1d809aa23SGreg Kroah-Hartman // SPDX-License-Identifier: GPL-2.0 2b0c632dbSHeiko Carstens /* 3bb64da9aSChristian Borntraeger * hosting IBM Z kernel virtual machines (s390x) 4b0c632dbSHeiko Carstens * 5a37cb07aSChristian Borntraeger * Copyright IBM Corp. 2008, 2018 6b0c632dbSHeiko Carstens * 7b0c632dbSHeiko Carstens * Author(s): Carsten Otte <cotte@de.ibm.com> 8b0c632dbSHeiko Carstens * Christian Borntraeger <borntraeger@de.ibm.com> 9b0c632dbSHeiko Carstens * Heiko Carstens <heiko.carstens@de.ibm.com> 10628eb9b8SChristian Ehrhardt * Christian Ehrhardt <ehrhardt@de.ibm.com> 1115f36ebdSJason J. Herne * Jason J. Herne <jjherne@us.ibm.com> 12b0c632dbSHeiko Carstens */ 13b0c632dbSHeiko Carstens 147aedd9d4SMichael Mueller #define KMSG_COMPONENT "kvm-s390" 157aedd9d4SMichael Mueller #define pr_fmt(fmt) KMSG_COMPONENT ": " fmt 167aedd9d4SMichael Mueller 17b0c632dbSHeiko Carstens #include <linux/compiler.h> 18b0c632dbSHeiko Carstens #include <linux/err.h> 19b0c632dbSHeiko Carstens #include <linux/fs.h> 20ca872302SChristian Borntraeger #include <linux/hrtimer.h> 21b0c632dbSHeiko Carstens #include <linux/init.h> 22b0c632dbSHeiko Carstens #include <linux/kvm.h> 23b0c632dbSHeiko Carstens #include <linux/kvm_host.h> 24b2d73b2aSMartin Schwidefsky #include <linux/mman.h> 25b0c632dbSHeiko Carstens #include <linux/module.h> 26d3217967SPaul Gortmaker #include <linux/moduleparam.h> 27a374e892STony Krowiak #include <linux/random.h> 28b0c632dbSHeiko Carstens #include <linux/slab.h> 29ba5c1e9bSCarsten Otte #include <linux/timer.h> 3041408c28SThomas Huth #include <linux/vmalloc.h> 3115c9705fSDavid Hildenbrand #include <linux/bitmap.h> 32174cd4b1SIngo Molnar #include <linux/sched/signal.h> 33190df4a2SClaudio Imbrenda #include <linux/string.h> 34174cd4b1SIngo Molnar 35cbb870c8SHeiko Carstens #include <asm/asm-offsets.h> 36b0c632dbSHeiko Carstens #include <asm/lowcore.h> 37fd5ada04SMartin Schwidefsky #include <asm/stp.h> 38b0c632dbSHeiko Carstens #include <asm/pgtable.h> 391e133ab2SMartin Schwidefsky #include <asm/gmap.h> 40f5daba1dSHeiko Carstens #include <asm/nmi.h> 41a0616cdeSDavid Howells #include <asm/switch_to.h> 426d3da241SJens Freimann #include <asm/isc.h> 431526bf9cSChristian Borntraeger #include <asm/sclp.h> 440a763c78SDavid Hildenbrand #include <asm/cpacf.h> 45221bb8a4SLinus Torvalds #include <asm/timex.h> 46e585b24aSTony Krowiak #include <asm/ap.h> 478f2abe6aSChristian Borntraeger #include "kvm-s390.h" 48b0c632dbSHeiko Carstens #include "gaccess.h" 49b0c632dbSHeiko Carstens 505786fffaSCornelia Huck #define CREATE_TRACE_POINTS 515786fffaSCornelia Huck #include "trace.h" 52ade38c31SCornelia Huck #include "trace-s390.h" 535786fffaSCornelia Huck 5441408c28SThomas Huth #define MEM_OP_MAX_SIZE 65536 /* Maximum transfer size for KVM_S390_MEM_OP */ 55816c7667SJens Freimann #define LOCAL_IRQS 32 56816c7667SJens Freimann #define VCPU_IRQS_MAX_BUF (sizeof(struct kvm_s390_irq) * \ 57816c7667SJens Freimann (KVM_MAX_VCPUS + LOCAL_IRQS)) 5841408c28SThomas Huth 59b0c632dbSHeiko Carstens #define VCPU_STAT(x) offsetof(struct kvm_vcpu, stat.x), KVM_STAT_VCPU 