hildenbrand } 38208ad35755SDavid Hildenbrand 38218ad35755SDavid Hildenbrand static void __enable_ibs_on_vcpu(struct kvm_vcpu *vcpu) 38228ad35755SDavid Hildenbrand { 382309a400e7SDavid Hildenbrand if (!sclp.has_ibs) 382409a400e7SDavid Hildenbrand return; 38258ad35755SDavid Hildenbrand kvm_check_request(KVM_REQ_DISABLE_IBS, vcpu); 38268e236546SChristian Borntraeger kvm_s390_sync_request(KVM_REQ_ENABLE_IBS, vcpu); 38278ad35755SDavid Hildenbrand } 38288ad35755SDavid Hildenbrand 38296852d7b6SDavid Hildenbrand void kvm_s390_vcpu_start(struct kvm_vcpu *vcpu) 38306852d7b6SDavid Hildenbrand { 38318ad35755SDavid Hildenbrand int i, online_vcpus, started_vcpus = 0; 38328ad35755SDavid Hildenbrand 38338ad35755SDavid Hildenbrand if (!is_vcpu_stopped(vcpu)) 38348ad35755SDavid Hildenbrand return; 38358ad35755SDavid Hildenbrand 38366852d7b6SDavid Hildenbrand trace_kvm_s390_vcpu_start_stop(vcpu->vcpu_id, 1); 38378ad35755SDavid Hildenbrand /* Only one cpu at a time may enter/leave the STOPPED state. */ 3838433b9ee4SDavid Hildenbrand spin_lock(&vcpu->kvm->arch.start_stop_lock); 38398ad35755SDavid Hildenbrand online_vcpus = atomic_read(&vcpu->kvm->online_vcpus); 38408ad35755SDavid Hildenbrand 38418ad35755SDavid Hildenbrand for (i = 0; i < online_vcpus; i++) { 38428ad35755SDavid Hildenbrand if (!is_vcpu_stopped(vcpu->kvm->vcpus[i])) 38438ad35755SDavid Hildenbrand started_vcpus++; 38448ad35755SDavid Hildenbrand } 38458ad35755SDavid Hildenbrand 38468ad35755SDavid Hildenbrand if (started_vcpus == 0) { 38478ad35755SDavid Hildenbrand /* we're the only active VCPU -> speed it up */ 38488ad35755SDavid Hildenbrand __enable_ibs_on_vcpu(vcpu); 38498ad35755SDavid Hildenbrand } else if (started_vcpus == 1) { 38508ad35755SDavid Hildenbrand /* 38518ad35755SDavid Hildenbrand * As we are starting a second VCPU, we have to disable 38528ad35755SDavid Hildenbrand * the IBS facility on all VCPUs to remove potentially 38538ad35755SDavid Hildenbrand * oustanding ENABLE requests. 38548ad35755SDavid Hildenbrand */ 38558ad35755SDavid Hildenbrand __disable_ibs_on_all_vcpus(vcpu->kvm); 38568ad35755SDavid Hildenbrand } 38578ad35755SDavid Hildenbrand 38589daecfc6SDavid Hildenbrand kvm_s390_clear_cpuflags(vcpu, CPUSTAT_STOPPED); 38598ad35755SDavid Hildenbrand /* 38608ad35755SDavid Hildenbrand * Another VCPU might have used IBS while we were offline. 38618ad35755SDavid Hildenbrand * Let's play safe and flush the VCPU at startup. 38628ad35755SDavid Hildenbrand */ 3863d3d692c8SDavid Hildenbrand kvm_make_request(KVM_REQ_TLB_FLUSH, vcpu); 3864433b9ee4SDavid Hildenbrand spin_unlock(&vcpu->kvm->arch.start_stop_lock); 38658ad35755SDavid Hildenbrand return; 38666852d7b6SDavid Hildenbrand } 38676852d7b6SDavid Hildenbrand 38686852d7b6SDavid Hildenbrand void kvm_s390_vcpu_stop(struct kvm_vcpu *vcpu) 38696852d7b6SDavid Hildenbrand { 38708ad35755SDavid Hildenbrand int i, online_vcpus, started_vcpus = 0; 38718ad35755SDavid Hildenbrand struct kvm_vcpu *started_vcpu = NULL; 38728ad35755SDavid Hildenbrand 38738ad35755SDavid Hildenbrand if (is_vcpu_stopped(vcpu)) 38748ad35755SDavid Hildenbrand return; 38758ad35755SDavid Hildenbrand 38766852d7b6SDavid Hildenbrand trace_kvm_s390_vcpu_start_stop(vcpu->vcpu_id, 0); 38778ad35755SDavid Hildenbrand /* Only one cpu at a time may enter/leave the STOPPED state. */ 3878433b9ee4SDavid Hildenbrand spin_lock(&vcpu->kvm->arch.start_stop_lock); 38798ad35755SDavid Hildenbrand online_vcpus = atomic_read(&vcpu->kvm->online_vcpus); 38808ad35755SDavid Hildenbrand 388132f5ff63SDavid Hildenbrand /* SIGP STOP and SIGP STOP AND STORE STATUS has been fully processed */ 38826cddd432SDavid Hildenbrand kvm_s390_clear_stop_irq(vcpu); 388332f5ff63SDavid Hildenbrand 3884ef8f4f49SDavid Hildenbrand kvm_s390_set_cpuflags(vcpu, CPUSTAT_STOPPED); 38858ad35755SDavid Hildenbrand __disable_ibs_on_vcpu(vcpu); 38868ad35755SDavid Hildenbrand 38878ad35755SDavid Hildenbrand for (i = 0; i < online_vcpus; i++) { 38888ad35755SDavid Hildenbrand if (!is_vcpu_stopped(vcpu->kvm->vcpus[i])) { 38898ad35755SDavid Hildenbrand started_vcpus++; 38908ad35755SDavid Hildenbrand started_vcpu = vcpu->kvm->vcpus[i]; 38918ad35755SDavid Hildenbrand } 38928ad35755SDavid Hildenbrand } 38938ad35755SDavid Hildenbrand 38948ad35755SDavid Hildenbrand if (started_vcpus == 1) { 38958ad35755SDavid Hildenbrand /* 38968ad35755SDavid Hildenbrand * As we only have one VCPU left, we want to enable the 38978ad35755SDavid Hildenbrand * IBS facility for that VCPU to speed it up. 38988ad35755SDavid Hildenbrand */ 38998ad35755SDavid Hildenbrand __enable_ibs_on_vcpu(started_vcpu); 39008ad35755SDavid Hildenbrand } 39018ad35755SDavid Hildenbrand 3902433b9ee4SDavid Hildenbrand spin_unlock(&vcpu->kvm->arch.start_stop_lock); 39038ad35755SDavid Hildenbrand return; 39046852d7b6SDavid Hildenbrand } 39056852d7b6SDavid Hildenbrand 3906d6712df9SCornelia Huck static int kvm_vcpu_ioctl_enable_cap(struct kvm_vcpu *vcpu, 3907d6712df9SCornelia Huck struct kvm_enable_cap *cap) 3908d6712df9SCornelia Huck { 3909d6712df9SCornelia Huck int r; 3910d6712df9SCornelia Huck 3911d6712df9SCornelia Huck if (cap->flags) 3912d6712df9SCornelia Huck return -EINVAL; 3913d6712df9SCornelia Huck 3914d6712df9SCornelia Huck switch (cap->cap) { 3915fa6b7fe9SCornelia Huck case KVM_CAP_S390_CSS_SUPPORT: 3916fa6b7fe9SCornelia Huck if (!vcpu->kvm->arch.css_support) { 3917fa6b7fe9SCornelia Huck vcpu->kvm->arch.css_support = 1; 3918c92ea7b9SChristian Borntraeger VM_EVENT(vcpu->kvm, 3, "%s", "ENABLE: CSS support"); 3919fa6b7fe9SCornelia Huck trace_kvm_s390_enable_css(vcpu->kvm); 3920fa6b7fe9SCornelia Huck } 3921fa6b7fe9SCornelia Huck r = 0; 3922fa6b7fe9SCornelia Huck break; 3923d6712df9SCornelia Huck default: 3924d6712df9SCornelia Huck r = -EINVAL; 3925d6712df9SCornelia Huck break; 3926d6712df9SCornelia Huck } 3927d6712df9SCornelia Huck return r; 3928d6712df9SCornelia Huck } 3929d6712df9SCornelia Huck 393041408c28SThomas Huth static long kvm_s390_guest_mem_op(struct kvm_vcpu *vcpu, 393141408c28SThomas Huth struct kvm_s390_mem_op *mop) 393241408c28SThomas Huth { 393341408c28SThomas Huth void __user *uaddr = (void __user *)mop->buf; 393441408c28SThomas Huth void *tmpbuf = NULL; 393541408c28SThomas Huth int r, srcu_idx; 393641408c28SThomas Huth const u64 supported_flags = KVM_S390_MEMOP_F_INJECT_EXCEPTION 393741408c28SThomas Huth | KVM_S390_MEMOP_F_CHECK_ONLY; 393841408c28SThomas Huth 393941408c28SThomas Huth if (mop->flags & ~supported_flags) 394041408c28SThomas Huth return -EINVAL; 394141408c28SThomas Huth 394241408c28SThomas Huth if (mop->size > MEM_OP_MAX_SIZE) 394341408c28SThomas Huth return -E2BIG; 394441408c28SThomas Huth 394541408c28SThomas Huth if (!(mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY)) { 394641408c28SThomas Huth tmpbuf = vmalloc(mop->size); 394741408c28SThomas Huth if (!tmpbuf) 394841408c28SThomas Huth return -ENOMEM; 394941408c28SThomas Huth } 395041408c28SThomas Huth 395141408c28SThomas Huth srcu_idx = srcu_read_lock(&vcpu->kvm->srcu); 395241408c28SThomas Huth 395341408c28SThomas Huth switch (mop->op) { 395441408c28SThomas Huth case KVM_S390_MEMOP_LOGICAL_READ: 395541408c28SThomas Huth if (mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY) { 395692c96321SDavid Hildenbrand r = check_gva_range(vcpu, mop->gaddr, mop->ar, 395792c96321SDavid Hildenbrand mop->size, GACC_FETCH); 395841408c28SThomas Huth break; 395941408c28SThomas Huth } 396041408c28SThomas Huth r = read_guest(vcpu, mop->gaddr, mop->ar, tmpbuf, mop->size); 396141408c28SThomas Huth if (r == 0) { 396241408c28SThomas Huth if (copy_to_user(uaddr, tmpbuf, mop->size)) 396341408c28SThomas Huth r = -EFAULT; 396441408c28SThomas Huth } 396541408c28SThomas Huth break; 396641408c28SThomas Huth case KVM_S390_MEMOP_LOGICAL_WRITE: 396741408c28SThomas Huth if (mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY) { 396892c96321SDavid Hildenbrand r = check_gva_range(vcpu, mop->gaddr, mop->ar, 396992c96321SDavid Hildenbrand mop->size, GACC_STORE); 397041408c28SThomas Huth break; 397141408c28SThomas Huth } 397241408c28SThomas Huth if (copy_from_user(tmpbuf, uaddr, mop->size)) { 397341408c28SThomas Huth r = -EFAULT; 397441408c28SThomas Huth break; 397541408c28SThomas Huth } 397641408c28SThomas Huth r = write_guest(vcpu, mop->gaddr, mop->ar, tmpbuf, mop->size); 397741408c28SThomas Huth break; 397841408c28SThomas Huth default: 397941408c28SThomas Huth r = -EINVAL; 398041408c28SThomas Huth } 398141408c28SThomas Huth 398241408c28SThomas Huth srcu_read_unlock(&vcpu->kvm->srcu, srcu_idx); 398341408c28SThomas Huth 398441408c28SThomas Huth if (r > 0 && (mop->flags & KVM_S390_MEMOP_F_INJECT_EXCEPTION) != 0) 398541408c28SThomas Huth kvm_s390_inject_prog_irq(vcpu, &vcpu->arch.pgm); 