1d809aa23SGreg Kroah-Hartman // SPDX-License-Identifier: GPL-2.0 2b0c632dbSHeiko Carstens /* 3bb64da9aSChristian Borntraeger * hosting IBM Z kernel virtual machines (s390x) 4b0c632dbSHeiko Carstens * 5a37cb07aSChristian Borntraeger * Copyright IBM Corp. 2008, 2018 6b0c632dbSHeiko Carstens * 7b0c632dbSHeiko Carstens * Author(s): Carsten Otte <cotte@de.ibm.com> 8b0c632dbSHeiko Carstens * Christian Borntraeger <borntraeger@de.ibm.com> 9b0c632dbSHeiko Carstens * Heiko Carstens <heiko.carstens@de.ibm.com> 10628eb9b8SChristian Ehrhardt * Christian Ehrhardt <ehrhardt@de.ibm.com> 1115f36ebdSJason J. Herne * Jason J. Herne <jjherne@us.ibm.com> 12b0c632dbSHeiko Carstens */ 13b0c632dbSHeiko Carstens 14b0c632dbSHeiko Carstens #include <linux/compiler.h> 15b0c632dbSHeiko Carstens #include <linux/err.h> 16b0c632dbSHeiko Carstens #include <linux/fs.h> 17ca872302SChristian Borntraeger #include <linux/hrtimer.h> 18b0c632dbSHeiko Carstens #include <linux/init.h> 19b0c632dbSHeiko Carstens #include <linux/kvm.h> 20b0c632dbSHeiko Carstens #include <linux/kvm_host.h> 21b2d73b2aSMartin Schwidefsky #include <linux/mman.h> 22b0c632dbSHeiko Carstens #include <linux/module.h> 23d3217967SPaul Gortmaker #include <linux/moduleparam.h> 24a374e892STony Krowiak #include <linux/random.h> 25b0c632dbSHeiko Carstens #include <linux/slab.h> 26ba5c1e9bSCarsten Otte #include <linux/timer.h> 2741408c28SThomas Huth #include <linux/vmalloc.h> 2815c9705fSDavid Hildenbrand #include <linux/bitmap.h> 29174cd4b1SIngo Molnar #include <linux/sched/signal.h> 30190df4a2SClaudio Imbrenda #include <linux/string.h> 31174cd4b1SIngo Molnar 32cbb870c8SHeiko Carstens #include <asm/asm-offsets.h> 33b0c632dbSHeiko Carstens #include <asm/lowcore.h> 34fd5ada04SMartin Schwidefsky #include <asm/stp.h> 35b0c632dbSHeiko Carstens #include <asm/pgtable.h> 361e133ab2SMartin Schwidefsky #include <asm/gmap.h> 37f5daba1dSHeiko Carstens #include <asm/nmi.h> 38a0616cdeSDavid Howells #include <asm/switch_to.h> 396d3da241SJens Freimann #include <asm/isc.h> 401526bf9cSChristian Borntraeger #include <asm/sclp.h> 410a763c78SDavid Hildenbrand #include <asm/cpacf.h> 42221bb8a4SLinus Torvalds #include <asm/timex.h> 43e585b24aSTony Krowiak #include <asm/ap.h> 448f2abe6aSChristian Borntraeger #include "kvm-s390.h" 45b0c632dbSHeiko Carstens #include "gaccess.h" 46b0c632dbSHeiko Carstens 47ea2cdd27SDavid Hildenbrand #define KMSG_COMPONENT "kvm-s390" 48ea2cdd27SDavid Hildenbrand #undef pr_fmt 49ea2cdd27SDavid Hildenbrand #define pr_fmt(fmt) KMSG_COMPONENT ": " fmt 50ea2cdd27SDavid Hildenbrand 515786fffaSCornelia Huck #define CREATE_TRACE_POINTS 525786fffaSCornelia Huck #include "trace.h" 53ade38c31SCornelia Huck #include "trace-s390.h" 545786fffaSCornelia Huck 5541408c28SThomas Huth #define MEM_OP_MAX_SIZE 65536 /* Maximum transfer size for KVM_S390_MEM_OP */ 56816c7667SJens Freimann #define LOCAL_IRQS 32 57816c7667SJens Freimann #define VCPU_IRQS_MAX_BUF (sizeof(struct kvm_s390_irq) * \ 58816c7667SJens Freimann (KVM_MAX_VCPUS + LOCAL_IRQS)) 5941408c28SThomas Huth 60b0c632dbSHeiko Carstens #define VCPU_STAT(x) offsetof(struct kvm_vcpu, stat.x), KVM_STAT_VCPU 61ccc40c53SChristian Borntraeger #define VM_STAT(x) offsetof(struct kvm, stat.x), KVM_STAT_VM 62b0c632dbSHeiko Carstens 63b0c632dbSHeiko Carstens struct kvm_stats_debugfs_item debugfs_entries[] = { 64b0c632dbSHeiko Carstens { "userspace_handled", VCPU_STAT(exit_userspace) }, 650eaeafa1SChristian Borntraeger { "exit_null", VCPU_STAT(exit_null) }, 668f2abe6aSChristian Borntraeger { "exit_validity", VCPU_STAT(exit_validity) }, 678f2abe6aSChristian Borntraeger { "exit_stop_request", VCPU_STAT(exit_stop_request) }, 688f2abe6aSChristian Borntraeger { "exit_external_request", VCPU_STAT(exit_external_request) }, 69a5e0aceaSChristian Borntraeger { "exit_io_request", VCPU_STAT(exit_io_request) }, 708f2abe6aSChristian Borntraeger { "exit_external_interrupt", VCPU_STAT(exit_external_interrupt) }, 71ba5c1e9bSCarsten Otte { "exit_instruction", VCPU_STAT(exit_instruction) }, 729ec6de19SAlexander Yarygin { "exit_pei", VCPU_STAT(exit_pei) }, 73ba5c1e9bSCarsten Otte { "exit_program_interruption", VCPU_STAT(exit_program_interruption) }, 74ba5c1e9bSCarsten Otte { "exit_instr_and_program_int", VCPU_STAT(exit_instr_and_program) }, 75a011eeb2SJanosch Frank { "exit_operation_exception", VCPU_STAT(exit_operation_exception) }, 76f7819512SPaolo Bonzini { "halt_successful_poll", VCPU_STAT(halt_successful_poll) }, 7762bea5bfSPaolo Bonzini { "halt_attempted_poll", VCPU_STAT(halt_attempted_poll) }, 783491caf2SChristian Borntraeger { "halt_poll_invalid", VCPU_STAT(halt_poll_invalid) }, 79ce2e4f0bSDavid Hildenbrand { "halt_wakeup", VCPU_STAT(halt_wakeup) }, 80f5e10b09SChristian Borntraeger { "instruction_lctlg", VCPU_STAT(instruction_lctlg) }, 81ba5c1e9bSCarsten Otte { "instruction_lctl", VCPU_STAT(instruction_lctl) }, 82aba07508SDavid Hildenbrand { "instruction_stctl", VCPU_STAT(instruction_stctl) }, 83aba07508SDavid Hildenbrand { "instruction_stctg", VCPU_STAT(instruction_stctg) }, 84ccc40c53SChristian Borntraeger { "deliver_ckc", VCPU_STAT(deliver_ckc) }, 85ccc40c53SChristian Borntraeger { "deliver_cputm", VCPU_STAT(deliver_cputm) }, 86ba5c1e9bSCarsten Otte { "deliver_emergency_signal", VCPU_STAT(deliver_emergency_signal) }, 877697e71fSChristian Ehrhardt { "deliver_external_call", VCPU_STAT(deliver_external_call) }, 88ba5c1e9bSCarsten Otte { "deliver_service_signal", VCPU_STAT(deliver_service_signal) }, 89ccc40c53SChristian Borntraeger { "deliver_virtio", VCPU_STAT(deliver_virtio) }, 90ba5c1e9bSCarsten Otte { "deliver_stop_signal", VCPU_STAT(deliver_stop_signal) }, 91ba5c1e9bSCarsten Otte { "deliver_prefix_signal", VCPU_STAT(deliver_prefix_signal) }, 92ba5c1e9bSCarsten Otte { "deliver_restart_signal", VCPU_STAT(deliver_restart_signal) }, 93ccc40c53SChristian Borntraeger { "deliver_program", VCPU_STAT(deliver_program) }, 94ccc40c53SChristian Borntraeger { "deliver_io", VCPU_STAT(deliver_io) }, 9532de0749SQingFeng Hao { "deliver_machine_check", VCPU_STAT(deliver_machine_check) }, 96ba5c1e9bSCarsten Otte { "exit_wait_state", VCPU_STAT(exit_wait_state) }, 97ccc40c53SChristian Borntraeger { "inject_ckc", VCPU_STAT(inject_ckc) }, 98ccc40c53SChristian Borntraeger { "inject_cputm", VCPU_STAT(inject_cputm) }, 99ccc40c53SChristian Borntraeger { "inject_external_call", VCPU_STAT(inject_external_call) }, 100ccc40c53SChristian Borntraeger { "inject_float_mchk", VM_STAT(inject_float_mchk) }, 101ccc40c53SChristian Borntraeger { "inject_emergency_signal", VCPU_STAT(inject_emergency_signal) }, 102ccc40c53SChristian Borntraeger { "inject_io", VM_STAT(inject_io) }, 103ccc40c53SChristian Borntraeger { "inject_mchk", VCPU_STAT(inject_mchk) }, 104ccc40c53SChristian Borntraeger { "inject_pfault_done", VM_STAT(inject_pfault_done) }, 105ccc40c53SChristian Borntraeger { "inject_program", VCPU_STAT(inject_program) }, 106ccc40c53SChristian Borntraeger { "inject_restart", VCPU_STAT(inject_restart) }, 107ccc40c53SChristian Borntraeger { "inject_service_signal", VM_STAT(inject_service_signal) }, 108ccc40c53SChristian Borntraeger { "inject_set_prefix", VCPU_STAT(inject_set_prefix) }, 109ccc40c53SChristian Borntraeger { "inject_stop_signal", VCPU_STAT(inject_stop_signal) }, 110ccc40c53SChristian Borntraeger { "inject_pfault_init", VCPU_STAT(inject_pfault_init) }, 111ccc40c53SChristian Borntraeger { "inject_virtio", VM_STAT(inject_virtio) }, 112a37cb07aSChristian Borntraeger { "instruction_epsw", VCPU_STAT(instruction_epsw) }, 113a37cb07aSChristian Borntraeger { "instruction_gs", VCPU_STAT(instruction_gs) }, 114a37cb07aSChristian Borntraeger { "instruction_io_other", VCPU_STAT(instruction_io_other) }, 115a37cb07aSChristian Borntraeger { "instruction_lpsw", VCPU_STAT(instruction_lpsw) }, 116a37cb07aSChristian Borntraeger { "instruction_lpswe", VCPU_STAT(instruction_lpswe) }, 11769d0d3a3SChristian Borntraeger { "instruction_pfmf", VCPU_STAT(instruction_pfmf) }, 118a37cb07aSChristian Borntraeger { "instruction_ptff", VCPU_STAT(instruction_ptff) }, 119453423dcSChristian Borntraeger { "instruction_stidp", VCPU_STAT(instruction_stidp) }, 120a37cb07aSChristian Borntraeger { "instruction_sck", VCPU_STAT(instruction_sck) }, 121a37cb07aSChristian Borntraeger { "instruction_sckpf", VCPU_STAT(instruction_sckpf) }, 122453423dcSChristian Borntraeger { "instruction_spx", VCPU_STAT(instruction_spx) }, 123453423dcSChristian Borntraeger { "instruction_stpx", VCPU_STAT(instruction_stpx) }, 124453423dcSChristian Borntraeger { "instruction_stap", VCPU_STAT(instruction_stap) }, 125a37cb07aSChristian Borntraeger { "instruction_iske", VCPU_STAT(instruction_iske) }, 126a37cb07aSChristian Borntraeger { "instruction_ri", VCPU_STAT(instruction_ri) }, 127a37cb07aSChristian Borntraeger { "instruction_rrbe", VCPU_STAT(instruction_rrbe) }, 128a37cb07aSChristian Borntraeger { "instruction_sske", VCPU_STAT(instruction_sske) }, 1298a242234SHeiko Carstens { "instruction_ipte_interlock", VCPU_STAT(instruction_ipte_interlock) }, 130b31288faSKonstantin Weitz { "instruction_essa", VCPU_STAT(instruction_essa) }, 131453423dcSChristian Borntraeger { "instruction_stsi", VCPU_STAT(instruction_stsi) }, 132453423dcSChristian Borntraeger { "instruction_stfl", VCPU_STAT(instruction_stfl) }, 133a37cb07aSChristian Borntraeger { "instruction_tb", VCPU_STAT(instruction_tb) }, 134a37cb07aSChristian Borntraeger { "instruction_tpi", VCPU_STAT(instruction_tpi) }, 135bb25b9baSChristian Borntraeger { "instruction_tprot", VCPU_STAT(instruction_tprot) }, 136a37cb07aSChristian Borntraeger { "instruction_tsch", VCPU_STAT(instruction_tsch) }, 13795ca2cb5SJanosch Frank { "instruction_sthyi", VCPU_STAT(instruction_sthyi) }, 138a3508fbeSDavid Hildenbrand { "instruction_sie", VCPU_STAT(instruction_sie) }, 1395288fbf0SChristian Borntraeger { "instruction_sigp_sense", VCPU_STAT(instruction_sigp_sense) }, 140bd59d3a4SCornelia Huck { "instruction_sigp_sense_running", VCPU_STAT(instruction_sigp_sense_running) }, 1417697e71fSChristian Ehrhardt { "instruction_sigp_external_call", VCPU_STAT(instruction_sigp_external_call) }, 1425288fbf0SChristian Borntraeger { "instruction_sigp_emergency", VCPU_STAT(instruction_sigp_emergency) }, 14342cb0c9fSDavid Hildenbrand { "instruction_sigp_cond_emergency", VCPU_STAT(instruction_sigp_cond_emergency) }, 14442cb0c9fSDavid Hildenbrand { "instruction_sigp_start", VCPU_STAT(instruction_sigp_start) }, 1455288fbf0SChristian Borntraeger { "instruction_sigp_stop", VCPU_STAT(instruction_sigp_stop) }, 14642cb0c9fSDavid Hildenbrand { "instruction_sigp_stop_store_status", VCPU_STAT(instruction_sigp_stop_store_status) }, 14742cb0c9fSDavid Hildenbrand { "instruction_sigp_store_status", VCPU_STAT(instruction_sigp_store_status) }, 148cd7b4b61SEric Farman { "instruction_sigp_store_adtl_status", VCPU_STAT(instruction_sigp_store_adtl_status) }, 1495288fbf0SChristian Borntraeger { "instruction_sigp_set_arch", VCPU_STAT(instruction_sigp_arch) }, 1505288fbf0SChristian Borntraeger { "instruction_sigp_set_prefix", VCPU_STAT(instruction_sigp_prefix) }, 1515288fbf0SChristian Borntraeger { "instruction_sigp_restart", VCPU_STAT(instruction_sigp_restart) }, 15242cb0c9fSDavid Hildenbrand { "instruction_sigp_cpu_reset", VCPU_STAT(instruction_sigp_cpu_reset) }, 15342cb0c9fSDavid Hildenbrand { "instruction_sigp_init_cpu_reset", VCPU_STAT(instruction_sigp_init_cpu_reset) }, 15442cb0c9fSDavid Hildenbrand { "instruction_sigp_unknown", VCPU_STAT(instruction_sigp_unknown) }, 155866c138cSChristian Borntraeger { "instruction_diag_10", VCPU_STAT(diagnose_10) }, 156866c138cSChristian Borntraeger { "instruction_diag_44", VCPU_STAT(diagnose_44) }, 157866c138cSChristian Borntraeger { "instruction_diag_9c", VCPU_STAT(diagnose_9c) }, 158866c138cSChristian Borntraeger { "instruction_diag_258", VCPU_STAT(diagnose_258) }, 159866c138cSChristian Borntraeger { "instruction_diag_308", VCPU_STAT(diagnose_308) }, 160866c138cSChristian Borntraeger { "instruction_diag_500", VCPU_STAT(diagnose_500) }, 161a37cb07aSChristian Borntraeger { "instruction_diag_other", VCPU_STAT(diagnose_other) }, 162b0c632dbSHeiko Carstens { NULL } 163b0c632dbSHeiko Carstens }; 164b0c632dbSHeiko Carstens 1658fa1696eSCollin L. Walling struct kvm_s390_tod_clock_ext { 1668fa1696eSCollin L. Walling __u8 epoch_idx; 1678fa1696eSCollin L. Walling __u64 tod; 1688fa1696eSCollin L. Walling __u8 reserved[7]; 1698fa1696eSCollin L. Walling } __packed; 1708fa1696eSCollin L. Walling 171a411edf1SDavid Hildenbrand /* allow nested virtualization in KVM (if enabled by user space) */ 172a411edf1SDavid Hildenbrand static int nested; 173a411edf1SDavid Hildenbrand module_param(nested, int, S_IRUGO); 174a411edf1SDavid Hildenbrand MODULE_PARM_DESC(nested, "Nested virtualization support"); 175a411edf1SDavid Hildenbrand 176a4499382SJanosch Frank /* allow 1m huge page guest backing, if !nested */ 177a4499382SJanosch Frank static int hpage; 178a4499382SJanosch Frank module_param(hpage, int, 0444); 179a4499382SJanosch Frank MODULE_PARM_DESC(hpage, "1m huge page backing support"); 180b0c632dbSHeiko Carstens 181c3b9e3e1SChristian Borntraeger /* 182c3b9e3e1SChristian Borntraeger * For now we handle at most 16 double words as this is what the s390 base 183c3b9e3e1SChristian Borntraeger * kernel handles and stores in the prefix page. If we ever need to go beyond 184c3b9e3e1SChristian Borntraeger * this, this requires changes to code, but the external uapi can stay. 185c3b9e3e1SChristian Borntraeger */ 186c3b9e3e1SChristian Borntraeger #define SIZE_INTERNAL 16 187c3b9e3e1SChristian Borntraeger 188c3b9e3e1SChristian Borntraeger /* 189c3b9e3e1SChristian Borntraeger * Base feature mask that defines default mask for facilities. Consists of the 190c3b9e3e1SChristian Borntraeger * defines in FACILITIES_KVM and the non-hypervisor managed bits. 191c3b9e3e1SChristian Borntraeger */ 192c3b9e3e1SChristian Borntraeger static unsigned long kvm_s390_fac_base[SIZE_INTERNAL] = { FACILITIES_KVM }; 193c3b9e3e1SChristian Borntraeger /* 194c3b9e3e1SChristian Borntraeger * Extended feature mask. Consists of the defines in FACILITIES_KVM_CPUMODEL 195c3b9e3e1SChristian Borntraeger * and defines the facilities that can be enabled via a cpu model. 196c3b9e3e1SChristian Borntraeger */ 197c3b9e3e1SChristian Borntraeger static unsigned long kvm_s390_fac_ext[SIZE_INTERNAL] = { FACILITIES_KVM_CPUMODEL }; 198c3b9e3e1SChristian Borntraeger 199c3b9e3e1SChristian Borntraeger static unsigned long kvm_s390_fac_size(void) 20078c4b59fSMichael Mueller { 201c3b9e3e1SChristian Borntraeger BUILD_BUG_ON(SIZE_INTERNAL > S390_ARCH_FAC_MASK_SIZE_U64); 202c3b9e3e1SChristian Borntraeger BUILD_BUG_ON(SIZE_INTERNAL > S390_ARCH_FAC_LIST_SIZE_U64); 203c3b9e3e1SChristian Borntraeger BUILD_BUG_ON(SIZE_INTERNAL * sizeof(unsigned long) > 204c3b9e3e1SChristian Borntraeger sizeof(S390_lowcore.stfle_fac_list)); 205c3b9e3e1SChristian Borntraeger 206c3b9e3e1SChristian Borntraeger return SIZE_INTERNAL; 20778c4b59fSMichael Mueller } 20878c4b59fSMichael Mueller 20915c9705fSDavid Hildenbrand /* available cpu features supported by kvm */ 21015c9705fSDavid Hildenbrand static DECLARE_BITMAP(kvm_s390_available_cpu_feat, KVM_S390_VM_CPU_FEAT_NR_BITS); 2110a763c78SDavid Hildenbrand /* available subfunctions indicated via query / "test bit" */ 2120a763c78SDavid Hildenbrand static struct kvm_s390_vm_cpu_subfunc kvm_s390_available_subfunc; 21315c9705fSDavid Hildenbrand 2149d8d5786SMichael Mueller static struct gmap_notifier gmap_notifier; 215a3508fbeSDavid Hildenbrand static struct gmap_notifier vsie_gmap_notifier; 21678f26131SChristian Borntraeger debug_info_t *kvm_s390_dbf; 2179d8d5786SMichael Mueller 218b0c632dbSHeiko Carstens /* Section: not file related */ 21913a34e06SRadim Krčmář int kvm_arch_hardware_enable(void) 220b0c632dbSHeiko Carstens { 221b0c632dbSHeiko Carstens /* every s390 is virtualization enabled ;-) */ 22210474ae8SAlexander Graf return 0; 223b0c632dbSHeiko Carstens } 224b0c632dbSHeiko Carstens 225414d3b07SMartin Schwidefsky static void kvm_gmap_notifier(struct gmap *gmap, unsigned long start, 226414d3b07SMartin Schwidefsky unsigned long end); 2272c70fe44SChristian Borntraeger 2281575767eSDavid Hildenbrand static void kvm_clock_sync_scb(struct kvm_s390_sie_block *scb, u64 delta) 2291575767eSDavid Hildenbrand { 2301575767eSDavid Hildenbrand u8 delta_idx = 0; 2311575767eSDavid Hildenbrand 2321575767eSDavid Hildenbrand /* 2331575767eSDavid Hildenbrand * The TOD jumps by delta, we have to compensate this by adding 2341575767eSDavid Hildenbrand * -delta to the epoch. 2351575767eSDavid Hildenbrand */ 2361575767eSDavid Hildenbrand delta = -delta; 2371575767eSDavid Hildenbrand 2381575767eSDavid Hildenbrand /* sign-extension - we're adding to signed values below */ 2391575767eSDavid Hildenbrand if ((s64)delta < 0) 2401575767eSDavid Hildenbrand delta_idx = -1; 2411575767eSDavid Hildenbrand 2421575767eSDavid Hildenbrand scb->epoch += delta; 2431575767eSDavid Hildenbrand if (scb->ecd & ECD_MEF) { 2441575767eSDavid Hildenbrand scb->epdx += delta_idx; 2451575767eSDavid Hildenbrand if (scb->epoch < delta) 2461575767eSDavid Hildenbrand scb->epdx += 1; 2471575767eSDavid Hildenbrand } 2481575767eSDavid Hildenbrand } 2491575767eSDavid Hildenbrand 250fdf03650SFan Zhang /* 251fdf03650SFan Zhang * This callback is executed during stop_machine(). All CPUs are therefore 252fdf03650SFan Zhang * temporarily stopped. In order not to change guest behavior, we have to 253fdf03650SFan Zhang * disable preemption whenever we touch the epoch of kvm and the VCPUs, 254fdf03650SFan Zhang * so a CPU won't be stopped while calculating with the epoch. 255fdf03650SFan Zhang */ 256fdf03650SFan Zhang static int kvm_clock_sync(struct notifier_block *notifier, unsigned long val, 257fdf03650SFan Zhang void *v) 258fdf03650SFan Zhang { 259fdf03650SFan Zhang struct kvm *kvm; 260fdf03650SFan Zhang struct kvm_vcpu *vcpu; 261fdf03650SFan Zhang int i; 262fdf03650SFan Zhang unsigned long long *delta = v; 263fdf03650SFan Zhang 264fdf03650SFan Zhang list_for_each_entry(kvm, &vm_list, vm_list) { 265fdf03650SFan Zhang kvm_for_each_vcpu(i, vcpu, kvm) { 2661575767eSDavid Hildenbrand kvm_clock_sync_scb(vcpu->arch.sie_block, *delta); 2671575767eSDavid Hildenbrand if (i == 0) { 2681575767eSDavid Hildenbrand kvm->arch.epoch = vcpu->arch.sie_block->epoch; 2691575767eSDavid Hildenbrand kvm->arch.epdx = vcpu->arch.sie_block->epdx; 2701575767eSDavid Hildenbrand } 271db0758b2SDavid Hildenbrand if (vcpu->arch.cputm_enabled) 272db0758b2SDavid Hildenbrand vcpu->arch.cputm_start += *delta; 27391473b48SDavid Hildenbrand if (vcpu->arch.vsie_block) 2741575767eSDavid Hildenbrand kvm_clock_sync_scb(vcpu->arch.vsie_block, 2751575767eSDavid Hildenbrand *delta); 276fdf03650SFan Zhang } 277fdf03650SFan Zhang } 278fdf03650SFan Zhang return NOTIFY_OK; 279fdf03650SFan Zhang } 280fdf03650SFan Zhang 281fdf03650SFan Zhang static struct notifier_block kvm_clock_notifier = { 282fdf03650SFan Zhang .notifier_call = kvm_clock_sync, 283fdf03650SFan Zhang }; 284fdf03650SFan Zhang 285b0c632dbSHeiko Carstens int kvm_arch_hardware_setup(void) 286b0c632dbSHeiko Carstens { 2872c70fe44SChristian Borntraeger gmap_notifier.notifier_call = kvm_gmap_notifier; 288b2d73b2aSMartin Schwidefsky gmap_register_pte_notifier(&gmap_notifier); 289a3508fbeSDavid Hildenbrand vsie_gmap_notifier.notifier_call = kvm_s390_vsie_gmap_notifier; 290a3508fbeSDavid Hildenbrand gmap_register_pte_notifier(&vsie_gmap_notifier); 291fdf03650SFan Zhang atomic_notifier_chain_register(&s390_epoch_delta_notifier, 292fdf03650SFan Zhang &kvm_clock_notifier); 293b0c632dbSHeiko Carstens return 0; 294b0c632dbSHeiko Carstens } 295b0c632dbSHeiko Carstens 296b0c632dbSHeiko Carstens void kvm_arch_hardware_unsetup(void) 297b0c632dbSHeiko Carstens { 298b2d73b2aSMartin Schwidefsky gmap_unregister_pte_notifier(&gmap_notifier); 299a3508fbeSDavid Hildenbrand gmap_unregister_pte_notifier(&vsie_gmap_notifier); 300fdf03650SFan Zhang atomic_notifier_chain_unregister(&s390_epoch_delta_notifier, 301fdf03650SFan Zhang &kvm_clock_notifier); 302b0c632dbSHeiko Carstens } 303b0c632dbSHeiko Carstens 30422be5a13SDavid Hildenbrand static void allow_cpu_feat(unsigned long nr) 30522be5a13SDavid Hildenbrand { 30622be5a13SDavid Hildenbrand set_bit_inv(nr, kvm_s390_available_cpu_feat); 30722be5a13SDavid Hildenbrand } 30822be5a13SDavid Hildenbrand 3090a763c78SDavid Hildenbrand static inline int plo_test_bit(unsigned char nr) 3100a763c78SDavid Hildenbrand { 3110a763c78SDavid Hildenbrand register unsigned long r0 asm("0") = (unsigned long) nr | 0x100; 312d051ae53SHeiko Carstens int cc; 3130a763c78SDavid Hildenbrand 3140a763c78SDavid Hildenbrand asm volatile( 3150a763c78SDavid Hildenbrand /* Parameter registers are ignored for "test bit" */ 3160a763c78SDavid Hildenbrand " plo 0,0,0,0(0)\n" 3170a763c78SDavid Hildenbrand " ipm %0\n" 3180a763c78SDavid Hildenbrand " srl %0,28\n" 3190a763c78SDavid Hildenbrand : "=d" (cc) 3200a763c78SDavid Hildenbrand : "d" (r0) 3210a763c78SDavid Hildenbrand : "cc"); 3220a763c78SDavid Hildenbrand return cc == 0; 3230a763c78SDavid Hildenbrand } 3240a763c78SDavid Hildenbrand 32522be5a13SDavid Hildenbrand static void kvm_s390_cpu_feat_init(void) 32622be5a13SDavid Hildenbrand { 3270a763c78SDavid Hildenbrand int i; 3280a763c78SDavid Hildenbrand 3290a763c78SDavid Hildenbrand for (i = 0; i < 256; ++i) { 3300a763c78SDavid Hildenbrand if (plo_test_bit(i)) 3310a763c78SDavid Hildenbrand kvm_s390_available_subfunc.plo[i >> 3] |= 0x80 >> (i & 7); 3320a763c78SDavid Hildenbrand } 3330a763c78SDavid Hildenbrand 3340a763c78SDavid Hildenbrand if (test_facility(28)) /* TOD-clock steering */ 335221bb8a4SLinus Torvalds ptff(kvm_s390_available_subfunc.ptff, 336221bb8a4SLinus Torvalds sizeof(kvm_s390_available_subfunc.ptff), 337221bb8a4SLinus Torvalds PTFF_QAF); 3380a763c78SDavid Hildenbrand 3390a763c78SDavid Hildenbrand if (test_facility(17)) { /* MSA */ 34069c0e360SMartin Schwidefsky __cpacf_query(CPACF_KMAC, (cpacf_mask_t *) 34169c0e360SMartin Schwidefsky kvm_s390_available_subfunc.kmac); 34269c0e360SMartin Schwidefsky __cpacf_query(CPACF_KMC, (cpacf_mask_t *) 34369c0e360SMartin Schwidefsky kvm_s390_available_subfunc.kmc); 34469c0e360SMartin Schwidefsky __cpacf_query(CPACF_KM, (cpacf_mask_t *) 34569c0e360SMartin Schwidefsky kvm_s390_available_subfunc.km); 34669c0e360SMartin Schwidefsky __cpacf_query(CPACF_KIMD, (cpacf_mask_t *) 34769c0e360SMartin Schwidefsky kvm_s390_available_subfunc.kimd); 34869c0e360SMartin Schwidefsky __cpacf_query(CPACF_KLMD, (cpacf_mask_t *) 34969c0e360SMartin Schwidefsky kvm_s390_available_subfunc.klmd); 3500a763c78SDavid Hildenbrand } 3510a763c78SDavid Hildenbrand if (test_facility(76)) /* MSA3 */ 35269c0e360SMartin Schwidefsky __cpacf_query(CPACF_PCKMO, (cpacf_mask_t *) 35369c0e360SMartin Schwidefsky kvm_s390_available_subfunc.pckmo); 3540a763c78SDavid Hildenbrand if (test_facility(77)) { /* MSA4 */ 35569c0e360SMartin Schwidefsky __cpacf_query(CPACF_KMCTR, (cpacf_mask_t *) 35669c0e360SMartin Schwidefsky kvm_s390_available_subfunc.kmctr); 35769c0e360SMartin Schwidefsky __cpacf_query(CPACF_KMF, (cpacf_mask_t *) 35869c0e360SMartin Schwidefsky kvm_s390_available_subfunc.kmf); 35969c0e360SMartin Schwidefsky __cpacf_query(CPACF_KMO, (cpacf_mask_t *) 36069c0e360SMartin Schwidefsky kvm_s390_available_subfunc.kmo); 36169c0e360SMartin Schwidefsky __cpacf_query(CPACF_PCC, (cpacf_mask_t *) 36269c0e360SMartin Schwidefsky kvm_s390_available_subfunc.pcc); 3630a763c78SDavid Hildenbrand } 3640a763c78SDavid Hildenbrand if (test_facility(57)) /* MSA5 */ 365985a9d20SHarald Freudenberger __cpacf_query(CPACF_PRNO, (cpacf_mask_t *) 36669c0e360SMartin Schwidefsky kvm_s390_available_subfunc.ppno); 3670a763c78SDavid Hildenbrand 368e000b8e0SJason J. Herne if (test_facility(146)) /* MSA8 */ 369e000b8e0SJason J. Herne __cpacf_query(CPACF_KMA, (cpacf_mask_t *) 370e000b8e0SJason J. Herne kvm_s390_available_subfunc.kma); 371e000b8e0SJason J. Herne 37222be5a13SDavid Hildenbrand if (MACHINE_HAS_ESOP) 37322be5a13SDavid Hildenbrand allow_cpu_feat(KVM_S390_VM_CPU_FEAT_ESOP); 374a3508fbeSDavid Hildenbrand /* 375a3508fbeSDavid Hildenbrand * We need SIE support, ESOP (PROT_READ protection for gmap_shadow), 376a3508fbeSDavid Hildenbrand * 64bit SCAO (SCA passthrough) and IDTE (for gmap_shadow unshadowing). 377a3508fbeSDavid Hildenbrand */ 378a3508fbeSDavid Hildenbrand if (!sclp.has_sief2 || !MACHINE_HAS_ESOP || !sclp.has_64bscao || 379a411edf1SDavid Hildenbrand !test_facility(3) || !nested) 380a3508fbeSDavid Hildenbrand return; 381a3508fbeSDavid Hildenbrand allow_cpu_feat(KVM_S390_VM_CPU_FEAT_SIEF2); 38219c439b5SDavid Hildenbrand if (sclp.has_64bscao) 38319c439b5SDavid Hildenbrand allow_cpu_feat(KVM_S390_VM_CPU_FEAT_64BSCAO); 3840615a326SDavid Hildenbrand if (sclp.has_siif) 3850615a326SDavid Hildenbrand allow_cpu_feat(KVM_S390_VM_CPU_FEAT_SIIF); 38677d18f6dSDavid Hildenbrand if (sclp.has_gpere) 38777d18f6dSDavid Hildenbrand allow_cpu_feat(KVM_S390_VM_CPU_FEAT_GPERE); 388a1b7b9b2SDavid Hildenbrand if (sclp.has_gsls) 389a1b7b9b2SDavid Hildenbrand allow_cpu_feat(KVM_S390_VM_CPU_FEAT_GSLS); 3905630a8e8SDavid Hildenbrand if (sclp.has_ib) 3915630a8e8SDavid Hildenbrand allow_cpu_feat(KVM_S390_VM_CPU_FEAT_IB); 39213ee3f67SDavid Hildenbrand if (sclp.has_cei) 39313ee3f67SDavid Hildenbrand allow_cpu_feat(KVM_S390_VM_CPU_FEAT_CEI); 3947fd7f39dSDavid Hildenbrand if (sclp.has_ibs) 3957fd7f39dSDavid Hildenbrand allow_cpu_feat(KVM_S390_VM_CPU_FEAT_IBS); 396730cd632SFarhan Ali if (sclp.has_kss) 397730cd632SFarhan Ali allow_cpu_feat(KVM_S390_VM_CPU_FEAT_KSS); 3985d3876a8SDavid Hildenbrand /* 3995d3876a8SDavid Hildenbrand * KVM_S390_VM_CPU_FEAT_SKEY: Wrong shadow of PTE.I bits will make 4005d3876a8SDavid Hildenbrand * all skey handling functions read/set the skey from the PGSTE 4015d3876a8SDavid Hildenbrand * instead of the real storage key. 4025d3876a8SDavid Hildenbrand * 4035d3876a8SDavid Hildenbrand * KVM_S390_VM_CPU_FEAT_CMMA: Wrong shadow of PTE.I bits will make 4045d3876a8SDavid Hildenbrand * pages being detected as preserved although they are resident. 