xref: /openbmc/linux/arch/s390/kvm/kvm-s390.c (revision 37940fb0b6a2c4bf101481365c42f250694ffd15)
1d809aa23SGreg Kroah-Hartman // SPDX-License-Identifier: GPL-2.0
2b0c632dbSHeiko Carstens /*
3bb64da9aSChristian Borntraeger  * hosting IBM Z kernel virtual machines (s390x)
4b0c632dbSHeiko Carstens  *
5a37cb07aSChristian Borntraeger  * Copyright IBM Corp. 2008, 2018
6b0c632dbSHeiko Carstens  *
7b0c632dbSHeiko Carstens  *    Author(s): Carsten Otte <cotte@de.ibm.com>
8b0c632dbSHeiko Carstens  *               Christian Borntraeger <borntraeger@de.ibm.com>
9b0c632dbSHeiko Carstens  *               Heiko Carstens <heiko.carstens@de.ibm.com>
10628eb9b8SChristian Ehrhardt  *               Christian Ehrhardt <ehrhardt@de.ibm.com>
1115f36ebdSJason J. Herne  *               Jason J. Herne <jjherne@us.ibm.com>
12b0c632dbSHeiko Carstens  */
13b0c632dbSHeiko Carstens 
14b0c632dbSHeiko Carstens #include <linux/compiler.h>
15b0c632dbSHeiko Carstens #include <linux/err.h>
16b0c632dbSHeiko Carstens #include <linux/fs.h>
17ca872302SChristian Borntraeger #include <linux/hrtimer.h>
18b0c632dbSHeiko Carstens #include <linux/init.h>
19b0c632dbSHeiko Carstens #include <linux/kvm.h>
20b0c632dbSHeiko Carstens #include <linux/kvm_host.h>
21b2d73b2aSMartin Schwidefsky #include <linux/mman.h>
22b0c632dbSHeiko Carstens #include <linux/module.h>
23d3217967SPaul Gortmaker #include <linux/moduleparam.h>
24a374e892STony Krowiak #include <linux/random.h>
25b0c632dbSHeiko Carstens #include <linux/slab.h>
26ba5c1e9bSCarsten Otte #include <linux/timer.h>
2741408c28SThomas Huth #include <linux/vmalloc.h>
2815c9705fSDavid Hildenbrand #include <linux/bitmap.h>
29174cd4b1SIngo Molnar #include <linux/sched/signal.h>
30190df4a2SClaudio Imbrenda #include <linux/string.h>
31174cd4b1SIngo Molnar 
32cbb870c8SHeiko Carstens #include <asm/asm-offsets.h>
33b0c632dbSHeiko Carstens #include <asm/lowcore.h>
34fd5ada04SMartin Schwidefsky #include <asm/stp.h>
35b0c632dbSHeiko Carstens #include <asm/pgtable.h>
361e133ab2SMartin Schwidefsky #include <asm/gmap.h>
37f5daba1dSHeiko Carstens #include <asm/nmi.h>
38a0616cdeSDavid Howells #include <asm/switch_to.h>
396d3da241SJens Freimann #include <asm/isc.h>
401526bf9cSChristian Borntraeger #include <asm/sclp.h>
410a763c78SDavid Hildenbrand #include <asm/cpacf.h>
42221bb8a4SLinus Torvalds #include <asm/timex.h>
43e585b24aSTony Krowiak #include <asm/ap.h>
448f2abe6aSChristian Borntraeger #include "kvm-s390.h"
45b0c632dbSHeiko Carstens #include "gaccess.h"
46b0c632dbSHeiko Carstens 
47ea2cdd27SDavid Hildenbrand #define KMSG_COMPONENT "kvm-s390"
48ea2cdd27SDavid Hildenbrand #undef pr_fmt
49ea2cdd27SDavid Hildenbrand #define pr_fmt(fmt) KMSG_COMPONENT ": " fmt
50ea2cdd27SDavid Hildenbrand 
515786fffaSCornelia Huck #define CREATE_TRACE_POINTS
525786fffaSCornelia Huck #include "trace.h"
53ade38c31SCornelia Huck #include "trace-s390.h"
545786fffaSCornelia Huck 
5541408c28SThomas Huth #define MEM_OP_MAX_SIZE 65536	/* Maximum transfer size for KVM_S390_MEM_OP */
56816c7667SJens Freimann #define LOCAL_IRQS 32
57816c7667SJens Freimann #define VCPU_IRQS_MAX_BUF (sizeof(struct kvm_s390_irq) * \
58816c7667SJens Freimann 			   (KVM_MAX_VCPUS + LOCAL_IRQS))
5941408c28SThomas Huth 
60b0c632dbSHeiko Carstens #define VCPU_STAT(x) offsetof(struct kvm_vcpu, stat.x), KVM_STAT_VCPU
61ccc40c53SChristian Borntraeger #define VM_STAT(x) offsetof(struct kvm, stat.x), KVM_STAT_VM
62b0c632dbSHeiko Carstens 
63b0c632dbSHeiko Carstens struct kvm_stats_debugfs_item debugfs_entries[] = {
64b0c632dbSHeiko Carstens 	{ "userspace_handled", VCPU_STAT(exit_userspace) },
650eaeafa1SChristian Borntraeger 	{ "exit_null", VCPU_STAT(exit_null) },
668f2abe6aSChristian Borntraeger 	{ "exit_validity", VCPU_STAT(exit_validity) },
678f2abe6aSChristian Borntraeger 	{ "exit_stop_request", VCPU_STAT(exit_stop_request) },
688f2abe6aSChristian Borntraeger 	{ "exit_external_request", VCPU_STAT(exit_external_request) },
69a5e0aceaSChristian Borntraeger 	{ "exit_io_request", VCPU_STAT(exit_io_request) },
708f2abe6aSChristian Borntraeger 	{ "exit_external_interrupt", VCPU_STAT(exit_external_interrupt) },
71ba5c1e9bSCarsten Otte 	{ "exit_instruction", VCPU_STAT(exit_instruction) },
729ec6de19SAlexander Yarygin 	{ "exit_pei", VCPU_STAT(exit_pei) },
73ba5c1e9bSCarsten Otte 	{ "exit_program_interruption", VCPU_STAT(exit_program_interruption) },
74ba5c1e9bSCarsten Otte 	{ "exit_instr_and_program_int", VCPU_STAT(exit_instr_and_program) },
75a011eeb2SJanosch Frank 	{ "exit_operation_exception", VCPU_STAT(exit_operation_exception) },
76f7819512SPaolo Bonzini 	{ "halt_successful_poll", VCPU_STAT(halt_successful_poll) },
7762bea5bfSPaolo Bonzini 	{ "halt_attempted_poll", VCPU_STAT(halt_attempted_poll) },
783491caf2SChristian Borntraeger 	{ "halt_poll_invalid", VCPU_STAT(halt_poll_invalid) },
79ce2e4f0bSDavid Hildenbrand 	{ "halt_wakeup", VCPU_STAT(halt_wakeup) },
80f5e10b09SChristian Borntraeger 	{ "instruction_lctlg", VCPU_STAT(instruction_lctlg) },
81ba5c1e9bSCarsten Otte 	{ "instruction_lctl", VCPU_STAT(instruction_lctl) },
82aba07508SDavid Hildenbrand 	{ "instruction_stctl", VCPU_STAT(instruction_stctl) },
83aba07508SDavid Hildenbrand 	{ "instruction_stctg", VCPU_STAT(instruction_stctg) },
84ccc40c53SChristian Borntraeger 	{ "deliver_ckc", VCPU_STAT(deliver_ckc) },
85ccc40c53SChristian Borntraeger 	{ "deliver_cputm", VCPU_STAT(deliver_cputm) },
86ba5c1e9bSCarsten Otte 	{ "deliver_emergency_signal", VCPU_STAT(deliver_emergency_signal) },
877697e71fSChristian Ehrhardt 	{ "deliver_external_call", VCPU_STAT(deliver_external_call) },
88ba5c1e9bSCarsten Otte 	{ "deliver_service_signal", VCPU_STAT(deliver_service_signal) },
89ccc40c53SChristian Borntraeger 	{ "deliver_virtio", VCPU_STAT(deliver_virtio) },
90ba5c1e9bSCarsten Otte 	{ "deliver_stop_signal", VCPU_STAT(deliver_stop_signal) },
91ba5c1e9bSCarsten Otte 	{ "deliver_prefix_signal", VCPU_STAT(deliver_prefix_signal) },
92ba5c1e9bSCarsten Otte 	{ "deliver_restart_signal", VCPU_STAT(deliver_restart_signal) },
93ccc40c53SChristian Borntraeger 	{ "deliver_program", VCPU_STAT(deliver_program) },
94ccc40c53SChristian Borntraeger 	{ "deliver_io", VCPU_STAT(deliver_io) },
9532de0749SQingFeng Hao 	{ "deliver_machine_check", VCPU_STAT(deliver_machine_check) },
96ba5c1e9bSCarsten Otte 	{ "exit_wait_state", VCPU_STAT(exit_wait_state) },
97ccc40c53SChristian Borntraeger 	{ "inject_ckc", VCPU_STAT(inject_ckc) },
98ccc40c53SChristian Borntraeger 	{ "inject_cputm", VCPU_STAT(inject_cputm) },
99ccc40c53SChristian Borntraeger 	{ "inject_external_call", VCPU_STAT(inject_external_call) },
100ccc40c53SChristian Borntraeger 	{ "inject_float_mchk", VM_STAT(inject_float_mchk) },
101ccc40c53SChristian Borntraeger 	{ "inject_emergency_signal", VCPU_STAT(inject_emergency_signal) },
102ccc40c53SChristian Borntraeger 	{ "inject_io", VM_STAT(inject_io) },
103ccc40c53SChristian Borntraeger 	{ "inject_mchk", VCPU_STAT(inject_mchk) },
104ccc40c53SChristian Borntraeger 	{ "inject_pfault_done", VM_STAT(inject_pfault_done) },
105ccc40c53SChristian Borntraeger 	{ "inject_program", VCPU_STAT(inject_program) },
106ccc40c53SChristian Borntraeger 	{ "inject_restart", VCPU_STAT(inject_restart) },
107ccc40c53SChristian Borntraeger 	{ "inject_service_signal", VM_STAT(inject_service_signal) },
108ccc40c53SChristian Borntraeger 	{ "inject_set_prefix", VCPU_STAT(inject_set_prefix) },
109ccc40c53SChristian Borntraeger 	{ "inject_stop_signal", VCPU_STAT(inject_stop_signal) },
110ccc40c53SChristian Borntraeger 	{ "inject_pfault_init", VCPU_STAT(inject_pfault_init) },
111ccc40c53SChristian Borntraeger 	{ "inject_virtio", VM_STAT(inject_virtio) },
112a37cb07aSChristian Borntraeger 	{ "instruction_epsw", VCPU_STAT(instruction_epsw) },
113a37cb07aSChristian Borntraeger 	{ "instruction_gs", VCPU_STAT(instruction_gs) },
114a37cb07aSChristian Borntraeger 	{ "instruction_io_other", VCPU_STAT(instruction_io_other) },
115a37cb07aSChristian Borntraeger 	{ "instruction_lpsw", VCPU_STAT(instruction_lpsw) },
116a37cb07aSChristian Borntraeger 	{ "instruction_lpswe", VCPU_STAT(instruction_lpswe) },
11769d0d3a3SChristian Borntraeger 	{ "instruction_pfmf", VCPU_STAT(instruction_pfmf) },
118a37cb07aSChristian Borntraeger 	{ "instruction_ptff", VCPU_STAT(instruction_ptff) },
119453423dcSChristian Borntraeger 	{ "instruction_stidp", VCPU_STAT(instruction_stidp) },
120a37cb07aSChristian Borntraeger 	{ "instruction_sck", VCPU_STAT(instruction_sck) },
121a37cb07aSChristian Borntraeger 	{ "instruction_sckpf", VCPU_STAT(instruction_sckpf) },
122453423dcSChristian Borntraeger 	{ "instruction_spx", VCPU_STAT(instruction_spx) },
123453423dcSChristian Borntraeger 	{ "instruction_stpx", VCPU_STAT(instruction_stpx) },
124453423dcSChristian Borntraeger 	{ "instruction_stap", VCPU_STAT(instruction_stap) },
125a37cb07aSChristian Borntraeger 	{ "instruction_iske", VCPU_STAT(instruction_iske) },
126a37cb07aSChristian Borntraeger 	{ "instruction_ri", VCPU_STAT(instruction_ri) },
127a37cb07aSChristian Borntraeger 	{ "instruction_rrbe", VCPU_STAT(instruction_rrbe) },
128a37cb07aSChristian Borntraeger 	{ "instruction_sske", VCPU_STAT(instruction_sske) },
1298a242234SHeiko Carstens 	{ "instruction_ipte_interlock", VCPU_STAT(instruction_ipte_interlock) },
130b31288faSKonstantin Weitz 	{ "instruction_essa", VCPU_STAT(instruction_essa) },
131453423dcSChristian Borntraeger 	{ "instruction_stsi", VCPU_STAT(instruction_stsi) },
132453423dcSChristian Borntraeger 	{ "instruction_stfl", VCPU_STAT(instruction_stfl) },
133a37cb07aSChristian Borntraeger 	{ "instruction_tb", VCPU_STAT(instruction_tb) },
134a37cb07aSChristian Borntraeger 	{ "instruction_tpi", VCPU_STAT(instruction_tpi) },
135bb25b9baSChristian Borntraeger 	{ "instruction_tprot", VCPU_STAT(instruction_tprot) },
136a37cb07aSChristian Borntraeger 	{ "instruction_tsch", VCPU_STAT(instruction_tsch) },
13795ca2cb5SJanosch Frank 	{ "instruction_sthyi", VCPU_STAT(instruction_sthyi) },
138a3508fbeSDavid Hildenbrand 	{ "instruction_sie", VCPU_STAT(instruction_sie) },
1395288fbf0SChristian Borntraeger 	{ "instruction_sigp_sense", VCPU_STAT(instruction_sigp_sense) },
140bd59d3a4SCornelia Huck 	{ "instruction_sigp_sense_running", VCPU_STAT(instruction_sigp_sense_running) },
1417697e71fSChristian Ehrhardt 	{ "instruction_sigp_external_call", VCPU_STAT(instruction_sigp_external_call) },
1425288fbf0SChristian Borntraeger 	{ "instruction_sigp_emergency", VCPU_STAT(instruction_sigp_emergency) },
14342cb0c9fSDavid Hildenbrand 	{ "instruction_sigp_cond_emergency", VCPU_STAT(instruction_sigp_cond_emergency) },
14442cb0c9fSDavid Hildenbrand 	{ "instruction_sigp_start", VCPU_STAT(instruction_sigp_start) },
1455288fbf0SChristian Borntraeger 	{ "instruction_sigp_stop", VCPU_STAT(instruction_sigp_stop) },
14642cb0c9fSDavid Hildenbrand 	{ "instruction_sigp_stop_store_status", VCPU_STAT(instruction_sigp_stop_store_status) },
14742cb0c9fSDavid Hildenbrand 	{ "instruction_sigp_store_status", VCPU_STAT(instruction_sigp_store_status) },
148cd7b4b61SEric Farman 	{ "instruction_sigp_store_adtl_status", VCPU_STAT(instruction_sigp_store_adtl_status) },
1495288fbf0SChristian Borntraeger 	{ "instruction_sigp_set_arch", VCPU_STAT(instruction_sigp_arch) },
1505288fbf0SChristian Borntraeger 	{ "instruction_sigp_set_prefix", VCPU_STAT(instruction_sigp_prefix) },
1515288fbf0SChristian Borntraeger 	{ "instruction_sigp_restart", VCPU_STAT(instruction_sigp_restart) },
15242cb0c9fSDavid Hildenbrand 	{ "instruction_sigp_cpu_reset", VCPU_STAT(instruction_sigp_cpu_reset) },
15342cb0c9fSDavid Hildenbrand 	{ "instruction_sigp_init_cpu_reset", VCPU_STAT(instruction_sigp_init_cpu_reset) },
15442cb0c9fSDavid Hildenbrand 	{ "instruction_sigp_unknown", VCPU_STAT(instruction_sigp_unknown) },
155866c138cSChristian Borntraeger 	{ "instruction_diag_10", VCPU_STAT(diagnose_10) },
156866c138cSChristian Borntraeger 	{ "instruction_diag_44", VCPU_STAT(diagnose_44) },
157866c138cSChristian Borntraeger 	{ "instruction_diag_9c", VCPU_STAT(diagnose_9c) },
158866c138cSChristian Borntraeger 	{ "instruction_diag_258", VCPU_STAT(diagnose_258) },
159866c138cSChristian Borntraeger 	{ "instruction_diag_308", VCPU_STAT(diagnose_308) },
160866c138cSChristian Borntraeger 	{ "instruction_diag_500", VCPU_STAT(diagnose_500) },
161a37cb07aSChristian Borntraeger 	{ "instruction_diag_other", VCPU_STAT(diagnose_other) },
162b0c632dbSHeiko Carstens 	{ NULL }
163b0c632dbSHeiko Carstens };
164b0c632dbSHeiko Carstens 
1658fa1696eSCollin L. Walling struct kvm_s390_tod_clock_ext {
1668fa1696eSCollin L. Walling 	__u8 epoch_idx;
1678fa1696eSCollin L. Walling 	__u64 tod;
1688fa1696eSCollin L. Walling 	__u8 reserved[7];
1698fa1696eSCollin L. Walling } __packed;
1708fa1696eSCollin L. Walling 
171a411edf1SDavid Hildenbrand /* allow nested virtualization in KVM (if enabled by user space) */
172a411edf1SDavid Hildenbrand static int nested;
173a411edf1SDavid Hildenbrand module_param(nested, int, S_IRUGO);
174a411edf1SDavid Hildenbrand MODULE_PARM_DESC(nested, "Nested virtualization support");
175a411edf1SDavid Hildenbrand 
176a4499382SJanosch Frank /* allow 1m huge page guest backing, if !nested */
177a4499382SJanosch Frank static int hpage;
178a4499382SJanosch Frank module_param(hpage, int, 0444);
179a4499382SJanosch Frank MODULE_PARM_DESC(hpage, "1m huge page backing support");
180b0c632dbSHeiko Carstens 
181c3b9e3e1SChristian Borntraeger /*
182c3b9e3e1SChristian Borntraeger  * For now we handle at most 16 double words as this is what the s390 base
183c3b9e3e1SChristian Borntraeger  * kernel handles and stores in the prefix page. If we ever need to go beyond
184c3b9e3e1SChristian Borntraeger  * this, this requires changes to code, but the external uapi can stay.
185c3b9e3e1SChristian Borntraeger  */
186c3b9e3e1SChristian Borntraeger #define SIZE_INTERNAL 16
187c3b9e3e1SChristian Borntraeger 
188c3b9e3e1SChristian Borntraeger /*
189c3b9e3e1SChristian Borntraeger  * Base feature mask that defines default mask for facilities. Consists of the
190c3b9e3e1SChristian Borntraeger  * defines in FACILITIES_KVM and the non-hypervisor managed bits.
191c3b9e3e1SChristian Borntraeger  */
192c3b9e3e1SChristian Borntraeger static unsigned long kvm_s390_fac_base[SIZE_INTERNAL] = { FACILITIES_KVM };
193c3b9e3e1SChristian Borntraeger /*
194c3b9e3e1SChristian Borntraeger  * Extended feature mask. Consists of the defines in FACILITIES_KVM_CPUMODEL
195c3b9e3e1SChristian Borntraeger  * and defines the facilities that can be enabled via a cpu model.
196c3b9e3e1SChristian Borntraeger  */
197c3b9e3e1SChristian Borntraeger static unsigned long kvm_s390_fac_ext[SIZE_INTERNAL] = { FACILITIES_KVM_CPUMODEL };
198c3b9e3e1SChristian Borntraeger 
199c3b9e3e1SChristian Borntraeger static unsigned long kvm_s390_fac_size(void)
20078c4b59fSMichael Mueller {
201c3b9e3e1SChristian Borntraeger 	BUILD_BUG_ON(SIZE_INTERNAL > S390_ARCH_FAC_MASK_SIZE_U64);
202c3b9e3e1SChristian Borntraeger 	BUILD_BUG_ON(SIZE_INTERNAL > S390_ARCH_FAC_LIST_SIZE_U64);
203c3b9e3e1SChristian Borntraeger 	BUILD_BUG_ON(SIZE_INTERNAL * sizeof(unsigned long) >
204c3b9e3e1SChristian Borntraeger 		sizeof(S390_lowcore.stfle_fac_list));
205c3b9e3e1SChristian Borntraeger 
206c3b9e3e1SChristian Borntraeger 	return SIZE_INTERNAL;
20778c4b59fSMichael Mueller }
20878c4b59fSMichael Mueller 
20915c9705fSDavid Hildenbrand /* available cpu features supported by kvm */
21015c9705fSDavid Hildenbrand static DECLARE_BITMAP(kvm_s390_available_cpu_feat, KVM_S390_VM_CPU_FEAT_NR_BITS);
2110a763c78SDavid Hildenbrand /* available subfunctions indicated via query / "test bit" */
2120a763c78SDavid Hildenbrand static struct kvm_s390_vm_cpu_subfunc kvm_s390_available_subfunc;
21315c9705fSDavid Hildenbrand 
2149d8d5786SMichael Mueller static struct gmap_notifier gmap_notifier;
215a3508fbeSDavid Hildenbrand static struct gmap_notifier vsie_gmap_notifier;
21678f26131SChristian Borntraeger debug_info_t *kvm_s390_dbf;
2179d8d5786SMichael Mueller 
218b0c632dbSHeiko Carstens /* Section: not file related */
21913a34e06SRadim Krčmář int kvm_arch_hardware_enable(void)
220b0c632dbSHeiko Carstens {
221b0c632dbSHeiko Carstens 	/* every s390 is virtualization enabled ;-) */
22210474ae8SAlexander Graf 	return 0;
223b0c632dbSHeiko Carstens }
224b0c632dbSHeiko Carstens 
225414d3b07SMartin Schwidefsky static void kvm_gmap_notifier(struct gmap *gmap, unsigned long start,
226414d3b07SMartin Schwidefsky 			      unsigned long end);
2272c70fe44SChristian Borntraeger 
2281575767eSDavid Hildenbrand static void kvm_clock_sync_scb(struct kvm_s390_sie_block *scb, u64 delta)
2291575767eSDavid Hildenbrand {
2301575767eSDavid Hildenbrand 	u8 delta_idx = 0;
2311575767eSDavid Hildenbrand 
2321575767eSDavid Hildenbrand 	/*
2331575767eSDavid Hildenbrand 	 * The TOD jumps by delta, we have to compensate this by adding
2341575767eSDavid Hildenbrand 	 * -delta to the epoch.
2351575767eSDavid Hildenbrand 	 */
2361575767eSDavid Hildenbrand 	delta = -delta;
2371575767eSDavid Hildenbrand 
2381575767eSDavid Hildenbrand 	/* sign-extension - we're adding to signed values below */
2391575767eSDavid Hildenbrand 	if ((s64)delta < 0)
2401575767eSDavid Hildenbrand 		delta_idx = -1;
2411575767eSDavid Hildenbrand 
2421575767eSDavid Hildenbrand 	scb->epoch += delta;
2431575767eSDavid Hildenbrand 	if (scb->ecd & ECD_MEF) {
2441575767eSDavid Hildenbrand 		scb->epdx += delta_idx;
2451575767eSDavid Hildenbrand 		if (scb->epoch < delta)
2461575767eSDavid Hildenbrand 			scb->epdx += 1;
2471575767eSDavid Hildenbrand 	}
2481575767eSDavid Hildenbrand }
2491575767eSDavid Hildenbrand 
250fdf03650SFan Zhang /*
251fdf03650SFan Zhang  * This callback is executed during stop_machine(). All CPUs are therefore
252fdf03650SFan Zhang  * temporarily stopped. In order not to change guest behavior, we have to
253fdf03650SFan Zhang  * disable preemption whenever we touch the epoch of kvm and the VCPUs,
254fdf03650SFan Zhang  * so a CPU won't be stopped while calculating with the epoch.
255fdf03650SFan Zhang  */
256fdf03650SFan Zhang static int kvm_clock_sync(struct notifier_block *notifier, unsigned long val,
257fdf03650SFan Zhang 			  void *v)
258fdf03650SFan Zhang {
259fdf03650SFan Zhang 	struct kvm *kvm;
260fdf03650SFan Zhang 	struct kvm_vcpu *vcpu;
261fdf03650SFan Zhang 	int i;
262fdf03650SFan Zhang 	unsigned long long *delta = v;
263fdf03650SFan Zhang 
264fdf03650SFan Zhang 	list_for_each_entry(kvm, &vm_list, vm_list) {
265fdf03650SFan Zhang 		kvm_for_each_vcpu(i, vcpu, kvm) {
2661575767eSDavid Hildenbrand 			kvm_clock_sync_scb(vcpu->arch.sie_block, *delta);
2671575767eSDavid Hildenbrand 			if (i == 0) {
2681575767eSDavid Hildenbrand 				kvm->arch.epoch = vcpu->arch.sie_block->epoch;
2691575767eSDavid Hildenbrand 				kvm->arch.epdx = vcpu->arch.sie_block->epdx;
2701575767eSDavid Hildenbrand 			}
271db0758b2SDavid Hildenbrand 			if (vcpu->arch.cputm_enabled)
272db0758b2SDavid Hildenbrand 				vcpu->arch.cputm_start += *delta;
27391473b48SDavid Hildenbrand 			if (vcpu->arch.vsie_block)
2741575767eSDavid Hildenbrand 				kvm_clock_sync_scb(vcpu->arch.vsie_block,
2751575767eSDavid Hildenbrand 						   *delta);
276fdf03650SFan Zhang 		}
277fdf03650SFan Zhang 	}
278fdf03650SFan Zhang 	return NOTIFY_OK;
279fdf03650SFan Zhang }
280fdf03650SFan Zhang 
281fdf03650SFan Zhang static struct notifier_block kvm_clock_notifier = {
282fdf03650SFan Zhang 	.notifier_call = kvm_clock_sync,
283fdf03650SFan Zhang };
284fdf03650SFan Zhang 
285b0c632dbSHeiko Carstens int kvm_arch_hardware_setup(void)
286b0c632dbSHeiko Carstens {
2872c70fe44SChristian Borntraeger 	gmap_notifier.notifier_call = kvm_gmap_notifier;
288b2d73b2aSMartin Schwidefsky 	gmap_register_pte_notifier(&gmap_notifier);
289a3508fbeSDavid Hildenbrand 	vsie_gmap_notifier.notifier_call = kvm_s390_vsie_gmap_notifier;
290a3508fbeSDavid Hildenbrand 	gmap_register_pte_notifier(&vsie_gmap_notifier);
291fdf03650SFan Zhang 	atomic_notifier_chain_register(&s390_epoch_delta_notifier,
292fdf03650SFan Zhang 				       &kvm_clock_notifier);
293b0c632dbSHeiko Carstens 	return 0;
294b0c632dbSHeiko Carstens }
295b0c632dbSHeiko Carstens 
296b0c632dbSHeiko Carstens void kvm_arch_hardware_unsetup(void)
297b0c632dbSHeiko Carstens {
298b2d73b2aSMartin Schwidefsky 	gmap_unregister_pte_notifier(&gmap_notifier);
299a3508fbeSDavid Hildenbrand 	gmap_unregister_pte_notifier(&vsie_gmap_notifier);
300fdf03650SFan Zhang 	atomic_notifier_chain_unregister(&s390_epoch_delta_notifier,
301fdf03650SFan Zhang 					 &kvm_clock_notifier);
302b0c632dbSHeiko Carstens }
303b0c632dbSHeiko Carstens 
30422be5a13SDavid Hildenbrand static void allow_cpu_feat(unsigned long nr)
30522be5a13SDavid Hildenbrand {
30622be5a13SDavid Hildenbrand 	set_bit_inv(nr, kvm_s390_available_cpu_feat);
30722be5a13SDavid Hildenbrand }
30822be5a13SDavid Hildenbrand 
3090a763c78SDavid Hildenbrand static inline int plo_test_bit(unsigned char nr)
3100a763c78SDavid Hildenbrand {
3110a763c78SDavid Hildenbrand 	register unsigned long r0 asm("0") = (unsigned long) nr | 0x100;
312d051ae53SHeiko Carstens 	int cc;
3130a763c78SDavid Hildenbrand 
3140a763c78SDavid Hildenbrand 	asm volatile(
3150a763c78SDavid Hildenbrand 		/* Parameter registers are ignored for "test bit" */
3160a763c78SDavid Hildenbrand 		"	plo	0,0,0,0(0)\n"
3170a763c78SDavid Hildenbrand 		"	ipm	%0\n"
3180a763c78SDavid Hildenbrand 		"	srl	%0,28\n"
3190a763c78SDavid Hildenbrand 		: "=d" (cc)
3200a763c78SDavid Hildenbrand 		: "d" (r0)
3210a763c78SDavid Hildenbrand 		: "cc");
3220a763c78SDavid Hildenbrand 	return cc == 0;
3230a763c78SDavid Hildenbrand }
3240a763c78SDavid Hildenbrand 
32522be5a13SDavid Hildenbrand static void kvm_s390_cpu_feat_init(void)
32622be5a13SDavid Hildenbrand {
3270a763c78SDavid Hildenbrand 	int i;
3280a763c78SDavid Hildenbrand 
3290a763c78SDavid Hildenbrand 	for (i = 0; i < 256; ++i) {
3300a763c78SDavid Hildenbrand 		if (plo_test_bit(i))
3310a763c78SDavid Hildenbrand 			kvm_s390_available_subfunc.plo[i >> 3] |= 0x80 >> (i & 7);
3320a763c78SDavid Hildenbrand 	}
3330a763c78SDavid Hildenbrand 
3340a763c78SDavid Hildenbrand 	if (test_facility(28)) /* TOD-clock steering */
335221bb8a4SLinus Torvalds 		ptff(kvm_s390_available_subfunc.ptff,
336221bb8a4SLinus Torvalds 		     sizeof(kvm_s390_available_subfunc.ptff),
337221bb8a4SLinus Torvalds 		     PTFF_QAF);
3380a763c78SDavid Hildenbrand 
3390a763c78SDavid Hildenbrand 	if (test_facility(17)) { /* MSA */
34069c0e360SMartin Schwidefsky 		__cpacf_query(CPACF_KMAC, (cpacf_mask_t *)
34169c0e360SMartin Schwidefsky 			      kvm_s390_available_subfunc.kmac);
34269c0e360SMartin Schwidefsky 		__cpacf_query(CPACF_KMC, (cpacf_mask_t *)
34369c0e360SMartin Schwidefsky 			      kvm_s390_available_subfunc.kmc);
34469c0e360SMartin Schwidefsky 		__cpacf_query(CPACF_KM, (cpacf_mask_t *)
34569c0e360SMartin Schwidefsky 			      kvm_s390_available_subfunc.km);
34669c0e360SMartin Schwidefsky 		__cpacf_query(CPACF_KIMD, (cpacf_mask_t *)
34769c0e360SMartin Schwidefsky 			      kvm_s390_available_subfunc.kimd);
34869c0e360SMartin Schwidefsky 		__cpacf_query(CPACF_KLMD, (cpacf_mask_t *)
34969c0e360SMartin Schwidefsky 			      kvm_s390_available_subfunc.klmd);
3500a763c78SDavid Hildenbrand 	}
3510a763c78SDavid Hildenbrand 	if (test_facility(76)) /* MSA3 */
35269c0e360SMartin Schwidefsky 		__cpacf_query(CPACF_PCKMO, (cpacf_mask_t *)
35369c0e360SMartin Schwidefsky 			      kvm_s390_available_subfunc.pckmo);
3540a763c78SDavid Hildenbrand 	if (test_facility(77)) { /* MSA4 */
35569c0e360SMartin Schwidefsky 		__cpacf_query(CPACF_KMCTR, (cpacf_mask_t *)
35669c0e360SMartin Schwidefsky 			      kvm_s390_available_subfunc.kmctr);
35769c0e360SMartin Schwidefsky 		__cpacf_query(CPACF_KMF, (cpacf_mask_t *)
35869c0e360SMartin Schwidefsky 			      kvm_s390_available_subfunc.kmf);
35969c0e360SMartin Schwidefsky 		__cpacf_query(CPACF_KMO, (cpacf_mask_t *)
36069c0e360SMartin Schwidefsky 			      kvm_s390_available_subfunc.kmo);
36169c0e360SMartin Schwidefsky 		__cpacf_query(CPACF_PCC, (cpacf_mask_t *)
36269c0e360SMartin Schwidefsky 			      kvm_s390_available_subfunc.pcc);
3630a763c78SDavid Hildenbrand 	}
3640a763c78SDavid Hildenbrand 	if (test_facility(57)) /* MSA5 */
365985a9d20SHarald Freudenberger 		__cpacf_query(CPACF_PRNO, (cpacf_mask_t *)
36669c0e360SMartin Schwidefsky 			      kvm_s390_available_subfunc.ppno);
3670a763c78SDavid Hildenbrand 
368e000b8e0SJason J. Herne 	if (test_facility(146)) /* MSA8 */
369e000b8e0SJason J. Herne 		__cpacf_query(CPACF_KMA, (cpacf_mask_t *)
370e000b8e0SJason J. Herne 			      kvm_s390_available_subfunc.kma);
371e000b8e0SJason J. Herne 
37222be5a13SDavid Hildenbrand 	if (MACHINE_HAS_ESOP)
37322be5a13SDavid Hildenbrand 		allow_cpu_feat(KVM_S390_VM_CPU_FEAT_ESOP);
374a3508fbeSDavid Hildenbrand 	/*
375a3508fbeSDavid Hildenbrand 	 * We need SIE support, ESOP (PROT_READ protection for gmap_shadow),
376a3508fbeSDavid Hildenbrand 	 * 64bit SCAO (SCA passthrough) and IDTE (for gmap_shadow unshadowing).
377a3508fbeSDavid Hildenbrand 	 */
378a3508fbeSDavid Hildenbrand 	if (!sclp.has_sief2 || !MACHINE_HAS_ESOP || !sclp.has_64bscao ||
379a411edf1SDavid Hildenbrand 	    !test_facility(3) || !nested)
380a3508fbeSDavid Hildenbrand 		return;
381a3508fbeSDavid Hildenbrand 	allow_cpu_feat(KVM_S390_VM_CPU_FEAT_SIEF2);
38219c439b5SDavid Hildenbrand 	if (sclp.has_64bscao)
38319c439b5SDavid Hildenbrand 		allow_cpu_feat(KVM_S390_VM_CPU_FEAT_64BSCAO);
3840615a326SDavid Hildenbrand 	if (sclp.has_siif)
3850615a326SDavid Hildenbrand 		allow_cpu_feat(KVM_S390_VM_CPU_FEAT_SIIF);
38677d18f6dSDavid Hildenbrand 	if (sclp.has_gpere)
38777d18f6dSDavid Hildenbrand 		allow_cpu_feat(KVM_S390_VM_CPU_FEAT_GPERE);
388a1b7b9b2SDavid Hildenbrand 	if (sclp.has_gsls)
389a1b7b9b2SDavid Hildenbrand 		allow_cpu_feat(KVM_S390_VM_CPU_FEAT_GSLS);
3905630a8e8SDavid Hildenbrand 	if (sclp.has_ib)
3915630a8e8SDavid Hildenbrand 		allow_cpu_feat(KVM_S390_VM_CPU_FEAT_IB);
39213ee3f67SDavid Hildenbrand 	if (sclp.has_cei)
39313ee3f67SDavid Hildenbrand 		allow_cpu_feat(KVM_S390_VM_CPU_FEAT_CEI);
3947fd7f39dSDavid Hildenbrand 	if (sclp.has_ibs)
3957fd7f39dSDavid Hildenbrand 		allow_cpu_feat(KVM_S390_VM_CPU_FEAT_IBS);
396730cd632SFarhan Ali 	if (sclp.has_kss)
397730cd632SFarhan Ali 		allow_cpu_feat(KVM_S390_VM_CPU_FEAT_KSS);
3985d3876a8SDavid Hildenbrand 	/*
3995d3876a8SDavid Hildenbrand 	 * KVM_S390_VM_CPU_FEAT_SKEY: Wrong shadow of PTE.I bits will make
4005d3876a8SDavid Hildenbrand 	 * all skey handling functions read/set the skey from the PGSTE
4015d3876a8SDavid Hildenbrand 	 * instead of the real storage key.
4025d3876a8SDavid Hildenbrand 	 *
4035d3876a8SDavid Hildenbrand 	 * KVM_S390_VM_CPU_FEAT_CMMA: Wrong shadow of PTE.I bits will make
4045d3876a8SDavid Hildenbrand 	 * pages being detected as preserved although they are resident.
4055d3876a8SDavid Hildenbrand 	 *
4065d3876a8SDavid Hildenbrand 	 * KVM_S390_VM_CPU_FEAT_PFMFI: Wrong shadow of PTE.I bits will
4075d3876a8SDavid Hildenbrand 	 * have the same effect as for KVM_S390_VM_CPU_FEAT_SKEY.
4085d3876a8SDavid Hildenbrand 	 *
4095d3876a8SDavid Hildenbrand 	 * For KVM_S390_VM_CPU_FEAT_SKEY, KVM_S390_VM_CPU_FEAT_CMMA and
4105d3876a8SDavid Hildenbrand 	 * KVM_S390_VM_CPU_FEAT_PFMFI, all PTE.I and PGSTE bits have to be
4115d3876a8SDavid Hildenbrand 	 * correctly shadowed. We can do that for the PGSTE but not for PTE.I.
4125d3876a8SDavid Hildenbrand 	 *
4135d3876a8SDavid Hildenbrand 	 * KVM_S390_VM_CPU_FEAT_SIGPIF: Wrong SCB addresses in the SCA. We
4145d3876a8SDavid Hildenbrand 	 * cannot easily shadow the SCA because of the ipte lock.