398641408c28SThomas Huth 398741408c28SThomas Huth vfree(tmpbuf); 398841408c28SThomas Huth return r; 398941408c28SThomas Huth } 399041408c28SThomas Huth 39915cb0944cSPaolo Bonzini long kvm_arch_vcpu_async_ioctl(struct file *filp, 3992b0c632dbSHeiko Carstens unsigned int ioctl, unsigned long arg) 3993b0c632dbSHeiko Carstens { 3994b0c632dbSHeiko Carstens struct kvm_vcpu *vcpu = filp->private_data; 3995b0c632dbSHeiko Carstens void __user *argp = (void __user *)arg; 3996b0c632dbSHeiko Carstens 399793736624SAvi Kivity switch (ioctl) { 399847b43c52SJens Freimann case KVM_S390_IRQ: { 399947b43c52SJens Freimann struct kvm_s390_irq s390irq; 400047b43c52SJens Freimann 400147b43c52SJens Freimann if (copy_from_user(&s390irq, argp, sizeof(s390irq))) 40029b062471SChristoffer Dall return -EFAULT; 40039b062471SChristoffer Dall return kvm_s390_inject_vcpu(vcpu, &s390irq); 400447b43c52SJens Freimann } 400593736624SAvi Kivity case KVM_S390_INTERRUPT: { 4006ba5c1e9bSCarsten Otte struct kvm_s390_interrupt s390int; 4007383d0b05SJens Freimann struct kvm_s390_irq s390irq; 4008ba5c1e9bSCarsten Otte 4009ba5c1e9bSCarsten Otte if (copy_from_user(&s390int, argp, sizeof(s390int))) 40109b062471SChristoffer Dall return -EFAULT; 4011383d0b05SJens Freimann if (s390int_to_s390irq(&s390int, &s390irq)) 4012383d0b05SJens Freimann return -EINVAL; 40139b062471SChristoffer Dall return kvm_s390_inject_vcpu(vcpu, &s390irq); 4014ba5c1e9bSCarsten Otte } 40159b062471SChristoffer Dall } 40165cb0944cSPaolo Bonzini return -ENOIOCTLCMD; 40175cb0944cSPaolo Bonzini } 40185cb0944cSPaolo Bonzini 40195cb0944cSPaolo Bonzini long kvm_arch_vcpu_ioctl(struct file *filp, 40205cb0944cSPaolo Bonzini unsigned int ioctl, unsigned long arg) 40215cb0944cSPaolo Bonzini { 40225cb0944cSPaolo Bonzini struct kvm_vcpu *vcpu = filp->private_data; 40235cb0944cSPaolo Bonzini void __user *argp = (void __user *)arg; 40245cb0944cSPaolo Bonzini int idx; 40255cb0944cSPaolo Bonzini long r; 40269b062471SChristoffer Dall 40279b062471SChristoffer Dall vcpu_load(vcpu); 40289b062471SChristoffer Dall 40299b062471SChristoffer Dall switch (ioctl) { 4030b0c632dbSHeiko Carstens case KVM_S390_STORE_STATUS: 4031800c1065SThomas Huth idx = srcu_read_lock(&vcpu->kvm->srcu); 4032bc923cc9SAvi Kivity r = kvm_s390_vcpu_store_status(vcpu, arg); 4033800c1065SThomas Huth srcu_read_unlock(&vcpu->kvm->srcu, idx); 4034bc923cc9SAvi Kivity break; 4035b0c632dbSHeiko Carstens case KVM_S390_SET_INITIAL_PSW: { 4036b0c632dbSHeiko Carstens psw_t psw; 4037b0c632dbSHeiko Carstens 4038bc923cc9SAvi Kivity r = -EFAULT; 4039b0c632dbSHeiko Carstens if (copy_from_user(&psw, argp, sizeof(psw))) 4040bc923cc9SAvi Kivity break; 4041bc923cc9SAvi Kivity r = kvm_arch_vcpu_ioctl_set_initial_psw(vcpu, psw); 4042bc923cc9SAvi Kivity break; 4043b0c632dbSHeiko Carstens } 4044b0c632dbSHeiko Carstens case KVM_S390_INITIAL_RESET: 4045bc923cc9SAvi Kivity