60ccc40c53SChristian Borntraeger #define VM_STAT(x) offsetof(struct kvm, stat.x), KVM_STAT_VM 61b0c632dbSHeiko Carstens 62b0c632dbSHeiko Carstens struct kvm_stats_debugfs_item debugfs_entries[] = { 63b0c632dbSHeiko Carstens { "userspace_handled", VCPU_STAT(exit_userspace) }, 640eaeafa1SChristian Borntraeger { "exit_null", VCPU_STAT(exit_null) }, 658f2abe6aSChristian Borntraeger { "exit_validity", VCPU_STAT(exit_validity) }, 668f2abe6aSChristian Borntraeger { "exit_stop_request", VCPU_STAT(exit_stop_request) }, 678f2abe6aSChristian Borntraeger { "exit_external_request", VCPU_STAT(exit_external_request) }, 68a5e0aceaSChristian Borntraeger { "exit_io_request", VCPU_STAT(exit_io_request) }, 698f2abe6aSChristian Borntraeger { "exit_external_interrupt", VCPU_STAT(exit_external_interrupt) }, 70ba5c1e9bSCarsten Otte { "exit_instruction", VCPU_STAT(exit_instruction) }, 719ec6de19SAlexander Yarygin { "exit_pei", VCPU_STAT(exit_pei) }, 72ba5c1e9bSCarsten Otte { "exit_program_interruption", VCPU_STAT(exit_program_interruption) }, 73ba5c1e9bSCarsten Otte { "exit_instr_and_program_int", VCPU_STAT(exit_instr_and_program) }, 74a011eeb2SJanosch Frank { "exit_operation_exception", VCPU_STAT(exit_operation_exception) }, 75f7819512SPaolo Bonzini { "halt_successful_poll", VCPU_STAT(halt_successful_poll) }, 7662bea5bfSPaolo Bonzini { "halt_attempted_poll", VCPU_STAT(halt_attempted_poll) }, 773491caf2SChristian Borntraeger { "halt_poll_invalid", VCPU_STAT(halt_poll_invalid) }, 78ce2e4f0bSDavid Hildenbrand { "halt_wakeup", VCPU_STAT(halt_wakeup) }, 79f5e10b09SChristian Borntraeger { "instruction_lctlg", VCPU_STAT(instruction_lctlg) }, 80ba5c1e9bSCarsten Otte { "instruction_lctl", VCPU_STAT(instruction_lctl) }, 81aba07508SDavid Hildenbrand { "instruction_stctl", VCPU_STAT(instruction_stctl) }, 82aba07508SDavid Hildenbrand { "instruction_stctg", VCPU_STAT(instruction_stctg) }, 83ccc40c53SChristian Borntraeger { "deliver_ckc", VCPU_STAT(deliver_ckc) }, 84ccc40c53SChristian Borntraeger { "deliver_cputm", VCPU_STAT(deliver_cputm) }, 85ba5c1e9bSCarsten Otte { "deliver_emergency_signal", VCPU_STAT(deliver_emergency_signal) }, 867697e71fSChristian Ehrhardt { "deliver_external_call", VCPU_STAT(deliver_external_call) }, 87ba5c1e9bSCarsten Otte { "deliver_service_signal", VCPU_STAT(deliver_service_signal) }, 88ccc40c53SChristian Borntraeger { "deliver_virtio", VCPU_STAT(deliver_virtio) }, 89ba5c1e9bSCarsten Otte { "deliver_stop_signal", VCPU_STAT(deliver_stop_signal) }, 90ba5c1e9bSCarsten Otte { "deliver_prefix_signal", VCPU_STAT(deliver_prefix_signal) }, 91ba5c1e9bSCarsten Otte { "deliver_restart_signal", VCPU_STAT(deliver_restart_signal) }, 92ccc40c53SChristian Borntraeger { "deliver_program", VCPU_STAT(deliver_program) }, 93ccc40c53SChristian Borntraeger { "deliver_io", VCPU_STAT(deliver_io) }, 9432de0749SQingFeng Hao { "deliver_machine_check", VCPU_STAT(deliver_machine_check) }, 95ba5c1e9bSCarsten Otte { "exit_wait_state", VCPU_STAT(exit_wait_state) }, 96ccc40c53SChristian Borntraeger { "inject_ckc", VCPU_STAT(inject_ckc) }, 97ccc40c53SChristian