4155d3876a8SDavid Hildenbrand 	 */
41622be5a13SDavid Hildenbrand }
41722be5a13SDavid Hildenbrand 
418b0c632dbSHeiko Carstens int kvm_arch_init(void *opaque)
419b0c632dbSHeiko Carstens {
42078f26131SChristian Borntraeger 	kvm_s390_dbf = debug_register("kvm-trace", 32, 1, 7 * sizeof(long));
42178f26131SChristian Borntraeger 	if (!kvm_s390_dbf)
42278f26131SChristian Borntraeger 		return -ENOMEM;
42378f26131SChristian Borntraeger 
42478f26131SChristian Borntraeger 	if (debug_register_view(kvm_s390_dbf, &debug_sprintf_view)) {
42578f26131SChristian Borntraeger 		debug_unregister(kvm_s390_dbf);
42678f26131SChristian Borntraeger 		return -ENOMEM;
42778f26131SChristian Borntraeger 	}
42878f26131SChristian Borntraeger 
42922be5a13SDavid Hildenbrand 	kvm_s390_cpu_feat_init();
43022be5a13SDavid Hildenbrand 
43184877d93SCornelia Huck 	/* Register floating interrupt controller interface. */
43284877d93SCornelia Huck 	return kvm_register_device_ops(&kvm_flic_ops, KVM_DEV_TYPE_FLIC);
433b0c632dbSHeiko Carstens }
434b0c632dbSHeiko Carstens 
43578f26131SChristian Borntraeger void kvm_arch_exit(void)
43678f26131SChristian Borntraeger {
43778f26131SChristian Borntraeger 	debug_unregister(kvm_s390_dbf);
43878f26131SChristian Borntraeger }
43978f26131SChristian Borntraeger 
440b0c632dbSHeiko Carstens /* Section: device related */
441b0c632dbSHeiko Carstens long kvm_arch_dev_ioctl(struct file *filp,
442b0c632dbSHeiko Carstens 			unsigned int ioctl, unsigned long arg)
443b0c632dbSHeiko Carstens {
444b0c632dbSHeiko Carstens 	if (ioctl == KVM_S390_ENABLE_SIE)
445b0c632dbSHeiko Carstens 		return s390_enable_sie();
446b0c632dbSHeiko Carstens 	return -EINVAL;
447b0c632dbSHeiko Carstens }
448b0c632dbSHeiko Carstens 
449784aa3d7SAlexander Graf int kvm_vm_ioctl_check_extension(struct kvm *kvm, long ext)
450b0c632dbSHeiko Carstens {
451d7b0b5ebSCarsten Otte 	int r;
452d7b0b5ebSCarsten Otte 
4532bd0ac4eSCarsten Otte 	switch (ext) {
454d7b0b5ebSCarsten Otte 	case KVM_CAP_S390_PSW:
455b6cf8788SChristian Borntraeger 	case KVM_CAP_S390_GMAP:
45652e16b18SChristian Borntraeger 	case KVM_CAP_SYNC_MMU:
4571efd0f59SCarsten Otte #ifdef CONFIG_KVM_S390_UCONTROL
4581efd0f59SCarsten Otte 	case KVM_CAP_S390_UCONTROL:
4591efd0f59SCarsten Otte #endif
4603c038e6bSDominik Dingel 	case KVM_CAP_ASYNC_PF:
46160b413c9SChristian Borntraeger 	case KVM_CAP_SYNC_REGS:
46214eebd91SCarsten Otte 	case KVM_CAP_ONE_REG:
463d6712df9SCornelia Huck 	case KVM_CAP_ENABLE_CAP:
464fa6b7fe9SCornelia Huck 	case KVM_CAP_S390_CSS_SUPPORT:
46510ccaa1eSCornelia Huck 	case KVM_CAP_IOEVENTFD:
466c05c4186SJens Freimann 	case KVM_CAP_DEVICE_CTRL:
467d938dc55SCornelia Huck 	case KVM_CAP_ENABLE_CAP_VM:
46878599d90SCornelia Huck 	case KVM_CAP_S390_IRQCHIP:
469f2061656SDominik Dingel 	case KVM_CAP_VM_ATTRIBUTES:
4706352e4d2SDavid Hildenbrand 	case KVM_CAP_MP_STATE:
471460df4c1SPaolo Bonzini 	case KVM_CAP_IMMEDIATE_EXIT:
47247b43c52SJens Freimann 	case KVM_CAP_S390_INJECT_IRQ:
4732444b352SDavid Hildenbrand 	case KVM_CAP_S390_USER_SIGP:
474e44fc8c9SEkaterina Tumanova 	case KVM_CAP_S390_USER_STSI:
47530ee2a98SJason J. Herne 	case KVM_CAP_S390_SKEYS:
476816c7667SJens Freimann 	case KVM_CAP_S390_IRQ_STATE:
4776502a34cSDavid Hildenbrand 	case KVM_CAP_S390_USER_INSTR0:
4784036e387SClaudio Imbrenda 	case KVM_CAP_S390_CMMA_MIGRATION:
47947a4693eSYi Min Zhao 	case KVM_CAP_S390_AIS:
480da9a1446SChristian Borntraeger 	case KVM_CAP_S390_AIS_MIGRATION:
481d7b0b5ebSCarsten Otte 		r = 1;
482d7b0b5ebSCarsten Otte 		break;
483a4499382SJanosch Frank 	case KVM_CAP_S390_HPAGE_1M:
484a4499382SJanosch Frank 		r = 0;
485a4499382SJanosch Frank 		if (hpage)
486a4499382SJanosch Frank 			r = 1;
487a4499382SJanosch Frank 		break;
48841408c28SThomas Huth 	case KVM_CAP_S390_MEM_OP:
48941408c28SThomas Huth 		r = MEM_OP_MAX_SIZE;
49041408c28SThomas Huth 		break;
491e726b1bdSChristian Borntraeger 	case KVM_CAP_NR_VCPUS:
492e726b1bdSChristian Borntraeger 	case KVM_CAP_MAX_VCPUS:
49376a6dd72SDavid Hildenbrand 		r = KVM_S390_BSCA_CPU_SLOTS;
494a6940674SDavid Hildenbrand 		if (!kvm_s390_use_sca_entries())
495a6940674SDavid Hildenbrand 			r = KVM_MAX_VCPUS;
496a6940674SDavid Hildenbrand 		else if (sclp.has_esca && sclp.has_64bscao)
49776a6dd72SDavid Hildenbrand 			r = KVM_S390_ESCA_CPU_SLOTS;
498e726b1bdSChristian Borntraeger 		break;
499e1e2e605SNick Wang 	case KVM_CAP_NR_MEMSLOTS:
500e1e2e605SNick Wang 		r = KVM_USER_MEM_SLOTS;
501e1e2e605SNick Wang 		break;
5021526bf9cSChristian Borntraeger 	case KVM_CAP_S390_COW:
503abf09bedSMartin Schwidefsky 		r = MACHINE_HAS_ESOP;
5041526bf9cSChristian Borntraeger 		break;
50568c55750SEric Farman 	case KVM_CAP_S390_VECTOR_REGISTERS:
50668c55750SEric Farman 		r = MACHINE_HAS_VX;
50768c55750SEric Farman 		break;
508c6e5f166SFan Zhang 	case KVM_CAP_S390_RI:
509c6e5f166SFan Zhang 		r = test_facility(64);
510c6e5f166SFan Zhang 		break;
5114e0b1ab7SFan Zhang 	case KVM_CAP_S390_GS:
5124e0b1ab7SFan Zhang 		r = test_facility(133);
5134e0b1ab7SFan Zhang 		break;
51435b3fde6SChristian Borntraeger 	case KVM_CAP_S390_BPB:
51535b3fde6SChristian Borntraeger 		r = test_facility(82);
51635b3fde6SChristian Borntraeger 		break;
5172bd0ac4eSCarsten Otte 	default:
518d7b0b5ebSCarsten Otte 		r = 0;
519b0c632dbSHeiko Carstens 	}
520d7b0b5ebSCarsten Otte 	return r;
5212bd0ac4eSCarsten Otte }
522b0c632dbSHeiko Carstens 
52315f36ebdSJason J. Herne static void kvm_s390_sync_dirty_log(struct kvm *kvm,
52415f36ebdSJason J. Herne 				    struct kvm_memory_slot *memslot)
52515f36ebdSJason J. Herne {
5260959e168SJanosch Frank 	int i;
52715f36ebdSJason J. Herne 	gfn_t cur_gfn, last_gfn;
5280959e168SJanosch Frank 	unsigned long gaddr, vmaddr;
52915f36ebdSJason J. Herne 	struct gmap *gmap = kvm->arch.gmap;
5300959e168SJanosch Frank 	DECLARE_BITMAP(bitmap, _PAGE_ENTRIES);
53115f36ebdSJason J. Herne 
5320959e168SJanosch Frank 	/* Loop over all guest segments */
5330959e168SJanosch Frank 	cur_gfn = memslot->base_gfn;
53415f36ebdSJason J. Herne 	last_gfn = memslot->base_gfn + memslot->npages;
5350959e168SJanosch Frank 	for (; cur_gfn <= last_gfn; cur_gfn += _PAGE_ENTRIES) {
5360959e168SJanosch Frank 		gaddr = gfn_to_gpa(cur_gfn);
5370959e168SJanosch Frank 		vmaddr = gfn_to_hva_memslot(memslot, cur_gfn);
5380959e168SJanosch Frank 		if (kvm_is_error_hva(vmaddr))
5390959e168SJanosch Frank 			continue;
54015f36ebdSJason J. Herne 
5410959e168SJanosch Frank 		bitmap_zero(bitmap, _PAGE_ENTRIES);
5420959e168SJanosch Frank 		gmap_sync_dirty_log_pmd(gmap, bitmap, gaddr, vmaddr);
5430959e168SJanosch Frank 		for (i = 0; i < _PAGE_ENTRIES; i++) {
5440959e168SJanosch Frank 			if (test_bit(i, bitmap))
5450959e168SJanosch Frank 				mark_page_dirty(kvm, cur_gfn + i);
5460959e168SJanosch Frank 		}
5470959e168SJanosch Frank 
5481763f8d0SChristian Borntraeger 		if (fatal_signal_pending(current))
5491763f8d0SChristian Borntraeger 			return;
55070c88a00SChristian Borntraeger 		cond_resched();
55115f36ebdSJason J. Herne 	}
55215f36ebdSJason J. Herne }
55315f36ebdSJason J. Herne 
554b0c632dbSHeiko Carstens /* Section: vm related */
555a6e2f683SEugene (jno) Dvurechenski static void sca_del_vcpu(struct kvm_vcpu *vcpu);
556a6e2f683SEugene (jno) Dvurechenski 
557b0c632dbSHeiko Carstens /*
558b0c632dbSHeiko Carstens  * Get (and clear) the dirty memory log for a memory slot.
559b0c632dbSHeiko Carstens  */
560b0c632dbSHeiko Carstens int kvm_vm_ioctl_get_dirty_log(struct kvm *kvm,
561b0c632dbSHeiko Carstens 			       struct kvm_dirty_log *log)
562b0c632dbSHeiko Carstens {
56315f36ebdSJason J. Herne 	int r;
56415f36ebdSJason J. Herne 	unsigned long n;
5659f6b8029SPaolo Bonzini 	struct kvm_memslots *slots;
56615f36ebdSJason J. Herne 	struct kvm_memory_slot *memslot;
56715f36ebdSJason J. Herne 	int is_dirty = 0;
56815f36ebdSJason J. Herne 
569e1e8a962SJanosch Frank 	if (kvm_is_ucontrol(kvm))
570e1e8a962SJanosch Frank 		return -EINVAL;
571e1e8a962SJanosch Frank 
57215f36ebdSJason J. Herne 	mutex_lock(&kvm->slots_lock);
57315f36ebdSJason J. Herne 
57415f36ebdSJason J. Herne 	r = -EINVAL;
57515f36ebdSJason J. Herne 	if (log->slot >= KVM_USER_MEM_SLOTS)
57615f36ebdSJason J. Herne 		goto out;
57715f36ebdSJason J. Herne 
5789f6b8029SPaolo Bonzini 	slots = kvm_memslots(kvm);
5799f6b8029SPaolo Bonzini 	memslot = id_to_memslot(slots, log->slot);
58015f36ebdSJason J. Herne 	r = -ENOENT;
58115f36ebdSJason J. Herne 	if (!memslot->dirty_bitmap)
58215f36ebdSJason J. Herne 		goto out;
58315f36ebdSJason J. Herne 
58415f36ebdSJason J. Herne 	kvm_s390_sync_dirty_log(kvm, memslot);
58515f36ebdSJason J. Herne 	r = kvm_get_dirty_log(kvm, log, &is_dirty);
58615f36ebdSJason J. Herne 	if (r)
58715f36ebdSJason J. Herne 		goto out;
58815f36ebdSJason J. Herne 
58915f36ebdSJason J. Herne 	/* Clear the dirty log */
59015f36ebdSJason J. Herne 	if (is_dirty) {
59115f36ebdSJason J. Herne 		n = kvm_dirty_bitmap_bytes(memslot);
59215f36ebdSJason J. Herne 		memset(memslot->dirty_bitmap, 0, n);
59315f36ebdSJason J. Herne 	}
59415f36ebdSJason J. Herne 	r = 0;
59515f36ebdSJason J. Herne out:
59615f36ebdSJason J. Herne 	mutex_unlock(&kvm->slots_lock);
59715f36ebdSJason J. Herne 	return r;
598b0c632dbSHeiko Carstens }
599b0c632dbSHeiko Carstens 
6006502a34cSDavid Hildenbrand static void icpt_operexc_on_all_vcpus(struct kvm *kvm)
6016502a34cSDavid Hildenbrand {
6026502a34cSDavid Hildenbrand 	unsigned int i;
6036502a34cSDavid Hildenbrand 	struct kvm_vcpu *vcpu;
6046502a34cSDavid Hildenbrand 
6056502a34cSDavid Hildenbrand 	kvm_for_each_vcpu(i, vcpu, kvm) {
6066502a34cSDavid Hildenbrand 		kvm_s390_sync_request(KVM_REQ_ICPT_OPEREXC, vcpu);
6076502a34cSDavid Hildenbrand 	}
6086502a34cSDavid Hildenbrand }
6096502a34cSDavid Hildenbrand 
610d938dc55SCornelia Huck static int kvm_vm_ioctl_enable_cap(struct kvm *kvm, struct kvm_enable_cap *cap)
611d938dc55SCornelia Huck {
612d938dc55SCornelia Huck 	int r;
613d938dc55SCornelia Huck 
614d938dc55SCornelia Huck 	if (cap->flags)
615d938dc55SCornelia Huck 		return -EINVAL;
616d938dc55SCornelia Huck 
617d938dc55SCornelia Huck 	switch (cap->cap) {
61884223598SCornelia Huck 	case KVM_CAP_S390_IRQCHIP:
619c92ea7b9SChristian Borntraeger 		VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_IRQCHIP");
62084223598SCornelia Huck 		kvm->arch.use_irqchip = 1;
62184223598SCornelia Huck 		r = 0;
62284223598SCornelia Huck 		break;
6232444b352SDavid Hildenbrand 	case KVM_CAP_S390_USER_SIGP:
624c92ea7b9SChristian Borntraeger 		VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_USER_SIGP");
6252444b352SDavid Hildenbrand 		kvm->arch.user_sigp = 1;
6262444b352SDavid Hildenbrand 		r = 0;
6272444b352SDavid Hildenbrand 		break;
62868c55750SEric Farman 	case KVM_CAP_S390_VECTOR_REGISTERS:
6295967c17bSDavid Hildenbrand 		mutex_lock(&kvm->lock);
630a03825bbSPaolo Bonzini 		if (kvm->created_vcpus) {
6315967c17bSDavid Hildenbrand 			r = -EBUSY;
6325967c17bSDavid Hildenbrand 		} else if (MACHINE_HAS_VX) {
633c54f0d6aSDavid Hildenbrand 			set_kvm_facility(kvm->arch.model.fac_mask, 129);
634c54f0d6aSDavid Hildenbrand 			set_kvm_facility(kvm->arch.model.fac_list, 129);
6352f87d942SGuenther Hutzl 			if (test_facility(134)) {
6362f87d942SGuenther Hutzl 				set_kvm_facility(kvm->arch.model.fac_mask, 134);
6372f87d942SGuenther Hutzl 				set_kvm_facility(kvm->arch.model.fac_list, 134);
6382f87d942SGuenther Hutzl 			}
63953743aa7SMaxim Samoylov 			if (test_facility(135)) {
64053743aa7SMaxim Samoylov 				set_kvm_facility(kvm->arch.model.fac_mask, 135);
64153743aa7SMaxim Samoylov 				set_kvm_facility(kvm->arch.model.fac_list, 135);
64253743aa7SMaxim Samoylov 			}
64318280d8bSMichael Mueller 			r = 0;
64418280d8bSMichael Mueller 		} else
64518280d8bSMichael Mueller 			r = -EINVAL;
6465967c17bSDavid Hildenbrand 		mutex_unlock(&kvm->lock);
647c92ea7b9SChristian Borntraeger 		VM_EVENT(kvm, 3, "ENABLE: CAP_S390_VECTOR_REGISTERS %s",
648c92ea7b9SChristian Borntraeger 			 r ? "(not available)" : "(success)");
64968c55750SEric Farman 		break;
650c6e5f166SFan Zhang 	case KVM_CAP_S390_RI:
651c6e5f166SFan Zhang 		r = -EINVAL;
652c6e5f166SFan Zhang 		mutex_lock(&kvm->lock);
653a03825bbSPaolo Bonzini 		if (kvm->created_vcpus) {
654c6e5f166SFan Zhang 			r = -EBUSY;
655c6e5f166SFan Zhang 		} else if (test_facility(64)) {
656c54f0d6aSDavid Hildenbrand 			set_kvm_facility(kvm->arch.model.fac_mask, 64);
657c54f0d6aSDavid Hildenbrand 			set_kvm_facility(kvm->arch.model.fac_list, 64);
658c6e5f166SFan Zhang 			r = 0;
659c6e5f166SFan Zhang 		}
660c6e5f166SFan Zhang 		mutex_unlock(&kvm->lock);
661c6e5f166SFan Zhang 		VM_EVENT(kvm, 3, "ENABLE: CAP_S390_RI %s",
662c6e5f166SFan Zhang 			 r ? "(not available)" : "(success)");
663c6e5f166SFan Zhang 		break;
66447a4693eSYi Min Zhao 	case KVM_CAP_S390_AIS:
66547a4693eSYi Min Zhao 		mutex_lock(&kvm->lock);
66647a4693eSYi Min Zhao 		if (kvm->created_vcpus) {
66747a4693eSYi Min Zhao 			r = -EBUSY;
66847a4693eSYi Min Zhao 		} else {
66947a4693eSYi Min Zhao 			set_kvm_facility(kvm->arch.model.fac_mask, 72);
67047a4693eSYi Min Zhao 			set_kvm_facility(kvm->arch.model.fac_list, 72);
67147a4693eSYi Min Zhao 			r = 0;
67247a4693eSYi Min Zhao 		}
67347a4693eSYi Min Zhao 		mutex_unlock(&kvm->lock);
67447a4693eSYi Min Zhao 		VM_EVENT(kvm, 3, "ENABLE: AIS %s",
67547a4693eSYi Min Zhao 			 r ? "(not available)" : "(success)");
67647a4693eSYi Min Zhao 		break;
6774e0b1ab7SFan Zhang 	case KVM_CAP_S390_GS:
6784e0b1ab7SFan Zhang 		r = -EINVAL;
6794e0b1ab7SFan Zhang 		mutex_lock(&kvm->lock);
680241e3ec0SChristian Borntraeger 		if (kvm->created_vcpus) {
6814e0b1ab7SFan Zhang 			r = -EBUSY;
6824e0b1ab7SFan Zhang 		} else if (test_facility(133)) {
6834e0b1ab7SFan Zhang 			set_kvm_facility(kvm->arch.model.fac_mask, 133);
6844e0b1ab7SFan Zhang 			set_kvm_facility(kvm->arch.model.fac_list, 133);
6854e0b1ab7SFan Zhang 			r = 0;
6864e0b1ab7SFan Zhang 		}
6874e0b1ab7SFan Zhang 		mutex_unlock(&kvm->lock);
6884e0b1ab7SFan Zhang 		VM_EVENT(kvm, 3, "ENABLE: CAP_S390_GS %s",
6894e0b1ab7SFan Zhang 			 r ? "(not available)" : "(success)");
6904e0b1ab7SFan Zhang 		break;
691a4499382SJanosch Frank 	case KVM_CAP_S390_HPAGE_1M:
692a4499382SJanosch Frank 		mutex_lock(&kvm->lock);
693a4499382SJanosch Frank 		if (kvm->created_vcpus)
694a4499382SJanosch Frank 			r = -EBUSY;
695a4499382SJanosch Frank 		else if (!hpage || kvm->arch.use_cmma)
696a4499382SJanosch Frank 			r = -EINVAL;
697a4499382SJanosch Frank 		else {
698a4499382SJanosch Frank 			r = 0;
699df88f318SJanosch Frank 			down_write(&kvm->mm->mmap_sem);
700a4499382SJanosch Frank 			kvm->mm->context.allow_gmap_hpage_1m = 1;
701df88f318SJanosch Frank 			up_write(&kvm->mm->mmap_sem);
702a4499382SJanosch Frank 			/*
703a4499382SJanosch Frank 			 * We might have to create fake 4k page
704a4499382SJanosch Frank 			 * tables. To avoid that the hardware works on
705a4499382SJanosch Frank 			 * stale PGSTEs, we emulate these instructions.
706a4499382SJanosch Frank 			 */
707a4499382SJanosch Frank 			kvm->arch.use_skf = 0;
708a4499382SJanosch Frank 			kvm->arch.use_pfmfi = 0;
709a4499382SJanosch Frank 		}
710a4499382SJanosch Frank 		mutex_unlock(&kvm->lock);
711a4499382SJanosch Frank 		VM_EVENT(kvm, 3, "ENABLE: CAP_S390_HPAGE %s",
712a4499382SJanosch Frank 			 r ? "(not available)" : "(success)");
713a4499382SJanosch Frank 		break;
714e44fc8c9SEkaterina Tumanova 	case KVM_CAP_S390_USER_STSI:
715c92ea7b9SChristian Borntraeger 		VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_USER_STSI");
716e44fc8c9SEkaterina Tumanova 		kvm->arch.user_stsi = 1;
717e44fc8c9SEkaterina Tumanova 		r = 0;
718e44fc8c9SEkaterina Tumanova 		break;
7196502a34cSDavid Hildenbrand 	case KVM_CAP_S390_USER_INSTR0:
7206502a34cSDavid Hildenbrand 		VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_USER_INSTR0");
7216502a34cSDavid Hildenbrand 		kvm->arch.user_instr0 = 1;
7226502a34cSDavid Hildenbrand 		icpt_operexc_on_all_vcpus(kvm);
7236502a34cSDavid Hildenbrand 		r = 0;
7246502a34cSDavid Hildenbrand 		break;
725d938dc55SCornelia Huck 	default:
726d938dc55SCornelia Huck 		r = -EINVAL;
727d938dc55SCornelia Huck 		break;
728d938dc55SCornelia Huck 	}
729d938dc55SCornelia Huck 	return r;
730d938dc55SCornelia Huck }
731d938dc55SCornelia Huck 
7328c0a7ce6SDominik Dingel static int kvm_s390_get_mem_control(struct kvm *kvm, struct kvm_device_attr *attr)
7338c0a7ce6SDominik Dingel {
7348c0a7ce6SDominik Dingel 	int ret;
7358c0a7ce6SDominik Dingel 
7368c0a7ce6SDominik Dingel 	switch (attr->attr) {
7378c0a7ce6SDominik Dingel 	case KVM_S390_VM_MEM_LIMIT_SIZE:
7388c0a7ce6SDominik Dingel 		ret = 0;
739c92ea7b9SChristian Borntraeger 		VM_EVENT(kvm, 3, "QUERY: max guest memory: %lu bytes",
740a3a92c31SDominik Dingel 			 kvm->arch.mem_limit);
741a3a92c31SDominik Dingel 		if (put_user(kvm->arch.mem_limit, (u64 __user *)attr->addr))
7428c0a7ce6SDominik Dingel 			ret = -EFAULT;
7438c0a7ce6SDominik Dingel 		break;
7448c0a7ce6SDominik Dingel 	default:
7458c0a7ce6SDominik Dingel 		ret = -ENXIO;
7468c0a7ce6SDominik Dingel 		break;
7478c0a7ce6SDominik Dingel 	}
7488c0a7ce6SDominik Dingel 	return ret;
7498c0a7ce6SDominik Dingel }
7508c0a7ce6SDominik Dingel 
7518c0a7ce6SDominik Dingel static int kvm_s390_set_mem_control(struct kvm *kvm, struct kvm_device_attr *attr)
7524f718eabSDominik Dingel {
7534f718eabSDominik Dingel 	int ret;
7544f718eabSDominik Dingel 	unsigned int idx;
7554f718eabSDominik Dingel 	switch (attr->attr) {
7564f718eabSDominik Dingel 	case KVM_S390_VM_MEM_ENABLE_CMMA:
757f9cbd9b0SDavid Hildenbrand 		ret = -ENXIO;
758c24cc9c8SDavid Hildenbrand 		if (!sclp.has_cmma)
759e6db1d61SDominik Dingel 			break;
760e6db1d61SDominik Dingel 
761c92ea7b9SChristian Borntraeger 		VM_EVENT(kvm, 3, "%s", "ENABLE: CMMA support");
7624f718eabSDominik Dingel 		mutex_lock(&kvm->lock);
763a4499382SJanosch Frank 		if (kvm->created_vcpus)
764a4499382SJanosch Frank 			ret = -EBUSY;
765a4499382SJanosch Frank 		else if (kvm->mm->context.allow_gmap_hpage_1m)
766a4499382SJanosch Frank 			ret = -EINVAL;
767a4499382SJanosch Frank 		else {
7684f718eabSDominik Dingel 			kvm->arch.use_cmma = 1;
769c9f0a2b8SJanosch Frank 			/* Not compatible with cmma. */
770c9f0a2b8SJanosch Frank 			kvm->arch.use_pfmfi = 0;
7714f718eabSDominik Dingel 			ret = 0;
7724f718eabSDominik Dingel 		}
7734f718eabSDominik Dingel 		mutex_unlock(&kvm->lock);
7744f718eabSDominik Dingel 		break;
7754f718eabSDominik Dingel 	case KVM_S390_VM_MEM_CLR_CMMA:
776f9cbd9b0SDavid Hildenbrand 		ret = -ENXIO;
777f9cbd9b0SDavid Hildenbrand 		if (!sclp.has_cmma)
778f9cbd9b0SDavid Hildenbrand 			break;
779c3489155SDominik Dingel 		ret = -EINVAL;
780c3489155SDominik Dingel 		if (!kvm->arch.use_cmma)
781c3489155SDominik Dingel 			break;
782c3489155SDominik Dingel 
783c92ea7b9SChristian Borntraeger 		VM_EVENT(kvm, 3, "%s", "RESET: CMMA states");
7844f718eabSDominik Dingel 		mutex_lock(&kvm->lock);
7854f718eabSDominik Dingel 		idx = srcu_read_lock(&kvm->srcu);
786a13cff31SDominik Dingel 		s390_reset_cmma(kvm->arch.gmap->mm);
7874f718eabSDominik Dingel 		srcu_read_unlock(&kvm->srcu, idx);
7884f718eabSDominik Dingel 		mutex_unlock(&kvm->lock);
7894f718eabSDominik Dingel 		ret = 0;
7904f718eabSDominik Dingel 		break;
7918c0a7ce6SDominik Dingel 	case KVM_S390_VM_MEM_LIMIT_SIZE: {
7928c0a7ce6SDominik Dingel 		unsigned long new_limit;
7938c0a7ce6SDominik Dingel 
7948c0a7ce6SDominik Dingel 		if (kvm_is_ucontrol(kvm))
7958c0a7ce6SDominik Dingel 			return -EINVAL;
7968c0a7ce6SDominik Dingel 
7978c0a7ce6SDominik Dingel 		if (get_user(new_limit, (u64 __user *)attr->addr))
7988c0a7ce6SDominik Dingel 			return -EFAULT;
7998c0a7ce6SDominik Dingel 
800a3a92c31SDominik Dingel 		if (kvm->arch.mem_limit != KVM_S390_NO_MEM_LIMIT &&
801a3a92c31SDominik Dingel 		    new_limit > kvm->arch.mem_limit)
8028c0a7ce6SDominik Dingel 			return -E2BIG;
8038c0a7ce6SDominik Dingel 
804a3a92c31SDominik Dingel 		if (!new_limit)
805a3a92c31SDominik Dingel 			return -EINVAL;
806a3a92c31SDominik Dingel 
8076ea427bbSMartin Schwidefsky 		/* gmap_create takes last usable address */
808a3a92c31SDominik Dingel 		if (new_limit != KVM_S390_NO_MEM_LIMIT)
809a3a92c31SDominik Dingel 			new_limit -= 1;
810a3a92c31SDominik Dingel 
8118c0a7ce6SDominik Dingel 		ret = -EBUSY;
8128c0a7ce6SDominik Dingel 		mutex_lock(&kvm->lock);
813a03825bbSPaolo Bonzini 		if (!kvm->created_vcpus) {
8146ea427bbSMartin Schwidefsky 			/* gmap_create will round the limit up */
8156ea427bbSMartin Schwidefsky 			struct gmap *new = gmap_create(current->mm, new_limit);
8168c0a7ce6SDominik Dingel 
8178c0a7ce6SDominik Dingel 			if (!new) {
8188c0a7ce6SDominik Dingel 				ret = -ENOMEM;
8198c0a7ce6SDominik Dingel 			} else {
8206ea427bbSMartin Schwidefsky 				gmap_remove(kvm->arch.gmap);
8218c0a7ce6SDominik Dingel 				new->private = kvm;
8228c0a7ce6SDominik Dingel 				kvm->arch.gmap = new;
8238c0a7ce6SDominik Dingel 				ret = 0;
8248c0a7ce6SDominik Dingel 			}
8258c0a7ce6SDominik Dingel 		}
8268c0a7ce6SDominik Dingel 		mutex_unlock(&kvm->lock);
827a3a92c31SDominik Dingel 		VM_EVENT(kvm, 3, "SET: max guest address: %lu", new_limit);
828a3a92c31SDominik Dingel 		VM_EVENT(kvm, 3, "New guest asce: 0x%pK",
829a3a92c31SDominik Dingel 			 (void *) kvm->arch.gmap->asce);
8308c0a7ce6SDominik Dingel 		break;
8318c0a7ce6SDominik Dingel 	}
8324f718eabSDominik Dingel 	default:
8334f718eabSDominik Dingel 		ret = -ENXIO;
8344f718eabSDominik Dingel 		break;
8354f718eabSDominik Dingel 	}
8364f718eabSDominik Dingel 	return ret;
8374f718eabSDominik Dingel }
8384f718eabSDominik Dingel 
839a374e892STony Krowiak static void kvm_s390_vcpu_crypto_setup(struct kvm_vcpu *vcpu);
840a374e892STony Krowiak 
84120c922f0STony Krowiak void kvm_s390_vcpu_crypto_reset_all(struct kvm *kvm)
842a374e892STony Krowiak {
843a374e892STony Krowiak 	struct kvm_vcpu *vcpu;
844a374e892STony Krowiak 	int i;
845a374e892STony Krowiak 
84620c922f0STony Krowiak 	kvm_s390_vcpu_block_all(kvm);
84720c922f0STony Krowiak 
8483194cdb7SDavid Hildenbrand 	kvm_for_each_vcpu(i, vcpu, kvm) {
84920c922f0STony Krowiak 		kvm_s390_vcpu_crypto_setup(vcpu);
8503194cdb7SDavid Hildenbrand 		/* recreate the shadow crycb by leaving the VSIE handler */
8513194cdb7SDavid Hildenbrand 		kvm_s390_sync_request(KVM_REQ_VSIE_RESTART, vcpu);
8523194cdb7SDavid Hildenbrand 	}
85320c922f0STony Krowiak 
85420c922f0STony Krowiak 	kvm_s390_vcpu_unblock_all(kvm);
85520c922f0STony Krowiak }
85620c922f0STony Krowiak 
85720c922f0STony Krowiak static int kvm_s390_vm_set_crypto(struct kvm *kvm, struct kvm_device_attr *attr)
85820c922f0STony Krowiak {
859a374e892STony Krowiak 	mutex_lock(&kvm->lock);
860a374e892STony Krowiak 	switch (attr->attr) {
861a374e892STony Krowiak 	case KVM_S390_VM_CRYPTO_ENABLE_AES_KW:
862*37940fb0STony Krowiak 		if (!test_kvm_facility(kvm, 76))
863*37940fb0STony Krowiak 			return -EINVAL;
864a374e892STony Krowiak 		get_random_bytes(
865a374e892STony Krowiak 			kvm->arch.crypto.crycb->aes_wrapping_key_mask,
866a374e892STony Krowiak 			sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask));
867a374e892STony Krowiak 		kvm->arch.crypto.aes_kw = 1;
868c92ea7b9SChristian Borntraeger 		VM_EVENT(kvm, 3, "%s", "ENABLE: AES keywrapping support");
869a374e892STony Krowiak 		break;
870a374e892STony Krowiak 	case KVM_S390_VM_CRYPTO_ENABLE_DEA_KW:
871*37940fb0STony Krowiak 		if (!test_kvm_facility(kvm, 76))
872*37940fb0STony Krowiak 			return -EINVAL;
873a374e892STony Krowiak 		get_random_bytes(
874a374e892STony Krowiak 			kvm->arch.crypto.crycb->dea_wrapping_key_mask,
875a374e892STony Krowiak 			sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask));
876a374e892STony Krowiak 		kvm->arch.crypto.dea_kw = 1;
877c92ea7b9SChristian Borntraeger 		VM_EVENT(kvm, 3, "%s", "ENABLE: DEA keywrapping support");
878a374e892STony Krowiak 		break;
879a374e892STony Krowiak 	case KVM_S390_VM_CRYPTO_DISABLE_AES_KW:
880*37940fb0STony Krowiak 		if (!test_kvm_facility(kvm, 76))
881*37940fb0STony Krowiak 			return -EINVAL;
882a374e892STony Krowiak 		kvm->arch.crypto.aes_kw = 0;
883a374e892STony Krowiak 		memset(kvm->arch.crypto.crycb->aes_wrapping_key_mask, 0,
884a374e892STony Krowiak 			sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask));
885c92ea7b9SChristian Borntraeger 		VM_EVENT(kvm, 3, "%s", "DISABLE: AES keywrapping support");
886a374e892STony Krowiak 		break;
887a374e892STony Krowiak 	case KVM_S390_VM_CRYPTO_DISABLE_DEA_KW:
888*37940fb0STony Krowiak 		if (!test_kvm_facility(kvm, 76))
889*37940fb0STony Krowiak 			return -EINVAL;
890a374e892STony Krowiak 		kvm->arch.crypto.dea_kw = 0;
891a374e892STony Krowiak 		memset(kvm->arch.crypto.crycb->dea_wrapping_key_mask, 0,
892a374e892STony Krowiak 			sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask));
893c92ea7b9SChristian Borntraeger 		VM_EVENT(kvm, 3, "%s", "DISABLE: DEA keywrapping support");
894a374e892STony Krowiak 		break;
895*37940fb0STony Krowiak 	case KVM_S390_VM_CRYPTO_ENABLE_APIE:
896*37940fb0STony Krowiak 		if (!ap_instructions_available()) {
897*37940fb0STony Krowiak 			mutex_unlock(&kvm->lock);
898*37940fb0STony Krowiak 			return -EOPNOTSUPP;
899*37940fb0STony Krowiak 		}
900*37940fb0STony Krowiak 		kvm->arch.crypto.apie = 1;
901*37940fb0STony Krowiak 		break;
902*37940fb0STony Krowiak 	case KVM_S390_VM_CRYPTO_DISABLE_APIE:
903*37940fb0STony Krowiak 		if (!ap_instructions_available()) {
904*37940fb0STony Krowiak 			mutex_unlock(&kvm->lock);
905*37940fb0STony Krowiak 			return -EOPNOTSUPP;
906*37940fb0STony Krowiak 		}
907*37940fb0STony Krowiak 		kvm->arch.crypto.apie = 0;
908*37940fb0STony Krowiak 		break;
909a374e892STony Krowiak 	default:
910a374e892STony Krowiak 		mutex_unlock(&kvm->lock);
911a374e892STony Krowiak 		return -ENXIO;
912a374e892STony Krowiak 	}
913a374e892STony Krowiak 
91420c922f0STony Krowiak 	kvm_s390_vcpu_crypto_reset_all(kvm);
915a374e892STony Krowiak 	mutex_unlock(&kvm->lock);
916a374e892STony Krowiak 	return 0;
917a374e892STony Krowiak }
918a374e892STony Krowiak 
919190df4a2SClaudio Imbrenda static void kvm_s390_sync_request_broadcast(struct kvm *kvm, int req)
920190df4a2SClaudio Imbrenda {
921190df4a2SClaudio Imbrenda 	int cx;
922190df4a2SClaudio Imbrenda 	struct kvm_vcpu *vcpu;
923190df4a2SClaudio Imbrenda 
924190df4a2SClaudio Imbrenda 	kvm_for_each_vcpu(cx, vcpu, kvm)
925190df4a2SClaudio Imbrenda 		kvm_s390_sync_request(req, vcpu);
926190df4a2SClaudio Imbrenda }
927190df4a2SClaudio Imbrenda 
928190df4a2SClaudio Imbrenda /*
929190df4a2SClaudio Imbrenda  * Must be called with kvm->srcu held to avoid races on memslots, and with
9301de1ea7eSChristian Borntraeger  * kvm->slots_lock to avoid races with ourselves and kvm_s390_vm_stop_migration.
931190df4a2SClaudio Imbrenda  */
932190df4a2SClaudio Imbrenda static int kvm_s390_vm_start_migration(struct kvm *kvm)
933190df4a2SClaudio Imbrenda {
934190df4a2SClaudio Imbrenda 	struct kvm_memory_slot *ms;
935190df4a2SClaudio Imbrenda 	struct kvm_memslots *slots;
936afdad616SClaudio Imbrenda 	unsigned long ram_pages = 0;
937190df4a2SClaudio Imbrenda 	int slotnr;
938190df4a2SClaudio Imbrenda 
939190df4a2SClaudio Imbrenda 	/* migration mode already enabled */
940afdad616SClaudio Imbrenda 	if (kvm->arch.migration_mode)
941190df4a2SClaudio Imbrenda 		return 0;
942190df4a2SClaudio Imbrenda 	slots = kvm_memslots(kvm);
943190df4a2SClaudio Imbrenda 	if (!slots || !slots->used_slots)
944190df4a2SClaudio Imbrenda 		return -EINVAL;
945190df4a2SClaudio Imbrenda 
946afdad616SClaudio Imbrenda 	if (!kvm->arch.use_cmma) {
947afdad616SClaudio Imbrenda 		kvm->arch.migration_mode = 1;
948afdad616SClaudio Imbrenda 		return 0;
949190df4a2SClaudio Imbrenda 	}
950190df4a2SClaudio Imbrenda 	/* mark all the pages in active slots as dirty */
951190df4a2SClaudio Imbrenda 	for (slotnr = 0; slotnr < slots->used_slots; slotnr++) {
952190df4a2SClaudio Imbrenda 		ms = slots->memslots + slotnr;
953afdad616SClaudio Imbrenda 		/*
954afdad616SClaudio Imbrenda 		 * The second half of the bitmap is only used on x86,
955afdad616SClaudio Imbrenda 		 * and would be wasted otherwise, so we put it to good
956afdad616SClaudio Imbrenda 		 * use here to keep track of the state of the storage
957afdad616SClaudio Imbrenda 		 * attributes.
958afdad616SClaudio Imbrenda 		 */
959afdad616SClaudio Imbrenda 		memset(kvm_second_dirty_bitmap(ms), 0xff, kvm_dirty_bitmap_bytes(ms));
960afdad616SClaudio Imbrenda 		ram_pages += ms->npages;
961190df4a2SClaudio Imbrenda 	}
962afdad616SClaudio Imbrenda 	atomic64_set(&kvm->arch.cmma_dirty_pages, ram_pages);
963afdad616SClaudio Imbrenda 	kvm->arch.migration_mode = 1;
964190df4a2SClaudio Imbrenda 	kvm_s390_sync_request_broadcast(kvm, KVM_REQ_START_MIGRATION);
965190df4a2SClaudio Imbrenda 	return 0;
966190df4a2SClaudio Imbrenda }
967190df4a2SClaudio Imbrenda 
968190df4a2SClaudio Imbrenda /*
9691de1ea7eSChristian Borntraeger  * Must be called with kvm->slots_lock to avoid races with ourselves and
970190df4a2SClaudio Imbrenda  * kvm_s390_vm_start_migration.