4055d3876a8SDavid Hildenbrand * 4065d3876a8SDavid Hildenbrand * KVM_S390_VM_CPU_FEAT_PFMFI: Wrong shadow of PTE.I bits will 4075d3876a8SDavid Hildenbrand * have the same effect as for KVM_S390_VM_CPU_FEAT_SKEY. 4085d3876a8SDavid Hildenbrand * 4095d3876a8SDavid Hildenbrand * For KVM_S390_VM_CPU_FEAT_SKEY, KVM_S390_VM_CPU_FEAT_CMMA and 4105d3876a8SDavid Hildenbrand * KVM_S390_VM_CPU_FEAT_PFMFI, all PTE.I and PGSTE bits have to be 4115d3876a8SDavid Hildenbrand * correctly shadowed. We can do that for the PGSTE but not for PTE.I. 4125d3876a8SDavid Hildenbrand * 4135d3876a8SDavid Hildenbrand * KVM_S390_VM_CPU_FEAT_SIGPIF: Wrong SCB addresses in the SCA. We 4145d3876a8SDavid Hildenbrand * cannot easily shadow the SCA because of the ipte lock. 4155d3876a8SDavid Hildenbrand */ 41622be5a13SDavid Hildenbrand } 41722be5a13SDavid Hildenbrand 418b0c632dbSHeiko Carstens int kvm_arch_init(void *opaque) 419b0c632dbSHeiko Carstens { 42078f26131SChristian Borntraeger kvm_s390_dbf = debug_register("kvm-trace", 32, 1, 7 * sizeof(long)); 42178f26131SChristian Borntraeger if (!kvm_s390_dbf) 42278f26131SChristian Borntraeger return -ENOMEM; 42378f26131SChristian Borntraeger 42478f26131SChristian Borntraeger if (debug_register_view(kvm_s390_dbf, &debug_sprintf_view)) { 42578f26131SChristian Borntraeger debug_unregister(kvm_s390_dbf); 42678f26131SChristian Borntraeger return -ENOMEM; 42778f26131SChristian Borntraeger } 42878f26131SChristian Borntraeger 42922be5a13SDavid Hildenbrand kvm_s390_cpu_feat_init(); 43022be5a13SDavid Hildenbrand 43184877d93SCornelia Huck /* Register floating interrupt controller interface. */ 43284877d93SCornelia Huck return kvm_register_device_ops(&kvm_flic_ops, KVM_DEV_TYPE_FLIC); 433b0c632dbSHeiko Carstens } 434b0c632dbSHeiko Carstens 43578f26131SChristian Borntraeger void kvm_arch_exit(void) 43678f26131SChristian Borntraeger { 43778f26131SChristian Borntraeger debug_unregister(kvm_s390_dbf); 43878f26131SChristian Borntraeger } 43978f26131SChristian Borntraeger 440b0c632dbSHeiko Carstens /* Section: device related */ 441b0c632dbSHeiko Carstens long kvm_arch_dev_ioctl(struct file *filp, 442b0c632dbSHeiko Carstens unsigned int ioctl, unsigned long arg) 443b0c632dbSHeiko Carstens { 444b0c632dbSHeiko Carstens if (ioctl == KVM_S390_ENABLE_SIE) 445b0c632dbSHeiko Carstens return s390_enable_sie(); 446b0c632dbSHeiko Carstens return -EINVAL; 447b0c632dbSHeiko Carstens } 448b0c632dbSHeiko Carstens 449784aa3d7SAlexander Graf int kvm_vm_ioctl_check_extension(struct kvm *kvm, long ext) 450b0c632dbSHeiko Carstens { 451d7b0b5ebSCarsten Otte int r; 452d7b0b5ebSCarsten Otte 4532bd0ac4eSCarsten Otte switch (ext) { 454d7b0b5ebSCarsten Otte case KVM_CAP_S390_PSW: 455b6cf8788SChristian Borntraeger case KVM_CAP_S390_GMAP: 45652e16b18SChristian Borntraeger case KVM_CAP_SYNC_MMU: 4571efd0f59SCarsten Otte #ifdef CONFIG_KVM_S390_UCONTROL 4581efd0f59SCarsten Otte case KVM_CAP_S390_UCONTROL: 4591efd0f59SCarsten Otte #endif 4603c038e6bSDominik Dingel case KVM_CAP_ASYNC_PF: 46160b413c9SChristian Borntraeger case KVM_CAP_SYNC_REGS: 46214eebd91SCarsten Otte case KVM_CAP_ONE_REG: 463d6712df9SCornelia Huck case KVM_CAP_ENABLE_CAP: 464fa6b7fe9SCornelia Huck case KVM_CAP_S390_CSS_SUPPORT: 46510ccaa1eSCornelia Huck case KVM_CAP_IOEVENTFD: 466c05c4186SJens Freimann case KVM_CAP_DEVICE_CTRL: 467d938dc55SCornelia Huck case KVM_CAP_ENABLE_CAP_VM: 46878599d90SCornelia Huck case KVM_CAP_S390_IRQCHIP: 469f2061656SDominik Dingel case KVM_CAP_VM_ATTRIBUTES: 4706352e4d2SDavid Hildenbrand case KVM_CAP_MP_STATE: 471460df4c1SPaolo Bonzini case KVM_CAP_IMMEDIATE_EXIT: 47247b43c52SJens Freimann case KVM_CAP_S390_INJECT_IRQ: 4732444b352SDavid Hildenbrand case KVM_CAP_S390_USER_SIGP: 474e44fc8c9SEkaterina Tumanova case KVM_CAP_S390_USER_STSI: 47530ee2a98SJason J. Herne case KVM_CAP_S390_SKEYS: 476816c7667SJens Freimann case KVM_CAP_S390_IRQ_STATE: 4776502a34cSDavid Hildenbrand case KVM_CAP_S390_USER_INSTR0: 4784036e387SClaudio Imbrenda case KVM_CAP_S390_CMMA_MIGRATION: 47947a4693eSYi Min Zhao case KVM_CAP_S390_AIS: 480da9a1446SChristian Borntraeger case KVM_CAP_S390_AIS_MIGRATION: 481d7b0b5ebSCarsten Otte r = 1; 482d7b0b5ebSCarsten Otte break; 483a4499382SJanosch Frank case KVM_CAP_S390_HPAGE_1M: 484a4499382SJanosch Frank r = 0; 485a4499382SJanosch Frank if (hpage) 486a4499382SJanosch Frank r = 1; 487a4499382SJanosch Frank break; 48841408c28SThomas Huth case KVM_CAP_S390_MEM_OP: 48941408c28SThomas Huth r = MEM_OP_MAX_SIZE; 49041408c28SThomas Huth break; 491e726b1bdSChristian Borntraeger case KVM_CAP_NR_VCPUS: 492e726b1bdSChristian Borntraeger case KVM_CAP_MAX_VCPUS: 49376a6dd72SDavid Hildenbrand r = KVM_S390_BSCA_CPU_SLOTS; 494a6940674SDavid Hildenbrand if (!kvm_s390_use_sca_entries()) 495a6940674SDavid Hildenbrand r = KVM_MAX_VCPUS; 496a6940674SDavid Hildenbrand else if (sclp.has_esca && sclp.has_64bscao) 49776a6dd72SDavid Hildenbrand r = KVM_S390_ESCA_CPU_SLOTS; 498e726b1bdSChristian Borntraeger break; 499e1e2e605SNick Wang case KVM_CAP_NR_MEMSLOTS: 500e1e2e605SNick Wang r = KVM_USER_MEM_SLOTS; 501e1e2e605SNick Wang break; 5021526bf9cSChristian Borntraeger case KVM_CAP_S390_COW: 503abf09bedSMartin Schwidefsky r = MACHINE_HAS_ESOP; 5041526bf9cSChristian Borntraeger break; 50568c55750SEric Farman case KVM_CAP_S390_VECTOR_REGISTERS: 50668c55750SEric Farman r = MACHINE_HAS_VX; 50768c55750SEric Farman break; 508c6e5f166SFan Zhang case KVM_CAP_S390_RI: 509c6e5f166SFan Zhang r = test_facility(64); 510c6e5f166SFan Zhang break; 5114e0b1ab7SFan Zhang case KVM_CAP_S390_GS: 5124e0b1ab7SFan Zhang r = test_facility(133); 5134e0b1ab7SFan Zhang break; 51435b3fde6SChristian Borntraeger case KVM_CAP_S390_BPB: 51535b3fde6SChristian Borntraeger r = test_facility(82); 51635b3fde6SChristian Borntraeger break; 5172bd0ac4eSCarsten Otte default: 518d7b0b5ebSCarsten Otte r = 0; 519b0c632dbSHeiko Carstens } 520d7b0b5ebSCarsten Otte return r; 5212bd0ac4eSCarsten Otte } 522b0c632dbSHeiko Carstens 52315f36ebdSJason J. Herne static void kvm_s390_sync_dirty_log(struct kvm *kvm, 52415f36ebdSJason J. Herne struct kvm_memory_slot *memslot) 52515f36ebdSJason J. Herne { 5260959e168SJanosch Frank int i; 52715f36ebdSJason J. Herne gfn_t cur_gfn, last_gfn; 5280959e168SJanosch Frank unsigned long gaddr, vmaddr; 52915f36ebdSJason J. Herne struct gmap *gmap = kvm->arch.gmap; 5300959e168SJanosch Frank DECLARE_BITMAP(bitmap, _PAGE_ENTRIES); 53115f36ebdSJason J. Herne 5320959e168SJanosch Frank /* Loop over all guest segments */ 5330959e168SJanosch Frank cur_gfn = memslot->base_gfn; 53415f36ebdSJason J. Herne last_gfn = memslot->base_gfn + memslot->npages; 5350959e168SJanosch Frank for (; cur_gfn <= last_gfn; cur_gfn += _PAGE_ENTRIES) { 5360959e168SJanosch Frank gaddr = gfn_to_gpa(cur_gfn); 5370959e168SJanosch Frank vmaddr = gfn_to_hva_memslot(memslot, cur_gfn); 5380959e168SJanosch Frank if (kvm_is_error_hva(vmaddr)) 5390959e168SJanosch Frank continue; 54015f36ebdSJason J. Herne 5410959e168SJanosch Frank bitmap_zero(bitmap, _PAGE_ENTRIES); 5420959e168SJanosch Frank gmap_sync_dirty_log_pmd(gmap, bitmap, gaddr, vmaddr); 5430959e168SJanosch Frank for (i = 0; i < _PAGE_ENTRIES; i++) { 5440959e168SJanosch Frank if (test_bit(i, bitmap)) 5450959e168SJanosch Frank mark_page_dirty(kvm, cur_gfn + i); 5460959e168SJanosch Frank } 5470959e168SJanosch Frank 5481763f8d0SChristian Borntraeger if (fatal_signal_pending(current)) 5491763f8d0SChristian Borntraeger return; 55070c88a00SChristian Borntraeger cond_resched(); 55115f36ebdSJason J. Herne } 55215f36ebdSJason J. Herne } 55315f36ebdSJason J. Herne 554b0c632dbSHeiko Carstens /* Section: vm related */ 555a6e2f683SEugene (jno) Dvurechenski static void sca_del_vcpu(struct kvm_vcpu *vcpu); 556a6e2f683SEugene (jno) Dvurechenski 557b0c632dbSHeiko Carstens /* 558b0c632dbSHeiko Carstens * Get (and clear) the dirty memory log for a memory slot. 559b0c632dbSHeiko Carstens */ 560b0c632dbSHeiko Carstens int kvm_vm_ioctl_get_dirty_log(struct kvm *kvm, 561b0c632dbSHeiko Carstens struct kvm_dirty_log *log) 562b0c632dbSHeiko Carstens { 56315f36ebdSJason J. Herne int r; 56415f36ebdSJason J. Herne unsigned long n; 5659f6b8029SPaolo Bonzini struct kvm_memslots *slots; 56615f36ebdSJason J. Herne struct kvm_memory_slot *memslot; 56715f36ebdSJason J. Herne int is_dirty = 0; 56815f36ebdSJason J. Herne 569e1e8a962SJanosch Frank if (kvm_is_ucontrol(kvm)) 570e1e8a962SJanosch Frank return -EINVAL; 571e1e8a962SJanosch Frank 57215f36ebdSJason J. Herne mutex_lock(&kvm->slots_lock); 57315f36ebdSJason J. Herne 57415f36ebdSJason J. Herne r = -EINVAL; 57515f36ebdSJason J. Herne if (log->slot >= KVM_USER_MEM_SLOTS) 57615f36ebdSJason J. Herne goto out; 57715f36ebdSJason J. Herne 5789f6b8029SPaolo Bonzini slots = kvm_memslots(kvm); 5799f6b8029SPaolo Bonzini memslot = id_to_memslot(slots, log->slot); 58015f36ebdSJason J. Herne r = -ENOENT; 58115f36ebdSJason J. Herne if (!memslot->dirty_bitmap) 58215f36ebdSJason J. Herne goto out; 58315f36ebdSJason J. Herne 58415f36ebdSJason J. Herne kvm_s390_sync_dirty_log(kvm, memslot); 58515f36ebdSJason J. Herne r = kvm_get_dirty_log(kvm, log, &is_dirty); 58615f36ebdSJason J. Herne if (r) 58715f36ebdSJason J. Herne goto out; 58815f36ebdSJason J. Herne 58915f36ebdSJason J. Herne /* Clear the dirty log */ 59015f36ebdSJason J. Herne if (is_dirty) { 59115f36ebdSJason J. Herne n = kvm_dirty_bitmap_bytes(memslot); 59215f36ebdSJason J. Herne memset(memslot->dirty_bitmap, 0, n); 59315f36ebdSJason J. Herne } 59415f36ebdSJason J. Herne r = 0; 59515f36ebdSJason J. Herne out: 59615f36ebdSJason J. Herne mutex_unlock(&kvm->slots_lock); 59715f36ebdSJason J. Herne return r; 598b0c632dbSHeiko Carstens } 599b0c632dbSHeiko Carstens 6006502a34cSDavid Hildenbrand static void icpt_operexc_on_all_vcpus(struct kvm *kvm) 6016502a34cSDavid Hildenbrand { 6026502a34cSDavid Hildenbrand unsigned int i; 6036502a34cSDavid Hildenbrand struct kvm_vcpu *vcpu; 6046502a34cSDavid Hildenbrand 6056502a34cSDavid Hildenbrand kvm_for_each_vcpu(i, vcpu, kvm) { 6066502a34cSDavid Hildenbrand kvm_s390_sync_request(KVM_REQ_ICPT_OPEREXC, vcpu); 6076502a34cSDavid Hildenbrand } 6086502a34cSDavid Hildenbrand } 6096502a34cSDavid Hildenbrand 610d938dc55SCornelia Huck static int kvm_vm_ioctl_enable_cap(struct kvm *kvm, struct kvm_enable_cap *cap) 611d938dc55SCornelia Huck { 612d938dc55SCornelia Huck int r; 613d938dc55SCornelia Huck 614d938dc55SCornelia Huck if (cap->flags) 615d938dc55SCornelia Huck return -EINVAL; 616d938dc55SCornelia Huck 617d938dc55SCornelia Huck switch (cap->cap) { 61884223598SCornelia Huck case KVM_CAP_S390_IRQCHIP: 619c92ea7b9SChristian Borntraeger VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_IRQCHIP"); 62084223598SCornelia Huck kvm->arch.use_irqchip = 1; 62184223598SCornelia Huck r = 0; 62284223598SCornelia Huck break; 6232444b352SDavid Hildenbrand case KVM_CAP_S390_USER_SIGP: 624c92ea7b9SChristian Borntraeger VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_USER_SIGP"); 6252444b352SDavid Hildenbrand kvm->arch.user_sigp = 1; 6262444b352SDavid Hildenbrand r = 0; 6272444b352SDavid Hildenbrand break; 62868c55750SEric Farman case KVM_CAP_S390_VECTOR_REGISTERS: 6295967c17bSDavid Hildenbrand mutex_lock(&kvm->lock); 630a03825bbSPaolo Bonzini if (kvm->created_vcpus) { 6315967c17bSDavid Hildenbrand r = -EBUSY; 6325967c17bSDavid Hildenbrand } else if (MACHINE_HAS_VX) { 633c54f0d6aSDavid Hildenbrand set_kvm_facility(kvm->arch.model.fac_mask, 129); 634c54f0d6aSDavid Hildenbrand set_kvm_facility(kvm->arch.model.fac_list, 129); 6352f87d942SGuenther Hutzl if (test_facility(134)) { 6362f87d942SGuenther Hutzl set_kvm_facility(kvm->arch.model.fac_mask, 134); 6372f87d942SGuenther Hutzl set_kvm_facility(kvm->arch.model.fac_list, 134); 6382f87d942SGuenther Hutzl } 63953743aa7SMaxim Samoylov if (test_facility(135)) { 64053743aa7SMaxim Samoylov set_kvm_facility(kvm->arch.model.fac_mask, 135); 64153743aa7SMaxim Samoylov set_kvm_facility(kvm->arch.model.fac_list, 135); 64253743aa7SMaxim Samoylov } 64318280d8bSMichael Mueller r = 0; 64418280d8bSMichael Mueller } else 64518280d8bSMichael Mueller r = -EINVAL; 6465967c17bSDavid Hildenbrand mutex_unlock(&kvm->lock); 647c92ea7b9SChristian Borntraeger VM_EVENT(kvm, 3, "ENABLE: CAP_S390_VECTOR_REGISTERS %s", 648c92ea7b9SChristian Borntraeger r ? "(not available)" : "(success)"); 64968c55750SEric Farman break; 650c6e5f166SFan Zhang case KVM_CAP_S390_RI: 651c6e5f166SFan Zhang r = -EINVAL; 652c6e5f166SFan Zhang mutex_lock(&kvm->lock); 653a03825bbSPaolo Bonzini if (kvm->created_vcpus) { 654c6e5f166SFan Zhang r = -EBUSY; 655c6e5f166SFan Zhang } else if (test_facility(64)) { 656c54f0d6aSDavid Hildenbrand set_kvm_facility(kvm->arch.model.fac_mask, 64); 657c54f0d6aSDavid Hildenbrand set_kvm_facility(kvm->arch.model.fac_list, 64); 658c6e5f166SFan Zhang r = 0; 659c6e5f166SFan Zhang } 660c6e5f166SFan Zhang mutex_unlock(&kvm->lock); 661c6e5f166SFan Zhang VM_EVENT(kvm, 3, "ENABLE: CAP_S390_RI %s", 662c6e5f166SFan Zhang r ? "(not available)" : "(success)"); 663c6e5f166SFan Zhang break; 66447a4693eSYi Min Zhao case KVM_CAP_S390_AIS: 66547a4693eSYi Min Zhao mutex_lock(&kvm->lock); 66647a4693eSYi Min Zhao if (kvm->created_vcpus) { 66747a4693eSYi Min Zhao r = -EBUSY; 66847a4693eSYi Min Zhao } else { 66947a4693eSYi Min Zhao set_kvm_facility(kvm->arch.model.fac_mask, 72); 67047a4693eSYi Min Zhao set_kvm_facility(kvm->arch.model.fac_list, 72); 67147a4693eSYi Min Zhao r = 0; 67247a4693eSYi Min Zhao } 67347a4693eSYi Min Zhao mutex_unlock(&kvm->lock); 67447a4693eSYi Min Zhao VM_EVENT(kvm, 3, "ENABLE: AIS %s", 67547a4693eSYi Min Zhao r ? "(not available)" : "(success)"); 67647a4693eSYi Min Zhao break; 6774e0b1ab7SFan Zhang case KVM_CAP_S390_GS: 6784e0b1ab7SFan Zhang r = -EINVAL; 6794e0b1ab7SFan Zhang mutex_lock(&kvm->lock); 680241e3ec0SChristian Borntraeger if (kvm->created_vcpus) { 6814e0b1ab7SFan Zhang r = -EBUSY; 6824e0b1ab7SFan Zhang } else if (test_facility(133)) { 6834e0b1ab7SFan Zhang set_kvm_facility(kvm->arch.model.fac_mask, 133); 6844e0b1ab7SFan Zhang set_kvm_facility(kvm->arch.model.fac_list, 133); 6854e0b1ab7SFan Zhang r = 0; 6864e0b1ab7SFan Zhang } 6874e0b1ab7SFan Zhang mutex_unlock(&kvm->lock); 6884e0b1ab7SFan Zhang VM_EVENT(kvm, 3, "ENABLE: CAP_S390_GS %s", 6894e0b1ab7SFan Zhang r ? "(not available)" : "(success)"); 6904e0b1ab7SFan Zhang break; 691a4499382SJanosch Frank case KVM_CAP_S390_HPAGE_1M: 692a4499382SJanosch Frank mutex_lock(&kvm->lock); 693a4499382SJanosch Frank if (kvm->created_vcpus) 694a4499382SJanosch Frank r = -EBUSY; 695a4499382SJanosch Frank else if (!hpage || kvm->arch.use_cmma) 696a4499382SJanosch Frank r = -EINVAL; 697a4499382SJanosch Frank else { 698a4499382SJanosch Frank r = 0; 699df88f318SJanosch Frank down_write(&kvm->mm->mmap_sem); 700a4499382SJanosch Frank kvm->mm->context.allow_gmap_hpage_1m = 1; 701df88f318SJanosch Frank up_write(&kvm->mm->mmap_sem); 702a4499382SJanosch Frank /* 703a4499382SJanosch Frank * We might have to create fake 4k page 704a4499382SJanosch Frank * tables. To avoid that the hardware works on 705a4499382SJanosch Frank * stale PGSTEs, we emulate these instructions. 706a4499382SJanosch Frank */ 707a4499382SJanosch Frank kvm->arch.use_skf = 0; 708a4499382SJanosch Frank kvm->arch.use_pfmfi = 0; 709a4499382SJanosch Frank } 710a4499382SJanosch Frank mutex_unlock(&kvm->lock); 711a4499382SJanosch Frank VM_EVENT(kvm, 3, "ENABLE: CAP_S390_HPAGE %s", 712a4499382SJanosch Frank r ? "(not available)" : "(success)"); 713a4499382SJanosch Frank break; 714e44fc8c9SEkaterina Tumanova case KVM_CAP_S390_USER_STSI: 715c92ea7b9SChristian Borntraeger VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_USER_STSI"); 716e44fc8c9SEkaterina Tumanova kvm->arch.user_stsi = 1; 717e44fc8c9SEkaterina Tumanova r = 0; 718e44fc8c9SEkaterina Tumanova break; 7196502a34cSDavid Hildenbrand case KVM_CAP_S390_USER_INSTR0: 7206502a34cSDavid Hildenbrand VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_USER_INSTR0"); 7216502a34cSDavid Hildenbrand kvm->arch.user_instr0 = 1; 7226502a34cSDavid Hildenbrand icpt_operexc_on_all_vcpus(kvm); 7236502a34cSDavid Hildenbrand r = 0; 7246502a34cSDavid Hildenbrand break; 725d938dc55SCornelia Huck default: 726d938dc55SCornelia Huck r = -EINVAL; 727d938dc55SCornelia Huck break; 728d938dc55SCornelia Huck } 729d938dc55SCornelia Huck return r; 730d938dc55SCornelia Huck } 731d938dc55SCornelia Huck 7328c0a7ce6SDominik Dingel static int kvm_s390_get_mem_control(struct kvm *kvm, struct kvm_device_attr *attr) 7338c0a7ce6SDominik Dingel { 7348c0a7ce6SDominik Dingel int ret; 7358c0a7ce6SDominik Dingel 7368c0a7ce6SDominik Dingel switch (attr->attr) { 7378c0a7ce6SDominik Dingel case KVM_S390_VM_MEM_LIMIT_SIZE: 7388c0a7ce6SDominik Dingel ret = 0; 739c92ea7b9SChristian Borntraeger VM_EVENT(kvm, 3, "QUERY: max guest memory: %lu bytes", 740a3a92c31SDominik Dingel kvm->arch.mem_limit); 741a3a92c31SDominik Dingel if (put_user(kvm->arch.mem_limit, (u64 __user *)attr->addr)) 7428c0a7ce6SDominik Dingel ret = -EFAULT; 7438c0a7ce6SDominik Dingel break; 7448c0a7ce6SDominik Dingel default: 7458c0a7ce6SDominik Dingel ret = -ENXIO; 7468c0a7ce6SDominik Dingel break; 7478c0a7ce6SDominik Dingel } 7488c0a7ce6SDominik Dingel return ret; 7498c0a7ce6SDominik Dingel } 7508c0a7ce6SDominik Dingel 7518c0a7ce6SDominik Dingel static int kvm_s390_set_mem_control(struct kvm *kvm, struct kvm_device_attr *attr) 7524f718eabSDominik Dingel { 7534f718eabSDominik Dingel int ret; 7544f718eabSDominik Dingel unsigned int idx; 7554f718eabSDominik Dingel switch (attr->attr) { 7564f718eabSDominik Dingel case KVM_S390_VM_MEM_ENABLE_CMMA: 757f9cbd9b0SDavid Hildenbrand ret = -ENXIO; 758c24cc9c8SDavid Hildenbrand if (!sclp.has_cmma) 759e6db1d61SDominik Dingel break; 760e6db1d61SDominik Dingel 761c92ea7b9SChristian Borntraeger VM_EVENT(kvm, 3, "%s", "ENABLE: CMMA support"); 7624f718eabSDominik Dingel mutex_lock(&kvm->lock); 763a4499382SJanosch Frank if (kvm->created_vcpus) 764a4499382SJanosch Frank ret = -EBUSY; 765a4499382SJanosch Frank else if (kvm->mm->context.allow_gmap_hpage_1m) 766a4499382SJanosch Frank ret = -EINVAL; 767a4499382SJanosch Frank else { 7684f718eabSDominik Dingel kvm->arch.use_cmma = 1; 769c9f0a2b8SJanosch Frank /* Not compatible with cmma. */ 770c9f0a2b8SJanosch Frank kvm->arch.use_pfmfi = 0; 7714f718eabSDominik Dingel ret = 0; 7724f718eabSDominik Dingel } 7734f718eabSDominik Dingel mutex_unlock(&kvm->lock); 7744f718eabSDominik Dingel break; 7754f718eabSDominik Dingel case KVM_S390_VM_MEM_CLR_CMMA: 776f9cbd9b0SDavid Hildenbrand ret = -ENXIO; 777f9cbd9b0SDavid Hildenbrand if (!sclp.has_cmma) 778f9cbd9b0SDavid Hildenbrand break; 779c3489155SDominik Dingel ret = -EINVAL; 780c3489155SDominik Dingel if (!kvm->arch.use_cmma) 781c3489155SDominik Dingel break; 782c3489155SDominik Dingel 783c92ea7b9SChristian Borntraeger VM_EVENT(kvm, 3, "%s", "RESET: CMMA states"); 7844f718eabSDominik Dingel mutex_lock(&kvm->lock); 7854f718eabSDominik Dingel idx = srcu_read_lock(&kvm->srcu); 786a13cff31SDominik Dingel s390_reset_cmma(kvm->arch.gmap->mm); 7874f718eabSDominik Dingel srcu_read_unlock(&kvm->srcu, idx); 7884f718eabSDominik Dingel mutex_unlock(&kvm->lock); 7894f718eabSDominik Dingel ret = 0; 7904f718eabSDominik Dingel break; 7918c0a7ce6SDominik Dingel case KVM_S390_VM_MEM_LIMIT_SIZE: { 7928c0a7ce6SDominik Dingel unsigned long new_limit; 7938c0a7ce6SDominik Dingel 7948c0a7ce6SDominik Dingel if (kvm_is_ucontrol(kvm)) 7958c0a7ce6SDominik Dingel return -EINVAL; 7968c0a7ce6SDominik Dingel 7978c0a7ce6SDominik Dingel if (get_user(new_limit, (u64 __user *)attr->addr)) 7988c0a7ce6SDominik Dingel return -EFAULT; 7998c0a7ce6SDominik Dingel 800a3a92c31SDominik Dingel if (kvm->arch.mem_limit != KVM_S390_NO_MEM_LIMIT && 801a3a92c31SDominik Dingel new_limit > kvm->arch.mem_limit) 8028c0a7ce6SDominik Dingel return -E2BIG; 8038c0a7ce6SDominik Dingel 804a3a92c31SDominik Dingel if (!new_limit) 805a3a92c31SDominik Dingel return -EINVAL; 806a3a92c31SDominik Dingel 8076ea427bbSMartin Schwidefsky /* gmap_create takes last usable address */ 808a3a92c31SDominik Dingel if (new_limit != KVM_S390_NO_MEM_LIMIT) 809a3a92c31SDominik Dingel new_limit -= 1; 810a3a92c31SDominik Dingel 8118c0a7ce6SDominik Dingel ret = -EBUSY; 8128c0a7ce6SDominik Dingel mutex_lock(&kvm->lock); 813a03825bbSPaolo Bonzini if (!kvm->created_vcpus) { 8146ea427bbSMartin Schwidefsky /* gmap_create will round the limit up */ 8156ea427bbSMartin Schwidefsky struct gmap *new = gmap_create(current->mm, new_limit); 8168c0a7ce6SDominik Dingel 8178c0a7ce6SDominik Dingel if (!new) { 8188c0a7ce6SDominik Dingel ret = -ENOMEM; 8198c0a7ce6SDominik Dingel } else { 8206ea427bbSMartin Schwidefsky gmap_remove(kvm->arch.gmap); 8218c0a7ce6SDominik Dingel new->private = kvm; 8228c0a7ce6SDominik Dingel kvm->arch.gmap = new; 8238c0a7ce6SDominik Dingel ret = 0; 8248c0a7ce6SDominik Dingel } 8258c0a7ce6SDominik Dingel } 8268c0a7ce6SDominik Dingel mutex_unlock(&kvm->lock); 827a3a92c31SDominik Dingel VM_EVENT(kvm, 3, "SET: max guest address: %lu", new_limit); 828a3a92c31SDominik Dingel VM_EVENT(kvm, 3, "New guest asce: 0x%pK", 829a3a92c31SDominik Dingel (void *) kvm->arch.gmap->asce); 8308c0a7ce6SDominik Dingel break; 8318c0a7ce6SDominik Dingel } 8324f718eabSDominik Dingel default: 8334f718eabSDominik Dingel ret = -ENXIO; 8344f718eabSDominik Dingel break; 8354f718eabSDominik Dingel } 8364f718eabSDominik Dingel return ret; 8374f718eabSDominik Dingel } 8384f718eabSDominik Dingel 839a374e892STony Krowiak static void kvm_s390_vcpu_crypto_setup(struct kvm_vcpu *vcpu); 840a374e892STony Krowiak 84120c922f0STony Krowiak void kvm_s390_vcpu_crypto_reset_all(struct kvm *kvm) 842a374e892STony Krowiak { 843a374e892STony Krowiak struct kvm_vcpu *vcpu; 844a374e892STony Krowiak int i; 845a374e892STony Krowiak 84620c922f0STony Krowiak kvm_s390_vcpu_block_all(kvm); 84720c922f0STony Krowiak 8483194cdb7SDavid Hildenbrand kvm_for_each_vcpu(i, vcpu, kvm) { 84920c922f0STony Krowiak kvm_s390_vcpu_crypto_setup(vcpu); 8503194cdb7SDavid Hildenbrand /* recreate the shadow crycb by leaving the VSIE handler */ 8513194cdb7SDavid Hildenbrand kvm_s390_sync_request(KVM_REQ_VSIE_RESTART, vcpu); 8523194cdb7SDavid Hildenbrand } 85320c922f0STony Krowiak 85420c922f0STony Krowiak kvm_s390_vcpu_unblock_all(kvm); 85520c922f0STony Krowiak } 85620c922f0STony Krowiak 85720c922f0STony Krowiak static int kvm_s390_vm_set_crypto(struct kvm *kvm, struct kvm_device_attr *attr) 85820c922f0STony Krowiak { 859a374e892STony Krowiak mutex_lock(&kvm->lock); 860a374e892STony Krowiak switch (attr->attr) { 861a374e892STony Krowiak case KVM_S390_VM_CRYPTO_ENABLE_AES_KW: 862*8e41bd54SChristian Borntraeger if (!test_kvm_facility(kvm, 76)) { 863*8e41bd54SChristian Borntraeger mutex_unlock(&kvm->lock); 86437940fb0STony Krowiak return -EINVAL; 865*8e41bd54SChristian Borntraeger } 866a374e892STony Krowiak get_random_bytes( 867a374e892STony Krowiak kvm->arch.crypto.crycb->aes_wrapping_key_mask, 868a374e892STony Krowiak sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask)); 869a374e892STony Krowiak kvm->arch.crypto.aes_kw = 1; 870c92ea7b9SChristian Borntraeger VM_EVENT(kvm, 3, "%s", "ENABLE: AES keywrapping support"); 871a374e892STony Krowiak break; 872a374e892STony Krowiak case KVM_S390_VM_CRYPTO_ENABLE_DEA_KW: 873*8e41bd54SChristian Borntraeger if (!test_kvm_facility(kvm, 76)) { 874*8e41bd54SChristian Borntraeger mutex_unlock(&kvm->lock); 87537940fb0STony Krowiak return -EINVAL; 876*8e41bd54SChristian Borntraeger } 877a374e892STony Krowiak get_random_bytes( 878a374e892STony Krowiak kvm->arch.crypto.crycb->dea_wrapping_key_mask, 879a374e892STony Krowiak sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask)); 880a374e892STony Krowiak kvm->arch.crypto.dea_kw = 1; 881c92ea7b9SChristian Borntraeger VM_EVENT(kvm, 3, "%s", "ENABLE: DEA keywrapping support"); 882a374e892STony Krowiak break; 883a374e892STony Krowiak case KVM_S390_VM_CRYPTO_DISABLE_AES_KW: 884*8e41bd54SChristian Borntraeger if (!test_kvm_facility(kvm, 76)) { 885*8e41bd54SChristian Borntraeger mutex_unlock(&kvm->lock); 88637940fb0STony Krowiak return -EINVAL; 887*8e41bd54SChristian Borntraeger } 888a374e892STony Krowiak kvm->arch.crypto.aes_kw = 0; 889a374e892STony Krowiak memset(kvm->arch.crypto.crycb->aes_wrapping_key_mask, 0, 890a374e892STony Krowiak sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask)); 891c92ea7b9SChristian Borntraeger VM_EVENT(kvm, 3, "%s", "DISABLE: AES keywrapping support"); 892a374e892STony Krowiak break; 893a374e892STony Krowiak case KVM_S390_VM_CRYPTO_DISABLE_DEA_KW: 894*8e41bd54SChristian Borntraeger if (!test_kvm_facility(kvm, 76)) { 895*8e41bd54SChristian Borntraeger mutex_unlock(&kvm->lock); 89637940fb0STony Krowiak return -EINVAL; 897*8e41bd54SChristian Borntraeger } 898a374e892STony Krowiak kvm->arch.crypto.dea_kw = 0; 899a374e892STony Krowiak memset(kvm->arch.crypto.crycb->dea_wrapping_key_mask, 0, 900a374e892STony Krowiak sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask)); 901c92ea7b9SChristian Borntraeger VM_EVENT(kvm, 3, "%s", "DISABLE: DEA keywrapping support"); 902a374e892STony Krowiak break; 90337940fb0STony Krowiak case KVM_S390_VM_CRYPTO_ENABLE_APIE: 90437940fb0STony Krowiak if (!ap_instructions_available()) { 90537940fb0STony Krowiak mutex_unlock(&kvm->lock); 90637940fb0STony Krowiak return -EOPNOTSUPP; 90737940fb0STony Krowiak } 90837940fb0STony Krowiak kvm->arch.crypto.apie = 1; 90937940fb0STony Krowiak break; 91037940fb0STony Krowiak case KVM_S390_VM_CRYPTO_DISABLE_APIE: 91137940fb0STony Krowiak if (!ap_instructions_available()) { 91237940fb0STony Krowiak mutex_unlock(&kvm->lock); 91337940fb0STony Krowiak return -EOPNOTSUPP; 91437940fb0STony Krowiak } 91537940fb0STony Krowiak kvm->arch.crypto.apie = 0; 91637940fb0STony Krowiak break; 917a374e892STony Krowiak default: 918a374e892STony Krowiak mutex_unlock(&kvm->lock); 919a374e892STony Krowiak return -ENXIO; 920a374e892STony Krowiak } 921a374e892STony Krowiak 92220c922f0STony Krowiak kvm_s390_vcpu_crypto_reset_all(kvm); 923a374e892STony Krowiak mutex_unlock(&kvm->lock); 924a374e892STony Krowiak return 0; 925a374e892STony Krowiak } 926a374e892STony Krowiak 927190df4a2SClaudio Imbrenda static void kvm_s390_sync_request_broadcast(struct kvm *kvm, int req) 928190df4a2SClaudio Imbrenda { 929190df4a2SClaudio Imbrenda int cx; 930190df4a2SClaudio Imbrenda struct kvm_vcpu *vcpu; 931190df4a2SClaudio Imbrenda 932190df4a2SClaudio Imbrenda kvm_for_each_vcpu(cx, vcpu, kvm) 933190df4a2SClaudio Imbrenda kvm_s390_sync_request(req, vcpu); 934190df4a2SClaudio Imbrenda } 935190df4a2SClaudio Imbrenda 936190df4a2SClaudio Imbrenda /* 937190df4a2SClaudio Imbrenda * Must be called with kvm->srcu held to avoid races on memslots, and with 9381de1ea7eSChristian Borntraeger * kvm->slots_lock to avoid races with ourselves and kvm_s390_vm_stop_migration. 939190df4a2SClaudio Imbrenda */ 940190df4a2SClaudio Imbrenda static int kvm_s390_vm_start_migration(struct kvm *kvm) 941190df4a2SClaudio Imbrenda { 942190df4a2SClaudio Imbrenda struct kvm_memory_slot *ms; 943190df4a2SClaudio Imbrenda struct kvm_memslots *slots; 944afdad616SClaudio Imbrenda unsigned long ram_pages = 0; 945190df4a2SClaudio Imbrenda int slotnr; 946190df4a2SClaudio Imbrenda 947190df4a2SClaudio Imbrenda /* migration mode already enabled */ 948afdad616SClaudio Imbrenda if (kvm->arch.migration_mode) 949190df4a2SClaudio Imbrenda return 0; 950190df4a2SClaudio Imbrenda slots = kvm_memslots(kvm); 951190df4a2SClaudio Imbrenda if (!slots || !slots->used_slots) 952190df4a2SClaudio Imbrenda return -EINVAL; 953190df4a2SClaudio Imbrenda 954afdad616SClaudio Imbrenda if (!kvm->arch.use_cmma) { 955afdad616SClaudio Imbrenda kvm->arch.migration_mode = 1; 956afdad616SClaudio Imbrenda return 0; 957190df4a2SClaudio Imbrenda } 958190df4a2SClaudio Imbrenda /* mark all the pages in active slots as dirty */ 959190df4a2SClaudio Imbrenda for (slotnr = 0; slotnr < slots->used_slots; slotnr++) { 960190df4a2SClaudio Imbrenda ms = slots->memslots + slotnr; 961afdad616SClaudio Imbrenda /* 962afdad616SClaudio Imbrenda * The second half of the bitmap is only used on x86, 963afdad616SClaudio Imbrenda * and would be wasted otherwise, so we put it to good 964afdad616SClaudio Imbrenda * use here to keep track of the state of the storage 965afdad616SClaudio Imbrenda * attributes. 966afdad616SClaudio Imbrenda */ 967afdad616SClaudio Imbrenda memset(kvm_second_dirty_bitmap(ms), 0xff, kvm_dirty_bitmap_bytes(ms)); 968afdad616SClaudio Imbrenda ram_pages += ms->npages; 969190df4a2SClaudio Imbrenda } 970afdad616SClaudio Imbrenda atomic64_set(&kvm->arch.cmma_dirty_pages, ram_pages); 971afdad616SClaudio Imbrenda kvm->arch.migration_mode = 1; 972190df4a2SClaudio Imbrenda kvm_s390_sync_request_broadcast(kvm, KVM_REQ_START_MIGRATION); 973190df4a2SClaudio Imbrenda return 0; 974190df4a2SClaudio Imbrenda } 975190df4a2SClaudio Imbrenda 976190df4a2SClaudio Imbrenda /* 9771de1ea7eSChristian Borntraeger * Must be called with kvm->slots_lock to avoid races with ourselves and 978190df4a2SClaudio Imbrenda * kvm_s390_vm_start_migration. 