r = kvm_arch_vcpu_ioctl_initial_reset(vcpu); 4046bc923cc9SAvi Kivity break; 404714eebd91SCarsten Otte case KVM_SET_ONE_REG: 404814eebd91SCarsten Otte case KVM_GET_ONE_REG: { 404914eebd91SCarsten Otte struct kvm_one_reg reg; 405014eebd91SCarsten Otte r = -EFAULT; 405114eebd91SCarsten Otte if (copy_from_user(®, argp, sizeof(reg))) 405214eebd91SCarsten Otte break; 405314eebd91SCarsten Otte if (ioctl == KVM_SET_ONE_REG) 405414eebd91SCarsten Otte r = kvm_arch_vcpu_ioctl_set_one_reg(vcpu, ®); 405514eebd91SCarsten Otte else 405614eebd91SCarsten Otte r = kvm_arch_vcpu_ioctl_get_one_reg(vcpu, ®); 405714eebd91SCarsten Otte break; 405814eebd91SCarsten Otte } 405927e0393fSCarsten Otte #ifdef CONFIG_KVM_S390_UCONTROL 406027e0393fSCarsten Otte case KVM_S390_UCAS_MAP: { 406127e0393fSCarsten Otte struct kvm_s390_ucas_mapping ucasmap; 406227e0393fSCarsten Otte 406327e0393fSCarsten Otte if (copy_from_user(&ucasmap, argp, sizeof(ucasmap))) { 406427e0393fSCarsten Otte r = -EFAULT; 406527e0393fSCarsten Otte break; 406627e0393fSCarsten Otte } 406727e0393fSCarsten Otte 406827e0393fSCarsten Otte if (!kvm_is_ucontrol(vcpu->kvm)) { 406927e0393fSCarsten Otte r = -EINVAL; 407027e0393fSCarsten Otte break; 407127e0393fSCarsten Otte } 407227e0393fSCarsten Otte 407327e0393fSCarsten Otte r = gmap_map_segment(vcpu->arch.gmap, ucasmap.user_addr, 407427e0393fSCarsten Otte ucasmap.vcpu_addr, ucasmap.length); 407527e0393fSCarsten Otte break; 407627e0393fSCarsten Otte } 407727e0393fSCarsten Otte case KVM_S390_UCAS_UNMAP: { 407827e0393fSCarsten Otte struct kvm_s390_ucas_mapping ucasmap; 407927e0393fSCarsten Otte 408027e0393fSCarsten Otte if (copy_from_user(&ucasmap, argp, sizeof(ucasmap))) { 408127e0393fSCarsten Otte r = -EFAULT; 408227e0393fSCarsten Otte break; 408327e0393fSCarsten Otte } 408427e0393fSCarsten Otte 408527e0393fSCarsten Otte if (!kvm_is_ucontrol(vcpu->kvm)) { 408627e0393fSCarsten Otte r = -EINVAL; 408727e0393fSCarsten Otte break; 408827e0393fSCarsten Otte } 408927e0393fSCarsten Otte 409027e0393fSCarsten Otte r = gmap_unmap_segment(vcpu->arch.gmap, ucasmap.vcpu_addr, 409127e0393fSCarsten Otte ucasmap.length); 409227e0393fSCarsten Otte break; 409327e0393fSCarsten Otte } 409427e0393fSCarsten Otte #endif 4095ccc7910fSCarsten Otte case KVM_S390_VCPU_FAULT: { 4096527e30b4SMartin Schwidefsky r = gmap_fault(vcpu->arch.gmap, arg, 0); 4097ccc7910fSCarsten Otte break; 4098ccc7910fSCarsten Otte } 4099d6712df9SCornelia Huck case KVM_ENABLE_CAP: 4100d6712df9SCornelia Huck { 4101d6712df9SCornelia Huck struct kvm_enable_cap cap; 4102d6712df9SCornelia Huck r = -EFAULT; 4103d6712df9SCornelia Huck if (copy_from_user(&cap, argp, sizeof(cap))) 4104d6712df9SCornelia Huck break; 4105d6712df9SCornelia Huck r = kvm_vcpu_ioctl_enable_cap(vcpu, &cap); 4106d6712df9SCornelia Huck break; 4107d6712df9SCornelia Huck } 410841408c28SThomas Huth case KVM_S390_MEM_OP: { 410941408c28SThomas