971190df4a2SClaudio Imbrenda  */
972190df4a2SClaudio Imbrenda static int kvm_s390_vm_stop_migration(struct kvm *kvm)
973190df4a2SClaudio Imbrenda {
974190df4a2SClaudio Imbrenda 	/* migration mode already disabled */
975afdad616SClaudio Imbrenda 	if (!kvm->arch.migration_mode)
976190df4a2SClaudio Imbrenda 		return 0;
977afdad616SClaudio Imbrenda 	kvm->arch.migration_mode = 0;
978afdad616SClaudio Imbrenda 	if (kvm->arch.use_cmma)
979190df4a2SClaudio Imbrenda 		kvm_s390_sync_request_broadcast(kvm, KVM_REQ_STOP_MIGRATION);
980190df4a2SClaudio Imbrenda 	return 0;
981190df4a2SClaudio Imbrenda }
982190df4a2SClaudio Imbrenda 
983190df4a2SClaudio Imbrenda static int kvm_s390_vm_set_migration(struct kvm *kvm,
984190df4a2SClaudio Imbrenda 				     struct kvm_device_attr *attr)
985190df4a2SClaudio Imbrenda {
9861de1ea7eSChristian Borntraeger 	int res = -ENXIO;
987190df4a2SClaudio Imbrenda 
9881de1ea7eSChristian Borntraeger 	mutex_lock(&kvm->slots_lock);
989190df4a2SClaudio Imbrenda 	switch (attr->attr) {
990190df4a2SClaudio Imbrenda 	case KVM_S390_VM_MIGRATION_START:
991190df4a2SClaudio Imbrenda 		res = kvm_s390_vm_start_migration(kvm);
992190df4a2SClaudio Imbrenda 		break;
993190df4a2SClaudio Imbrenda 	case KVM_S390_VM_MIGRATION_STOP:
994190df4a2SClaudio Imbrenda 		res = kvm_s390_vm_stop_migration(kvm);
995190df4a2SClaudio Imbrenda 		break;
996190df4a2SClaudio Imbrenda 	default:
997190df4a2SClaudio Imbrenda 		break;
998190df4a2SClaudio Imbrenda 	}
9991de1ea7eSChristian Borntraeger 	mutex_unlock(&kvm->slots_lock);
1000190df4a2SClaudio Imbrenda 
1001190df4a2SClaudio Imbrenda 	return res;
1002190df4a2SClaudio Imbrenda }
1003190df4a2SClaudio Imbrenda 
1004190df4a2SClaudio Imbrenda static int kvm_s390_vm_get_migration(struct kvm *kvm,
1005190df4a2SClaudio Imbrenda 				     struct kvm_device_attr *attr)
1006190df4a2SClaudio Imbrenda {
1007afdad616SClaudio Imbrenda 	u64 mig = kvm->arch.migration_mode;
1008190df4a2SClaudio Imbrenda 
1009190df4a2SClaudio Imbrenda 	if (attr->attr != KVM_S390_VM_MIGRATION_STATUS)
1010190df4a2SClaudio Imbrenda 		return -ENXIO;
1011190df4a2SClaudio Imbrenda 
1012190df4a2SClaudio Imbrenda 	if (copy_to_user((void __user *)attr->addr, &mig, sizeof(mig)))
1013190df4a2SClaudio Imbrenda 		return -EFAULT;
1014190df4a2SClaudio Imbrenda 	return 0;
1015190df4a2SClaudio Imbrenda }
1016190df4a2SClaudio Imbrenda 
10178fa1696eSCollin L. Walling static int kvm_s390_set_tod_ext(struct kvm *kvm, struct kvm_device_attr *attr)
10188fa1696eSCollin L. Walling {
10198fa1696eSCollin L. Walling 	struct kvm_s390_vm_tod_clock gtod;
10208fa1696eSCollin L. Walling 
10218fa1696eSCollin L. Walling 	if (copy_from_user(&gtod, (void __user *)attr->addr, sizeof(gtod)))
10228fa1696eSCollin L. Walling 		return -EFAULT;
10238fa1696eSCollin L. Walling 
10240e7def5fSDavid Hildenbrand 	if (!test_kvm_facility(kvm, 139) && gtod.epoch_idx)
10258fa1696eSCollin L. Walling 		return -EINVAL;
10260e7def5fSDavid Hildenbrand 	kvm_s390_set_tod_clock(kvm, &gtod);
10278fa1696eSCollin L. Walling 
10288fa1696eSCollin L. Walling 	VM_EVENT(kvm, 3, "SET: TOD extension: 0x%x, TOD base: 0x%llx",
10298fa1696eSCollin L. Walling 		gtod.epoch_idx, gtod.tod);
10308fa1696eSCollin L. Walling 
10318fa1696eSCollin L. Walling 	return 0;
10328fa1696eSCollin L. Walling }
10338fa1696eSCollin L. Walling 
103472f25020SJason J. Herne static int kvm_s390_set_tod_high(struct kvm *kvm, struct kvm_device_attr *attr)
103572f25020SJason J. Herne {
103672f25020SJason J. Herne 	u8 gtod_high;
103772f25020SJason J. Herne 
103872f25020SJason J. Herne 	if (copy_from_user(&gtod_high, (void __user *)attr->addr,
103972f25020SJason J. Herne 					   sizeof(gtod_high)))
104072f25020SJason J. Herne 		return -EFAULT;
104172f25020SJason J. Herne 
104272f25020SJason J. Herne 	if (gtod_high != 0)
104372f25020SJason J. Herne 		return -EINVAL;
104458c383c6SChristian Borntraeger 	VM_EVENT(kvm, 3, "SET: TOD extension: 0x%x", gtod_high);
104572f25020SJason J. Herne 
104672f25020SJason J. Herne 	return 0;
104772f25020SJason J. Herne }
104872f25020SJason J. Herne 
104972f25020SJason J. Herne static int kvm_s390_set_tod_low(struct kvm *kvm, struct kvm_device_attr *attr)
105072f25020SJason J. Herne {
10510e7def5fSDavid Hildenbrand 	struct kvm_s390_vm_tod_clock gtod = { 0 };
105272f25020SJason J. Herne 
10530e7def5fSDavid Hildenbrand 	if (copy_from_user(&gtod.tod, (void __user *)attr->addr,
10540e7def5fSDavid Hildenbrand 			   sizeof(gtod.tod)))
105572f25020SJason J. Herne 		return -EFAULT;
105672f25020SJason J. Herne 
10570e7def5fSDavid Hildenbrand 	kvm_s390_set_tod_clock(kvm, &gtod);
10580e7def5fSDavid Hildenbrand 	VM_EVENT(kvm, 3, "SET: TOD base: 0x%llx", gtod.tod);
105972f25020SJason J. Herne 	return 0;
106072f25020SJason J. Herne }
106172f25020SJason J. Herne 
106272f25020SJason J. Herne static int kvm_s390_set_tod(struct kvm *kvm, struct kvm_device_attr *attr)
106372f25020SJason J. Herne {
106472f25020SJason J. Herne 	int ret;
106572f25020SJason J. Herne 
106672f25020SJason J. Herne 	if (attr->flags)
106772f25020SJason J. Herne 		return -EINVAL;
106872f25020SJason J. Herne 
106972f25020SJason J. Herne 	switch (attr->attr) {
10708fa1696eSCollin L. Walling 	case KVM_S390_VM_TOD_EXT:
10718fa1696eSCollin L. Walling 		ret = kvm_s390_set_tod_ext(kvm, attr);
10728fa1696eSCollin L. Walling 		break;
107372f25020SJason J. Herne 	case KVM_S390_VM_TOD_HIGH:
107472f25020SJason J. Herne 		ret = kvm_s390_set_tod_high(kvm, attr);
107572f25020SJason J. Herne 		break;
107672f25020SJason J. Herne 	case KVM_S390_VM_TOD_LOW:
107772f25020SJason J. Herne 		ret = kvm_s390_set_tod_low(kvm, attr);
107872f25020SJason J. Herne 		break;
107972f25020SJason J. Herne 	default:
108072f25020SJason J. Herne 		ret = -ENXIO;
108172f25020SJason J. Herne 		break;
108272f25020SJason J. Herne 	}
108372f25020SJason J. Herne 	return ret;
108472f25020SJason J. Herne }
108572f25020SJason J. Herne 
108633d1b272SDavid Hildenbrand static void kvm_s390_get_tod_clock(struct kvm *kvm,
10878fa1696eSCollin L. Walling 				   struct kvm_s390_vm_tod_clock *gtod)
10888fa1696eSCollin L. Walling {
10898fa1696eSCollin L. Walling 	struct kvm_s390_tod_clock_ext htod;
10908fa1696eSCollin L. Walling 
10918fa1696eSCollin L. Walling 	preempt_disable();
10928fa1696eSCollin L. Walling 
10938fa1696eSCollin L. Walling 	get_tod_clock_ext((char *)&htod);
10948fa1696eSCollin L. Walling 
10958fa1696eSCollin L. Walling 	gtod->tod = htod.tod + kvm->arch.epoch;
109633d1b272SDavid Hildenbrand 	gtod->epoch_idx = 0;
109733d1b272SDavid Hildenbrand 	if (test_kvm_facility(kvm, 139)) {
10988fa1696eSCollin L. Walling 		gtod->epoch_idx = htod.epoch_idx + kvm->arch.epdx;
10998fa1696eSCollin L. Walling 		if (gtod->tod < htod.tod)
11008fa1696eSCollin L. Walling 			gtod->epoch_idx += 1;
110133d1b272SDavid Hildenbrand 	}
11028fa1696eSCollin L. Walling 
11038fa1696eSCollin L. Walling 	preempt_enable();
11048fa1696eSCollin L. Walling }
11058fa1696eSCollin L. Walling 
11068fa1696eSCollin L. Walling static int kvm_s390_get_tod_ext(struct kvm *kvm, struct kvm_device_attr *attr)
11078fa1696eSCollin L. Walling {
11088fa1696eSCollin L. Walling 	struct kvm_s390_vm_tod_clock gtod;
11098fa1696eSCollin L. Walling 
11108fa1696eSCollin L. Walling 	memset(&gtod, 0, sizeof(gtod));
111133d1b272SDavid Hildenbrand 	kvm_s390_get_tod_clock(kvm, &gtod);
11128fa1696eSCollin L. Walling 	if (copy_to_user((void __user *)attr->addr, &gtod, sizeof(gtod)))
11138fa1696eSCollin L. Walling 		return -EFAULT;
11148fa1696eSCollin L. Walling 
11158fa1696eSCollin L. Walling 	VM_EVENT(kvm, 3, "QUERY: TOD extension: 0x%x, TOD base: 0x%llx",
11168fa1696eSCollin L. Walling 		gtod.epoch_idx, gtod.tod);
11178fa1696eSCollin L. Walling 	return 0;
11188fa1696eSCollin L. Walling }
11198fa1696eSCollin L. Walling 
112072f25020SJason J. Herne static int kvm_s390_get_tod_high(struct kvm *kvm, struct kvm_device_attr *attr)
112172f25020SJason J. Herne {
112272f25020SJason J. Herne 	u8 gtod_high = 0;
112372f25020SJason J. Herne 
112472f25020SJason J. Herne 	if (copy_to_user((void __user *)attr->addr, &gtod_high,
112572f25020SJason J. Herne 					 sizeof(gtod_high)))
112672f25020SJason J. Herne 		return -EFAULT;
112758c383c6SChristian Borntraeger 	VM_EVENT(kvm, 3, "QUERY: TOD extension: 0x%x", gtod_high);
112872f25020SJason J. Herne 
112972f25020SJason J. Herne 	return 0;
113072f25020SJason J. Herne }
113172f25020SJason J. Herne 
113272f25020SJason J. Herne static int kvm_s390_get_tod_low(struct kvm *kvm, struct kvm_device_attr *attr)
113372f25020SJason J. Herne {
11345a3d883aSDavid Hildenbrand 	u64 gtod;
113572f25020SJason J. Herne 
113660417fccSDavid Hildenbrand 	gtod = kvm_s390_get_tod_clock_fast(kvm);
113772f25020SJason J. Herne 	if (copy_to_user((void __user *)attr->addr, &gtod, sizeof(gtod)))
113872f25020SJason J. Herne 		return -EFAULT;
113958c383c6SChristian Borntraeger 	VM_EVENT(kvm, 3, "QUERY: TOD base: 0x%llx", gtod);
114072f25020SJason J. Herne 
114172f25020SJason J. Herne 	return 0;
114272f25020SJason J. Herne }
114372f25020SJason J. Herne 
114472f25020SJason J. Herne static int kvm_s390_get_tod(struct kvm *kvm, struct kvm_device_attr *attr)
114572f25020SJason J. Herne {
114672f25020SJason J. Herne 	int ret;
114772f25020SJason J. Herne 
114872f25020SJason J. Herne 	if (attr->flags)
114972f25020SJason J. Herne 		return -EINVAL;
115072f25020SJason J. Herne 
115172f25020SJason J. Herne 	switch (attr->attr) {
11528fa1696eSCollin L. Walling 	case KVM_S390_VM_TOD_EXT:
11538fa1696eSCollin L. Walling 		ret = kvm_s390_get_tod_ext(kvm, attr);
11548fa1696eSCollin L. Walling 		break;
115572f25020SJason J. Herne 	case KVM_S390_VM_TOD_HIGH:
115672f25020SJason J. Herne 		ret = kvm_s390_get_tod_high(kvm, attr);
115772f25020SJason J. Herne 		break;
115872f25020SJason J. Herne 	case KVM_S390_VM_TOD_LOW:
115972f25020SJason J. Herne 		ret = kvm_s390_get_tod_low(kvm, attr);
116072f25020SJason J. Herne 		break;
116172f25020SJason J. Herne 	default:
116272f25020SJason J. Herne 		ret = -ENXIO;
116372f25020SJason J. Herne 		break;
116472f25020SJason J. Herne 	}
116572f25020SJason J. Herne 	return ret;
116672f25020SJason J. Herne }
116772f25020SJason J. Herne 
1168658b6edaSMichael Mueller static int kvm_s390_set_processor(struct kvm *kvm, struct kvm_device_attr *attr)
1169658b6edaSMichael Mueller {
1170658b6edaSMichael Mueller 	struct kvm_s390_vm_cpu_processor *proc;
1171053dd230SDavid Hildenbrand 	u16 lowest_ibc, unblocked_ibc;
1172658b6edaSMichael Mueller 	int ret = 0;
1173658b6edaSMichael Mueller 
1174658b6edaSMichael Mueller 	mutex_lock(&kvm->lock);
1175a03825bbSPaolo Bonzini 	if (kvm->created_vcpus) {
1176658b6edaSMichael Mueller 		ret = -EBUSY;
1177658b6edaSMichael Mueller 		goto out;
1178658b6edaSMichael Mueller 	}
1179658b6edaSMichael Mueller 	proc = kzalloc(sizeof(*proc), GFP_KERNEL);
1180658b6edaSMichael Mueller 	if (!proc) {
1181658b6edaSMichael Mueller 		ret = -ENOMEM;
1182658b6edaSMichael Mueller 		goto out;
1183658b6edaSMichael Mueller 	}
1184658b6edaSMichael Mueller 	if (!copy_from_user(proc, (void __user *)attr->addr,
1185658b6edaSMichael Mueller 			    sizeof(*proc))) {
11869bb0ec09SDavid Hildenbrand 		kvm->arch.model.cpuid = proc->cpuid;
1187053dd230SDavid Hildenbrand 		lowest_ibc = sclp.ibc >> 16 & 0xfff;
1188053dd230SDavid Hildenbrand 		unblocked_ibc = sclp.ibc & 0xfff;
11890487c44dSDavid Hildenbrand 		if (lowest_ibc && proc->ibc) {
1190053dd230SDavid Hildenbrand 			if (proc->ibc > unblocked_ibc)
1191053dd230SDavid Hildenbrand 				kvm->arch.model.ibc = unblocked_ibc;
1192053dd230SDavid Hildenbrand 			else if (proc->ibc < lowest_ibc)
1193053dd230SDavid Hildenbrand 				kvm->arch.model.ibc = lowest_ibc;
1194053dd230SDavid Hildenbrand 			else
1195658b6edaSMichael Mueller 				kvm->arch.model.ibc = proc->ibc;
1196053dd230SDavid Hildenbrand 		}
1197c54f0d6aSDavid Hildenbrand 		memcpy(kvm->arch.model.fac_list, proc->fac_list,
1198658b6edaSMichael Mueller 		       S390_ARCH_FAC_LIST_SIZE_BYTE);
1199a8c39dd7SChristian Borntraeger 		VM_EVENT(kvm, 3, "SET: guest ibc: 0x%4.4x, guest cpuid: 0x%16.16llx",
1200a8c39dd7SChristian Borntraeger 			 kvm->arch.model.ibc,
1201a8c39dd7SChristian Borntraeger 			 kvm->arch.model.cpuid);
1202a8c39dd7SChristian Borntraeger 		VM_EVENT(kvm, 3, "SET: guest faclist: 0x%16.16llx.%16.16llx.%16.16llx",
1203a8c39dd7SChristian Borntraeger 			 kvm->arch.model.fac_list[0],
1204a8c39dd7SChristian Borntraeger 			 kvm->arch.model.fac_list[1],
1205a8c39dd7SChristian Borntraeger 			 kvm->arch.model.fac_list[2]);
1206658b6edaSMichael Mueller 	} else
1207658b6edaSMichael Mueller 		ret = -EFAULT;
1208658b6edaSMichael Mueller 	kfree(proc);
1209658b6edaSMichael Mueller out:
1210658b6edaSMichael Mueller 	mutex_unlock(&kvm->lock);
1211658b6edaSMichael Mueller 	return ret;
1212658b6edaSMichael Mueller }
1213658b6edaSMichael Mueller 
121415c9705fSDavid Hildenbrand static int kvm_s390_set_processor_feat(struct kvm *kvm,
121515c9705fSDavid Hildenbrand 				       struct kvm_device_attr *attr)
121615c9705fSDavid Hildenbrand {
121715c9705fSDavid Hildenbrand 	struct kvm_s390_vm_cpu_feat data;
121815c9705fSDavid Hildenbrand 
121915c9705fSDavid Hildenbrand 	if (copy_from_user(&data, (void __user *)attr->addr, sizeof(data)))
122015c9705fSDavid Hildenbrand 		return -EFAULT;
122115c9705fSDavid Hildenbrand 	if (!bitmap_subset((unsigned long *) data.feat,
122215c9705fSDavid Hildenbrand 			   kvm_s390_available_cpu_feat,
122315c9705fSDavid Hildenbrand 			   KVM_S390_VM_CPU_FEAT_NR_BITS))
122415c9705fSDavid Hildenbrand 		return -EINVAL;
122515c9705fSDavid Hildenbrand 
122615c9705fSDavid Hildenbrand 	mutex_lock(&kvm->lock);
12272f8311c9SChristian Borntraeger 	if (kvm->created_vcpus) {
12282f8311c9SChristian Borntraeger 		mutex_unlock(&kvm->lock);
12292f8311c9SChristian Borntraeger 		return -EBUSY;
12302f8311c9SChristian Borntraeger 	}
123115c9705fSDavid Hildenbrand 	bitmap_copy(kvm->arch.cpu_feat, (unsigned long *) data.feat,
123215c9705fSDavid Hildenbrand 		    KVM_S390_VM_CPU_FEAT_NR_BITS);
123315c9705fSDavid Hildenbrand 	mutex_unlock(&kvm->lock);
12342f8311c9SChristian Borntraeger 	VM_EVENT(kvm, 3, "SET: guest feat: 0x%16.16llx.0x%16.16llx.0x%16.16llx",
12352f8311c9SChristian Borntraeger 			 data.feat[0],
12362f8311c9SChristian Borntraeger 			 data.feat[1],
12372f8311c9SChristian Borntraeger 			 data.feat[2]);
12382f8311c9SChristian Borntraeger 	return 0;
123915c9705fSDavid Hildenbrand }
124015c9705fSDavid Hildenbrand 
12410a763c78SDavid Hildenbrand static int kvm_s390_set_processor_subfunc(struct kvm *kvm,
12420a763c78SDavid Hildenbrand 					  struct kvm_device_attr *attr)
12430a763c78SDavid Hildenbrand {
12440a763c78SDavid Hildenbrand 	/*
12450a763c78SDavid Hildenbrand 	 * Once supported by kernel + hw, we have to store the subfunctions
12460a763c78SDavid Hildenbrand 	 * in kvm->arch and remember that user space configured them.
12470a763c78SDavid Hildenbrand 	 */
12480a763c78SDavid Hildenbrand 	return -ENXIO;
12490a763c78SDavid Hildenbrand }
12500a763c78SDavid Hildenbrand 
1251658b6edaSMichael Mueller static int kvm_s390_set_cpu_model(struct kvm *kvm, struct kvm_device_attr *attr)
1252658b6edaSMichael Mueller {
1253658b6edaSMichael Mueller 	int ret = -ENXIO;
1254658b6edaSMichael Mueller 
1255658b6edaSMichael Mueller 	switch (attr->attr) {
1256658b6edaSMichael Mueller 	case KVM_S390_VM_CPU_PROCESSOR:
1257658b6edaSMichael Mueller 		ret = kvm_s390_set_processor(kvm, attr);
1258658b6edaSMichael Mueller 		break;
125915c9705fSDavid Hildenbrand 	case KVM_S390_VM_CPU_PROCESSOR_FEAT:
126015c9705fSDavid Hildenbrand 		ret = kvm_s390_set_processor_feat(kvm, attr);
126115c9705fSDavid Hildenbrand 		break;
12620a763c78SDavid Hildenbrand 	case KVM_S390_VM_CPU_PROCESSOR_SUBFUNC:
12630a763c78SDavid Hildenbrand 		ret = kvm_s390_set_processor_subfunc(kvm, attr);
12640a763c78SDavid Hildenbrand 		break;
1265658b6edaSMichael Mueller 	}
1266658b6edaSMichael Mueller 	return ret;
1267658b6edaSMichael Mueller }
1268658b6edaSMichael Mueller 
1269658b6edaSMichael Mueller static int kvm_s390_get_processor(struct kvm *kvm, struct kvm_device_attr *attr)
1270658b6edaSMichael Mueller {
1271658b6edaSMichael Mueller 	struct kvm_s390_vm_cpu_processor *proc;
1272658b6edaSMichael Mueller 	int ret = 0;
1273658b6edaSMichael Mueller 
1274658b6edaSMichael Mueller 	proc = kzalloc(sizeof(*proc), GFP_KERNEL);
1275658b6edaSMichael Mueller 	if (!proc) {
1276658b6edaSMichael Mueller 		ret = -ENOMEM;
1277658b6edaSMichael Mueller 		goto out;
1278658b6edaSMichael Mueller 	}
12799bb0ec09SDavid Hildenbrand 	proc->cpuid = kvm->arch.model.cpuid;
1280658b6edaSMichael Mueller 	proc->ibc = kvm->arch.model.ibc;
1281c54f0d6aSDavid Hildenbrand 	memcpy(&proc->fac_list, kvm->arch.model.fac_list,
1282c54f0d6aSDavid Hildenbrand 	       S390_ARCH_FAC_LIST_SIZE_BYTE);
1283a8c39dd7SChristian Borntraeger 	VM_EVENT(kvm, 3, "GET: guest ibc: 0x%4.4x, guest cpuid: 0x%16.16llx",
1284a8c39dd7SChristian Borntraeger 		 kvm->arch.model.ibc,
1285a8c39dd7SChristian Borntraeger 		 kvm->arch.model.cpuid);
1286a8c39dd7SChristian Borntraeger 	VM_EVENT(kvm, 3, "GET: guest faclist: 0x%16.16llx.%16.16llx.%16.16llx",
1287a8c39dd7SChristian Borntraeger 		 kvm->arch.model.fac_list[0],
1288a8c39dd7SChristian Borntraeger 		 kvm->arch.model.fac_list[1],
1289a8c39dd7SChristian Borntraeger 		 kvm->arch.model.fac_list[2]);
1290658b6edaSMichael Mueller 	if (copy_to_user((void __user *)attr->addr, proc, sizeof(*proc)))
1291658b6edaSMichael Mueller 		ret = -EFAULT;
1292658b6edaSMichael Mueller 	kfree(proc);
1293658b6edaSMichael Mueller out:
1294658b6edaSMichael Mueller 	return ret;
1295658b6edaSMichael Mueller }
1296658b6edaSMichael Mueller 
1297658b6edaSMichael Mueller static int kvm_s390_get_machine(struct kvm *kvm, struct kvm_device_attr *attr)
1298658b6edaSMichael Mueller {
1299658b6edaSMichael Mueller 	struct kvm_s390_vm_cpu_machine *mach;
1300658b6edaSMichael Mueller 	int ret = 0;
1301658b6edaSMichael Mueller 
1302658b6edaSMichael Mueller 	mach = kzalloc(sizeof(*mach), GFP_KERNEL);
1303658b6edaSMichael Mueller 	if (!mach) {
1304658b6edaSMichael Mueller 		ret = -ENOMEM;
1305658b6edaSMichael Mueller 		goto out;
1306658b6edaSMichael Mueller 	}
1307658b6edaSMichael Mueller 	get_cpu_id((struct cpuid *) &mach->cpuid);
130837c5f6c8SDavid Hildenbrand 	mach->ibc = sclp.ibc;
1309c54f0d6aSDavid Hildenbrand 	memcpy(&mach->fac_mask, kvm->arch.model.fac_mask,
1310981467c9SMichael Mueller 	       S390_ARCH_FAC_LIST_SIZE_BYTE);
1311658b6edaSMichael Mueller 	memcpy((unsigned long *)&mach->fac_list, S390_lowcore.stfle_fac_list,
131204478197SChristian Borntraeger 	       sizeof(S390_lowcore.stfle_fac_list));
1313a8c39dd7SChristian Borntraeger 	VM_EVENT(kvm, 3, "GET: host ibc:  0x%4.4x, host cpuid:  0x%16.16llx",
1314a8c39dd7SChristian Borntraeger 		 kvm->arch.model.ibc,
1315a8c39dd7SChristian Borntraeger 		 kvm->arch.model.cpuid);
1316a8c39dd7SChristian Borntraeger 	VM_EVENT(kvm, 3, "GET: host facmask:  0x%16.16llx.%16.16llx.%16.16llx",
1317a8c39dd7SChristian Borntraeger 		 mach->fac_mask[0],
1318a8c39dd7SChristian Borntraeger 		 mach->fac_mask[1],
1319a8c39dd7SChristian Borntraeger 		 mach->fac_mask[2]);
1320a8c39dd7SChristian Borntraeger 	VM_EVENT(kvm, 3, "GET: host faclist:  0x%16.16llx.%16.16llx.%16.16llx",
1321a8c39dd7SChristian Borntraeger 		 mach->fac_list[0],
1322a8c39dd7SChristian Borntraeger 		 mach->fac_list[1],
1323a8c39dd7SChristian Borntraeger 		 mach->fac_list[2]);
1324658b6edaSMichael Mueller 	if (copy_to_user((void __user *)attr->addr, mach, sizeof(*mach)))
1325658b6edaSMichael Mueller 		ret = -EFAULT;
1326658b6edaSMichael Mueller 	kfree(mach);
1327658b6edaSMichael Mueller out:
1328658b6edaSMichael Mueller 	return ret;
1329658b6edaSMichael Mueller }
1330658b6edaSMichael Mueller 
133115c9705fSDavid Hildenbrand static int kvm_s390_get_processor_feat(struct kvm *kvm,
133215c9705fSDavid Hildenbrand 				       struct kvm_device_attr *attr)
133315c9705fSDavid Hildenbrand {
133415c9705fSDavid Hildenbrand 	struct kvm_s390_vm_cpu_feat data;
133515c9705fSDavid Hildenbrand 
133615c9705fSDavid Hildenbrand 	bitmap_copy((unsigned long *) data.feat, kvm->arch.cpu_feat,
133715c9705fSDavid Hildenbrand 		    KVM_S390_VM_CPU_FEAT_NR_BITS);
133815c9705fSDavid Hildenbrand 	if (copy_to_user((void __user *)attr->addr, &data, sizeof(data)))
133915c9705fSDavid Hildenbrand 		return -EFAULT;
13402f8311c9SChristian Borntraeger 	VM_EVENT(kvm, 3, "GET: guest feat: 0x%16.16llx.0x%16.16llx.0x%16.16llx",
13412f8311c9SChristian Borntraeger 			 data.feat[0],
13422f8311c9SChristian Borntraeger 			 data.feat[1],
13432f8311c9SChristian Borntraeger 			 data.feat[2]);
134415c9705fSDavid Hildenbrand 	return 0;
134515c9705fSDavid Hildenbrand }
134615c9705fSDavid Hildenbrand 
134715c9705fSDavid Hildenbrand static int kvm_s390_get_machine_feat(struct kvm *kvm,
134815c9705fSDavid Hildenbrand 				     struct kvm_device_attr *attr)
134915c9705fSDavid Hildenbrand {
135015c9705fSDavid Hildenbrand 	struct kvm_s390_vm_cpu_feat data;
135115c9705fSDavid Hildenbrand 
135215c9705fSDavid Hildenbrand 	bitmap_copy((unsigned long *) data.feat,
135315c9705fSDavid Hildenbrand 		    kvm_s390_available_cpu_feat,
135415c9705fSDavid Hildenbrand 		    KVM_S390_VM_CPU_FEAT_NR_BITS);
135515c9705fSDavid Hildenbrand 	if (copy_to_user((void __user *)attr->addr, &data, sizeof(data)))
135615c9705fSDavid Hildenbrand 		return -EFAULT;
13572f8311c9SChristian Borntraeger 	VM_EVENT(kvm, 3, "GET: host feat:  0x%16.16llx.0x%16.16llx.0x%16.16llx",
13582f8311c9SChristian Borntraeger 			 data.feat[0],
13592f8311c9SChristian Borntraeger 			 data.feat[1],
13602f8311c9SChristian Borntraeger 			 data.feat[2]);
136115c9705fSDavid Hildenbrand 	return 0;
136215c9705fSDavid Hildenbrand }
136315c9705fSDavid Hildenbrand 
13640a763c78SDavid Hildenbrand static int kvm_s390_get_processor_subfunc(struct kvm *kvm,
13650a763c78SDavid Hildenbrand 					  struct kvm_device_attr *attr)
13660a763c78SDavid Hildenbrand {
13670a763c78SDavid Hildenbrand 	/*
13680a763c78SDavid Hildenbrand 	 * Once we can actually configure subfunctions (kernel + hw support),
13690a763c78SDavid Hildenbrand 	 * we have to check if they were already set by user space, if so copy
13700a763c78SDavid Hildenbrand 	 * them from kvm->arch.
13710a763c78SDavid Hildenbrand 	 */
13720a763c78SDavid Hildenbrand 	return -ENXIO;
13730a763c78SDavid Hildenbrand }
13740a763c78SDavid Hildenbrand 
13750a763c78SDavid Hildenbrand static int kvm_s390_get_machine_subfunc(struct kvm *kvm,
13760a763c78SDavid Hildenbrand 					struct kvm_device_attr *attr)
13770a763c78SDavid Hildenbrand {
13780a763c78SDavid Hildenbrand 	if (copy_to_user((void __user *)attr->addr, &kvm_s390_available_subfunc,
13790a763c78SDavid Hildenbrand 	    sizeof(struct kvm_s390_vm_cpu_subfunc)))
13800a763c78SDavid Hildenbrand 		return -EFAULT;
13810a763c78SDavid Hildenbrand 	return 0;
13820a763c78SDavid Hildenbrand }
1383658b6edaSMichael Mueller static int kvm_s390_get_cpu_model(struct kvm *kvm, struct kvm_device_attr *attr)
1384658b6edaSMichael Mueller {
1385658b6edaSMichael Mueller 	int ret = -ENXIO;
1386658b6edaSMichael Mueller 
1387658b6edaSMichael Mueller 	switch (attr->attr) {
1388658b6edaSMichael Mueller 	case KVM_S390_VM_CPU_PROCESSOR:
1389658b6edaSMichael Mueller 		ret = kvm_s390_get_processor(kvm, attr);
1390658b6edaSMichael Mueller 		break;
1391658b6edaSMichael Mueller 	case KVM_S390_VM_CPU_MACHINE:
1392658b6edaSMichael Mueller 		ret = kvm_s390_get_machine(kvm, attr);
1393658b6edaSMichael Mueller 		break;
139415c9705fSDavid Hildenbrand 	case KVM_S390_VM_CPU_PROCESSOR_FEAT:
139515c9705fSDavid Hildenbrand 		ret = kvm_s390_get_processor_feat(kvm, attr);
139615c9705fSDavid Hildenbrand 		break;
139715c9705fSDavid Hildenbrand 	case KVM_S390_VM_CPU_MACHINE_FEAT:
139815c9705fSDavid Hildenbrand 		ret = kvm_s390_get_machine_feat(kvm, attr);
139915c9705fSDavid Hildenbrand 		break;
14000a763c78SDavid Hildenbrand 	case KVM_S390_VM_CPU_PROCESSOR_SUBFUNC:
14010a763c78SDavid Hildenbrand 		ret = kvm_s390_get_processor_subfunc(kvm, attr);
14020a763c78SDavid Hildenbrand 		break;
14030a763c78SDavid Hildenbrand 	case KVM_S390_VM_CPU_MACHINE_SUBFUNC:
14040a763c78SDavid Hildenbrand 		ret = kvm_s390_get_machine_subfunc(kvm, attr);
14050a763c78SDavid Hildenbrand 		break;
1406658b6edaSMichael Mueller 	}
1407658b6edaSMichael Mueller 	return ret;
1408658b6edaSMichael Mueller }
1409658b6edaSMichael Mueller 
1410f2061656SDominik Dingel static int kvm_s390_vm_set_attr(struct kvm *kvm, struct kvm_device_attr *attr)
1411f2061656SDominik Dingel {
1412f2061656SDominik Dingel 	int ret;
1413f2061656SDominik Dingel 
1414f2061656SDominik Dingel 	switch (attr->group) {
14154f718eabSDominik Dingel 	case KVM_S390_VM_MEM_CTRL:
14168c0a7ce6SDominik Dingel 		ret = kvm_s390_set_mem_control(kvm, attr);
14174f718eabSDominik Dingel 		break;
141872f25020SJason J. Herne 	case KVM_S390_VM_TOD:
141972f25020SJason J. Herne 		ret = kvm_s390_set_tod(kvm, attr);
142072f25020SJason J. Herne 		break;
1421658b6edaSMichael Mueller 	case KVM_S390_VM_CPU_MODEL:
1422658b6edaSMichael Mueller 		ret = kvm_s390_set_cpu_model(kvm, attr);
1423658b6edaSMichael Mueller 		break;
1424a374e892STony Krowiak 	case KVM_S390_VM_CRYPTO:
1425a374e892STony Krowiak 		ret = kvm_s390_vm_set_crypto(kvm, attr);
1426a374e892STony Krowiak 		break;
1427190df4a2SClaudio Imbrenda 	case KVM_S390_VM_MIGRATION:
1428190df4a2SClaudio Imbrenda 		ret = kvm_s390_vm_set_migration(kvm, attr);
1429190df4a2SClaudio Imbrenda 		break;
1430f2061656SDominik Dingel 	default:
1431f2061656SDominik Dingel 		ret = -ENXIO;
1432f2061656SDominik Dingel 		break;
1433f2061656SDominik Dingel 	}
1434f2061656SDominik Dingel 
1435f2061656SDominik Dingel 	return ret;
1436f2061656SDominik Dingel }
1437f2061656SDominik Dingel 
1438f2061656SDominik Dingel static int kvm_s390_vm_get_attr(struct kvm *kvm, struct kvm_device_attr *attr)
1439f2061656SDominik Dingel {
14408c0a7ce6SDominik Dingel 	int ret;
14418c0a7ce6SDominik Dingel 
14428c0a7ce6SDominik Dingel 	switch (attr->group) {
14438c0a7ce6SDominik Dingel 	case KVM_S390_VM_MEM_CTRL:
14448c0a7ce6SDominik Dingel 		ret = kvm_s390_get_mem_control(kvm, attr);
14458c0a7ce6SDominik Dingel 		break;
144672f25020SJason J. Herne 	case KVM_S390_VM_TOD:
144772f25020SJason J. Herne 		ret = kvm_s390_get_tod(kvm, attr);
144872f25020SJason J. Herne 		break;
1449658b6edaSMichael Mueller 	case KVM_S390_VM_CPU_MODEL:
1450658b6edaSMichael Mueller 		ret = kvm_s390_get_cpu_model(kvm, attr);
1451658b6edaSMichael Mueller 		break;
1452190df4a2SClaudio Imbrenda 	case KVM_S390_VM_MIGRATION:
1453190df4a2SClaudio Imbrenda 		ret = kvm_s390_vm_get_migration(kvm, attr);
1454190df4a2SClaudio Imbrenda 		break;
14558c0a7ce6SDominik Dingel 	default:
14568c0a7ce6SDominik Dingel 		ret = -ENXIO;
14578c0a7ce6SDominik Dingel 		break;
14588c0a7ce6SDominik Dingel 	}
14598c0a7ce6SDominik Dingel 
14608c0a7ce6SDominik Dingel 	return ret;
1461f2061656SDominik Dingel }
1462f2061656SDominik Dingel 
1463f2061656SDominik Dingel static int kvm_s390_vm_has_attr(struct kvm *kvm, struct kvm_device_attr *attr)
1464f2061656SDominik Dingel {
1465f2061656SDominik Dingel 	int ret;
1466f2061656SDominik Dingel 
1467f2061656SDominik Dingel 	switch (attr->group) {
14684f718eabSDominik Dingel 	case KVM_S390_VM_MEM_CTRL:
14694f718eabSDominik Dingel 		switch (attr->attr) {
14704f718eabSDominik Dingel 		case KVM_S390_VM_MEM_ENABLE_CMMA:
14714f718eabSDominik Dingel 		case KVM_S390_VM_MEM_CLR_CMMA:
1472f9cbd9b0SDavid Hildenbrand 			ret = sclp.has_cmma ? 0 : -ENXIO;
1473f9cbd9b0SDavid Hildenbrand 			break;
14748c0a7ce6SDominik Dingel 		case KVM_S390_VM_MEM_LIMIT_SIZE:
14754f718eabSDominik Dingel 			ret = 0;
14764f718eabSDominik Dingel 			break;
14774f718eabSDominik Dingel 		default:
14784f718eabSDominik Dingel 			ret = -ENXIO;
14794f718eabSDominik Dingel 			break;
14804f718eabSDominik Dingel 		}
14814f718eabSDominik Dingel 		break;
148272f25020SJason J. Herne 	case KVM_S390_VM_TOD:
148372f25020SJason J. Herne 		switch (attr->attr) {
148472f25020SJason J. Herne 		case KVM_S390_VM_TOD_LOW:
148572f25020SJason J. Herne 		case KVM_S390_VM_TOD_HIGH:
148672f25020SJason J. Herne 			ret = 0;
148772f25020SJason J. Herne 			break;
148872f25020SJason J. Herne 		default:
148972f25020SJason J. Herne 			ret = -ENXIO;
149072f25020SJason J. Herne 			break;
149172f25020SJason J. Herne 		}
149272f25020SJason J. Herne 		break;
1493658b6edaSMichael Mueller 	case KVM_S390_VM_CPU_MODEL:
1494658b6edaSMichael Mueller 		switch (attr->attr) {
1495658b6edaSMichael Mueller 		case KVM_S390_VM_CPU_PROCESSOR:
1496658b6edaSMichael Mueller 		case KVM_S390_VM_CPU_MACHINE:
149715c9705fSDavid Hildenbrand 		case KVM_S390_VM_CPU_PROCESSOR_FEAT:
149815c9705fSDavid Hildenbrand 		case KVM_S390_VM_CPU_MACHINE_FEAT:
14990a763c78SDavid Hildenbrand 		case KVM_S390_VM_CPU_MACHINE_SUBFUNC:
1500658b6edaSMichael Mueller 			ret = 0;
1501658b6edaSMichael Mueller 			break;
15020a763c78SDavid Hildenbrand 		/* configuring subfunctions is not supported yet */
15030a763c78SDavid Hildenbrand 		case KVM_S390_VM_CPU_PROCESSOR_SUBFUNC:
1504658b6edaSMichael Mueller 		default:
1505658b6edaSMichael Mueller 			ret = -ENXIO;
1506658b6edaSMichael Mueller 			break;
1507658b6edaSMichael Mueller 		}
1508658b6edaSMichael Mueller 		break;
1509a374e892STony Krowiak 	case KVM_S390_VM_CRYPTO:
1510a374e892STony Krowiak 		switch (attr->attr) {
1511a374e892STony Krowiak 		case KVM_S390_VM_CRYPTO_ENABLE_AES_KW:
1512a374e892STony Krowiak 		case KVM_S390_VM_CRYPTO_ENABLE_DEA_KW:
1513a374e892STony Krowiak 		case KVM_S390_VM_CRYPTO_DISABLE_AES_KW:
1514a374e892STony Krowiak 		case KVM_S390_VM_CRYPTO_DISABLE_DEA_KW:
1515a374e892STony Krowiak 			ret = 0;
1516a374e892STony Krowiak 			break;
1517*37940fb0STony Krowiak 		case KVM_S390_VM_CRYPTO_ENABLE_APIE:
1518*37940fb0STony Krowiak 		case KVM_S390_VM_CRYPTO_DISABLE_APIE:
1519*37940fb0STony Krowiak 			ret = ap_instructions_available() ? 0 : -ENXIO;
1520*37940fb0STony Krowiak 			break;
1521a374e892STony Krowiak 		default:
1522a374e892STony Krowiak 			ret = -ENXIO;
1523a374e892STony Krowiak 			break;
1524a374e892STony Krowiak 		}
1525a374e892STony Krowiak 		break;
1526190df4a2SClaudio Imbrenda 	case KVM_S390_VM_MIGRATION:
1527190df4a2SClaudio Imbrenda 		ret = 0;
1528190df4a2SClaudio Imbrenda 		break;
1529f2061656SDominik Dingel 	default:
1530f2061656SDominik Dingel 		ret = -ENXIO;
1531f2061656SDominik Dingel 		break;
1532f2061656SDominik Dingel 	}
1533f2061656SDominik Dingel 
1534f2061656SDominik Dingel 	return ret;
1535f2061656SDominik Dingel }
1536f2061656SDominik Dingel 
153730ee2a98SJason J. Herne static long kvm_s390_get_skeys(struct kvm *kvm, struct kvm_s390_skeys *args)
153830ee2a98SJason J. Herne {
153930ee2a98SJason J. Herne 	uint8_t *keys;
154030ee2a98SJason J. Herne 	uint64_t hva;
15414f899147SChristian Borntraeger 	int srcu_idx, i, r = 0;
154230ee2a98SJason J. Herne 
154330ee2a98SJason J. Herne 	if (args->flags != 0)
154430ee2a98SJason J. Herne 		return -EINVAL;
154530ee2a98SJason J. Herne 
154630ee2a98SJason J. Herne 	/* Is this guest using storage keys? */
154755531b74SJanosch Frank 	if (!mm_uses_skeys(current->mm))
154830ee2a98SJason J. Herne 		return KVM_S390_GET_SKEYS_NONE;
154930ee2a98SJason J. Herne 
155030ee2a98SJason J. Herne 	/* Enforce sane limit on memory allocation */
155130ee2a98SJason J. Herne 	if (args->count < 1 || args->count > KVM_S390_SKEYS_MAX)
155230ee2a98SJason J. Herne 		return -EINVAL;
155330ee2a98SJason J. Herne 
1554752ade68SMichal Hocko 	keys = kvmalloc_array(args->count, sizeof(uint8_t), GFP_KERNEL);
155530ee2a98SJason J. Herne 	if (!keys)
155630ee2a98SJason J. Herne 		return -ENOMEM;
155730ee2a98SJason J. Herne 
1558d3ed1ceeSMartin Schwidefsky 	down_read(&current->mm->mmap_sem);
15594f899147SChristian Borntraeger 	srcu_idx = srcu_read_lock(&kvm->srcu);
156030ee2a98SJason J. Herne 	for (i = 0; i < args->count; i++) {
156130ee2a98SJason J. Herne 		hva = gfn_to_hva(kvm, args->start_gfn + i);
156230ee2a98SJason J. Herne 		if (kvm_is_error_hva(hva)) {
156330ee2a98SJason J. Herne 			r = -EFAULT;
1564d3ed1ceeSMartin Schwidefsky 			break;
156530ee2a98SJason J. Herne 		}
156630ee2a98SJason J. Herne 
1567154c8c19SDavid Hildenbrand 		r = get_guest_storage_key(current->mm, hva, &keys[i]);
1568154c8c19SDavid Hildenbrand 		if (r)
1569d3ed1ceeSMartin Schwidefsky 			break;
157030ee2a98SJason J. Herne 	}
15714f899147SChristian Borntraeger 	srcu_read_unlock(&kvm->srcu, srcu_idx);
1572d3ed1ceeSMartin Schwidefsky 	up_read(&current->mm->mmap_sem);
157330ee2a98SJason J. Herne 
1574d3ed1ceeSMartin Schwidefsky 	if (!r) {
157530ee2a98SJason J. Herne 		r = copy_to_user((uint8_t __user *)args->skeydata_addr, keys,
157630ee2a98SJason J. Herne 				 sizeof(uint8_t) * args->count);
157730ee2a98SJason J. Herne 		if (r)
157830ee2a98SJason J. Herne 			r = -EFAULT;
1579d3ed1ceeSMartin Schwidefsky 	}
1580d3ed1ceeSMartin Schwidefsky 
158130ee2a98SJason J. Herne 	kvfree(keys);
158230ee2a98SJason J. Herne 	return r;
158330ee2a98SJason J. Herne }
158430ee2a98SJason J. Herne 
158530ee2a98SJason J. Herne static long kvm_s390_set_skeys(struct kvm *kvm, struct kvm_s390_skeys *args)
158630ee2a98SJason J. Herne {
158730ee2a98SJason J. Herne 	uint8_t *keys;
158830ee2a98SJason J. Herne 	uint64_t hva;
15894f899147SChristian Borntraeger 	int srcu_idx, i, r = 0;
1590bd096f64SJanosch Frank 	bool unlocked;
159130ee2a98SJason J. Herne 
159230ee2a98SJason J. Herne 	if (args->flags != 0)
159330ee2a98SJason J. Herne 		return -EINVAL;
159430ee2a98SJason J. Herne 
159530ee2a98SJason J. Herne 	/* Enforce sane limit on memory allocation */
159630ee2a98SJason J. Herne 	if (args->count < 1 || args->count > KVM_S390_SKEYS_MAX)
159730ee2a98SJason J. Herne 		return -EINVAL;
159830ee2a98SJason J. Herne 
1599752ade68SMichal Hocko 	keys = kvmalloc_array(args->count, sizeof(uint8_t), GFP_KERNEL);
160030ee2a98SJason J. Herne 	if (!keys)
160130ee2a98SJason J. Herne 		return -ENOMEM;
160230ee2a98SJason J. Herne 
160330ee2a98SJason J. Herne 	r = copy_from_user(keys, (uint8_t __user *)args->skeydata_addr,
160430ee2a98SJason J. Herne 			   sizeof(uint8_t) * args->count);
160530ee2a98SJason J. Herne 	if (r) {
160630ee2a98SJason J. Herne 		r = -EFAULT;
160730ee2a98SJason J. Herne 		goto out;
160830ee2a98SJason J. Herne 	}
160930ee2a98SJason J. Herne 
161030ee2a98SJason J. Herne 	/* Enable storage key handling for the guest */
161114d4a425SDominik Dingel 	r = s390_enable_skey();
161214d4a425SDominik Dingel 	if (r)
161314d4a425SDominik Dingel 		goto out;
161430ee2a98SJason J. Herne 
1615bd096f64SJanosch Frank 	i = 0;
1616d3ed1ceeSMartin Schwidefsky 	down_read(&current->mm->mmap_sem);
16174f899147SChristian Borntraeger 	srcu_idx = srcu_read_lock(&kvm->srcu);
1618bd096f64SJanosch Frank         while (i < args->count) {
1619bd096f64SJanosch Frank 		unlocked = false;
162030ee2a98SJason J. Herne 		hva = gfn_to_hva(kvm, args->start_gfn + i);
162130ee2a98SJason J. Herne 		if (kvm_is_error_hva(hva)) {
162230ee2a98SJason J. Herne 			r = -EFAULT;
1623d3ed1ceeSMartin Schwidefsky 			break;
162430ee2a98SJason J. Herne 		}
162530ee2a98SJason J. Herne 
162630ee2a98SJason J. Herne 		/* Lowest order bit is reserved */
162730ee2a98SJason J. Herne 		if (keys[i] & 0x01) {
162830ee2a98SJason J. Herne 			r = -EINVAL;
1629d3ed1ceeSMartin Schwidefsky 			break;
163030ee2a98SJason J. Herne 		}
163130ee2a98SJason J. Herne 
1632fe69eabfSDavid Hildenbrand 		r = set_guest_storage_key(current->mm, hva, keys[i], 0);
1633bd096f64SJanosch Frank 		if (r) {
1634bd096f64SJanosch Frank 			r = fixup_user_fault(current, current->mm, hva,
1635bd096f64SJanosch Frank 					     FAULT_FLAG_WRITE, &unlocked);
163630ee2a98SJason J. Herne 			if (r)
1637d3ed1ceeSMartin Schwidefsky 				break;
163830ee2a98SJason J. Herne 		}
1639bd096f64SJanosch Frank 		if (!r)
1640bd096f64SJanosch Frank 			i++;
1641bd096f64SJanosch Frank 	}
16424f899147SChristian Borntraeger 	srcu_read_unlock(&kvm->srcu, srcu_idx);
1643d3ed1ceeSMartin Schwidefsky 	up_read(&current->mm->mmap_sem);
164430ee2a98SJason J. Herne out:
164530ee2a98SJason J. Herne 	kvfree(keys);
164630ee2a98SJason J. Herne 	return r;
164730ee2a98SJason J. Herne }
164830ee2a98SJason J. Herne 
16494036e387SClaudio Imbrenda /*
16504036e387SClaudio Imbrenda  * Base address and length must be sent at the start of each block, therefore
16514036e387SClaudio Imbrenda  * it's cheaper to send some clean data, as long as it's less than the size of
16524036e387SClaudio Imbrenda  * two longs.