979190df4a2SClaudio Imbrenda */ 980190df4a2SClaudio Imbrenda static int kvm_s390_vm_stop_migration(struct kvm *kvm) 981190df4a2SClaudio Imbrenda { 982190df4a2SClaudio Imbrenda /* migration mode already disabled */ 983afdad616SClaudio Imbrenda if (!kvm->arch.migration_mode) 984190df4a2SClaudio Imbrenda return 0; 985afdad616SClaudio Imbrenda kvm->arch.migration_mode = 0; 986afdad616SClaudio Imbrenda if (kvm->arch.use_cmma) 987190df4a2SClaudio Imbrenda kvm_s390_sync_request_broadcast(kvm, KVM_REQ_STOP_MIGRATION); 988190df4a2SClaudio Imbrenda return 0; 989190df4a2SClaudio Imbrenda } 990190df4a2SClaudio Imbrenda 991190df4a2SClaudio Imbrenda static int kvm_s390_vm_set_migration(struct kvm *kvm, 992190df4a2SClaudio Imbrenda struct kvm_device_attr *attr) 993190df4a2SClaudio Imbrenda { 9941de1ea7eSChristian Borntraeger int res = -ENXIO; 995190df4a2SClaudio Imbrenda 9961de1ea7eSChristian Borntraeger mutex_lock(&kvm->slots_lock); 997190df4a2SClaudio Imbrenda switch (attr->attr) { 998190df4a2SClaudio Imbrenda case KVM_S390_VM_MIGRATION_START: 999190df4a2SClaudio Imbrenda res = kvm_s390_vm_start_migration(kvm); 1000190df4a2SClaudio Imbrenda break; 1001190df4a2SClaudio Imbrenda case KVM_S390_VM_MIGRATION_STOP: 1002190df4a2SClaudio Imbrenda res = kvm_s390_vm_stop_migration(kvm); 1003190df4a2SClaudio Imbrenda break; 1004190df4a2SClaudio Imbrenda default: 1005190df4a2SClaudio Imbrenda break; 1006190df4a2SClaudio Imbrenda } 10071de1ea7eSChristian Borntraeger mutex_unlock(&kvm->slots_lock); 1008190df4a2SClaudio Imbrenda 1009190df4a2SClaudio Imbrenda return res; 1010190df4a2SClaudio Imbrenda } 1011190df4a2SClaudio Imbrenda 1012190df4a2SClaudio Imbrenda static int kvm_s390_vm_get_migration(struct kvm *kvm, 1013190df4a2SClaudio Imbrenda struct kvm_device_attr *attr) 1014190df4a2SClaudio Imbrenda { 1015afdad616SClaudio Imbrenda u64 mig = kvm->arch.migration_mode; 1016190df4a2SClaudio Imbrenda 1017190df4a2SClaudio Imbrenda if (attr->attr != KVM_S390_VM_MIGRATION_STATUS) 1018190df4a2SClaudio Imbrenda return -ENXIO; 1019190df4a2SClaudio Imbrenda 1020190df4a2SClaudio Imbrenda if (copy_to_user((void __user *)attr->addr, &mig, sizeof(mig))) 1021190df4a2SClaudio Imbrenda return -EFAULT; 1022190df4a2SClaudio Imbrenda return 0; 1023190df4a2SClaudio Imbrenda } 1024190df4a2SClaudio Imbrenda 10258fa1696eSCollin L. Walling static int kvm_s390_set_tod_ext(struct kvm *kvm, struct kvm_device_attr *attr) 10268fa1696eSCollin L. Walling { 10278fa1696eSCollin L. Walling struct kvm_s390_vm_tod_clock gtod; 10288fa1696eSCollin L. Walling 10298fa1696eSCollin L. Walling if (copy_from_user(>od, (void __user *)attr->addr, sizeof(gtod))) 10308fa1696eSCollin L. Walling return -EFAULT; 10318fa1696eSCollin L. Walling 10320e7def5fSDavid Hildenbrand if (!test_kvm_facility(kvm, 139) && gtod.epoch_idx) 10338fa1696eSCollin L. Walling return -EINVAL; 10340e7def5fSDavid Hildenbrand kvm_s390_set_tod_clock(kvm, >od); 10358fa1696eSCollin L. Walling 10368fa1696eSCollin L. Walling VM_EVENT(kvm, 3, "SET: TOD extension: 0x%x, TOD base: 0x%llx", 10378fa1696eSCollin L. Walling gtod.epoch_idx, gtod.tod); 10388fa1696eSCollin L. Walling 10398fa1696eSCollin L. Walling return 0; 10408fa1696eSCollin L. Walling } 10418fa1696eSCollin L. Walling 104272f25020SJason J. Herne static int kvm_s390_set_tod_high(struct kvm *kvm, struct kvm_device_attr *attr) 104372f25020SJason J. Herne { 104472f25020SJason J. Herne u8 gtod_high; 104572f25020SJason J. Herne 104672f25020SJason J. Herne if (copy_from_user(>od_high, (void __user *)attr->addr, 104772f25020SJason J. Herne sizeof(gtod_high))) 104872f25020SJason J. Herne return -EFAULT; 104972f25020SJason J. Herne 105072f25020SJason J. Herne if (gtod_high != 0) 105172f25020SJason J. Herne return -EINVAL; 105258c383c6SChristian Borntraeger VM_EVENT(kvm, 3, "SET: TOD extension: 0x%x", gtod_high); 105372f25020SJason J. Herne 105472f25020SJason J. Herne return 0; 105572f25020SJason J. Herne } 105672f25020SJason J. Herne 105772f25020SJason J. Herne static int kvm_s390_set_tod_low(struct kvm *kvm, struct kvm_device_attr *attr) 105872f25020SJason J. Herne { 10590e7def5fSDavid Hildenbrand struct kvm_s390_vm_tod_clock gtod = { 0 }; 106072f25020SJason J. Herne 10610e7def5fSDavid Hildenbrand if (copy_from_user(>od.tod, (void __user *)attr->addr, 10620e7def5fSDavid Hildenbrand sizeof(gtod.tod))) 106372f25020SJason J. Herne return -EFAULT; 106472f25020SJason J. Herne 10650e7def5fSDavid Hildenbrand kvm_s390_set_tod_clock(kvm, >od); 10660e7def5fSDavid Hildenbrand VM_EVENT(kvm, 3, "SET: TOD base: 0x%llx", gtod.tod); 106772f25020SJason J. Herne return 0; 106872f25020SJason J. Herne } 106972f25020SJason J. Herne 107072f25020SJason J. Herne static int kvm_s390_set_tod(struct kvm *kvm, struct kvm_device_attr *attr) 107172f25020SJason J. Herne { 107272f25020SJason J. Herne int ret; 107372f25020SJason J. Herne 107472f25020SJason J. Herne if (attr->flags) 107572f25020SJason J. Herne return -EINVAL; 107672f25020SJason J. Herne 107772f25020SJason J. Herne switch (attr->attr) { 10788fa1696eSCollin L. Walling case KVM_S390_VM_TOD_EXT: 10798fa1696eSCollin L. Walling ret = kvm_s390_set_tod_ext(kvm, attr); 10808fa1696eSCollin L. Walling break; 108172f25020SJason J. Herne case KVM_S390_VM_TOD_HIGH: 108272f25020SJason J. Herne ret = kvm_s390_set_tod_high(kvm, attr); 108372f25020SJason J. Herne break; 108472f25020SJason J. Herne case KVM_S390_VM_TOD_LOW: 108572f25020SJason J. Herne ret = kvm_s390_set_tod_low(kvm, attr); 108672f25020SJason J. Herne break; 108772f25020SJason J. Herne default: 108872f25020SJason J. Herne ret = -ENXIO; 108972f25020SJason J. Herne break; 109072f25020SJason J. Herne } 109172f25020SJason J. Herne return ret; 109272f25020SJason J. Herne } 109372f25020SJason J. Herne 109433d1b272SDavid Hildenbrand static void kvm_s390_get_tod_clock(struct kvm *kvm, 10958fa1696eSCollin L. Walling struct kvm_s390_vm_tod_clock *gtod) 10968fa1696eSCollin L. Walling { 10978fa1696eSCollin L. Walling struct kvm_s390_tod_clock_ext htod; 10988fa1696eSCollin L. Walling 10998fa1696eSCollin L. Walling preempt_disable(); 11008fa1696eSCollin L. Walling 11018fa1696eSCollin L. Walling get_tod_clock_ext((char *)&htod); 11028fa1696eSCollin L. Walling 11038fa1696eSCollin L. Walling gtod->tod = htod.tod + kvm->arch.epoch; 110433d1b272SDavid Hildenbrand gtod->epoch_idx = 0; 110533d1b272SDavid Hildenbrand if (test_kvm_facility(kvm, 139)) { 11068fa1696eSCollin L. Walling gtod->epoch_idx = htod.epoch_idx + kvm->arch.epdx; 11078fa1696eSCollin L. Walling if (gtod->tod < htod.tod) 11088fa1696eSCollin L. Walling gtod->epoch_idx += 1; 110933d1b272SDavid Hildenbrand } 11108fa1696eSCollin L. Walling 11118fa1696eSCollin L. Walling preempt_enable(); 11128fa1696eSCollin L. Walling } 11138fa1696eSCollin L. Walling 11148fa1696eSCollin L. Walling static int kvm_s390_get_tod_ext(struct kvm *kvm, struct kvm_device_attr *attr) 11158fa1696eSCollin L. Walling { 11168fa1696eSCollin L. Walling struct kvm_s390_vm_tod_clock gtod; 11178fa1696eSCollin L. Walling 11188fa1696eSCollin L. Walling memset(>od, 0, sizeof(gtod)); 111933d1b272SDavid Hildenbrand kvm_s390_get_tod_clock(kvm, >od); 11208fa1696eSCollin L. Walling if (copy_to_user((void __user *)attr->addr, >od, sizeof(gtod))) 11218fa1696eSCollin L. Walling return -EFAULT; 11228fa1696eSCollin L. Walling 11238fa1696eSCollin L. Walling VM_EVENT(kvm, 3, "QUERY: TOD extension: 0x%x, TOD base: 0x%llx", 11248fa1696eSCollin L. Walling gtod.epoch_idx, gtod.tod); 11258fa1696eSCollin L. Walling return 0; 11268fa1696eSCollin L. Walling } 11278fa1696eSCollin L. Walling 112872f25020SJason J. Herne static int kvm_s390_get_tod_high(struct kvm *kvm, struct kvm_device_attr *attr) 112972f25020SJason J. Herne { 113072f25020SJason J. Herne u8 gtod_high = 0; 113172f25020SJason J. Herne 113272f25020SJason J. Herne if (copy_to_user((void __user *)attr->addr, >od_high, 113372f25020SJason J. Herne sizeof(gtod_high))) 113472f25020SJason J. Herne return -EFAULT; 113558c383c6SChristian Borntraeger VM_EVENT(kvm, 3, "QUERY: TOD extension: 0x%x", gtod_high); 113672f25020SJason J. Herne 113772f25020SJason J. Herne return 0; 113872f25020SJason J. Herne } 113972f25020SJason J. Herne 114072f25020SJason J. Herne static int kvm_s390_get_tod_low(struct kvm *kvm, struct kvm_device_attr *attr) 114172f25020SJason J. Herne { 11425a3d883aSDavid Hildenbrand u64 gtod; 114372f25020SJason J. Herne 114460417fccSDavid Hildenbrand gtod = kvm_s390_get_tod_clock_fast(kvm); 114572f25020SJason J. Herne if (copy_to_user((void __user *)attr->addr, >od, sizeof(gtod))) 114672f25020SJason J. Herne return -EFAULT; 114758c383c6SChristian Borntraeger VM_EVENT(kvm, 3, "QUERY: TOD base: 0x%llx", gtod); 114872f25020SJason J. Herne 114972f25020SJason J. Herne return 0; 115072f25020SJason J. Herne } 115172f25020SJason J. Herne 115272f25020SJason J. Herne static int kvm_s390_get_tod(struct kvm *kvm, struct kvm_device_attr *attr) 115372f25020SJason J. Herne { 115472f25020SJason J. Herne int ret; 115572f25020SJason J. Herne 115672f25020SJason J. Herne if (attr->flags) 115772f25020SJason J. Herne return -EINVAL; 115872f25020SJason J. Herne 115972f25020SJason J. Herne switch (attr->attr) { 11608fa1696eSCollin L. Walling case KVM_S390_VM_TOD_EXT: 11618fa1696eSCollin L. Walling ret = kvm_s390_get_tod_ext(kvm, attr); 11628fa1696eSCollin L. Walling break; 116372f25020SJason J. Herne case KVM_S390_VM_TOD_HIGH: 116472f25020SJason J. Herne ret = kvm_s390_get_tod_high(kvm, attr); 116572f25020SJason J. Herne break; 116672f25020SJason J. Herne case KVM_S390_VM_TOD_LOW: 116772f25020SJason J. Herne ret = kvm_s390_get_tod_low(kvm, attr); 116872f25020SJason J. Herne break; 116972f25020SJason J. Herne default: 117072f25020SJason J. Herne ret = -ENXIO; 117172f25020SJason J. Herne break; 117272f25020SJason J. Herne } 117372f25020SJason J. Herne return ret; 117472f25020SJason J. Herne } 117572f25020SJason J. Herne 1176658b6edaSMichael Mueller static int kvm_s390_set_processor(struct kvm *kvm, struct kvm_device_attr *attr) 1177658b6edaSMichael Mueller { 1178658b6edaSMichael Mueller struct kvm_s390_vm_cpu_processor *proc; 1179053dd230SDavid Hildenbrand u16 lowest_ibc, unblocked_ibc; 1180658b6edaSMichael Mueller int ret = 0; 1181658b6edaSMichael Mueller 1182658b6edaSMichael Mueller mutex_lock(&kvm->lock); 1183a03825bbSPaolo Bonzini if (kvm->created_vcpus) { 1184658b6edaSMichael Mueller ret = -EBUSY; 1185658b6edaSMichael Mueller goto out; 1186658b6edaSMichael Mueller } 1187658b6edaSMichael Mueller proc = kzalloc(sizeof(*proc), GFP_KERNEL); 1188658b6edaSMichael Mueller if (!proc) { 1189658b6edaSMichael Mueller ret = -ENOMEM; 1190658b6edaSMichael Mueller goto out; 1191658b6edaSMichael Mueller } 1192658b6edaSMichael Mueller if (!copy_from_user(proc, (void __user *)attr->addr, 1193658b6edaSMichael Mueller sizeof(*proc))) { 11949bb0ec09SDavid Hildenbrand kvm->arch.model.cpuid = proc->cpuid; 1195053dd230SDavid Hildenbrand lowest_ibc = sclp.ibc >> 16 & 0xfff; 1196053dd230SDavid Hildenbrand unblocked_ibc = sclp.ibc & 0xfff; 11970487c44dSDavid Hildenbrand if (lowest_ibc && proc->ibc) { 1198053dd230SDavid Hildenbrand if (proc->ibc > unblocked_ibc) 1199053dd230SDavid Hildenbrand kvm->arch.model.ibc = unblocked_ibc; 1200053dd230SDavid Hildenbrand else if (proc->ibc < lowest_ibc) 1201053dd230SDavid Hildenbrand kvm->arch.model.ibc = lowest_ibc; 1202053dd230SDavid Hildenbrand else 1203658b6edaSMichael Mueller kvm->arch.model.ibc = proc->ibc; 1204053dd230SDavid Hildenbrand } 1205c54f0d6aSDavid Hildenbrand memcpy(kvm->arch.model.fac_list, proc->fac_list, 1206658b6edaSMichael Mueller S390_ARCH_FAC_LIST_SIZE_BYTE); 1207a8c39dd7SChristian Borntraeger VM_EVENT(kvm, 3, "SET: guest ibc: 0x%4.4x, guest cpuid: 0x%16.16llx", 1208a8c39dd7SChristian Borntraeger kvm->arch.model.ibc, 1209a8c39dd7SChristian Borntraeger kvm->arch.model.cpuid); 1210a8c39dd7SChristian Borntraeger VM_EVENT(kvm, 3, "SET: guest faclist: 0x%16.16llx.%16.16llx.%16.16llx", 1211a8c39dd7SChristian Borntraeger kvm->arch.model.fac_list[0], 1212a8c39dd7SChristian Borntraeger kvm->arch.model.fac_list[1], 1213a8c39dd7SChristian Borntraeger kvm->arch.model.fac_list[2]); 1214658b6edaSMichael Mueller } else 1215658b6edaSMichael Mueller ret = -EFAULT; 1216658b6edaSMichael Mueller kfree(proc); 1217658b6edaSMichael Mueller out: 1218658b6edaSMichael Mueller mutex_unlock(&kvm->lock); 1219658b6edaSMichael Mueller return ret; 1220658b6edaSMichael Mueller } 1221658b6edaSMichael Mueller 122215c9705fSDavid Hildenbrand static int kvm_s390_set_processor_feat(struct kvm *kvm, 122315c9705fSDavid Hildenbrand struct kvm_device_attr *attr) 122415c9705fSDavid Hildenbrand { 122515c9705fSDavid Hildenbrand struct kvm_s390_vm_cpu_feat data; 122615c9705fSDavid Hildenbrand 122715c9705fSDavid Hildenbrand if (copy_from_user(&data, (void __user *)attr->addr, sizeof(data))) 122815c9705fSDavid Hildenbrand return -EFAULT; 122915c9705fSDavid Hildenbrand if (!bitmap_subset((unsigned long *) data.feat, 123015c9705fSDavid Hildenbrand kvm_s390_available_cpu_feat, 123115c9705fSDavid Hildenbrand KVM_S390_VM_CPU_FEAT_NR_BITS)) 123215c9705fSDavid Hildenbrand return -EINVAL; 123315c9705fSDavid Hildenbrand 123415c9705fSDavid Hildenbrand mutex_lock(&kvm->lock); 12352f8311c9SChristian Borntraeger if (kvm->created_vcpus) { 12362f8311c9SChristian Borntraeger mutex_unlock(&kvm->lock); 12372f8311c9SChristian Borntraeger return -EBUSY; 12382f8311c9SChristian Borntraeger } 123915c9705fSDavid Hildenbrand bitmap_copy(kvm->arch.cpu_feat, (unsigned long *) data.feat, 124015c9705fSDavid Hildenbrand KVM_S390_VM_CPU_FEAT_NR_BITS); 124115c9705fSDavid Hildenbrand mutex_unlock(&kvm->lock); 12422f8311c9SChristian Borntraeger VM_EVENT(kvm, 3, "SET: guest feat: 0x%16.16llx.0x%16.16llx.0x%16.16llx", 12432f8311c9SChristian Borntraeger data.feat[0], 12442f8311c9SChristian Borntraeger data.feat[1], 12452f8311c9SChristian Borntraeger data.feat[2]); 12462f8311c9SChristian Borntraeger return 0; 124715c9705fSDavid Hildenbrand } 124815c9705fSDavid Hildenbrand 12490a763c78SDavid Hildenbrand static int kvm_s390_set_processor_subfunc(struct kvm *kvm, 12500a763c78SDavid Hildenbrand struct kvm_device_attr *attr) 12510a763c78SDavid Hildenbrand { 12520a763c78SDavid Hildenbrand /* 12530a763c78SDavid Hildenbrand * Once supported by kernel + hw, we have to store the subfunctions 12540a763c78SDavid Hildenbrand * in kvm->arch and remember that user space configured them. 12550a763c78SDavid Hildenbrand */ 12560a763c78SDavid Hildenbrand return -ENXIO; 12570a763c78SDavid Hildenbrand } 12580a763c78SDavid Hildenbrand 1259658b6edaSMichael Mueller static int kvm_s390_set_cpu_model(struct kvm *kvm, struct kvm_device_attr *attr) 1260658b6edaSMichael Mueller { 1261658b6edaSMichael Mueller int ret = -ENXIO; 1262658b6edaSMichael Mueller 1263658b6edaSMichael Mueller switch (attr->attr) { 1264658b6edaSMichael Mueller case KVM_S390_VM_CPU_PROCESSOR: 1265658b6edaSMichael Mueller ret = kvm_s390_set_processor(kvm, attr); 1266658b6edaSMichael Mueller break; 126715c9705fSDavid Hildenbrand case KVM_S390_VM_CPU_PROCESSOR_FEAT: 126815c9705fSDavid Hildenbrand ret = kvm_s390_set_processor_feat(kvm, attr); 126915c9705fSDavid Hildenbrand break; 12700a763c78SDavid Hildenbrand case KVM_S390_VM_CPU_PROCESSOR_SUBFUNC: 12710a763c78SDavid Hildenbrand ret = kvm_s390_set_processor_subfunc(kvm, attr); 12720a763c78SDavid Hildenbrand break; 1273658b6edaSMichael Mueller } 1274658b6edaSMichael Mueller return ret; 1275658b6edaSMichael Mueller } 1276658b6edaSMichael Mueller 1277658b6edaSMichael Mueller static int kvm_s390_get_processor(struct kvm *kvm, struct kvm_device_attr *attr) 1278658b6edaSMichael Mueller { 1279658b6edaSMichael Mueller struct kvm_s390_vm_cpu_processor *proc; 1280658b6edaSMichael Mueller int ret = 0; 1281658b6edaSMichael Mueller 1282658b6edaSMichael Mueller proc = kzalloc(sizeof(*proc), GFP_KERNEL); 1283658b6edaSMichael Mueller if (!proc) { 1284658b6edaSMichael Mueller ret = -ENOMEM; 1285658b6edaSMichael Mueller goto out; 1286658b6edaSMichael Mueller } 12879bb0ec09SDavid Hildenbrand proc->cpuid = kvm->arch.model.cpuid; 1288658b6edaSMichael Mueller proc->ibc = kvm->arch.model.ibc; 1289c54f0d6aSDavid Hildenbrand memcpy(&proc->fac_list, kvm->arch.model.fac_list, 1290c54f0d6aSDavid Hildenbrand S390_ARCH_FAC_LIST_SIZE_BYTE); 1291a8c39dd7SChristian Borntraeger VM_EVENT(kvm, 3, "GET: guest ibc: 0x%4.4x, guest cpuid: 0x%16.16llx", 1292a8c39dd7SChristian Borntraeger kvm->arch.model.ibc, 1293a8c39dd7SChristian Borntraeger kvm->arch.model.cpuid); 1294a8c39dd7SChristian Borntraeger VM_EVENT(kvm, 3, "GET: guest faclist: 0x%16.16llx.%16.16llx.%16.16llx", 1295a8c39dd7SChristian Borntraeger kvm->arch.model.fac_list[0], 1296a8c39dd7SChristian Borntraeger kvm->arch.model.fac_list[1], 1297a8c39dd7SChristian Borntraeger kvm->arch.model.fac_list[2]); 1298658b6edaSMichael Mueller if (copy_to_user((void __user *)attr->addr, proc, sizeof(*proc))) 1299658b6edaSMichael Mueller ret = -EFAULT; 1300658b6edaSMichael Mueller kfree(proc); 1301658b6edaSMichael Mueller out: 1302658b6edaSMichael Mueller return ret; 1303658b6edaSMichael Mueller } 1304658b6edaSMichael Mueller 1305658b6edaSMichael Mueller static int kvm_s390_get_machine(struct kvm *kvm, struct kvm_device_attr *attr) 1306658b6edaSMichael Mueller { 1307658b6edaSMichael Mueller struct kvm_s390_vm_cpu_machine *mach; 1308658b6edaSMichael Mueller int ret = 0; 1309658b6edaSMichael Mueller 1310658b6edaSMichael Mueller mach = kzalloc(sizeof(*mach), GFP_KERNEL); 1311658b6edaSMichael Mueller if (!mach) { 1312658b6edaSMichael Mueller ret = -ENOMEM; 1313658b6edaSMichael Mueller goto out; 1314658b6edaSMichael Mueller } 1315658b6edaSMichael Mueller get_cpu_id((struct cpuid *) &mach->cpuid); 131637c5f6c8SDavid Hildenbrand mach->ibc = sclp.ibc; 1317c54f0d6aSDavid Hildenbrand memcpy(&mach->fac_mask, kvm->arch.model.fac_mask, 1318981467c9SMichael Mueller S390_ARCH_FAC_LIST_SIZE_BYTE); 1319658b6edaSMichael Mueller memcpy((unsigned long *)&mach->fac_list, S390_lowcore.stfle_fac_list, 132004478197SChristian Borntraeger sizeof(S390_lowcore.stfle_fac_list)); 1321a8c39dd7SChristian Borntraeger VM_EVENT(kvm, 3, "GET: host ibc: 0x%4.4x, host cpuid: 0x%16.16llx", 1322a8c39dd7SChristian Borntraeger kvm->arch.model.ibc, 1323a8c39dd7SChristian Borntraeger kvm->arch.model.cpuid); 1324a8c39dd7SChristian Borntraeger VM_EVENT(kvm, 3, "GET: host facmask: 0x%16.16llx.%16.16llx.%16.16llx", 1325a8c39dd7SChristian Borntraeger mach->fac_mask[0], 1326a8c39dd7SChristian Borntraeger mach->fac_mask[1], 1327a8c39dd7SChristian Borntraeger mach->fac_mask[2]); 1328a8c39dd7SChristian Borntraeger VM_EVENT(kvm, 3, "GET: host faclist: 0x%16.16llx.%16.16llx.%16.16llx", 1329a8c39dd7SChristian Borntraeger mach->fac_list[0], 1330a8c39dd7SChristian Borntraeger mach->fac_list[1], 1331a8c39dd7SChristian Borntraeger mach->fac_list[2]); 1332658b6edaSMichael Mueller if (copy_to_user((void __user *)attr->addr, mach, sizeof(*mach))) 1333658b6edaSMichael Mueller ret = -EFAULT; 1334658b6edaSMichael Mueller kfree(mach); 1335658b6edaSMichael Mueller out: 1336658b6edaSMichael Mueller return ret; 1337658b6edaSMichael Mueller } 1338658b6edaSMichael Mueller 133915c9705fSDavid Hildenbrand static int kvm_s390_get_processor_feat(struct kvm *kvm, 134015c9705fSDavid Hildenbrand struct kvm_device_attr *attr) 134115c9705fSDavid Hildenbrand { 134215c9705fSDavid Hildenbrand struct kvm_s390_vm_cpu_feat data; 134315c9705fSDavid Hildenbrand 134415c9705fSDavid Hildenbrand bitmap_copy((unsigned long *) data.feat, kvm->arch.cpu_feat, 134515c9705fSDavid Hildenbrand KVM_S390_VM_CPU_FEAT_NR_BITS); 134615c9705fSDavid Hildenbrand if (copy_to_user((void __user *)attr->addr, &data, sizeof(data))) 134715c9705fSDavid Hildenbrand return -EFAULT; 13482f8311c9SChristian Borntraeger VM_EVENT(kvm, 3, "GET: guest feat: 0x%16.16llx.0x%16.16llx.0x%16.16llx", 13492f8311c9SChristian Borntraeger data.feat[0], 13502f8311c9SChristian Borntraeger data.feat[1], 13512f8311c9SChristian Borntraeger data.feat[2]); 135215c9705fSDavid Hildenbrand return 0; 135315c9705fSDavid Hildenbrand } 135415c9705fSDavid Hildenbrand 135515c9705fSDavid Hildenbrand static int kvm_s390_get_machine_feat(struct kvm *kvm, 135615c9705fSDavid Hildenbrand struct kvm_device_attr *attr) 135715c9705fSDavid Hildenbrand { 135815c9705fSDavid Hildenbrand struct kvm_s390_vm_cpu_feat data; 135915c9705fSDavid Hildenbrand 136015c9705fSDavid Hildenbrand bitmap_copy((unsigned long *) data.feat, 136115c9705fSDavid Hildenbrand kvm_s390_available_cpu_feat, 136215c9705fSDavid Hildenbrand KVM_S390_VM_CPU_FEAT_NR_BITS); 136315c9705fSDavid Hildenbrand if (copy_to_user((void __user *)attr->addr, &data, sizeof(data))) 136415c9705fSDavid Hildenbrand return -EFAULT; 13652f8311c9SChristian Borntraeger VM_EVENT(kvm, 3, "GET: host feat: 0x%16.16llx.0x%16.16llx.0x%16.16llx", 13662f8311c9SChristian Borntraeger data.feat[0], 13672f8311c9SChristian Borntraeger data.feat[1], 13682f8311c9SChristian Borntraeger data.feat[2]); 136915c9705fSDavid Hildenbrand return 0; 137015c9705fSDavid Hildenbrand } 137115c9705fSDavid Hildenbrand 13720a763c78SDavid Hildenbrand static int kvm_s390_get_processor_subfunc(struct kvm *kvm, 13730a763c78SDavid Hildenbrand struct kvm_device_attr *attr) 13740a763c78SDavid Hildenbrand { 13750a763c78SDavid Hildenbrand /* 13760a763c78SDavid Hildenbrand * Once we can actually configure subfunctions (kernel + hw support), 13770a763c78SDavid Hildenbrand * we have to check if they were already set by user space, if so copy 13780a763c78SDavid Hildenbrand * them from kvm->arch. 13790a763c78SDavid Hildenbrand */ 13800a763c78SDavid Hildenbrand return -ENXIO; 13810a763c78SDavid Hildenbrand } 13820a763c78SDavid Hildenbrand 13830a763c78SDavid Hildenbrand static int kvm_s390_get_machine_subfunc(struct kvm *kvm, 13840a763c78SDavid Hildenbrand struct kvm_device_attr *attr) 13850a763c78SDavid Hildenbrand { 13860a763c78SDavid Hildenbrand if (copy_to_user((void __user *)attr->addr, &kvm_s390_available_subfunc, 13870a763c78SDavid Hildenbrand sizeof(struct kvm_s390_vm_cpu_subfunc))) 13880a763c78SDavid Hildenbrand return -EFAULT; 13890a763c78SDavid Hildenbrand return 0; 13900a763c78SDavid Hildenbrand } 1391658b6edaSMichael Mueller static int kvm_s390_get_cpu_model(struct kvm *kvm, struct kvm_device_attr *attr) 1392658b6edaSMichael Mueller { 1393658b6edaSMichael Mueller int ret = -ENXIO; 1394658b6edaSMichael Mueller 1395658b6edaSMichael Mueller switch (attr->attr) { 1396658b6edaSMichael Mueller case KVM_S390_VM_CPU_PROCESSOR: 1397658b6edaSMichael Mueller ret = kvm_s390_get_processor(kvm, attr); 1398658b6edaSMichael Mueller break; 1399658b6edaSMichael Mueller case KVM_S390_VM_CPU_MACHINE: 1400658b6edaSMichael Mueller ret = kvm_s390_get_machine(kvm, attr); 1401658b6edaSMichael Mueller break; 140215c9705fSDavid Hildenbrand case KVM_S390_VM_CPU_PROCESSOR_FEAT: 140315c9705fSDavid Hildenbrand ret = kvm_s390_get_processor_feat(kvm, attr); 140415c9705fSDavid Hildenbrand break; 140515c9705fSDavid Hildenbrand case KVM_S390_VM_CPU_MACHINE_FEAT: 140615c9705fSDavid Hildenbrand ret = kvm_s390_get_machine_feat(kvm, attr); 140715c9705fSDavid Hildenbrand break; 14080a763c78SDavid Hildenbrand case KVM_S390_VM_CPU_PROCESSOR_SUBFUNC: 14090a763c78SDavid Hildenbrand ret = kvm_s390_get_processor_subfunc(kvm, attr); 14100a763c78SDavid Hildenbrand break; 14110a763c78SDavid Hildenbrand case KVM_S390_VM_CPU_MACHINE_SUBFUNC: 14120a763c78SDavid Hildenbrand ret = kvm_s390_get_machine_subfunc(kvm, attr); 14130a763c78SDavid Hildenbrand break; 1414658b6edaSMichael Mueller } 1415658b6edaSMichael Mueller return ret; 1416658b6edaSMichael Mueller } 1417658b6edaSMichael Mueller 1418f2061656SDominik Dingel static int kvm_s390_vm_set_attr(struct kvm *kvm, struct kvm_device_attr *attr) 1419f2061656SDominik Dingel { 1420f2061656SDominik Dingel int ret; 1421f2061656SDominik Dingel 1422f2061656SDominik Dingel switch (attr->group) { 14234f718eabSDominik Dingel case KVM_S390_VM_MEM_CTRL: 14248c0a7ce6SDominik Dingel ret = kvm_s390_set_mem_control(kvm, attr); 14254f718eabSDominik Dingel break; 142672f25020SJason J. Herne case KVM_S390_VM_TOD: 142772f25020SJason J. Herne ret = kvm_s390_set_tod(kvm, attr); 142872f25020SJason J. Herne break; 1429658b6edaSMichael Mueller case KVM_S390_VM_CPU_MODEL: 1430658b6edaSMichael Mueller ret = kvm_s390_set_cpu_model(kvm, attr); 1431658b6edaSMichael Mueller break; 1432a374e892STony Krowiak case KVM_S390_VM_CRYPTO: 1433a374e892STony Krowiak ret = kvm_s390_vm_set_crypto(kvm, attr); 1434a374e892STony Krowiak break; 1435190df4a2SClaudio Imbrenda case KVM_S390_VM_MIGRATION: 1436190df4a2SClaudio Imbrenda ret = kvm_s390_vm_set_migration(kvm, attr); 1437190df4a2SClaudio Imbrenda break; 1438f2061656SDominik Dingel default: 1439f2061656SDominik Dingel ret = -ENXIO; 1440f2061656SDominik Dingel break; 1441f2061656SDominik Dingel } 1442f2061656SDominik Dingel 1443f2061656SDominik Dingel return ret; 1444f2061656SDominik Dingel } 1445f2061656SDominik Dingel 1446f2061656SDominik Dingel static int kvm_s390_vm_get_attr(struct kvm *kvm, struct kvm_device_attr *attr) 1447f2061656SDominik Dingel { 14488c0a7ce6SDominik Dingel int ret; 14498c0a7ce6SDominik Dingel 14508c0a7ce6SDominik Dingel switch (attr->group) { 14518c0a7ce6SDominik Dingel case KVM_S390_VM_MEM_CTRL: 14528c0a7ce6SDominik Dingel ret = kvm_s390_get_mem_control(kvm, attr); 14538c0a7ce6SDominik Dingel break; 145472f25020SJason J. Herne case KVM_S390_VM_TOD: 145572f25020SJason J. Herne ret = kvm_s390_get_tod(kvm, attr); 145672f25020SJason J. Herne break; 1457658b6edaSMichael Mueller case KVM_S390_VM_CPU_MODEL: 1458658b6edaSMichael Mueller ret = kvm_s390_get_cpu_model(kvm, attr); 1459658b6edaSMichael Mueller break; 1460190df4a2SClaudio Imbrenda case KVM_S390_VM_MIGRATION: 1461190df4a2SClaudio Imbrenda ret = kvm_s390_vm_get_migration(kvm, attr); 1462190df4a2SClaudio Imbrenda break; 14638c0a7ce6SDominik Dingel default: 14648c0a7ce6SDominik Dingel ret = -ENXIO; 14658c0a7ce6SDominik Dingel break; 14668c0a7ce6SDominik Dingel } 14678c0a7ce6SDominik Dingel 14688c0a7ce6SDominik Dingel return ret; 1469f2061656SDominik Dingel } 1470f2061656SDominik Dingel 1471f2061656SDominik Dingel static int kvm_s390_vm_has_attr(struct kvm *kvm, struct kvm_device_attr *attr) 1472f2061656SDominik Dingel { 1473f2061656SDominik Dingel int ret; 1474f2061656SDominik Dingel 1475f2061656SDominik Dingel switch (attr->group) { 14764f718eabSDominik Dingel case KVM_S390_VM_MEM_CTRL: 14774f718eabSDominik Dingel switch (attr->attr) { 14784f718eabSDominik Dingel case KVM_S390_VM_MEM_ENABLE_CMMA: 14794f718eabSDominik Dingel case KVM_S390_VM_MEM_CLR_CMMA: 1480f9cbd9b0SDavid Hildenbrand ret = sclp.has_cmma ? 0 : -ENXIO; 1481f9cbd9b0SDavid Hildenbrand break; 14828c0a7ce6SDominik Dingel case KVM_S390_VM_MEM_LIMIT_SIZE: 14834f718eabSDominik Dingel ret = 0; 14844f718eabSDominik Dingel break; 14854f718eabSDominik Dingel default: 14864f718eabSDominik Dingel ret = -ENXIO; 14874f718eabSDominik Dingel break; 14884f718eabSDominik Dingel } 14894f718eabSDominik Dingel break; 149072f25020SJason J. Herne case KVM_S390_VM_TOD: 149172f25020SJason J. Herne switch (attr->attr) { 149272f25020SJason J. Herne case KVM_S390_VM_TOD_LOW: 149372f25020SJason J. Herne case KVM_S390_VM_TOD_HIGH: 149472f25020SJason J. Herne ret = 0; 149572f25020SJason J. Herne break; 149672f25020SJason J. Herne default: 149772f25020SJason J. Herne ret = -ENXIO; 149872f25020SJason J. Herne break; 149972f25020SJason J. Herne } 150072f25020SJason J. Herne break; 1501658b6edaSMichael Mueller case KVM_S390_VM_CPU_MODEL: 1502658b6edaSMichael Mueller switch (attr->attr) { 1503658b6edaSMichael Mueller case KVM_S390_VM_CPU_PROCESSOR: 1504658b6edaSMichael Mueller case KVM_S390_VM_CPU_MACHINE: 150515c9705fSDavid Hildenbrand case KVM_S390_VM_CPU_PROCESSOR_FEAT: 150615c9705fSDavid Hildenbrand case KVM_S390_VM_CPU_MACHINE_FEAT: 15070a763c78SDavid Hildenbrand case KVM_S390_VM_CPU_MACHINE_SUBFUNC: 1508658b6edaSMichael Mueller ret = 0; 1509658b6edaSMichael Mueller break; 15100a763c78SDavid Hildenbrand /* configuring subfunctions is not supported yet */ 15110a763c78SDavid Hildenbrand case KVM_S390_VM_CPU_PROCESSOR_SUBFUNC: 1512658b6edaSMichael Mueller default: 1513658b6edaSMichael Mueller ret = -ENXIO; 1514658b6edaSMichael Mueller break; 1515658b6edaSMichael Mueller } 1516658b6edaSMichael Mueller break; 1517a374e892STony Krowiak case KVM_S390_VM_CRYPTO: 1518a374e892STony Krowiak switch (attr->attr) { 1519a374e892STony Krowiak case KVM_S390_VM_CRYPTO_ENABLE_AES_KW: 1520a374e892STony Krowiak case KVM_S390_VM_CRYPTO_ENABLE_DEA_KW: 1521a374e892STony Krowiak case KVM_S390_VM_CRYPTO_DISABLE_AES_KW: 1522a374e892STony Krowiak case KVM_S390_VM_CRYPTO_DISABLE_DEA_KW: 1523a374e892STony Krowiak ret = 0; 1524a374e892STony Krowiak break; 152537940fb0STony Krowiak case KVM_S390_VM_CRYPTO_ENABLE_APIE: 152637940fb0STony Krowiak case KVM_S390_VM_CRYPTO_DISABLE_APIE: 152737940fb0STony Krowiak ret = ap_instructions_available() ? 0 : -ENXIO; 152837940fb0STony Krowiak break; 1529a374e892STony Krowiak default: 1530a374e892STony Krowiak ret = -ENXIO; 1531a374e892STony Krowiak break; 1532a374e892STony Krowiak } 1533a374e892STony Krowiak break; 1534190df4a2SClaudio Imbrenda case KVM_S390_VM_MIGRATION: 1535190df4a2SClaudio Imbrenda ret = 0; 1536190df4a2SClaudio Imbrenda break; 1537f2061656SDominik Dingel default: 1538f2061656SDominik Dingel ret = -ENXIO; 1539f2061656SDominik Dingel break; 1540f2061656SDominik Dingel } 1541f2061656SDominik Dingel 1542f2061656SDominik Dingel return ret; 1543f2061656SDominik Dingel } 1544f2061656SDominik Dingel 154530ee2a98SJason J. Herne static long kvm_s390_get_skeys(struct kvm *kvm, struct kvm_s390_skeys *args) 154630ee2a98SJason J. Herne { 154730ee2a98SJason J. Herne uint8_t *keys; 154830ee2a98SJason J. Herne uint64_t hva; 15494f899147SChristian Borntraeger int srcu_idx, i, r = 0; 155030ee2a98SJason J. Herne 155130ee2a98SJason J. Herne if (args->flags != 0) 155230ee2a98SJason J. Herne return -EINVAL; 155330ee2a98SJason J. Herne 155430ee2a98SJason J. Herne /* Is this guest using storage keys? */ 155555531b74SJanosch Frank if (!mm_uses_skeys(current->mm)) 155630ee2a98SJason J. Herne return KVM_S390_GET_SKEYS_NONE; 155730ee2a98SJason J. Herne 155830ee2a98SJason J. Herne /* Enforce sane limit on memory allocation */ 155930ee2a98SJason J. Herne if (args->count < 1 || args->count > KVM_S390_SKEYS_MAX) 156030ee2a98SJason J. Herne return -EINVAL; 156130ee2a98SJason J. Herne 1562752ade68SMichal Hocko keys = kvmalloc_array(args->count, sizeof(uint8_t), GFP_KERNEL); 156330ee2a98SJason J. Herne if (!keys) 156430ee2a98SJason J. Herne return -ENOMEM; 156530ee2a98SJason J. Herne 1566d3ed1ceeSMartin Schwidefsky down_read(¤t->mm->mmap_sem); 15674f899147SChristian Borntraeger srcu_idx = srcu_read_lock(&kvm->srcu); 156830ee2a98SJason J. Herne for (i = 0; i < args->count; i++) { 156930ee2a98SJason J. Herne hva = gfn_to_hva(kvm, args->start_gfn + i); 157030ee2a98SJason J. Herne if (kvm_is_error_hva(hva)) { 157130ee2a98SJason J. Herne r = -EFAULT; 1572d3ed1ceeSMartin Schwidefsky break; 157330ee2a98SJason J. Herne } 157430ee2a98SJason J. Herne 1575154c8c19SDavid Hildenbrand r = get_guest_storage_key(current->mm, hva, &keys[i]); 1576154c8c19SDavid Hildenbrand if (r) 1577d3ed1ceeSMartin Schwidefsky break; 157830ee2a98SJason J. Herne } 15794f899147SChristian Borntraeger srcu_read_unlock(&kvm->srcu, srcu_idx); 1580d3ed1ceeSMartin Schwidefsky up_read(¤t->mm->mmap_sem); 158130ee2a98SJason J. Herne 1582d3ed1ceeSMartin Schwidefsky if (!r) { 158330ee2a98SJason J. Herne r = copy_to_user((uint8_t __user *)args->skeydata_addr, keys, 158430ee2a98SJason J. Herne sizeof(uint8_t) * args->count); 158530ee2a98SJason J. Herne if (r) 158630ee2a98SJason J. Herne r = -EFAULT; 1587d3ed1ceeSMartin Schwidefsky } 1588d3ed1ceeSMartin Schwidefsky 158930ee2a98SJason J. Herne kvfree(keys); 159030ee2a98SJason J. Herne return r; 159130ee2a98SJason J. Herne } 159230ee2a98SJason J. Herne 159330ee2a98SJason J. Herne static long kvm_s390_set_skeys(struct kvm *kvm, struct kvm_s390_skeys *args) 159430ee2a98SJason J. Herne { 159530ee2a98SJason J. Herne uint8_t *keys; 159630ee2a98SJason J. Herne uint64_t hva; 15974f899147SChristian Borntraeger int srcu_idx, i, r = 0; 1598bd096f64SJanosch Frank bool unlocked; 159930ee2a98SJason J. Herne 160030ee2a98SJason J. Herne if (args->flags != 0) 160130ee2a98SJason J. Herne return -EINVAL; 160230ee2a98SJason J. Herne 160330ee2a98SJason J. Herne /* Enforce sane limit on memory allocation */ 160430ee2a98SJason J. Herne if (args->count < 1 || args->count > KVM_S390_SKEYS_MAX) 160530ee2a98SJason J. Herne return -EINVAL; 160630ee2a98SJason J. Herne 1607752ade68SMichal Hocko keys = kvmalloc_array(args->count, sizeof(uint8_t), GFP_KERNEL); 160830ee2a98SJason J. Herne if (!keys) 160930ee2a98SJason J. Herne return -ENOMEM; 161030ee2a98SJason J. Herne 161130ee2a98SJason J. Herne r = copy_from_user(keys, (uint8_t __user *)args->skeydata_addr, 161230ee2a98SJason J. Herne sizeof(uint8_t) * args->count); 161330ee2a98SJason J. Herne if (r) { 161430ee2a98SJason J. Herne r = -EFAULT; 161530ee2a98SJason J. Herne goto out; 161630ee2a98SJason J. Herne } 161730ee2a98SJason J. Herne 161830ee2a98SJason J. Herne /* Enable storage key handling for the guest */ 161914d4a425SDominik Dingel r = s390_enable_skey(); 162014d4a425SDominik Dingel if (r) 162114d4a425SDominik Dingel goto out; 162230ee2a98SJason J. Herne 1623bd096f64SJanosch Frank i = 0; 1624d3ed1ceeSMartin Schwidefsky down_read(¤t->mm->mmap_sem); 16254f899147SChristian Borntraeger srcu_idx = srcu_read_lock(&kvm->srcu); 1626bd096f64SJanosch Frank while (i < args->count) { 1627bd096f64SJanosch Frank unlocked = false; 162830ee2a98SJason J. Herne hva = gfn_to_hva(kvm, args->start_gfn + i); 162930ee2a98SJason J. Herne if (kvm_is_error_hva(hva)) { 163030ee2a98SJason J. Herne r = -EFAULT; 1631d3ed1ceeSMartin Schwidefsky break; 163230ee2a98SJason J. Herne } 163330ee2a98SJason J. Herne 163430ee2a98SJason J. Herne /* Lowest order bit is reserved */ 163530ee2a98SJason J. Herne if (keys[i] & 0x01) { 163630ee2a98SJason J. Herne r = -EINVAL; 1637d3ed1ceeSMartin Schwidefsky break; 163830ee2a98SJason J. Herne } 163930ee2a98SJason J. Herne 1640fe69eabfSDavid Hildenbrand r = set_guest_storage_key(current->mm, hva, keys[i], 0); 1641bd096f64SJanosch Frank if (r) { 1642bd096f64SJanosch Frank r = fixup_user_fault(current, current->mm, hva, 1643bd096f64SJanosch Frank FAULT_FLAG_WRITE, &unlocked); 164430ee2a98SJason J. Herne if (r) 1645d3ed1ceeSMartin Schwidefsky break; 164630ee2a98SJason J. Herne } 1647bd096f64SJanosch Frank if (!r) 1648bd096f64SJanosch Frank i++; 1649bd096f64SJanosch Frank } 16504f899147SChristian Borntraeger srcu_read_unlock(&kvm->srcu, srcu_idx); 1651d3ed1ceeSMartin Schwidefsky up_read(¤t->mm->mmap_sem); 165230ee2a98SJason J. Herne out: 165330ee2a98SJason J. Herne kvfree(keys); 165430ee2a98SJason J. Herne return r; 165530ee2a98SJason J. Herne } 165630ee2a98SJason J. Herne 16574036e387SClaudio Imbrenda /* 16584036e387SClaudio Imbrenda * Base address and length must be sent at the start of each block, therefore 16594036e387SClaudio Imbrenda * it's cheaper to send some clean data, as long as it's less than the size of 16604036e387SClaudio Imbrenda * two longs. 