Borntraeger { "inject_cputm", VCPU_STAT(inject_cputm) }, 98ccc40c53SChristian Borntraeger { "inject_external_call", VCPU_STAT(inject_external_call) }, 99ccc40c53SChristian Borntraeger { "inject_float_mchk", VM_STAT(inject_float_mchk) }, 100ccc40c53SChristian Borntraeger { "inject_emergency_signal", VCPU_STAT(inject_emergency_signal) }, 101ccc40c53SChristian Borntraeger { "inject_io", VM_STAT(inject_io) }, 102ccc40c53SChristian Borntraeger { "inject_mchk", VCPU_STAT(inject_mchk) }, 103ccc40c53SChristian Borntraeger { "inject_pfault_done", VM_STAT(inject_pfault_done) }, 104ccc40c53SChristian Borntraeger { "inject_program", VCPU_STAT(inject_program) }, 105ccc40c53SChristian Borntraeger { "inject_restart", VCPU_STAT(inject_restart) }, 106ccc40c53SChristian Borntraeger { "inject_service_signal", VM_STAT(inject_service_signal) }, 107ccc40c53SChristian Borntraeger { "inject_set_prefix", VCPU_STAT(inject_set_prefix) }, 108ccc40c53SChristian Borntraeger { "inject_stop_signal", VCPU_STAT(inject_stop_signal) }, 109ccc40c53SChristian Borntraeger { "inject_pfault_init", VCPU_STAT(inject_pfault_init) }, 110ccc40c53SChristian Borntraeger { "inject_virtio", VM_STAT(inject_virtio) }, 111a37cb07aSChristian Borntraeger { "instruction_epsw", VCPU_STAT(instruction_epsw) }, 112a37cb07aSChristian Borntraeger { "instruction_gs", VCPU_STAT(instruction_gs) }, 113a37cb07aSChristian Borntraeger { "instruction_io_other", VCPU_STAT(instruction_io_other) }, 114a37cb07aSChristian Borntraeger { "instruction_lpsw", VCPU_STAT(instruction_lpsw) }, 115a37cb07aSChristian Borntraeger { "instruction_lpswe", VCPU_STAT(instruction_lpswe) }, 11669d0d3a3SChristian Borntraeger { "instruction_pfmf", VCPU_STAT(instruction_pfmf) }, 117a37cb07aSChristian Borntraeger { "instruction_ptff", VCPU_STAT(instruction_ptff) }, 118453423dcSChristian Borntraeger { "instruction_stidp", VCPU_STAT(instruction_stidp) }, 119a37cb07aSChristian Borntraeger { "instruction_sck", VCPU_STAT(instruction_sck) }, 120a37cb07aSChristian Borntraeger { "instruction_sckpf", VCPU_STAT(instruction_sckpf) }, 121453423dcSChristian Borntraeger { "instruction_spx", VCPU_STAT(instruction_spx) }, 122453423dcSChristian Borntraeger { "instruction_stpx", VCPU_STAT(instruction_stpx) }, 123453423dcSChristian Borntraeger { "instruction_stap", VCPU_STAT(instruction_stap) }, 124a37cb07aSChristian Borntraeger { "instruction_iske", VCPU_STAT(instruction_iske) }, 125a37cb07aSChristian Borntraeger { "instruction_ri", VCPU_STAT(instruction_ri) }, 126a37cb07aSChristian Borntraeger { "instruction_rrbe", VCPU_STAT(instruction_rrbe) }, 127a37cb07aSChristian Borntraeger { "instruction_sske", VCPU_STAT(instruction_sske) }, 1288a242234SHeiko Carstens { "instruction_ipte_interlock", VCPU_STAT(instruction_ipte_interlock) }, 129b31288faSKonstantin Weitz { "instruction_essa", VCPU_STAT(instruction_essa) }, 130453423dcSChristian Borntraeger { "instruction_stsi", VCPU_STAT(instruction_stsi) }, 131453423dcSChristian Borntraeger { "instruction_stfl", VCPU_STAT(instruction_stfl) }, 132a37cb07aSChristian Borntraeger { "instruction_tb", VCPU_STAT(instruction_tb) }, 133a37cb07aSChristian Borntraeger { "instruction_tpi", VCPU_STAT(instruction_tpi) }, 134bb25b9baSChristian Borntraeger { "instruction_tprot", VCPU_STAT(instruction_tprot) }, 135a37cb07aSChristian Borntraeger { "instruction_tsch", VCPU_STAT(instruction_tsch) }, 13695ca2cb5SJanosch Frank { "instruction_sthyi", VCPU_STAT(instruction_sthyi) }, 137a3508fbeSDavid Hildenbrand { "instruction_sie", VCPU_STAT(instruction_sie) }, 1385288fbf0SChristian Borntraeger { "instruction_sigp_sense", VCPU_STAT(instruction_sigp_sense) }, 139bd59d3a4SCornelia Huck { "instruction_sigp_sense_running", VCPU_STAT(instruction_sigp_sense_running) }, 1407697e71fSChristian Ehrhardt { "instruction_sigp_external_call", VCPU_STAT(instruction_sigp_external_call) }, 1415288fbf0SChristian Borntraeger { "instruction_sigp_emergency", VCPU_STAT(instruction_sigp_emergency) }, 14242cb0c9fSDavid Hildenbrand { "instruction_sigp_cond_emergency", VCPU_STAT(instruction_sigp_cond_emergency) }, 14342cb0c9fSDavid Hildenbrand { "instruction_sigp_start", VCPU_STAT(instruction_sigp_start) }, 1445288fbf0SChristian Borntraeger { "instruction_sigp_stop", VCPU_STAT(instruction_sigp_stop) }, 14542cb0c9fSDavid Hildenbrand { "instruction_sigp_stop_store_status", VCPU_STAT(instruction_sigp_stop_store_status) }, 14642cb0c9fSDavid Hildenbrand { "instruction_sigp_store_status", VCPU_STAT(instruction_sigp_store_status) }, 147cd7b4b61SEric Farman { "instruction_sigp_store_adtl_status", VCPU_STAT(instruction_sigp_store_adtl_status) }, 1485288fbf0SChristian Borntraeger { "instruction_sigp_set_arch", VCPU_STAT(instruction_sigp_arch) }, 1495288fbf0SChristian Borntraeger { "instruction_sigp_set_prefix", VCPU_STAT(instruction_sigp_prefix) }, 1505288fbf0SChristian Borntraeger { "instruction_sigp_restart", VCPU_STAT(instruction_sigp_restart) }, 15142cb0c9fSDavid Hildenbrand { "instruction_sigp_cpu_reset", VCPU_STAT(instruction_sigp_cpu_reset) }, 15242cb0c9fSDavid Hildenbrand { "instruction_sigp_init_cpu_reset", VCPU_STAT(instruction_sigp_init_cpu_reset) }, 15342cb0c9fSDavid Hildenbrand { "instruction_sigp_unknown", VCPU_STAT(instruction_sigp_unknown) }, 154866c138cSChristian Borntraeger { "instruction_diag_10", VCPU_STAT(diagnose_10) }, 155866c138cSChristian Borntraeger { "instruction_diag_44", VCPU_STAT(diagnose_44) }, 156866c138cSChristian Borntraeger { "instruction_diag_9c", VCPU_STAT(diagnose_9c) }, 157866c138cSChristian Borntraeger { "instruction_diag_258", VCPU_STAT(diagnose_258) }, 158866c138cSChristian Borntraeger { "instruction_diag_308", VCPU_STAT(diagnose_308) }, 159866c138cSChristian Borntraeger { "instruction_diag_500", VCPU_STAT(diagnose_500) }, 160a37cb07aSChristian Borntraeger { "instruction_diag_other", VCPU_STAT(diagnose_other) }, 161b0c632dbSHeiko Carstens { NULL } 162b0c632dbSHeiko Carstens }; 163b0c632dbSHeiko Carstens 1648fa1696eSCollin L. Walling struct kvm_s390_tod_clock_ext { 1658fa1696eSCollin L. Walling __u8 epoch_idx; 1668fa1696eSCollin L. Walling __u64 tod; 1678fa1696eSCollin L. Walling __u8 reserved[7]; 1688fa1696eSCollin L. Walling } __packed; 