16534036e387SClaudio Imbrenda  */
16544036e387SClaudio Imbrenda #define KVM_S390_MAX_BIT_DISTANCE (2 * sizeof(void *))
16554036e387SClaudio Imbrenda /* for consistency */
16564036e387SClaudio Imbrenda #define KVM_S390_CMMA_SIZE_MAX ((u32)KVM_S390_SKEYS_MAX)
16574036e387SClaudio Imbrenda 
16584036e387SClaudio Imbrenda /*
1659afdad616SClaudio Imbrenda  * Similar to gfn_to_memslot, but returns the index of a memslot also when the
1660afdad616SClaudio Imbrenda  * address falls in a hole. In that case the index of one of the memslots
1661afdad616SClaudio Imbrenda  * bordering the hole is returned.
1662afdad616SClaudio Imbrenda  */
1663afdad616SClaudio Imbrenda static int gfn_to_memslot_approx(struct kvm_memslots *slots, gfn_t gfn)
1664afdad616SClaudio Imbrenda {
1665afdad616SClaudio Imbrenda 	int start = 0, end = slots->used_slots;
1666afdad616SClaudio Imbrenda 	int slot = atomic_read(&slots->lru_slot);
1667afdad616SClaudio Imbrenda 	struct kvm_memory_slot *memslots = slots->memslots;
1668afdad616SClaudio Imbrenda 
1669afdad616SClaudio Imbrenda 	if (gfn >= memslots[slot].base_gfn &&
1670afdad616SClaudio Imbrenda 	    gfn < memslots[slot].base_gfn + memslots[slot].npages)
1671afdad616SClaudio Imbrenda 		return slot;
1672afdad616SClaudio Imbrenda 
1673afdad616SClaudio Imbrenda 	while (start < end) {
1674afdad616SClaudio Imbrenda 		slot = start + (end - start) / 2;
1675afdad616SClaudio Imbrenda 
1676afdad616SClaudio Imbrenda 		if (gfn >= memslots[slot].base_gfn)
1677afdad616SClaudio Imbrenda 			end = slot;
1678afdad616SClaudio Imbrenda 		else
1679afdad616SClaudio Imbrenda 			start = slot + 1;
1680afdad616SClaudio Imbrenda 	}
1681afdad616SClaudio Imbrenda 
1682afdad616SClaudio Imbrenda 	if (gfn >= memslots[start].base_gfn &&
1683afdad616SClaudio Imbrenda 	    gfn < memslots[start].base_gfn + memslots[start].npages) {
1684afdad616SClaudio Imbrenda 		atomic_set(&slots->lru_slot, start);
1685afdad616SClaudio Imbrenda 	}
1686afdad616SClaudio Imbrenda 
1687afdad616SClaudio Imbrenda 	return start;
1688afdad616SClaudio Imbrenda }
1689afdad616SClaudio Imbrenda 
1690afdad616SClaudio Imbrenda static int kvm_s390_peek_cmma(struct kvm *kvm, struct kvm_s390_cmma_log *args,
1691afdad616SClaudio Imbrenda 			      u8 *res, unsigned long bufsize)
1692afdad616SClaudio Imbrenda {
1693afdad616SClaudio Imbrenda 	unsigned long pgstev, hva, cur_gfn = args->start_gfn;
1694afdad616SClaudio Imbrenda 
1695afdad616SClaudio Imbrenda 	args->count = 0;
1696afdad616SClaudio Imbrenda 	while (args->count < bufsize) {
1697afdad616SClaudio Imbrenda 		hva = gfn_to_hva(kvm, cur_gfn);
1698afdad616SClaudio Imbrenda 		/*
1699afdad616SClaudio Imbrenda 		 * We return an error if the first value was invalid, but we
1700afdad616SClaudio Imbrenda 		 * return successfully if at least one value was copied.
1701afdad616SClaudio Imbrenda 		 */
1702afdad616SClaudio Imbrenda 		if (kvm_is_error_hva(hva))
1703afdad616SClaudio Imbrenda 			return args->count ? 0 : -EFAULT;
1704afdad616SClaudio Imbrenda 		if (get_pgste(kvm->mm, hva, &pgstev) < 0)
1705afdad616SClaudio Imbrenda 			pgstev = 0;
1706afdad616SClaudio Imbrenda 		res[args->count++] = (pgstev >> 24) & 0x43;
1707afdad616SClaudio Imbrenda 		cur_gfn++;
1708afdad616SClaudio Imbrenda 	}
1709afdad616SClaudio Imbrenda 
1710afdad616SClaudio Imbrenda 	return 0;
1711afdad616SClaudio Imbrenda }
1712afdad616SClaudio Imbrenda 
1713afdad616SClaudio Imbrenda static unsigned long kvm_s390_next_dirty_cmma(struct kvm_memslots *slots,
1714afdad616SClaudio Imbrenda 					      unsigned long cur_gfn)
1715afdad616SClaudio Imbrenda {
1716afdad616SClaudio Imbrenda 	int slotidx = gfn_to_memslot_approx(slots, cur_gfn);
1717afdad616SClaudio Imbrenda 	struct kvm_memory_slot *ms = slots->memslots + slotidx;
1718afdad616SClaudio Imbrenda 	unsigned long ofs = cur_gfn - ms->base_gfn;
1719afdad616SClaudio Imbrenda 
1720afdad616SClaudio Imbrenda 	if (ms->base_gfn + ms->npages <= cur_gfn) {
1721afdad616SClaudio Imbrenda 		slotidx--;
1722afdad616SClaudio Imbrenda 		/* If we are above the highest slot, wrap around */
1723afdad616SClaudio Imbrenda 		if (slotidx < 0)
1724afdad616SClaudio Imbrenda 			slotidx = slots->used_slots - 1;
1725afdad616SClaudio Imbrenda 
1726afdad616SClaudio Imbrenda 		ms = slots->memslots + slotidx;
1727afdad616SClaudio Imbrenda 		ofs = 0;
1728afdad616SClaudio Imbrenda 	}
1729afdad616SClaudio Imbrenda 	ofs = find_next_bit(kvm_second_dirty_bitmap(ms), ms->npages, ofs);
1730afdad616SClaudio Imbrenda 	while ((slotidx > 0) && (ofs >= ms->npages)) {
1731afdad616SClaudio Imbrenda 		slotidx--;
1732afdad616SClaudio Imbrenda 		ms = slots->memslots + slotidx;
1733afdad616SClaudio Imbrenda 		ofs = find_next_bit(kvm_second_dirty_bitmap(ms), ms->npages, 0);
1734afdad616SClaudio Imbrenda 	}
1735afdad616SClaudio Imbrenda 	return ms->base_gfn + ofs;
1736afdad616SClaudio Imbrenda }
1737afdad616SClaudio Imbrenda 
1738afdad616SClaudio Imbrenda static int kvm_s390_get_cmma(struct kvm *kvm, struct kvm_s390_cmma_log *args,
1739afdad616SClaudio Imbrenda 			     u8 *res, unsigned long bufsize)
1740afdad616SClaudio Imbrenda {
1741afdad616SClaudio Imbrenda 	unsigned long mem_end, cur_gfn, next_gfn, hva, pgstev;
1742afdad616SClaudio Imbrenda 	struct kvm_memslots *slots = kvm_memslots(kvm);
1743afdad616SClaudio Imbrenda 	struct kvm_memory_slot *ms;
1744afdad616SClaudio Imbrenda 
1745afdad616SClaudio Imbrenda 	cur_gfn = kvm_s390_next_dirty_cmma(slots, args->start_gfn);
1746afdad616SClaudio Imbrenda 	ms = gfn_to_memslot(kvm, cur_gfn);
1747afdad616SClaudio Imbrenda 	args->count = 0;
1748afdad616SClaudio Imbrenda 	args->start_gfn = cur_gfn;
1749afdad616SClaudio Imbrenda 	if (!ms)
1750afdad616SClaudio Imbrenda 		return 0;
1751afdad616SClaudio Imbrenda 	next_gfn = kvm_s390_next_dirty_cmma(slots, cur_gfn + 1);
1752afdad616SClaudio Imbrenda 	mem_end = slots->memslots[0].base_gfn + slots->memslots[0].npages;
1753afdad616SClaudio Imbrenda 
1754afdad616SClaudio Imbrenda 	while (args->count < bufsize) {
1755afdad616SClaudio Imbrenda 		hva = gfn_to_hva(kvm, cur_gfn);
1756afdad616SClaudio Imbrenda 		if (kvm_is_error_hva(hva))
1757afdad616SClaudio Imbrenda 			return 0;
1758afdad616SClaudio Imbrenda 		/* Decrement only if we actually flipped the bit to 0 */
1759afdad616SClaudio Imbrenda 		if (test_and_clear_bit(cur_gfn - ms->base_gfn, kvm_second_dirty_bitmap(ms)))
1760afdad616SClaudio Imbrenda 			atomic64_dec(&kvm->arch.cmma_dirty_pages);
1761afdad616SClaudio Imbrenda 		if (get_pgste(kvm->mm, hva, &pgstev) < 0)
1762afdad616SClaudio Imbrenda 			pgstev = 0;
1763afdad616SClaudio Imbrenda 		/* Save the value */
1764afdad616SClaudio Imbrenda 		res[args->count++] = (pgstev >> 24) & 0x43;
1765afdad616SClaudio Imbrenda 		/* If the next bit is too far away, stop. */
1766afdad616SClaudio Imbrenda 		if (next_gfn > cur_gfn + KVM_S390_MAX_BIT_DISTANCE)
1767afdad616SClaudio Imbrenda 			return 0;
1768afdad616SClaudio Imbrenda 		/* If we reached the previous "next", find the next one */
1769afdad616SClaudio Imbrenda 		if (cur_gfn == next_gfn)
1770afdad616SClaudio Imbrenda 			next_gfn = kvm_s390_next_dirty_cmma(slots, cur_gfn + 1);
1771afdad616SClaudio Imbrenda 		/* Reached the end of memory or of the buffer, stop */
1772afdad616SClaudio Imbrenda 		if ((next_gfn >= mem_end) ||
1773afdad616SClaudio Imbrenda 		    (next_gfn - args->start_gfn >= bufsize))
1774afdad616SClaudio Imbrenda 			return 0;
1775afdad616SClaudio Imbrenda 		cur_gfn++;
1776afdad616SClaudio Imbrenda 		/* Reached the end of the current memslot, take the next one. */
1777afdad616SClaudio Imbrenda 		if (cur_gfn - ms->base_gfn >= ms->npages) {
1778afdad616SClaudio Imbrenda 			ms = gfn_to_memslot(kvm, cur_gfn);
1779afdad616SClaudio Imbrenda 			if (!ms)
1780afdad616SClaudio Imbrenda 				return 0;
1781afdad616SClaudio Imbrenda 		}
1782afdad616SClaudio Imbrenda 	}
1783afdad616SClaudio Imbrenda 	return 0;
1784afdad616SClaudio Imbrenda }
1785afdad616SClaudio Imbrenda 
1786afdad616SClaudio Imbrenda /*
17874036e387SClaudio Imbrenda  * This function searches for the next page with dirty CMMA attributes, and
17884036e387SClaudio Imbrenda  * saves the attributes in the buffer up to either the end of the buffer or
17894036e387SClaudio Imbrenda  * until a block of at least KVM_S390_MAX_BIT_DISTANCE clean bits is found;
17904036e387SClaudio Imbrenda  * no trailing clean bytes are saved.
17914036e387SClaudio Imbrenda  * In case no dirty bits were found, or if CMMA was not enabled or used, the
17924036e387SClaudio Imbrenda  * output buffer will indicate 0 as length.
17934036e387SClaudio Imbrenda  */
17944036e387SClaudio Imbrenda static int kvm_s390_get_cmma_bits(struct kvm *kvm,
17954036e387SClaudio Imbrenda 				  struct kvm_s390_cmma_log *args)
17964036e387SClaudio Imbrenda {
1797afdad616SClaudio Imbrenda 	unsigned long bufsize;
1798afdad616SClaudio Imbrenda 	int srcu_idx, peek, ret;
1799afdad616SClaudio Imbrenda 	u8 *values;
18004036e387SClaudio Imbrenda 
1801afdad616SClaudio Imbrenda 	if (!kvm->arch.use_cmma)
18024036e387SClaudio Imbrenda 		return -ENXIO;
18034036e387SClaudio Imbrenda 	/* Invalid/unsupported flags were specified */
18044036e387SClaudio Imbrenda 	if (args->flags & ~KVM_S390_CMMA_PEEK)
18054036e387SClaudio Imbrenda 		return -EINVAL;
18064036e387SClaudio Imbrenda 	/* Migration mode query, and we are not doing a migration */
18074036e387SClaudio Imbrenda 	peek = !!(args->flags & KVM_S390_CMMA_PEEK);
1808afdad616SClaudio Imbrenda 	if (!peek && !kvm->arch.migration_mode)
18094036e387SClaudio Imbrenda 		return -EINVAL;
18104036e387SClaudio Imbrenda 	/* CMMA is disabled or was not used, or the buffer has length zero */
18114036e387SClaudio Imbrenda 	bufsize = min(args->count, KVM_S390_CMMA_SIZE_MAX);
1812c9f0a2b8SJanosch Frank 	if (!bufsize || !kvm->mm->context.uses_cmm) {
18134036e387SClaudio Imbrenda 		memset(args, 0, sizeof(*args));
18144036e387SClaudio Imbrenda 		return 0;
18154036e387SClaudio Imbrenda 	}
18164036e387SClaudio Imbrenda 	/* We are not peeking, and there are no dirty pages */
1817afdad616SClaudio Imbrenda 	if (!peek && !atomic64_read(&kvm->arch.cmma_dirty_pages)) {
18184036e387SClaudio Imbrenda 		memset(args, 0, sizeof(*args));
18194036e387SClaudio Imbrenda 		return 0;
18204036e387SClaudio Imbrenda 	}
18214036e387SClaudio Imbrenda 
1822afdad616SClaudio Imbrenda 	values = vmalloc(bufsize);
1823afdad616SClaudio Imbrenda 	if (!values)
18244036e387SClaudio Imbrenda 		return -ENOMEM;
18254036e387SClaudio Imbrenda 
18264036e387SClaudio Imbrenda 	down_read(&kvm->mm->mmap_sem);
18274036e387SClaudio Imbrenda 	srcu_idx = srcu_read_lock(&kvm->srcu);
1828afdad616SClaudio Imbrenda 	if (peek)
1829afdad616SClaudio Imbrenda 		ret = kvm_s390_peek_cmma(kvm, args, values, bufsize);
1830afdad616SClaudio Imbrenda 	else
1831afdad616SClaudio Imbrenda 		ret = kvm_s390_get_cmma(kvm, args, values, bufsize);
18324036e387SClaudio Imbrenda 	srcu_read_unlock(&kvm->srcu, srcu_idx);
18334036e387SClaudio Imbrenda 	up_read(&kvm->mm->mmap_sem);
18344036e387SClaudio Imbrenda 
1835afdad616SClaudio Imbrenda 	if (kvm->arch.migration_mode)
1836afdad616SClaudio Imbrenda 		args->remaining = atomic64_read(&kvm->arch.cmma_dirty_pages);
1837afdad616SClaudio Imbrenda 	else
1838afdad616SClaudio Imbrenda 		args->remaining = 0;
18394036e387SClaudio Imbrenda 
1840afdad616SClaudio Imbrenda 	if (copy_to_user((void __user *)args->values, values, args->count))
1841afdad616SClaudio Imbrenda 		ret = -EFAULT;
1842afdad616SClaudio Imbrenda 
1843afdad616SClaudio Imbrenda 	vfree(values);
1844afdad616SClaudio Imbrenda 	return ret;
18454036e387SClaudio Imbrenda }
18464036e387SClaudio Imbrenda 
18474036e387SClaudio Imbrenda /*
18484036e387SClaudio Imbrenda  * This function sets the CMMA attributes for the given pages. If the input
18494036e387SClaudio Imbrenda  * buffer has zero length, no action is taken, otherwise the attributes are
1850c9f0a2b8SJanosch Frank  * set and the mm->context.uses_cmm flag is set.
18514036e387SClaudio Imbrenda  */
18524036e387SClaudio Imbrenda static int kvm_s390_set_cmma_bits(struct kvm *kvm,
18534036e387SClaudio Imbrenda 				  const struct kvm_s390_cmma_log *args)
18544036e387SClaudio Imbrenda {
18554036e387SClaudio Imbrenda 	unsigned long hva, mask, pgstev, i;
18564036e387SClaudio Imbrenda 	uint8_t *bits;
18574036e387SClaudio Imbrenda 	int srcu_idx, r = 0;
18584036e387SClaudio Imbrenda 
18594036e387SClaudio Imbrenda 	mask = args->mask;
18604036e387SClaudio Imbrenda 
18614036e387SClaudio Imbrenda 	if (!kvm->arch.use_cmma)
18624036e387SClaudio Imbrenda 		return -ENXIO;
18634036e387SClaudio Imbrenda 	/* invalid/unsupported flags */
18644036e387SClaudio Imbrenda 	if (args->flags != 0)
18654036e387SClaudio Imbrenda 		return -EINVAL;
18664036e387SClaudio Imbrenda 	/* Enforce sane limit on memory allocation */
18674036e387SClaudio Imbrenda 	if (args->count > KVM_S390_CMMA_SIZE_MAX)
18684036e387SClaudio Imbrenda 		return -EINVAL;
18694036e387SClaudio Imbrenda 	/* Nothing to do */
18704036e387SClaudio Imbrenda 	if (args->count == 0)
18714036e387SClaudio Imbrenda 		return 0;
18724036e387SClaudio Imbrenda 
187342bc47b3SKees Cook 	bits = vmalloc(array_size(sizeof(*bits), args->count));
18744036e387SClaudio Imbrenda 	if (!bits)
18754036e387SClaudio Imbrenda 		return -ENOMEM;
18764036e387SClaudio Imbrenda 
18774036e387SClaudio Imbrenda 	r = copy_from_user(bits, (void __user *)args->values, args->count);
18784036e387SClaudio Imbrenda 	if (r) {
18794036e387SClaudio Imbrenda 		r = -EFAULT;
18804036e387SClaudio Imbrenda 		goto out;
18814036e387SClaudio Imbrenda 	}
18824036e387SClaudio Imbrenda 
18834036e387SClaudio Imbrenda 	down_read(&kvm->mm->mmap_sem);
18844036e387SClaudio Imbrenda 	srcu_idx = srcu_read_lock(&kvm->srcu);
18854036e387SClaudio Imbrenda 	for (i = 0; i < args->count; i++) {
18864036e387SClaudio Imbrenda 		hva = gfn_to_hva(kvm, args->start_gfn + i);
18874036e387SClaudio Imbrenda 		if (kvm_is_error_hva(hva)) {
18884036e387SClaudio Imbrenda 			r = -EFAULT;
18894036e387SClaudio Imbrenda 			break;
18904036e387SClaudio Imbrenda 		}
18914036e387SClaudio Imbrenda 
18924036e387SClaudio Imbrenda 		pgstev = bits[i];
18934036e387SClaudio Imbrenda 		pgstev = pgstev << 24;
18941bab1c02SClaudio Imbrenda 		mask &= _PGSTE_GPS_USAGE_MASK | _PGSTE_GPS_NODAT;
18954036e387SClaudio Imbrenda 		set_pgste_bits(kvm->mm, hva, mask, pgstev);
18964036e387SClaudio Imbrenda 	}
18974036e387SClaudio Imbrenda 	srcu_read_unlock(&kvm->srcu, srcu_idx);
18984036e387SClaudio Imbrenda 	up_read(&kvm->mm->mmap_sem);
18994036e387SClaudio Imbrenda 
1900c9f0a2b8SJanosch Frank 	if (!kvm->mm->context.uses_cmm) {
19014036e387SClaudio Imbrenda 		down_write(&kvm->mm->mmap_sem);
1902c9f0a2b8SJanosch Frank 		kvm->mm->context.uses_cmm = 1;
19034036e387SClaudio Imbrenda 		up_write(&kvm->mm->mmap_sem);
19044036e387SClaudio Imbrenda 	}
19054036e387SClaudio Imbrenda out:
19064036e387SClaudio Imbrenda 	vfree(bits);
19074036e387SClaudio Imbrenda 	return r;
19084036e387SClaudio Imbrenda }
19094036e387SClaudio Imbrenda 
1910b0c632dbSHeiko Carstens long kvm_arch_vm_ioctl(struct file *filp,
1911b0c632dbSHeiko Carstens 		       unsigned int ioctl, unsigned long arg)
1912b0c632dbSHeiko Carstens {
1913b0c632dbSHeiko Carstens 	struct kvm *kvm = filp->private_data;
1914b0c632dbSHeiko Carstens 	void __user *argp = (void __user *)arg;
1915f2061656SDominik Dingel 	struct kvm_device_attr attr;
1916b0c632dbSHeiko Carstens 	int r;
1917b0c632dbSHeiko Carstens 
1918b0c632dbSHeiko Carstens 	switch (ioctl) {
1919ba5c1e9bSCarsten Otte 	case KVM_S390_INTERRUPT: {
1920ba5c1e9bSCarsten Otte 		struct kvm_s390_interrupt s390int;
1921ba5c1e9bSCarsten Otte 
1922ba5c1e9bSCarsten Otte 		r = -EFAULT;
1923ba5c1e9bSCarsten Otte 		if (copy_from_user(&s390int, argp, sizeof(s390int)))
1924ba5c1e9bSCarsten Otte 			break;
1925ba5c1e9bSCarsten Otte 		r = kvm_s390_inject_vm(kvm, &s390int);
1926ba5c1e9bSCarsten Otte 		break;
1927ba5c1e9bSCarsten Otte 	}
1928d938dc55SCornelia Huck 	case KVM_ENABLE_CAP: {
1929d938dc55SCornelia Huck 		struct kvm_enable_cap cap;
1930d938dc55SCornelia Huck 		r = -EFAULT;
1931d938dc55SCornelia Huck 		if (copy_from_user(&cap, argp, sizeof(cap)))
1932d938dc55SCornelia Huck 			break;
1933d938dc55SCornelia Huck 		r = kvm_vm_ioctl_enable_cap(kvm, &cap);
1934d938dc55SCornelia Huck 		break;
1935d938dc55SCornelia Huck 	}
193684223598SCornelia Huck 	case KVM_CREATE_IRQCHIP: {
193784223598SCornelia Huck 		struct kvm_irq_routing_entry routing;
193884223598SCornelia Huck 
193984223598SCornelia Huck 		r = -EINVAL;
194084223598SCornelia Huck 		if (kvm->arch.use_irqchip) {
194184223598SCornelia Huck 			/* Set up dummy routing. */
194284223598SCornelia Huck 			memset(&routing, 0, sizeof(routing));
1943152b2839SNicholas Krause 			r = kvm_set_irq_routing(kvm, &routing, 0, 0);
194484223598SCornelia Huck 		}
194584223598SCornelia Huck 		break;
194684223598SCornelia Huck 	}
1947f2061656SDominik Dingel 	case KVM_SET_DEVICE_ATTR: {
1948f2061656SDominik Dingel 		r = -EFAULT;
1949f2061656SDominik Dingel 		if (copy_from_user(&attr, (void __user *)arg, sizeof(attr)))
1950f2061656SDominik Dingel 			break;
1951f2061656SDominik Dingel 		r = kvm_s390_vm_set_attr(kvm, &attr);
1952f2061656SDominik Dingel 		break;
1953f2061656SDominik Dingel 	}
1954f2061656SDominik Dingel 	case KVM_GET_DEVICE_ATTR: {
1955f2061656SDominik Dingel 		r = -EFAULT;
1956f2061656SDominik Dingel 		if (copy_from_user(&attr, (void __user *)arg, sizeof(attr)))
1957f2061656SDominik Dingel 			break;
1958f2061656SDominik Dingel 		r = kvm_s390_vm_get_attr(kvm, &attr);
1959f2061656SDominik Dingel 		break;
1960f2061656SDominik Dingel 	}
1961f2061656SDominik Dingel 	case KVM_HAS_DEVICE_ATTR: {
1962f2061656SDominik Dingel 		r = -EFAULT;
1963f2061656SDominik Dingel 		if (copy_from_user(&attr, (void __user *)arg, sizeof(attr)))
1964f2061656SDominik Dingel 			break;
1965f2061656SDominik Dingel 		r = kvm_s390_vm_has_attr(kvm, &attr);
1966f2061656SDominik Dingel 		break;
1967f2061656SDominik Dingel 	}
196830ee2a98SJason J. Herne 	case KVM_S390_GET_SKEYS: {
196930ee2a98SJason J. Herne 		struct kvm_s390_skeys args;
197030ee2a98SJason J. Herne 
197130ee2a98SJason J. Herne 		r = -EFAULT;
197230ee2a98SJason J. Herne 		if (copy_from_user(&args, argp,
197330ee2a98SJason J. Herne 				   sizeof(struct kvm_s390_skeys)))
197430ee2a98SJason J. Herne 			break;
197530ee2a98SJason J. Herne 		r = kvm_s390_get_skeys(kvm, &args);
197630ee2a98SJason J. Herne 		break;
197730ee2a98SJason J. Herne 	}
197830ee2a98SJason J. Herne 	case KVM_S390_SET_SKEYS: {
197930ee2a98SJason J. Herne 		struct kvm_s390_skeys args;
198030ee2a98SJason J. Herne 
198130ee2a98SJason J. Herne 		r = -EFAULT;
198230ee2a98SJason J. Herne 		if (copy_from_user(&args, argp,
198330ee2a98SJason J. Herne 				   sizeof(struct kvm_s390_skeys)))
198430ee2a98SJason J. Herne 			break;
198530ee2a98SJason J. Herne 		r = kvm_s390_set_skeys(kvm, &args);
198630ee2a98SJason J. Herne 		break;
198730ee2a98SJason J. Herne 	}
19884036e387SClaudio Imbrenda 	case KVM_S390_GET_CMMA_BITS: {
19894036e387SClaudio Imbrenda 		struct kvm_s390_cmma_log args;
19904036e387SClaudio Imbrenda 
19914036e387SClaudio Imbrenda 		r = -EFAULT;
19924036e387SClaudio Imbrenda 		if (copy_from_user(&args, argp, sizeof(args)))
19934036e387SClaudio Imbrenda 			break;
19941de1ea7eSChristian Borntraeger 		mutex_lock(&kvm->slots_lock);
19954036e387SClaudio Imbrenda 		r = kvm_s390_get_cmma_bits(kvm, &args);
19961de1ea7eSChristian Borntraeger 		mutex_unlock(&kvm->slots_lock);
19974036e387SClaudio Imbrenda 		if (!r) {
19984036e387SClaudio Imbrenda 			r = copy_to_user(argp, &args, sizeof(args));
19994036e387SClaudio Imbrenda 			if (r)
20004036e387SClaudio Imbrenda 				r = -EFAULT;
20014036e387SClaudio Imbrenda 		}
20024036e387SClaudio Imbrenda 		break;
20034036e387SClaudio Imbrenda 	}
20044036e387SClaudio Imbrenda 	case KVM_S390_SET_CMMA_BITS: {
20054036e387SClaudio Imbrenda 		struct kvm_s390_cmma_log args;
20064036e387SClaudio Imbrenda 
20074036e387SClaudio Imbrenda 		r = -EFAULT;
20084036e387SClaudio Imbrenda 		if (copy_from_user(&args, argp, sizeof(args)))
20094036e387SClaudio Imbrenda 			break;
20101de1ea7eSChristian Borntraeger 		mutex_lock(&kvm->slots_lock);
20114036e387SClaudio Imbrenda 		r = kvm_s390_set_cmma_bits(kvm, &args);
20121de1ea7eSChristian Borntraeger 		mutex_unlock(&kvm->slots_lock);
20134036e387SClaudio Imbrenda 		break;
20144036e387SClaudio Imbrenda 	}
2015b0c632dbSHeiko Carstens 	default:
2016367e1319SAvi Kivity 		r = -ENOTTY;
2017b0c632dbSHeiko Carstens 	}
2018b0c632dbSHeiko Carstens 
2019b0c632dbSHeiko Carstens 	return r;
2020b0c632dbSHeiko Carstens }
2021b0c632dbSHeiko Carstens 
202245c9b47cSTony Krowiak static int kvm_s390_apxa_installed(void)
202345c9b47cSTony Krowiak {
2024e585b24aSTony Krowiak 	struct ap_config_info info;
202545c9b47cSTony Krowiak 
2026e585b24aSTony Krowiak 	if (ap_instructions_available()) {
2027e585b24aSTony Krowiak 		if (ap_qci(&info) == 0)
2028e585b24aSTony Krowiak 			return info.apxa;
202945c9b47cSTony Krowiak 	}
203045c9b47cSTony Krowiak 
203145c9b47cSTony Krowiak 	return 0;
203245c9b47cSTony Krowiak }
203345c9b47cSTony Krowiak 
2034e585b24aSTony Krowiak /*
2035e585b24aSTony Krowiak  * The format of the crypto control block (CRYCB) is specified in the 3 low
2036e585b24aSTony Krowiak  * order bits of the CRYCB designation (CRYCBD) field as follows:
2037e585b24aSTony Krowiak  * Format 0: Neither the message security assist extension 3 (MSAX3) nor the
2038e585b24aSTony Krowiak  *	     AP extended addressing (APXA) facility are installed.
2039e585b24aSTony Krowiak  * Format 1: The APXA facility is not installed but the MSAX3 facility is.