16614036e387SClaudio Imbrenda */ 16624036e387SClaudio Imbrenda #define KVM_S390_MAX_BIT_DISTANCE (2 * sizeof(void *)) 16634036e387SClaudio Imbrenda /* for consistency */ 16644036e387SClaudio Imbrenda #define KVM_S390_CMMA_SIZE_MAX ((u32)KVM_S390_SKEYS_MAX) 16654036e387SClaudio Imbrenda 16664036e387SClaudio Imbrenda /* 1667afdad616SClaudio Imbrenda * Similar to gfn_to_memslot, but returns the index of a memslot also when the 1668afdad616SClaudio Imbrenda * address falls in a hole. In that case the index of one of the memslots 1669afdad616SClaudio Imbrenda * bordering the hole is returned. 1670afdad616SClaudio Imbrenda */ 1671afdad616SClaudio Imbrenda static int gfn_to_memslot_approx(struct kvm_memslots *slots, gfn_t gfn) 1672afdad616SClaudio Imbrenda { 1673afdad616SClaudio Imbrenda int start = 0, end = slots->used_slots; 1674afdad616SClaudio Imbrenda int slot = atomic_read(&slots->lru_slot); 1675afdad616SClaudio Imbrenda struct kvm_memory_slot *memslots = slots->memslots; 1676afdad616SClaudio Imbrenda 1677afdad616SClaudio Imbrenda if (gfn >= memslots[slot].base_gfn && 1678afdad616SClaudio Imbrenda gfn < memslots[slot].base_gfn + memslots[slot].npages) 1679afdad616SClaudio Imbrenda return slot; 1680afdad616SClaudio Imbrenda 1681afdad616SClaudio Imbrenda while (start < end) { 1682afdad616SClaudio Imbrenda slot = start + (end - start) / 2; 1683afdad616SClaudio Imbrenda 1684afdad616SClaudio Imbrenda if (gfn >= memslots[slot].base_gfn) 1685afdad616SClaudio Imbrenda end = slot; 1686afdad616SClaudio Imbrenda else 1687afdad616SClaudio Imbrenda start = slot + 1; 1688afdad616SClaudio Imbrenda } 1689afdad616SClaudio Imbrenda 1690afdad616SClaudio Imbrenda if (gfn >= memslots[start].base_gfn && 1691afdad616SClaudio Imbrenda gfn < memslots[start].base_gfn + memslots[start].npages) { 1692afdad616SClaudio Imbrenda atomic_set(&slots->lru_slot, start); 1693afdad616SClaudio Imbrenda } 1694afdad616SClaudio Imbrenda 1695afdad616SClaudio Imbrenda return start; 1696afdad616SClaudio Imbrenda } 1697afdad616SClaudio Imbrenda 1698afdad616SClaudio Imbrenda static int kvm_s390_peek_cmma(struct kvm *kvm, struct kvm_s390_cmma_log *args, 1699afdad616SClaudio Imbrenda u8 *res, unsigned long bufsize) 1700afdad616SClaudio Imbrenda { 1701afdad616SClaudio Imbrenda unsigned long pgstev, hva, cur_gfn = args->start_gfn; 1702afdad616SClaudio Imbrenda 1703afdad616SClaudio Imbrenda args->count = 0; 1704afdad616SClaudio Imbrenda while (args->count < bufsize) { 1705afdad616SClaudio Imbrenda hva = gfn_to_hva(kvm, cur_gfn); 1706afdad616SClaudio Imbrenda /* 1707afdad616SClaudio Imbrenda * We return an error if the first value was invalid, but we 1708afdad616SClaudio Imbrenda * return successfully if at least one value was copied. 1709afdad616SClaudio Imbrenda */ 1710afdad616SClaudio Imbrenda if (kvm_is_error_hva(hva)) 1711afdad616SClaudio Imbrenda return args->count ? 0 : -EFAULT; 1712afdad616SClaudio Imbrenda if (get_pgste(kvm->mm, hva, &pgstev) < 0) 1713afdad616SClaudio Imbrenda pgstev = 0; 1714afdad616SClaudio Imbrenda res[args->count++] = (pgstev >> 24) & 0x43; 1715afdad616SClaudio Imbrenda cur_gfn++; 1716afdad616SClaudio Imbrenda } 1717afdad616SClaudio Imbrenda 1718afdad616SClaudio Imbrenda return 0; 1719afdad616SClaudio Imbrenda } 1720afdad616SClaudio Imbrenda 1721afdad616SClaudio Imbrenda static unsigned long kvm_s390_next_dirty_cmma(struct kvm_memslots *slots, 1722afdad616SClaudio Imbrenda unsigned long cur_gfn) 1723afdad616SClaudio Imbrenda { 1724afdad616SClaudio Imbrenda int slotidx = gfn_to_memslot_approx(slots, cur_gfn); 1725afdad616SClaudio Imbrenda struct kvm_memory_slot *ms = slots->memslots + slotidx; 1726afdad616SClaudio Imbrenda unsigned long ofs = cur_gfn - ms->base_gfn; 1727afdad616SClaudio Imbrenda 1728afdad616SClaudio Imbrenda if (ms->base_gfn + ms->npages <= cur_gfn) { 1729afdad616SClaudio Imbrenda slotidx--; 1730afdad616SClaudio Imbrenda /* If we are above the highest slot, wrap around */ 1731afdad616SClaudio Imbrenda if (slotidx < 0) 1732afdad616SClaudio Imbrenda slotidx = slots->used_slots - 1; 1733afdad616SClaudio Imbrenda 1734afdad616SClaudio Imbrenda ms = slots->memslots + slotidx; 1735afdad616SClaudio Imbrenda ofs = 0; 1736afdad616SClaudio Imbrenda } 1737afdad616SClaudio Imbrenda ofs = find_next_bit(kvm_second_dirty_bitmap(ms), ms->npages, ofs); 1738afdad616SClaudio Imbrenda while ((slotidx > 0) && (ofs >= ms->npages)) { 1739afdad616SClaudio Imbrenda slotidx--; 1740afdad616SClaudio Imbrenda ms = slots->memslots + slotidx; 1741afdad616SClaudio Imbrenda ofs = find_next_bit(kvm_second_dirty_bitmap(ms), ms->npages, 0); 1742afdad616SClaudio Imbrenda } 1743afdad616SClaudio Imbrenda return ms->base_gfn + ofs; 1744afdad616SClaudio Imbrenda } 1745afdad616SClaudio Imbrenda 1746afdad616SClaudio Imbrenda static int kvm_s390_get_cmma(struct kvm *kvm, struct kvm_s390_cmma_log *args, 1747afdad616SClaudio Imbrenda u8 *res, unsigned long bufsize) 1748afdad616SClaudio Imbrenda { 1749afdad616SClaudio Imbrenda unsigned long mem_end, cur_gfn, next_gfn, hva, pgstev; 1750afdad616SClaudio Imbrenda struct kvm_memslots *slots = kvm_memslots(kvm); 1751afdad616SClaudio Imbrenda struct kvm_memory_slot *ms; 1752afdad616SClaudio Imbrenda 1753afdad616SClaudio Imbrenda cur_gfn = kvm_s390_next_dirty_cmma(slots, args->start_gfn); 1754afdad616SClaudio Imbrenda ms = gfn_to_memslot(kvm, cur_gfn); 1755afdad616SClaudio Imbrenda args->count = 0; 1756afdad616SClaudio Imbrenda args->start_gfn = cur_gfn; 1757afdad616SClaudio Imbrenda if (!ms) 1758afdad616SClaudio Imbrenda return 0; 1759afdad616SClaudio Imbrenda next_gfn = kvm_s390_next_dirty_cmma(slots, cur_gfn + 1); 1760afdad616SClaudio Imbrenda mem_end = slots->memslots[0].base_gfn + slots->memslots[0].npages; 1761afdad616SClaudio Imbrenda 1762afdad616SClaudio Imbrenda while (args->count < bufsize) { 1763afdad616SClaudio Imbrenda hva = gfn_to_hva(kvm, cur_gfn); 1764afdad616SClaudio Imbrenda if (kvm_is_error_hva(hva)) 1765afdad616SClaudio Imbrenda return 0; 1766afdad616SClaudio Imbrenda /* Decrement only if we actually flipped the bit to 0 */ 1767afdad616SClaudio Imbrenda if (test_and_clear_bit(cur_gfn - ms->base_gfn, kvm_second_dirty_bitmap(ms))) 1768afdad616SClaudio Imbrenda atomic64_dec(&kvm->arch.cmma_dirty_pages); 1769afdad616SClaudio Imbrenda if (get_pgste(kvm->mm, hva, &pgstev) < 0) 1770afdad616SClaudio Imbrenda pgstev = 0; 1771afdad616SClaudio Imbrenda /* Save the value */ 1772afdad616SClaudio Imbrenda res[args->count++] = (pgstev >> 24) & 0x43; 1773afdad616SClaudio Imbrenda /* If the next bit is too far away, stop. */ 1774afdad616SClaudio Imbrenda if (next_gfn > cur_gfn + KVM_S390_MAX_BIT_DISTANCE) 1775afdad616SClaudio Imbrenda return 0; 1776afdad616SClaudio Imbrenda /* If we reached the previous "next", find the next one */ 1777afdad616SClaudio Imbrenda if (cur_gfn == next_gfn) 1778afdad616SClaudio Imbrenda next_gfn = kvm_s390_next_dirty_cmma(slots, cur_gfn + 1); 1779afdad616SClaudio Imbrenda /* Reached the end of memory or of the buffer, stop */ 1780afdad616SClaudio Imbrenda if ((next_gfn >= mem_end) || 1781afdad616SClaudio Imbrenda (next_gfn - args->start_gfn >= bufsize)) 1782afdad616SClaudio Imbrenda return 0; 1783afdad616SClaudio Imbrenda cur_gfn++; 1784afdad616SClaudio Imbrenda /* Reached the end of the current memslot, take the next one. */ 1785afdad616SClaudio Imbrenda if (cur_gfn - ms->base_gfn >= ms->npages) { 1786afdad616SClaudio Imbrenda ms = gfn_to_memslot(kvm, cur_gfn); 1787afdad616SClaudio Imbrenda if (!ms) 1788afdad616SClaudio Imbrenda return 0; 1789afdad616SClaudio Imbrenda } 1790afdad616SClaudio Imbrenda } 1791afdad616SClaudio Imbrenda return 0; 1792afdad616SClaudio Imbrenda } 1793afdad616SClaudio Imbrenda 1794afdad616SClaudio Imbrenda /* 17954036e387SClaudio Imbrenda * This function searches for the next page with dirty CMMA attributes, and 17964036e387SClaudio Imbrenda * saves the attributes in the buffer up to either the end of the buffer or 17974036e387SClaudio Imbrenda * until a block of at least KVM_S390_MAX_BIT_DISTANCE clean bits is found; 17984036e387SClaudio Imbrenda * no trailing clean bytes are saved. 17994036e387SClaudio Imbrenda * In case no dirty bits were found, or if CMMA was not enabled or used, the 18004036e387SClaudio Imbrenda * output buffer will indicate 0 as length. 18014036e387SClaudio Imbrenda */ 18024036e387SClaudio Imbrenda static int kvm_s390_get_cmma_bits(struct kvm *kvm, 18034036e387SClaudio Imbrenda struct kvm_s390_cmma_log *args) 18044036e387SClaudio Imbrenda { 1805afdad616SClaudio Imbrenda unsigned long bufsize; 1806afdad616SClaudio Imbrenda int srcu_idx, peek, ret; 1807afdad616SClaudio Imbrenda u8 *values; 18084036e387SClaudio Imbrenda 1809afdad616SClaudio Imbrenda if (!kvm->arch.use_cmma) 18104036e387SClaudio Imbrenda return -ENXIO; 18114036e387SClaudio Imbrenda /* Invalid/unsupported flags were specified */ 18124036e387SClaudio Imbrenda if (args->flags & ~KVM_S390_CMMA_PEEK) 18134036e387SClaudio Imbrenda return -EINVAL; 18144036e387SClaudio Imbrenda /* Migration mode query, and we are not doing a migration */ 18154036e387SClaudio Imbrenda peek = !!(args->flags & KVM_S390_CMMA_PEEK); 1816afdad616SClaudio Imbrenda if (!peek && !kvm->arch.migration_mode) 18174036e387SClaudio Imbrenda return -EINVAL; 18184036e387SClaudio Imbrenda /* CMMA is disabled or was not used, or the buffer has length zero */ 18194036e387SClaudio Imbrenda bufsize = min(args->count, KVM_S390_CMMA_SIZE_MAX); 1820c9f0a2b8SJanosch Frank if (!bufsize || !kvm->mm->context.uses_cmm) { 18214036e387SClaudio Imbrenda memset(args, 0, sizeof(*args)); 18224036e387SClaudio Imbrenda return 0; 18234036e387SClaudio Imbrenda } 18244036e387SClaudio Imbrenda /* We are not peeking, and there are no dirty pages */ 1825afdad616SClaudio Imbrenda if (!peek && !atomic64_read(&kvm->arch.cmma_dirty_pages)) { 18264036e387SClaudio Imbrenda memset(args, 0, sizeof(*args)); 18274036e387SClaudio Imbrenda return 0; 18284036e387SClaudio Imbrenda } 18294036e387SClaudio Imbrenda 1830afdad616SClaudio Imbrenda values = vmalloc(bufsize); 1831afdad616SClaudio Imbrenda if (!values) 18324036e387SClaudio Imbrenda return -ENOMEM; 18334036e387SClaudio Imbrenda 18344036e387SClaudio Imbrenda down_read(&kvm->mm->mmap_sem); 18354036e387SClaudio Imbrenda srcu_idx = srcu_read_lock(&kvm->srcu); 1836afdad616SClaudio Imbrenda if (peek) 1837afdad616SClaudio Imbrenda ret = kvm_s390_peek_cmma(kvm, args, values, bufsize); 1838afdad616SClaudio Imbrenda else 1839afdad616SClaudio Imbrenda ret = kvm_s390_get_cmma(kvm, args, values, bufsize); 18404036e387SClaudio Imbrenda srcu_read_unlock(&kvm->srcu, srcu_idx); 18414036e387SClaudio Imbrenda up_read(&kvm->mm->mmap_sem); 18424036e387SClaudio Imbrenda 1843afdad616SClaudio Imbrenda if (kvm->arch.migration_mode) 1844afdad616SClaudio Imbrenda args->remaining = atomic64_read(&kvm->arch.cmma_dirty_pages); 1845afdad616SClaudio Imbrenda else 1846afdad616SClaudio Imbrenda args->remaining = 0; 18474036e387SClaudio Imbrenda 1848afdad616SClaudio Imbrenda if (copy_to_user((void __user *)args->values, values, args->count)) 1849afdad616SClaudio Imbrenda ret = -EFAULT; 1850afdad616SClaudio Imbrenda 1851afdad616SClaudio Imbrenda vfree(values); 1852afdad616SClaudio Imbrenda return ret; 18534036e387SClaudio Imbrenda } 18544036e387SClaudio Imbrenda 18554036e387SClaudio Imbrenda /* 18564036e387SClaudio Imbrenda * This function sets the CMMA attributes for the given pages. If the input 18574036e387SClaudio Imbrenda * buffer has zero length, no action is taken, otherwise the attributes are 1858c9f0a2b8SJanosch Frank * set and the mm->context.uses_cmm flag is set. 18594036e387SClaudio Imbrenda */ 18604036e387SClaudio Imbrenda static int kvm_s390_set_cmma_bits(struct kvm *kvm, 18614036e387SClaudio Imbrenda const struct kvm_s390_cmma_log *args) 18624036e387SClaudio Imbrenda { 18634036e387SClaudio Imbrenda unsigned long hva, mask, pgstev, i; 18644036e387SClaudio Imbrenda uint8_t *bits; 18654036e387SClaudio Imbrenda int srcu_idx, r = 0; 18664036e387SClaudio Imbrenda 18674036e387SClaudio Imbrenda mask = args->mask; 18684036e387SClaudio Imbrenda 18694036e387SClaudio Imbrenda if (!kvm->arch.use_cmma) 18704036e387SClaudio Imbrenda return -ENXIO; 18714036e387SClaudio Imbrenda /* invalid/unsupported flags */ 18724036e387SClaudio Imbrenda if (args->flags != 0) 18734036e387SClaudio Imbrenda return -EINVAL; 18744036e387SClaudio Imbrenda /* Enforce sane limit on memory allocation */ 18754036e387SClaudio Imbrenda if (args->count > KVM_S390_CMMA_SIZE_MAX) 18764036e387SClaudio Imbrenda return -EINVAL; 18774036e387SClaudio Imbrenda /* Nothing to do */ 18784036e387SClaudio Imbrenda if (args->count == 0) 18794036e387SClaudio Imbrenda return 0; 18804036e387SClaudio Imbrenda 188142bc47b3SKees Cook bits = vmalloc(array_size(sizeof(*bits), args->count)); 18824036e387SClaudio Imbrenda if (!bits) 18834036e387SClaudio Imbrenda return -ENOMEM; 18844036e387SClaudio Imbrenda 18854036e387SClaudio Imbrenda r = copy_from_user(bits, (void __user *)args->values, args->count); 18864036e387SClaudio Imbrenda if (r) { 18874036e387SClaudio Imbrenda r = -EFAULT; 18884036e387SClaudio Imbrenda goto out; 18894036e387SClaudio Imbrenda } 18904036e387SClaudio Imbrenda 18914036e387SClaudio Imbrenda down_read(&kvm->mm->mmap_sem); 18924036e387SClaudio Imbrenda srcu_idx = srcu_read_lock(&kvm->srcu); 18934036e387SClaudio Imbrenda for (i = 0; i < args->count; i++) { 18944036e387SClaudio Imbrenda hva = gfn_to_hva(kvm, args->start_gfn + i); 18954036e387SClaudio Imbrenda if (kvm_is_error_hva(hva)) { 18964036e387SClaudio Imbrenda r = -EFAULT; 18974036e387SClaudio Imbrenda break; 18984036e387SClaudio Imbrenda } 18994036e387SClaudio Imbrenda 19004036e387SClaudio Imbrenda pgstev = bits[i]; 19014036e387SClaudio Imbrenda pgstev = pgstev << 24; 19021bab1c02SClaudio Imbrenda mask &= _PGSTE_GPS_USAGE_MASK | _PGSTE_GPS_NODAT; 19034036e387SClaudio Imbrenda set_pgste_bits(kvm->mm, hva, mask, pgstev); 19044036e387SClaudio Imbrenda } 19054036e387SClaudio Imbrenda srcu_read_unlock(&kvm->srcu, srcu_idx); 19064036e387SClaudio Imbrenda up_read(&kvm->mm->mmap_sem); 19074036e387SClaudio Imbrenda 1908c9f0a2b8SJanosch Frank if (!kvm->mm->context.uses_cmm) { 19094036e387SClaudio Imbrenda down_write(&kvm->mm->mmap_sem); 1910c9f0a2b8SJanosch Frank kvm->mm->context.uses_cmm = 1; 19114036e387SClaudio Imbrenda up_write(&kvm->mm->mmap_sem); 19124036e387SClaudio Imbrenda } 19134036e387SClaudio Imbrenda out: 19144036e387SClaudio Imbrenda vfree(bits); 19154036e387SClaudio Imbrenda return r; 19164036e387SClaudio Imbrenda } 19174036e387SClaudio Imbrenda 1918b0c632dbSHeiko Carstens long kvm_arch_vm_ioctl(struct file *filp, 1919b0c632dbSHeiko Carstens unsigned int ioctl, unsigned long arg) 1920b0c632dbSHeiko Carstens { 1921b0c632dbSHeiko Carstens struct kvm *kvm = filp->private_data; 1922b0c632dbSHeiko Carstens void __user *argp = (void __user *)arg; 1923f2061656SDominik Dingel struct kvm_device_attr attr; 1924b0c632dbSHeiko Carstens int r; 1925b0c632dbSHeiko Carstens 1926b0c632dbSHeiko Carstens switch (ioctl) { 1927ba5c1e9bSCarsten Otte case KVM_S390_INTERRUPT: { 1928ba5c1e9bSCarsten Otte struct kvm_s390_interrupt s390int; 1929ba5c1e9bSCarsten Otte 1930ba5c1e9bSCarsten Otte r = -EFAULT; 1931ba5c1e9bSCarsten Otte if (copy_from_user(&s390int, argp, sizeof(s390int))) 1932ba5c1e9bSCarsten Otte break; 1933ba5c1e9bSCarsten Otte r = kvm_s390_inject_vm(kvm, &s390int); 1934ba5c1e9bSCarsten Otte break; 1935ba5c1e9bSCarsten Otte } 1936d938dc55SCornelia Huck case KVM_ENABLE_CAP: { 1937d938dc55SCornelia Huck struct kvm_enable_cap cap; 1938d938dc55SCornelia Huck r = -EFAULT; 1939d938dc55SCornelia Huck if (copy_from_user(&cap, argp, sizeof(cap))) 1940d938dc55SCornelia Huck break; 1941d938dc55SCornelia Huck r = kvm_vm_ioctl_enable_cap(kvm, &cap); 1942d938dc55SCornelia Huck break; 1943d938dc55SCornelia Huck } 194484223598SCornelia Huck case KVM_CREATE_IRQCHIP: { 194584223598SCornelia Huck struct kvm_irq_routing_entry routing; 194684223598SCornelia Huck 194784223598SCornelia Huck r = -EINVAL; 194884223598SCornelia Huck if (kvm->arch.use_irqchip) { 194984223598SCornelia Huck /* Set up dummy routing. */ 195084223598SCornelia Huck memset(&routing, 0, sizeof(routing)); 1951152b2839SNicholas Krause r = kvm_set_irq_routing(kvm, &routing, 0, 0); 195284223598SCornelia Huck } 195384223598SCornelia Huck break; 195484223598SCornelia Huck } 1955f2061656SDominik Dingel case KVM_SET_DEVICE_ATTR: { 1956f2061656SDominik Dingel r = -EFAULT; 1957f2061656SDominik Dingel if (copy_from_user(&attr, (void __user *)arg, sizeof(attr))) 1958f2061656SDominik Dingel break; 1959f2061656SDominik Dingel r = kvm_s390_vm_set_attr(kvm, &attr); 1960f2061656SDominik Dingel break; 1961f2061656SDominik Dingel } 1962f2061656SDominik Dingel case KVM_GET_DEVICE_ATTR: { 1963f2061656SDominik Dingel r = -EFAULT; 1964f2061656SDominik Dingel if (copy_from_user(&attr, (void __user *)arg, sizeof(attr))) 1965f2061656SDominik Dingel break; 1966f2061656SDominik Dingel r = kvm_s390_vm_get_attr(kvm, &attr); 1967f2061656SDominik Dingel break; 1968f2061656SDominik Dingel } 1969f2061656SDominik Dingel case KVM_HAS_DEVICE_ATTR: { 1970f2061656SDominik Dingel r = -EFAULT; 1971f2061656SDominik Dingel if (copy_from_user(&attr, (void __user *)arg, sizeof(attr))) 1972f2061656SDominik Dingel break; 1973f2061656SDominik Dingel r = kvm_s390_vm_has_attr(kvm, &attr); 1974f2061656SDominik Dingel break; 1975f2061656SDominik Dingel } 197630ee2a98SJason J. Herne case KVM_S390_GET_SKEYS: { 197730ee2a98SJason J. Herne struct kvm_s390_skeys args; 197830ee2a98SJason J. Herne 197930ee2a98SJason J. Herne r = -EFAULT; 198030ee2a98SJason J. Herne if (copy_from_user(&args, argp, 198130ee2a98SJason J. Herne sizeof(struct kvm_s390_skeys))) 198230ee2a98SJason J. Herne break; 198330ee2a98SJason J. Herne r = kvm_s390_get_skeys(kvm, &args); 198430ee2a98SJason J. Herne break; 198530ee2a98SJason J. Herne } 198630ee2a98SJason J. Herne case KVM_S390_SET_SKEYS: { 198730ee2a98SJason J. Herne struct kvm_s390_skeys args; 198830ee2a98SJason J. Herne 198930ee2a98SJason J. Herne r = -EFAULT; 199030ee2a98SJason J. Herne if (copy_from_user(&args, argp, 199130ee2a98SJason J. Herne sizeof(struct kvm_s390_skeys))) 199230ee2a98SJason J. Herne break; 199330ee2a98SJason J. Herne r = kvm_s390_set_skeys(kvm, &args); 199430ee2a98SJason J. Herne break; 199530ee2a98SJason J. Herne } 19964036e387SClaudio Imbrenda case KVM_S390_GET_CMMA_BITS: { 19974036e387SClaudio Imbrenda struct kvm_s390_cmma_log args; 19984036e387SClaudio Imbrenda 19994036e387SClaudio Imbrenda r = -EFAULT; 20004036e387SClaudio Imbrenda if (copy_from_user(&args, argp, sizeof(args))) 20014036e387SClaudio Imbrenda break; 20021de1ea7eSChristian Borntraeger mutex_lock(&kvm->slots_lock); 20034036e387SClaudio Imbrenda r = kvm_s390_get_cmma_bits(kvm, &args); 20041de1ea7eSChristian Borntraeger mutex_unlock(&kvm->slots_lock); 20054036e387SClaudio Imbrenda if (!r) { 20064036e387SClaudio Imbrenda r = copy_to_user(argp, &args, sizeof(args)); 20074036e387SClaudio Imbrenda if (r) 20084036e387SClaudio Imbrenda r = -EFAULT; 20094036e387SClaudio Imbrenda } 20104036e387SClaudio Imbrenda break; 20114036e387SClaudio Imbrenda } 20124036e387SClaudio Imbrenda case KVM_S390_SET_CMMA_BITS: { 20134036e387SClaudio Imbrenda struct kvm_s390_cmma_log args; 20144036e387SClaudio Imbrenda 20154036e387SClaudio Imbrenda r = -EFAULT; 20164036e387SClaudio Imbrenda if (copy_from_user(&args, argp, sizeof(args))) 20174036e387SClaudio Imbrenda break; 20181de1ea7eSChristian Borntraeger mutex_lock(&kvm->slots_lock); 20194036e387SClaudio Imbrenda r = kvm_s390_set_cmma_bits(kvm, &args); 20201de1ea7eSChristian Borntraeger mutex_unlock(&kvm->slots_lock); 20214036e387SClaudio Imbrenda break; 20224036e387SClaudio Imbrenda } 2023b0c632dbSHeiko Carstens default: 2024367e1319SAvi Kivity r = -ENOTTY; 2025b0c632dbSHeiko Carstens } 2026b0c632dbSHeiko Carstens 2027b0c632dbSHeiko Carstens return r; 2028b0c632dbSHeiko Carstens } 2029b0c632dbSHeiko Carstens 203045c9b47cSTony Krowiak static int kvm_s390_apxa_installed(void) 203145c9b47cSTony Krowiak { 2032e585b24aSTony Krowiak struct ap_config_info info; 203345c9b47cSTony Krowiak 2034e585b24aSTony Krowiak if (ap_instructions_available()) { 2035e585b24aSTony Krowiak if (ap_qci(&info) == 0) 2036e585b24aSTony Krowiak return info.apxa; 203745c9b47cSTony Krowiak } 203845c9b47cSTony Krowiak 203945c9b47cSTony Krowiak return 0; 204045c9b47cSTony Krowiak } 204145c9b47cSTony Krowiak 2042e585b24aSTony Krowiak /* 2043e585b24aSTony Krowiak * The format of the crypto control block (CRYCB) is specified in the 3 low 2044e585b24aSTony Krowiak * order bits of the CRYCB designation (CRYCBD) field as follows: 2045e585b24aSTony Krowiak * Format 0: Neither the message security assist extension 3 (MSAX3) nor the 2046e585b24aSTony Krowiak * AP extended addressing (APXA) facility are installed. 2047e585b24aSTony Krowiak * Format 1: The APXA facility is not installed but the MSAX3 facility is. 2048e585b24aSTony Krowiak * Format 2: Both the APXA and MSAX3 facilities are installed 2049e585b24aSTony Krowiak */ 205045c9b47cSTony Krowiak static void kvm_s390_set_crycb_format(struct kvm *kvm) 205145c9b47cSTony Krowiak { 205245c9b47cSTony Krowiak kvm->arch.crypto.crycbd = (__u32)(unsigned long) kvm->arch.crypto.crycb; 205345c9b47cSTony Krowiak 2054e585b24aSTony Krowiak /* Clear the CRYCB format bits - i.e., set format 0 by default */ 2055e585b24aSTony Krowiak kvm->arch.crypto.crycbd &= ~(CRYCB_FORMAT_MASK); 2056e585b24aSTony Krowiak 2057e585b24aSTony Krowiak /* Check whether MSAX3 is installed */ 2058e585b24aSTony Krowiak if (!test_kvm_facility(kvm, 76)) 2059e585b24aSTony Krowiak return; 2060e585b24aSTony Krowiak 206145c9b47cSTony Krowiak if (kvm_s390_apxa_installed()) 206245c9b47cSTony Krowiak kvm->arch.crypto.crycbd |= CRYCB_FORMAT2; 206345c9b47cSTony Krowiak else 206445c9b47cSTony Krowiak kvm->arch.crypto.crycbd |= CRYCB_FORMAT1; 206545c9b47cSTony Krowiak } 206645c9b47cSTony Krowiak 206742104598STony Krowiak void kvm_arch_crypto_clear_masks(struct kvm *kvm) 206842104598STony Krowiak { 206942104598STony Krowiak mutex_lock(&kvm->lock); 207042104598STony Krowiak kvm_s390_vcpu_block_all(kvm); 207142104598STony Krowiak 207242104598STony Krowiak memset(&kvm->arch.crypto.crycb->apcb0, 0, 207342104598STony Krowiak sizeof(kvm->arch.crypto.crycb->apcb0)); 207442104598STony Krowiak memset(&kvm->arch.crypto.crycb->apcb1, 0, 207542104598STony Krowiak sizeof(kvm->arch.crypto.crycb->apcb1)); 207642104598STony Krowiak 20776cc571b1SPierre Morel /* recreate the shadow crycb for each vcpu */ 20786cc571b1SPierre Morel kvm_s390_sync_request_broadcast(kvm, KVM_REQ_VSIE_RESTART); 207942104598STony Krowiak kvm_s390_vcpu_unblock_all(kvm); 208042104598STony Krowiak mutex_unlock(&kvm->lock); 208142104598STony Krowiak } 208242104598STony Krowiak EXPORT_SYMBOL_GPL(kvm_arch_crypto_clear_masks); 208342104598STony Krowiak 20849bb0ec09SDavid Hildenbrand static u64 kvm_s390_get_initial_cpuid(void) 20859d8d5786SMichael Mueller { 20869bb0ec09SDavid Hildenbrand struct cpuid cpuid; 20879bb0ec09SDavid Hildenbrand 20889bb0ec09SDavid Hildenbrand get_cpu_id(&cpuid); 20899bb0ec09SDavid Hildenbrand cpuid.version = 0xff; 20909bb0ec09SDavid Hildenbrand return *((u64 *) &cpuid); 20919d8d5786SMichael Mueller } 20929d8d5786SMichael Mueller 2093c54f0d6aSDavid Hildenbrand static void kvm_s390_crypto_init(struct kvm *kvm) 20945102ee87STony Krowiak { 2095c54f0d6aSDavid Hildenbrand kvm->arch.crypto.crycb = &kvm->arch.sie_page2->crycb; 209645c9b47cSTony Krowiak kvm_s390_set_crycb_format(kvm); 20975102ee87STony Krowiak 2098e585b24aSTony Krowiak if (!test_kvm_facility(kvm, 76)) 2099e585b24aSTony Krowiak return; 2100e585b24aSTony Krowiak 2101ed6f76b4STony Krowiak /* Enable AES/DEA protected key functions by default */ 2102ed6f76b4STony Krowiak kvm->arch.crypto.aes_kw = 1; 2103ed6f76b4STony Krowiak kvm->arch.crypto.dea_kw = 1; 2104ed6f76b4STony Krowiak get_random_bytes(kvm->arch.crypto.crycb->aes_wrapping_key_mask, 2105ed6f76b4STony Krowiak sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask)); 2106ed6f76b4STony Krowiak get_random_bytes(kvm->arch.crypto.crycb->dea_wrapping_key_mask, 2107ed6f76b4STony Krowiak sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask)); 21085102ee87STony Krowiak } 21095102ee87STony Krowiak 21107d43bafcSEugene (jno) Dvurechenski static void sca_dispose(struct kvm *kvm) 21117d43bafcSEugene (jno) Dvurechenski { 21127d43bafcSEugene (jno) Dvurechenski if (kvm->arch.use_esca) 21135e044315SEugene (jno) Dvurechenski free_pages_exact(kvm->arch.sca, sizeof(struct esca_block)); 21147d43bafcSEugene (jno) Dvurechenski else 21157d43bafcSEugene (jno) Dvurechenski free_page((unsigned long)(kvm->arch.sca)); 21167d43bafcSEugene (jno) Dvurechenski kvm->arch.sca = NULL; 21177d43bafcSEugene (jno) Dvurechenski } 21187d43bafcSEugene (jno) Dvurechenski 2119e08b9637SCarsten Otte int kvm_arch_init_vm(struct kvm *kvm, unsigned long type) 2120b0c632dbSHeiko Carstens { 212176a6dd72SDavid Hildenbrand gfp_t alloc_flags = GFP_KERNEL; 21229d8d5786SMichael Mueller int i, rc; 2123b0c632dbSHeiko Carstens char debug_name[16]; 2124f6c137ffSChristian Borntraeger static unsigned long sca_offset; 2125b0c632dbSHeiko Carstens 2126e08b9637SCarsten Otte rc = -EINVAL; 2127e08b9637SCarsten Otte #ifdef CONFIG_KVM_S390_UCONTROL 2128e08b9637SCarsten Otte if (type & ~KVM_VM_S390_UCONTROL) 2129e08b9637SCarsten Otte goto out_err; 2130e08b9637SCarsten Otte if ((type & KVM_VM_S390_UCONTROL) && (!capable(CAP_SYS_ADMIN))) 2131e08b9637SCarsten Otte goto out_err; 2132e08b9637SCarsten Otte #else 2133e08b9637SCarsten Otte if (type) 2134e08b9637SCarsten Otte goto out_err; 2135e08b9637SCarsten Otte #endif 2136e08b9637SCarsten Otte 2137b0c632dbSHeiko Carstens rc = s390_enable_sie(); 2138b0c632dbSHeiko Carstens if (rc) 2139d89f5effSJan Kiszka goto out_err; 2140b0c632dbSHeiko Carstens 2141b290411aSCarsten Otte rc = -ENOMEM; 2142b290411aSCarsten Otte 214376a6dd72SDavid Hildenbrand if (!sclp.has_64bscao) 214476a6dd72SDavid Hildenbrand alloc_flags |= GFP_DMA; 21455e044315SEugene (jno) Dvurechenski rwlock_init(&kvm->arch.sca_lock); 21469ac96d75SDavid Hildenbrand /* start with basic SCA */ 214776a6dd72SDavid Hildenbrand kvm->arch.sca = (struct bsca_block *) get_zeroed_page(alloc_flags); 2148b0c632dbSHeiko Carstens if (!kvm->arch.sca) 2149d89f5effSJan Kiszka goto out_err; 2150f6c137ffSChristian Borntraeger spin_lock(&kvm_lock); 2151c5c2c393SDavid Hildenbrand sca_offset += 16; 2152bc784cceSEugene (jno) Dvurechenski if (sca_offset + sizeof(struct bsca_block) > PAGE_SIZE) 2153c5c2c393SDavid Hildenbrand sca_offset = 0; 2154bc784cceSEugene (jno) Dvurechenski kvm->arch.sca = (struct bsca_block *) 2155bc784cceSEugene (jno) Dvurechenski ((char *) kvm->arch.sca + sca_offset); 2156f6c137ffSChristian Borntraeger spin_unlock(&kvm_lock); 2157b0c632dbSHeiko Carstens 2158b0c632dbSHeiko Carstens sprintf(debug_name, "kvm-%u", current->pid); 2159b0c632dbSHeiko Carstens 21601cb9cf72SChristian Borntraeger kvm->arch.dbf = debug_register(debug_name, 32, 1, 7 * sizeof(long)); 2161b0c632dbSHeiko Carstens if (!kvm->arch.dbf) 216240f5b735SDominik Dingel goto out_err; 2163b0c632dbSHeiko Carstens 