1698fa1696eSCollin L. Walling 170a411edf1SDavid Hildenbrand /* allow nested virtualization in KVM (if enabled by user space) */ 171a411edf1SDavid Hildenbrand static int nested; 172a411edf1SDavid Hildenbrand module_param(nested, int, S_IRUGO); 173a411edf1SDavid Hildenbrand MODULE_PARM_DESC(nested, "Nested virtualization support"); 174a411edf1SDavid Hildenbrand 175a4499382SJanosch Frank /* allow 1m huge page guest backing, if !nested */ 176a4499382SJanosch Frank static int hpage; 177a4499382SJanosch Frank module_param(hpage, int, 0444); 178a4499382SJanosch Frank MODULE_PARM_DESC(hpage, "1m huge page backing support"); 179b0c632dbSHeiko Carstens 180c3b9e3e1SChristian Borntraeger /* 181c3b9e3e1SChristian Borntraeger * For now we handle at most 16 double words as this is what the s390 base 182c3b9e3e1SChristian Borntraeger * kernel handles and stores in the prefix page. If we ever need to go beyond 183c3b9e3e1SChristian Borntraeger * this, this requires changes to code, but the external uapi can stay. 184c3b9e3e1SChristian Borntraeger */ 185c3b9e3e1SChristian Borntraeger #define SIZE_INTERNAL 16 186c3b9e3e1SChristian Borntraeger 187c3b9e3e1SChristian Borntraeger /* 188c3b9e3e1SChristian Borntraeger * Base feature mask that defines default mask for facilities. Consists of the 189c3b9e3e1SChristian Borntraeger * defines in FACILITIES_KVM and the non-hypervisor managed bits. 190c3b9e3e1SChristian Borntraeger */ 191c3b9e3e1SChristian Borntraeger static unsigned long kvm_s390_fac_base[SIZE_INTERNAL] = { FACILITIES_KVM }; 192c3b9e3e1SChristian Borntraeger /* 193c3b9e3e1SChristian Borntraeger * Extended feature mask. Consists of the defines in FACILITIES_KVM_CPUMODEL 194c3b9e3e1SChristian Borntraeger * and defines the facilities that can be enabled via a cpu model. 195c3b9e3e1SChristian Borntraeger */ 196c3b9e3e1SChristian Borntraeger static unsigned long kvm_s390_fac_ext[SIZE_INTERNAL] = { FACILITIES_KVM_CPUMODEL }; 197c3b9e3e1SChristian Borntraeger 198c3b9e3e1SChristian Borntraeger static unsigned long kvm_s390_fac_size(void) 19978c4b59fSMichael Mueller { 200c3b9e3e1SChristian Borntraeger BUILD_BUG_ON(SIZE_INTERNAL > S390_ARCH_FAC_MASK_SIZE_U64); 201c3b9e3e1SChristian Borntraeger BUILD_BUG_ON(SIZE_INTERNAL > S390_ARCH_FAC_LIST_SIZE_U64); 202c3b9e3e1SChristian Borntraeger BUILD_BUG_ON(SIZE_INTERNAL * sizeof(unsigned long) > 203c3b9e3e1SChristian Borntraeger sizeof(S390_lowcore.stfle_fac_list)); 204c3b9e3e1SChristian Borntraeger 205c3b9e3e1SChristian Borntraeger return SIZE_INTERNAL; 20678c4b59fSMichael Mueller } 20778c4b59fSMichael Mueller 20815c9705fSDavid Hildenbrand /* available cpu features supported by kvm */ 20915c9705fSDavid Hildenbrand static DECLARE_BITMAP(kvm_s390_available_cpu_feat, KVM_S390_VM_CPU_FEAT_NR_BITS); 2100a763c78SDavid Hildenbrand /* available subfunctions indicated via query / "test bit" */ 2110a763c78SDavid Hildenbrand static struct kvm_s390_vm_cpu_subfunc kvm_s390_available_subfunc; 21215c9705fSDavid Hildenbrand 2139d8d5786SMichael Mueller static struct gmap_notifier gmap_notifier; 214a3508fbeSDavid