2040e585b24aSTony Krowiak  * Format 2: Both the APXA and MSAX3 facilities are installed
2041e585b24aSTony Krowiak  */
204245c9b47cSTony Krowiak static void kvm_s390_set_crycb_format(struct kvm *kvm)
204345c9b47cSTony Krowiak {
204445c9b47cSTony Krowiak 	kvm->arch.crypto.crycbd = (__u32)(unsigned long) kvm->arch.crypto.crycb;
204545c9b47cSTony Krowiak 
2046e585b24aSTony Krowiak 	/* Clear the CRYCB format bits - i.e., set format 0 by default */
2047e585b24aSTony Krowiak 	kvm->arch.crypto.crycbd &= ~(CRYCB_FORMAT_MASK);
2048e585b24aSTony Krowiak 
2049e585b24aSTony Krowiak 	/* Check whether MSAX3 is installed */
2050e585b24aSTony Krowiak 	if (!test_kvm_facility(kvm, 76))
2051e585b24aSTony Krowiak 		return;
2052e585b24aSTony Krowiak 
205345c9b47cSTony Krowiak 	if (kvm_s390_apxa_installed())
205445c9b47cSTony Krowiak 		kvm->arch.crypto.crycbd |= CRYCB_FORMAT2;
205545c9b47cSTony Krowiak 	else
205645c9b47cSTony Krowiak 		kvm->arch.crypto.crycbd |= CRYCB_FORMAT1;
205745c9b47cSTony Krowiak }
205845c9b47cSTony Krowiak 
205942104598STony Krowiak void kvm_arch_crypto_clear_masks(struct kvm *kvm)
206042104598STony Krowiak {
206142104598STony Krowiak 	mutex_lock(&kvm->lock);
206242104598STony Krowiak 	kvm_s390_vcpu_block_all(kvm);
206342104598STony Krowiak 
206442104598STony Krowiak 	memset(&kvm->arch.crypto.crycb->apcb0, 0,
206542104598STony Krowiak 	       sizeof(kvm->arch.crypto.crycb->apcb0));
206642104598STony Krowiak 	memset(&kvm->arch.crypto.crycb->apcb1, 0,
206742104598STony Krowiak 	       sizeof(kvm->arch.crypto.crycb->apcb1));
206842104598STony Krowiak 
20696cc571b1SPierre Morel 	/* recreate the shadow crycb for each vcpu */
20706cc571b1SPierre Morel 	kvm_s390_sync_request_broadcast(kvm, KVM_REQ_VSIE_RESTART);
207142104598STony Krowiak 	kvm_s390_vcpu_unblock_all(kvm);
207242104598STony Krowiak 	mutex_unlock(&kvm->lock);
207342104598STony Krowiak }
207442104598STony Krowiak EXPORT_SYMBOL_GPL(kvm_arch_crypto_clear_masks);
207542104598STony Krowiak 
20769bb0ec09SDavid Hildenbrand static u64 kvm_s390_get_initial_cpuid(void)
20779d8d5786SMichael Mueller {
20789bb0ec09SDavid Hildenbrand 	struct cpuid cpuid;
20799bb0ec09SDavid Hildenbrand 
20809bb0ec09SDavid Hildenbrand 	get_cpu_id(&cpuid);
20819bb0ec09SDavid Hildenbrand 	cpuid.version = 0xff;
20829bb0ec09SDavid Hildenbrand 	return *((u64 *) &cpuid);
20839d8d5786SMichael Mueller }
20849d8d5786SMichael Mueller 
2085c54f0d6aSDavid Hildenbrand static void kvm_s390_crypto_init(struct kvm *kvm)
20865102ee87STony Krowiak {
2087c54f0d6aSDavid Hildenbrand 	kvm->arch.crypto.crycb = &kvm->arch.sie_page2->crycb;
208845c9b47cSTony Krowiak 	kvm_s390_set_crycb_format(kvm);
20895102ee87STony Krowiak 
2090e585b24aSTony Krowiak 	if (!test_kvm_facility(kvm, 76))
2091e585b24aSTony Krowiak 		return;
2092e585b24aSTony Krowiak 
2093ed6f76b4STony Krowiak 	/* Enable AES/DEA protected key functions by default */
2094ed6f76b4STony Krowiak 	kvm->arch.crypto.aes_kw = 1;
2095ed6f76b4STony Krowiak 	kvm->arch.crypto.dea_kw = 1;
2096ed6f76b4STony Krowiak 	get_random_bytes(kvm->arch.crypto.crycb->aes_wrapping_key_mask,
2097ed6f76b4STony Krowiak 			 sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask));
2098ed6f76b4STony Krowiak 	get_random_bytes(kvm->arch.crypto.crycb->dea_wrapping_key_mask,
2099ed6f76b4STony Krowiak 			 sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask));
21005102ee87STony Krowiak }
21015102ee87STony Krowiak 
21027d43bafcSEugene (jno) Dvurechenski static void sca_dispose(struct kvm *kvm)
21037d43bafcSEugene (jno) Dvurechenski {
21047d43bafcSEugene (jno) Dvurechenski 	if (kvm->arch.use_esca)
21055e044315SEugene (jno) Dvurechenski 		free_pages_exact(kvm->arch.sca, sizeof(struct esca_block));
21067d43bafcSEugene (jno) Dvurechenski 	else
21077d43bafcSEugene (jno) Dvurechenski 		free_page((unsigned long)(kvm->arch.sca));
21087d43bafcSEugene (jno) Dvurechenski 	kvm->arch.sca = NULL;
21097d43bafcSEugene (jno) Dvurechenski }
21107d43bafcSEugene (jno) Dvurechenski 
2111e08b9637SCarsten Otte int kvm_arch_init_vm(struct kvm *kvm, unsigned long type)
2112b0c632dbSHeiko Carstens {
211376a6dd72SDavid Hildenbrand 	gfp_t alloc_flags = GFP_KERNEL;
21149d8d5786SMichael Mueller 	int i, rc;
2115b0c632dbSHeiko Carstens 	char debug_name[16];
2116f6c137ffSChristian Borntraeger 	static unsigned long sca_offset;
2117b0c632dbSHeiko Carstens 
2118e08b9637SCarsten Otte 	rc = -EINVAL;
2119e08b9637SCarsten Otte #ifdef CONFIG_KVM_S390_UCONTROL
2120e08b9637SCarsten Otte 	if (type & ~KVM_VM_S390_UCONTROL)
2121e08b9637SCarsten Otte 		goto out_err;
2122e08b9637SCarsten Otte 	if ((type & KVM_VM_S390_UCONTROL) && (!capable(CAP_SYS_ADMIN)))
2123e08b9637SCarsten Otte 		goto out_err;
2124e08b9637SCarsten Otte #else
2125e08b9637SCarsten Otte 	if (type)
2126e08b9637SCarsten Otte 		goto out_err;
2127e08b9637SCarsten Otte #endif
2128e08b9637SCarsten Otte 
2129b0c632dbSHeiko Carstens 	rc = s390_enable_sie();
2130b0c632dbSHeiko Carstens 	if (rc)
2131d89f5effSJan Kiszka 		goto out_err;
2132b0c632dbSHeiko Carstens 
2133b290411aSCarsten Otte 	rc = -ENOMEM;
2134b290411aSCarsten Otte 
213576a6dd72SDavid Hildenbrand 	if (!sclp.has_64bscao)
213676a6dd72SDavid Hildenbrand 		alloc_flags |= GFP_DMA;
21375e044315SEugene (jno) Dvurechenski 	rwlock_init(&kvm->arch.sca_lock);
21389ac96d75SDavid Hildenbrand 	/* start with basic SCA */
213976a6dd72SDavid Hildenbrand 	kvm->arch.sca = (struct bsca_block *) get_zeroed_page(alloc_flags);
2140b0c632dbSHeiko Carstens 	if (!kvm->arch.sca)
2141d89f5effSJan Kiszka 		goto out_err;
2142f6c137ffSChristian Borntraeger 	spin_lock(&kvm_lock);
2143c5c2c393SDavid Hildenbrand 	sca_offset += 16;
2144bc784cceSEugene (jno) Dvurechenski 	if (sca_offset + sizeof(struct bsca_block) > PAGE_SIZE)
2145c5c2c393SDavid Hildenbrand 		sca_offset = 0;
2146bc784cceSEugene (jno) Dvurechenski 	kvm->arch.sca = (struct bsca_block *)
2147bc784cceSEugene (jno) Dvurechenski 			((char *) kvm->arch.sca + sca_offset);
2148f6c137ffSChristian Borntraeger 	spin_unlock(&kvm_lock);
2149b0c632dbSHeiko Carstens 
2150b0c632dbSHeiko Carstens 	sprintf(debug_name, "kvm-%u", current->pid);
2151b0c632dbSHeiko Carstens 
21521cb9cf72SChristian Borntraeger 	kvm->arch.dbf = debug_register(debug_name, 32, 1, 7 * sizeof(long));
2153b0c632dbSHeiko Carstens 	if (!kvm->arch.dbf)
215440f5b735SDominik Dingel 		goto out_err;
2155b0c632dbSHeiko Carstens 
215619114bebSMichael Mueller 	BUILD_BUG_ON(sizeof(struct sie_page2) != 4096);
2157c54f0d6aSDavid Hildenbrand 	kvm->arch.sie_page2 =
2158c54f0d6aSDavid Hildenbrand 	     (struct sie_page2 *) get_zeroed_page(GFP_KERNEL | GFP_DMA);
2159c54f0d6aSDavid Hildenbrand 	if (!kvm->arch.sie_page2)
216040f5b735SDominik Dingel 		goto out_err;
21619d8d5786SMichael Mueller 
2162c54f0d6aSDavid Hildenbrand 	kvm->arch.model.fac_list = kvm->arch.sie_page2->fac_list;
2163c3b9e3e1SChristian Borntraeger 
2164c3b9e3e1SChristian Borntraeger 	for (i = 0; i < kvm_s390_fac_size(); i++) {
2165c3b9e3e1SChristian Borntraeger 		kvm->arch.model.fac_mask[i] = S390_lowcore.stfle_fac_list[i] &
2166c3b9e3e1SChristian Borntraeger 					      (kvm_s390_fac_base[i] |
2167c3b9e3e1SChristian Borntraeger 					       kvm_s390_fac_ext[i]);
2168c3b9e3e1SChristian Borntraeger 		kvm->arch.model.fac_list[i] = S390_lowcore.stfle_fac_list[i] &
2169c3b9e3e1SChristian Borntraeger 					      kvm_s390_fac_base[i];
2170c3b9e3e1SChristian Borntraeger 	}
2171981467c9SMichael Mueller 
21721935222dSDavid Hildenbrand 	/* we are always in czam mode - even on pre z14 machines */
21731935222dSDavid Hildenbrand 	set_kvm_facility(kvm->arch.model.fac_mask, 138);
21741935222dSDavid Hildenbrand 	set_kvm_facility(kvm->arch.model.fac_list, 138);
21751935222dSDavid Hildenbrand 	/* we emulate STHYI in kvm */
217695ca2cb5SJanosch Frank 	set_kvm_facility(kvm->arch.model.fac_mask, 74);
217795ca2cb5SJanosch Frank 	set_kvm_facility(kvm->arch.model.fac_list, 74);
21781bab1c02SClaudio Imbrenda 	if (MACHINE_HAS_TLB_GUEST) {
21791bab1c02SClaudio Imbrenda 		set_kvm_facility(kvm->arch.model.fac_mask, 147);
21801bab1c02SClaudio Imbrenda 		set_kvm_facility(kvm->arch.model.fac_list, 147);
21811bab1c02SClaudio Imbrenda 	}
218295ca2cb5SJanosch Frank 
21839bb0ec09SDavid Hildenbrand 	kvm->arch.model.cpuid = kvm_s390_get_initial_cpuid();
218437c5f6c8SDavid Hildenbrand 	kvm->arch.model.ibc = sclp.ibc & 0x0fff;
21859d8d5786SMichael Mueller 
2186c54f0d6aSDavid Hildenbrand 	kvm_s390_crypto_init(kvm);
21875102ee87STony Krowiak 
218851978393SFei Li 	mutex_init(&kvm->arch.float_int.ais_lock);
2189ba5c1e9bSCarsten Otte 	spin_lock_init(&kvm->arch.float_int.lock);
21906d3da241SJens Freimann 	for (i = 0; i < FIRQ_LIST_COUNT; i++)
21916d3da241SJens Freimann 		INIT_LIST_HEAD(&kvm->arch.float_int.lists[i]);
21928a242234SHeiko Carstens 	init_waitqueue_head(&kvm->arch.ipte_wq);
2193a6b7e459SThomas Huth 	mutex_init(&kvm->arch.ipte_mutex);
2194ba5c1e9bSCarsten Otte 
2195b0c632dbSHeiko Carstens 	debug_register_view(kvm->arch.dbf, &debug_sprintf_view);
219678f26131SChristian Borntraeger 	VM_EVENT(kvm, 3, "vm created with type %lu", type);
2197b0c632dbSHeiko Carstens 
2198e08b9637SCarsten Otte 	if (type & KVM_VM_S390_UCONTROL) {
2199e08b9637SCarsten Otte 		kvm->arch.gmap = NULL;
2200a3a92c31SDominik Dingel 		kvm->arch.mem_limit = KVM_S390_NO_MEM_LIMIT;
2201e08b9637SCarsten Otte 	} else {
220232e6b236SGuenther Hutzl 		if (sclp.hamax == U64_MAX)
2203ee71d16dSMartin Schwidefsky 			kvm->arch.mem_limit = TASK_SIZE_MAX;
220432e6b236SGuenther Hutzl 		else
2205ee71d16dSMartin Schwidefsky 			kvm->arch.mem_limit = min_t(unsigned long, TASK_SIZE_MAX,
220632e6b236SGuenther Hutzl 						    sclp.hamax + 1);
22076ea427bbSMartin Schwidefsky 		kvm->arch.gmap = gmap_create(current->mm, kvm->arch.mem_limit - 1);
2208598841caSCarsten Otte 		if (!kvm->arch.gmap)
220940f5b735SDominik Dingel 			goto out_err;
22102c70fe44SChristian Borntraeger 		kvm->arch.gmap->private = kvm;
221124eb3a82SDominik Dingel 		kvm->arch.gmap->pfault_enabled = 0;
2212e08b9637SCarsten Otte 	}
2213fa6b7fe9SCornelia Huck 
2214c9f0a2b8SJanosch Frank 	kvm->arch.use_pfmfi = sclp.has_pfmfi;
221555531b74SJanosch Frank 	kvm->arch.use_skf = sclp.has_skey;
22168ad35755SDavid Hildenbrand 	spin_lock_init(&kvm->arch.start_stop_lock);
2217a3508fbeSDavid Hildenbrand 	kvm_s390_vsie_init(kvm);
2218d7c5cb01SMichael Mueller 	kvm_s390_gisa_init(kvm);
22198335713aSChristian Borntraeger 	KVM_EVENT(3, "vm 0x%pK created by pid %u", kvm, current->pid);
22208ad35755SDavid Hildenbrand 
2221d89f5effSJan Kiszka 	return 0;
2222d89f5effSJan Kiszka out_err:
2223c54f0d6aSDavid Hildenbrand 	free_page((unsigned long)kvm->arch.sie_page2);
222440f5b735SDominik Dingel 	debug_unregister(kvm->arch.dbf);
22257d43bafcSEugene (jno) Dvurechenski 	sca_dispose(kvm);
222678f26131SChristian Borntraeger 	KVM_EVENT(3, "creation of vm failed: %d", rc);
2227d89f5effSJan Kiszka 	return rc;
2228b0c632dbSHeiko Carstens }
2229b0c632dbSHeiko Carstens 
2230235539b4SLuiz Capitulino bool kvm_arch_has_vcpu_debugfs(void)
2231235539b4SLuiz Capitulino {
2232235539b4SLuiz Capitulino 	return false;
2233235539b4SLuiz Capitulino }
2234235539b4SLuiz Capitulino 
2235235539b4SLuiz Capitulino int kvm_arch_create_vcpu_debugfs(struct kvm_vcpu *vcpu)
2236235539b4SLuiz Capitulino {
2237235539b4SLuiz Capitulino 	return 0;
2238235539b4SLuiz Capitulino }
2239235539b4SLuiz Capitulino 
2240d329c035SChristian Borntraeger void kvm_arch_vcpu_destroy(struct kvm_vcpu *vcpu)
2241d329c035SChristian Borntraeger {
2242d329c035SChristian Borntraeger 	VCPU_EVENT(vcpu, 3, "%s", "free cpu");
2243ade38c31SCornelia Huck 	trace_kvm_s390_destroy_vcpu(vcpu->vcpu_id);
224467335e63SChristian Borntraeger 	kvm_s390_clear_local_irqs(vcpu);
22453c038e6bSDominik Dingel 	kvm_clear_async_pf_completion_queue(vcpu);
2246bc784cceSEugene (jno) Dvurechenski 	if (!kvm_is_ucontrol(vcpu->kvm))
2247a6e2f683SEugene (jno) Dvurechenski 		sca_del_vcpu(vcpu);
224827e0393fSCarsten Otte 
224927e0393fSCarsten Otte 	if (kvm_is_ucontrol(vcpu->kvm))
22506ea427bbSMartin Schwidefsky 		gmap_remove(vcpu->arch.gmap);
225127e0393fSCarsten Otte 
2252e6db1d61SDominik Dingel 	if (vcpu->kvm->arch.use_cmma)
2253b31605c1SDominik Dingel 		kvm_s390_vcpu_unsetup_cmma(vcpu);
2254d329c035SChristian Borntraeger 	free_page((unsigned long)(vcpu->arch.sie_block));
2255b31288faSKonstantin Weitz 
22566692cef3SChristian Borntraeger 	kvm_vcpu_uninit(vcpu);
2257b110feafSMichael Mueller 	kmem_cache_free(kvm_vcpu_cache, vcpu);
2258d329c035SChristian Borntraeger }
2259d329c035SChristian Borntraeger 
2260d329c035SChristian Borntraeger static void kvm_free_vcpus(struct kvm *kvm)
2261d329c035SChristian Borntraeger {
2262d329c035SChristian Borntraeger 	unsigned int i;
2263988a2caeSGleb Natapov 	struct kvm_vcpu *vcpu;
2264d329c035SChristian Borntraeger 
2265988a2caeSGleb Natapov 	kvm_for_each_vcpu(i, vcpu, kvm)
2266988a2caeSGleb Natapov 		kvm_arch_vcpu_destroy(vcpu);
2267988a2caeSGleb Natapov 
2268988a2caeSGleb Natapov 	mutex_lock(&kvm->lock);
2269988a2caeSGleb Natapov 	for (i = 0; i < atomic_read(&kvm->online_vcpus); i++)
2270d329c035SChristian Borntraeger 		kvm->vcpus[i] = NULL;
2271988a2caeSGleb Natapov 
2272988a2caeSGleb Natapov 	atomic_set(&kvm->online_vcpus, 0);
2273988a2caeSGleb Natapov 	mutex_unlock(&kvm->lock);
2274d329c035SChristian Borntraeger }
2275d329c035SChristian Borntraeger 
2276b0c632dbSHeiko Carstens void kvm_arch_destroy_vm(struct kvm *kvm)
2277b0c632dbSHeiko Carstens {
2278d329c035SChristian Borntraeger 	kvm_free_vcpus(kvm);
22797d43bafcSEugene (jno) Dvurechenski 	sca_dispose(kvm);
2280d329c035SChristian Borntraeger 	debug_unregister(kvm->arch.dbf);
2281d7c5cb01SMichael Mueller 	kvm_s390_gisa_destroy(kvm);
2282c54f0d6aSDavid Hildenbrand 	free_page((unsigned long)kvm->arch.sie_page2);
228327e0393fSCarsten Otte 	if (!kvm_is_ucontrol(kvm))
22846ea427bbSMartin Schwidefsky 		gmap_remove(kvm->arch.gmap);
2285841b91c5SCornelia Huck 	kvm_s390_destroy_adapters(kvm);
228667335e63SChristian Borntraeger 	kvm_s390_clear_float_irqs(kvm);
2287a3508fbeSDavid Hildenbrand 	kvm_s390_vsie_destroy(kvm);
22888335713aSChristian Borntraeger 	KVM_EVENT(3, "vm 0x%pK destroyed", kvm);
2289b0c632dbSHeiko Carstens }
2290b0c632dbSHeiko Carstens 
2291b0c632dbSHeiko Carstens /* Section: vcpu related */
2292dafd032aSDominik Dingel static int __kvm_ucontrol_vcpu_init(struct kvm_vcpu *vcpu)
2293b0c632dbSHeiko Carstens {
22946ea427bbSMartin Schwidefsky 	vcpu->arch.gmap = gmap_create(current->mm, -1UL);
229527e0393fSCarsten Otte 	if (!vcpu->arch.gmap)
229627e0393fSCarsten Otte 		return -ENOMEM;
22972c70fe44SChristian Borntraeger 	vcpu->arch.gmap->private = vcpu->kvm;
2298dafd032aSDominik Dingel 
229927e0393fSCarsten Otte 	return 0;
230027e0393fSCarsten Otte }
230127e0393fSCarsten Otte 
2302a6e2f683SEugene (jno) Dvurechenski static void sca_del_vcpu(struct kvm_vcpu *vcpu)
2303a6e2f683SEugene (jno) Dvurechenski {
2304a6940674SDavid Hildenbrand 	if (!kvm_s390_use_sca_entries())
2305a6940674SDavid Hildenbrand 		return;
23065e044315SEugene (jno) Dvurechenski 	read_lock(&vcpu->kvm->arch.sca_lock);
23077d43bafcSEugene (jno) Dvurechenski 	if (vcpu->kvm->arch.use_esca) {
23087d43bafcSEugene (jno) Dvurechenski 		struct esca_block *sca = vcpu->kvm->arch.sca;
23097d43bafcSEugene (jno) Dvurechenski 
23107d43bafcSEugene (jno) Dvurechenski 		clear_bit_inv(vcpu->vcpu_id, (unsigned long *) sca->mcn);
23117d43bafcSEugene (jno) Dvurechenski 		sca->cpu[vcpu->vcpu_id].sda = 0;
23127d43bafcSEugene (jno) Dvurechenski 	} else {
2313bc784cceSEugene (jno) Dvurechenski 		struct bsca_block *sca = vcpu->kvm->arch.sca;
2314a6e2f683SEugene (jno) Dvurechenski 
2315a6e2f683SEugene (jno) Dvurechenski 		clear_bit_inv(vcpu->vcpu_id, (unsigned long *) &sca->mcn);
2316a6e2f683SEugene (jno) Dvurechenski 		sca->cpu[vcpu->vcpu_id].sda = 0;
2317a6e2f683SEugene (jno) Dvurechenski 	}
23185e044315SEugene (jno) Dvurechenski 	read_unlock(&vcpu->kvm->arch.sca_lock);
23197d43bafcSEugene (jno) Dvurechenski }
2320a6e2f683SEugene (jno) Dvurechenski 
2321eaa78f34SDavid Hildenbrand static void sca_add_vcpu(struct kvm_vcpu *vcpu)
2322a6e2f683SEugene (jno) Dvurechenski {
2323a6940674SDavid Hildenbrand 	if (!kvm_s390_use_sca_entries()) {
2324a6940674SDavid Hildenbrand 		struct bsca_block *sca = vcpu->kvm->arch.sca;
2325a6940674SDavid Hildenbrand 
2326a6940674SDavid Hildenbrand 		/* we still need the basic sca for the ipte control */
2327a6940674SDavid Hildenbrand 		vcpu->arch.sie_block->scaoh = (__u32)(((__u64)sca) >> 32);
2328a6940674SDavid Hildenbrand 		vcpu->arch.sie_block->scaol = (__u32)(__u64)sca;
2329f07afa04SDavid Hildenbrand 		return;
2330a6940674SDavid Hildenbrand 	}
2331eaa78f34SDavid Hildenbrand 	read_lock(&vcpu->kvm->arch.sca_lock);
2332eaa78f34SDavid Hildenbrand 	if (vcpu->kvm->arch.use_esca) {
2333eaa78f34SDavid Hildenbrand 		struct esca_block *sca = vcpu->kvm->arch.sca;
23347d43bafcSEugene (jno) Dvurechenski 
2335eaa78f34SDavid Hildenbrand 		sca->cpu[vcpu->vcpu_id].sda = (__u64) vcpu->arch.sie_block;
23367d43bafcSEugene (jno) Dvurechenski 		vcpu->arch.sie_block->scaoh = (__u32)(((__u64)sca) >> 32);
23377d43bafcSEugene (jno) Dvurechenski 		vcpu->arch.sie_block->scaol = (__u32)(__u64)sca & ~0x3fU;
23380c9d8683SDavid Hildenbrand 		vcpu->arch.sie_block->ecb2 |= ECB2_ESCA;
2339eaa78f34SDavid Hildenbrand 		set_bit_inv(vcpu->vcpu_id, (unsigned long *) sca->mcn);
23407d43bafcSEugene (jno) Dvurechenski 	} else {
2341eaa78f34SDavid Hildenbrand 		struct bsca_block *sca = vcpu->kvm->arch.sca;
2342a6e2f683SEugene (jno) Dvurechenski 
2343eaa78f34SDavid Hildenbrand 		sca->cpu[vcpu->vcpu_id].sda = (__u64) vcpu->arch.sie_block;
2344a6e2f683SEugene (jno) Dvurechenski 		vcpu->arch.sie_block->scaoh = (__u32)(((__u64)sca) >> 32);
2345a6e2f683SEugene (jno) Dvurechenski 		vcpu->arch.sie_block->scaol = (__u32)(__u64)sca;
2346eaa78f34SDavid Hildenbrand 		set_bit_inv(vcpu->vcpu_id, (unsigned long *) &sca->mcn);
2347a6e2f683SEugene (jno) Dvurechenski 	}
2348eaa78f34SDavid Hildenbrand 	read_unlock(&vcpu->kvm->arch.sca_lock);
23495e044315SEugene (jno) Dvurechenski }
23505e044315SEugene (jno) Dvurechenski 
23515e044315SEugene (jno) Dvurechenski /* Basic SCA to Extended SCA data copy routines */
23525e044315SEugene (jno) Dvurechenski static inline void sca_copy_entry(struct esca_entry *d, struct bsca_entry *s)
23535e044315SEugene (jno) Dvurechenski {
23545e044315SEugene (jno) Dvurechenski 	d->sda = s->sda;
23555e044315SEugene (jno) Dvurechenski 	d->sigp_ctrl.c = s->sigp_ctrl.c;
23565e044315SEugene (jno) Dvurechenski 	d->sigp_ctrl.scn = s->sigp_ctrl.scn;
23575e044315SEugene (jno) Dvurechenski }
23585e044315SEugene (jno) Dvurechenski 
23595e044315SEugene (jno) Dvurechenski static void sca_copy_b_to_e(struct esca_block *d, struct bsca_block *s)
23605e044315SEugene (jno) Dvurechenski {
23615e044315SEugene (jno) Dvurechenski 	int i;
23625e044315SEugene (jno) Dvurechenski 
23635e044315SEugene (jno) Dvurechenski 	d->ipte_control = s->ipte_control;
23645e044315SEugene (jno) Dvurechenski 	d->mcn[0] = s->mcn;
23655e044315SEugene (jno) Dvurechenski 	for (i = 0; i < KVM_S390_BSCA_CPU_SLOTS; i++)
23665e044315SEugene (jno) Dvurechenski 		sca_copy_entry(&d->cpu[i], &s->cpu[i]);
23675e044315SEugene (jno) Dvurechenski }
23685e044315SEugene (jno) Dvurechenski 
23695e044315SEugene (jno) Dvurechenski static int sca_switch_to_extended(struct kvm *kvm)
23705e044315SEugene (jno) Dvurechenski {
23715e044315SEugene (jno) Dvurechenski 	struct bsca_block *old_sca = kvm->arch.sca;
23725e044315SEugene (jno) Dvurechenski 	struct esca_block *new_sca;
23735e044315SEugene (jno) Dvurechenski 	struct kvm_vcpu *vcpu;
23745e044315SEugene (jno) Dvurechenski 	unsigned int vcpu_idx;
23755e044315SEugene (jno) Dvurechenski 	u32 scaol, scaoh;
23765e044315SEugene (jno) Dvurechenski 
23775e044315SEugene (jno) Dvurechenski 	new_sca = alloc_pages_exact(sizeof(*new_sca), GFP_KERNEL|__GFP_ZERO);
23785e044315SEugene (jno) Dvurechenski 	if (!new_sca)
23795e044315SEugene (jno) Dvurechenski 		return -ENOMEM;
23805e044315SEugene (jno) Dvurechenski 
23815e044315SEugene (jno) Dvurechenski 	scaoh = (u32)((u64)(new_sca) >> 32);
23825e044315SEugene (jno) Dvurechenski 	scaol = (u32)(u64)(new_sca) & ~0x3fU;
23835e044315SEugene (jno) Dvurechenski 
23845e044315SEugene (jno) Dvurechenski 	kvm_s390_vcpu_block_all(kvm);
23855e044315SEugene (jno) Dvurechenski 	write_lock(&kvm->arch.sca_lock);
23865e044315SEugene (jno) Dvurechenski 
23875e044315SEugene (jno) Dvurechenski 	sca_copy_b_to_e(new_sca, old_sca);
23885e044315SEugene (jno) Dvurechenski 
23895e044315SEugene (jno) Dvurechenski 	kvm_for_each_vcpu(vcpu_idx, vcpu, kvm) {
23905e044315SEugene (jno) Dvurechenski 		vcpu->arch.sie_block->scaoh = scaoh;
23915e044315SEugene (jno) Dvurechenski 		vcpu->arch.sie_block->scaol = scaol;
23920c9d8683SDavid Hildenbrand 		vcpu->arch.sie_block->ecb2 |= ECB2_ESCA;
23935e044315SEugene (jno) Dvurechenski 	}
23945e044315SEugene (jno) Dvurechenski 	kvm->arch.sca = new_sca;
23955e044315SEugene (jno) Dvurechenski 	kvm->arch.use_esca = 1;
23965e044315SEugene (jno) Dvurechenski 
23975e044315SEugene (jno) Dvurechenski 	write_unlock(&kvm->arch.sca_lock);
23985e044315SEugene (jno) Dvurechenski 	kvm_s390_vcpu_unblock_all(kvm);
23995e044315SEugene (jno) Dvurechenski 
24005e044315SEugene (jno) Dvurechenski 	free_page((unsigned long)old_sca);
24015e044315SEugene (jno) Dvurechenski 
24028335713aSChristian Borntraeger 	VM_EVENT(kvm, 2, "Switched to ESCA (0x%pK -> 0x%pK)",
24038335713aSChristian Borntraeger 		 old_sca, kvm->arch.sca);
24045e044315SEugene (jno) Dvurechenski 	return 0;
24057d43bafcSEugene (jno) Dvurechenski }
2406a6e2f683SEugene (jno) Dvurechenski 
2407a6e2f683SEugene (jno) Dvurechenski static int sca_can_add_vcpu(struct kvm *kvm, unsigned int id)
2408a6e2f683SEugene (jno) Dvurechenski {
24095e044315SEugene (jno) Dvurechenski 	int rc;
24105e044315SEugene (jno) Dvurechenski 
2411a6940674SDavid Hildenbrand 	if (!kvm_s390_use_sca_entries()) {
2412a6940674SDavid Hildenbrand 		if (id < KVM_MAX_VCPUS)
2413a6940674SDavid Hildenbrand 			return true;
2414a6940674SDavid Hildenbrand 		return false;
2415a6940674SDavid Hildenbrand 	}
24165e044315SEugene (jno) Dvurechenski 	if (id < KVM_S390_BSCA_CPU_SLOTS)
24175e044315SEugene (jno) Dvurechenski 		return true;
241876a6dd72SDavid Hildenbrand 	if (!sclp.has_esca || !sclp.has_64bscao)
24195e044315SEugene (jno) Dvurechenski 		return false;
24205e044315SEugene (jno) Dvurechenski 
24215e044315SEugene (jno) Dvurechenski 	mutex_lock(&kvm->lock);
24225e044315SEugene (jno) Dvurechenski 	rc = kvm->arch.use_esca ? 0 : sca_switch_to_extended(kvm);
24235e044315SEugene (jno) Dvurechenski 	mutex_unlock(&kvm->lock);
24245e044315SEugene (jno) Dvurechenski 
24255e044315SEugene (jno) Dvurechenski 	return rc == 0 && id < KVM_S390_ESCA_CPU_SLOTS;
2426a6e2f683SEugene (jno) Dvurechenski }
2427a6e2f683SEugene (jno) Dvurechenski 
2428dafd032aSDominik Dingel int kvm_arch_vcpu_init(struct kvm_vcpu *vcpu)
2429dafd032aSDominik Dingel {
2430dafd032aSDominik Dingel 	vcpu->arch.pfault_token = KVM_S390_PFAULT_TOKEN_INVALID;
2431dafd032aSDominik Dingel 	kvm_clear_async_pf_completion_queue(vcpu);
243259674c1aSChristian Borntraeger 	vcpu->run->kvm_valid_regs = KVM_SYNC_PREFIX |
243359674c1aSChristian Borntraeger 				    KVM_SYNC_GPRS |
24349eed0735SChristian Borntraeger 				    KVM_SYNC_ACRS |
2435b028ee3eSDavid Hildenbrand 				    KVM_SYNC_CRS |
2436b028ee3eSDavid Hildenbrand 				    KVM_SYNC_ARCH0 |
2437b028ee3eSDavid Hildenbrand 				    KVM_SYNC_PFAULT;
243875a4615cSJulius Niedworok 	kvm_s390_set_prefix(vcpu, 0);
2439c6e5f166SFan Zhang 	if (test_kvm_facility(vcpu->kvm, 64))
2440c6e5f166SFan Zhang 		vcpu->run->kvm_valid_regs |= KVM_SYNC_RICCB;
244135b3fde6SChristian Borntraeger 	if (test_kvm_facility(vcpu->kvm, 82))
244235b3fde6SChristian Borntraeger 		vcpu->run->kvm_valid_regs |= KVM_SYNC_BPBC;
24434e0b1ab7SFan Zhang 	if (test_kvm_facility(vcpu->kvm, 133))
24444e0b1ab7SFan Zhang 		vcpu->run->kvm_valid_regs |= KVM_SYNC_GSCB;
2445a3da7b4aSChristian Borntraeger 	if (test_kvm_facility(vcpu->kvm, 156))
2446a3da7b4aSChristian Borntraeger 		vcpu->run->kvm_valid_regs |= KVM_SYNC_ETOKEN;
2447f6aa6dc4SDavid Hildenbrand 	/* fprs can be synchronized via vrs, even if the guest has no vx. With
2448f6aa6dc4SDavid Hildenbrand 	 * MACHINE_HAS_VX, (load|store)_fpu_regs() will work with vrs format.
2449f6aa6dc4SDavid Hildenbrand 	 */
2450f6aa6dc4SDavid Hildenbrand 	if (MACHINE_HAS_VX)
245168c55750SEric Farman 		vcpu->run->kvm_valid_regs |= KVM_SYNC_VRS;
24526fd8e67dSDavid Hildenbrand 	else
24536fd8e67dSDavid Hildenbrand 		vcpu->run->kvm_valid_regs |= KVM_SYNC_FPRS;
2454dafd032aSDominik Dingel 
2455dafd032aSDominik Dingel 	if (kvm_is_ucontrol(vcpu->kvm))
2456dafd032aSDominik Dingel 		return __kvm_ucontrol_vcpu_init(vcpu);
2457dafd032aSDominik Dingel 
2458b0c632dbSHeiko Carstens 	return 0;
2459b0c632dbSHeiko Carstens }
2460b0c632dbSHeiko Carstens 
2461db0758b2SDavid Hildenbrand /* needs disabled preemption to protect from TOD sync and vcpu_load/put */
2462db0758b2SDavid Hildenbrand static void __start_cpu_timer_accounting(struct kvm_vcpu *vcpu)
2463db0758b2SDavid Hildenbrand {
2464db0758b2SDavid Hildenbrand 	WARN_ON_ONCE(vcpu->arch.cputm_start != 0);
24659c23a131SDavid Hildenbrand 	raw_write_seqcount_begin(&vcpu->arch.cputm_seqcount);
2466db0758b2SDavid Hildenbrand 	vcpu->arch.cputm_start = get_tod_clock_fast();
24679c23a131SDavid Hildenbrand 	raw_write_seqcount_end(&vcpu->arch.cputm_seqcount);
2468db0758b2SDavid Hildenbrand }
2469db0758b2SDavid Hildenbrand 
2470db0758b2SDavid Hildenbrand /* needs disabled preemption to protect from TOD sync and vcpu_load/put */
2471db0758b2SDavid Hildenbrand static void __stop_cpu_timer_accounting(struct kvm_vcpu *vcpu)
2472db0758b2SDavid Hildenbrand {
2473db0758b2SDavid Hildenbrand 	WARN_ON_ONCE(vcpu->arch.cputm_start == 0);
24749c23a131SDavid Hildenbrand 	raw_write_seqcount_begin(&vcpu->arch.cputm_seqcount);
2475db0758b2SDavid Hildenbrand 	vcpu->arch.sie_block->cputm -= get_tod_clock_fast() - vcpu->arch.cputm_start;
2476db0758b2SDavid Hildenbrand 	vcpu->arch.cputm_start = 0;
24779c23a131SDavid Hildenbrand 	raw_write_seqcount_end(&vcpu->arch.cputm_seqcount);
2478db0758b2SDavid Hildenbrand }
2479db0758b2SDavid Hildenbrand 
2480db0758b2SDavid Hildenbrand /* needs disabled preemption to protect from TOD sync and vcpu_load/put */
2481db0758b2SDavid Hildenbrand static void __enable_cpu_timer_accounting(struct kvm_vcpu *vcpu)
2482db0758b2SDavid Hildenbrand {
2483db0758b2SDavid Hildenbrand 	WARN_ON_ONCE(vcpu->arch.cputm_enabled);
2484db0758b2SDavid Hildenbrand 	vcpu->arch.cputm_enabled = true;
2485db0758b2SDavid Hildenbrand 	__start_cpu_timer_accounting(vcpu);
2486db0758b2SDavid Hildenbrand }
2487db0758b2SDavid Hildenbrand 
2488db0758b2SDavid Hildenbrand /* needs disabled preemption to protect from TOD sync and vcpu_load/put */
2489db0758b2SDavid Hildenbrand static void __disable_cpu_timer_accounting(struct kvm_vcpu *vcpu)
2490db0758b2SDavid Hildenbrand {
2491db0758b2SDavid Hildenbrand 	WARN_ON_ONCE(!vcpu->arch.cputm_enabled);
2492db0758b2SDavid Hildenbrand 	__stop_cpu_timer_accounting(vcpu);
2493db0758b2SDavid Hildenbrand 	vcpu->arch.cputm_enabled = false;
2494db0758b2SDavid Hildenbrand }
2495db0758b2SDavid Hildenbrand 
2496db0758b2SDavid Hildenbrand static void enable_cpu_timer_accounting(struct kvm_vcpu *vcpu)
2497db0758b2SDavid Hildenbrand {
2498db0758b2SDavid Hildenbrand 	preempt_disable(); /* protect from TOD sync and vcpu_load/put */
2499db0758b2SDavid Hildenbrand 	__enable_cpu_timer_accounting(vcpu);
2500db0758b2SDavid Hildenbrand 	preempt_enable();
2501db0758b2SDavid Hildenbrand }
2502db0758b2SDavid Hildenbrand 
2503db0758b2SDavid Hildenbrand static void disable_cpu_timer_accounting(struct kvm_vcpu *vcpu)
2504db0758b2SDavid Hildenbrand {
2505db0758b2SDavid Hildenbrand 	preempt_disable(); /* protect from TOD sync and vcpu_load/put */
2506db0758b2SDavid Hildenbrand 	__disable_cpu_timer_accounting(vcpu);
2507db0758b2SDavid Hildenbrand 	preempt_enable();
2508db0758b2SDavid Hildenbrand }
2509db0758b2SDavid Hildenbrand 
25104287f247SDavid Hildenbrand /* set the cpu timer - may only be called from the VCPU thread itself */
25114287f247SDavid Hildenbrand void kvm_s390_set_cpu_timer(struct kvm_vcpu *vcpu, __u64 cputm)
25124287f247SDavid Hildenbrand {
2513db0758b2SDavid Hildenbrand 	preempt_disable(); /* protect from TOD sync and vcpu_load/put */
25149c23a131SDavid Hildenbrand 	raw_write_seqcount_begin(&vcpu->arch.cputm_seqcount);
2515db0758b2SDavid Hildenbrand 	if (vcpu->arch.cputm_enabled)
2516db0758b2SDavid Hildenbrand 		vcpu->arch.cputm_start = get_tod_clock_fast();
25174287f247SDavid Hildenbrand 	vcpu->arch.sie_block->cputm = cputm;
25189c23a131SDavid Hildenbrand 	raw_write_seqcount_end(&vcpu->arch.cputm_seqcount);
2519db0758b2SDavid Hildenbrand 	preempt_enable();
25204287f247SDavid Hildenbrand }
25214287f247SDavid Hildenbrand 
2522db0758b2SDavid Hildenbrand /* update and get the cpu timer - can also be called from other VCPU threads */
25234287f247SDavid Hildenbrand __u64 kvm_s390_get_cpu_timer(struct kvm_vcpu *vcpu)
25244287f247SDavid Hildenbrand {
25259c23a131SDavid Hildenbrand 	unsigned int seq;
2526db0758b2SDavid Hildenbrand 	__u64 value;
2527db0758b2SDavid Hildenbrand 
2528db0758b2SDavid Hildenbrand 	if (unlikely(!vcpu->arch.cputm_enabled))
25294287f247SDavid Hildenbrand 		return vcpu->arch.sie_block->cputm;
2530db0758b2SDavid Hildenbrand 
25319c23a131SDavid Hildenbrand 	preempt_disable(); /* protect from TOD sync and vcpu_load/put */
25329c23a131SDavid Hildenbrand 	do {
25339c23a131SDavid Hildenbrand 		seq = raw_read_seqcount(&vcpu->arch.cputm_seqcount);
25349c23a131SDavid Hildenbrand 		/*
25359c23a131SDavid Hildenbrand 		 * If the writer would ever execute a read in the critical
25369c23a131SDavid Hildenbrand 		 * section, e.g. in irq context, we have a deadlock.
25379c23a131SDavid Hildenbrand 		 */
25389c23a131SDavid Hildenbrand 		WARN_ON_ONCE((seq & 1) && smp_processor_id() == vcpu->cpu);
2539db0758b2SDavid Hildenbrand 		value = vcpu->arch.sie_block->cputm;
25409c23a131SDavid Hildenbrand 		/* if cputm_start is 0, accounting is being started/stopped */
25419c23a131SDavid Hildenbrand 		if (likely(vcpu->arch.cputm_start))
2542db0758b2SDavid Hildenbrand 			value -= get_tod_clock_fast() - vcpu->arch.cputm_start;
25439c23a131SDavid Hildenbrand 	} while (read_seqcount_retry(&vcpu->arch.cputm_seqcount, seq & ~1));
25449c23a131SDavid Hildenbrand 	preempt_enable();
2545db0758b2SDavid Hildenbrand 	return value;
25464287f247SDavid Hildenbrand }
25474287f247SDavid Hildenbrand 
2548b0c632dbSHeiko Carstens void kvm_arch_vcpu_load(struct kvm_vcpu *vcpu, int cpu)
2549b0c632dbSHeiko Carstens {
25509977e886SHendrik Brueckner 
255137d9df98SDavid Hildenbrand 	gmap_enable(vcpu->arch.enabled_gmap);
2552ef8f4f49SDavid Hildenbrand 	kvm_s390_set_cpuflags(vcpu, CPUSTAT_RUNNING);
25535ebda316SDavid Hildenbrand 	if (vcpu->arch.cputm_enabled && !is_vcpu_idle(vcpu))
2554db0758b2SDavid Hildenbrand 		__start_cpu_timer_accounting(vcpu);
255501a745acSDavid Hildenbrand 	vcpu->cpu = cpu;
2556b0c632dbSHeiko Carstens }
2557b0c632dbSHeiko Carstens 
2558b0c632dbSHeiko Carstens void kvm_arch_vcpu_put(struct kvm_vcpu *vcpu)
2559b0c632dbSHeiko Carstens {
256001a745acSDavid Hildenbrand 	vcpu->cpu = -1;
25615ebda316SDavid Hildenbrand 	if (vcpu->arch.cputm_enabled && !is_vcpu_idle(vcpu))
2562db0758b2SDavid Hildenbrand 		__stop_cpu_timer_accounting(vcpu);
25639daecfc6SDavid Hildenbrand 	kvm_s390_clear_cpuflags(vcpu, CPUSTAT_RUNNING);
256437d9df98SDavid Hildenbrand 	vcpu->arch.enabled_gmap = gmap_get_enabled();
256537d9df98SDavid Hildenbrand 	gmap_disable(vcpu->arch.enabled_gmap);
25669977e886SHendrik Brueckner 
2567b0c632dbSHeiko Carstens }
2568b0c632dbSHeiko Carstens 
2569b0c632dbSHeiko Carstens static void kvm_s390_vcpu_initial_reset(struct kvm_vcpu *vcpu)
2570b0c632dbSHeiko Carstens {
2571b0c632dbSHeiko Carstens 	/* this equals initial cpu reset in pop, but we don't switch to ESA */
2572b0c632dbSHeiko Carstens 	vcpu->arch.sie_block->gpsw.mask = 0UL;
2573b0c632dbSHeiko Carstens 	vcpu->arch.sie_block->gpsw.addr = 0UL;
25748d26cf7bSChristian Borntraeger 	kvm_s390_set_prefix(vcpu, 0);
25754287f247SDavid Hildenbrand 	kvm_s390_set_cpu_timer(vcpu, 0);
2576b0c632dbSHeiko Carstens 	vcpu->arch.sie_block->ckc       = 0UL;
2577b0c632dbSHeiko Carstens 	vcpu->arch.sie_block->todpr     = 0;
2578b0c632dbSHeiko Carstens 	memset(vcpu->arch.sie_block->gcr, 0, 16 * sizeof(__u64));
2579b9224cd7SDavid Hildenbrand 	vcpu->arch.sie_block->gcr[0]  = CR0_UNUSED_56 |
2580b9224cd7SDavid Hildenbrand 					CR0_INTERRUPT_KEY_SUBMASK |
2581b9224cd7SDavid Hildenbrand 					CR0_MEASUREMENT_ALERT_SUBMASK;
2582b9224cd7SDavid Hildenbrand 	vcpu->arch.sie_block->gcr[14] = CR14_UNUSED_32 |
2583b9224cd7SDavid Hildenbrand 					CR14_UNUSED_33 |
2584b9224cd7SDavid Hildenbrand 					CR14_EXTERNAL_DAMAGE_SUBMASK;
25859abc2a08SDavid Hildenbrand 	/* make sure the new fpc will be lazily loaded */
25869abc2a08SDavid Hildenbrand 	save_fpu_regs();
25879abc2a08SDavid Hildenbrand 	current->thread.fpu.fpc = 0;
2588b0c632dbSHeiko Carstens 	vcpu->arch.sie_block->gbea = 1;
2589672550fbSChristian Borntraeger 	vcpu->arch.sie_block->pp = 0;
259035b3fde6SChristian Borntraeger 	vcpu->arch.sie_block->fpf &= ~FPF_BPBC;
25913c038e6bSDominik Dingel 	vcpu->arch.pfault_token = KVM_S390_PFAULT_TOKEN_INVALID;
25923c038e6bSDominik Dingel 	kvm_clear_async_pf_completion_queue(vcpu);
25936352e4d2SDavid Hildenbrand 	if (!kvm_s390_user_cpu_state_ctrl(vcpu->kvm))
25946852d7b6SDavid Hildenbrand 		kvm_s390_vcpu_stop(vcpu);
25952ed10cc1SJens Freimann 	kvm_s390_clear_local_irqs(vcpu);
2596b0c632dbSHeiko Carstens }
2597b0c632dbSHeiko Carstens 
259831928aa5SDominik Dingel void kvm_arch_vcpu_postcreate(struct kvm_vcpu *vcpu)
259942897d86SMarcelo Tosatti {
260072f25020SJason J. Herne 	mutex_lock(&vcpu->kvm->lock);
2601fdf03650SFan Zhang 	preempt_disable();
260272f25020SJason J. Herne 	vcpu->arch.sie_block->epoch = vcpu->kvm->arch.epoch;
2603d16b52cbSDavid Hildenbrand 	vcpu->arch.sie_block->epdx = vcpu->kvm->arch.epdx;
2604fdf03650SFan Zhang 	preempt_enable();
260572f25020SJason J. Herne 	mutex_unlock(&vcpu->kvm->lock);
260625508824SDavid Hildenbrand 	if (!kvm_is_ucontrol(vcpu->kvm)) {
2607dafd032aSDominik Dingel 		vcpu->arch.gmap = vcpu->kvm->arch.gmap;
2608eaa78f34SDavid Hildenbrand 		sca_add_vcpu(vcpu);
260925508824SDavid Hildenbrand 	}
26106502a34cSDavid Hildenbrand 	if (test_kvm_facility(vcpu->kvm, 74) || vcpu->kvm->arch.user_instr0)
26116502a34cSDavid Hildenbrand 		vcpu->arch.sie_block->ictl |= ICTL_OPEREXC;
261237d9df98SDavid Hildenbrand 	/* make vcpu_load load the right gmap on the first trigger */
261337d9df98SDavid Hildenbrand 	vcpu->arch.enabled_gmap = vcpu->arch.gmap;
261442897d86SMarcelo Tosatti }
261542897d86SMarcelo Tosatti 
26165102ee87STony Krowiak static void kvm_s390_vcpu_crypto_setup(struct kvm_vcpu *vcpu)
26175102ee87STony Krowiak {
2618e585b24aSTony Krowiak 	/*
2619e585b24aSTony Krowiak 	 * If the AP instructions are not being interpreted and the MSAX3
2620e585b24aSTony Krowiak 	 * facility is not configured for the guest, there is nothing to set up.