216419114bebSMichael Mueller BUILD_BUG_ON(sizeof(struct sie_page2) != 4096); 2165c54f0d6aSDavid Hildenbrand kvm->arch.sie_page2 = 2166c54f0d6aSDavid Hildenbrand (struct sie_page2 *) get_zeroed_page(GFP_KERNEL | GFP_DMA); 2167c54f0d6aSDavid Hildenbrand if (!kvm->arch.sie_page2) 216840f5b735SDominik Dingel goto out_err; 21699d8d5786SMichael Mueller 2170c54f0d6aSDavid Hildenbrand kvm->arch.model.fac_list = kvm->arch.sie_page2->fac_list; 2171c3b9e3e1SChristian Borntraeger 2172c3b9e3e1SChristian Borntraeger for (i = 0; i < kvm_s390_fac_size(); i++) { 2173c3b9e3e1SChristian Borntraeger kvm->arch.model.fac_mask[i] = S390_lowcore.stfle_fac_list[i] & 2174c3b9e3e1SChristian Borntraeger (kvm_s390_fac_base[i] | 2175c3b9e3e1SChristian Borntraeger kvm_s390_fac_ext[i]); 2176c3b9e3e1SChristian Borntraeger kvm->arch.model.fac_list[i] = S390_lowcore.stfle_fac_list[i] & 2177c3b9e3e1SChristian Borntraeger kvm_s390_fac_base[i]; 2178c3b9e3e1SChristian Borntraeger } 2179981467c9SMichael Mueller 21801935222dSDavid Hildenbrand /* we are always in czam mode - even on pre z14 machines */ 21811935222dSDavid Hildenbrand set_kvm_facility(kvm->arch.model.fac_mask, 138); 21821935222dSDavid Hildenbrand set_kvm_facility(kvm->arch.model.fac_list, 138); 21831935222dSDavid Hildenbrand /* we emulate STHYI in kvm */ 218495ca2cb5SJanosch Frank set_kvm_facility(kvm->arch.model.fac_mask, 74); 218595ca2cb5SJanosch Frank set_kvm_facility(kvm->arch.model.fac_list, 74); 21861bab1c02SClaudio Imbrenda if (MACHINE_HAS_TLB_GUEST) { 21871bab1c02SClaudio Imbrenda set_kvm_facility(kvm->arch.model.fac_mask, 147); 21881bab1c02SClaudio Imbrenda set_kvm_facility(kvm->arch.model.fac_list, 147); 21891bab1c02SClaudio Imbrenda } 219095ca2cb5SJanosch Frank 21919bb0ec09SDavid Hildenbrand kvm->arch.model.cpuid = kvm_s390_get_initial_cpuid(); 219237c5f6c8SDavid Hildenbrand kvm->arch.model.ibc = sclp.ibc & 0x0fff; 21939d8d5786SMichael Mueller 2194c54f0d6aSDavid Hildenbrand kvm_s390_crypto_init(kvm); 21955102ee87STony Krowiak 219651978393SFei Li mutex_init(&kvm->arch.float_int.ais_lock); 2197ba5c1e9bSCarsten Otte spin_lock_init(&kvm->arch.float_int.lock); 21986d3da241SJens Freimann for (i = 0; i < FIRQ_LIST_COUNT; i++) 21996d3da241SJens Freimann INIT_LIST_HEAD(&kvm->arch.float_int.lists[i]); 22008a242234SHeiko Carstens init_waitqueue_head(&kvm->arch.ipte_wq); 2201a6b7e459SThomas Huth mutex_init(&kvm->arch.ipte_mutex); 2202ba5c1e9bSCarsten Otte 2203b0c632dbSHeiko Carstens debug_register_view(kvm->arch.dbf, &debug_sprintf_view); 220478f26131SChristian Borntraeger VM_EVENT(kvm, 3, "vm created with type %lu", type); 2205b0c632dbSHeiko Carstens 2206e08b9637SCarsten Otte if (type & KVM_VM_S390_UCONTROL) { 2207e08b9637SCarsten Otte kvm->arch.gmap = NULL; 2208a3a92c31SDominik Dingel kvm->arch.mem_limit = KVM_S390_NO_MEM_LIMIT; 2209e08b9637SCarsten Otte } else { 221032e6b236SGuenther Hutzl if (sclp.hamax == U64_MAX) 2211ee71d16dSMartin Schwidefsky kvm->arch.mem_limit = TASK_SIZE_MAX; 221232e6b236SGuenther Hutzl else 2213ee71d16dSMartin Schwidefsky kvm->arch.mem_limit = min_t(unsigned long, TASK_SIZE_MAX, 221432e6b236SGuenther Hutzl sclp.hamax + 1); 22156ea427bbSMartin Schwidefsky kvm->arch.gmap = gmap_create(current->mm, kvm->arch.mem_limit - 1); 2216598841caSCarsten Otte if (!kvm->arch.gmap) 221740f5b735SDominik Dingel goto out_err; 22182c70fe44SChristian Borntraeger kvm->arch.gmap->private = kvm; 221924eb3a82SDominik Dingel kvm->arch.gmap->pfault_enabled = 0; 2220e08b9637SCarsten Otte } 2221fa6b7fe9SCornelia Huck 2222c9f0a2b8SJanosch Frank kvm->arch.use_pfmfi = sclp.has_pfmfi; 222355531b74SJanosch Frank kvm->arch.use_skf = sclp.has_skey; 22248ad35755SDavid Hildenbrand spin_lock_init(&kvm->arch.start_stop_lock); 2225a3508fbeSDavid Hildenbrand kvm_s390_vsie_init(kvm); 2226d7c5cb01SMichael Mueller kvm_s390_gisa_init(kvm); 22278335713aSChristian Borntraeger KVM_EVENT(3, "vm 0x%pK created by pid %u", kvm, current->pid); 22288ad35755SDavid Hildenbrand 2229d89f5effSJan Kiszka return 0; 2230d89f5effSJan Kiszka out_err: 2231c54f0d6aSDavid Hildenbrand free_page((unsigned long)kvm->arch.sie_page2); 223240f5b735SDominik Dingel debug_unregister(kvm->arch.dbf); 22337d43bafcSEugene (jno) Dvurechenski sca_dispose(kvm); 223478f26131SChristian Borntraeger KVM_EVENT(3, "creation of vm failed: %d", rc); 2235d89f5effSJan Kiszka return rc; 2236b0c632dbSHeiko Carstens } 2237b0c632dbSHeiko Carstens 2238235539b4SLuiz Capitulino bool kvm_arch_has_vcpu_debugfs(void) 2239235539b4SLuiz Capitulino { 2240235539b4SLuiz Capitulino return false; 2241235539b4SLuiz Capitulino } 2242235539b4SLuiz Capitulino 2243235539b4SLuiz Capitulino int kvm_arch_create_vcpu_debugfs(struct kvm_vcpu *vcpu) 2244235539b4SLuiz Capitulino { 2245235539b4SLuiz Capitulino return 0; 2246235539b4SLuiz Capitulino } 2247235539b4SLuiz Capitulino 2248d329c035SChristian Borntraeger void kvm_arch_vcpu_destroy(struct kvm_vcpu *vcpu) 2249d329c035SChristian Borntraeger { 2250d329c035SChristian Borntraeger VCPU_EVENT(vcpu, 3, "%s", "free cpu"); 2251ade38c31SCornelia Huck trace_kvm_s390_destroy_vcpu(vcpu->vcpu_id); 225267335e63SChristian Borntraeger kvm_s390_clear_local_irqs(vcpu); 22533c038e6bSDominik Dingel kvm_clear_async_pf_completion_queue(vcpu); 2254bc784cceSEugene (jno) Dvurechenski if (!kvm_is_ucontrol(vcpu->kvm)) 2255a6e2f683SEugene (jno) Dvurechenski sca_del_vcpu(vcpu); 225627e0393fSCarsten Otte 225727e0393fSCarsten Otte if (kvm_is_ucontrol(vcpu->kvm)) 22586ea427bbSMartin Schwidefsky gmap_remove(vcpu->arch.gmap); 225927e0393fSCarsten Otte 2260e6db1d61SDominik Dingel if (vcpu->kvm->arch.use_cmma) 2261b31605c1SDominik Dingel kvm_s390_vcpu_unsetup_cmma(vcpu); 2262d329c035SChristian Borntraeger free_page((unsigned long)(vcpu->arch.sie_block)); 2263b31288faSKonstantin Weitz 22646692cef3SChristian Borntraeger kvm_vcpu_uninit(vcpu); 2265b110feafSMichael Mueller kmem_cache_free(kvm_vcpu_cache, vcpu); 2266d329c035SChristian Borntraeger } 2267d329c035SChristian Borntraeger 2268d329c035SChristian Borntraeger static void kvm_free_vcpus(struct kvm *kvm) 2269d329c035SChristian Borntraeger { 2270d329c035SChristian Borntraeger unsigned int i; 2271988a2caeSGleb Natapov struct kvm_vcpu *vcpu; 2272d329c035SChristian Borntraeger 2273988a2caeSGleb Natapov kvm_for_each_vcpu(i, vcpu, kvm) 2274988a2caeSGleb Natapov kvm_arch_vcpu_destroy(vcpu); 2275988a2caeSGleb Natapov 2276988a2caeSGleb Natapov mutex_lock(&kvm->lock); 2277988a2caeSGleb Natapov for (i = 0; i < atomic_read(&kvm->online_vcpus); i++) 2278d329c035SChristian Borntraeger kvm->vcpus[i] = NULL; 2279988a2caeSGleb Natapov 2280988a2caeSGleb Natapov atomic_set(&kvm->online_vcpus, 0); 2281988a2caeSGleb Natapov mutex_unlock(&kvm->lock); 2282d329c035SChristian Borntraeger } 2283d329c035SChristian Borntraeger 2284b0c632dbSHeiko Carstens void kvm_arch_destroy_vm(struct kvm *kvm) 2285b0c632dbSHeiko Carstens { 2286d329c035SChristian Borntraeger kvm_free_vcpus(kvm); 22877d43bafcSEugene (jno) Dvurechenski sca_dispose(kvm); 2288d329c035SChristian Borntraeger debug_unregister(kvm->arch.dbf); 2289d7c5cb01SMichael Mueller kvm_s390_gisa_destroy(kvm); 2290c54f0d6aSDavid Hildenbrand free_page((unsigned long)kvm->arch.sie_page2); 229127e0393fSCarsten Otte if (!kvm_is_ucontrol(kvm)) 22926ea427bbSMartin Schwidefsky gmap_remove(kvm->arch.gmap); 2293841b91c5SCornelia Huck kvm_s390_destroy_adapters(kvm); 229467335e63SChristian Borntraeger kvm_s390_clear_float_irqs(kvm); 2295a3508fbeSDavid Hildenbrand kvm_s390_vsie_destroy(kvm); 22968335713aSChristian Borntraeger KVM_EVENT(3, "vm 0x%pK destroyed", kvm); 2297b0c632dbSHeiko Carstens } 2298b0c632dbSHeiko Carstens 2299b0c632dbSHeiko Carstens /* Section: vcpu related */ 2300dafd032aSDominik Dingel static int __kvm_ucontrol_vcpu_init(struct kvm_vcpu *vcpu) 2301b0c632dbSHeiko Carstens { 23026ea427bbSMartin Schwidefsky vcpu->arch.gmap = gmap_create(current->mm, -1UL); 230327e0393fSCarsten Otte if (!vcpu->arch.gmap) 230427e0393fSCarsten Otte return -ENOMEM; 23052c70fe44SChristian Borntraeger vcpu->arch.gmap->private = vcpu->kvm; 2306dafd032aSDominik Dingel 230727e0393fSCarsten Otte return 0; 230827e0393fSCarsten Otte } 230927e0393fSCarsten Otte 2310a6e2f683SEugene (jno) Dvurechenski static void sca_del_vcpu(struct kvm_vcpu *vcpu) 2311a6e2f683SEugene (jno) Dvurechenski { 2312a6940674SDavid Hildenbrand if (!kvm_s390_use_sca_entries()) 2313a6940674SDavid Hildenbrand return; 23145e044315SEugene (jno) Dvurechenski read_lock(&vcpu->kvm->arch.sca_lock); 23157d43bafcSEugene (jno) Dvurechenski if (vcpu->kvm->arch.use_esca) { 23167d43bafcSEugene (jno) Dvurechenski struct esca_block *sca = vcpu->kvm->arch.sca; 23177d43bafcSEugene (jno) Dvurechenski 23187d43bafcSEugene (jno) Dvurechenski clear_bit_inv(vcpu->vcpu_id, (unsigned long *) sca->mcn); 23197d43bafcSEugene (jno) Dvurechenski sca->cpu[vcpu->vcpu_id].sda = 0; 23207d43bafcSEugene (jno) Dvurechenski } else { 2321bc784cceSEugene (jno) Dvurechenski struct bsca_block *sca = vcpu->kvm->arch.sca; 2322a6e2f683SEugene (jno) Dvurechenski 2323a6e2f683SEugene (jno) Dvurechenski clear_bit_inv(vcpu->vcpu_id, (unsigned long *) &sca->mcn); 2324a6e2f683SEugene (jno) Dvurechenski sca->cpu[vcpu->vcpu_id].sda = 0; 2325a6e2f683SEugene (jno) Dvurechenski } 23265e044315SEugene (jno) Dvurechenski read_unlock(&vcpu->kvm->arch.sca_lock); 23277d43bafcSEugene (jno) Dvurechenski } 2328a6e2f683SEugene (jno) Dvurechenski 2329eaa78f34SDavid Hildenbrand static void sca_add_vcpu(struct kvm_vcpu *vcpu) 2330a6e2f683SEugene (jno) Dvurechenski { 2331a6940674SDavid Hildenbrand if (!kvm_s390_use_sca_entries()) { 2332a6940674SDavid Hildenbrand struct bsca_block *sca = vcpu->kvm->arch.sca; 2333a6940674SDavid Hildenbrand 2334a6940674SDavid Hildenbrand /* we still need the basic sca for the ipte control */ 2335a6940674SDavid Hildenbrand vcpu->arch.sie_block->scaoh = (__u32)(((__u64)sca) >> 32); 2336a6940674SDavid Hildenbrand vcpu->arch.sie_block->scaol = (__u32)(__u64)sca; 2337f07afa04SDavid Hildenbrand return; 2338a6940674SDavid Hildenbrand } 2339eaa78f34SDavid Hildenbrand read_lock(&vcpu->kvm->arch.sca_lock); 2340eaa78f34SDavid Hildenbrand if (vcpu->kvm->arch.use_esca) { 2341eaa78f34SDavid Hildenbrand struct esca_block *sca = vcpu->kvm->arch.sca; 23427d43bafcSEugene (jno) Dvurechenski 2343eaa78f34SDavid Hildenbrand sca->cpu[vcpu->vcpu_id].sda = (__u64) vcpu->arch.sie_block; 23447d43bafcSEugene (jno) Dvurechenski vcpu->arch.sie_block->scaoh = (__u32)(((__u64)sca) >> 32); 23457d43bafcSEugene (jno) Dvurechenski vcpu->arch.sie_block->scaol = (__u32)(__u64)sca & ~0x3fU; 23460c9d8683SDavid Hildenbrand vcpu->arch.sie_block->ecb2 |= ECB2_ESCA; 2347eaa78f34SDavid Hildenbrand set_bit_inv(vcpu->vcpu_id, (unsigned long *) sca->mcn); 23487d43bafcSEugene (jno) Dvurechenski } else { 2349eaa78f34SDavid Hildenbrand struct bsca_block *sca = vcpu->kvm->arch.sca; 2350a6e2f683SEugene (jno) Dvurechenski 2351eaa78f34SDavid Hildenbrand sca->cpu[vcpu->vcpu_id].sda = (__u64) vcpu->arch.sie_block; 2352a6e2f683SEugene (jno) Dvurechenski vcpu->arch.sie_block->scaoh = (__u32)(((__u64)sca) >> 32); 2353a6e2f683SEugene (jno) Dvurechenski vcpu->arch.sie_block->scaol = (__u32)(__u64)sca; 2354eaa78f34SDavid Hildenbrand set_bit_inv(vcpu->vcpu_id, (unsigned long *) &sca->mcn); 2355a6e2f683SEugene (jno) Dvurechenski } 2356eaa78f34SDavid Hildenbrand read_unlock(&vcpu->kvm->arch.sca_lock); 23575e044315SEugene (jno) Dvurechenski } 23585e044315SEugene (jno) Dvurechenski 23595e044315SEugene (jno) Dvurechenski /* Basic SCA to Extended SCA data copy routines */ 23605e044315SEugene (jno) Dvurechenski static inline void sca_copy_entry(struct esca_entry *d, struct bsca_entry *s) 23615e044315SEugene (jno) Dvurechenski { 23625e044315SEugene (jno) Dvurechenski d->sda = s->sda; 23635e044315SEugene (jno) Dvurechenski d->sigp_ctrl.c = s->sigp_ctrl.c; 23645e044315SEugene (jno) Dvurechenski d->sigp_ctrl.scn = s->sigp_ctrl.scn; 23655e044315SEugene (jno) Dvurechenski } 23665e044315SEugene (jno) Dvurechenski 23675e044315SEugene (jno) Dvurechenski static void sca_copy_b_to_e(struct esca_block *d, struct bsca_block *s) 23685e044315SEugene (jno) Dvurechenski { 23695e044315SEugene (jno) Dvurechenski int i; 23705e044315SEugene (jno) Dvurechenski 23715e044315SEugene (jno) Dvurechenski d->ipte_control = s->ipte_control; 23725e044315SEugene (jno) Dvurechenski d->mcn[0] = s->mcn; 23735e044315SEugene (jno) Dvurechenski for (i = 0; i < KVM_S390_BSCA_CPU_SLOTS; i++) 23745e044315SEugene (jno) Dvurechenski sca_copy_entry(&d->cpu[i], &s->cpu[i]); 23755e044315SEugene (jno) Dvurechenski } 23765e044315SEugene (jno) Dvurechenski 23775e044315SEugene (jno) Dvurechenski static int sca_switch_to_extended(struct kvm *kvm) 23785e044315SEugene (jno) Dvurechenski { 23795e044315SEugene (jno) Dvurechenski struct bsca_block *old_sca = kvm->arch.sca; 23805e044315SEugene (jno) Dvurechenski struct esca_block *new_sca; 23815e044315SEugene (jno) Dvurechenski struct kvm_vcpu *vcpu; 23825e044315SEugene (jno) Dvurechenski unsigned int vcpu_idx; 23835e044315SEugene (jno) Dvurechenski u32 scaol, scaoh; 23845e044315SEugene (jno) Dvurechenski 23855e044315SEugene (jno) Dvurechenski new_sca = alloc_pages_exact(sizeof(*new_sca), GFP_KERNEL|__GFP_ZERO); 23865e044315SEugene (jno) Dvurechenski if (!new_sca) 23875e044315SEugene (jno) Dvurechenski return -ENOMEM; 23885e044315SEugene (jno) Dvurechenski 23895e044315SEugene (jno) Dvurechenski scaoh = (u32)((u64)(new_sca) >> 32); 23905e044315SEugene (jno) Dvurechenski scaol = (u32)(u64)(new_sca) & ~0x3fU; 23915e044315SEugene (jno) Dvurechenski 23925e044315SEugene (jno) Dvurechenski kvm_s390_vcpu_block_all(kvm); 23935e044315SEugene (jno) Dvurechenski write_lock(&kvm->arch.sca_lock); 23945e044315SEugene (jno) Dvurechenski 23955e044315SEugene (jno) Dvurechenski sca_copy_b_to_e(new_sca, old_sca); 23965e044315SEugene (jno) Dvurechenski 23975e044315SEugene (jno) Dvurechenski kvm_for_each_vcpu(vcpu_idx, vcpu, kvm) { 23985e044315SEugene (jno) Dvurechenski vcpu->arch.sie_block->scaoh = scaoh; 23995e044315SEugene (jno) Dvurechenski vcpu->arch.sie_block->scaol = scaol; 24000c9d8683SDavid Hildenbrand vcpu->arch.sie_block->ecb2 |= ECB2_ESCA; 24015e044315SEugene (jno) Dvurechenski } 24025e044315SEugene (jno) Dvurechenski kvm->arch.sca = new_sca; 24035e044315SEugene (jno) Dvurechenski kvm->arch.use_esca = 1; 24045e044315SEugene (jno) Dvurechenski 24055e044315SEugene (jno) Dvurechenski write_unlock(&kvm->arch.sca_lock); 24065e044315SEugene (jno) Dvurechenski kvm_s390_vcpu_unblock_all(kvm); 24075e044315SEugene (jno) Dvurechenski 24085e044315SEugene (jno) Dvurechenski free_page((unsigned long)old_sca); 24095e044315SEugene (jno) Dvurechenski 24108335713aSChristian Borntraeger VM_EVENT(kvm, 2, "Switched to ESCA (0x%pK -> 0x%pK)", 24118335713aSChristian Borntraeger old_sca, kvm->arch.sca); 24125e044315SEugene (jno) Dvurechenski return 0; 24137d43bafcSEugene (jno) Dvurechenski } 2414a6e2f683SEugene (jno) Dvurechenski 2415a6e2f683SEugene (jno) Dvurechenski static int sca_can_add_vcpu(struct kvm *kvm, unsigned int id) 2416a6e2f683SEugene (jno) Dvurechenski { 24175e044315SEugene (jno) Dvurechenski int rc; 24185e044315SEugene (jno) Dvurechenski 2419a6940674SDavid Hildenbrand if (!kvm_s390_use_sca_entries()) { 2420a6940674SDavid Hildenbrand if (id < KVM_MAX_VCPUS) 2421a6940674SDavid Hildenbrand return true; 2422a6940674SDavid Hildenbrand return false; 2423a6940674SDavid Hildenbrand } 24245e044315SEugene (jno) Dvurechenski if (id < KVM_S390_BSCA_CPU_SLOTS) 24255e044315SEugene (jno) Dvurechenski return true; 242676a6dd72SDavid Hildenbrand if (!sclp.has_esca || !sclp.has_64bscao) 24275e044315SEugene (jno) Dvurechenski return false; 24285e044315SEugene (jno) Dvurechenski 24295e044315SEugene (jno) Dvurechenski mutex_lock(&kvm->lock); 24305e044315SEugene (jno) Dvurechenski rc = kvm->arch.use_esca ? 0 : sca_switch_to_extended(kvm); 24315e044315SEugene (jno) Dvurechenski mutex_unlock(&kvm->lock); 24325e044315SEugene (jno) Dvurechenski 24335e044315SEugene (jno) Dvurechenski return rc == 0 && id < KVM_S390_ESCA_CPU_SLOTS; 2434a6e2f683SEugene (jno) Dvurechenski } 2435a6e2f683SEugene (jno) Dvurechenski 2436dafd032aSDominik Dingel int kvm_arch_vcpu_init(struct kvm_vcpu *vcpu) 2437dafd032aSDominik Dingel { 2438dafd032aSDominik Dingel vcpu->arch.pfault_token = KVM_S390_PFAULT_TOKEN_INVALID; 2439dafd032aSDominik Dingel kvm_clear_async_pf_completion_queue(vcpu); 244059674c1aSChristian Borntraeger vcpu->run->kvm_valid_regs = KVM_SYNC_PREFIX | 244159674c1aSChristian Borntraeger KVM_SYNC_GPRS | 24429eed0735SChristian Borntraeger KVM_SYNC_ACRS | 2443b028ee3eSDavid Hildenbrand KVM_SYNC_CRS | 2444b028ee3eSDavid Hildenbrand KVM_SYNC_ARCH0 | 2445b028ee3eSDavid Hildenbrand KVM_SYNC_PFAULT; 244675a4615cSJulius Niedworok kvm_s390_set_prefix(vcpu, 0); 2447c6e5f166SFan Zhang if (test_kvm_facility(vcpu->kvm, 64)) 2448c6e5f166SFan Zhang vcpu->run->kvm_valid_regs |= KVM_SYNC_RICCB; 244935b3fde6SChristian Borntraeger if (test_kvm_facility(vcpu->kvm, 82)) 245035b3fde6SChristian Borntraeger vcpu->run->kvm_valid_regs |= KVM_SYNC_BPBC; 24514e0b1ab7SFan Zhang if (test_kvm_facility(vcpu->kvm, 133)) 24524e0b1ab7SFan Zhang vcpu->run->kvm_valid_regs |= KVM_SYNC_GSCB; 2453a3da7b4aSChristian Borntraeger if (test_kvm_facility(vcpu->kvm, 156)) 2454a3da7b4aSChristian Borntraeger vcpu->run->kvm_valid_regs |= KVM_SYNC_ETOKEN; 2455f6aa6dc4SDavid Hildenbrand /* fprs can be synchronized via vrs, even if the guest has no vx. With 2456f6aa6dc4SDavid Hildenbrand * MACHINE_HAS_VX, (load|store)_fpu_regs() will work with vrs format. 2457f6aa6dc4SDavid Hildenbrand */ 2458f6aa6dc4SDavid Hildenbrand if (MACHINE_HAS_VX) 245968c55750SEric Farman vcpu->run->kvm_valid_regs |= KVM_SYNC_VRS; 24606fd8e67dSDavid Hildenbrand else 24616fd8e67dSDavid Hildenbrand vcpu->run->kvm_valid_regs |= KVM_SYNC_FPRS; 2462dafd032aSDominik Dingel 2463dafd032aSDominik Dingel if (kvm_is_ucontrol(vcpu->kvm)) 2464dafd032aSDominik Dingel return __kvm_ucontrol_vcpu_init(vcpu); 2465dafd032aSDominik Dingel 2466b0c632dbSHeiko Carstens return 0; 2467b0c632dbSHeiko Carstens } 2468b0c632dbSHeiko Carstens 2469db0758b2SDavid Hildenbrand /* needs disabled preemption to protect from TOD sync and vcpu_load/put */ 2470db0758b2SDavid Hildenbrand static void __start_cpu_timer_accounting(struct kvm_vcpu *vcpu) 2471db0758b2SDavid Hildenbrand { 2472db0758b2SDavid Hildenbrand WARN_ON_ONCE(vcpu->arch.cputm_start != 0); 24739c23a131SDavid Hildenbrand raw_write_seqcount_begin(&vcpu->arch.cputm_seqcount); 2474db0758b2SDavid Hildenbrand vcpu->arch.cputm_start = get_tod_clock_fast(); 24759c23a131SDavid Hildenbrand raw_write_seqcount_end(&vcpu->arch.cputm_seqcount); 2476db0758b2SDavid Hildenbrand } 2477db0758b2SDavid Hildenbrand 2478db0758b2SDavid Hildenbrand /* needs disabled preemption to protect from TOD sync and vcpu_load/put */ 2479db0758b2SDavid Hildenbrand static void __stop_cpu_timer_accounting(struct kvm_vcpu *vcpu) 2480db0758b2SDavid Hildenbrand { 2481db0758b2SDavid Hildenbrand WARN_ON_ONCE(vcpu->arch.cputm_start == 0); 24829c23a131SDavid Hildenbrand raw_write_seqcount_begin(&vcpu->arch.cputm_seqcount); 2483db0758b2SDavid Hildenbrand vcpu->arch.sie_block->cputm -= get_tod_clock_fast() - vcpu->arch.cputm_start; 2484db0758b2SDavid Hildenbrand vcpu->arch.cputm_start = 0; 24859c23a131SDavid Hildenbrand raw_write_seqcount_end(&vcpu->arch.cputm_seqcount); 2486db0758b2SDavid Hildenbrand } 2487db0758b2SDavid Hildenbrand 2488db0758b2SDavid Hildenbrand /* needs disabled preemption to protect from TOD sync and vcpu_load/put */ 2489db0758b2SDavid Hildenbrand static void __enable_cpu_timer_accounting(struct kvm_vcpu *vcpu) 2490db0758b2SDavid Hildenbrand { 2491db0758b2SDavid Hildenbrand WARN_ON_ONCE(vcpu->arch.cputm_enabled); 2492db0758b2SDavid Hildenbrand vcpu->arch.cputm_enabled = true; 2493db0758b2SDavid Hildenbrand __start_cpu_timer_accounting(vcpu); 2494db0758b2SDavid Hildenbrand } 2495db0758b2SDavid Hildenbrand 2496db0758b2SDavid Hildenbrand /* needs disabled preemption to protect from TOD sync and vcpu_load/put */ 2497db0758b2SDavid Hildenbrand static void __disable_cpu_timer_accounting(struct kvm_vcpu *vcpu) 2498db0758b2SDavid Hildenbrand { 2499db0758b2SDavid Hildenbrand WARN_ON_ONCE(!vcpu->arch.cputm_enabled); 2500db0758b2SDavid Hildenbrand __stop_cpu_timer_accounting(vcpu); 2501db0758b2SDavid Hildenbrand vcpu->arch.cputm_enabled = false; 2502db0758b2SDavid Hildenbrand } 2503db0758b2SDavid Hildenbrand 2504db0758b2SDavid Hildenbrand static void enable_cpu_timer_accounting(struct kvm_vcpu *vcpu) 2505db0758b2SDavid Hildenbrand { 2506db0758b2SDavid Hildenbrand preempt_disable(); /* protect from TOD sync and vcpu_load/put */ 2507db0758b2SDavid Hildenbrand __enable_cpu_timer_accounting(vcpu); 2508db0758b2SDavid Hildenbrand preempt_enable(); 2509db0758b2SDavid Hildenbrand } 2510db0758b2SDavid Hildenbrand 2511db0758b2SDavid Hildenbrand static void disable_cpu_timer_accounting(struct kvm_vcpu *vcpu) 2512db0758b2SDavid Hildenbrand { 2513db0758b2SDavid Hildenbrand preempt_disable(); /* protect from TOD sync and vcpu_load/put */ 2514db0758b2SDavid Hildenbrand __disable_cpu_timer_accounting(vcpu); 2515db0758b2SDavid Hildenbrand preempt_enable(); 2516db0758b2SDavid Hildenbrand } 2517db0758b2SDavid Hildenbrand 25184287f247SDavid Hildenbrand /* set the cpu timer - may only be called from the VCPU thread itself */ 25194287f247SDavid Hildenbrand void kvm_s390_set_cpu_timer(struct kvm_vcpu *vcpu, __u64 cputm) 25204287f247SDavid Hildenbrand { 2521db0758b2SDavid Hildenbrand preempt_disable(); /* protect from TOD sync and vcpu_load/put */ 25229c23a131SDavid Hildenbrand raw_write_seqcount_begin(&vcpu->arch.cputm_seqcount); 2523db0758b2SDavid Hildenbrand if (vcpu->arch.cputm_enabled) 2524db0758b2SDavid Hildenbrand vcpu->arch.cputm_start = get_tod_clock_fast(); 25254287f247SDavid Hildenbrand vcpu->arch.sie_block->cputm = cputm; 25269c23a131SDavid Hildenbrand raw_write_seqcount_end(&vcpu->arch.cputm_seqcount); 2527db0758b2SDavid Hildenbrand preempt_enable(); 25284287f247SDavid Hildenbrand } 25294287f247SDavid Hildenbrand 2530db0758b2SDavid Hildenbrand /* update and get the cpu timer - can also be called from other VCPU threads */ 25314287f247SDavid Hildenbrand __u64 kvm_s390_get_cpu_timer(struct kvm_vcpu *vcpu) 25324287f247SDavid Hildenbrand { 25339c23a131SDavid Hildenbrand unsigned int seq; 2534db0758b2SDavid Hildenbrand __u64 value; 2535db0758b2SDavid Hildenbrand 2536db0758b2SDavid Hildenbrand if (unlikely(!vcpu->arch.cputm_enabled)) 25374287f247SDavid Hildenbrand return vcpu->arch.sie_block->cputm; 2538db0758b2SDavid Hildenbrand 25399c23a131SDavid Hildenbrand preempt_disable(); /* protect from TOD sync and vcpu_load/put */ 25409c23a131SDavid Hildenbrand do { 25419c23a131SDavid Hildenbrand seq = raw_read_seqcount(&vcpu->arch.cputm_seqcount); 25429c23a131SDavid Hildenbrand /* 25439c23a131SDavid Hildenbrand * If the writer would ever execute a read in the critical 25449c23a131SDavid Hildenbrand * section, e.g. in irq context, we have a deadlock. 25459c23a131SDavid Hildenbrand */ 25469c23a131SDavid Hildenbrand WARN_ON_ONCE((seq & 1) && smp_processor_id() == vcpu->cpu); 2547db0758b2SDavid Hildenbrand value = vcpu->arch.sie_block->cputm; 25489c23a131SDavid Hildenbrand /* if cputm_start is 0, accounting is being started/stopped */ 25499c23a131SDavid Hildenbrand if (likely(vcpu->arch.cputm_start)) 2550db0758b2SDavid Hildenbrand value -= get_tod_clock_fast() - vcpu->arch.cputm_start; 25519c23a131SDavid Hildenbrand } while (read_seqcount_retry(&vcpu->arch.cputm_seqcount, seq & ~1)); 25529c23a131SDavid Hildenbrand preempt_enable(); 2553db0758b2SDavid Hildenbrand return value; 25544287f247SDavid Hildenbrand } 25554287f247SDavid Hildenbrand 2556b0c632dbSHeiko Carstens void kvm_arch_vcpu_load(struct kvm_vcpu *vcpu, int cpu) 2557b0c632dbSHeiko Carstens { 25589977e886SHendrik Brueckner 255937d9df98SDavid Hildenbrand gmap_enable(vcpu->arch.enabled_gmap); 2560ef8f4f49SDavid Hildenbrand kvm_s390_set_cpuflags(vcpu, CPUSTAT_RUNNING); 25615ebda316SDavid Hildenbrand if (vcpu->arch.cputm_enabled && !is_vcpu_idle(vcpu)) 2562db0758b2SDavid Hildenbrand __start_cpu_timer_accounting(vcpu); 256301a745acSDavid Hildenbrand vcpu->cpu = cpu; 2564b0c632dbSHeiko Carstens } 2565b0c632dbSHeiko Carstens 2566b0c632dbSHeiko Carstens void kvm_arch_vcpu_put(struct kvm_vcpu *vcpu) 2567b0c632dbSHeiko Carstens { 256801a745acSDavid Hildenbrand vcpu->cpu = -1; 25695ebda316SDavid Hildenbrand if (vcpu->arch.cputm_enabled && !is_vcpu_idle(vcpu)) 2570db0758b2SDavid Hildenbrand __stop_cpu_timer_accounting(vcpu); 25719daecfc6SDavid Hildenbrand kvm_s390_clear_cpuflags(vcpu, CPUSTAT_RUNNING); 257237d9df98SDavid Hildenbrand vcpu->arch.enabled_gmap = gmap_get_enabled(); 257337d9df98SDavid Hildenbrand gmap_disable(vcpu->arch.enabled_gmap); 25749977e886SHendrik Brueckner 2575b0c632dbSHeiko Carstens } 2576b0c632dbSHeiko Carstens 2577b0c632dbSHeiko Carstens static void kvm_s390_vcpu_initial_reset(struct kvm_vcpu *vcpu) 2578b0c632dbSHeiko Carstens { 2579b0c632dbSHeiko Carstens /* this equals initial cpu reset in pop, but we don't switch to ESA */ 2580b0c632dbSHeiko Carstens vcpu->arch.sie_block->gpsw.mask = 0UL; 2581b0c632dbSHeiko Carstens vcpu->arch.sie_block->gpsw.addr = 0UL; 25828d26cf7bSChristian Borntraeger kvm_s390_set_prefix(vcpu, 0); 25834287f247SDavid Hildenbrand kvm_s390_set_cpu_timer(vcpu, 0); 2584b0c632dbSHeiko Carstens vcpu->arch.sie_block->ckc = 0UL; 2585b0c632dbSHeiko Carstens vcpu->arch.sie_block->todpr = 0; 2586b0c632dbSHeiko Carstens memset(vcpu->arch.sie_block->gcr, 0, 16 * sizeof(__u64)); 2587b9224cd7SDavid Hildenbrand vcpu->arch.sie_block->gcr[0] = CR0_UNUSED_56 | 2588b9224cd7SDavid Hildenbrand CR0_INTERRUPT_KEY_SUBMASK | 2589b9224cd7SDavid Hildenbrand CR0_MEASUREMENT_ALERT_SUBMASK; 2590b9224cd7SDavid Hildenbrand vcpu->arch.sie_block->gcr[14] = CR14_UNUSED_32 | 2591b9224cd7SDavid Hildenbrand CR14_UNUSED_33 | 2592b9224cd7SDavid Hildenbrand CR14_EXTERNAL_DAMAGE_SUBMASK; 25939abc2a08SDavid Hildenbrand /* make sure the new fpc will be lazily loaded */ 25949abc2a08SDavid Hildenbrand save_fpu_regs(); 25959abc2a08SDavid Hildenbrand current->thread.fpu.fpc = 0; 2596b0c632dbSHeiko Carstens vcpu->arch.sie_block->gbea = 1; 2597672550fbSChristian Borntraeger vcpu->arch.sie_block->pp = 0; 259835b3fde6SChristian Borntraeger vcpu->arch.sie_block->fpf &= ~FPF_BPBC; 25993c038e6bSDominik Dingel vcpu->arch.pfault_token = KVM_S390_PFAULT_TOKEN_INVALID; 26003c038e6bSDominik Dingel kvm_clear_async_pf_completion_queue(vcpu); 26016352e4d2SDavid Hildenbrand if (!kvm_s390_user_cpu_state_ctrl(vcpu->kvm)) 26026852d7b6SDavid Hildenbrand kvm_s390_vcpu_stop(vcpu); 26032ed10cc1SJens Freimann kvm_s390_clear_local_irqs(vcpu); 2604b0c632dbSHeiko Carstens } 2605b0c632dbSHeiko Carstens 260631928aa5SDominik Dingel void kvm_arch_vcpu_postcreate(struct kvm_vcpu *vcpu) 260742897d86SMarcelo Tosatti { 260872f25020SJason J. Herne mutex_lock(&vcpu->kvm->lock); 2609fdf03650SFan Zhang preempt_disable(); 261072f25020SJason J. Herne vcpu->arch.sie_block->epoch = vcpu->kvm->arch.epoch; 2611d16b52cbSDavid Hildenbrand vcpu->arch.sie_block->epdx = vcpu->kvm->arch.epdx; 2612fdf03650SFan Zhang preempt_enable(); 261372f25020SJason J. Herne mutex_unlock(&vcpu->kvm->lock); 261425508824SDavid Hildenbrand if (!kvm_is_ucontrol(vcpu->kvm)) { 2615dafd032aSDominik Dingel vcpu->arch.gmap = vcpu->kvm->arch.gmap; 2616eaa78f34SDavid Hildenbrand sca_add_vcpu(vcpu); 261725508824SDavid Hildenbrand } 26186502a34cSDavid Hildenbrand if (test_kvm_facility(vcpu->kvm, 74) || vcpu->kvm->arch.user_instr0) 26196502a34cSDavid Hildenbrand vcpu->arch.sie_block->ictl |= ICTL_OPEREXC; 262037d9df98SDavid Hildenbrand /* make vcpu_load load the right gmap on the first trigger */ 262137d9df98SDavid Hildenbrand vcpu->arch.enabled_gmap = vcpu->arch.gmap; 262242897d86SMarcelo Tosatti } 262342897d86SMarcelo Tosatti 26245102ee87STony Krowiak static void kvm_s390_vcpu_crypto_setup(struct kvm_vcpu *vcpu) 26255102ee87STony Krowiak { 2626e585b24aSTony Krowiak /* 2627e585b24aSTony Krowiak * If the AP instructions are not being interpreted and the MSAX3 2628e585b24aSTony Krowiak * facility is not configured for the guest, there is nothing to set up. 2629e585b24aSTony Krowiak */ 2630e585b24aSTony Krowiak if (!vcpu->kvm->arch.crypto.apie && !test_kvm_facility(vcpu->kvm, 76)) 26315102ee87STony Krowiak return; 26325102ee87STony Krowiak 2633e585b24aSTony Krowiak vcpu->arch.sie_block->crycbd = vcpu->kvm->arch.crypto.crycbd; 2634a374e892STony Krowiak vcpu->arch.sie_block->ecb3 &= ~(ECB3_AES | ECB3_DEA); 263537940fb0STony Krowiak vcpu->arch.sie_block->eca &= ~ECA_APIE; 2636a374e892STony Krowiak 2637e585b24aSTony Krowiak if (vcpu->kvm->arch.crypto.apie) 2638e585b24aSTony Krowiak vcpu->arch.sie_block->eca |= ECA_APIE; 2639e585b24aSTony Krowiak 2640e585b24aSTony Krowiak /* Set up protected key support */ 2641a374e892STony Krowiak if (vcpu->kvm->arch.crypto.aes_kw) 2642a374e892STony Krowiak vcpu->arch.sie_block->ecb3 |= ECB3_AES; 2643a374e892STony Krowiak if (vcpu->kvm->arch.crypto.dea_kw) 2644a374e892STony Krowiak vcpu->arch.sie_block->ecb3 |= ECB3_DEA; 26455102ee87STony Krowiak } 26465102ee87STony Krowiak 2647b31605c1SDominik Dingel void kvm_s390_vcpu_unsetup_cmma(struct kvm_vcpu *vcpu) 2648b31605c1SDominik Dingel { 2649b31605c1SDominik Dingel free_page(vcpu->arch.sie_block->cbrlo); 2650b31605c1SDominik Dingel vcpu->arch.sie_block->cbrlo = 0; 2651b31605c1SDominik Dingel } 2652b31605c1SDominik Dingel 2653b31605c1SDominik Dingel int kvm_s390_vcpu_setup_cmma(struct kvm_vcpu *vcpu) 2654b31605c1SDominik Dingel { 2655b31605c1SDominik Dingel vcpu->arch.sie_block->cbrlo = get_zeroed_page(GFP_KERNEL); 2656b31605c1SDominik Dingel if (!vcpu->arch.sie_block->cbrlo) 2657b31605c1SDominik Dingel return -ENOMEM; 2658b31605c1SDominik Dingel return 0; 2659b31605c1SDominik Dingel } 2660b31605c1SDominik Dingel 266191520f1aSMichael Mueller static void kvm_s390_vcpu_setup_model(struct kvm_vcpu *vcpu) 266291520f1aSMichael Mueller { 266391520f1aSMichael Mueller struct kvm_s390_cpu_model *model = &vcpu->kvm->arch.model; 266491520f1aSMichael Mueller 266591520f1aSMichael Mueller vcpu->arch.sie_block->ibc = model->ibc; 266680bc79dcSDavid Hildenbrand if (test_kvm_facility(vcpu->kvm, 7)) 2667c54f0d6aSDavid Hildenbrand vcpu->arch.sie_block->fac = (u32)(u64) model->fac_list; 266891520f1aSMichael Mueller } 266991520f1aSMichael Mueller 2670b0c632dbSHeiko Carstens int kvm_arch_vcpu_setup(struct kvm_vcpu *vcpu) 2671b0c632dbSHeiko Carstens { 2672b31605c1SDominik Dingel int rc = 0; 2673b31288faSKonstantin Weitz 26749e6dabefSCornelia Huck atomic_set(&vcpu->arch.sie_block->cpuflags, CPUSTAT_ZARCH | 26759e6dabefSCornelia Huck CPUSTAT_SM | 2676a4a4f191SGuenther Hutzl CPUSTAT_STOPPED); 2677a4a4f191SGuenther Hutzl 267853df84f8SGuenther Hutzl if (test_kvm_facility(vcpu->kvm, 78)) 2679ef8f4f49SDavid Hildenbrand kvm_s390_set_cpuflags(vcpu, CPUSTAT_GED2); 268053df84f8SGuenther Hutzl else if (test_kvm_facility(vcpu->kvm, 8)) 2681ef8f4f49SDavid Hildenbrand kvm_s390_set_cpuflags(vcpu, CPUSTAT_GED); 2682a4a4f191SGuenther Hutzl 268391520f1aSMichael Mueller kvm_s390_vcpu_setup_model(vcpu); 268491520f1aSMichael Mueller 2685bdab09f3SDavid Hildenbrand /* pgste_set_pte has special handling for !MACHINE_HAS_ESOP */ 2686bdab09f3SDavid Hildenbrand if (MACHINE_HAS_ESOP) 26870c9d8683SDavid Hildenbrand vcpu->arch.sie_block->ecb |= ECB_HOSTPROTINT; 2688bd50e8ecSDavid Hildenbrand if (test_kvm_facility(vcpu->kvm, 9)) 26890c9d8683SDavid Hildenbrand vcpu->arch.sie_block->ecb |= ECB_SRSI; 2690f597d24eSDavid Hildenbrand if (test_kvm_facility(vcpu->kvm, 73)) 26910c9d8683SDavid Hildenbrand vcpu->arch.sie_block->ecb |= ECB_TE; 26927feb6bb8SMichael Mueller 2693c9f0a2b8SJanosch Frank if (test_kvm_facility(vcpu->kvm, 8) && vcpu->kvm->arch.use_pfmfi) 26940c9d8683SDavid Hildenbrand vcpu->arch.sie_block->ecb2 |= ECB2_PFMFI; 2695cd1836f5SJanosch Frank if (test_kvm_facility(vcpu->kvm, 130)) 26960c9d8683SDavid Hildenbrand vcpu->arch.sie_block->ecb2 |= ECB2_IEP; 26970c9d8683SDavid Hildenbrand vcpu->arch.sie_block->eca = ECA_MVPGI | ECA_PROTEXCI; 269848ee7d3aSDavid Hildenbrand if (sclp.has_cei) 26990c9d8683SDavid Hildenbrand vcpu->arch.sie_block->eca |= ECA_CEI; 270011ad65b7SDavid Hildenbrand if (sclp.has_ib) 27010c9d8683SDavid Hildenbrand vcpu->arch.sie_block->eca |= ECA_IB; 270237c5f6c8SDavid Hildenbrand if (sclp.has_siif) 27030c9d8683SDavid Hildenbrand vcpu->arch.sie_block->eca |= ECA_SII; 270437c5f6c8SDavid Hildenbrand if (sclp.has_sigpif) 27050c9d8683SDavid Hildenbrand vcpu->arch.sie_block->eca |= ECA_SIGPI; 270618280d8bSMichael Mueller if (test_kvm_facility(vcpu->kvm, 129)) { 27070c9d8683SDavid Hildenbrand vcpu->arch.sie_block->eca |= ECA_VX; 27080c9d8683SDavid Hildenbrand vcpu->arch.sie_block->ecd |= ECD_HOSTREGMGMT; 270913211ea7SEric Farman } 27108fa1696eSCollin L. Walling if (test_kvm_facility(vcpu->kvm, 139)) 27118fa1696eSCollin L. Walling vcpu->arch.sie_block->ecd |= ECD_MEF; 2712a3da7b4aSChristian Borntraeger if (test_kvm_facility(vcpu->kvm, 156)) 2713a3da7b4aSChristian Borntraeger vcpu->arch.sie_block->ecd |= ECD_ETOKENF; 2714d7c5cb01SMichael Mueller if (vcpu->arch.sie_block->gd) { 2715d7c5cb01SMichael Mueller vcpu->arch.sie_block->eca |= ECA_AIV; 2716d7c5cb01SMichael Mueller VCPU_EVENT(vcpu, 3, "AIV gisa format-%u enabled for cpu %03u", 2717d7c5cb01SMichael Mueller vcpu->arch.sie_block->gd & 0x3, vcpu->vcpu_id); 2718d7c5cb01SMichael Mueller } 27194e0b1ab7SFan Zhang vcpu->arch.sie_block->sdnxo = ((unsigned long) &vcpu->run->s.regs.sdnx) 27204e0b1ab7SFan Zhang | SDNXC; 2721c6e5f166SFan Zhang vcpu->arch.sie_block->riccbd = (unsigned long) &vcpu->run->s.regs.riccb; 2722730cd632SFarhan Ali 2723730cd632SFarhan Ali if (sclp.has_kss) 2724ef8f4f49SDavid Hildenbrand kvm_s390_set_cpuflags(vcpu, CPUSTAT_KSS); 2725730cd632SFarhan Ali else 2726492d8642SThomas Huth vcpu->arch.sie_block->ictl |= ICTL_ISKE | ICTL_SSKE | ICTL_RRBE; 27275a5e6536SMatthew Rosato 2728e6db1d61SDominik Dingel if (vcpu->kvm->arch.use_cmma) { 2729b31605c1SDominik Dingel rc = kvm_s390_vcpu_setup_cmma(vcpu); 2730b31605c1SDominik Dingel if (rc) 2731b31605c1SDominik Dingel return rc; 2732b31288faSKonstantin Weitz } 27330ac96cafSDavid Hildenbrand hrtimer_init(&vcpu->arch.ckc_timer, CLOCK_MONOTONIC, HRTIMER_MODE_REL); 2734ca872302SChristian Borntraeger vcpu->arch.ckc_timer.function = kvm_s390_idle_wakeup; 27359d8d5786SMichael Mueller 27365102ee87STony Krowiak kvm_s390_vcpu_crypto_setup(vcpu); 27375102ee87STony Krowiak 2738b31605c1SDominik Dingel return rc; 2739b0c632dbSHeiko Carstens } 2740b0c632dbSHeiko Carstens 2741b0c632dbSHeiko Carstens struct kvm_vcpu *kvm_arch_vcpu_create(struct kvm *kvm, 2742b0c632dbSHeiko Carstens unsigned int id) 2743b0c632dbSHeiko Carstens { 27444d47555aSCarsten Otte struct kvm_vcpu *vcpu; 27457feb6bb8SMichael Mueller struct sie_page *sie_page; 27464d47555aSCarsten Otte int rc = -EINVAL; 2747b0c632dbSHeiko Carstens 27484215825eSDavid Hildenbrand if (!kvm_is_ucontrol(kvm) && !sca_can_add_vcpu(kvm, id)) 27494d47555aSCarsten Otte goto out; 27504d47555aSCarsten Otte 27514d47555aSCarsten Otte rc = -ENOMEM; 27524d47555aSCarsten Otte 2753b110feafSMichael Mueller vcpu = kmem_cache_zalloc(kvm_vcpu_cache, GFP_KERNEL); 2754b0c632dbSHeiko Carstens if (!vcpu) 27554d47555aSCarsten Otte goto out; 2756b0c632dbSHeiko Carstens 2757da72ca4dSQingFeng Hao BUILD_BUG_ON(sizeof(struct sie_page) != 4096); 27587feb6bb8SMichael Mueller sie_page = (struct sie_page *) get_zeroed_page(GFP_KERNEL); 27597feb6bb8SMichael Mueller if (!sie_page) 2760b0c632dbSHeiko Carstens goto out_free_cpu; 2761b0c632dbSHeiko Carstens 27627feb6bb8SMichael Mueller vcpu->arch.sie_block = &sie_page->sie_block; 27637feb6bb8SMichael Mueller vcpu->arch.sie_block->itdba = (unsigned long) &sie_page->itdb; 27647feb6bb8SMichael Mueller 2765efed1104SDavid Hildenbrand /* the real guest size will always be smaller than msl */ 2766efed1104SDavid Hildenbrand vcpu->arch.sie_block->mso = 0; 2767efed1104SDavid Hildenbrand vcpu->arch.sie_block->msl = sclp.hamax; 2768efed1104SDavid Hildenbrand 2769b0c632dbSHeiko Carstens vcpu->arch.sie_block->icpua = id; 2770ba5c1e9bSCarsten Otte spin_lock_init(&vcpu->arch.local_int.lock); 2771d7c5cb01SMichael Mueller vcpu->arch.sie_block->gd = (u32)(u64)kvm->arch.gisa; 27724b9f9525SMichael Mueller if (vcpu->arch.sie_block->gd && sclp.has_gisaf) 27734b9f9525SMichael Mueller vcpu->arch.sie_block->gd |= GISA_FORMAT1; 27749c23a131SDavid Hildenbrand seqcount_init(&vcpu->arch.cputm_seqcount); 2775ba5c1e9bSCarsten Otte 2776b0c632dbSHeiko Carstens rc = kvm_vcpu_init(vcpu, kvm, id); 2777b0c632dbSHeiko Carstens if (rc) 27789abc2a08SDavid Hildenbrand goto out_free_sie_block; 27798335713aSChristian Borntraeger VM_EVENT(kvm, 3, "create cpu %d at 0x%pK, sie block at 0x%pK", id, vcpu, 2780b0c632dbSHeiko Carstens vcpu->arch.sie_block); 2781ade38c31SCornelia Huck trace_kvm_s390_create_vcpu(id, vcpu, vcpu->arch.sie_block); 2782b0c632dbSHeiko Carstens 2783b0c632dbSHeiko Carstens return vcpu; 27847b06bf2fSWei Yongjun out_free_sie_block: 27857b06bf2fSWei Yongjun free_page((unsigned long)(vcpu->arch.sie_block)); 2786b0c632dbSHeiko Carstens out_free_cpu: 2787b110feafSMichael Mueller kmem_cache_free(kvm_vcpu_cache, vcpu); 27884d47555aSCarsten Otte out: 2789b0c632dbSHeiko Carstens return ERR_PTR(rc); 2790b0c632dbSHeiko Carstens } 2791b0c632dbSHeiko Carstens 2792b0c632dbSHeiko Carstens int kvm_arch_vcpu_runnable(struct kvm_vcpu *vcpu) 2793b0c632dbSHeiko Carstens { 27949a022067SDavid Hildenbrand return kvm_s390_vcpu_has_irq(vcpu, 0); 2795b0c632dbSHeiko Carstens } 2796b0c632dbSHeiko Carstens 2797199b5763SLongpeng(Mike) bool kvm_arch_vcpu_in_kernel(struct kvm_vcpu *vcpu) 2798199b5763SLongpeng(Mike) { 27990546c63dSLongpeng(Mike) return !(vcpu->arch.sie_block->gpsw.mask & PSW_MASK_PSTATE); 2800199b5763SLongpeng(Mike) } 2801199b5763SLongpeng(Mike) 280227406cd5SChristian Borntraeger void kvm_s390_vcpu_block(struct kvm_vcpu *vcpu) 280349b99e1eSChristian Borntraeger { 2804805de8f4SPeter Zijlstra atomic_or(PROG_BLOCK_SIE, &vcpu->arch.sie_block->prog20); 280561a6df54SDavid Hildenbrand exit_sie(vcpu); 280649b99e1eSChristian Borntraeger } 280749b99e1eSChristian Borntraeger 280827406cd5SChristian Borntraeger void kvm_s390_vcpu_unblock(struct kvm_vcpu *vcpu) 280949b99e1eSChristian Borntraeger { 2810805de8f4SPeter Zijlstra atomic_andnot(PROG_BLOCK_SIE, &vcpu->arch.sie_block->prog20); 281149b99e1eSChristian Borntraeger } 281249b99e1eSChristian Borntraeger 28138e236546SChristian Borntraeger static void kvm_s390_vcpu_request(struct kvm_vcpu *vcpu) 28148e236546SChristian Borntraeger { 2815805de8f4SPeter Zijlstra atomic_or(PROG_REQUEST, &vcpu->arch.sie_block->prog20); 281661a6df54SDavid Hildenbrand exit_sie(vcpu); 28178e236546SChristian Borntraeger } 28188e236546SChristian Borntraeger 28199ea59728SDavid Hildenbrand bool kvm_s390_vcpu_sie_inhibited(struct kvm_vcpu *vcpu) 28209ea59728SDavid Hildenbrand { 28219ea59728SDavid Hildenbrand return atomic_read(&vcpu->arch.sie_block->prog20) & 28229ea59728SDavid Hildenbrand (PROG_BLOCK_SIE | PROG_REQUEST); 28239ea59728SDavid Hildenbrand } 28249ea59728SDavid Hildenbrand 28258e236546SChristian Borntraeger static void kvm_s390_vcpu_request_handled(struct kvm_vcpu *vcpu) 28268e236546SChristian Borntraeger { 28279bf9fde2SJason J. Herne atomic_andnot(PROG_REQUEST, &vcpu->arch.sie_block->prog20); 28288e236546SChristian Borntraeger } 28298e236546SChristian Borntraeger 283049b99e1eSChristian Borntraeger /* 28319ea59728SDavid Hildenbrand * Kick a guest cpu out of (v)SIE and wait until (v)SIE is not running. 283249b99e1eSChristian Borntraeger * If the CPU is not running (e.g. waiting as idle) the function will 283349b99e1eSChristian Borntraeger * return immediately. */ 283449b99e1eSChristian Borntraeger void exit_sie(struct kvm_vcpu *vcpu) 283549b99e1eSChristian Borntraeger { 2836ef8f4f49SDavid Hildenbrand kvm_s390_set_cpuflags(vcpu, CPUSTAT_STOP_INT); 28379ea59728SDavid Hildenbrand kvm_s390_vsie_kick(vcpu); 283849b99e1eSChristian Borntraeger while (vcpu->arch.sie_block->prog0c & PROG_IN_SIE) 283949b99e1eSChristian Borntraeger cpu_relax(); 284049b99e1eSChristian Borntraeger } 284149b99e1eSChristian Borntraeger 28428e236546SChristian Borntraeger /* Kick a guest cpu out of SIE to process a request synchronously */ 28438e236546SChristian Borntraeger void kvm_s390_sync_request(int req, struct kvm_vcpu *vcpu) 284449b99e1eSChristian Borntraeger { 28458e236546SChristian Borntraeger kvm_make_request(req, vcpu); 28468e236546SChristian Borntraeger kvm_s390_vcpu_request(vcpu); 284749b99e1eSChristian Borntraeger } 284849b99e1eSChristian Borntraeger 2849414d3b07SMartin Schwidefsky static void kvm_gmap_notifier(struct gmap *gmap, unsigned long start, 2850414d3b07SMartin Schwidefsky unsigned long end) 28512c70fe44SChristian Borntraeger { 28522c70fe44SChristian Borntraeger struct kvm *kvm = gmap->private; 28532c70fe44SChristian Borntraeger struct kvm_vcpu *vcpu; 2854414d3b07SMartin Schwidefsky unsigned long prefix; 2855414d3b07SMartin Schwidefsky int i; 28562c70fe44SChristian Borntraeger 285765d0b0d4SDavid Hildenbrand if (gmap_is_shadow(gmap)) 285865d0b0d4SDavid Hildenbrand return; 2859414d3b07SMartin Schwidefsky if (start >= 1UL << 31) 2860414d3b07SMartin Schwidefsky /* We are only interested in prefix pages */ 2861414d3b07SMartin Schwidefsky return; 28622c70fe44SChristian Borntraeger kvm_for_each_vcpu(i, vcpu, kvm) { 28632c70fe44SChristian Borntraeger /* match against both prefix pages */ 2864414d3b07SMartin Schwidefsky prefix = kvm_s390_get_prefix(vcpu); 2865414d3b07SMartin Schwidefsky if (prefix <= end && start <= prefix + 2*PAGE_SIZE - 1) { 2866414d3b07SMartin Schwidefsky VCPU_EVENT(vcpu, 2, "gmap notifier for %lx-%lx", 2867414d3b07SMartin Schwidefsky start, end); 28688e236546SChristian Borntraeger kvm_s390_sync_request(KVM_REQ_MMU_RELOAD, vcpu); 28692c70fe44SChristian Borntraeger } 28702c70fe44SChristian Borntraeger } 28712c70fe44SChristian Borntraeger } 28722c70fe44SChristian Borntraeger 2873b6d33834SChristoffer Dall int kvm_arch_vcpu_should_kick(struct kvm_vcpu *vcpu) 2874b6d33834SChristoffer Dall { 2875b6d33834SChristoffer Dall /* kvm common code refers to this, but never calls it */ 2876b6d33834SChristoffer Dall BUG(); 2877b6d33834SChristoffer Dall return 0; 2878b6d33834SChristoffer Dall } 2879b6d33834SChristoffer Dall 288014eebd91SCarsten Otte static int kvm_arch_vcpu_ioctl_get_one_reg(struct kvm_vcpu *vcpu, 288114eebd91SCarsten Otte struct kvm_one_reg *reg) 288214eebd91SCarsten Otte { 288314eebd91SCarsten Otte int r = -EINVAL; 288414eebd91SCarsten Otte 288514eebd91SCarsten Otte switch (reg->id) { 288629b7c71bSCarsten Otte case KVM_REG_S390_TODPR: 288729b7c71bSCarsten Otte r = put_user(vcpu->arch.sie_block->todpr, 288829b7c71bSCarsten Otte (u32 __user *)reg->addr); 288929b7c71bSCarsten Otte break; 289029b7c71bSCarsten Otte case KVM_REG_S390_EPOCHDIFF: 289129b7c71bSCarsten Otte r = put_user(vcpu->arch.sie_block->epoch, 289229b7c71bSCarsten Otte (u64 __user *)reg->addr); 289329b7c71bSCarsten Otte break; 289446a6dd1cSJason J. herne case KVM_REG_S390_CPU_TIMER: 28954287f247SDavid Hildenbrand r = put_user(kvm_s390_get_cpu_timer(vcpu), 289646a6dd1cSJason J. herne (u64 __user *)reg->addr); 289746a6dd1cSJason J. herne break; 289846a6dd1cSJason J. herne case KVM_REG_S390_CLOCK_COMP: 289946a6dd1cSJason J. herne r = put_user(vcpu->arch.sie_block->ckc, 290046a6dd1cSJason J. herne (u64 __user *)reg->addr); 290146a6dd1cSJason J. herne break; 2902536336c2SDominik Dingel case KVM_REG_S390_PFTOKEN: 2903536336c2SDominik Dingel r = put_user(vcpu->arch.pfault_token, 2904536336c2SDominik Dingel (u64 __user *)reg->addr); 2905536336c2SDominik Dingel break; 2906536336c2SDominik Dingel case KVM_REG_S390_PFCOMPARE: 2907536336c2SDominik Dingel r = put_user(vcpu->arch.pfault_compare, 2908536336c2SDominik Dingel (u64 __user *)reg->addr); 2909536336c2SDominik Dingel break; 2910536336c2SDominik Dingel case KVM_REG_S390_PFSELECT: 2911536336c2SDominik Dingel r = put_user(vcpu->arch.pfault_select, 2912536336c2SDominik Dingel (u64 __user *)reg->addr); 2913536336c2SDominik Dingel break; 2914672550fbSChristian Borntraeger case KVM_REG_S390_PP: 2915672550fbSChristian Borntraeger r = put_user(vcpu->arch.sie_block->pp, 2916672550fbSChristian Borntraeger (u64 __user *)reg->addr); 2917672550fbSChristian Borntraeger break; 2918afa45ff5SChristian Borntraeger case KVM_REG_S390_GBEA: 2919afa45ff5SChristian Borntraeger r = put_user(vcpu->arch.sie_block->gbea, 2920afa45ff5SChristian Borntraeger (u64 __user *)reg->addr); 2921afa45ff5SChristian Borntraeger break; 292214eebd91SCarsten Otte default: 292314eebd91SCarsten Otte break; 292414eebd91SCarsten Otte } 292514eebd91SCarsten Otte 292614eebd91SCarsten Otte return r; 292714eebd91SCarsten Otte } 292814eebd91SCarsten Otte 292914eebd91SCarsten Otte static int kvm_arch_vcpu_ioctl_set_one_reg(struct kvm_vcpu *vcpu, 293014eebd91SCarsten Otte struct kvm_one_reg *reg) 293114eebd91SCarsten Otte { 293214eebd91SCarsten Otte int r = -EINVAL; 29334287f247SDavid Hildenbrand __u64 val; 293414eebd91SCarsten Otte 293514eebd91SCarsten Otte switch (reg->id) { 293629b7c71bSCarsten Otte case KVM_REG_S390_TODPR: 293729b7c71bSCarsten Otte r = get_user(vcpu->arch.sie_block->todpr, 293829b7c71bSCarsten Otte (u32 __user *)reg->addr); 293929b7c71bSCarsten Otte break; 294029b7c71bSCarsten Otte case KVM_REG_S390_EPOCHDIFF: 294129b7c71bSCarsten Otte r = get_user(vcpu->arch.sie_block->epoch, 294229b7c71bSCarsten Otte (u64 __user *)reg->addr); 294329b7c71bSCarsten Otte break; 294446a6dd1cSJason J. herne case KVM_REG_S390_CPU_TIMER: 29454287f247SDavid Hildenbrand r = get_user(val, (u64 __user *)reg->addr); 29464287f247SDavid Hildenbrand if (!r) 29474287f247SDavid Hildenbrand kvm_s390_set_cpu_timer(vcpu, val); 294846a6dd1cSJason J. herne break; 294946a6dd1cSJason J. herne case KVM_REG_S390_CLOCK_COMP: 295046a6dd1cSJason J. herne r = get_user(vcpu->arch.sie_block->ckc, 295146a6dd1cSJason J. herne (u64 __user *)reg->addr); 295246a6dd1cSJason J. herne break; 2953536336c2SDominik Dingel case KVM_REG_S390_PFTOKEN: 2954536336c2SDominik Dingel r = get_user(vcpu->arch.pfault_token, 2955536336c2SDominik Dingel (u64 __user *)reg->addr); 29569fbd8082SDavid Hildenbrand if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID) 29579fbd8082SDavid Hildenbrand kvm_clear_async_pf_completion_queue(vcpu); 2958536336c2SDominik Dingel break; 2959536336c2SDominik Dingel case KVM_REG_S390_PFCOMPARE: 2960536336c2SDominik Dingel r = get_user(vcpu->arch.pfault_compare, 2961536336c2SDominik Dingel (u64 __user *)reg->addr); 2962536336c2SDominik Dingel break; 2963536336c2SDominik Dingel case KVM_REG_S390_PFSELECT: 2964536336c2SDominik Dingel r = get_user(vcpu->arch.pfault_select, 2965536336c2SDominik Dingel (u64 __user *)reg->addr); 2966536336c2SDominik Dingel break; 2967672550fbSChristian Borntraeger case KVM_REG_S390_PP: 2968672550fbSChristian Borntraeger r = get_user(vcpu->arch.sie_block->pp, 2969672550fbSChristian Borntraeger (u64 __user *)reg->addr); 2970672550fbSChristian Borntraeger break; 2971afa45ff5SChristian Borntraeger case KVM_REG_S390_GBEA: 2972afa45ff5SChristian Borntraeger r = get_user(vcpu->arch.sie_block->gbea, 2973afa45ff5SChristian Borntraeger (u64 __user *)reg->addr); 2974afa45ff5SChristian Borntraeger break; 297514eebd91SCarsten Otte default: 297614eebd91SCarsten Otte break; 297714eebd91SCarsten Otte } 297814eebd91SCarsten Otte 297914eebd91SCarsten Otte return r; 298014eebd91SCarsten Otte } 2981b6d33834SChristoffer Dall 2982b0c632dbSHeiko Carstens static int kvm_arch_vcpu_ioctl_initial_reset(struct kvm_vcpu *vcpu) 2983b0c632dbSHeiko Carstens { 2984b0c632dbSHeiko Carstens kvm_s390_vcpu_initial_reset(vcpu); 2985b0c632dbSHeiko Carstens return 0; 2986b0c632dbSHeiko Carstens } 2987b0c632dbSHeiko Carstens 2988b0c632dbSHeiko Carstens int kvm_arch_vcpu_ioctl_set_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs) 2989b0c632dbSHeiko Carstens { 2990875656feSChristoffer Dall vcpu_load(vcpu); 29915a32c1afSChristian Borntraeger memcpy(&vcpu->run->s.regs.gprs, ®s->gprs, sizeof(regs->gprs)); 2992875656feSChristoffer Dall vcpu_put(vcpu); 2993b0c632dbSHeiko Carstens return 0; 2994b0c632dbSHeiko Carstens } 2995b0c632dbSHeiko Carstens 2996b0c632dbSHeiko Carstens int kvm_arch_vcpu_ioctl_get_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs) 2997b0c632dbSHeiko Carstens { 29981fc9b76bSChristoffer Dall vcpu_load(vcpu); 29995a32c1afSChristian Borntraeger memcpy(®s->gprs, &vcpu->run->s.regs.gprs, sizeof(regs->gprs)); 30001fc9b76bSChristoffer Dall vcpu_put(vcpu); 3001b0c632dbSHeiko Carstens return 0; 3002b0c632dbSHeiko Carstens } 3003b0c632dbSHeiko Carstens 3004b0c632dbSHeiko Carstens int kvm_arch_vcpu_ioctl_set_sregs(struct kvm_vcpu *vcpu, 3005b0c632dbSHeiko Carstens struct kvm_sregs *sregs) 3006b0c632dbSHeiko Carstens { 3007b4ef9d4eSChristoffer Dall vcpu_load(vcpu); 3008b4ef9d4eSChristoffer Dall 300959674c1aSChristian Borntraeger memcpy(&vcpu->run->s.regs.acrs, &sregs->acrs, sizeof(sregs->acrs)); 3010b0c632dbSHeiko Carstens memcpy(&vcpu->arch.sie_block->gcr, &sregs->crs, sizeof(sregs->crs)); 3011b4ef9d4eSChristoffer Dall 3012b4ef9d4eSChristoffer Dall vcpu_put(vcpu); 3013b0c632dbSHeiko Carstens return 0; 3014b0c632dbSHeiko Carstens } 3015b0c632dbSHeiko Carstens 3016b0c632dbSHeiko Carstens int kvm_arch_vcpu_ioctl_get_sregs(struct kvm_vcpu *vcpu, 3017b0c632dbSHeiko Carstens struct kvm_sregs *sregs) 3018b0c632dbSHeiko Carstens { 3019bcdec41cSChristoffer Dall vcpu_load(vcpu); 3020bcdec41cSChristoffer Dall 302159674c1aSChristian Borntraeger memcpy(&sregs->acrs, &vcpu->run->s.regs.acrs, sizeof(sregs->acrs)); 3022b0c632dbSHeiko Carstens memcpy(&sregs->crs, &vcpu->arch.sie_block->gcr, sizeof(sregs->crs)); 3023bcdec41cSChristoffer Dall 3024bcdec41cSChristoffer Dall vcpu_put(vcpu); 3025b0c632dbSHeiko Carstens return 0; 3026b0c632dbSHeiko Carstens } 3027b0c632dbSHeiko Carstens 3028b0c632dbSHeiko Carstens int kvm_arch_vcpu_ioctl_set_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu) 3029b0c632dbSHeiko Carstens { 30306a96bc7fSChristoffer Dall int ret = 0; 30316a96bc7fSChristoffer Dall 30326a96bc7fSChristoffer Dall vcpu_load(vcpu); 30336a96bc7fSChristoffer Dall 30346a96bc7fSChristoffer Dall if (test_fp_ctl(fpu->fpc)) { 30356a96bc7fSChristoffer Dall ret = -EINVAL; 30366a96bc7fSChristoffer Dall goto out; 30376a96bc7fSChristoffer Dall } 3038e1788bb9SChristian Borntraeger vcpu->run->s.regs.fpc = fpu->fpc; 30399abc2a08SDavid Hildenbrand if (MACHINE_HAS_VX) 3040a7d4b8f2SDavid Hildenbrand convert_fp_to_vx((__vector128 *) vcpu->run->s.regs.vrs, 3041a7d4b8f2SDavid Hildenbrand (freg_t *) fpu->fprs); 30429abc2a08SDavid Hildenbrand else 3043a7d4b8f2SDavid Hildenbrand memcpy(vcpu->run->s.regs.fprs, &fpu->fprs, sizeof(fpu->fprs)); 30446a96bc7fSChristoffer Dall 30456a96bc7fSChristoffer Dall out: 30466a96bc7fSChristoffer Dall vcpu_put(vcpu); 30476a96bc7fSChristoffer Dall return ret; 3048b0c632dbSHeiko Carstens } 3049b0c632dbSHeiko Carstens 3050b0c632dbSHeiko Carstens int kvm_arch_vcpu_ioctl_get_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu) 3051b0c632dbSHeiko Carstens { 30521393123eSChristoffer Dall vcpu_load(vcpu); 30531393123eSChristoffer Dall 30549abc2a08SDavid Hildenbrand /* make sure we have the latest values */ 30559abc2a08SDavid Hildenbrand save_fpu_regs(); 30569abc2a08SDavid Hildenbrand if (MACHINE_HAS_VX) 3057a7d4b8f2SDavid Hildenbrand convert_vx_to_fp((freg_t *) fpu->fprs, 3058a7d4b8f2SDavid Hildenbrand (__vector128 *) vcpu->run->s.regs.vrs); 30599abc2a08SDavid Hildenbrand else 3060a7d4b8f2SDavid Hildenbrand memcpy(fpu->fprs, vcpu->run->s.regs.fprs, sizeof(fpu->fprs)); 3061e1788bb9SChristian Borntraeger fpu->fpc = vcpu->run->s.regs.fpc; 30621393123eSChristoffer Dall 30631393123eSChristoffer Dall vcpu_put(vcpu); 3064b0c632dbSHeiko Carstens return 0; 3065b0c632dbSHeiko Carstens } 3066b0c632dbSHeiko Carstens 3067b0c632dbSHeiko Carstens static int kvm_arch_vcpu_ioctl_set_initial_psw(struct kvm_vcpu *vcpu, psw_t psw) 3068b0c632dbSHeiko Carstens { 3069b0c632dbSHeiko Carstens int rc = 0; 3070b0c632dbSHeiko Carstens 30717a42fdc2SDavid Hildenbrand if (!is_vcpu_stopped(vcpu)) 3072b0c632dbSHeiko Carstens rc = -EBUSY; 3073d7b0b5ebSCarsten Otte else { 3074d7b0b5ebSCarsten Otte vcpu->run->psw_mask = psw.mask; 3075d7b0b5ebSCarsten Otte vcpu->run->psw_addr = psw.addr; 3076d7b0b5ebSCarsten Otte } 3077b0c632dbSHeiko Carstens return rc; 3078b0c632dbSHeiko Carstens } 3079b0c632dbSHeiko Carstens 3080b0c632dbSHeiko Carstens int kvm_arch_vcpu_ioctl_translate(struct kvm_vcpu *vcpu, 3081b0c632dbSHeiko Carstens struct kvm_translation *tr) 3082b0c632dbSHeiko Carstens { 3083b0c632dbSHeiko Carstens return -EINVAL; /* not implemented yet */ 3084b0c632dbSHeiko Carstens } 3085b0c632dbSHeiko Carstens 308627291e21SDavid Hildenbrand #define VALID_GUESTDBG_FLAGS (KVM_GUESTDBG_SINGLESTEP | \ 308727291e21SDavid Hildenbrand KVM_GUESTDBG_USE_HW_BP | \ 308827291e21SDavid Hildenbrand KVM_GUESTDBG_ENABLE) 308927291e21SDavid Hildenbrand 3090d0bfb940SJan Kiszka int kvm_arch_vcpu_ioctl_set_guest_debug(struct kvm_vcpu *vcpu, 3091d0bfb940SJan Kiszka struct kvm_guest_debug *dbg) 3092b0c632dbSHeiko Carstens { 309327291e21SDavid Hildenbrand int rc = 0; 309427291e21SDavid Hildenbrand 309566b56562SChristoffer Dall vcpu_load(vcpu); 309666b56562SChristoffer Dall 309727291e21SDavid Hildenbrand vcpu->guest_debug = 0; 309827291e21SDavid Hildenbrand kvm_s390_clear_bp_data(vcpu); 309927291e21SDavid Hildenbrand 310066b56562SChristoffer Dall if (dbg->control & ~VALID_GUESTDBG_FLAGS) { 310166b56562SChristoffer Dall rc = -EINVAL; 310266b56562SChristoffer Dall goto out; 310366b56562SChristoffer Dall } 310466b56562SChristoffer Dall if (!sclp.has_gpere) { 310566b56562SChristoffer Dall rc = -EINVAL; 310666b56562SChristoffer Dall goto out; 310766b56562SChristoffer Dall } 310827291e21SDavid Hildenbrand 310927291e21SDavid Hildenbrand if (dbg->control & KVM_GUESTDBG_ENABLE) { 311027291e21SDavid Hildenbrand vcpu->guest_debug = dbg->control; 311127291e21SDavid Hildenbrand /* enforce guest PER */ 3112ef8f4f49SDavid Hildenbrand kvm_s390_set_cpuflags(vcpu, CPUSTAT_P); 311327291e21SDavid Hildenbrand 311427291e21SDavid Hildenbrand if (dbg->control & KVM_GUESTDBG_USE_HW_BP) 311527291e21SDavid Hildenbrand rc = kvm_s390_import_bp_data(vcpu, dbg); 311627291e21SDavid Hildenbrand } else { 31179daecfc6SDavid Hildenbrand kvm_s390_clear_cpuflags(vcpu, CPUSTAT_P); 311827291e21SDavid Hildenbrand vcpu->arch.guestdbg.last_bp = 0; 311927291e21SDavid Hildenbrand } 312027291e21SDavid Hildenbrand 312127291e21SDavid Hildenbrand if (rc) { 312227291e21SDavid Hildenbrand vcpu->guest_debug = 0; 312327291e21SDavid Hildenbrand kvm_s390_clear_bp_data(vcpu); 31249daecfc6SDavid Hildenbrand kvm_s390_clear_cpuflags(vcpu, CPUSTAT_P); 312527291e21SDavid Hildenbrand } 312627291e21SDavid Hildenbrand 312766b56562SChristoffer Dall out: 312866b56562SChristoffer Dall vcpu_put(vcpu); 312927291e21SDavid Hildenbrand return rc; 3130b0c632dbSHeiko Carstens } 3131b0c632dbSHeiko Carstens 313262d9f0dbSMarcelo Tosatti int kvm_arch_vcpu_ioctl_get_mpstate(struct kvm_vcpu *vcpu, 313362d9f0dbSMarcelo Tosatti struct kvm_mp_state *mp_state) 313462d9f0dbSMarcelo Tosatti { 3135fd232561SChristoffer Dall int ret; 3136fd232561SChristoffer Dall 3137fd232561SChristoffer Dall vcpu_load(vcpu); 3138fd232561SChristoffer Dall 31396352e4d2SDavid Hildenbrand /* CHECK_STOP and LOAD are not supported yet */ 3140fd232561SChristoffer Dall ret = is_vcpu_stopped(vcpu) ? KVM_MP_STATE_STOPPED : 31416352e4d2SDavid Hildenbrand KVM_MP_STATE_OPERATING; 3142fd232561SChristoffer Dall 3143fd232561SChristoffer Dall vcpu_put(vcpu); 3144fd232561SChristoffer Dall return ret; 314562d9f0dbSMarcelo Tosatti } 314662d9f0dbSMarcelo Tosatti 314762d9f0dbSMarcelo Tosatti int kvm_arch_vcpu_ioctl_set_mpstate(struct kvm_vcpu *vcpu, 314862d9f0dbSMarcelo Tosatti struct kvm_mp_state *mp_state) 314962d9f0dbSMarcelo Tosatti { 31506352e4d2SDavid Hildenbrand int rc = 0; 31516352e4d2SDavid Hildenbrand 3152e83dff5eSChristoffer Dall vcpu_load(vcpu); 3153e83dff5eSChristoffer Dall 31546352e4d2SDavid Hildenbrand /* user space knows about this interface - let it control the state */ 31556352e4d2SDavid Hildenbrand vcpu->kvm->arch.user_cpu_state_ctrl = 1; 31566352e4d2SDavid Hildenbrand 31576352e4d2SDavid Hildenbrand switch (mp_state->mp_state) { 31586352e4d2SDavid Hildenbrand case KVM_MP_STATE_STOPPED: 31596352e4d2SDavid Hildenbrand kvm_s390_vcpu_stop(vcpu); 31606352e4d2SDavid Hildenbrand break; 31616352e4d2SDavid Hildenbrand case KVM_MP_STATE_OPERATING: 31626352e4d2SDavid Hildenbrand kvm_s390_vcpu_start(vcpu); 31636352e4d2SDavid Hildenbrand break; 31646352e4d2SDavid Hildenbrand case KVM_MP_STATE_LOAD: 31656352e4d2SDavid Hildenbrand case KVM_MP_STATE_CHECK_STOP: 31666352e4d2SDavid Hildenbrand /* fall through - CHECK_STOP and LOAD are not supported yet */ 31676352e4d2SDavid Hildenbrand default: 31686352e4d2SDavid Hildenbrand rc = -ENXIO; 31696352e4d2SDavid Hildenbrand } 31706352e4d2SDavid Hildenbrand 3171e83dff5eSChristoffer Dall vcpu_put(vcpu); 31726352e4d2SDavid Hildenbrand return rc; 317362d9f0dbSMarcelo Tosatti } 317462d9f0dbSMarcelo Tosatti 31758ad35755SDavid Hildenbrand static bool ibs_enabled(struct kvm_vcpu *vcpu) 31768ad35755SDavid Hildenbrand { 31778d5fb0dcSDavid Hildenbrand return kvm_s390_test_cpuflags(vcpu, CPUSTAT_IBS); 31788ad35755SDavid Hildenbrand } 31798ad35755SDavid Hildenbrand 31802c70fe44SChristian Borntraeger static int kvm_s390_handle_requests(struct kvm_vcpu *vcpu) 31812c70fe44SChristian Borntraeger { 31828ad35755SDavid Hildenbrand retry: 31838e236546SChristian Borntraeger kvm_s390_vcpu_request_handled(vcpu); 31842fa6e1e1SRadim Krčmář if (!kvm_request_pending(vcpu)) 3185586b7ccdSChristian Borntraeger return 0; 31862c70fe44SChristian Borntraeger /* 31872c70fe44SChristian Borntraeger * We use MMU_RELOAD just to re-arm the ipte notifier for the 3188b2d73b2aSMartin Schwidefsky * guest prefix page. gmap_mprotect_notify will wait on the ptl lock. 31892c70fe44SChristian Borntraeger * This ensures that the ipte instruction for this request has 31902c70fe44SChristian Borntraeger * already finished. We might race against a second unmapper that 31912c70fe44SChristian Borntraeger * wants to set the blocking bit. Lets just retry the request loop. 31922c70fe44SChristian Borntraeger */ 31938ad35755SDavid Hildenbrand if (kvm_check_request(KVM_REQ_MMU_RELOAD, vcpu)) { 31942c70fe44SChristian Borntraeger int rc; 3195b2d73b2aSMartin Schwidefsky rc = gmap_mprotect_notify(vcpu->arch.gmap, 3196fda902cbSMichael Mueller kvm_s390_get_prefix(vcpu), 3197b2d73b2aSMartin Schwidefsky PAGE_SIZE * 2, PROT_WRITE); 3198aca411a4SJulius Niedworok if (rc) { 3199aca411a4SJulius Niedworok kvm_make_request(KVM_REQ_MMU_RELOAD, vcpu); 32002c70fe44SChristian Borntraeger return rc; 3201aca411a4SJulius Niedworok } 32028ad35755SDavid Hildenbrand goto retry; 32032c70fe44SChristian Borntraeger } 32048ad35755SDavid Hildenbrand 3205d3d692c8SDavid Hildenbrand if (kvm_check_request(KVM_REQ_TLB_FLUSH, vcpu)) { 3206d3d692c8SDavid Hildenbrand vcpu->arch.sie_block->ihcpu = 0xffff; 3207d3d692c8SDavid Hildenbrand goto retry; 3208d3d692c8SDavid Hildenbrand } 3209d3d692c8SDavid Hildenbrand 32108ad35755SDavid Hildenbrand if (kvm_check_request(KVM_REQ_ENABLE_IBS, vcpu)) { 32118ad35755SDavid Hildenbrand if (!ibs_enabled(vcpu)) { 32128ad35755SDavid Hildenbrand trace_kvm_s390_enable_disable_ibs(vcpu->vcpu_id, 1); 3213ef8f4f49SDavid Hildenbrand kvm_s390_set_cpuflags(vcpu, CPUSTAT_IBS); 32148ad35755SDavid Hildenbrand } 32158ad35755SDavid Hildenbrand goto retry; 32168ad35755SDavid Hildenbrand } 32178ad35755SDavid Hildenbrand 32188ad35755SDavid Hildenbrand if (kvm_check_request(KVM_REQ_DISABLE_IBS, vcpu)) { 32198ad35755SDavid Hildenbrand if (ibs_enabled(vcpu)) { 32208ad35755SDavid Hildenbrand trace_kvm_s390_enable_disable_ibs(vcpu->vcpu_id, 0); 32219daecfc6SDavid Hildenbrand kvm_s390_clear_cpuflags(vcpu, CPUSTAT_IBS); 32228ad35755SDavid Hildenbrand } 32238ad35755SDavid Hildenbrand goto retry; 32248ad35755SDavid Hildenbrand } 32258ad35755SDavid Hildenbrand 32266502a34cSDavid Hildenbrand if (kvm_check_request(KVM_REQ_ICPT_OPEREXC, vcpu)) { 32276502a34cSDavid Hildenbrand vcpu->arch.sie_block->ictl |= ICTL_OPEREXC; 32286502a34cSDavid Hildenbrand goto retry; 32296502a34cSDavid Hildenbrand } 32306502a34cSDavid Hildenbrand 3231190df4a2SClaudio Imbrenda if (kvm_check_request(KVM_REQ_START_MIGRATION, vcpu)) { 3232190df4a2SClaudio Imbrenda /* 3233c9f0a2b8SJanosch Frank * Disable CMM virtualization; we will emulate the ESSA 3234190df4a2SClaudio Imbrenda * instruction manually, in order to provide additional 3235190df4a2SClaudio Imbrenda * functionalities needed for live migration. 