Hildenbrand static struct gmap_notifier vsie_gmap_notifier; 21578f26131SChristian Borntraeger debug_info_t *kvm_s390_dbf; 2169d8d5786SMichael Mueller 217b0c632dbSHeiko Carstens /* Section: not file related */ 21813a34e06SRadim Krčmář int kvm_arch_hardware_enable(void) 219b0c632dbSHeiko Carstens { 220b0c632dbSHeiko Carstens /* every s390 is virtualization enabled ;-) */ 22110474ae8SAlexander Graf return 0; 222b0c632dbSHeiko Carstens } 223b0c632dbSHeiko Carstens 224414d3b07SMartin Schwidefsky static void kvm_gmap_notifier(struct gmap *gmap, unsigned long start, 225414d3b07SMartin Schwidefsky unsigned long end); 2262c70fe44SChristian Borntraeger 2271575767eSDavid Hildenbrand static void kvm_clock_sync_scb(struct kvm_s390_sie_block *scb, u64 delta) 2281575767eSDavid Hildenbrand { 2291575767eSDavid Hildenbrand u8 delta_idx = 0; 2301575767eSDavid Hildenbrand 2311575767eSDavid Hildenbrand /* 2321575767eSDavid Hildenbrand * The TOD jumps by delta, we have to compensate this by adding 2331575767eSDavid Hildenbrand * -delta to the epoch. 2341575767eSDavid Hildenbrand */ 2351575767eSDavid Hildenbrand delta = -delta; 2361575767eSDavid Hildenbrand 2371575767eSDavid Hildenbrand /* sign-extension - we're adding to signed values below */ 2381575767eSDavid Hildenbrand if ((s64)delta < 0) 2391575767eSDavid Hildenbrand delta_idx = -1; 2401575767eSDavid Hildenbrand 2411575767eSDavid Hildenbrand scb->epoch += delta; 2421575767eSDavid Hildenbrand if (scb->ecd & ECD_MEF) { 2431575767eSDavid Hildenbrand scb->epdx += delta_idx; 2441575767eSDavid Hildenbrand if (scb->epoch < delta) 2451575767eSDavid Hildenbrand scb->epdx += 1; 2461575767eSDavid Hildenbrand } 2471575767eSDavid Hildenbrand } 2481575767eSDavid Hildenbrand 249fdf03650SFan Zhang /* 250fdf03650SFan Zhang * This callback is executed during stop_machine(). All CPUs are therefore 251fdf03650SFan Zhang * temporarily stopped. In order not to change guest behavior, we have to 252fdf03650SFan Zhang * disable preemption whenever we touch the epoch of kvm and the VCPUs, 253fdf03650SFan Zhang * so a CPU won't be stopped while calculating with the epoch. 254fdf03650SFan Zhang */ 255fdf03650SFan Zhang static int kvm_clock_sync(struct notifier_block *notifier, unsigned long val, 256fdf03650SFan Zhang void *v) 257fdf03650SFan Zhang { 258fdf03650SFan Zhang struct kvm *kvm; 259fdf03650SFan Zhang struct kvm_vcpu *vcpu; 260fdf03650SFan Zhang int i; 261fdf03650SFan Zhang unsigned long long *delta = v; 262fdf03650SFan Zhang 263fdf03650SFan Zhang list_for_each_entry(kvm, &vm_list, vm_list) { 264fdf03650SFan Zhang kvm_for_each_vcpu(i, vcpu, kvm) { 2651575767eSDavid Hildenbrand kvm_clock_sync_scb(vcpu->arch.sie_block, *delta); 2661575767eSDavid Hildenbrand if (i == 0) { 2671575767eSDavid Hildenbrand kvm->arch.epoch = vcpu->arch.sie_block->epoch; 2681575767eSDavid Hildenbrand kvm->arch.epdx = vcpu->arch.sie_block->epdx; 2691575767eSDavid Hildenbrand } 270db0758b2SDavid Hildenbrand if (vcpu->arch.cputm_enabled) 271db0758b2SDavid Hildenbrand vcpu->arch.cputm_start += *delta; 27291473b48SDavid Hildenbrand if (vcpu->arch.vsie_block) 2731575767eSDavid Hildenbrand kvm_clock_sync_scb(vcpu->arch.vsie_block, 2741575767eSDavid Hildenbrand *delta); 275fdf03650SFan Zhang } 276fdf03650SFan Zhang } 277fdf03650SFan Zhang return NOTIFY_OK; 278fdf03650SFan Zhang } 279fdf03650SFan Zhang 280fdf03650SFan Zhang static struct notifier_block kvm_clock_notifier = { 281fdf03650SFan Zhang .notifier_call = kvm_clock_sync, 282fdf03650SFan Zhang }; 283fdf03650SFan Zhang 284b0c632dbSHeiko Carstens int kvm_arch_hardware_setup(void) 285b0c632dbSHeiko Carstens { 2862c70fe44SChristian Borntraeger gmap_notifier.notifier_call = kvm_gmap_notifier; 287b2d73b2aSMartin Schwidefsky gmap_register_pte_notifier(&gmap_notifier); 288a3508fbeSDavid Hildenbrand vsie_gmap_notifier.notifier_call = kvm_s390_vsie_gmap_notifier; 289a3508fbeSDavid Hildenbrand gmap_register_pte_notifier(&vsie_gmap_notifier); 290fdf03650SFan Zhang atomic_notifier_chain_register(&s390_epoch_delta_notifier, 291fdf03650SFan Zhang &kvm_clock_notifier); 292b0c632dbSHeiko Carstens return 0; 293b0c632dbSHeiko Carstens } 294b0c632dbSHeiko Carstens 295b0c632dbSHeiko Carstens void kvm_arch_hardware_unsetup(void) 296b0c632dbSHeiko Carstens { 297b2d73b2aSMartin Schwidefsky gmap_unregister_pte_notifier(&gmap_notifier); 298a3508fbeSDavid Hildenbrand gmap_unregister_pte_notifier(&vsie_gmap_notifier); 299fdf03650SFan Zhang atomic_notifier_chain_unregister(&s390_epoch_delta_notifier, 300fdf03650SFan Zhang &kvm_clock_notifier); 301b0c632dbSHeiko Carstens } 302b0c632dbSHeiko Carstens 30322be5a13SDavid Hildenbrand static void allow_cpu_feat(unsigned long nr) 30422be5a13SDavid Hildenbrand { 30522be5a13SDavid Hildenbrand set_bit_inv(nr, kvm_s390_available_cpu_feat); 30622be5a13SDavid Hildenbrand } 30722be5a13SDavid Hildenbrand 3080a763c78SDavid Hildenbrand static inline int plo_test_bit(unsigned char nr) 3090a763c78SDavid Hildenbrand { 3100a763c78SDavid Hildenbrand register unsigned long r0 asm("0") = (unsigned long) nr | 0x100; 311d051ae53SHeiko Carstens int cc; 3120a763c78SDavid Hildenbrand 3130a763c78SDavid Hildenbrand asm volatile( 3140a763c78SDavid Hildenbrand /* Parameter registers are ignored for "test bit" */ 3150a763c78SDavid Hildenbrand " plo 0,0,0,0(0)\n" 3160a763c78SDavid Hildenbrand " ipm %0\n" 3170a763c78SDavid Hildenbrand " srl %0,28\n" 3180a763c78SDavid Hildenbrand : "=d" (cc) 3190a763c78SDavid Hildenbrand : "d" (r0) 3200a763c78SDavid Hildenbrand : "cc"); 3210a763c78SDavid Hildenbrand return cc == 0; 3220a763c78SDavid Hildenbrand } 3230a763c78SDavid Hildenbrand 32422be5a13SDavid Hildenbrand static void kvm_s390_cpu_feat_init(void) 32522be5a13SDavid Hildenbrand { 3260a763c78SDavid Hildenbrand int i; 3270a763c78SDavid Hildenbrand 3280a763c78SDavid Hildenbrand for (i = 0; i < 256; ++i) { 3290a763c78SDavid Hildenbrand if (plo_test_bit(i)) 3300a763c78SDavid Hildenbrand kvm_s390_available_subfunc.plo[i >> 3] |= 0x80 >> (i & 7); 3310a763c78SDavid Hildenbrand } 3320a763c78SDavid Hildenbrand 3330a763c78SDavid Hildenbrand if (test_facility(28)) /* TOD-clock steering */ 334221bb8a4SLinus Torvalds ptff(kvm_s390_available_subfunc.ptff, 