2621e585b24aSTony Krowiak 	 */
2622e585b24aSTony Krowiak 	if (!vcpu->kvm->arch.crypto.apie && !test_kvm_facility(vcpu->kvm, 76))
26235102ee87STony Krowiak 		return;
26245102ee87STony Krowiak 
2625e585b24aSTony Krowiak 	vcpu->arch.sie_block->crycbd = vcpu->kvm->arch.crypto.crycbd;
2626a374e892STony Krowiak 	vcpu->arch.sie_block->ecb3 &= ~(ECB3_AES | ECB3_DEA);
2627*37940fb0STony Krowiak 	vcpu->arch.sie_block->eca &= ~ECA_APIE;
2628a374e892STony Krowiak 
2629e585b24aSTony Krowiak 	if (vcpu->kvm->arch.crypto.apie)
2630e585b24aSTony Krowiak 		vcpu->arch.sie_block->eca |= ECA_APIE;
2631e585b24aSTony Krowiak 
2632e585b24aSTony Krowiak 	/* Set up protected key support */
2633a374e892STony Krowiak 	if (vcpu->kvm->arch.crypto.aes_kw)
2634a374e892STony Krowiak 		vcpu->arch.sie_block->ecb3 |= ECB3_AES;
2635a374e892STony Krowiak 	if (vcpu->kvm->arch.crypto.dea_kw)
2636a374e892STony Krowiak 		vcpu->arch.sie_block->ecb3 |= ECB3_DEA;
26375102ee87STony Krowiak }
26385102ee87STony Krowiak 
2639b31605c1SDominik Dingel void kvm_s390_vcpu_unsetup_cmma(struct kvm_vcpu *vcpu)
2640b31605c1SDominik Dingel {
2641b31605c1SDominik Dingel 	free_page(vcpu->arch.sie_block->cbrlo);
2642b31605c1SDominik Dingel 	vcpu->arch.sie_block->cbrlo = 0;
2643b31605c1SDominik Dingel }
2644b31605c1SDominik Dingel 
2645b31605c1SDominik Dingel int kvm_s390_vcpu_setup_cmma(struct kvm_vcpu *vcpu)
2646b31605c1SDominik Dingel {
2647b31605c1SDominik Dingel 	vcpu->arch.sie_block->cbrlo = get_zeroed_page(GFP_KERNEL);
2648b31605c1SDominik Dingel 	if (!vcpu->arch.sie_block->cbrlo)
2649b31605c1SDominik Dingel 		return -ENOMEM;
2650b31605c1SDominik Dingel 	return 0;
2651b31605c1SDominik Dingel }
2652b31605c1SDominik Dingel 
265391520f1aSMichael Mueller static void kvm_s390_vcpu_setup_model(struct kvm_vcpu *vcpu)
265491520f1aSMichael Mueller {
265591520f1aSMichael Mueller 	struct kvm_s390_cpu_model *model = &vcpu->kvm->arch.model;
265691520f1aSMichael Mueller 
265791520f1aSMichael Mueller 	vcpu->arch.sie_block->ibc = model->ibc;
265880bc79dcSDavid Hildenbrand 	if (test_kvm_facility(vcpu->kvm, 7))
2659c54f0d6aSDavid Hildenbrand 		vcpu->arch.sie_block->fac = (u32)(u64) model->fac_list;
266091520f1aSMichael Mueller }
266191520f1aSMichael Mueller 
2662b0c632dbSHeiko Carstens int kvm_arch_vcpu_setup(struct kvm_vcpu *vcpu)
2663b0c632dbSHeiko Carstens {
2664b31605c1SDominik Dingel 	int rc = 0;
2665b31288faSKonstantin Weitz 
26669e6dabefSCornelia Huck 	atomic_set(&vcpu->arch.sie_block->cpuflags, CPUSTAT_ZARCH |
26679e6dabefSCornelia Huck 						    CPUSTAT_SM |
2668a4a4f191SGuenther Hutzl 						    CPUSTAT_STOPPED);
2669a4a4f191SGuenther Hutzl 
267053df84f8SGuenther Hutzl 	if (test_kvm_facility(vcpu->kvm, 78))
2671ef8f4f49SDavid Hildenbrand 		kvm_s390_set_cpuflags(vcpu, CPUSTAT_GED2);
267253df84f8SGuenther Hutzl 	else if (test_kvm_facility(vcpu->kvm, 8))
2673ef8f4f49SDavid Hildenbrand 		kvm_s390_set_cpuflags(vcpu, CPUSTAT_GED);
2674a4a4f191SGuenther Hutzl 
267591520f1aSMichael Mueller 	kvm_s390_vcpu_setup_model(vcpu);
267691520f1aSMichael Mueller 
2677bdab09f3SDavid Hildenbrand 	/* pgste_set_pte has special handling for !MACHINE_HAS_ESOP */
2678bdab09f3SDavid Hildenbrand 	if (MACHINE_HAS_ESOP)
26790c9d8683SDavid Hildenbrand 		vcpu->arch.sie_block->ecb |= ECB_HOSTPROTINT;
2680bd50e8ecSDavid Hildenbrand 	if (test_kvm_facility(vcpu->kvm, 9))
26810c9d8683SDavid Hildenbrand 		vcpu->arch.sie_block->ecb |= ECB_SRSI;
2682f597d24eSDavid Hildenbrand 	if (test_kvm_facility(vcpu->kvm, 73))
26830c9d8683SDavid Hildenbrand 		vcpu->arch.sie_block->ecb |= ECB_TE;
26847feb6bb8SMichael Mueller 
2685c9f0a2b8SJanosch Frank 	if (test_kvm_facility(vcpu->kvm, 8) && vcpu->kvm->arch.use_pfmfi)
26860c9d8683SDavid Hildenbrand 		vcpu->arch.sie_block->ecb2 |= ECB2_PFMFI;
2687cd1836f5SJanosch Frank 	if (test_kvm_facility(vcpu->kvm, 130))
26880c9d8683SDavid Hildenbrand 		vcpu->arch.sie_block->ecb2 |= ECB2_IEP;
26890c9d8683SDavid Hildenbrand 	vcpu->arch.sie_block->eca = ECA_MVPGI | ECA_PROTEXCI;
269048ee7d3aSDavid Hildenbrand 	if (sclp.has_cei)
26910c9d8683SDavid Hildenbrand 		vcpu->arch.sie_block->eca |= ECA_CEI;
269211ad65b7SDavid Hildenbrand 	if (sclp.has_ib)
26930c9d8683SDavid Hildenbrand 		vcpu->arch.sie_block->eca |= ECA_IB;
269437c5f6c8SDavid Hildenbrand 	if (sclp.has_siif)
26950c9d8683SDavid Hildenbrand 		vcpu->arch.sie_block->eca |= ECA_SII;
269637c5f6c8SDavid Hildenbrand 	if (sclp.has_sigpif)
26970c9d8683SDavid Hildenbrand 		vcpu->arch.sie_block->eca |= ECA_SIGPI;
269818280d8bSMichael Mueller 	if (test_kvm_facility(vcpu->kvm, 129)) {
26990c9d8683SDavid Hildenbrand 		vcpu->arch.sie_block->eca |= ECA_VX;
27000c9d8683SDavid Hildenbrand 		vcpu->arch.sie_block->ecd |= ECD_HOSTREGMGMT;
270113211ea7SEric Farman 	}
27028fa1696eSCollin L. Walling 	if (test_kvm_facility(vcpu->kvm, 139))
27038fa1696eSCollin L. Walling 		vcpu->arch.sie_block->ecd |= ECD_MEF;
2704a3da7b4aSChristian Borntraeger 	if (test_kvm_facility(vcpu->kvm, 156))
2705a3da7b4aSChristian Borntraeger 		vcpu->arch.sie_block->ecd |= ECD_ETOKENF;
2706d7c5cb01SMichael Mueller 	if (vcpu->arch.sie_block->gd) {
2707d7c5cb01SMichael Mueller 		vcpu->arch.sie_block->eca |= ECA_AIV;
2708d7c5cb01SMichael Mueller 		VCPU_EVENT(vcpu, 3, "AIV gisa format-%u enabled for cpu %03u",
2709d7c5cb01SMichael Mueller 			   vcpu->arch.sie_block->gd & 0x3, vcpu->vcpu_id);
2710d7c5cb01SMichael Mueller 	}
27114e0b1ab7SFan Zhang 	vcpu->arch.sie_block->sdnxo = ((unsigned long) &vcpu->run->s.regs.sdnx)
27124e0b1ab7SFan Zhang 					| SDNXC;
2713c6e5f166SFan Zhang 	vcpu->arch.sie_block->riccbd = (unsigned long) &vcpu->run->s.regs.riccb;
2714730cd632SFarhan Ali 
2715730cd632SFarhan Ali 	if (sclp.has_kss)
2716ef8f4f49SDavid Hildenbrand 		kvm_s390_set_cpuflags(vcpu, CPUSTAT_KSS);
2717730cd632SFarhan Ali 	else
2718492d8642SThomas Huth 		vcpu->arch.sie_block->ictl |= ICTL_ISKE | ICTL_SSKE | ICTL_RRBE;
27195a5e6536SMatthew Rosato 
2720e6db1d61SDominik Dingel 	if (vcpu->kvm->arch.use_cmma) {
2721b31605c1SDominik Dingel 		rc = kvm_s390_vcpu_setup_cmma(vcpu);
2722b31605c1SDominik Dingel 		if (rc)
2723b31605c1SDominik Dingel 			return rc;
2724b31288faSKonstantin Weitz 	}
27250ac96cafSDavid Hildenbrand 	hrtimer_init(&vcpu->arch.ckc_timer, CLOCK_MONOTONIC, HRTIMER_MODE_REL);
2726ca872302SChristian Borntraeger 	vcpu->arch.ckc_timer.function = kvm_s390_idle_wakeup;
27279d8d5786SMichael Mueller 
27285102ee87STony Krowiak 	kvm_s390_vcpu_crypto_setup(vcpu);
27295102ee87STony Krowiak 
2730b31605c1SDominik Dingel 	return rc;
2731b0c632dbSHeiko Carstens }
2732b0c632dbSHeiko Carstens 
2733b0c632dbSHeiko Carstens struct kvm_vcpu *kvm_arch_vcpu_create(struct kvm *kvm,
2734b0c632dbSHeiko Carstens 				      unsigned int id)
2735b0c632dbSHeiko Carstens {
27364d47555aSCarsten Otte 	struct kvm_vcpu *vcpu;
27377feb6bb8SMichael Mueller 	struct sie_page *sie_page;
27384d47555aSCarsten Otte 	int rc = -EINVAL;
2739b0c632dbSHeiko Carstens 
27404215825eSDavid Hildenbrand 	if (!kvm_is_ucontrol(kvm) && !sca_can_add_vcpu(kvm, id))
27414d47555aSCarsten Otte 		goto out;
27424d47555aSCarsten Otte 
27434d47555aSCarsten Otte 	rc = -ENOMEM;
27444d47555aSCarsten Otte 
2745b110feafSMichael Mueller 	vcpu = kmem_cache_zalloc(kvm_vcpu_cache, GFP_KERNEL);
2746b0c632dbSHeiko Carstens 	if (!vcpu)
27474d47555aSCarsten Otte 		goto out;
2748b0c632dbSHeiko Carstens 
2749da72ca4dSQingFeng Hao 	BUILD_BUG_ON(sizeof(struct sie_page) != 4096);
27507feb6bb8SMichael Mueller 	sie_page = (struct sie_page *) get_zeroed_page(GFP_KERNEL);
27517feb6bb8SMichael Mueller 	if (!sie_page)
2752b0c632dbSHeiko Carstens 		goto out_free_cpu;
2753b0c632dbSHeiko Carstens 
27547feb6bb8SMichael Mueller 	vcpu->arch.sie_block = &sie_page->sie_block;
27557feb6bb8SMichael Mueller 	vcpu->arch.sie_block->itdba = (unsigned long) &sie_page->itdb;
27567feb6bb8SMichael Mueller 
2757efed1104SDavid Hildenbrand 	/* the real guest size will always be smaller than msl */
2758efed1104SDavid Hildenbrand 	vcpu->arch.sie_block->mso = 0;
2759efed1104SDavid Hildenbrand 	vcpu->arch.sie_block->msl = sclp.hamax;
2760efed1104SDavid Hildenbrand 
2761b0c632dbSHeiko Carstens 	vcpu->arch.sie_block->icpua = id;
2762ba5c1e9bSCarsten Otte 	spin_lock_init(&vcpu->arch.local_int.lock);
2763d7c5cb01SMichael Mueller 	vcpu->arch.sie_block->gd = (u32)(u64)kvm->arch.gisa;
27644b9f9525SMichael Mueller 	if (vcpu->arch.sie_block->gd && sclp.has_gisaf)
27654b9f9525SMichael Mueller 		vcpu->arch.sie_block->gd |= GISA_FORMAT1;
27669c23a131SDavid Hildenbrand 	seqcount_init(&vcpu->arch.cputm_seqcount);
2767ba5c1e9bSCarsten Otte 
2768b0c632dbSHeiko Carstens 	rc = kvm_vcpu_init(vcpu, kvm, id);
2769b0c632dbSHeiko Carstens 	if (rc)
27709abc2a08SDavid Hildenbrand 		goto out_free_sie_block;
27718335713aSChristian Borntraeger 	VM_EVENT(kvm, 3, "create cpu %d at 0x%pK, sie block at 0x%pK", id, vcpu,
2772b0c632dbSHeiko Carstens 		 vcpu->arch.sie_block);
2773ade38c31SCornelia Huck 	trace_kvm_s390_create_vcpu(id, vcpu, vcpu->arch.sie_block);
2774b0c632dbSHeiko Carstens 
2775b0c632dbSHeiko Carstens 	return vcpu;
27767b06bf2fSWei Yongjun out_free_sie_block:
27777b06bf2fSWei Yongjun 	free_page((unsigned long)(vcpu->arch.sie_block));
2778b0c632dbSHeiko Carstens out_free_cpu:
2779b110feafSMichael Mueller 	kmem_cache_free(kvm_vcpu_cache, vcpu);
27804d47555aSCarsten Otte out:
2781b0c632dbSHeiko Carstens 	return ERR_PTR(rc);
2782b0c632dbSHeiko Carstens }
2783b0c632dbSHeiko Carstens 
2784b0c632dbSHeiko Carstens int kvm_arch_vcpu_runnable(struct kvm_vcpu *vcpu)
2785b0c632dbSHeiko Carstens {
27869a022067SDavid Hildenbrand 	return kvm_s390_vcpu_has_irq(vcpu, 0);
2787b0c632dbSHeiko Carstens }
2788b0c632dbSHeiko Carstens 
2789199b5763SLongpeng(Mike) bool kvm_arch_vcpu_in_kernel(struct kvm_vcpu *vcpu)
2790199b5763SLongpeng(Mike) {
27910546c63dSLongpeng(Mike) 	return !(vcpu->arch.sie_block->gpsw.mask & PSW_MASK_PSTATE);
2792199b5763SLongpeng(Mike) }
2793199b5763SLongpeng(Mike) 
279427406cd5SChristian Borntraeger void kvm_s390_vcpu_block(struct kvm_vcpu *vcpu)
279549b99e1eSChristian Borntraeger {
2796805de8f4SPeter Zijlstra 	atomic_or(PROG_BLOCK_SIE, &vcpu->arch.sie_block->prog20);
279761a6df54SDavid Hildenbrand 	exit_sie(vcpu);
279849b99e1eSChristian Borntraeger }
279949b99e1eSChristian Borntraeger 
280027406cd5SChristian Borntraeger void kvm_s390_vcpu_unblock(struct kvm_vcpu *vcpu)
280149b99e1eSChristian Borntraeger {
2802805de8f4SPeter Zijlstra 	atomic_andnot(PROG_BLOCK_SIE, &vcpu->arch.sie_block->prog20);
280349b99e1eSChristian Borntraeger }
280449b99e1eSChristian Borntraeger 
28058e236546SChristian Borntraeger static void kvm_s390_vcpu_request(struct kvm_vcpu *vcpu)
28068e236546SChristian Borntraeger {
2807805de8f4SPeter Zijlstra 	atomic_or(PROG_REQUEST, &vcpu->arch.sie_block->prog20);
280861a6df54SDavid Hildenbrand 	exit_sie(vcpu);
28098e236546SChristian Borntraeger }
28108e236546SChristian Borntraeger 
28119ea59728SDavid Hildenbrand bool kvm_s390_vcpu_sie_inhibited(struct kvm_vcpu *vcpu)
28129ea59728SDavid Hildenbrand {
28139ea59728SDavid Hildenbrand 	return atomic_read(&vcpu->arch.sie_block->prog20) &
28149ea59728SDavid Hildenbrand 	       (PROG_BLOCK_SIE | PROG_REQUEST);
28159ea59728SDavid Hildenbrand }
28169ea59728SDavid Hildenbrand 
28178e236546SChristian Borntraeger static void kvm_s390_vcpu_request_handled(struct kvm_vcpu *vcpu)
28188e236546SChristian Borntraeger {
28199bf9fde2SJason J. Herne 	atomic_andnot(PROG_REQUEST, &vcpu->arch.sie_block->prog20);
28208e236546SChristian Borntraeger }
28218e236546SChristian Borntraeger 
282249b99e1eSChristian Borntraeger /*
28239ea59728SDavid Hildenbrand  * Kick a guest cpu out of (v)SIE and wait until (v)SIE is not running.
282449b99e1eSChristian Borntraeger  * If the CPU is not running (e.g. waiting as idle) the function will
282549b99e1eSChristian Borntraeger  * return immediately. */
282649b99e1eSChristian Borntraeger void exit_sie(struct kvm_vcpu *vcpu)
282749b99e1eSChristian Borntraeger {
2828ef8f4f49SDavid Hildenbrand 	kvm_s390_set_cpuflags(vcpu, CPUSTAT_STOP_INT);
28299ea59728SDavid Hildenbrand 	kvm_s390_vsie_kick(vcpu);
283049b99e1eSChristian Borntraeger 	while (vcpu->arch.sie_block->prog0c & PROG_IN_SIE)
283149b99e1eSChristian Borntraeger 		cpu_relax();
283249b99e1eSChristian Borntraeger }
283349b99e1eSChristian Borntraeger 
28348e236546SChristian Borntraeger /* Kick a guest cpu out of SIE to process a request synchronously */
28358e236546SChristian Borntraeger void kvm_s390_sync_request(int req, struct kvm_vcpu *vcpu)
283649b99e1eSChristian Borntraeger {
28378e236546SChristian Borntraeger 	kvm_make_request(req, vcpu);
28388e236546SChristian Borntraeger 	kvm_s390_vcpu_request(vcpu);
283949b99e1eSChristian Borntraeger }
284049b99e1eSChristian Borntraeger 
2841414d3b07SMartin Schwidefsky static void kvm_gmap_notifier(struct gmap *gmap, unsigned long start,
2842414d3b07SMartin Schwidefsky 			      unsigned long end)
28432c70fe44SChristian Borntraeger {
28442c70fe44SChristian Borntraeger 	struct kvm *kvm = gmap->private;
28452c70fe44SChristian Borntraeger 	struct kvm_vcpu *vcpu;
2846414d3b07SMartin Schwidefsky 	unsigned long prefix;
2847414d3b07SMartin Schwidefsky 	int i;
28482c70fe44SChristian Borntraeger 
284965d0b0d4SDavid Hildenbrand 	if (gmap_is_shadow(gmap))
285065d0b0d4SDavid Hildenbrand 		return;
2851414d3b07SMartin Schwidefsky 	if (start >= 1UL << 31)
2852414d3b07SMartin Schwidefsky 		/* We are only interested in prefix pages */
2853414d3b07SMartin Schwidefsky 		return;
28542c70fe44SChristian Borntraeger 	kvm_for_each_vcpu(i, vcpu, kvm) {
28552c70fe44SChristian Borntraeger 		/* match against both prefix pages */
2856414d3b07SMartin Schwidefsky 		prefix = kvm_s390_get_prefix(vcpu);
2857414d3b07SMartin Schwidefsky 		if (prefix <= end && start <= prefix + 2*PAGE_SIZE - 1) {
2858414d3b07SMartin Schwidefsky 			VCPU_EVENT(vcpu, 2, "gmap notifier for %lx-%lx",
2859414d3b07SMartin Schwidefsky 				   start, end);
28608e236546SChristian Borntraeger 			kvm_s390_sync_request(KVM_REQ_MMU_RELOAD, vcpu);
28612c70fe44SChristian Borntraeger 		}
28622c70fe44SChristian Borntraeger 	}
28632c70fe44SChristian Borntraeger }
28642c70fe44SChristian Borntraeger 
2865b6d33834SChristoffer Dall int kvm_arch_vcpu_should_kick(struct kvm_vcpu *vcpu)
2866b6d33834SChristoffer Dall {
2867b6d33834SChristoffer Dall 	/* kvm common code refers to this, but never calls it */
2868b6d33834SChristoffer Dall 	BUG();
2869b6d33834SChristoffer Dall 	return 0;
2870b6d33834SChristoffer Dall }
2871b6d33834SChristoffer Dall 
287214eebd91SCarsten Otte static int kvm_arch_vcpu_ioctl_get_one_reg(struct kvm_vcpu *vcpu,
287314eebd91SCarsten Otte 					   struct kvm_one_reg *reg)
287414eebd91SCarsten Otte {
287514eebd91SCarsten Otte 	int r = -EINVAL;
287614eebd91SCarsten Otte 
287714eebd91SCarsten Otte 	switch (reg->id) {
287829b7c71bSCarsten Otte 	case KVM_REG_S390_TODPR:
287929b7c71bSCarsten Otte 		r = put_user(vcpu->arch.sie_block->todpr,
288029b7c71bSCarsten Otte 			     (u32 __user *)reg->addr);
288129b7c71bSCarsten Otte 		break;
288229b7c71bSCarsten Otte 	case KVM_REG_S390_EPOCHDIFF:
288329b7c71bSCarsten Otte 		r = put_user(vcpu->arch.sie_block->epoch,
288429b7c71bSCarsten Otte 			     (u64 __user *)reg->addr);
288529b7c71bSCarsten Otte 		break;
288646a6dd1cSJason J. herne 	case KVM_REG_S390_CPU_TIMER:
28874287f247SDavid Hildenbrand 		r = put_user(kvm_s390_get_cpu_timer(vcpu),
288846a6dd1cSJason J. herne 			     (u64 __user *)reg->addr);
288946a6dd1cSJason J. herne 		break;
289046a6dd1cSJason J. herne 	case KVM_REG_S390_CLOCK_COMP:
289146a6dd1cSJason J. herne 		r = put_user(vcpu->arch.sie_block->ckc,
289246a6dd1cSJason J. herne 			     (u64 __user *)reg->addr);
289346a6dd1cSJason J. herne 		break;
2894536336c2SDominik Dingel 	case KVM_REG_S390_PFTOKEN:
2895536336c2SDominik Dingel 		r = put_user(vcpu->arch.pfault_token,
2896536336c2SDominik Dingel 			     (u64 __user *)reg->addr);
2897536336c2SDominik Dingel 		break;
2898536336c2SDominik Dingel 	case KVM_REG_S390_PFCOMPARE:
2899536336c2SDominik Dingel 		r = put_user(vcpu->arch.pfault_compare,
2900536336c2SDominik Dingel 			     (u64 __user *)reg->addr);
2901536336c2SDominik Dingel 		break;
2902536336c2SDominik Dingel 	case KVM_REG_S390_PFSELECT:
2903536336c2SDominik Dingel 		r = put_user(vcpu->arch.pfault_select,
2904536336c2SDominik Dingel 			     (u64 __user *)reg->addr);
2905536336c2SDominik Dingel 		break;
2906672550fbSChristian Borntraeger 	case KVM_REG_S390_PP:
2907672550fbSChristian Borntraeger 		r = put_user(vcpu->arch.sie_block->pp,
2908672550fbSChristian Borntraeger 			     (u64 __user *)reg->addr);
2909672550fbSChristian Borntraeger 		break;
2910afa45ff5SChristian Borntraeger 	case KVM_REG_S390_GBEA:
2911afa45ff5SChristian Borntraeger 		r = put_user(vcpu->arch.sie_block->gbea,
2912afa45ff5SChristian Borntraeger 			     (u64 __user *)reg->addr);
2913afa45ff5SChristian Borntraeger 		break;
291414eebd91SCarsten Otte 	default:
291514eebd91SCarsten Otte 		break;
291614eebd91SCarsten Otte 	}
291714eebd91SCarsten Otte 
291814eebd91SCarsten Otte 	return r;
291914eebd91SCarsten Otte }
292014eebd91SCarsten Otte 
292114eebd91SCarsten Otte static int kvm_arch_vcpu_ioctl_set_one_reg(struct kvm_vcpu *vcpu,
292214eebd91SCarsten Otte 					   struct kvm_one_reg *reg)
292314eebd91SCarsten Otte {
292414eebd91SCarsten Otte 	int r = -EINVAL;
29254287f247SDavid Hildenbrand 	__u64 val;
292614eebd91SCarsten Otte 
292714eebd91SCarsten Otte 	switch (reg->id) {
292829b7c71bSCarsten Otte 	case KVM_REG_S390_TODPR:
292929b7c71bSCarsten Otte 		r = get_user(vcpu->arch.sie_block->todpr,
293029b7c71bSCarsten Otte 			     (u32 __user *)reg->addr);
293129b7c71bSCarsten Otte 		break;
293229b7c71bSCarsten Otte 	case KVM_REG_S390_EPOCHDIFF:
293329b7c71bSCarsten Otte 		r = get_user(vcpu->arch.sie_block->epoch,
293429b7c71bSCarsten Otte 			     (u64 __user *)reg->addr);
293529b7c71bSCarsten Otte 		break;
293646a6dd1cSJason J. herne 	case KVM_REG_S390_CPU_TIMER:
29374287f247SDavid Hildenbrand 		r = get_user(val, (u64 __user *)reg->addr);
29384287f247SDavid Hildenbrand 		if (!r)
29394287f247SDavid Hildenbrand 			kvm_s390_set_cpu_timer(vcpu, val);
294046a6dd1cSJason J. herne 		break;
294146a6dd1cSJason J. herne 	case KVM_REG_S390_CLOCK_COMP:
294246a6dd1cSJason J. herne 		r = get_user(vcpu->arch.sie_block->ckc,
294346a6dd1cSJason J. herne 			     (u64 __user *)reg->addr);
294446a6dd1cSJason J. herne 		break;
2945536336c2SDominik Dingel 	case KVM_REG_S390_PFTOKEN:
2946536336c2SDominik Dingel 		r = get_user(vcpu->arch.pfault_token,
2947536336c2SDominik Dingel 			     (u64 __user *)reg->addr);
29489fbd8082SDavid Hildenbrand 		if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID)
29499fbd8082SDavid Hildenbrand 			kvm_clear_async_pf_completion_queue(vcpu);
2950536336c2SDominik Dingel 		break;
2951536336c2SDominik Dingel 	case KVM_REG_S390_PFCOMPARE:
2952536336c2SDominik Dingel 		r = get_user(vcpu->arch.pfault_compare,
2953536336c2SDominik Dingel 			     (u64 __user *)reg->addr);
2954536336c2SDominik Dingel 		break;
2955536336c2SDominik Dingel 	case KVM_REG_S390_PFSELECT:
2956536336c2SDominik Dingel 		r = get_user(vcpu->arch.pfault_select,
2957536336c2SDominik Dingel 			     (u64 __user *)reg->addr);
2958536336c2SDominik Dingel 		break;
2959672550fbSChristian Borntraeger 	case KVM_REG_S390_PP:
2960672550fbSChristian Borntraeger 		r = get_user(vcpu->arch.sie_block->pp,
2961672550fbSChristian Borntraeger 			     (u64 __user *)reg->addr);
2962672550fbSChristian Borntraeger 		break;
2963afa45ff5SChristian Borntraeger 	case KVM_REG_S390_GBEA:
2964afa45ff5SChristian Borntraeger 		r = get_user(vcpu->arch.sie_block->gbea,
2965afa45ff5SChristian Borntraeger 			     (u64 __user *)reg->addr);
2966afa45ff5SChristian Borntraeger 		break;
296714eebd91SCarsten Otte 	default:
296814eebd91SCarsten Otte 		break;
296914eebd91SCarsten Otte 	}
297014eebd91SCarsten Otte 
297114eebd91SCarsten Otte 	return r;
297214eebd91SCarsten Otte }
2973b6d33834SChristoffer Dall 
2974b0c632dbSHeiko Carstens static int kvm_arch_vcpu_ioctl_initial_reset(struct kvm_vcpu *vcpu)
2975b0c632dbSHeiko Carstens {
2976b0c632dbSHeiko Carstens 	kvm_s390_vcpu_initial_reset(vcpu);
2977b0c632dbSHeiko Carstens 	return 0;
2978b0c632dbSHeiko Carstens }
2979b0c632dbSHeiko Carstens 
2980b0c632dbSHeiko Carstens int kvm_arch_vcpu_ioctl_set_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs)
2981b0c632dbSHeiko Carstens {
2982875656feSChristoffer Dall 	vcpu_load(vcpu);
29835a32c1afSChristian Borntraeger 	memcpy(&vcpu->run->s.regs.gprs, &regs->gprs, sizeof(regs->gprs));
2984875656feSChristoffer Dall 	vcpu_put(vcpu);
2985b0c632dbSHeiko Carstens 	return 0;
2986b0c632dbSHeiko Carstens }
2987b0c632dbSHeiko Carstens 
2988b0c632dbSHeiko Carstens int kvm_arch_vcpu_ioctl_get_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs)
2989b0c632dbSHeiko Carstens {
29901fc9b76bSChristoffer Dall 	vcpu_load(vcpu);
29915a32c1afSChristian Borntraeger 	memcpy(&regs->gprs, &vcpu->run->s.regs.gprs, sizeof(regs->gprs));
29921fc9b76bSChristoffer Dall 	vcpu_put(vcpu);
2993b0c632dbSHeiko Carstens 	return 0;
2994b0c632dbSHeiko Carstens }
2995b0c632dbSHeiko Carstens 
2996b0c632dbSHeiko Carstens int kvm_arch_vcpu_ioctl_set_sregs(struct kvm_vcpu *vcpu,
2997b0c632dbSHeiko Carstens 				  struct kvm_sregs *sregs)
2998b0c632dbSHeiko Carstens {
2999b4ef9d4eSChristoffer Dall 	vcpu_load(vcpu);
3000b4ef9d4eSChristoffer Dall 
300159674c1aSChristian Borntraeger 	memcpy(&vcpu->run->s.regs.acrs, &sregs->acrs, sizeof(sregs->acrs));
3002b0c632dbSHeiko Carstens 	memcpy(&vcpu->arch.sie_block->gcr, &sregs->crs, sizeof(sregs->crs));
3003b4ef9d4eSChristoffer Dall 
3004b4ef9d4eSChristoffer Dall 	vcpu_put(vcpu);
3005b0c632dbSHeiko Carstens 	return 0;
3006b0c632dbSHeiko Carstens }
3007b0c632dbSHeiko Carstens 
3008b0c632dbSHeiko Carstens int kvm_arch_vcpu_ioctl_get_sregs(struct kvm_vcpu *vcpu,
3009b0c632dbSHeiko Carstens 				  struct kvm_sregs *sregs)
3010b0c632dbSHeiko Carstens {
3011bcdec41cSChristoffer Dall 	vcpu_load(vcpu);
3012bcdec41cSChristoffer Dall 
301359674c1aSChristian Borntraeger 	memcpy(&sregs->acrs, &vcpu->run->s.regs.acrs, sizeof(sregs->acrs));
3014b0c632dbSHeiko Carstens 	memcpy(&sregs->crs, &vcpu->arch.sie_block->gcr, sizeof(sregs->crs));
3015bcdec41cSChristoffer Dall 
3016bcdec41cSChristoffer Dall 	vcpu_put(vcpu);
3017b0c632dbSHeiko Carstens 	return 0;
3018b0c632dbSHeiko Carstens }
3019b0c632dbSHeiko Carstens 
3020b0c632dbSHeiko Carstens int kvm_arch_vcpu_ioctl_set_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu)
3021b0c632dbSHeiko Carstens {
30226a96bc7fSChristoffer Dall 	int ret = 0;
30236a96bc7fSChristoffer Dall 
30246a96bc7fSChristoffer Dall 	vcpu_load(vcpu);
30256a96bc7fSChristoffer Dall 
30266a96bc7fSChristoffer Dall 	if (test_fp_ctl(fpu->fpc)) {
30276a96bc7fSChristoffer Dall 		ret = -EINVAL;
30286a96bc7fSChristoffer Dall 		goto out;
30296a96bc7fSChristoffer Dall 	}
3030e1788bb9SChristian Borntraeger 	vcpu->run->s.regs.fpc = fpu->fpc;
30319abc2a08SDavid Hildenbrand 	if (MACHINE_HAS_VX)
3032a7d4b8f2SDavid Hildenbrand 		convert_fp_to_vx((__vector128 *) vcpu->run->s.regs.vrs,
3033a7d4b8f2SDavid Hildenbrand 				 (freg_t *) fpu->fprs);
30349abc2a08SDavid Hildenbrand 	else
3035a7d4b8f2SDavid Hildenbrand 		memcpy(vcpu->run->s.regs.fprs, &fpu->fprs, sizeof(fpu->fprs));
30366a96bc7fSChristoffer Dall 
30376a96bc7fSChristoffer Dall out:
30386a96bc7fSChristoffer Dall 	vcpu_put(vcpu);
30396a96bc7fSChristoffer Dall 	return ret;
3040b0c632dbSHeiko Carstens }
3041b0c632dbSHeiko Carstens 
3042b0c632dbSHeiko Carstens int kvm_arch_vcpu_ioctl_get_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu)
3043b0c632dbSHeiko Carstens {
30441393123eSChristoffer Dall 	vcpu_load(vcpu);
30451393123eSChristoffer Dall 
30469abc2a08SDavid Hildenbrand 	/* make sure we have the latest values */
30479abc2a08SDavid Hildenbrand 	save_fpu_regs();
30489abc2a08SDavid Hildenbrand 	if (MACHINE_HAS_VX)
3049a7d4b8f2SDavid Hildenbrand 		convert_vx_to_fp((freg_t *) fpu->fprs,
3050a7d4b8f2SDavid Hildenbrand 				 (__vector128 *) vcpu->run->s.regs.vrs);
30519abc2a08SDavid Hildenbrand 	else
3052a7d4b8f2SDavid Hildenbrand 		memcpy(fpu->fprs, vcpu->run->s.regs.fprs, sizeof(fpu->fprs));
3053e1788bb9SChristian Borntraeger 	fpu->fpc = vcpu->run->s.regs.fpc;
30541393123eSChristoffer Dall 
30551393123eSChristoffer Dall 	vcpu_put(vcpu);
3056b0c632dbSHeiko Carstens 	return 0;
3057b0c632dbSHeiko Carstens }
3058b0c632dbSHeiko Carstens 
3059b0c632dbSHeiko Carstens static int kvm_arch_vcpu_ioctl_set_initial_psw(struct kvm_vcpu *vcpu, psw_t psw)
3060b0c632dbSHeiko Carstens {
3061b0c632dbSHeiko Carstens 	int rc = 0;
3062b0c632dbSHeiko Carstens 
30637a42fdc2SDavid Hildenbrand 	if (!is_vcpu_stopped(vcpu))
3064b0c632dbSHeiko Carstens 		rc = -EBUSY;
3065d7b0b5ebSCarsten Otte 	else {
3066d7b0b5ebSCarsten Otte 		vcpu->run->psw_mask = psw.mask;
3067d7b0b5ebSCarsten Otte 		vcpu->run->psw_addr = psw.addr;
3068d7b0b5ebSCarsten Otte 	}
3069b0c632dbSHeiko Carstens 	return rc;
3070b0c632dbSHeiko Carstens }
3071b0c632dbSHeiko Carstens 
3072b0c632dbSHeiko Carstens int kvm_arch_vcpu_ioctl_translate(struct kvm_vcpu *vcpu,
3073b0c632dbSHeiko Carstens 				  struct kvm_translation *tr)
3074b0c632dbSHeiko Carstens {
3075b0c632dbSHeiko Carstens 	return -EINVAL; /* not implemented yet */
3076b0c632dbSHeiko Carstens }
3077b0c632dbSHeiko Carstens 
307827291e21SDavid Hildenbrand #define VALID_GUESTDBG_FLAGS (KVM_GUESTDBG_SINGLESTEP | \
307927291e21SDavid Hildenbrand 			      KVM_GUESTDBG_USE_HW_BP | \
308027291e21SDavid Hildenbrand 			      KVM_GUESTDBG_ENABLE)
308127291e21SDavid Hildenbrand 
3082d0bfb940SJan Kiszka int kvm_arch_vcpu_ioctl_set_guest_debug(struct kvm_vcpu *vcpu,
3083d0bfb940SJan Kiszka 					struct kvm_guest_debug *dbg)
3084b0c632dbSHeiko Carstens {
308527291e21SDavid Hildenbrand 	int rc = 0;
308627291e21SDavid Hildenbrand 
308766b56562SChristoffer Dall 	vcpu_load(vcpu);
308866b56562SChristoffer Dall 
308927291e21SDavid Hildenbrand 	vcpu->guest_debug = 0;
309027291e21SDavid Hildenbrand 	kvm_s390_clear_bp_data(vcpu);
309127291e21SDavid Hildenbrand 
309266b56562SChristoffer Dall 	if (dbg->control & ~VALID_GUESTDBG_FLAGS) {
309366b56562SChristoffer Dall 		rc = -EINVAL;
309466b56562SChristoffer Dall 		goto out;
309566b56562SChristoffer Dall 	}
309666b56562SChristoffer Dall 	if (!sclp.has_gpere) {
309766b56562SChristoffer Dall 		rc = -EINVAL;
309866b56562SChristoffer Dall 		goto out;
309966b56562SChristoffer Dall 	}
310027291e21SDavid Hildenbrand 
310127291e21SDavid Hildenbrand 	if (dbg->control & KVM_GUESTDBG_ENABLE) {
310227291e21SDavid Hildenbrand 		vcpu->guest_debug = dbg->control;
310327291e21SDavid Hildenbrand 		/* enforce guest PER */
3104ef8f4f49SDavid Hildenbrand 		kvm_s390_set_cpuflags(vcpu, CPUSTAT_P);
310527291e21SDavid Hildenbrand 
310627291e21SDavid Hildenbrand 		if (dbg->control & KVM_GUESTDBG_USE_HW_BP)
310727291e21SDavid Hildenbrand 			rc = kvm_s390_import_bp_data(vcpu, dbg);
310827291e21SDavid Hildenbrand 	} else {
31099daecfc6SDavid Hildenbrand 		kvm_s390_clear_cpuflags(vcpu, CPUSTAT_P);
311027291e21SDavid Hildenbrand 		vcpu->arch.guestdbg.last_bp = 0;
311127291e21SDavid Hildenbrand 	}
311227291e21SDavid Hildenbrand 
311327291e21SDavid Hildenbrand 	if (rc) {
311427291e21SDavid Hildenbrand 		vcpu->guest_debug = 0;
311527291e21SDavid Hildenbrand 		kvm_s390_clear_bp_data(vcpu);
31169daecfc6SDavid Hildenbrand 		kvm_s390_clear_cpuflags(vcpu, CPUSTAT_P);
311727291e21SDavid Hildenbrand 	}
311827291e21SDavid Hildenbrand 
311966b56562SChristoffer Dall out:
312066b56562SChristoffer Dall 	vcpu_put(vcpu);
312127291e21SDavid Hildenbrand 	return rc;
3122b0c632dbSHeiko Carstens }
3123b0c632dbSHeiko Carstens 
312462d9f0dbSMarcelo Tosatti int kvm_arch_vcpu_ioctl_get_mpstate(struct kvm_vcpu *vcpu,
312562d9f0dbSMarcelo Tosatti 				    struct kvm_mp_state *mp_state)
312662d9f0dbSMarcelo Tosatti {
3127fd232561SChristoffer Dall 	int ret;
3128fd232561SChristoffer Dall 
3129fd232561SChristoffer Dall 	vcpu_load(vcpu);
3130fd232561SChristoffer Dall 
31316352e4d2SDavid Hildenbrand 	/* CHECK_STOP and LOAD are not supported yet */
3132fd232561SChristoffer Dall 	ret = is_vcpu_stopped(vcpu) ? KVM_MP_STATE_STOPPED :
31336352e4d2SDavid Hildenbrand 				      KVM_MP_STATE_OPERATING;
3134fd232561SChristoffer Dall 
3135fd232561SChristoffer Dall 	vcpu_put(vcpu);
3136fd232561SChristoffer Dall 	return ret;
313762d9f0dbSMarcelo Tosatti }
313862d9f0dbSMarcelo Tosatti 
313962d9f0dbSMarcelo Tosatti int kvm_arch_vcpu_ioctl_set_mpstate(struct kvm_vcpu *vcpu,
314062d9f0dbSMarcelo Tosatti 				    struct kvm_mp_state *mp_state)
314162d9f0dbSMarcelo Tosatti {
31426352e4d2SDavid Hildenbrand 	int rc = 0;
31436352e4d2SDavid Hildenbrand 
3144e83dff5eSChristoffer Dall 	vcpu_load(vcpu);
3145e83dff5eSChristoffer Dall 
31466352e4d2SDavid Hildenbrand 	/* user space knows about this interface - let it control the state */
31476352e4d2SDavid Hildenbrand 	vcpu->kvm->arch.user_cpu_state_ctrl = 1;
31486352e4d2SDavid Hildenbrand 
31496352e4d2SDavid Hildenbrand 	switch (mp_state->mp_state) {
31506352e4d2SDavid Hildenbrand 	case KVM_MP_STATE_STOPPED:
31516352e4d2SDavid Hildenbrand 		kvm_s390_vcpu_stop(vcpu);
31526352e4d2SDavid Hildenbrand 		break;
31536352e4d2SDavid Hildenbrand 	case KVM_MP_STATE_OPERATING:
31546352e4d2SDavid Hildenbrand 		kvm_s390_vcpu_start(vcpu);
31556352e4d2SDavid Hildenbrand 		break;
31566352e4d2SDavid Hildenbrand 	case KVM_MP_STATE_LOAD:
31576352e4d2SDavid Hildenbrand 	case KVM_MP_STATE_CHECK_STOP:
31586352e4d2SDavid Hildenbrand 		/* fall through - CHECK_STOP and LOAD are not supported yet */
31596352e4d2SDavid Hildenbrand 	default:
31606352e4d2SDavid Hildenbrand 		rc = -ENXIO;
31616352e4d2SDavid Hildenbrand 	}
31626352e4d2SDavid Hildenbrand 
3163e83dff5eSChristoffer Dall 	vcpu_put(vcpu);
31646352e4d2SDavid Hildenbrand 	return rc;
316562d9f0dbSMarcelo Tosatti }
316662d9f0dbSMarcelo Tosatti 
31678ad35755SDavid Hildenbrand static bool ibs_enabled(struct kvm_vcpu *vcpu)
31688ad35755SDavid Hildenbrand {
31698d5fb0dcSDavid Hildenbrand 	return kvm_s390_test_cpuflags(vcpu, CPUSTAT_IBS);
31708ad35755SDavid Hildenbrand }
31718ad35755SDavid Hildenbrand 
31722c70fe44SChristian Borntraeger static int kvm_s390_handle_requests(struct kvm_vcpu *vcpu)
31732c70fe44SChristian Borntraeger {
31748ad35755SDavid Hildenbrand retry:
31758e236546SChristian Borntraeger 	kvm_s390_vcpu_request_handled(vcpu);
31762fa6e1e1SRadim Krčmář 	if (!kvm_request_pending(vcpu))
3177586b7ccdSChristian Borntraeger 		return 0;
31782c70fe44SChristian Borntraeger 	/*
31792c70fe44SChristian Borntraeger 	 * We use MMU_RELOAD just to re-arm the ipte notifier for the
3180b2d73b2aSMartin Schwidefsky 	 * guest prefix page. gmap_mprotect_notify will wait on the ptl lock.
31812c70fe44SChristian Borntraeger 	 * This ensures that the ipte instruction for this request has
31822c70fe44SChristian Borntraeger 	 * already finished. We might race against a second unmapper that
31832c70fe44SChristian Borntraeger 	 * wants to set the blocking bit. Lets just retry the request loop.