3236190df4a2SClaudio Imbrenda */ 3237190df4a2SClaudio Imbrenda vcpu->arch.sie_block->ecb2 &= ~ECB2_CMMA; 3238190df4a2SClaudio Imbrenda goto retry; 3239190df4a2SClaudio Imbrenda } 3240190df4a2SClaudio Imbrenda 3241190df4a2SClaudio Imbrenda if (kvm_check_request(KVM_REQ_STOP_MIGRATION, vcpu)) { 3242190df4a2SClaudio Imbrenda /* 3243c9f0a2b8SJanosch Frank * Re-enable CMM virtualization if CMMA is available and 3244c9f0a2b8SJanosch Frank * CMM has been used. 3245190df4a2SClaudio Imbrenda */ 3246190df4a2SClaudio Imbrenda if ((vcpu->kvm->arch.use_cmma) && 3247c9f0a2b8SJanosch Frank (vcpu->kvm->mm->context.uses_cmm)) 3248190df4a2SClaudio Imbrenda vcpu->arch.sie_block->ecb2 |= ECB2_CMMA; 3249190df4a2SClaudio Imbrenda goto retry; 3250190df4a2SClaudio Imbrenda } 3251190df4a2SClaudio Imbrenda 32520759d068SDavid Hildenbrand /* nothing to do, just clear the request */ 325372875d8aSRadim Krčmář kvm_clear_request(KVM_REQ_UNHALT, vcpu); 32543194cdb7SDavid Hildenbrand /* we left the vsie handler, nothing to do, just clear the request */ 32553194cdb7SDavid Hildenbrand kvm_clear_request(KVM_REQ_VSIE_RESTART, vcpu); 32560759d068SDavid Hildenbrand 32572c70fe44SChristian Borntraeger return 0; 32582c70fe44SChristian Borntraeger } 32592c70fe44SChristian Borntraeger 32600e7def5fSDavid Hildenbrand void kvm_s390_set_tod_clock(struct kvm *kvm, 32618fa1696eSCollin L. Walling const struct kvm_s390_vm_tod_clock *gtod) 32628fa1696eSCollin L. Walling { 32638fa1696eSCollin L. Walling struct kvm_vcpu *vcpu; 32648fa1696eSCollin L. Walling struct kvm_s390_tod_clock_ext htod; 32658fa1696eSCollin L. Walling int i; 32668fa1696eSCollin L. Walling 32678fa1696eSCollin L. Walling mutex_lock(&kvm->lock); 32688fa1696eSCollin L. Walling preempt_disable(); 32698fa1696eSCollin L. Walling 32708fa1696eSCollin L. Walling get_tod_clock_ext((char *)&htod); 32718fa1696eSCollin L. Walling 32728fa1696eSCollin L. Walling kvm->arch.epoch = gtod->tod - htod.tod; 32730e7def5fSDavid Hildenbrand kvm->arch.epdx = 0; 32740e7def5fSDavid Hildenbrand if (test_kvm_facility(kvm, 139)) { 32758fa1696eSCollin L. Walling kvm->arch.epdx = gtod->epoch_idx - htod.epoch_idx; 32768fa1696eSCollin L. Walling if (kvm->arch.epoch > gtod->tod) 32778fa1696eSCollin L. Walling kvm->arch.epdx -= 1; 32780e7def5fSDavid Hildenbrand } 32798fa1696eSCollin L. Walling 32808fa1696eSCollin L. Walling kvm_s390_vcpu_block_all(kvm); 32818fa1696eSCollin L. Walling kvm_for_each_vcpu(i, vcpu, kvm) { 32828fa1696eSCollin L. Walling vcpu->arch.sie_block->epoch = kvm->arch.epoch; 32838fa1696eSCollin L. Walling vcpu->arch.sie_block->epdx = kvm->arch.epdx; 32848fa1696eSCollin L. Walling } 32858fa1696eSCollin L. Walling 32868fa1696eSCollin L. Walling kvm_s390_vcpu_unblock_all(kvm); 32878fa1696eSCollin L. Walling preempt_enable(); 32888fa1696eSCollin L. Walling mutex_unlock(&kvm->lock); 32898fa1696eSCollin L. Walling } 32908fa1696eSCollin L. Walling 3291fa576c58SThomas Huth /** 3292fa576c58SThomas Huth * kvm_arch_fault_in_page - fault-in guest page if necessary 3293fa576c58SThomas Huth * @vcpu: The corresponding virtual cpu 3294fa576c58SThomas Huth * @gpa: Guest physical address 3295fa576c58SThomas Huth * @writable: Whether the page should be writable or not 3296fa576c58SThomas Huth * 3297fa576c58SThomas Huth * Make sure that a guest page has been faulted-in on the host. 3298fa576c58SThomas Huth * 3299fa576c58SThomas Huth * Return: Zero on success, negative error code otherwise. 3300fa576c58SThomas Huth */ 3301fa576c58SThomas Huth long kvm_arch_fault_in_page(struct kvm_vcpu *vcpu, gpa_t gpa, int writable) 330224eb3a82SDominik Dingel { 3303527e30b4SMartin Schwidefsky return gmap_fault(vcpu->arch.gmap, gpa, 3304527e30b4SMartin Schwidefsky writable ? FAULT_FLAG_WRITE : 0); 330524eb3a82SDominik Dingel } 330624eb3a82SDominik Dingel 33073c038e6bSDominik Dingel static void __kvm_inject_pfault_token(struct kvm_vcpu *vcpu, bool start_token, 33083c038e6bSDominik Dingel unsigned long token) 33093c038e6bSDominik Dingel { 33103c038e6bSDominik Dingel struct kvm_s390_interrupt inti; 3311383d0b05SJens Freimann struct kvm_s390_irq irq; 33123c038e6bSDominik Dingel 33133c038e6bSDominik Dingel if (start_token) { 3314383d0b05SJens Freimann irq.u.ext.ext_params2 = token; 3315383d0b05SJens Freimann irq.type = KVM_S390_INT_PFAULT_INIT; 3316383d0b05SJens Freimann WARN_ON_ONCE(kvm_s390_inject_vcpu(vcpu, &irq)); 33173c038e6bSDominik Dingel } else { 33183c038e6bSDominik Dingel inti.type = KVM_S390_INT_PFAULT_DONE; 3319383d0b05SJens Freimann inti.parm64 = token; 33203c038e6bSDominik Dingel WARN_ON_ONCE(kvm_s390_inject_vm(vcpu->kvm, &inti)); 33213c038e6bSDominik Dingel } 33223c038e6bSDominik Dingel } 33233c038e6bSDominik Dingel 33243c038e6bSDominik Dingel void kvm_arch_async_page_not_present(struct kvm_vcpu *vcpu, 33253c038e6bSDominik Dingel struct kvm_async_pf *work) 33263c038e6bSDominik Dingel { 33273c038e6bSDominik Dingel trace_kvm_s390_pfault_init(vcpu, work->arch.pfault_token); 33283c038e6bSDominik Dingel __kvm_inject_pfault_token(vcpu, true, work->arch.pfault_token); 33293c038e6bSDominik Dingel } 33303c038e6bSDominik Dingel 33313c038e6bSDominik Dingel void kvm_arch_async_page_present(struct kvm_vcpu *vcpu, 33323c038e6bSDominik Dingel struct kvm_async_pf *work) 33333c038e6bSDominik Dingel { 33343c038e6bSDominik Dingel trace_kvm_s390_pfault_done(vcpu, work->arch.pfault_token); 33353c038e6bSDominik Dingel __kvm_inject_pfault_token(vcpu, false, work->arch.pfault_token); 33363c038e6bSDominik Dingel } 33373c038e6bSDominik Dingel 33383c038e6bSDominik Dingel void kvm_arch_async_page_ready(struct kvm_vcpu *vcpu, 33393c038e6bSDominik Dingel struct kvm_async_pf *work) 33403c038e6bSDominik Dingel { 33413c038e6bSDominik Dingel /* s390 will always inject the page directly */ 33423c038e6bSDominik Dingel } 33433c038e6bSDominik Dingel 33443c038e6bSDominik Dingel bool kvm_arch_can_inject_async_page_present(struct kvm_vcpu *vcpu) 33453c038e6bSDominik Dingel { 33463c038e6bSDominik Dingel /* 33473c038e6bSDominik Dingel * s390 will always inject the page directly, 33483c038e6bSDominik Dingel * but we still want check_async_completion to cleanup 33493c038e6bSDominik Dingel */ 33503c038e6bSDominik Dingel return true; 33513c038e6bSDominik Dingel } 33523c038e6bSDominik Dingel 33533c038e6bSDominik Dingel static int kvm_arch_setup_async_pf(struct kvm_vcpu *vcpu) 33543c038e6bSDominik Dingel { 33553c038e6bSDominik Dingel hva_t hva; 33563c038e6bSDominik Dingel struct kvm_arch_async_pf arch; 33573c038e6bSDominik Dingel int rc; 33583c038e6bSDominik Dingel 33593c038e6bSDominik Dingel if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID) 33603c038e6bSDominik Dingel return 0; 33613c038e6bSDominik Dingel if ((vcpu->arch.sie_block->gpsw.mask & vcpu->arch.pfault_select) != 33623c038e6bSDominik Dingel vcpu->arch.pfault_compare) 33633c038e6bSDominik Dingel return 0; 33643c038e6bSDominik Dingel if (psw_extint_disabled(vcpu)) 33653c038e6bSDominik Dingel return 0; 33669a022067SDavid Hildenbrand if (kvm_s390_vcpu_has_irq(vcpu, 0)) 33673c038e6bSDominik Dingel return 0; 3368b9224cd7SDavid Hildenbrand if (!(vcpu->arch.sie_block->gcr[0] & CR0_SERVICE_SIGNAL_SUBMASK)) 33693c038e6bSDominik Dingel return 0; 33703c038e6bSDominik Dingel if (!vcpu->arch.gmap->pfault_enabled) 33713c038e6bSDominik Dingel return 0; 33723c038e6bSDominik Dingel 337381480cc1SHeiko Carstens hva = gfn_to_hva(vcpu->kvm, gpa_to_gfn(current->thread.gmap_addr)); 337481480cc1SHeiko Carstens hva += current->thread.gmap_addr & ~PAGE_MASK; 337581480cc1SHeiko Carstens if (read_guest_real(vcpu, vcpu->arch.pfault_token, &arch.pfault_token, 8)) 33763c038e6bSDominik Dingel return 0; 33773c038e6bSDominik Dingel 33783c038e6bSDominik Dingel rc = kvm_setup_async_pf(vcpu, current->thread.gmap_addr, hva, &arch); 33793c038e6bSDominik Dingel return rc; 33803c038e6bSDominik Dingel } 33813c038e6bSDominik Dingel 33823fb4c40fSThomas Huth static int vcpu_pre_run(struct kvm_vcpu *vcpu) 3383b0c632dbSHeiko Carstens { 33843fb4c40fSThomas Huth int rc, cpuflags; 3385e168bf8dSCarsten Otte 33863c038e6bSDominik Dingel /* 33873c038e6bSDominik Dingel * On s390 notifications for arriving pages will be delivered directly 33883c038e6bSDominik Dingel * to the guest but the house keeping for completed pfaults is 33893c038e6bSDominik Dingel * handled outside the worker. 33903c038e6bSDominik Dingel */ 33913c038e6bSDominik Dingel kvm_check_async_pf_completion(vcpu); 33923c038e6bSDominik Dingel 33937ec7c8c7SChristian Borntraeger vcpu->arch.sie_block->gg14 = vcpu->run->s.regs.gprs[14]; 33947ec7c8c7SChristian Borntraeger vcpu->arch.sie_block->gg15 = vcpu->run->s.regs.gprs[15]; 3395b0c632dbSHeiko Carstens 3396b0c632dbSHeiko Carstens if (need_resched()) 3397b0c632dbSHeiko Carstens schedule(); 3398b0c632dbSHeiko Carstens 3399d3a73acbSMartin Schwidefsky if (test_cpu_flag(CIF_MCCK_PENDING)) 340071cde587SChristian Borntraeger s390_handle_mcck(); 340171cde587SChristian Borntraeger 340279395031SJens Freimann if (!kvm_is_ucontrol(vcpu->kvm)) { 340379395031SJens Freimann rc = kvm_s390_deliver_pending_interrupts(vcpu); 340479395031SJens Freimann if (rc) 340579395031SJens Freimann return rc; 340679395031SJens Freimann } 34070ff31867SCarsten Otte 34082c70fe44SChristian Borntraeger rc = kvm_s390_handle_requests(vcpu); 34092c70fe44SChristian Borntraeger if (rc) 34102c70fe44SChristian Borntraeger return rc; 34112c70fe44SChristian Borntraeger 341227291e21SDavid Hildenbrand if (guestdbg_enabled(vcpu)) { 341327291e21SDavid Hildenbrand kvm_s390_backup_guest_per_regs(vcpu); 341427291e21SDavid Hildenbrand kvm_s390_patch_guest_per_regs(vcpu); 341527291e21SDavid Hildenbrand } 341627291e21SDavid Hildenbrand 3417b0c632dbSHeiko Carstens vcpu->arch.sie_block->icptcode = 0; 34183fb4c40fSThomas Huth cpuflags = atomic_read(&vcpu->arch.sie_block->cpuflags); 34193fb4c40fSThomas Huth VCPU_EVENT(vcpu, 6, "entering sie flags %x", cpuflags); 34203fb4c40fSThomas Huth trace_kvm_s390_sie_enter(vcpu, cpuflags); 34212b29a9fdSDominik Dingel 34223fb4c40fSThomas Huth return 0; 34233fb4c40fSThomas Huth } 34243fb4c40fSThomas Huth 3425492d8642SThomas Huth static int vcpu_post_run_fault_in_sie(struct kvm_vcpu *vcpu) 3426492d8642SThomas Huth { 342756317920SDavid Hildenbrand struct kvm_s390_pgm_info pgm_info = { 342856317920SDavid Hildenbrand .code = PGM_ADDRESSING, 342956317920SDavid Hildenbrand }; 343056317920SDavid Hildenbrand u8 opcode, ilen; 3431492d8642SThomas Huth int rc; 3432492d8642SThomas Huth 3433492d8642SThomas Huth VCPU_EVENT(vcpu, 3, "%s", "fault in sie instruction"); 3434492d8642SThomas Huth trace_kvm_s390_sie_fault(vcpu); 3435492d8642SThomas Huth 3436492d8642SThomas Huth /* 3437492d8642SThomas Huth * We want to inject an addressing exception, which is defined as a 3438492d8642SThomas Huth * suppressing or terminating exception. However, since we came here 3439492d8642SThomas Huth * by a DAT access exception, the PSW still points to the faulting 3440492d8642SThomas Huth * instruction since DAT exceptions are nullifying. So we've got 3441492d8642SThomas Huth * to look up the current opcode to get the length of the instruction 3442492d8642SThomas Huth * to be able to forward the PSW. 3443492d8642SThomas Huth */ 34443fa8cad7SDavid Hildenbrand rc = read_guest_instr(vcpu, vcpu->arch.sie_block->gpsw.addr, &opcode, 1); 344556317920SDavid Hildenbrand ilen = insn_length(opcode); 34469b0d721aSDavid Hildenbrand if (rc < 0) { 34479b0d721aSDavid Hildenbrand return rc; 34489b0d721aSDavid Hildenbrand } else if (rc) { 34499b0d721aSDavid Hildenbrand /* Instruction-Fetching Exceptions - we can't detect the ilen. 34509b0d721aSDavid Hildenbrand * Forward by arbitrary ilc, injection will take care of 34519b0d721aSDavid Hildenbrand * nullification if necessary. 34529b0d721aSDavid Hildenbrand */ 34539b0d721aSDavid Hildenbrand pgm_info = vcpu->arch.pgm; 34549b0d721aSDavid Hildenbrand ilen = 4; 34559b0d721aSDavid Hildenbrand } 345656317920SDavid Hildenbrand pgm_info.flags = ilen | KVM_S390_PGM_FLAGS_ILC_VALID; 345756317920SDavid Hildenbrand kvm_s390_forward_psw(vcpu, ilen); 345856317920SDavid Hildenbrand return kvm_s390_inject_prog_irq(vcpu, &pgm_info); 3459492d8642SThomas Huth } 3460492d8642SThomas Huth 34613fb4c40fSThomas Huth static int vcpu_post_run(struct kvm_vcpu *vcpu, int exit_reason) 34623fb4c40fSThomas Huth { 34634d62fcc0SQingFeng Hao struct mcck_volatile_info *mcck_info; 34644d62fcc0SQingFeng Hao struct sie_page *sie_page; 34654d62fcc0SQingFeng Hao 34662b29a9fdSDominik Dingel VCPU_EVENT(vcpu, 6, "exit sie icptcode %d", 34672b29a9fdSDominik Dingel vcpu->arch.sie_block->icptcode); 34682b29a9fdSDominik Dingel trace_kvm_s390_sie_exit(vcpu, vcpu->arch.sie_block->icptcode); 34692b29a9fdSDominik Dingel 347027291e21SDavid Hildenbrand if (guestdbg_enabled(vcpu)) 347127291e21SDavid Hildenbrand kvm_s390_restore_guest_per_regs(vcpu); 347227291e21SDavid Hildenbrand 34737ec7c8c7SChristian Borntraeger vcpu->run->s.regs.gprs[14] = vcpu->arch.sie_block->gg14; 34747ec7c8c7SChristian Borntraeger vcpu->run->s.regs.gprs[15] = vcpu->arch.sie_block->gg15; 347571f116bfSDavid Hildenbrand 34764d62fcc0SQingFeng Hao if (exit_reason == -EINTR) { 34774d62fcc0SQingFeng Hao VCPU_EVENT(vcpu, 3, "%s", "machine check"); 34784d62fcc0SQingFeng Hao sie_page = container_of(vcpu->arch.sie_block, 34794d62fcc0SQingFeng Hao struct sie_page, sie_block); 34804d62fcc0SQingFeng Hao mcck_info = &sie_page->mcck_info; 34814d62fcc0SQingFeng Hao kvm_s390_reinject_machine_check(vcpu, mcck_info); 34824d62fcc0SQingFeng Hao return 0; 34834d62fcc0SQingFeng Hao } 34844d62fcc0SQingFeng Hao 348571f116bfSDavid Hildenbrand if (vcpu->arch.sie_block->icptcode > 0) { 348671f116bfSDavid Hildenbrand int rc = kvm_handle_sie_intercept(vcpu); 348771f116bfSDavid Hildenbrand 348871f116bfSDavid Hildenbrand if (rc != -EOPNOTSUPP) 348971f116bfSDavid Hildenbrand return rc; 349071f116bfSDavid Hildenbrand vcpu->run->exit_reason = KVM_EXIT_S390_SIEIC; 349171f116bfSDavid Hildenbrand vcpu->run->s390_sieic.icptcode = vcpu->arch.sie_block->icptcode; 349271f116bfSDavid Hildenbrand vcpu->run->s390_sieic.ipa = vcpu->arch.sie_block->ipa; 349371f116bfSDavid Hildenbrand vcpu->run->s390_sieic.ipb = vcpu->arch.sie_block->ipb; 349471f116bfSDavid Hildenbrand return -EREMOTE; 349571f116bfSDavid Hildenbrand } else if (exit_reason != -EFAULT) { 349671f116bfSDavid Hildenbrand vcpu->stat.exit_null++; 349771f116bfSDavid Hildenbrand return 0; 3498210b1607SThomas Huth } else if (kvm_is_ucontrol(vcpu->kvm)) { 3499210b1607SThomas Huth vcpu->run->exit_reason = KVM_EXIT_S390_UCONTROL; 3500210b1607SThomas Huth vcpu->run->s390_ucontrol.trans_exc_code = 3501210b1607SThomas Huth current->thread.gmap_addr; 3502210b1607SThomas Huth vcpu->run->s390_ucontrol.pgm_code = 0x10; 350371f116bfSDavid Hildenbrand return -EREMOTE; 350424eb3a82SDominik Dingel } else if (current->thread.gmap_pfault) { 35053c038e6bSDominik Dingel trace_kvm_s390_major_guest_pfault(vcpu); 350624eb3a82SDominik Dingel current->thread.gmap_pfault = 0; 350771f116bfSDavid Hildenbrand if (kvm_arch_setup_async_pf(vcpu)) 350871f116bfSDavid Hildenbrand return 0; 350971f116bfSDavid Hildenbrand return kvm_arch_fault_in_page(vcpu, current->thread.gmap_addr, 1); 3510fa576c58SThomas Huth } 351171f116bfSDavid Hildenbrand return vcpu_post_run_fault_in_sie(vcpu); 35123fb4c40fSThomas Huth } 35133fb4c40fSThomas Huth 35143fb4c40fSThomas Huth static int __vcpu_run(struct kvm_vcpu *vcpu) 35153fb4c40fSThomas Huth { 35163fb4c40fSThomas Huth int rc, exit_reason; 35173fb4c40fSThomas Huth 3518800c1065SThomas Huth /* 3519800c1065SThomas Huth * We try to hold kvm->srcu during most of vcpu_run (except when run- 3520800c1065SThomas Huth * ning the guest), so that memslots (and other stuff) are protected 3521800c1065SThomas Huth */ 3522800c1065SThomas Huth vcpu->srcu_idx = srcu_read_lock(&vcpu->kvm->srcu); 3523800c1065SThomas Huth 3524a76ccff6SThomas Huth do { 35253fb4c40fSThomas Huth rc = vcpu_pre_run(vcpu); 35263fb4c40fSThomas Huth if (rc) 3527a76ccff6SThomas Huth break; 35283fb4c40fSThomas Huth 3529800c1065SThomas Huth srcu_read_unlock(&vcpu->kvm->srcu, vcpu->srcu_idx); 35303fb4c40fSThomas Huth /* 3531a76ccff6SThomas Huth * As PF_VCPU will be used in fault handler, between 3532a76ccff6SThomas Huth * guest_enter and guest_exit should be no uaccess. 35333fb4c40fSThomas Huth */ 35340097d12eSChristian Borntraeger local_irq_disable(); 35356edaa530SPaolo Bonzini guest_enter_irqoff(); 3536db0758b2SDavid Hildenbrand __disable_cpu_timer_accounting(vcpu); 35370097d12eSChristian Borntraeger local_irq_enable(); 3538a76ccff6SThomas Huth exit_reason = sie64a(vcpu->arch.sie_block, 3539a76ccff6SThomas Huth vcpu->run->s.regs.gprs); 35400097d12eSChristian Borntraeger local_irq_disable(); 3541db0758b2SDavid Hildenbrand __enable_cpu_timer_accounting(vcpu); 35426edaa530SPaolo Bonzini guest_exit_irqoff(); 35430097d12eSChristian Borntraeger local_irq_enable(); 3544800c1065SThomas Huth vcpu->srcu_idx = srcu_read_lock(&vcpu->kvm->srcu); 35453fb4c40fSThomas Huth 35463fb4c40fSThomas Huth rc = vcpu_post_run(vcpu, exit_reason); 354727291e21SDavid Hildenbrand } while (!signal_pending(current) && !guestdbg_exit_pending(vcpu) && !rc); 35483fb4c40fSThomas Huth 3549800c1065SThomas Huth srcu_read_unlock(&vcpu->kvm->srcu, vcpu->srcu_idx); 3550e168bf8dSCarsten Otte return rc; 3551b0c632dbSHeiko Carstens } 3552b0c632dbSHeiko Carstens 3553b028ee3eSDavid Hildenbrand static void sync_regs(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run) 3554b028ee3eSDavid Hildenbrand { 35554d5f2c04SChristian Borntraeger struct runtime_instr_cb *riccb; 35564e0b1ab7SFan Zhang struct gs_cb *gscb; 35574d5f2c04SChristian Borntraeger 35584d5f2c04SChristian Borntraeger riccb = (struct runtime_instr_cb *) &kvm_run->s.regs.riccb; 35594e0b1ab7SFan Zhang gscb = (struct gs_cb *) &kvm_run->s.regs.gscb; 3560b028ee3eSDavid Hildenbrand vcpu->arch.sie_block->gpsw.mask = kvm_run->psw_mask; 3561b028ee3eSDavid Hildenbrand vcpu->arch.sie_block->gpsw.addr = kvm_run->psw_addr; 3562b028ee3eSDavid Hildenbrand if (kvm_run->kvm_dirty_regs & KVM_SYNC_PREFIX) 3563b028ee3eSDavid Hildenbrand kvm_s390_set_prefix(vcpu, kvm_run->s.regs.prefix); 3564b028ee3eSDavid Hildenbrand if (kvm_run->kvm_dirty_regs & KVM_SYNC_CRS) { 3565b028ee3eSDavid Hildenbrand memcpy(&vcpu->arch.sie_block->gcr, &kvm_run->s.regs.crs, 128); 3566d3d692c8SDavid Hildenbrand /* some control register changes require a tlb flush */ 3567d3d692c8SDavid Hildenbrand kvm_make_request(KVM_REQ_TLB_FLUSH, vcpu); 3568b028ee3eSDavid Hildenbrand } 3569b028ee3eSDavid Hildenbrand if (kvm_run->kvm_dirty_regs & KVM_SYNC_ARCH0) { 35704287f247SDavid Hildenbrand kvm_s390_set_cpu_timer(vcpu, kvm_run->s.regs.cputm); 3571b028ee3eSDavid Hildenbrand vcpu->arch.sie_block->ckc = kvm_run->s.regs.ckc; 3572b028ee3eSDavid Hildenbrand vcpu->arch.sie_block->todpr = kvm_run->s.regs.todpr; 3573b028ee3eSDavid Hildenbrand vcpu->arch.sie_block->pp = kvm_run->s.regs.pp; 3574b028ee3eSDavid Hildenbrand vcpu->arch.sie_block->gbea = kvm_run->s.regs.gbea; 3575b028ee3eSDavid Hildenbrand } 3576b028ee3eSDavid Hildenbrand if (kvm_run->kvm_dirty_regs & KVM_SYNC_PFAULT) { 3577b028ee3eSDavid Hildenbrand vcpu->arch.pfault_token = kvm_run->s.regs.pft; 3578b028ee3eSDavid Hildenbrand vcpu->arch.pfault_select = kvm_run->s.regs.pfs; 3579b028ee3eSDavid Hildenbrand vcpu->arch.pfault_compare = kvm_run->s.regs.pfc; 35809fbd8082SDavid Hildenbrand if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID) 35819fbd8082SDavid Hildenbrand kvm_clear_async_pf_completion_queue(vcpu); 3582b028ee3eSDavid Hildenbrand } 358380cd8763SFan Zhang /* 358480cd8763SFan Zhang * If userspace sets the riccb (e.g. after migration) to a valid state, 358580cd8763SFan Zhang * we should enable RI here instead of doing the lazy enablement. 358680cd8763SFan Zhang */ 358780cd8763SFan Zhang if ((kvm_run->kvm_dirty_regs & KVM_SYNC_RICCB) && 35884d5f2c04SChristian Borntraeger test_kvm_facility(vcpu->kvm, 64) && 3589bb59c2daSAlice Frosi riccb->v && 35900c9d8683SDavid Hildenbrand !(vcpu->arch.sie_block->ecb3 & ECB3_RI)) { 35914d5f2c04SChristian Borntraeger VCPU_EVENT(vcpu, 3, "%s", "ENABLE: RI (sync_regs)"); 35920c9d8683SDavid Hildenbrand vcpu->arch.sie_block->ecb3 |= ECB3_RI; 359380cd8763SFan Zhang } 35944e0b1ab7SFan Zhang /* 35954e0b1ab7SFan Zhang * If userspace sets the gscb (e.g. after migration) to non-zero, 35964e0b1ab7SFan Zhang * we should enable GS here instead of doing the lazy enablement. 35974e0b1ab7SFan Zhang */ 35984e0b1ab7SFan Zhang if ((kvm_run->kvm_dirty_regs & KVM_SYNC_GSCB) && 35994e0b1ab7SFan Zhang test_kvm_facility(vcpu->kvm, 133) && 36004e0b1ab7SFan Zhang gscb->gssm && 36014e0b1ab7SFan Zhang !vcpu->arch.gs_enabled) { 36024e0b1ab7SFan Zhang VCPU_EVENT(vcpu, 3, "%s", "ENABLE: GS (sync_regs)"); 36034e0b1ab7SFan Zhang vcpu->arch.sie_block->ecb |= ECB_GS; 36044e0b1ab7SFan Zhang vcpu->arch.sie_block->ecd |= ECD_HOSTREGMGMT; 36054e0b1ab7SFan Zhang vcpu->arch.gs_enabled = 1; 360680cd8763SFan Zhang } 360735b3fde6SChristian Borntraeger if ((kvm_run->kvm_dirty_regs & KVM_SYNC_BPBC) && 360835b3fde6SChristian Borntraeger test_kvm_facility(vcpu->kvm, 82)) { 360935b3fde6SChristian Borntraeger vcpu->arch.sie_block->fpf &= ~FPF_BPBC; 361035b3fde6SChristian Borntraeger vcpu->arch.sie_block->fpf |= kvm_run->s.regs.bpbc ? FPF_BPBC : 0; 361135b3fde6SChristian Borntraeger } 361231d8b8d4SChristian Borntraeger save_access_regs(vcpu->arch.host_acrs); 361331d8b8d4SChristian Borntraeger restore_access_regs(vcpu->run->s.regs.acrs); 3614e1788bb9SChristian Borntraeger /* save host (userspace) fprs/vrs */ 3615e1788bb9SChristian Borntraeger save_fpu_regs(); 3616e1788bb9SChristian Borntraeger vcpu->arch.host_fpregs.fpc = current->thread.fpu.fpc; 3617e1788bb9SChristian Borntraeger vcpu->arch.host_fpregs.regs = current->thread.fpu.regs; 3618e1788bb9SChristian Borntraeger if (MACHINE_HAS_VX) 3619e1788bb9SChristian Borntraeger current->thread.fpu.regs = vcpu->run->s.regs.vrs; 3620e1788bb9SChristian Borntraeger else 3621e1788bb9SChristian Borntraeger current->thread.fpu.regs = vcpu->run->s.regs.fprs; 3622e1788bb9SChristian Borntraeger current->thread.fpu.fpc = vcpu->run->s.regs.fpc; 3623e1788bb9SChristian Borntraeger if (test_fp_ctl(current->thread.fpu.fpc)) 3624e1788bb9SChristian Borntraeger /* User space provided an invalid FPC, let's clear it */ 3625e1788bb9SChristian Borntraeger current->thread.fpu.fpc = 0; 36264e0b1ab7SFan Zhang if (MACHINE_HAS_GS) { 36274e0b1ab7SFan Zhang preempt_disable(); 36284e0b1ab7SFan Zhang __ctl_set_bit(2, 4); 36294e0b1ab7SFan Zhang if (current->thread.gs_cb) { 36304e0b1ab7SFan Zhang vcpu->arch.host_gscb = current->thread.gs_cb; 36314e0b1ab7SFan Zhang save_gs_cb(vcpu->arch.host_gscb); 36324e0b1ab7SFan Zhang } 36334e0b1ab7SFan Zhang if (vcpu->arch.gs_enabled) { 36344e0b1ab7SFan Zhang current->thread.gs_cb = (struct gs_cb *) 36354e0b1ab7SFan Zhang &vcpu->run->s.regs.gscb; 36364e0b1ab7SFan Zhang restore_gs_cb(current->thread.gs_cb); 36374e0b1ab7SFan Zhang } 36384e0b1ab7SFan Zhang preempt_enable(); 36394e0b1ab7SFan Zhang } 3640a3da7b4aSChristian Borntraeger /* SIE will load etoken directly from SDNX and therefore kvm_run */ 364180cd8763SFan Zhang 3642b028ee3eSDavid Hildenbrand kvm_run->kvm_dirty_regs = 0; 3643b028ee3eSDavid Hildenbrand } 3644b028ee3eSDavid Hildenbrand 3645b028ee3eSDavid Hildenbrand static void store_regs(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run) 3646b028ee3eSDavid Hildenbrand { 3647b028ee3eSDavid Hildenbrand kvm_run->psw_mask = vcpu->arch.sie_block->gpsw.mask; 3648b028ee3eSDavid Hildenbrand kvm_run->psw_addr = vcpu->arch.sie_block->gpsw.addr; 3649b028ee3eSDavid Hildenbrand kvm_run->s.regs.prefix = kvm_s390_get_prefix(vcpu); 3650b028ee3eSDavid Hildenbrand memcpy(&kvm_run->s.regs.crs, &vcpu->arch.sie_block->gcr, 128); 36514287f247SDavid Hildenbrand kvm_run->s.regs.cputm = kvm_s390_get_cpu_timer(vcpu); 3652b028ee3eSDavid Hildenbrand kvm_run->s.regs.ckc = vcpu->arch.sie_block->ckc; 3653b028ee3eSDavid Hildenbrand kvm_run->s.regs.todpr = vcpu->arch.sie_block->todpr; 3654b028ee3eSDavid Hildenbrand kvm_run->s.regs.pp = vcpu->arch.sie_block->pp; 3655b028ee3eSDavid Hildenbrand kvm_run->s.regs.gbea = vcpu->arch.sie_block->gbea; 3656b028ee3eSDavid Hildenbrand kvm_run->s.regs.pft = vcpu->arch.pfault_token; 3657b028ee3eSDavid Hildenbrand kvm_run->s.regs.pfs = vcpu->arch.pfault_select; 3658b028ee3eSDavid Hildenbrand kvm_run->s.regs.pfc = vcpu->arch.pfault_compare; 365935b3fde6SChristian Borntraeger kvm_run->s.regs.bpbc = (vcpu->arch.sie_block->fpf & FPF_BPBC) == FPF_BPBC; 366031d8b8d4SChristian Borntraeger save_access_regs(vcpu->run->s.regs.acrs); 366131d8b8d4SChristian Borntraeger restore_access_regs(vcpu->arch.host_acrs); 3662e1788bb9SChristian Borntraeger /* Save guest register state */ 3663e1788bb9SChristian Borntraeger save_fpu_regs(); 3664e1788bb9SChristian Borntraeger vcpu->run->s.regs.fpc = current->thread.fpu.fpc; 3665e1788bb9SChristian Borntraeger /* Restore will be done lazily at return */ 3666e1788bb9SChristian Borntraeger current->thread.fpu.fpc = vcpu->arch.host_fpregs.fpc; 3667e1788bb9SChristian Borntraeger current->thread.fpu.regs = vcpu->arch.host_fpregs.regs; 36684e0b1ab7SFan Zhang if (MACHINE_HAS_GS) { 36694e0b1ab7SFan Zhang __ctl_set_bit(2, 4); 36704e0b1ab7SFan Zhang if (vcpu->arch.gs_enabled) 36714e0b1ab7SFan Zhang save_gs_cb(current->thread.gs_cb); 36724e0b1ab7SFan Zhang preempt_disable(); 36734e0b1ab7SFan Zhang current->thread.gs_cb = vcpu->arch.host_gscb; 36744e0b1ab7SFan Zhang restore_gs_cb(vcpu->arch.host_gscb); 36754e0b1ab7SFan Zhang preempt_enable(); 36764e0b1ab7SFan Zhang if (!vcpu->arch.host_gscb) 36774e0b1ab7SFan Zhang __ctl_clear_bit(2, 4); 36784e0b1ab7SFan Zhang vcpu->arch.host_gscb = NULL; 36794e0b1ab7SFan Zhang } 3680a3da7b4aSChristian Borntraeger /* SIE will save etoken directly into SDNX and therefore kvm_run */ 3681b028ee3eSDavid Hildenbrand } 3682b028ee3eSDavid Hildenbrand 3683b0c632dbSHeiko Carstens int kvm_arch_vcpu_ioctl_run(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run) 3684b0c632dbSHeiko Carstens { 36858f2abe6aSChristian Borntraeger int rc; 3686b0c632dbSHeiko Carstens 3687460df4c1SPaolo Bonzini if (kvm_run->immediate_exit) 3688460df4c1SPaolo Bonzini return -EINTR; 3689460df4c1SPaolo Bonzini 3690accb757dSChristoffer Dall vcpu_load(vcpu); 3691accb757dSChristoffer Dall 369227291e21SDavid Hildenbrand if (guestdbg_exit_pending(vcpu)) { 369327291e21SDavid Hildenbrand kvm_s390_prepare_debug_exit(vcpu); 3694accb757dSChristoffer Dall rc = 0; 3695accb757dSChristoffer Dall goto out; 369627291e21SDavid Hildenbrand } 369727291e21SDavid Hildenbrand 369820b7035cSJan H. Schönherr kvm_sigset_activate(vcpu); 3699b0c632dbSHeiko Carstens 37006352e4d2SDavid Hildenbrand if (!kvm_s390_user_cpu_state_ctrl(vcpu->kvm)) { 37016852d7b6SDavid Hildenbrand kvm_s390_vcpu_start(vcpu); 37026352e4d2SDavid Hildenbrand } else if (is_vcpu_stopped(vcpu)) { 3703ea2cdd27SDavid Hildenbrand pr_err_ratelimited("can't run stopped vcpu %d\n", 37046352e4d2SDavid Hildenbrand vcpu->vcpu_id); 3705accb757dSChristoffer Dall rc = -EINVAL; 3706accb757dSChristoffer Dall goto out; 37076352e4d2SDavid Hildenbrand } 3708b0c632dbSHeiko Carstens 3709b028ee3eSDavid Hildenbrand sync_regs(vcpu, kvm_run); 3710db0758b2SDavid Hildenbrand enable_cpu_timer_accounting(vcpu); 3711d7b0b5ebSCarsten Otte 3712dab4079dSHeiko Carstens might_fault(); 3713e168bf8dSCarsten Otte rc = __vcpu_run(vcpu); 37149ace903dSChristian Ehrhardt 3715b1d16c49SChristian Ehrhardt if (signal_pending(current) && !rc) { 3716b1d16c49SChristian