Huth struct kvm_s390_mem_op mem_op; 411041408c28SThomas Huth 411141408c28SThomas Huth if (copy_from_user(&mem_op, argp, sizeof(mem_op)) == 0) 411241408c28SThomas Huth r = kvm_s390_guest_mem_op(vcpu, &mem_op); 411341408c28SThomas Huth else 411441408c28SThomas Huth r = -EFAULT; 411541408c28SThomas Huth break; 411641408c28SThomas Huth } 4117816c7667SJens Freimann case KVM_S390_SET_IRQ_STATE: { 4118816c7667SJens Freimann struct kvm_s390_irq_state irq_state; 4119816c7667SJens Freimann 4120816c7667SJens Freimann r = -EFAULT; 4121816c7667SJens Freimann if (copy_from_user(&irq_state, argp, sizeof(irq_state))) 4122816c7667SJens Freimann break; 4123816c7667SJens Freimann if (irq_state.len > VCPU_IRQS_MAX_BUF || 4124816c7667SJens Freimann irq_state.len == 0 || 4125816c7667SJens Freimann irq_state.len % sizeof(struct kvm_s390_irq) > 0) { 4126816c7667SJens Freimann r = -EINVAL; 4127816c7667SJens Freimann break; 4128816c7667SJens Freimann } 4129bb64da9aSChristian Borntraeger /* do not use irq_state.flags, it will break old QEMUs */ 4130816c7667SJens Freimann r = kvm_s390_set_irq_state(vcpu, 4131816c7667SJens Freimann (void __user *) irq_state.buf, 4132816c7667SJens Freimann irq_state.len); 4133816c7667SJens Freimann break; 4134816c7667SJens Freimann } 4135816c7667SJens Freimann case KVM_S390_GET_IRQ_STATE: { 4136816c7667SJens Freimann struct kvm_s390_irq_state irq_state; 4137816c7667SJens Freimann 4138816c7667SJens Freimann r = -EFAULT; 4139816c7667SJens Freimann if (copy_from_user(&irq_state, argp, sizeof(irq_state))) 4140816c7667SJens Freimann break; 4141816c7667SJens Freimann if (irq_state.len == 0) { 4142816c7667SJens Freimann r = -EINVAL; 4143816c7667SJens Freimann break; 4144816c7667SJens Freimann } 4145bb64da9aSChristian Borntraeger /* do not use irq_state.flags, it will break old QEMUs */ 4146816c7667SJens Freimann r = kvm_s390_get_irq_state(vcpu, 4147816c7667SJens Freimann (__u8 __user *) irq_state.buf, 4148816c7667SJens Freimann irq_state.len); 4149816c7667SJens Freimann break; 4150816c7667SJens Freimann } 4151b0c632dbSHeiko Carstens default: 41523e6afcf1SCarsten Otte r = -ENOTTY; 4153b0c632dbSHeiko Carstens } 41549b062471SChristoffer Dall 41559b062471SChristoffer Dall vcpu_put(vcpu); 4156bc923cc9SAvi Kivity return r; 4157b0c632dbSHeiko Carstens } 4158b0c632dbSHeiko Carstens 41591499fa80SSouptick Joarder vm_fault_t kvm_arch_vcpu_fault(struct kvm_vcpu *vcpu, struct vm_fault *vmf) 41605b1c1493SCarsten Otte { 41615b1c1493SCarsten Otte #ifdef CONFIG_KVM_S390_UCONTROL 41625b1c1493SCarsten Otte if ((vmf->pgoff == KVM_S390_SIE_PAGE_OFFSET) 41635b1c1493SCarsten Otte && (kvm_is_ucontrol(vcpu->kvm))) { 41645b1c1493SCarsten Otte vmf->page = virt_to_page(vcpu->arch.sie_block); 41655b1c1493SCarsten Otte get_page(vmf->page); 41665b1c1493SCarsten Otte return 0; 41675b1c1493SCarsten Otte } 41685b1c1493SCarsten Otte #endif 41695b1c1493SCarsten Otte