31842c70fe44SChristian Borntraeger 	 */
31858ad35755SDavid Hildenbrand 	if (kvm_check_request(KVM_REQ_MMU_RELOAD, vcpu)) {
31862c70fe44SChristian Borntraeger 		int rc;
3187b2d73b2aSMartin Schwidefsky 		rc = gmap_mprotect_notify(vcpu->arch.gmap,
3188fda902cbSMichael Mueller 					  kvm_s390_get_prefix(vcpu),
3189b2d73b2aSMartin Schwidefsky 					  PAGE_SIZE * 2, PROT_WRITE);
3190aca411a4SJulius Niedworok 		if (rc) {
3191aca411a4SJulius Niedworok 			kvm_make_request(KVM_REQ_MMU_RELOAD, vcpu);
31922c70fe44SChristian Borntraeger 			return rc;
3193aca411a4SJulius Niedworok 		}
31948ad35755SDavid Hildenbrand 		goto retry;
31952c70fe44SChristian Borntraeger 	}
31968ad35755SDavid Hildenbrand 
3197d3d692c8SDavid Hildenbrand 	if (kvm_check_request(KVM_REQ_TLB_FLUSH, vcpu)) {
3198d3d692c8SDavid Hildenbrand 		vcpu->arch.sie_block->ihcpu = 0xffff;
3199d3d692c8SDavid Hildenbrand 		goto retry;
3200d3d692c8SDavid Hildenbrand 	}
3201d3d692c8SDavid Hildenbrand 
32028ad35755SDavid Hildenbrand 	if (kvm_check_request(KVM_REQ_ENABLE_IBS, vcpu)) {
32038ad35755SDavid Hildenbrand 		if (!ibs_enabled(vcpu)) {
32048ad35755SDavid Hildenbrand 			trace_kvm_s390_enable_disable_ibs(vcpu->vcpu_id, 1);
3205ef8f4f49SDavid Hildenbrand 			kvm_s390_set_cpuflags(vcpu, CPUSTAT_IBS);
32068ad35755SDavid Hildenbrand 		}
32078ad35755SDavid Hildenbrand 		goto retry;
32088ad35755SDavid Hildenbrand 	}
32098ad35755SDavid Hildenbrand 
32108ad35755SDavid Hildenbrand 	if (kvm_check_request(KVM_REQ_DISABLE_IBS, vcpu)) {
32118ad35755SDavid Hildenbrand 		if (ibs_enabled(vcpu)) {
32128ad35755SDavid Hildenbrand 			trace_kvm_s390_enable_disable_ibs(vcpu->vcpu_id, 0);
32139daecfc6SDavid Hildenbrand 			kvm_s390_clear_cpuflags(vcpu, CPUSTAT_IBS);
32148ad35755SDavid Hildenbrand 		}
32158ad35755SDavid Hildenbrand 		goto retry;
32168ad35755SDavid Hildenbrand 	}
32178ad35755SDavid Hildenbrand 
32186502a34cSDavid Hildenbrand 	if (kvm_check_request(KVM_REQ_ICPT_OPEREXC, vcpu)) {
32196502a34cSDavid Hildenbrand 		vcpu->arch.sie_block->ictl |= ICTL_OPEREXC;
32206502a34cSDavid Hildenbrand 		goto retry;
32216502a34cSDavid Hildenbrand 	}
32226502a34cSDavid Hildenbrand 
3223190df4a2SClaudio Imbrenda 	if (kvm_check_request(KVM_REQ_START_MIGRATION, vcpu)) {
3224190df4a2SClaudio Imbrenda 		/*
3225c9f0a2b8SJanosch Frank 		 * Disable CMM virtualization; we will emulate the ESSA
3226190df4a2SClaudio Imbrenda 		 * instruction manually, in order to provide additional
3227190df4a2SClaudio Imbrenda 		 * functionalities needed for live migration.
3228190df4a2SClaudio Imbrenda 		 */
3229190df4a2SClaudio Imbrenda 		vcpu->arch.sie_block->ecb2 &= ~ECB2_CMMA;
3230190df4a2SClaudio Imbrenda 		goto retry;
3231190df4a2SClaudio Imbrenda 	}
3232190df4a2SClaudio Imbrenda 
3233190df4a2SClaudio Imbrenda 	if (kvm_check_request(KVM_REQ_STOP_MIGRATION, vcpu)) {
3234190df4a2SClaudio Imbrenda 		/*
3235c9f0a2b8SJanosch Frank 		 * Re-enable CMM virtualization if CMMA is available and
3236c9f0a2b8SJanosch Frank 		 * CMM has been used.
3237190df4a2SClaudio Imbrenda 		 */
3238190df4a2SClaudio Imbrenda 		if ((vcpu->kvm->arch.use_cmma) &&
3239c9f0a2b8SJanosch Frank 		    (vcpu->kvm->mm->context.uses_cmm))
3240190df4a2SClaudio Imbrenda 			vcpu->arch.sie_block->ecb2 |= ECB2_CMMA;
3241190df4a2SClaudio Imbrenda 		goto retry;
3242190df4a2SClaudio Imbrenda 	}
3243190df4a2SClaudio Imbrenda 
32440759d068SDavid Hildenbrand 	/* nothing to do, just clear the request */
324572875d8aSRadim Krčmář 	kvm_clear_request(KVM_REQ_UNHALT, vcpu);
32463194cdb7SDavid Hildenbrand 	/* we left the vsie handler, nothing to do, just clear the request */
32473194cdb7SDavid Hildenbrand 	kvm_clear_request(KVM_REQ_VSIE_RESTART, vcpu);
32480759d068SDavid Hildenbrand 
32492c70fe44SChristian Borntraeger 	return 0;
32502c70fe44SChristian Borntraeger }
32512c70fe44SChristian Borntraeger 
32520e7def5fSDavid Hildenbrand void kvm_s390_set_tod_clock(struct kvm *kvm,
32538fa1696eSCollin L. Walling 			    const struct kvm_s390_vm_tod_clock *gtod)
32548fa1696eSCollin L. Walling {
32558fa1696eSCollin L. Walling 	struct kvm_vcpu *vcpu;
32568fa1696eSCollin L. Walling 	struct kvm_s390_tod_clock_ext htod;
32578fa1696eSCollin L. Walling 	int i;
32588fa1696eSCollin L. Walling 
32598fa1696eSCollin L. Walling 	mutex_lock(&kvm->lock);
32608fa1696eSCollin L. Walling 	preempt_disable();
32618fa1696eSCollin L. Walling 
32628fa1696eSCollin L. Walling 	get_tod_clock_ext((char *)&htod);
32638fa1696eSCollin L. Walling 
32648fa1696eSCollin L. Walling 	kvm->arch.epoch = gtod->tod - htod.tod;
32650e7def5fSDavid Hildenbrand 	kvm->arch.epdx = 0;
32660e7def5fSDavid Hildenbrand 	if (test_kvm_facility(kvm, 139)) {
32678fa1696eSCollin L. Walling 		kvm->arch.epdx = gtod->epoch_idx - htod.epoch_idx;
32688fa1696eSCollin L. Walling 		if (kvm->arch.epoch > gtod->tod)
32698fa1696eSCollin L. Walling 			kvm->arch.epdx -= 1;
32700e7def5fSDavid Hildenbrand 	}
32718fa1696eSCollin L. Walling 
32728fa1696eSCollin L. Walling 	kvm_s390_vcpu_block_all(kvm);
32738fa1696eSCollin L. Walling 	kvm_for_each_vcpu(i, vcpu, kvm) {
32748fa1696eSCollin L. Walling 		vcpu->arch.sie_block->epoch = kvm->arch.epoch;
32758fa1696eSCollin L. Walling 		vcpu->arch.sie_block->epdx  = kvm->arch.epdx;
32768fa1696eSCollin L. Walling 	}
32778fa1696eSCollin L. Walling 
32788fa1696eSCollin L. Walling 	kvm_s390_vcpu_unblock_all(kvm);
32798fa1696eSCollin L. Walling 	preempt_enable();
32808fa1696eSCollin L. Walling 	mutex_unlock(&kvm->lock);
32818fa1696eSCollin L. Walling }
32828fa1696eSCollin L. Walling 
3283fa576c58SThomas Huth /**
3284fa576c58SThomas Huth  * kvm_arch_fault_in_page - fault-in guest page if necessary
3285fa576c58SThomas Huth  * @vcpu: The corresponding virtual cpu
3286fa576c58SThomas Huth  * @gpa: Guest physical address
3287fa576c58SThomas Huth  * @writable: Whether the page should be writable or not
3288fa576c58SThomas Huth  *
3289fa576c58SThomas Huth  * Make sure that a guest page has been faulted-in on the host.
3290fa576c58SThomas Huth  *
3291fa576c58SThomas Huth  * Return: Zero on success, negative error code otherwise.
3292fa576c58SThomas Huth  */
3293fa576c58SThomas Huth long kvm_arch_fault_in_page(struct kvm_vcpu *vcpu, gpa_t gpa, int writable)
329424eb3a82SDominik Dingel {
3295527e30b4SMartin Schwidefsky 	return gmap_fault(vcpu->arch.gmap, gpa,
3296527e30b4SMartin Schwidefsky 			  writable ? FAULT_FLAG_WRITE : 0);
329724eb3a82SDominik Dingel }
329824eb3a82SDominik Dingel 
32993c038e6bSDominik Dingel static void __kvm_inject_pfault_token(struct kvm_vcpu *vcpu, bool start_token,
33003c038e6bSDominik Dingel 				      unsigned long token)
33013c038e6bSDominik Dingel {
33023c038e6bSDominik Dingel 	struct kvm_s390_interrupt inti;
3303383d0b05SJens Freimann 	struct kvm_s390_irq irq;
33043c038e6bSDominik Dingel 
33053c038e6bSDominik Dingel 	if (start_token) {
3306383d0b05SJens Freimann 		irq.u.ext.ext_params2 = token;
3307383d0b05SJens Freimann 		irq.type = KVM_S390_INT_PFAULT_INIT;
3308383d0b05SJens Freimann 		WARN_ON_ONCE(kvm_s390_inject_vcpu(vcpu, &irq));
33093c038e6bSDominik Dingel 	} else {
33103c038e6bSDominik Dingel 		inti.type = KVM_S390_INT_PFAULT_DONE;
3311383d0b05SJens Freimann 		inti.parm64 = token;
33123c038e6bSDominik Dingel 		WARN_ON_ONCE(kvm_s390_inject_vm(vcpu->kvm, &inti));
33133c038e6bSDominik Dingel 	}
33143c038e6bSDominik Dingel }
33153c038e6bSDominik Dingel 
33163c038e6bSDominik Dingel void kvm_arch_async_page_not_present(struct kvm_vcpu *vcpu,
33173c038e6bSDominik Dingel 				     struct kvm_async_pf *work)
33183c038e6bSDominik Dingel {
33193c038e6bSDominik Dingel 	trace_kvm_s390_pfault_init(vcpu, work->arch.pfault_token);
33203c038e6bSDominik Dingel 	__kvm_inject_pfault_token(vcpu, true, work->arch.pfault_token);
33213c038e6bSDominik Dingel }
33223c038e6bSDominik Dingel 
33233c038e6bSDominik Dingel void kvm_arch_async_page_present(struct kvm_vcpu *vcpu,
33243c038e6bSDominik Dingel 				 struct kvm_async_pf *work)
33253c038e6bSDominik Dingel {
33263c038e6bSDominik Dingel 	trace_kvm_s390_pfault_done(vcpu, work->arch.pfault_token);
33273c038e6bSDominik Dingel 	__kvm_inject_pfault_token(vcpu, false, work->arch.pfault_token);
33283c038e6bSDominik Dingel }
33293c038e6bSDominik Dingel 
33303c038e6bSDominik Dingel void kvm_arch_async_page_ready(struct kvm_vcpu *vcpu,
33313c038e6bSDominik Dingel 			       struct kvm_async_pf *work)
33323c038e6bSDominik Dingel {
33333c038e6bSDominik Dingel 	/* s390 will always inject the page directly */
33343c038e6bSDominik Dingel }
33353c038e6bSDominik Dingel 
33363c038e6bSDominik Dingel bool kvm_arch_can_inject_async_page_present(struct kvm_vcpu *vcpu)
33373c038e6bSDominik Dingel {
33383c038e6bSDominik Dingel 	/*
33393c038e6bSDominik Dingel 	 * s390 will always inject the page directly,
33403c038e6bSDominik Dingel 	 * but we still want check_async_completion to cleanup
33413c038e6bSDominik Dingel 	 */
33423c038e6bSDominik Dingel 	return true;
33433c038e6bSDominik Dingel }
33443c038e6bSDominik Dingel 
33453c038e6bSDominik Dingel static int kvm_arch_setup_async_pf(struct kvm_vcpu *vcpu)
33463c038e6bSDominik Dingel {
33473c038e6bSDominik Dingel 	hva_t hva;
33483c038e6bSDominik Dingel 	struct kvm_arch_async_pf arch;
33493c038e6bSDominik Dingel 	int rc;
33503c038e6bSDominik Dingel 
33513c038e6bSDominik Dingel 	if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID)
33523c038e6bSDominik Dingel 		return 0;
33533c038e6bSDominik Dingel 	if ((vcpu->arch.sie_block->gpsw.mask & vcpu->arch.pfault_select) !=
33543c038e6bSDominik Dingel 	    vcpu->arch.pfault_compare)
33553c038e6bSDominik Dingel 		return 0;
33563c038e6bSDominik Dingel 	if (psw_extint_disabled(vcpu))
33573c038e6bSDominik Dingel 		return 0;
33589a022067SDavid Hildenbrand 	if (kvm_s390_vcpu_has_irq(vcpu, 0))
33593c038e6bSDominik Dingel 		return 0;
3360b9224cd7SDavid Hildenbrand 	if (!(vcpu->arch.sie_block->gcr[0] & CR0_SERVICE_SIGNAL_SUBMASK))
33613c038e6bSDominik Dingel 		return 0;
33623c038e6bSDominik Dingel 	if (!vcpu->arch.gmap->pfault_enabled)
33633c038e6bSDominik Dingel 		return 0;
33643c038e6bSDominik Dingel 
336581480cc1SHeiko Carstens 	hva = gfn_to_hva(vcpu->kvm, gpa_to_gfn(current->thread.gmap_addr));
336681480cc1SHeiko Carstens 	hva += current->thread.gmap_addr & ~PAGE_MASK;
336781480cc1SHeiko Carstens 	if (read_guest_real(vcpu, vcpu->arch.pfault_token, &arch.pfault_token, 8))
33683c038e6bSDominik Dingel 		return 0;
33693c038e6bSDominik Dingel 
33703c038e6bSDominik Dingel 	rc = kvm_setup_async_pf(vcpu, current->thread.gmap_addr, hva, &arch);
33713c038e6bSDominik Dingel 	return rc;
33723c038e6bSDominik Dingel }
33733c038e6bSDominik Dingel 
33743fb4c40fSThomas Huth static int vcpu_pre_run(struct kvm_vcpu *vcpu)
3375b0c632dbSHeiko Carstens {
33763fb4c40fSThomas Huth 	int rc, cpuflags;
3377e168bf8dSCarsten Otte 
33783c038e6bSDominik Dingel 	/*
33793c038e6bSDominik Dingel 	 * On s390 notifications for arriving pages will be delivered directly
33803c038e6bSDominik Dingel 	 * to the guest but the house keeping for completed pfaults is
33813c038e6bSDominik Dingel 	 * handled outside the worker.
33823c038e6bSDominik Dingel 	 */
33833c038e6bSDominik Dingel 	kvm_check_async_pf_completion(vcpu);
33843c038e6bSDominik Dingel 
33857ec7c8c7SChristian Borntraeger 	vcpu->arch.sie_block->gg14 = vcpu->run->s.regs.gprs[14];
33867ec7c8c7SChristian Borntraeger 	vcpu->arch.sie_block->gg15 = vcpu->run->s.regs.gprs[15];
3387b0c632dbSHeiko Carstens 
3388b0c632dbSHeiko Carstens 	if (need_resched())
3389b0c632dbSHeiko Carstens 		schedule();
3390b0c632dbSHeiko Carstens 
3391d3a73acbSMartin Schwidefsky 	if (test_cpu_flag(CIF_MCCK_PENDING))
339271cde587SChristian Borntraeger 		s390_handle_mcck();
339371cde587SChristian Borntraeger 
339479395031SJens Freimann 	if (!kvm_is_ucontrol(vcpu->kvm)) {
339579395031SJens Freimann 		rc = kvm_s390_deliver_pending_interrupts(vcpu);
339679395031SJens Freimann 		if (rc)
339779395031SJens Freimann 			return rc;
339879395031SJens Freimann 	}
33990ff31867SCarsten Otte 
34002c70fe44SChristian Borntraeger 	rc = kvm_s390_handle_requests(vcpu);
34012c70fe44SChristian Borntraeger 	if (rc)
34022c70fe44SChristian Borntraeger 		return rc;
34032c70fe44SChristian Borntraeger 
340427291e21SDavid Hildenbrand 	if (guestdbg_enabled(vcpu)) {
340527291e21SDavid Hildenbrand 		kvm_s390_backup_guest_per_regs(vcpu);
340627291e21SDavid Hildenbrand 		kvm_s390_patch_guest_per_regs(vcpu);
340727291e21SDavid Hildenbrand 	}
340827291e21SDavid Hildenbrand 
3409b0c632dbSHeiko Carstens 	vcpu->arch.sie_block->icptcode = 0;
34103fb4c40fSThomas Huth 	cpuflags = atomic_read(&vcpu->arch.sie_block->cpuflags);
34113fb4c40fSThomas Huth 	VCPU_EVENT(vcpu, 6, "entering sie flags %x", cpuflags);
34123fb4c40fSThomas Huth 	trace_kvm_s390_sie_enter(vcpu, cpuflags);
34132b29a9fdSDominik Dingel 
34143fb4c40fSThomas Huth 	return 0;
34153fb4c40fSThomas Huth }
34163fb4c40fSThomas Huth 
3417492d8642SThomas Huth static int vcpu_post_run_fault_in_sie(struct kvm_vcpu *vcpu)
3418492d8642SThomas Huth {
341956317920SDavid Hildenbrand 	struct kvm_s390_pgm_info pgm_info = {
342056317920SDavid Hildenbrand 		.code = PGM_ADDRESSING,
342156317920SDavid Hildenbrand 	};
342256317920SDavid Hildenbrand 	u8 opcode, ilen;
3423492d8642SThomas Huth 	int rc;
3424492d8642SThomas Huth 
3425492d8642SThomas Huth 	VCPU_EVENT(vcpu, 3, "%s", "fault in sie instruction");
3426492d8642SThomas Huth 	trace_kvm_s390_sie_fault(vcpu);
3427492d8642SThomas Huth 
3428492d8642SThomas Huth 	/*
3429492d8642SThomas Huth 	 * We want to inject an addressing exception, which is defined as a
3430492d8642SThomas Huth 	 * suppressing or terminating exception. However, since we came here
3431492d8642SThomas Huth 	 * by a DAT access exception, the PSW still points to the faulting
3432492d8642SThomas Huth 	 * instruction since DAT exceptions are nullifying. So we've got
3433492d8642SThomas Huth 	 * to look up the current opcode to get the length of the instruction
3434492d8642SThomas Huth 	 * to be able to forward the PSW.
3435492d8642SThomas Huth 	 */
34363fa8cad7SDavid Hildenbrand 	rc = read_guest_instr(vcpu, vcpu->arch.sie_block->gpsw.addr, &opcode, 1);
343756317920SDavid Hildenbrand 	ilen = insn_length(opcode);
34389b0d721aSDavid Hildenbrand 	if (rc < 0) {
34399b0d721aSDavid Hildenbrand 		return rc;
34409b0d721aSDavid Hildenbrand 	} else if (rc) {
34419b0d721aSDavid Hildenbrand 		/* Instruction-Fetching Exceptions - we can't detect the ilen.
34429b0d721aSDavid Hildenbrand 		 * Forward by arbitrary ilc, injection will take care of
34439b0d721aSDavid Hildenbrand 		 * nullification if necessary.
34449b0d721aSDavid Hildenbrand 		 */
34459b0d721aSDavid Hildenbrand 		pgm_info = vcpu->arch.pgm;
34469b0d721aSDavid Hildenbrand 		ilen = 4;
34479b0d721aSDavid Hildenbrand 	}
344856317920SDavid Hildenbrand 	pgm_info.flags = ilen | KVM_S390_PGM_FLAGS_ILC_VALID;
344956317920SDavid Hildenbrand 	kvm_s390_forward_psw(vcpu, ilen);
345056317920SDavid Hildenbrand 	return kvm_s390_inject_prog_irq(vcpu, &pgm_info);
3451492d8642SThomas Huth }
3452492d8642SThomas Huth 
34533fb4c40fSThomas Huth static int vcpu_post_run(struct kvm_vcpu *vcpu, int exit_reason)
34543fb4c40fSThomas Huth {
34554d62fcc0SQingFeng Hao 	struct mcck_volatile_info *mcck_info;
34564d62fcc0SQingFeng Hao 	struct sie_page *sie_page;
34574d62fcc0SQingFeng Hao 
34582b29a9fdSDominik Dingel 	VCPU_EVENT(vcpu, 6, "exit sie icptcode %d",
34592b29a9fdSDominik Dingel 		   vcpu->arch.sie_block->icptcode);
34602b29a9fdSDominik Dingel 	trace_kvm_s390_sie_exit(vcpu, vcpu->arch.sie_block->icptcode);
34612b29a9fdSDominik Dingel 
346227291e21SDavid Hildenbrand 	if (guestdbg_enabled(vcpu))
346327291e21SDavid Hildenbrand 		kvm_s390_restore_guest_per_regs(vcpu);
346427291e21SDavid Hildenbrand 
34657ec7c8c7SChristian Borntraeger 	vcpu->run->s.regs.gprs[14] = vcpu->arch.sie_block->gg14;
34667ec7c8c7SChristian Borntraeger 	vcpu->run->s.regs.gprs[15] = vcpu->arch.sie_block->gg15;
346771f116bfSDavid Hildenbrand 
34684d62fcc0SQingFeng Hao 	if (exit_reason == -EINTR) {
34694d62fcc0SQingFeng Hao 		VCPU_EVENT(vcpu, 3, "%s", "machine check");
34704d62fcc0SQingFeng Hao 		sie_page = container_of(vcpu->arch.sie_block,
34714d62fcc0SQingFeng Hao 					struct sie_page, sie_block);
34724d62fcc0SQingFeng Hao 		mcck_info = &sie_page->mcck_info;
34734d62fcc0SQingFeng Hao 		kvm_s390_reinject_machine_check(vcpu, mcck_info);
34744d62fcc0SQingFeng Hao 		return 0;
34754d62fcc0SQingFeng Hao 	}
34764d62fcc0SQingFeng Hao 
347771f116bfSDavid Hildenbrand 	if (vcpu->arch.sie_block->icptcode > 0) {
347871f116bfSDavid Hildenbrand 		int rc = kvm_handle_sie_intercept(vcpu);
347971f116bfSDavid Hildenbrand 
348071f116bfSDavid Hildenbrand 		if (rc != -EOPNOTSUPP)
348171f116bfSDavid Hildenbrand 			return rc;
348271f116bfSDavid Hildenbrand 		vcpu->run->exit_reason = KVM_EXIT_S390_SIEIC;
348371f116bfSDavid Hildenbrand 		vcpu->run->s390_sieic.icptcode = vcpu->arch.sie_block->icptcode;
348471f116bfSDavid Hildenbrand 		vcpu->run->s390_sieic.ipa = vcpu->arch.sie_block->ipa;
348571f116bfSDavid Hildenbrand 		vcpu->run->s390_sieic.ipb = vcpu->arch.sie_block->ipb;
348671f116bfSDavid Hildenbrand 		return -EREMOTE;
348771f116bfSDavid Hildenbrand 	} else if (exit_reason != -EFAULT) {
348871f116bfSDavid Hildenbrand 		vcpu->stat.exit_null++;
348971f116bfSDavid Hildenbrand 		return 0;
3490210b1607SThomas Huth 	} else if (kvm_is_ucontrol(vcpu->kvm)) {
3491210b1607SThomas Huth 		vcpu->run->exit_reason = KVM_EXIT_S390_UCONTROL;
3492210b1607SThomas Huth 		vcpu->run->s390_ucontrol.trans_exc_code =
3493210b1607SThomas Huth 						current->thread.gmap_addr;
3494210b1607SThomas Huth 		vcpu->run->s390_ucontrol.pgm_code = 0x10;
349571f116bfSDavid Hildenbrand 		return -EREMOTE;
349624eb3a82SDominik Dingel 	} else if (current->thread.gmap_pfault) {
34973c038e6bSDominik Dingel 		trace_kvm_s390_major_guest_pfault(vcpu);
349824eb3a82SDominik Dingel 		current->thread.gmap_pfault = 0;
349971f116bfSDavid Hildenbrand 		if (kvm_arch_setup_async_pf(vcpu))
350071f116bfSDavid Hildenbrand 			return 0;
350171f116bfSDavid Hildenbrand 		return kvm_arch_fault_in_page(vcpu, current->thread.gmap_addr, 1);
3502fa576c58SThomas Huth 	}
350371f116bfSDavid Hildenbrand 	return vcpu_post_run_fault_in_sie(vcpu);
35043fb4c40fSThomas Huth }
35053fb4c40fSThomas Huth 
35063fb4c40fSThomas Huth static int __vcpu_run(struct kvm_vcpu *vcpu)
35073fb4c40fSThomas Huth {
35083fb4c40fSThomas Huth 	int rc, exit_reason;
35093fb4c40fSThomas Huth 
3510800c1065SThomas Huth 	/*
3511800c1065SThomas Huth 	 * We try to hold kvm->srcu during most of vcpu_run (except when run-
3512800c1065SThomas Huth 	 * ning the guest), so that memslots (and other stuff) are protected
3513800c1065SThomas Huth 	 */
3514800c1065SThomas Huth 	vcpu->srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
3515800c1065SThomas Huth 
3516a76ccff6SThomas Huth 	do {
35173fb4c40fSThomas Huth 		rc = vcpu_pre_run(vcpu);
35183fb4c40fSThomas Huth 		if (rc)
3519a76ccff6SThomas Huth 			break;
35203fb4c40fSThomas Huth 
3521800c1065SThomas Huth 		srcu_read_unlock(&vcpu->kvm->srcu, vcpu->srcu_idx);
35223fb4c40fSThomas Huth 		/*
3523a76ccff6SThomas Huth 		 * As PF_VCPU will be used in fault handler, between
3524a76ccff6SThomas Huth 		 * guest_enter and guest_exit should be no uaccess.
35253fb4c40fSThomas Huth 		 */
35260097d12eSChristian Borntraeger 		local_irq_disable();
35276edaa530SPaolo Bonzini 		guest_enter_irqoff();
3528db0758b2SDavid Hildenbrand 		__disable_cpu_timer_accounting(vcpu);
35290097d12eSChristian Borntraeger 		local_irq_enable();
3530a76ccff6SThomas Huth 		exit_reason = sie64a(vcpu->arch.sie_block,
3531a76ccff6SThomas Huth 				     vcpu->run->s.regs.gprs);
35320097d12eSChristian Borntraeger 		local_irq_disable();
3533db0758b2SDavid Hildenbrand 		__enable_cpu_timer_accounting(vcpu);
35346edaa530SPaolo Bonzini 		guest_exit_irqoff();
35350097d12eSChristian Borntraeger 		local_irq_enable();
3536800c1065SThomas Huth 		vcpu->srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
35373fb4c40fSThomas Huth 
35383fb4c40fSThomas Huth 		rc = vcpu_post_run(vcpu, exit_reason);
353927291e21SDavid Hildenbrand 	} while (!signal_pending(current) && !guestdbg_exit_pending(vcpu) && !rc);
35403fb4c40fSThomas Huth 
3541800c1065SThomas Huth 	srcu_read_unlock(&vcpu->kvm->srcu, vcpu->srcu_idx);
3542e168bf8dSCarsten Otte 	return rc;
3543b0c632dbSHeiko Carstens }
3544b0c632dbSHeiko Carstens 
3545b028ee3eSDavid Hildenbrand static void sync_regs(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
3546b028ee3eSDavid Hildenbrand {
35474d5f2c04SChristian Borntraeger 	struct runtime_instr_cb *riccb;
35484e0b1ab7SFan Zhang 	struct gs_cb *gscb;
35494d5f2c04SChristian Borntraeger 
35504d5f2c04SChristian Borntraeger 	riccb = (struct runtime_instr_cb *) &kvm_run->s.regs.riccb;
35514e0b1ab7SFan Zhang 	gscb = (struct gs_cb *) &kvm_run->s.regs.gscb;
3552b028ee3eSDavid Hildenbrand 	vcpu->arch.sie_block->gpsw.mask = kvm_run->psw_mask;
3553b028ee3eSDavid Hildenbrand 	vcpu->arch.sie_block->gpsw.addr = kvm_run->psw_addr;
3554b028ee3eSDavid Hildenbrand 	if (kvm_run->kvm_dirty_regs & KVM_SYNC_PREFIX)
3555b028ee3eSDavid Hildenbrand 		kvm_s390_set_prefix(vcpu, kvm_run->s.regs.prefix);
3556b028ee3eSDavid Hildenbrand 	if (kvm_run->kvm_dirty_regs & KVM_SYNC_CRS) {
3557b028ee3eSDavid Hildenbrand 		memcpy(&vcpu->arch.sie_block->gcr, &kvm_run->s.regs.crs, 128);
3558d3d692c8SDavid Hildenbrand 		/* some control register changes require a tlb flush */
3559d3d692c8SDavid Hildenbrand 		kvm_make_request(KVM_REQ_TLB_FLUSH, vcpu);
3560b028ee3eSDavid Hildenbrand 	}
3561b028ee3eSDavid Hildenbrand 	if (kvm_run->kvm_dirty_regs & KVM_SYNC_ARCH0) {
35624287f247SDavid Hildenbrand 		kvm_s390_set_cpu_timer(vcpu, kvm_run->s.regs.cputm);
3563b028ee3eSDavid Hildenbrand 		vcpu->arch.sie_block->ckc = kvm_run->s.regs.ckc;
3564b028ee3eSDavid Hildenbrand 		vcpu->arch.sie_block->todpr = kvm_run->s.regs.todpr;
3565b028ee3eSDavid Hildenbrand 		vcpu->arch.sie_block->pp = kvm_run->s.regs.pp;
3566b028ee3eSDavid Hildenbrand 		vcpu->arch.sie_block->gbea = kvm_run->s.regs.gbea;
3567b028ee3eSDavid Hildenbrand 	}
3568b028ee3eSDavid Hildenbrand 	if (kvm_run->kvm_dirty_regs & KVM_SYNC_PFAULT) {
3569b028ee3eSDavid Hildenbrand 		vcpu->arch.pfault_token = kvm_run->s.regs.pft;
3570b028ee3eSDavid Hildenbrand 		vcpu->arch.pfault_select = kvm_run->s.regs.pfs;
3571b028ee3eSDavid Hildenbrand 		vcpu->arch.pfault_compare = kvm_run->s.regs.pfc;
35729fbd8082SDavid Hildenbrand 		if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID)
35739fbd8082SDavid Hildenbrand 			kvm_clear_async_pf_completion_queue(vcpu);
3574b028ee3eSDavid Hildenbrand 	}
357580cd8763SFan Zhang 	/*
357680cd8763SFan Zhang 	 * If userspace sets the riccb (e.g. after migration) to a valid state,
357780cd8763SFan Zhang 	 * we should enable RI here instead of doing the lazy enablement.
357880cd8763SFan Zhang 	 */
357980cd8763SFan Zhang 	if ((kvm_run->kvm_dirty_regs & KVM_SYNC_RICCB) &&
35804d5f2c04SChristian Borntraeger 	    test_kvm_facility(vcpu->kvm, 64) &&
3581bb59c2daSAlice Frosi 	    riccb->v &&
35820c9d8683SDavid Hildenbrand 	    !(vcpu->arch.sie_block->ecb3 & ECB3_RI)) {
35834d5f2c04SChristian Borntraeger 		VCPU_EVENT(vcpu, 3, "%s", "ENABLE: RI (sync_regs)");
35840c9d8683SDavid Hildenbrand 		vcpu->arch.sie_block->ecb3 |= ECB3_RI;
358580cd8763SFan Zhang 	}
35864e0b1ab7SFan Zhang 	/*
35874e0b1ab7SFan Zhang 	 * If userspace sets the gscb (e.g. after migration) to non-zero,
35884e0b1ab7SFan Zhang 	 * we should enable GS here instead of doing the lazy enablement.