Ehrhardt kvm_run->exit_reason = KVM_EXIT_INTR; 37178f2abe6aSChristian Borntraeger rc = -EINTR; 3718b1d16c49SChristian Ehrhardt } 37198f2abe6aSChristian Borntraeger 372027291e21SDavid Hildenbrand if (guestdbg_exit_pending(vcpu) && !rc) { 372127291e21SDavid Hildenbrand kvm_s390_prepare_debug_exit(vcpu); 372227291e21SDavid Hildenbrand rc = 0; 372327291e21SDavid Hildenbrand } 372427291e21SDavid Hildenbrand 37258f2abe6aSChristian Borntraeger if (rc == -EREMOTE) { 372671f116bfSDavid Hildenbrand /* userspace support is needed, kvm_run has been prepared */ 37278f2abe6aSChristian Borntraeger rc = 0; 37288f2abe6aSChristian Borntraeger } 37298f2abe6aSChristian Borntraeger 3730db0758b2SDavid Hildenbrand disable_cpu_timer_accounting(vcpu); 3731b028ee3eSDavid Hildenbrand store_regs(vcpu, kvm_run); 3732d7b0b5ebSCarsten Otte 373320b7035cSJan H. Schönherr kvm_sigset_deactivate(vcpu); 3734b0c632dbSHeiko Carstens 3735b0c632dbSHeiko Carstens vcpu->stat.exit_userspace++; 3736accb757dSChristoffer Dall out: 3737accb757dSChristoffer Dall vcpu_put(vcpu); 37387e8e6ab4SHeiko Carstens return rc; 3739b0c632dbSHeiko Carstens } 3740b0c632dbSHeiko Carstens 3741b0c632dbSHeiko Carstens /* 3742b0c632dbSHeiko Carstens * store status at address 3743b0c632dbSHeiko Carstens * we use have two special cases: 3744b0c632dbSHeiko Carstens * KVM_S390_STORE_STATUS_NOADDR: -> 0x1200 on 64 bit 3745b0c632dbSHeiko Carstens * KVM_S390_STORE_STATUS_PREFIXED: -> prefix 3746b0c632dbSHeiko Carstens */ 3747d0bce605SHeiko Carstens int kvm_s390_store_status_unloaded(struct kvm_vcpu *vcpu, unsigned long gpa) 3748b0c632dbSHeiko Carstens { 3749092670cdSCarsten Otte unsigned char archmode = 1; 37509abc2a08SDavid Hildenbrand freg_t fprs[NUM_FPRS]; 3751fda902cbSMichael Mueller unsigned int px; 37524287f247SDavid Hildenbrand u64 clkcomp, cputm; 3753d0bce605SHeiko Carstens int rc; 3754b0c632dbSHeiko Carstens 3755d9a3a09aSMartin Schwidefsky px = kvm_s390_get_prefix(vcpu); 3756d0bce605SHeiko Carstens if (gpa == KVM_S390_STORE_STATUS_NOADDR) { 3757d0bce605SHeiko Carstens if (write_guest_abs(vcpu, 163, &archmode, 1)) 3758b0c632dbSHeiko Carstens return -EFAULT; 3759d9a3a09aSMartin Schwidefsky gpa = 0; 3760d0bce605SHeiko Carstens } else if (gpa == KVM_S390_STORE_STATUS_PREFIXED) { 3761d0bce605SHeiko Carstens if (write_guest_real(vcpu, 163, &archmode, 1)) 3762b0c632dbSHeiko Carstens return -EFAULT; 3763d9a3a09aSMartin Schwidefsky gpa = px; 3764d9a3a09aSMartin Schwidefsky } else 3765d9a3a09aSMartin Schwidefsky gpa -= __LC_FPREGS_SAVE_AREA; 37669abc2a08SDavid Hildenbrand 37679abc2a08SDavid Hildenbrand /* manually convert vector registers if necessary */ 37689abc2a08SDavid Hildenbrand if (MACHINE_HAS_VX) { 37699522b37fSDavid Hildenbrand convert_vx_to_fp(fprs, (__vector128 *) vcpu->run->s.regs.vrs); 3770d9a3a09aSMartin Schwidefsky rc = write_guest_abs(vcpu, gpa + __LC_FPREGS_SAVE_AREA, 37719abc2a08SDavid Hildenbrand fprs, 128); 37729abc2a08SDavid Hildenbrand } else { 37739abc2a08SDavid Hildenbrand rc = write_guest_abs(vcpu, gpa + __LC_FPREGS_SAVE_AREA, 37746fd8e67dSDavid Hildenbrand vcpu->run->s.regs.fprs, 128); 37759abc2a08SDavid Hildenbrand } 3776d9a3a09aSMartin Schwidefsky rc |= write_guest_abs(vcpu, gpa + __LC_GPREGS_SAVE_AREA, 3777d0bce605SHeiko Carstens vcpu->run->s.regs.gprs, 128); 3778d9a3a09aSMartin Schwidefsky rc |= write_guest_abs(vcpu, gpa + __LC_PSW_SAVE_AREA, 3779d0bce605SHeiko Carstens &vcpu->arch.sie_block->gpsw, 16); 3780d9a3a09aSMartin Schwidefsky rc |= write_guest_abs(vcpu, gpa + __LC_PREFIX_SAVE_AREA, 3781fda902cbSMichael Mueller &px, 4); 3782d9a3a09aSMartin Schwidefsky rc |= write_guest_abs(vcpu, gpa + __LC_FP_CREG_SAVE_AREA, 37839abc2a08SDavid Hildenbrand &vcpu->run->s.regs.fpc, 4); 3784d9a3a09aSMartin Schwidefsky rc |= write_guest_abs(vcpu, gpa + __LC_TOD_PROGREG_SAVE_AREA, 3785d0bce605SHeiko Carstens &vcpu->arch.sie_block->todpr, 4); 37864287f247SDavid Hildenbrand cputm = kvm_s390_get_cpu_timer(vcpu); 3787d9a3a09aSMartin Schwidefsky rc |= write_guest_abs(vcpu, gpa + __LC_CPU_TIMER_SAVE_AREA, 37884287f247SDavid Hildenbrand &cputm, 8); 3789178bd789SThomas Huth clkcomp = vcpu->arch.sie_block->ckc >> 8; 3790d9a3a09aSMartin Schwidefsky rc |= write_guest_abs(vcpu, gpa + __LC_CLOCK_COMP_SAVE_AREA, 3791d0bce605SHeiko Carstens &clkcomp, 8); 3792d9a3a09aSMartin Schwidefsky rc |= write_guest_abs(vcpu, gpa + __LC_AREGS_SAVE_AREA, 3793d0bce605SHeiko Carstens &vcpu->run->s.regs.acrs, 64); 3794d9a3a09aSMartin Schwidefsky rc |= write_guest_abs(vcpu, gpa + __LC_CREGS_SAVE_AREA, 3795d0bce605SHeiko Carstens &vcpu->arch.sie_block->gcr, 128); 3796d0bce605SHeiko Carstens return rc ? -EFAULT : 0; 3797b0c632dbSHeiko Carstens } 3798b0c632dbSHeiko Carstens 3799e879892cSThomas Huth int kvm_s390_vcpu_store_status(struct kvm_vcpu *vcpu, unsigned long addr) 3800e879892cSThomas Huth { 3801e879892cSThomas Huth /* 3802e879892cSThomas Huth * The guest FPRS and ACRS are in the host FPRS/ACRS due to the lazy 380331d8b8d4SChristian Borntraeger * switch in the run ioctl. Let's update our copies before we save 3804e879892cSThomas Huth * it into the save area 3805e879892cSThomas Huth */ 3806d0164ee2SHendrik Brueckner save_fpu_regs(); 38079abc2a08SDavid Hildenbrand vcpu->run->s.regs.fpc = current->thread.fpu.fpc; 3808e879892cSThomas Huth save_access_regs(vcpu->run->s.regs.acrs); 3809e879892cSThomas Huth 3810e879892cSThomas Huth return kvm_s390_store_status_unloaded(vcpu, addr); 3811e879892cSThomas Huth } 3812e879892cSThomas Huth 38138ad35755SDavid Hildenbrand static void __disable_ibs_on_vcpu(struct kvm_vcpu *vcpu) 38148ad35755SDavid Hildenbrand { 38158ad35755SDavid Hildenbrand kvm_check_request(KVM_REQ_ENABLE_IBS, vcpu); 38168e236546SChristian Borntraeger kvm_s390_sync_request(KVM_REQ_DISABLE_IBS, vcpu); 38178ad35755SDavid Hildenbrand } 38188ad35755SDavid Hildenbrand 38198ad35755SDavid Hildenbrand static void __disable_ibs_on_all_vcpus(struct kvm *kvm) 38208ad35755SDavid Hildenbrand { 38218ad35755SDavid Hildenbrand unsigned int i; 38228ad35755SDavid Hildenbrand struct kvm_vcpu *vcpu; 38238ad35755SDavid Hildenbrand 38248ad35755SDavid Hildenbrand kvm_for_each_vcpu(i, vcpu, kvm) { 38258ad35755SDavid Hildenbrand __disable_ibs_on_vcpu(vcpu); 38268ad35755SDavid Hildenbrand } 38278ad35755SDavid Hildenbrand } 38288ad35755SDavid Hildenbrand 38298ad35755SDavid Hildenbrand static void __enable_ibs_on_vcpu(struct kvm_vcpu *vcpu) 38308ad35755SDavid Hildenbrand { 383109a400e7SDavid Hildenbrand if (!sclp.has_ibs) 383209a400e7SDavid Hildenbrand return; 38338ad35755SDavid Hildenbrand kvm_check_request(KVM_REQ_DISABLE_IBS, vcpu); 38348e236546SChristian Borntraeger kvm_s390_sync_request(KVM_REQ_ENABLE_IBS, vcpu); 38358ad35755SDavid Hildenbrand } 38368ad35755SDavid Hildenbrand 38376852d7b6SDavid Hildenbrand void kvm_s390_vcpu_start(struct kvm_vcpu *vcpu) 38386852d7b6SDavid Hildenbrand { 38398ad35755SDavid Hildenbrand int i, online_vcpus, started_vcpus = 0; 38408ad35755SDavid Hildenbrand 38418ad35755SDavid Hildenbrand if (!is_vcpu_stopped(vcpu)) 38428ad35755SDavid Hildenbrand return; 38438ad35755SDavid Hildenbrand 38446852d7b6SDavid Hildenbrand trace_kvm_s390_vcpu_start_stop(vcpu->vcpu_id, 1); 38458ad35755SDavid Hildenbrand /* Only one cpu at a time may enter/leave the STOPPED state. */ 3846433b9ee4SDavid Hildenbrand spin_lock(&vcpu->kvm->arch.start_stop_lock); 38478ad35755SDavid Hildenbrand online_vcpus = atomic_read(&vcpu->kvm->online_vcpus); 38488ad35755SDavid Hildenbrand 38498ad35755SDavid Hildenbrand for (i = 0; i < online_vcpus; i++) { 38508ad35755SDavid Hildenbrand if (!is_vcpu_stopped(vcpu->kvm->vcpus[i])) 38518ad35755SDavid Hildenbrand started_vcpus++; 38528ad35755SDavid Hildenbrand } 38538ad35755SDavid Hildenbrand 38548ad35755SDavid Hildenbrand if (started_vcpus == 0) { 38558ad35755SDavid Hildenbrand /* we're the only active VCPU -> speed it up */ 38568ad35755SDavid Hildenbrand __enable_ibs_on_vcpu(vcpu); 38578ad35755SDavid Hildenbrand } else if (started_vcpus == 1) { 38588ad35755SDavid Hildenbrand /* 38598ad35755SDavid Hildenbrand * As we are starting a second VCPU, we have to disable 38608ad35755SDavid Hildenbrand * the IBS facility on all VCPUs to remove potentially 38618ad35755SDavid Hildenbrand * oustanding ENABLE requests. 38628ad35755SDavid Hildenbrand */ 38638ad35755SDavid Hildenbrand __disable_ibs_on_all_vcpus(vcpu->kvm); 38648ad35755SDavid Hildenbrand } 38658ad35755SDavid Hildenbrand 38669daecfc6SDavid Hildenbrand kvm_s390_clear_cpuflags(vcpu, CPUSTAT_STOPPED); 38678ad35755SDavid Hildenbrand /* 38688ad35755SDavid Hildenbrand * Another VCPU might have used IBS while we were offline. 38698ad35755SDavid Hildenbrand * Let's play safe and flush the VCPU at startup. 38708ad35755SDavid Hildenbrand */ 3871d3d692c8SDavid Hildenbrand kvm_make_request(KVM_REQ_TLB_FLUSH, vcpu); 3872433b9ee4SDavid Hildenbrand spin_unlock(&vcpu->kvm->arch.start_stop_lock); 38738ad35755SDavid Hildenbrand return; 38746852d7b6SDavid Hildenbrand } 38756852d7b6SDavid Hildenbrand 38766852d7b6SDavid Hildenbrand void kvm_s390_vcpu_stop(struct kvm_vcpu *vcpu) 38776852d7b6SDavid Hildenbrand { 38788ad35755SDavid Hildenbrand int i, online_vcpus, started_vcpus = 0; 38798ad35755SDavid Hildenbrand struct kvm_vcpu *started_vcpu = NULL; 38808ad35755SDavid Hildenbrand 38818ad35755SDavid Hildenbrand if (is_vcpu_stopped(vcpu)) 38828ad35755SDavid Hildenbrand return; 38838ad35755SDavid Hildenbrand 38846852d7b6SDavid Hildenbrand trace_kvm_s390_vcpu_start_stop(vcpu->vcpu_id, 0); 38858ad35755SDavid Hildenbrand /* Only one cpu at a time may enter/leave the STOPPED state. */ 3886433b9ee4SDavid Hildenbrand spin_lock(&vcpu->kvm->arch.start_stop_lock); 38878ad35755SDavid Hildenbrand online_vcpus = atomic_read(&vcpu->kvm->online_vcpus); 38888ad35755SDavid Hildenbrand 388932f5ff63SDavid Hildenbrand /* SIGP STOP and SIGP STOP AND STORE STATUS has been fully processed */ 38906cddd432SDavid Hildenbrand kvm_s390_clear_stop_irq(vcpu); 389132f5ff63SDavid Hildenbrand 3892ef8f4f49SDavid Hildenbrand kvm_s390_set_cpuflags(vcpu, CPUSTAT_STOPPED); 38938ad35755SDavid Hildenbrand __disable_ibs_on_vcpu(vcpu); 38948ad35755SDavid Hildenbrand 38958ad35755SDavid Hildenbrand for (i = 0; i < online_vcpus; i++) { 38968ad35755SDavid Hildenbrand if (!is_vcpu_stopped(vcpu->kvm->vcpus[i])) { 38978ad35755SDavid Hildenbrand started_vcpus++; 38988ad35755SDavid Hildenbrand started_vcpu = vcpu->kvm->vcpus[i]; 38998ad35755SDavid Hildenbrand } 39008ad35755SDavid Hildenbrand } 39018ad35755SDavid Hildenbrand 39028ad35755SDavid Hildenbrand if (started_vcpus == 1) { 39038ad35755SDavid Hildenbrand /* 39048ad35755SDavid Hildenbrand * As we only have one VCPU left, we want to enable the 39058ad35755SDavid Hildenbrand * IBS facility for that VCPU to speed it up. 39068ad35755SDavid Hildenbrand */ 39078ad35755SDavid Hildenbrand __enable_ibs_on_vcpu(started_vcpu); 39088ad35755SDavid Hildenbrand } 39098ad35755SDavid Hildenbrand 3910433b9ee4SDavid Hildenbrand spin_unlock(&vcpu->kvm->arch.start_stop_lock); 39118ad35755SDavid Hildenbrand return; 39126852d7b6SDavid Hildenbrand } 39136852d7b6SDavid Hildenbrand 3914d6712df9SCornelia Huck static int kvm_vcpu_ioctl_enable_cap(struct kvm_vcpu *vcpu, 3915d6712df9SCornelia Huck struct kvm_enable_cap *cap) 3916d6712df9SCornelia Huck { 3917d6712df9SCornelia Huck int r; 3918d6712df9SCornelia Huck 3919d6712df9SCornelia Huck if (cap->flags) 3920d6712df9SCornelia Huck return -EINVAL; 3921d6712df9SCornelia Huck 3922d6712df9SCornelia Huck switch (cap->cap) { 3923fa6b7fe9SCornelia Huck case KVM_CAP_S390_CSS_SUPPORT: 3924fa6b7fe9SCornelia Huck if (!vcpu->kvm->arch.css_support) { 3925fa6b7fe9SCornelia Huck vcpu->kvm->arch.css_support = 1; 3926c92ea7b9SChristian Borntraeger VM_EVENT(vcpu->kvm, 3, "%s", "ENABLE: CSS support"); 3927fa6b7fe9SCornelia Huck trace_kvm_s390_enable_css(vcpu->kvm); 3928fa6b7fe9SCornelia Huck } 3929fa6b7fe9SCornelia Huck r = 0; 3930fa6b7fe9SCornelia Huck break; 3931d6712df9SCornelia Huck default: 3932d6712df9SCornelia Huck r = -EINVAL; 3933d6712df9SCornelia Huck break; 3934d6712df9SCornelia Huck } 3935d6712df9SCornelia Huck return r; 3936d6712df9SCornelia Huck } 3937d6712df9SCornelia Huck 393841408c28SThomas Huth static long kvm_s390_guest_mem_op(struct kvm_vcpu *vcpu, 393941408c28SThomas Huth struct kvm_s390_mem_op *mop) 394041408c28SThomas Huth { 394141408c28SThomas Huth void __user *uaddr = (void __user *)mop->buf; 394241408c28SThomas Huth void *tmpbuf = NULL; 394341408c28SThomas Huth int r, srcu_idx; 394441408c28SThomas Huth const u64 supported_flags = KVM_S390_MEMOP_F_INJECT_EXCEPTION 394541408c28SThomas Huth | KVM_S390_MEMOP_F_CHECK_ONLY; 394641408c28SThomas Huth 394741408c28SThomas Huth if (mop->flags & ~supported_flags) 394841408c28SThomas Huth return -EINVAL; 394941408c28SThomas Huth 395041408c28SThomas Huth if (mop->size > MEM_OP_MAX_SIZE) 395141408c28SThomas Huth return -E2BIG; 395241408c28SThomas Huth 395341408c28SThomas Huth if (!(mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY)) { 395441408c28SThomas Huth tmpbuf = vmalloc(mop->size); 395541408c28SThomas Huth if (!tmpbuf) 395641408c28SThomas Huth return -ENOMEM; 395741408c28SThomas Huth } 395841408c28SThomas Huth 395941408c28SThomas Huth srcu_idx = srcu_read_lock(&vcpu->kvm->srcu); 396041408c28SThomas Huth 396141408c28SThomas Huth switch (mop->op) { 396241408c28SThomas Huth case KVM_S390_MEMOP_LOGICAL_READ: 396341408c28SThomas Huth if (mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY) { 396492c96321SDavid Hildenbrand r = check_gva_range(vcpu, mop->gaddr, mop->ar, 396592c96321SDavid Hildenbrand mop->size, GACC_FETCH); 396641408c28SThomas Huth break; 396741408c28SThomas Huth } 396841408c28SThomas Huth r = read_guest(vcpu, mop->gaddr, mop->ar, tmpbuf, mop->size); 396941408c28SThomas Huth if (r == 0) { 397041408c28SThomas Huth if (copy_to_user(uaddr, tmpbuf, mop->size)) 397141408c28SThomas Huth r = -EFAULT; 397241408c28SThomas Huth } 397341408c28SThomas Huth break; 397441408c28SThomas Huth case KVM_S390_MEMOP_LOGICAL_WRITE: 397541408c28SThomas Huth if (mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY) { 397692c96321SDavid Hildenbrand r = check_gva_range(vcpu, mop->gaddr, mop->ar, 397792c96321SDavid Hildenbrand mop->size, GACC_STORE); 397841408c28SThomas Huth break; 397941408c28SThomas Huth } 398041408c28SThomas Huth if (copy_from_user(tmpbuf, uaddr, mop->size)) { 398141408c28SThomas Huth r = -EFAULT; 398241408c28SThomas Huth break; 398341408c28SThomas Huth } 398441408c28SThomas Huth r = write_guest(vcpu, mop->gaddr, mop->ar, tmpbuf, mop->size); 398541408c28SThomas Huth break; 398641408c28SThomas Huth default: 398741408c28SThomas Huth r = -EINVAL; 398841408c28SThomas Huth } 398941408c28SThomas Huth 399041408c28SThomas Huth srcu_read_unlock(&vcpu->kvm->srcu, srcu_idx); 399141408c28SThomas Huth 399241408c28SThomas Huth if (r > 0 && (mop->flags & KVM_S390_MEMOP_F_INJECT_EXCEPTION) != 0) 399341408c28SThomas Huth kvm_s390_inject_prog_irq(vcpu, &vcpu->arch.pgm); 399441408c28SThomas Huth 399541408c28SThomas Huth vfree(tmpbuf); 399641408c28SThomas Huth return r; 399741408c28SThomas Huth } 399841408c28SThomas Huth 39995cb0944cSPaolo Bonzini long kvm_arch_vcpu_async_ioctl(struct file *filp, 4000b0c632dbSHeiko Carstens unsigned int ioctl, unsigned long arg) 4001b0c632dbSHeiko Carstens { 4002b0c632dbSHeiko Carstens struct kvm_vcpu *vcpu = filp->private_data; 4003b0c632dbSHeiko Carstens void __user *argp = (void __user *)arg; 4004b0c632dbSHeiko Carstens 400593736624SAvi Kivity switch (ioctl) { 400647b43c52SJens Freimann case KVM_S390_IRQ: { 400747b43c52SJens Freimann struct kvm_s390_irq s390irq; 400847b43c52SJens Freimann 400947b43c52SJens Freimann if (copy_from_user(&s390irq, argp, sizeof(s390irq))) 40109b062471SChristoffer Dall return -EFAULT; 40119b062471SChristoffer Dall return kvm_s390_inject_vcpu(vcpu, &s390irq); 401247b43c52SJens Freimann } 401393736624SAvi Kivity case KVM_S390_INTERRUPT: { 4014ba5c1e9bSCarsten Otte struct kvm_s390_interrupt s390int; 4015383d0b05SJens Freimann struct kvm_s390_irq s390irq; 4016ba5c1e9bSCarsten Otte 4017ba5c1e9bSCarsten Otte if (copy_from_user(&s390int, argp, sizeof(s390int))) 40189b062471SChristoffer Dall return -EFAULT; 4019383d0b05SJens Freimann if (s390int_to_s390irq(&s390int, &s390irq)) 4020383d0b05SJens Freimann return -EINVAL; 40219b062471SChristoffer Dall return kvm_s390_inject_vcpu(vcpu, &s390irq); 4022ba5c1e9bSCarsten Otte } 40239b062471SChristoffer Dall } 40245cb0944cSPaolo Bonzini return -ENOIOCTLCMD; 40255cb0944cSPaolo Bonzini } 40265cb0944cSPaolo Bonzini 40275cb0944cSPaolo Bonzini long kvm_arch_vcpu_ioctl(struct file *filp, 40285cb0944cSPaolo Bonzini unsigned int ioctl, unsigned long arg) 40295cb0944cSPaolo Bonzini { 40305cb0944cSPaolo Bonzini struct kvm_vcpu *vcpu = filp->private_data; 40315cb0944cSPaolo Bonzini void __user *argp = (void __user *)arg; 40325cb0944cSPaolo Bonzini int idx; 40335cb0944cSPaolo Bonzini long r; 40349b062471SChristoffer Dall 40359b062471SChristoffer Dall vcpu_load(vcpu); 40369b062471SChristoffer Dall 40379b062471SChristoffer Dall switch (ioctl) { 4038b0c632dbSHeiko Carstens case KVM_S390_STORE_STATUS: 4039800c1065SThomas Huth idx = srcu_read_lock(&vcpu->kvm->srcu); 4040bc923cc9SAvi Kivity r = kvm_s390_vcpu_store_status(vcpu, arg); 4041800c1065SThomas Huth srcu_read_unlock(&vcpu->kvm->srcu, idx); 4042bc923cc9SAvi Kivity break; 4043b0c632dbSHeiko Carstens case KVM_S390_SET_INITIAL_PSW: { 4044b0c632dbSHeiko Carstens psw_t psw; 4045b0c632dbSHeiko Carstens 4046bc923cc9SAvi Kivity r = -EFAULT; 4047b0c632dbSHeiko Carstens if (copy_from_user(&psw, argp, sizeof(psw))) 4048bc923cc9SAvi Kivity break; 4049bc923cc9SAvi Kivity r = kvm_arch_vcpu_ioctl_set_initial_psw(vcpu, psw); 4050bc923cc9SAvi Kivity break; 4051b0c632dbSHeiko Carstens } 4052b0c632dbSHeiko Carstens case KVM_S390_INITIAL_RESET: 4053bc923cc9SAvi Kivity r = kvm_arch_vcpu_ioctl_initial_reset(vcpu); 4054bc923cc9SAvi Kivity break; 405514eebd91SCarsten Otte case KVM_SET_ONE_REG: 405614eebd91SCarsten Otte case KVM_GET_ONE_REG: { 405714eebd91SCarsten Otte struct kvm_one_reg reg; 405814eebd91SCarsten Otte r = -EFAULT; 405914eebd91SCarsten Otte if (copy_from_user(®, argp, sizeof(reg))) 406014eebd91SCarsten Otte break; 406114eebd91SCarsten Otte if (ioctl == KVM_SET_ONE_REG) 406214eebd91SCarsten Otte r = kvm_arch_vcpu_ioctl_set_one_reg(vcpu, ®); 406314eebd91SCarsten Otte else 406414eebd91SCarsten Otte r = kvm_arch_vcpu_ioctl_get_one_reg(vcpu, ®); 406514eebd91SCarsten Otte break; 406614eebd91SCarsten Otte } 406727e0393fSCarsten Otte #ifdef CONFIG_KVM_S390_UCONTROL 406827e0393fSCarsten Otte case KVM_S390_UCAS_MAP: { 406927e0393fSCarsten Otte struct kvm_s390_ucas_mapping ucasmap; 407027e0393fSCarsten Otte 407127e0393fSCarsten Otte if (copy_from_user(&ucasmap, argp, sizeof(ucasmap))) { 407227e0393fSCarsten Otte r = -EFAULT; 407327e0393fSCarsten Otte break; 407427e0393fSCarsten Otte } 407527e0393fSCarsten Otte 407627e0393fSCarsten Otte if (!kvm_is_ucontrol(vcpu->kvm)) { 407727e0393fSCarsten Otte r = -EINVAL; 407827e0393fSCarsten Otte break; 407927e0393fSCarsten Otte } 408027e0393fSCarsten Otte 408127e0393fSCarsten Otte r = gmap_map_segment(vcpu->arch.gmap, ucasmap.user_addr, 408227e0393fSCarsten Otte ucasmap.vcpu_addr, ucasmap.length); 408327e0393fSCarsten Otte break; 408427e0393fSCarsten Otte } 408527e0393fSCarsten Otte case KVM_S390_UCAS_UNMAP: { 408627e0393fSCarsten Otte struct kvm_s390_ucas_mapping ucasmap; 408727e0393fSCarsten Otte 408827e0393fSCarsten Otte if (copy_from_user(&ucasmap, argp, sizeof(ucasmap))) { 408927e0393fSCarsten Otte r = -EFAULT; 409027e0393fSCarsten Otte break; 409127e0393fSCarsten Otte } 409227e0393fSCarsten Otte 409327e0393fSCarsten Otte if (!kvm_is_ucontrol(vcpu->kvm)) { 409427e0393fSCarsten Otte r = -EINVAL; 409527e0393fSCarsten Otte break; 409627e0393fSCarsten Otte } 409727e0393fSCarsten Otte 409827e0393fSCarsten Otte r = gmap_unmap_segment(vcpu->arch.gmap, ucasmap.vcpu_addr, 409927e0393fSCarsten Otte ucasmap.length); 410027e0393fSCarsten Otte break; 410127e0393fSCarsten Otte } 410227e0393fSCarsten Otte #endif 4103ccc7910fSCarsten Otte case KVM_S390_VCPU_FAULT: { 4104527e30b4SMartin Schwidefsky r = gmap_fault(vcpu->arch.gmap, arg, 0); 4105ccc7910fSCarsten Otte break; 4106ccc7910fSCarsten Otte } 4107d6712df9SCornelia Huck case KVM_ENABLE_CAP: 4108d6712df9SCornelia Huck { 4109d6712df9SCornelia Huck struct kvm_enable_cap cap; 4110d6712df9SCornelia Huck r = -EFAULT; 4111d6712df9SCornelia Huck if (copy_from_user(&cap, argp, sizeof(cap))) 4112d6712df9SCornelia Huck break; 4113d6712df9SCornelia Huck r = kvm_vcpu_ioctl_enable_cap(vcpu, &cap); 4114d6712df9SCornelia Huck break; 4115d6712df9SCornelia Huck } 411641408c28SThomas Huth case KVM_S390_MEM_OP: { 411741408c28SThomas Huth struct kvm_s390_mem_op mem_op; 411841408c28SThomas Huth 411941408c28SThomas Huth if (copy_from_user(&mem_op, argp, sizeof(mem_op)) == 0) 412041408c28SThomas Huth r = kvm_s390_guest_mem_op(vcpu, &mem_op); 412141408c28SThomas Huth else 412241408c28SThomas Huth r = -EFAULT; 412341408c28SThomas Huth break; 412441408c28SThomas Huth } 4125816c7667SJens Freimann case KVM_S390_SET_IRQ_STATE: { 4126816c7667SJens Freimann struct kvm_s390_irq_state irq_state; 4127816c7667SJens Freimann 4128816c7667SJens Freimann r = -EFAULT; 4129816c7667SJens Freimann if (copy_from_user(&irq_state, argp, sizeof(irq_state))) 4130816c7667SJens Freimann break; 4131816c7667SJens Freimann if (irq_state.len > VCPU_IRQS_MAX_BUF || 4132816c7667SJens Freimann irq_state.len == 0 || 4133816c7667SJens Freimann irq_state.len % sizeof(struct kvm_s390_irq) > 0) { 4134816c7667SJens Freimann r = -EINVAL; 4135816c7667SJens Freimann break; 4136816c7667SJens Freimann } 4137bb64da9aSChristian Borntraeger /* do not use irq_state.flags, it will break old QEMUs */ 4138816c7667SJens Freimann r = kvm_s390_set_irq_state(vcpu, 4139816c7667SJens Freimann (void __user *) irq_state.buf, 4140816c7667SJens Freimann irq_state.len); 4141816c7667SJens Freimann break; 4142816c7667SJens Freimann } 4143816c7667SJens Freimann case KVM_S390_GET_IRQ_STATE: { 4144816c7667SJens Freimann struct kvm_s390_irq_state irq_state; 4145816c7667SJens Freimann 4146816c7667SJens Freimann r = -EFAULT; 4147816c7667SJens Freimann if (copy_from_user(&irq_state, argp, sizeof(irq_state))) 4148816c7667SJens Freimann break; 4149816c7667SJens Freimann if (irq_state.len == 0) { 4150816c7667SJens Freimann r = -EINVAL; 4151816c7667SJens Freimann break; 4152816c7667SJens Freimann } 4153bb64da9aSChristian Borntraeger /* do not use irq_state.flags, it will break old QEMUs */ 4154816c7667SJens Freimann r = kvm_s390_get_irq_state(vcpu, 4155816c7667SJens Freimann (__u8 __user *) irq_state.buf, 4156816c7667SJens Freimann irq_state.len); 4157816c7667SJens Freimann break; 4158816c7667SJens Freimann } 4159b0c632dbSHeiko Carstens default: 41603e6afcf1SCarsten Otte r = -ENOTTY; 4161b0c632dbSHeiko Carstens } 41629b062471SChristoffer Dall 41639b062471SChristoffer Dall vcpu_put(vcpu); 4164bc923cc9SAvi Kivity return r; 4165b0c632dbSHeiko Carstens } 4166b0c632dbSHeiko Carstens 41671499fa80SSouptick Joarder vm_fault_t kvm_arch_vcpu_fault(struct kvm_vcpu *vcpu, struct vm_fault *vmf) 41685b1c1493SCarsten Otte { 41695b1c1493SCarsten Otte #ifdef CONFIG_KVM_S390_UCONTROL 41705b1c1493SCarsten Otte if ((vmf->pgoff == KVM_S390_SIE_PAGE_OFFSET) 41715b1c1493SCarsten Otte && (kvm_is_ucontrol(vcpu->kvm))) { 41725b1c1493SCarsten Otte vmf->page = virt_to_page(vcpu->arch.sie_block); 41735b1c1493SCarsten Otte get_page(vmf->page); 41745b1c1493SCarsten Otte return 0; 41755b1c1493SCarsten Otte } 41765b1c1493SCarsten Otte #endif 41775b1c1493SCarsten Otte return VM_FAULT_SIGBUS; 41785b1c1493SCarsten Otte } 41795b1c1493SCarsten Otte 41805587027cSAneesh Kumar K.V int kvm_arch_create_memslot(struct kvm *kvm, struct kvm_memory_slot *slot, 41815587027cSAneesh Kumar K.V unsigned long npages) 4182db3fe4ebSTakuya Yoshikawa { 4183db3fe4ebSTakuya Yoshikawa return 0; 4184db3fe4ebSTakuya Yoshikawa } 4185db3fe4ebSTakuya Yoshikawa 4186b0c632dbSHeiko Carstens /* Section: memory related */ 4187f7784b8eSMarcelo Tosatti int kvm_arch_prepare_memory_region(struct kvm *kvm, 4188f7784b8eSMarcelo Tosatti struct kvm_memory_slot *memslot, 418909170a49SPaolo Bonzini const struct kvm_userspace_memory_region *mem, 41907b6195a9STakuya Yoshikawa enum kvm_mr_change change) 4191b0c632dbSHeiko Carstens { 4192dd2887e7SNick Wang /* A few sanity checks. We can have memory slots which have to be 4193dd2887e7SNick Wang located/ended at a segment boundary (1MB). The memory in userland is 4194dd2887e7SNick Wang ok to be fragmented into various different vmas. It is okay to mmap() 4195dd2887e7SNick Wang and munmap() stuff in this slot after doing this call at any time */ 4196b0c632dbSHeiko Carstens 4197598841caSCarsten Otte if (mem->userspace_addr & 0xffffful) 4198b0c632dbSHeiko Carstens return -EINVAL; 4199b0c632dbSHeiko Carstens 4200598841caSCarsten Otte if (mem->memory_size & 0xffffful) 4201b0c632dbSHeiko Carstens return -EINVAL; 4202b0c632dbSHeiko Carstens 4203a3a92c31SDominik Dingel if (mem->guest_phys_addr + mem->memory_size > kvm->arch.mem_limit) 4204a3a92c31SDominik Dingel return -EINVAL; 4205a3a92c31SDominik Dingel 4206f7784b8eSMarcelo Tosatti return 0; 4207f7784b8eSMarcelo Tosatti } 4208f7784b8eSMarcelo Tosatti 4209f7784b8eSMarcelo Tosatti void kvm_arch_commit_memory_region(struct kvm *kvm, 421009170a49SPaolo Bonzini const struct kvm_userspace_memory_region *mem, 42118482644aSTakuya Yoshikawa const struct kvm_memory_slot *old, 4212f36f3f28SPaolo Bonzini const struct kvm_memory_slot *new, 42138482644aSTakuya Yoshikawa enum kvm_mr_change change) 4214f7784b8eSMarcelo Tosatti { 4215f7850c92SCarsten Otte int rc; 4216f7784b8eSMarcelo Tosatti 42172cef4debSChristian Borntraeger /* If the basics of the memslot do not change, we do not want 42182cef4debSChristian Borntraeger * to update the gmap. Every update causes several unnecessary 42192cef4debSChristian Borntraeger * segment translation exceptions. This is usually handled just 42202cef4debSChristian Borntraeger * fine by the normal fault handler + gmap, but it will also 42212cef4debSChristian Borntraeger * cause faults on the prefix page of running guest CPUs. 42222cef4debSChristian Borntraeger */ 42232cef4debSChristian Borntraeger if (old->userspace_addr == mem->userspace_addr && 42242cef4debSChristian Borntraeger old->base_gfn * PAGE_SIZE == mem->guest_phys_addr && 42252cef4debSChristian Borntraeger old->npages * PAGE_SIZE == mem->memory_size) 42262cef4debSChristian Borntraeger return; 4227598841caSCarsten Otte 4228598841caSCarsten Otte rc = gmap_map_segment(kvm->arch.gmap, mem->userspace_addr, 4229598841caSCarsten Otte mem->guest_phys_addr, mem->memory_size); 4230598841caSCarsten Otte if (rc) 4231ea2cdd27SDavid Hildenbrand pr_warn("failed to commit memory region\n"); 4232598841caSCarsten Otte return; 4233b0c632dbSHeiko Carstens } 4234b0c632dbSHeiko Carstens 423560a37709SAlexander Yarygin static inline unsigned long nonhyp_mask(int i) 423660a37709SAlexander Yarygin { 423760a37709SAlexander Yarygin unsigned int nonhyp_fai = (sclp.hmfai << i * 2) >> 30; 423860a37709SAlexander Yarygin 423960a37709SAlexander Yarygin return 0x0000ffffffffffffUL >> (nonhyp_fai << 4); 424060a37709SAlexander Yarygin } 424160a37709SAlexander Yarygin 42423491caf2SChristian Borntraeger void kvm_arch_vcpu_block_finish(struct kvm_vcpu *vcpu) 42433491caf2SChristian Borntraeger { 42443491caf2SChristian Borntraeger vcpu->valid_wakeup = false; 42453491caf2SChristian Borntraeger } 42463491caf2SChristian Borntraeger 4247b0c632dbSHeiko Carstens static int __init kvm_s390_init(void) 4248b0c632dbSHeiko Carstens { 424960a37709SAlexander Yarygin int i; 425060a37709SAlexander Yarygin 425107197fd0SDavid Hildenbrand if (!sclp.has_sief2) { 425207197fd0SDavid Hildenbrand pr_info("SIE not available\n"); 425307197fd0SDavid Hildenbrand return -ENODEV; 425407197fd0SDavid Hildenbrand } 425507197fd0SDavid Hildenbrand 4256a4499382SJanosch Frank if (nested && hpage) { 4257a4499382SJanosch Frank pr_info("nested (vSIE) and hpage (huge page backing) can currently not be activated concurrently"); 4258a4499382SJanosch Frank return -EINVAL; 4259a4499382SJanosch Frank } 4260a4499382SJanosch Frank 426160a37709SAlexander Yarygin for (i = 0; i < 16; i++) 4262c3b9e3e1SChristian Borntraeger kvm_s390_fac_base[i] |= 426360a37709SAlexander Yarygin S390_lowcore.stfle_fac_list[i] & nonhyp_mask(i); 426460a37709SAlexander Yarygin 42659d8d5786SMichael Mueller return kvm_init(NULL, sizeof(struct kvm_vcpu), 0, THIS_MODULE); 4266b0c632dbSHeiko Carstens } 4267b0c632dbSHeiko Carstens 4268b0c632dbSHeiko Carstens static void __exit kvm_s390_exit(void) 4269b0c632dbSHeiko Carstens { 4270b0c632dbSHeiko Carstens kvm_exit(); 4271b0c632dbSHeiko Carstens } 4272b0c632dbSHeiko Carstens 4273b0c632dbSHeiko Carstens module_init(kvm_s390_init); 4274b0c632dbSHeiko Carstens module_exit(kvm_s390_exit); 4275566af940SCornelia Huck 4276566af940SCornelia Huck /* 4277566af940SCornelia Huck * Enable autoloading of the kvm module. 4278566af940SCornelia Huck * Note that we add the module alias here instead of virt/kvm/kvm_main.c 4279566af940SCornelia Huck * since x86 takes a different approach. 4280566af940SCornelia Huck */ 4281566af940SCornelia Huck #include <linux/miscdevice.h> 4282566af940SCornelia Huck MODULE_ALIAS_MISCDEV(KVM_MINOR); 4283566af940SCornelia Huck MODULE_ALIAS("devname:kvm"); 4284