return VM_FAULT_SIGBUS; 41705b1c1493SCarsten Otte } 41715b1c1493SCarsten Otte 41725587027cSAneesh Kumar K.V int kvm_arch_create_memslot(struct kvm *kvm, struct kvm_memory_slot *slot, 41735587027cSAneesh Kumar K.V unsigned long npages) 4174db3fe4ebSTakuya Yoshikawa { 4175db3fe4ebSTakuya Yoshikawa return 0; 4176db3fe4ebSTakuya Yoshikawa } 4177db3fe4ebSTakuya Yoshikawa 4178b0c632dbSHeiko Carstens /* Section: memory related */ 4179f7784b8eSMarcelo Tosatti int kvm_arch_prepare_memory_region(struct kvm *kvm, 4180f7784b8eSMarcelo Tosatti struct kvm_memory_slot *memslot, 418109170a49SPaolo Bonzini const struct kvm_userspace_memory_region *mem, 41827b6195a9STakuya Yoshikawa enum kvm_mr_change change) 4183b0c632dbSHeiko Carstens { 4184dd2887e7SNick Wang /* A few sanity checks. We can have memory slots which have to be 4185dd2887e7SNick Wang located/ended at a segment boundary (1MB). The memory in userland is 4186dd2887e7SNick Wang ok to be fragmented into various different vmas. It is okay to mmap() 4187dd2887e7SNick Wang and munmap() stuff in this slot after doing this call at any time */ 4188b0c632dbSHeiko Carstens 4189598841caSCarsten Otte if (mem->userspace_addr & 0xffffful) 4190b0c632dbSHeiko Carstens return -EINVAL; 4191b0c632dbSHeiko Carstens 4192598841caSCarsten Otte if (mem->memory_size & 0xffffful) 4193b0c632dbSHeiko Carstens return -EINVAL; 4194b0c632dbSHeiko Carstens 4195a3a92c31SDominik Dingel if (mem->guest_phys_addr + mem->memory_size > kvm->arch.mem_limit) 4196a3a92c31SDominik Dingel return -EINVAL; 4197a3a92c31SDominik Dingel 4198f7784b8eSMarcelo Tosatti return 0; 4199f7784b8eSMarcelo Tosatti } 4200f7784b8eSMarcelo Tosatti 4201f7784b8eSMarcelo Tosatti void kvm_arch_commit_memory_region(struct kvm *kvm, 420209170a49SPaolo Bonzini const struct kvm_userspace_memory_region *mem, 42038482644aSTakuya Yoshikawa const struct kvm_memory_slot *old, 4204f36f3f28SPaolo Bonzini const struct kvm_memory_slot *new, 42058482644aSTakuya Yoshikawa enum kvm_mr_change change) 4206f7784b8eSMarcelo Tosatti { 4207f7850c92SCarsten Otte int rc; 4208f7784b8eSMarcelo Tosatti 42092cef4debSChristian Borntraeger /* If the basics of the memslot do not change, we do not want 42102cef4debSChristian Borntraeger * to update the gmap. Every update causes several unnecessary 42112cef4debSChristian Borntraeger * segment translation exceptions. This is usually handled just 42122cef4debSChristian Borntraeger * fine by the normal fault handler + gmap, but it will also 42132cef4debSChristian Borntraeger * cause faults on the prefix page of running guest CPUs. 42142cef4debSChristian Borntraeger */ 42152cef4debSChristian Borntraeger if (old->userspace_addr == mem->userspace_addr && 42162cef4debSChristian Borntraeger old->base_gfn * PAGE_SIZE == mem->guest_phys_addr && 42172cef4debSChristian Borntraeger old->npages * PAGE_SIZE == mem->memory_size) 42182cef4debSChristian