35894e0b1ab7SFan Zhang 	 */
35904e0b1ab7SFan Zhang 	if ((kvm_run->kvm_dirty_regs & KVM_SYNC_GSCB) &&
35914e0b1ab7SFan Zhang 	    test_kvm_facility(vcpu->kvm, 133) &&
35924e0b1ab7SFan Zhang 	    gscb->gssm &&
35934e0b1ab7SFan Zhang 	    !vcpu->arch.gs_enabled) {
35944e0b1ab7SFan Zhang 		VCPU_EVENT(vcpu, 3, "%s", "ENABLE: GS (sync_regs)");
35954e0b1ab7SFan Zhang 		vcpu->arch.sie_block->ecb |= ECB_GS;
35964e0b1ab7SFan Zhang 		vcpu->arch.sie_block->ecd |= ECD_HOSTREGMGMT;
35974e0b1ab7SFan Zhang 		vcpu->arch.gs_enabled = 1;
359880cd8763SFan Zhang 	}
359935b3fde6SChristian Borntraeger 	if ((kvm_run->kvm_dirty_regs & KVM_SYNC_BPBC) &&
360035b3fde6SChristian Borntraeger 	    test_kvm_facility(vcpu->kvm, 82)) {
360135b3fde6SChristian Borntraeger 		vcpu->arch.sie_block->fpf &= ~FPF_BPBC;
360235b3fde6SChristian Borntraeger 		vcpu->arch.sie_block->fpf |= kvm_run->s.regs.bpbc ? FPF_BPBC : 0;
360335b3fde6SChristian Borntraeger 	}
360431d8b8d4SChristian Borntraeger 	save_access_regs(vcpu->arch.host_acrs);
360531d8b8d4SChristian Borntraeger 	restore_access_regs(vcpu->run->s.regs.acrs);
3606e1788bb9SChristian Borntraeger 	/* save host (userspace) fprs/vrs */
3607e1788bb9SChristian Borntraeger 	save_fpu_regs();
3608e1788bb9SChristian Borntraeger 	vcpu->arch.host_fpregs.fpc = current->thread.fpu.fpc;
3609e1788bb9SChristian Borntraeger 	vcpu->arch.host_fpregs.regs = current->thread.fpu.regs;
3610e1788bb9SChristian Borntraeger 	if (MACHINE_HAS_VX)
3611e1788bb9SChristian Borntraeger 		current->thread.fpu.regs = vcpu->run->s.regs.vrs;
3612e1788bb9SChristian Borntraeger 	else
3613e1788bb9SChristian Borntraeger 		current->thread.fpu.regs = vcpu->run->s.regs.fprs;
3614e1788bb9SChristian Borntraeger 	current->thread.fpu.fpc = vcpu->run->s.regs.fpc;
3615e1788bb9SChristian Borntraeger 	if (test_fp_ctl(current->thread.fpu.fpc))
3616e1788bb9SChristian Borntraeger 		/* User space provided an invalid FPC, let's clear it */
3617e1788bb9SChristian Borntraeger 		current->thread.fpu.fpc = 0;
36184e0b1ab7SFan Zhang 	if (MACHINE_HAS_GS) {
36194e0b1ab7SFan Zhang 		preempt_disable();
36204e0b1ab7SFan Zhang 		__ctl_set_bit(2, 4);
36214e0b1ab7SFan Zhang 		if (current->thread.gs_cb) {
36224e0b1ab7SFan Zhang 			vcpu->arch.host_gscb = current->thread.gs_cb;
36234e0b1ab7SFan Zhang 			save_gs_cb(vcpu->arch.host_gscb);
36244e0b1ab7SFan Zhang 		}
36254e0b1ab7SFan Zhang 		if (vcpu->arch.gs_enabled) {
36264e0b1ab7SFan Zhang 			current->thread.gs_cb = (struct gs_cb *)
36274e0b1ab7SFan Zhang 						&vcpu->run->s.regs.gscb;
36284e0b1ab7SFan Zhang 			restore_gs_cb(current->thread.gs_cb);
36294e0b1ab7SFan Zhang 		}
36304e0b1ab7SFan Zhang 		preempt_enable();
36314e0b1ab7SFan Zhang 	}
3632a3da7b4aSChristian Borntraeger 	/* SIE will load etoken directly from SDNX and therefore kvm_run */
363380cd8763SFan Zhang 
3634b028ee3eSDavid Hildenbrand 	kvm_run->kvm_dirty_regs = 0;
3635b028ee3eSDavid Hildenbrand }
3636b028ee3eSDavid Hildenbrand 
3637b028ee3eSDavid Hildenbrand static void store_regs(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
3638b028ee3eSDavid Hildenbrand {
3639b028ee3eSDavid Hildenbrand 	kvm_run->psw_mask = vcpu->arch.sie_block->gpsw.mask;
3640b028ee3eSDavid Hildenbrand 	kvm_run->psw_addr = vcpu->arch.sie_block->gpsw.addr;
3641b028ee3eSDavid Hildenbrand 	kvm_run->s.regs.prefix = kvm_s390_get_prefix(vcpu);
3642b028ee3eSDavid Hildenbrand 	memcpy(&kvm_run->s.regs.crs, &vcpu->arch.sie_block->gcr, 128);
36434287f247SDavid Hildenbrand 	kvm_run->s.regs.cputm = kvm_s390_get_cpu_timer(vcpu);
3644b028ee3eSDavid Hildenbrand 	kvm_run->s.regs.ckc = vcpu->arch.sie_block->ckc;
3645b028ee3eSDavid Hildenbrand 	kvm_run->s.regs.todpr = vcpu->arch.sie_block->todpr;
3646b028ee3eSDavid Hildenbrand 	kvm_run->s.regs.pp = vcpu->arch.sie_block->pp;
3647b028ee3eSDavid Hildenbrand 	kvm_run->s.regs.gbea = vcpu->arch.sie_block->gbea;
3648b028ee3eSDavid Hildenbrand 	kvm_run->s.regs.pft = vcpu->arch.pfault_token;
3649b028ee3eSDavid Hildenbrand 	kvm_run->s.regs.pfs = vcpu->arch.pfault_select;
3650b028ee3eSDavid Hildenbrand 	kvm_run->s.regs.pfc = vcpu->arch.pfault_compare;
365135b3fde6SChristian Borntraeger 	kvm_run->s.regs.bpbc = (vcpu->arch.sie_block->fpf & FPF_BPBC) == FPF_BPBC;
365231d8b8d4SChristian Borntraeger 	save_access_regs(vcpu->run->s.regs.acrs);
365331d8b8d4SChristian Borntraeger 	restore_access_regs(vcpu->arch.host_acrs);
3654e1788bb9SChristian Borntraeger 	/* Save guest register state */
3655e1788bb9SChristian Borntraeger 	save_fpu_regs();
3656e1788bb9SChristian Borntraeger 	vcpu->run->s.regs.fpc = current->thread.fpu.fpc;
3657e1788bb9SChristian Borntraeger 	/* Restore will be done lazily at return */
3658e1788bb9SChristian Borntraeger 	current->thread.fpu.fpc = vcpu->arch.host_fpregs.fpc;
3659e1788bb9SChristian Borntraeger 	current->thread.fpu.regs = vcpu->arch.host_fpregs.regs;
36604e0b1ab7SFan Zhang 	if (MACHINE_HAS_GS) {
36614e0b1ab7SFan Zhang 		__ctl_set_bit(2, 4);
36624e0b1ab7SFan Zhang 		if (vcpu->arch.gs_enabled)
36634e0b1ab7SFan Zhang 			save_gs_cb(current->thread.gs_cb);
36644e0b1ab7SFan Zhang 		preempt_disable();
36654e0b1ab7SFan Zhang 		current->thread.gs_cb = vcpu->arch.host_gscb;
36664e0b1ab7SFan Zhang 		restore_gs_cb(vcpu->arch.host_gscb);
36674e0b1ab7SFan Zhang 		preempt_enable();
36684e0b1ab7SFan Zhang 		if (!vcpu->arch.host_gscb)
36694e0b1ab7SFan Zhang 			__ctl_clear_bit(2, 4);
36704e0b1ab7SFan Zhang 		vcpu->arch.host_gscb = NULL;
36714e0b1ab7SFan Zhang 	}
3672a3da7b4aSChristian Borntraeger 	/* SIE will save etoken directly into SDNX and therefore kvm_run */
3673b028ee3eSDavid Hildenbrand }
3674b028ee3eSDavid Hildenbrand 
3675b0c632dbSHeiko Carstens int kvm_arch_vcpu_ioctl_run(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
3676b0c632dbSHeiko Carstens {
36778f2abe6aSChristian Borntraeger 	int rc;
3678b0c632dbSHeiko Carstens 
3679460df4c1SPaolo Bonzini 	if (kvm_run->immediate_exit)
3680460df4c1SPaolo Bonzini 		return -EINTR;
3681460df4c1SPaolo Bonzini 
3682accb757dSChristoffer Dall 	vcpu_load(vcpu);
3683accb757dSChristoffer Dall 
368427291e21SDavid Hildenbrand 	if (guestdbg_exit_pending(vcpu)) {
368527291e21SDavid Hildenbrand 		kvm_s390_prepare_debug_exit(vcpu);
3686accb757dSChristoffer Dall 		rc = 0;
3687accb757dSChristoffer Dall 		goto out;
368827291e21SDavid Hildenbrand 	}
368927291e21SDavid Hildenbrand 
369020b7035cSJan H. Schönherr 	kvm_sigset_activate(vcpu);
3691b0c632dbSHeiko Carstens 
36926352e4d2SDavid Hildenbrand 	if (!kvm_s390_user_cpu_state_ctrl(vcpu->kvm)) {
36936852d7b6SDavid Hildenbrand 		kvm_s390_vcpu_start(vcpu);
36946352e4d2SDavid Hildenbrand 	} else if (is_vcpu_stopped(vcpu)) {
3695ea2cdd27SDavid Hildenbrand 		pr_err_ratelimited("can't run stopped vcpu %d\n",
36966352e4d2SDavid Hildenbrand 				   vcpu->vcpu_id);
3697accb757dSChristoffer Dall 		rc = -EINVAL;
3698accb757dSChristoffer Dall 		goto out;
36996352e4d2SDavid Hildenbrand 	}
3700b0c632dbSHeiko Carstens 
3701b028ee3eSDavid Hildenbrand 	sync_regs(vcpu, kvm_run);
3702db0758b2SDavid Hildenbrand 	enable_cpu_timer_accounting(vcpu);
3703d7b0b5ebSCarsten Otte 
3704dab4079dSHeiko Carstens 	might_fault();
3705e168bf8dSCarsten Otte 	rc = __vcpu_run(vcpu);
37069ace903dSChristian Ehrhardt 
3707b1d16c49SChristian Ehrhardt 	if (signal_pending(current) && !rc) {
3708b1d16c49SChristian Ehrhardt 		kvm_run->exit_reason = KVM_EXIT_INTR;
37098f2abe6aSChristian Borntraeger 		rc = -EINTR;
3710b1d16c49SChristian Ehrhardt 	}
37118f2abe6aSChristian Borntraeger 
371227291e21SDavid Hildenbrand 	if (guestdbg_exit_pending(vcpu) && !rc)  {
371327291e21SDavid Hildenbrand 		kvm_s390_prepare_debug_exit(vcpu);
371427291e21SDavid Hildenbrand 		rc = 0;
371527291e21SDavid Hildenbrand 	}
371627291e21SDavid Hildenbrand 
37178f2abe6aSChristian Borntraeger 	if (rc == -EREMOTE) {
371871f116bfSDavid Hildenbrand 		/* userspace support is needed, kvm_run has been prepared */
37198f2abe6aSChristian Borntraeger 		rc = 0;
37208f2abe6aSChristian Borntraeger 	}
37218f2abe6aSChristian Borntraeger 
3722db0758b2SDavid Hildenbrand 	disable_cpu_timer_accounting(vcpu);
3723b028ee3eSDavid Hildenbrand 	store_regs(vcpu, kvm_run);
3724d7b0b5ebSCarsten Otte 
372520b7035cSJan H. Schönherr 	kvm_sigset_deactivate(vcpu);
3726b0c632dbSHeiko Carstens 
3727b0c632dbSHeiko Carstens 	vcpu->stat.exit_userspace++;
3728accb757dSChristoffer Dall out:
3729accb757dSChristoffer Dall 	vcpu_put(vcpu);
37307e8e6ab4SHeiko Carstens 	return rc;
3731b0c632dbSHeiko Carstens }
3732b0c632dbSHeiko Carstens 
3733b0c632dbSHeiko Carstens /*
3734b0c632dbSHeiko Carstens  * store status at address
3735b0c632dbSHeiko Carstens  * we use have two special cases:
3736b0c632dbSHeiko Carstens  * KVM_S390_STORE_STATUS_NOADDR: -> 0x1200 on 64 bit
3737b0c632dbSHeiko Carstens  * KVM_S390_STORE_STATUS_PREFIXED: -> prefix
3738b0c632dbSHeiko Carstens  */
3739d0bce605SHeiko Carstens int kvm_s390_store_status_unloaded(struct kvm_vcpu *vcpu, unsigned long gpa)
3740b0c632dbSHeiko Carstens {
3741092670cdSCarsten Otte 	unsigned char archmode = 1;
37429abc2a08SDavid Hildenbrand 	freg_t fprs[NUM_FPRS];
3743fda902cbSMichael Mueller 	unsigned int px;
37444287f247SDavid Hildenbrand 	u64 clkcomp, cputm;
3745d0bce605SHeiko Carstens 	int rc;
3746b0c632dbSHeiko Carstens 
3747d9a3a09aSMartin Schwidefsky 	px = kvm_s390_get_prefix(vcpu);
3748d0bce605SHeiko Carstens 	if (gpa == KVM_S390_STORE_STATUS_NOADDR) {
3749d0bce605SHeiko Carstens 		if (write_guest_abs(vcpu, 163, &archmode, 1))
3750b0c632dbSHeiko Carstens 			return -EFAULT;
3751d9a3a09aSMartin Schwidefsky 		gpa = 0;
3752d0bce605SHeiko Carstens 	} else if (gpa == KVM_S390_STORE_STATUS_PREFIXED) {
3753d0bce605SHeiko Carstens 		if (write_guest_real(vcpu, 163, &archmode, 1))
3754b0c632dbSHeiko Carstens 			return -EFAULT;
3755d9a3a09aSMartin Schwidefsky 		gpa = px;
3756d9a3a09aSMartin Schwidefsky 	} else
3757d9a3a09aSMartin Schwidefsky 		gpa -= __LC_FPREGS_SAVE_AREA;
37589abc2a08SDavid Hildenbrand 
37599abc2a08SDavid Hildenbrand 	/* manually convert vector registers if necessary */
37609abc2a08SDavid Hildenbrand 	if (MACHINE_HAS_VX) {
37619522b37fSDavid Hildenbrand 		convert_vx_to_fp(fprs, (__vector128 *) vcpu->run->s.regs.vrs);
3762d9a3a09aSMartin Schwidefsky 		rc = write_guest_abs(vcpu, gpa + __LC_FPREGS_SAVE_AREA,
37639abc2a08SDavid Hildenbrand 				     fprs, 128);
37649abc2a08SDavid Hildenbrand 	} else {
37659abc2a08SDavid Hildenbrand 		rc = write_guest_abs(vcpu, gpa + __LC_FPREGS_SAVE_AREA,
37666fd8e67dSDavid Hildenbrand 				     vcpu->run->s.regs.fprs, 128);
37679abc2a08SDavid Hildenbrand 	}
3768d9a3a09aSMartin Schwidefsky 	rc |= write_guest_abs(vcpu, gpa + __LC_GPREGS_SAVE_AREA,
3769d0bce605SHeiko Carstens 			      vcpu->run->s.regs.gprs, 128);
3770d9a3a09aSMartin Schwidefsky 	rc |= write_guest_abs(vcpu, gpa + __LC_PSW_SAVE_AREA,
3771d0bce605SHeiko Carstens 			      &vcpu->arch.sie_block->gpsw, 16);
3772d9a3a09aSMartin Schwidefsky 	rc |= write_guest_abs(vcpu, gpa + __LC_PREFIX_SAVE_AREA,
3773fda902cbSMichael Mueller 			      &px, 4);
3774d9a3a09aSMartin Schwidefsky 	rc |= write_guest_abs(vcpu, gpa + __LC_FP_CREG_SAVE_AREA,
37759abc2a08SDavid Hildenbrand 			      &vcpu->run->s.regs.fpc, 4);
3776d9a3a09aSMartin Schwidefsky 	rc |= write_guest_abs(vcpu, gpa + __LC_TOD_PROGREG_SAVE_AREA,
3777d0bce605SHeiko Carstens 			      &vcpu->arch.sie_block->todpr, 4);
37784287f247SDavid Hildenbrand 	cputm = kvm_s390_get_cpu_timer(vcpu);
3779d9a3a09aSMartin Schwidefsky 	rc |= write_guest_abs(vcpu, gpa + __LC_CPU_TIMER_SAVE_AREA,
37804287f247SDavid Hildenbrand 			      &cputm, 8);
3781178bd789SThomas Huth 	clkcomp = vcpu->arch.sie_block->ckc >> 8;
3782d9a3a09aSMartin Schwidefsky 	rc |= write_guest_abs(vcpu, gpa + __LC_CLOCK_COMP_SAVE_AREA,
3783d0bce605SHeiko Carstens 			      &clkcomp, 8);
3784d9a3a09aSMartin Schwidefsky 	rc |= write_guest_abs(vcpu, gpa + __LC_AREGS_SAVE_AREA,
3785d0bce605SHeiko Carstens 			      &vcpu->run->s.regs.acrs, 64);
3786d9a3a09aSMartin Schwidefsky 	rc |= write_guest_abs(vcpu, gpa + __LC_CREGS_SAVE_AREA,
3787d0bce605SHeiko Carstens 			      &vcpu->arch.sie_block->gcr, 128);
3788d0bce605SHeiko Carstens 	return rc ? -EFAULT : 0;
3789b0c632dbSHeiko Carstens }
3790b0c632dbSHeiko Carstens 
3791e879892cSThomas Huth int kvm_s390_vcpu_store_status(struct kvm_vcpu *vcpu, unsigned long addr)
3792e879892cSThomas Huth {
3793e879892cSThomas Huth 	/*
3794e879892cSThomas Huth 	 * The guest FPRS and ACRS are in the host FPRS/ACRS due to the lazy
379531d8b8d4SChristian Borntraeger 	 * switch in the run ioctl. Let's update our copies before we save
3796e879892cSThomas Huth 	 * it into the save area
3797e879892cSThomas Huth 	 */
3798d0164ee2SHendrik Brueckner 	save_fpu_regs();
37999abc2a08SDavid Hildenbrand 	vcpu->run->s.regs.fpc = current->thread.fpu.fpc;
3800e879892cSThomas Huth 	save_access_regs(vcpu->run->s.regs.acrs);
3801e879892cSThomas Huth 
3802e879892cSThomas Huth 	return kvm_s390_store_status_unloaded(vcpu, addr);
3803e879892cSThomas Huth }
3804e879892cSThomas Huth 
38058ad35755SDavid Hildenbrand static void __disable_ibs_on_vcpu(struct kvm_vcpu *vcpu)
38068ad35755SDavid Hildenbrand {
38078ad35755SDavid Hildenbrand 	kvm_check_request(KVM_REQ_ENABLE_IBS, vcpu);
38088e236546SChristian Borntraeger 	kvm_s390_sync_request(KVM_REQ_DISABLE_IBS, vcpu);
38098ad35755SDavid Hildenbrand }
38108ad35755SDavid Hildenbrand 
38118ad35755SDavid Hildenbrand static void __disable_ibs_on_all_vcpus(struct kvm *kvm)
38128ad35755SDavid Hildenbrand {
38138ad35755SDavid Hildenbrand 	unsigned int i;
38148ad35755SDavid Hildenbrand 	struct kvm_vcpu *vcpu;
38158ad35755SDavid Hildenbrand 
38168ad35755SDavid Hildenbrand 	kvm_for_each_vcpu(i, vcpu, kvm) {
38178ad35755SDavid Hildenbrand 		__disable_ibs_on_vcpu(vcpu);
38188ad35755SDavid Hildenbrand 	}
38198ad35755SDavid Hildenbrand }
38208ad35755SDavid Hildenbrand 
38218ad35755SDavid Hildenbrand static void __enable_ibs_on_vcpu(struct kvm_vcpu *vcpu)
38228ad35755SDavid Hildenbrand {
382309a400e7SDavid Hildenbrand 	if (!sclp.has_ibs)
382409a400e7SDavid Hildenbrand 		return;
38258ad35755SDavid Hildenbrand 	kvm_check_request(KVM_REQ_DISABLE_IBS, vcpu);
38268e236546SChristian Borntraeger 	kvm_s390_sync_request(KVM_REQ_ENABLE_IBS, vcpu);
38278ad35755SDavid Hildenbrand }
38288ad35755SDavid Hildenbrand 
38296852d7b6SDavid Hildenbrand void kvm_s390_vcpu_start(struct kvm_vcpu *vcpu)
38306852d7b6SDavid Hildenbrand {
38318ad35755SDavid Hildenbrand 	int i, online_vcpus, started_vcpus = 0;
38328ad35755SDavid Hildenbrand 
38338ad35755SDavid Hildenbrand 	if (!is_vcpu_stopped(vcpu))
38348ad35755SDavid Hildenbrand 		return;
38358ad35755SDavid Hildenbrand 
38366852d7b6SDavid Hildenbrand 	trace_kvm_s390_vcpu_start_stop(vcpu->vcpu_id, 1);
38378ad35755SDavid Hildenbrand 	/* Only one cpu at a time may enter/leave the STOPPED state. */
3838433b9ee4SDavid Hildenbrand 	spin_lock(&vcpu->kvm->arch.start_stop_lock);
38398ad35755SDavid Hildenbrand 	online_vcpus = atomic_read(&vcpu->kvm->online_vcpus);
38408ad35755SDavid Hildenbrand 
38418ad35755SDavid Hildenbrand 	for (i = 0; i < online_vcpus; i++) {
38428ad35755SDavid Hildenbrand 		if (!is_vcpu_stopped(vcpu->kvm->vcpus[i]))
38438ad35755SDavid Hildenbrand 			started_vcpus++;
38448ad35755SDavid Hildenbrand 	}
38458ad35755SDavid Hildenbrand 
38468ad35755SDavid Hildenbrand 	if (started_vcpus == 0) {
38478ad35755SDavid Hildenbrand 		/* we're the only active VCPU -> speed it up */
38488ad35755SDavid Hildenbrand 		__enable_ibs_on_vcpu(vcpu);
38498ad35755SDavid Hildenbrand 	} else if (started_vcpus == 1) {
38508ad35755SDavid Hildenbrand 		/*
38518ad35755SDavid Hildenbrand 		 * As we are starting a second VCPU, we have to disable
38528ad35755SDavid Hildenbrand 		 * the IBS facility on all VCPUs to remove potentially
38538ad35755SDavid Hildenbrand 		 * oustanding ENABLE requests.
38548ad35755SDavid Hildenbrand 		 */
38558ad35755SDavid Hildenbrand 		__disable_ibs_on_all_vcpus(vcpu->kvm);
38568ad35755SDavid Hildenbrand 	}
38578ad35755SDavid Hildenbrand 
38589daecfc6SDavid Hildenbrand 	kvm_s390_clear_cpuflags(vcpu, CPUSTAT_STOPPED);
38598ad35755SDavid Hildenbrand 	/*
38608ad35755SDavid Hildenbrand 	 * Another VCPU might have used IBS while we were offline.
38618ad35755SDavid Hildenbrand 	 * Let's play safe and flush the VCPU at startup.
38628ad35755SDavid Hildenbrand 	 */
3863d3d692c8SDavid Hildenbrand 	kvm_make_request(KVM_REQ_TLB_FLUSH, vcpu);
3864433b9ee4SDavid Hildenbrand 	spin_unlock(&vcpu->kvm->arch.start_stop_lock);
38658ad35755SDavid Hildenbrand 	return;
38666852d7b6SDavid Hildenbrand }
38676852d7b6SDavid Hildenbrand 
38686852d7b6SDavid Hildenbrand void kvm_s390_vcpu_stop(struct kvm_vcpu *vcpu)
38696852d7b6SDavid Hildenbrand {
38708ad35755SDavid Hildenbrand 	int i, online_vcpus, started_vcpus = 0;
38718ad35755SDavid Hildenbrand 	struct kvm_vcpu *started_vcpu = NULL;
38728ad35755SDavid Hildenbrand 
38738ad35755SDavid Hildenbrand 	if (is_vcpu_stopped(vcpu))
38748ad35755SDavid Hildenbrand 		return;
38758ad35755SDavid Hildenbrand 
38766852d7b6SDavid Hildenbrand 	trace_kvm_s390_vcpu_start_stop(vcpu->vcpu_id, 0);
38778ad35755SDavid Hildenbrand 	/* Only one cpu at a time may enter/leave the STOPPED state. */
3878433b9ee4SDavid Hildenbrand 	spin_lock(&vcpu->kvm->arch.start_stop_lock);
38798ad35755SDavid Hildenbrand 	online_vcpus = atomic_read(&vcpu->kvm->online_vcpus);
38808ad35755SDavid Hildenbrand 
388132f5ff63SDavid Hildenbrand 	/* SIGP STOP and SIGP STOP AND STORE STATUS has been fully processed */
38826cddd432SDavid Hildenbrand 	kvm_s390_clear_stop_irq(vcpu);
388332f5ff63SDavid Hildenbrand 
3884ef8f4f49SDavid Hildenbrand 	kvm_s390_set_cpuflags(vcpu, CPUSTAT_STOPPED);
38858ad35755SDavid Hildenbrand 	__disable_ibs_on_vcpu(vcpu);
38868ad35755SDavid Hildenbrand 
38878ad35755SDavid Hildenbrand 	for (i = 0; i < online_vcpus; i++) {
38888ad35755SDavid Hildenbrand 		if (!is_vcpu_stopped(vcpu->kvm->vcpus[i])) {
38898ad35755SDavid Hildenbrand 			started_vcpus++;
38908ad35755SDavid Hildenbrand 			started_vcpu = vcpu->kvm->vcpus[i];
38918ad35755SDavid Hildenbrand 		}
38928ad35755SDavid Hildenbrand 	}
38938ad35755SDavid Hildenbrand 
38948ad35755SDavid Hildenbrand 	if (started_vcpus == 1) {
38958ad35755SDavid Hildenbrand 		/*
38968ad35755SDavid Hildenbrand 		 * As we only have one VCPU left, we want to enable the
38978ad35755SDavid Hildenbrand 		 * IBS facility for that VCPU to speed it up.
38988ad35755SDavid Hildenbrand 		 */
38998ad35755SDavid Hildenbrand 		__enable_ibs_on_vcpu(started_vcpu);
39008ad35755SDavid Hildenbrand 	}
39018ad35755SDavid Hildenbrand 
3902433b9ee4SDavid Hildenbrand 	spin_unlock(&vcpu->kvm->arch.start_stop_lock);
39038ad35755SDavid Hildenbrand 	return;
39046852d7b6SDavid Hildenbrand }
39056852d7b6SDavid Hildenbrand 
3906d6712df9SCornelia Huck static int kvm_vcpu_ioctl_enable_cap(struct kvm_vcpu *vcpu,
3907d6712df9SCornelia Huck 				     struct kvm_enable_cap *cap)
3908d6712df9SCornelia Huck {
3909d6712df9SCornelia Huck 	int r;
3910d6712df9SCornelia Huck 
3911d6712df9SCornelia Huck 	if (cap->flags)
3912d6712df9SCornelia Huck 		return -EINVAL;
3913d6712df9SCornelia Huck 
3914d6712df9SCornelia Huck 	switch (cap->cap) {
3915fa6b7fe9SCornelia Huck 	case KVM_CAP_S390_CSS_SUPPORT:
3916fa6b7fe9SCornelia Huck 		if (!vcpu->kvm->arch.css_support) {
3917fa6b7fe9SCornelia Huck 			vcpu->kvm->arch.css_support = 1;
3918c92ea7b9SChristian Borntraeger 			VM_EVENT(vcpu->kvm, 3, "%s", "ENABLE: CSS support");
3919fa6b7fe9SCornelia Huck 			trace_kvm_s390_enable_css(vcpu->kvm);
3920fa6b7fe9SCornelia Huck 		}
3921fa6b7fe9SCornelia Huck 		r = 0;
3922fa6b7fe9SCornelia Huck 		break;
3923d6712df9SCornelia Huck 	default:
3924d6712df9SCornelia Huck 		r = -EINVAL;
3925d6712df9SCornelia Huck 		break;
3926d6712df9SCornelia Huck 	}
3927d6712df9SCornelia Huck 	return r;
3928d6712df9SCornelia Huck }
3929d6712df9SCornelia Huck 
393041408c28SThomas Huth static long kvm_s390_guest_mem_op(struct kvm_vcpu *vcpu,
393141408c28SThomas Huth 				  struct kvm_s390_mem_op *mop)
393241408c28SThomas Huth {
393341408c28SThomas Huth 	void __user *uaddr = (void __user *)mop->buf;
393441408c28SThomas Huth 	void *tmpbuf = NULL;
393541408c28SThomas Huth 	int r, srcu_idx;
393641408c28SThomas Huth 	const u64 supported_flags = KVM_S390_MEMOP_F_INJECT_EXCEPTION
393741408c28SThomas Huth 				    | KVM_S390_MEMOP_F_CHECK_ONLY;
393841408c28SThomas Huth 
393941408c28SThomas Huth 	if (mop->flags & ~supported_flags)
394041408c28SThomas Huth 		return -EINVAL;
394141408c28SThomas Huth 
394241408c28SThomas Huth 	if (mop->size > MEM_OP_MAX_SIZE)
394341408c28SThomas Huth 		return -E2BIG;
394441408c28SThomas Huth 
394541408c28SThomas Huth 	if (!(mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY)) {
394641408c28SThomas Huth 		tmpbuf = vmalloc(mop->size);
394741408c28SThomas Huth 		if (!tmpbuf)
394841408c28SThomas Huth 			return -ENOMEM;
394941408c28SThomas Huth 	}
395041408c28SThomas Huth 
395141408c28SThomas Huth 	srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
395241408c28SThomas Huth 
395341408c28SThomas Huth 	switch (mop->op) {
395441408c28SThomas Huth 	case KVM_S390_MEMOP_LOGICAL_READ:
395541408c28SThomas Huth 		if (mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY) {
395692c96321SDavid Hildenbrand 			r = check_gva_range(vcpu, mop->gaddr, mop->ar,
395792c96321SDavid Hildenbrand 					    mop->size, GACC_FETCH);
395841408c28SThomas Huth 			break;
395941408c28SThomas Huth 		}
396041408c28SThomas Huth 		r = read_guest(vcpu, mop->gaddr, mop->ar, tmpbuf, mop->size);
396141408c28SThomas Huth 		if (r == 0) {
396241408c28SThomas Huth 			if (copy_to_user(uaddr, tmpbuf, mop->size))
396341408c28SThomas Huth 				r = -EFAULT;
396441408c28SThomas Huth 		}
396541408c28SThomas Huth 		break;
396641408c28SThomas Huth 	case KVM_S390_MEMOP_LOGICAL_WRITE:
396741408c28SThomas Huth 		if (mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY) {
396892c96321SDavid Hildenbrand 			r = check_gva_range(vcpu, mop->gaddr, mop->ar,
396992c96321SDavid Hildenbrand 					    mop->size, GACC_STORE);
397041408c28SThomas Huth 			break;
397141408c28SThomas Huth 		}
397241408c28SThomas Huth 		if (copy_from_user(tmpbuf, uaddr, mop->size)) {
397341408c28SThomas Huth 			r = -EFAULT;
397441408c28SThomas Huth 			break;
397541408c28SThomas Huth 		}
397641408c28SThomas Huth 		r = write_guest(vcpu, mop->gaddr, mop->ar, tmpbuf, mop->size);
397741408c28SThomas Huth 		break;
397841408c28SThomas Huth 	default:
397941408c28SThomas Huth 		r = -EINVAL;
398041408c28SThomas Huth 	}
398141408c28SThomas Huth 
398241408c28SThomas Huth 	srcu_read_unlock(&vcpu->kvm->srcu, srcu_idx);
398341408c28SThomas Huth 
398441408c28SThomas Huth 	if (r > 0 && (mop->flags & KVM_S390_MEMOP_F_INJECT_EXCEPTION) != 0)
398541408c28SThomas Huth 		kvm_s390_inject_prog_irq(vcpu, &vcpu->arch.pgm);
398641408c28SThomas Huth 
398741408c28SThomas Huth 	vfree(tmpbuf);
398841408c28SThomas Huth 	return r;
398941408c28SThomas Huth }
399041408c28SThomas Huth 
39915cb0944cSPaolo Bonzini long kvm_arch_vcpu_async_ioctl(struct file *filp,
3992b0c632dbSHeiko Carstens 			       unsigned int ioctl, unsigned long arg)
3993b0c632dbSHeiko Carstens {
3994b0c632dbSHeiko Carstens 	struct kvm_vcpu *vcpu = filp->private_data;
3995b0c632dbSHeiko Carstens 	void __user *argp = (void __user *)arg;
3996b0c632dbSHeiko Carstens 
399793736624SAvi Kivity 	switch (ioctl) {
399847b43c52SJens Freimann 	case KVM_S390_IRQ: {
399947b43c52SJens Freimann 		struct kvm_s390_irq s390irq;
400047b43c52SJens Freimann 
400147b43c52SJens Freimann 		if (copy_from_user(&s390irq, argp, sizeof(s390irq)))
40029b062471SChristoffer Dall 			return -EFAULT;
40039b062471SChristoffer Dall 		return kvm_s390_inject_vcpu(vcpu, &s390irq);
400447b43c52SJens Freimann 	}
400593736624SAvi Kivity 	case KVM_S390_INTERRUPT: {
4006ba5c1e9bSCarsten Otte 		struct kvm_s390_interrupt s390int;
4007383d0b05SJens Freimann 		struct kvm_s390_irq s390irq;
4008ba5c1e9bSCarsten Otte 
4009ba5c1e9bSCarsten Otte 		if (copy_from_user(&s390int, argp, sizeof(s390int)))
40109b062471SChristoffer Dall 			return -EFAULT;
4011383d0b05SJens Freimann 		if (s390int_to_s390irq(&s390int, &s390irq))
4012383d0b05SJens Freimann 			return -EINVAL;
40139b062471SChristoffer Dall 		return kvm_s390_inject_vcpu(vcpu, &s390irq);
4014ba5c1e9bSCarsten Otte 	}
40159b062471SChristoffer Dall 	}
40165cb0944cSPaolo Bonzini 	return -ENOIOCTLCMD;
40175cb0944cSPaolo Bonzini }
40185cb0944cSPaolo Bonzini 
40195cb0944cSPaolo Bonzini long kvm_arch_vcpu_ioctl(struct file *filp,
40205cb0944cSPaolo Bonzini 			 unsigned int ioctl, unsigned long arg)
40215cb0944cSPaolo Bonzini {
40225cb0944cSPaolo Bonzini 	struct kvm_vcpu *vcpu = filp->private_data;
40235cb0944cSPaolo Bonzini 	void __user *argp = (void __user *)arg;
40245cb0944cSPaolo Bonzini 	int idx;
40255cb0944cSPaolo Bonzini 	long r;
40269b062471SChristoffer Dall 
40279b062471SChristoffer Dall 	vcpu_load(vcpu);
40289b062471SChristoffer Dall 
40299b062471SChristoffer Dall 	switch (ioctl) {
4030b0c632dbSHeiko Carstens 	case KVM_S390_STORE_STATUS:
4031800c1065SThomas Huth 		idx = srcu_read_lock(&vcpu->kvm->srcu);
4032bc923cc9SAvi Kivity 		r = kvm_s390_vcpu_store_status(vcpu, arg);
4033800c1065SThomas Huth 		srcu_read_unlock(&vcpu->kvm->srcu, idx);
4034bc923cc9SAvi Kivity 		break;
4035b0c632dbSHeiko Carstens 	case KVM_S390_SET_INITIAL_PSW: {
4036b0c632dbSHeiko Carstens 		psw_t psw;
4037b0c632dbSHeiko Carstens 
4038bc923cc9SAvi Kivity 		r = -EFAULT;
4039b0c632dbSHeiko Carstens 		if (copy_from_user(&psw, argp, sizeof(psw)))
4040bc923cc9SAvi Kivity 			break;
4041bc923cc9SAvi Kivity 		r = kvm_arch_vcpu_ioctl_set_initial_psw(vcpu, psw);
4042bc923cc9SAvi Kivity 		break;
4043b0c632dbSHeiko Carstens 	}
4044b0c632dbSHeiko Carstens 	case KVM_S390_INITIAL_RESET:
4045bc923cc9SAvi Kivity 		r = kvm_arch_vcpu_ioctl_initial_reset(vcpu);
4046bc923cc9SAvi Kivity 		break;
404714eebd91SCarsten Otte 	case KVM_SET_ONE_REG:
404814eebd91SCarsten Otte 	case KVM_GET_ONE_REG: {
404914eebd91SCarsten Otte 		struct kvm_one_reg reg;
405014eebd91SCarsten Otte 		r = -EFAULT;
405114eebd91SCarsten Otte 		if (copy_from_user(&reg, argp, sizeof(reg)))
405214eebd91SCarsten Otte 			break;
405314eebd91SCarsten Otte 		if (ioctl == KVM_SET_ONE_REG)
405414eebd91SCarsten Otte 			r = kvm_arch_vcpu_ioctl_set_one_reg(vcpu, &reg);
405514eebd91SCarsten Otte 		else
405614eebd91SCarsten Otte 			r = kvm_arch_vcpu_ioctl_get_one_reg(vcpu, &reg);
405714eebd91SCarsten Otte 		break;
405814eebd91SCarsten Otte 	}
405927e0393fSCarsten Otte #ifdef CONFIG_KVM_S390_UCONTROL
406027e0393fSCarsten Otte 	case KVM_S390_UCAS_MAP: {
406127e0393fSCarsten Otte 		struct kvm_s390_ucas_mapping ucasmap;
406227e0393fSCarsten Otte 
406327e0393fSCarsten Otte 		if (copy_from_user(&ucasmap, argp, sizeof(ucasmap))) {
406427e0393fSCarsten Otte 			r = -EFAULT;
406527e0393fSCarsten Otte 			break;
406627e0393fSCarsten Otte 		}
406727e0393fSCarsten Otte 
406827e0393fSCarsten Otte 		if (!kvm_is_ucontrol(vcpu->kvm)) {
406927e0393fSCarsten Otte 			r = -EINVAL;
407027e0393fSCarsten Otte 			break;
407127e0393fSCarsten Otte 		}
407227e0393fSCarsten Otte 
407327e0393fSCarsten Otte 		r = gmap_map_segment(vcpu->arch.gmap, ucasmap.user_addr,
407427e0393fSCarsten Otte 				     ucasmap.vcpu_addr, ucasmap.length);
407527e0393fSCarsten Otte 		break;
407627e0393fSCarsten Otte 	}
407727e0393fSCarsten Otte 	case KVM_S390_UCAS_UNMAP: {
407827e0393fSCarsten Otte 		struct kvm_s390_ucas_mapping ucasmap;
407927e0393fSCarsten Otte 
408027e0393fSCarsten Otte 		if (copy_from_user(&ucasmap, argp, sizeof(ucasmap))) {
408127e0393fSCarsten Otte 			r = -EFAULT;
408227e0393fSCarsten Otte 			break;
408327e0393fSCarsten Otte 		}
408427e0393fSCarsten Otte 
408527e0393fSCarsten Otte 		if (!kvm_is_ucontrol(vcpu->kvm)) {
408627e0393fSCarsten Otte 			r = -EINVAL;
408727e0393fSCarsten Otte 			break;
408827e0393fSCarsten Otte 		}
408927e0393fSCarsten Otte 
409027e0393fSCarsten Otte 		r = gmap_unmap_segment(vcpu->arch.gmap, ucasmap.vcpu_addr,
409127e0393fSCarsten Otte 			ucasmap.length);
409227e0393fSCarsten Otte 		break;
409327e0393fSCarsten Otte 	}
409427e0393fSCarsten Otte #endif
4095ccc7910fSCarsten Otte 	case KVM_S390_VCPU_FAULT: {
4096527e30b4SMartin Schwidefsky 		r = gmap_fault(vcpu->arch.gmap, arg, 0);
4097ccc7910fSCarsten Otte 		break;
4098ccc7910fSCarsten Otte 	}
4099d6712df9SCornelia Huck 	case KVM_ENABLE_CAP:
4100d6712df9SCornelia Huck 	{
4101d6712df9SCornelia Huck 		struct kvm_enable_cap cap;
4102d6712df9SCornelia Huck 		r = -EFAULT;
4103d6712df9SCornelia Huck 		if (copy_from_user(&cap, argp, sizeof(cap)))
4104d6712df9SCornelia Huck 			break;
4105d6712df9SCornelia Huck 		r = kvm_vcpu_ioctl_enable_cap(vcpu, &cap);
4106d6712df9SCornelia Huck 		break;
4107d6712df9SCornelia Huck 	}
410841408c28SThomas Huth 	case KVM_S390_MEM_OP: {
410941408c28SThomas Huth 		struct kvm_s390_mem_op mem_op;
411041408c28SThomas Huth 
411141408c28SThomas Huth 		if (copy_from_user(&mem_op, argp, sizeof(mem_op)) == 0)
411241408c28SThomas Huth 			r = kvm_s390_guest_mem_op(vcpu, &mem_op);
411341408c28SThomas Huth 		else
411441408c28SThomas Huth 			r = -EFAULT;
411541408c28SThomas Huth 		break;
411641408c28SThomas Huth 	}
4117816c7667SJens Freimann 	case KVM_S390_SET_IRQ_STATE: {
4118816c7667SJens Freimann 		struct kvm_s390_irq_state irq_state;
4119816c7667SJens Freimann 
4120816c7667SJens Freimann 		r = -EFAULT;
4121816c7667SJens Freimann 		if (copy_from_user(&irq_state, argp, sizeof(irq_state)))
4122816c7667SJens Freimann 			break;
4123816c7667SJens Freimann 		if (irq_state.len > VCPU_IRQS_MAX_BUF ||
4124816c7667SJens Freimann 		    irq_state.len == 0 ||
4125816c7667SJens Freimann 		    irq_state.len % sizeof(struct kvm_s390_irq) > 0) {
4126816c7667SJens Freimann 			r = -EINVAL;
4127816c7667SJens Freimann 			break;
4128816c7667SJens Freimann 		}
4129bb64da9aSChristian Borntraeger 		/* do not use irq_state.flags, it will break old QEMUs */
4130816c7667SJens Freimann 		r = kvm_s390_set_irq_state(vcpu,
4131816c7667SJens Freimann 					   (void __user *) irq_state.buf,
4132816c7667SJens Freimann 					   irq_state.len);
4133816c7667SJens Freimann 		break;
4134816c7667SJens Freimann 	}
4135816c7667SJens Freimann 	case KVM_S390_GET_IRQ_STATE: {
4136816c7667SJens Freimann 		struct kvm_s390_irq_state irq_state;
4137816c7667SJens Freimann 
4138816c7667SJens Freimann 		r = -EFAULT;
4139816c7667SJens Freimann 		if (copy_from_user(&irq_state, argp, sizeof(irq_state)))
4140816c7667SJens Freimann 			break;
4141816c7667SJens Freimann 		if (irq_state.len == 0) {
4142816c7667SJens Freimann 			r = -EINVAL;
4143816c7667SJens Freimann 			break;
4144816c7667SJens Freimann 		}
4145bb64da9aSChristian Borntraeger 		/* do not use irq_state.flags, it will break old QEMUs */
4146816c7667SJens Freimann 		r = kvm_s390_get_irq_state(vcpu,
4147816c7667SJens Freimann 					   (__u8 __user *)  irq_state.buf,
4148816c7667SJens Freimann 					   irq_state.len);
4149816c7667SJens Freimann 		break;
4150816c7667SJens Freimann 	}
4151b0c632dbSHeiko Carstens 	default:
41523e6afcf1SCarsten Otte 		r = -ENOTTY;
4153b0c632dbSHeiko Carstens 	}
41549b062471SChristoffer Dall 
41559b062471SChristoffer Dall 	vcpu_put(vcpu);
4156bc923cc9SAvi Kivity 	return r;
4157b0c632dbSHeiko Carstens }
4158b0c632dbSHeiko Carstens 
41591499fa80SSouptick Joarder vm_fault_t kvm_arch_vcpu_fault(struct kvm_vcpu *vcpu, struct vm_fault *vmf)
41605b1c1493SCarsten Otte {
41615b1c1493SCarsten Otte #ifdef CONFIG_KVM_S390_UCONTROL
41625b1c1493SCarsten Otte 	if ((vmf->pgoff == KVM_S390_SIE_PAGE_OFFSET)
41635b1c1493SCarsten Otte 		 && (kvm_is_ucontrol(vcpu->kvm))) {
41645b1c1493SCarsten Otte 		vmf->page = virt_to_page(vcpu->arch.sie_block);
41655b1c1493SCarsten Otte 		get_page(vmf->page);
41665b1c1493SCarsten Otte 		return 0;
41675b1c1493SCarsten Otte 	}
41685b1c1493SCarsten Otte #endif
41695b1c1493SCarsten Otte 	return VM_FAULT_SIGBUS;
41705b1c1493SCarsten Otte }
41715b1c1493SCarsten Otte 
41725587027cSAneesh Kumar K.V int kvm_arch_create_memslot(struct kvm *kvm, struct kvm_memory_slot *slot,
41735587027cSAneesh Kumar K.V 			    unsigned long npages)
4174db3fe4ebSTakuya Yoshikawa {
4175db3fe4ebSTakuya Yoshikawa 	return 0;
4176db3fe4ebSTakuya Yoshikawa }
4177db3fe4ebSTakuya Yoshikawa 
4178b0c632dbSHeiko Carstens /* Section: memory related */
4179f7784b8eSMarcelo Tosatti int kvm_arch_prepare_memory_region(struct kvm *kvm,
4180f7784b8eSMarcelo Tosatti 				   struct kvm_memory_slot *memslot,
418109170a49SPaolo Bonzini 				   const struct kvm_userspace_memory_region *mem,
41827b6195a9STakuya Yoshikawa 				   enum kvm_mr_change change)
4183b0c632dbSHeiko Carstens {
4184dd2887e7SNick Wang 	/* A few sanity checks. We can have memory slots which have to be
4185dd2887e7SNick Wang 	   located/ended at a segment boundary (1MB). The memory in userland is
4186dd2887e7SNick Wang 	   ok to be fragmented into various different vmas. It is okay to mmap()
4187dd2887e7SNick Wang 	   and munmap() stuff in this slot after doing this call at any time */
4188b0c632dbSHeiko Carstens 
4189598841caSCarsten Otte 	if (mem->userspace_addr & 0xffffful)
4190b0c632dbSHeiko Carstens 		return -EINVAL;
4191b0c632dbSHeiko Carstens 
4192598841caSCarsten Otte 	if (mem->memory_size & 0xffffful)
4193b0c632dbSHeiko Carstens 		return -EINVAL;
4194b0c632dbSHeiko Carstens 
4195a3a92c31SDominik Dingel 	if (mem->guest_phys_addr + mem->memory_size > kvm->arch.mem_limit)
4196a3a92c31SDominik Dingel 		return -EINVAL;
4197a3a92c31SDominik Dingel 
4198f7784b8eSMarcelo Tosatti 	return 0;
4199f7784b8eSMarcelo Tosatti }
4200f7784b8eSMarcelo Tosatti 
4201f7784b8eSMarcelo Tosatti void kvm_arch_commit_memory_region(struct kvm *kvm,
420209170a49SPaolo Bonzini 				const struct kvm_userspace_memory_region *mem,
42038482644aSTakuya Yoshikawa 				const struct kvm_memory_slot *old,
4204f36f3f28SPaolo Bonzini 				const struct kvm_memory_slot *new,
42058482644aSTakuya Yoshikawa 				enum kvm_mr_change change)
4206f7784b8eSMarcelo Tosatti {
4207f7850c92SCarsten Otte 	int rc;
4208f7784b8eSMarcelo Tosatti 
42092cef4debSChristian Borntraeger 	/* If the basics of the memslot do not change, we do not want
42102cef4debSChristian Borntraeger 	 * to update the gmap. Every update causes several unnecessary
42112cef4debSChristian Borntraeger 	 * segment translation exceptions. This is usually handled just
42122cef4debSChristian Borntraeger 	 * fine by the normal fault handler + gmap, but it will also
42132cef4debSChristian Borntraeger 	 * cause faults on the prefix page of running guest CPUs.
42142cef4debSChristian Borntraeger 	 */
42152cef4debSChristian Borntraeger 	if (old->userspace_addr == mem->userspace_addr &&
42162cef4debSChristian Borntraeger 	    old->base_gfn * PAGE_SIZE == mem->guest_phys_addr &&
42172cef4debSChristian Borntraeger 	    old->npages * PAGE_SIZE == mem->memory_size)
42182cef4debSChristian Borntraeger 		return;
4219598841caSCarsten Otte 
4220598841caSCarsten Otte 	rc = gmap_map_segment(kvm->arch.gmap, mem->userspace_addr,
4221598841caSCarsten Otte 		mem->guest_phys_addr, mem->memory_size);
4222598841caSCarsten Otte 	if (rc)
4223ea2cdd27SDavid Hildenbrand 		pr_warn("failed to commit memory region\n");
4224598841caSCarsten Otte 	return;
4225b0c632dbSHeiko Carstens }
4226b0c632dbSHeiko Carstens 
422760a37709SAlexander Yarygin static inline unsigned long nonhyp_mask(int i)
422860a37709SAlexander Yarygin {
422960a37709SAlexander Yarygin 	unsigned int nonhyp_fai = (sclp.hmfai << i * 2) >> 30;
423060a37709SAlexander Yarygin 
423160a37709SAlexander Yarygin 	return 0x0000ffffffffffffUL >> (nonhyp_fai << 4);
423260a37709SAlexander Yarygin }
423360a37709SAlexander Yarygin 
42343491caf2SChristian Borntraeger void kvm_arch_vcpu_block_finish(struct kvm_vcpu *vcpu)
42353491caf2SChristian Borntraeger {
42363491caf2SChristian Borntraeger 	vcpu->valid_wakeup = false;
42373491caf2SChristian Borntraeger }
42383491caf2SChristian Borntraeger 
4239b0c632dbSHeiko Carstens static int __init kvm_s390_init(void)
4240b0c632dbSHeiko Carstens {
424160a37709SAlexander Yarygin 	int i;
424260a37709SAlexander Yarygin 
424307197fd0SDavid Hildenbrand 	if (!sclp.has_sief2) {
424407197fd0SDavid Hildenbrand 		pr_info("SIE not available\n");
424507197fd0SDavid Hildenbrand 		return -ENODEV;
424607197fd0SDavid Hildenbrand 	}
424707197fd0SDavid Hildenbrand 
4248a4499382SJanosch Frank 	if (nested && hpage) {
4249a4499382SJanosch Frank 		pr_info("nested (vSIE) and hpage (huge page backing) can currently not be activated concurrently");
4250a4499382SJanosch Frank 		return -EINVAL;
4251a4499382SJanosch Frank 	}
4252a4499382SJanosch Frank 
425360a37709SAlexander Yarygin 	for (i = 0; i < 16; i++)
4254c3b9e3e1SChristian Borntraeger 		kvm_s390_fac_base[i] |=
425560a37709SAlexander Yarygin 			S390_lowcore.stfle_fac_list[i] & nonhyp_mask(i);
425660a37709SAlexander Yarygin 
42579d8d5786SMichael Mueller 	return kvm_init(NULL, sizeof(struct kvm_vcpu), 0, THIS_MODULE);
4258b0c632dbSHeiko Carstens }
4259b0c632dbSHeiko Carstens 
4260b0c632dbSHeiko Carstens static void __exit kvm_s390_exit(void)
4261b0c632dbSHeiko Carstens {
4262b0c632dbSHeiko Carstens 	kvm_exit();
4263b0c632dbSHeiko Carstens }
4264b0c632dbSHeiko Carstens 
4265b0c632dbSHeiko Carstens module_init(kvm_s390_init);
4266b0c632dbSHeiko Carstens module_exit(kvm_s390_exit);
4267566af940SCornelia Huck 
4268566af940SCornelia Huck /*
4269566af940SCornelia Huck  * Enable autoloading of the kvm module.
4270566af940SCornelia Huck  * Note that we add the module alias here instead of virt/kvm/kvm_main.c
4271566af940SCornelia Huck  * since x86 takes a different approach.
4272566af940SCornelia Huck  */
4273566af940SCornelia Huck #include <linux/miscdevice.h>
4274566af940SCornelia Huck MODULE_ALIAS_MISCDEV(KVM_MINOR);
4275566af940SCornelia Huck MODULE_ALIAS("devname:kvm");
4276