Borntraeger return; 4219598841caSCarsten Otte 4220598841caSCarsten Otte rc = gmap_map_segment(kvm->arch.gmap, mem->userspace_addr, 4221598841caSCarsten Otte mem->guest_phys_addr, mem->memory_size); 4222598841caSCarsten Otte if (rc) 4223ea2cdd27SDavid Hildenbrand pr_warn("failed to commit memory region\n"); 4224598841caSCarsten Otte return; 4225b0c632dbSHeiko Carstens } 4226b0c632dbSHeiko Carstens 422760a37709SAlexander Yarygin static inline unsigned long nonhyp_mask(int i) 422860a37709SAlexander Yarygin { 422960a37709SAlexander Yarygin unsigned int nonhyp_fai = (sclp.hmfai << i * 2) >> 30; 423060a37709SAlexander Yarygin 423160a37709SAlexander Yarygin return 0x0000ffffffffffffUL >> (nonhyp_fai << 4); 423260a37709SAlexander Yarygin } 423360a37709SAlexander Yarygin 42343491caf2SChristian Borntraeger void kvm_arch_vcpu_block_finish(struct kvm_vcpu *vcpu) 42353491caf2SChristian Borntraeger { 42363491caf2SChristian Borntraeger vcpu->valid_wakeup = false; 42373491caf2SChristian Borntraeger } 42383491caf2SChristian Borntraeger 4239b0c632dbSHeiko Carstens static int __init kvm_s390_init(void) 4240b0c632dbSHeiko Carstens { 424160a37709SAlexander Yarygin int i; 424260a37709SAlexander Yarygin 424307197fd0SDavid Hildenbrand if (!sclp.has_sief2) { 424407197fd0SDavid Hildenbrand pr_info("SIE not available\n"); 424507197fd0SDavid Hildenbrand return -ENODEV; 424607197fd0SDavid Hildenbrand } 424707197fd0SDavid Hildenbrand 4248a4499382SJanosch Frank if (nested && hpage) { 4249a4499382SJanosch Frank pr_info("nested (vSIE) and hpage (huge page backing) can currently not be activated concurrently"); 4250a4499382SJanosch Frank return -EINVAL; 4251a4499382SJanosch Frank } 4252a4499382SJanosch Frank 425360a37709SAlexander Yarygin for (i = 0; i < 16; i++) 4254c3b9e3e1SChristian Borntraeger kvm_s390_fac_base[i] |= 425560a37709SAlexander Yarygin S390_lowcore.stfle_fac_list[i] & nonhyp_mask(i); 425660a37709SAlexander Yarygin 42579d8d5786SMichael Mueller return kvm_init(NULL, sizeof(struct kvm_vcpu), 0, THIS_MODULE); 4258b0c632dbSHeiko Carstens } 4259b0c632dbSHeiko Carstens 4260b0c632dbSHeiko Carstens static void __exit kvm_s390_exit(void) 4261b0c632dbSHeiko Carstens { 4262b0c632dbSHeiko Carstens kvm_exit(); 4263b0c632dbSHeiko Carstens } 4264b0c632dbSHeiko Carstens 4265b0c632dbSHeiko Carstens module_init(kvm_s390_init); 4266b0c632dbSHeiko Carstens module_exit(kvm_s390_exit); 4267566af940SCornelia Huck 4268566af940SCornelia Huck /* 4269566af940SCornelia Huck * Enable autoloading of the kvm module. 4270566af940SCornelia Huck * Note that we add the module alias here instead of virt/kvm/kvm_main.c 4271566af940SCornelia Huck * since x86 takes a different approach. 4272566af940SCornelia Huck */ 4273566af940SCornelia Huck #include <linux/miscdevice.h> 4274566af940SCornelia Huck MODULE_ALIAS_MISCDEV(KVM_MINOR); 4275566af940SCornelia Huck MODULE_ALIAS("devname:kvm"); 4276