335221bb8a4SLinus Torvalds sizeof(kvm_s390_available_subfunc.ptff), 336221bb8a4SLinus Torvalds PTFF_QAF); 3370a763c78SDavid Hildenbrand 3380a763c78SDavid Hildenbrand if (test_facility(17)) { /* MSA */ 33969c0e360SMartin Schwidefsky __cpacf_query(CPACF_KMAC, (cpacf_mask_t *) 34069c0e360SMartin Schwidefsky kvm_s390_available_subfunc.kmac); 34169c0e360SMartin Schwidefsky __cpacf_query(CPACF_KMC, (cpacf_mask_t *) 34269c0e360SMartin Schwidefsky kvm_s390_available_subfunc.kmc); 34369c0e360SMartin Schwidefsky __cpacf_query(CPACF_KM, (cpacf_mask_t *) 34469c0e360SMartin Schwidefsky kvm_s390_available_subfunc.km); 34569c0e360SMartin Schwidefsky __cpacf_query(CPACF_KIMD, (cpacf_mask_t *) 34669c0e360SMartin Schwidefsky kvm_s390_available_subfunc.kimd); 34769c0e360SMartin Schwidefsky __cpacf_query(CPACF_KLMD, (cpacf_mask_t *) 34869c0e360SMartin Schwidefsky kvm_s390_available_subfunc.klmd); 3490a763c78SDavid Hildenbrand } 3500a763c78SDavid Hildenbrand if (test_facility(76)) /* MSA3 */ 35169c0e360SMartin Schwidefsky __cpacf_query(CPACF_PCKMO, (cpacf_mask_t *) 35269c0e360SMartin Schwidefsky kvm_s390_available_subfunc.pckmo); 3530a763c78SDavid Hildenbrand if (test_facility(77)) { /* MSA4 */ 35469c0e360SMartin Schwidefsky __cpacf_query(CPACF_KMCTR, (cpacf_mask_t *) 35569c0e360SMartin Schwidefsky kvm_s390_available_subfunc.kmctr); 35669c0e360SMartin Schwidefsky __cpacf_query(CPACF_KMF, (cpacf_mask_t *) 35769c0e360SMartin Schwidefsky kvm_s390_available_subfunc.kmf); 35869c0e360SMartin Schwidefsky __cpacf_query(CPACF_KMO, (cpacf_mask_t *) 35969c0e360SMartin Schwidefsky kvm_s390_available_subfunc.kmo); 36069c0e360SMartin Schwidefsky __cpacf_query(CPACF_PCC, (cpacf_mask_t *) 36169c0e360SMartin Schwidefsky kvm_s390_available_subfunc.pcc); 3620a763c78SDavid Hildenbrand } 3630a763c78SDavid Hildenbrand if (test_facility(57)) /* MSA5 */ 364985a9d20SHarald Freudenberger __cpacf_query(CPACF_PRNO, (cpacf_mask_t *) 36569c0e360SMartin Schwidefsky kvm_s390_available_subfunc.ppno); 3660a763c78SDavid Hildenbrand 367e000b8e0SJason J. Herne if (test_facility(146)) /* MSA8 */ 368e000b8e0SJason J. Herne __cpacf_query(CPACF_KMA, (cpacf_mask_t *) 369e000b8e0SJason J. Herne kvm_s390_available_subfunc.kma); 370e000b8e0SJason J. Herne 37122be5a13SDavid Hildenbrand if (MACHINE_HAS_ESOP) 37222be5a13SDavid Hildenbrand allow_cpu_feat(KVM_S390_VM_CPU_FEAT_ESOP); 373a3508fbeSDavid Hildenbrand /* 374a3508fbeSDavid Hildenbrand * We need SIE support, ESOP (PROT_READ protection for gmap_shadow), 375a3508fbeSDavid Hildenbrand * 64bit SCAO (SCA passthrough) and IDTE (for gmap_shadow unshadowing). 376a3508fbeSDavid Hildenbrand */ 377a3508fbeSDavid Hildenbrand if (!sclp.has_sief2 || !MACHINE_HAS_ESOP || !sclp.has_64bscao || 378a411edf1SDavid Hildenbrand !test_facility(3) || !nested) 379a3508fbeSDavid Hildenbrand return; 380a3508fbeSDavid Hildenbrand allow_cpu_feat(KVM_S390_VM_CPU_FEAT_SIEF2); 38119c439b5SDavid Hildenbrand if (sclp.has_64bscao) 38219c439b5SDavid Hildenbrand allow_cpu_feat(KVM_S390_VM_CPU_FEAT_64BSCAO); 3830615a326SDavid Hildenbrand if (sclp.has_siif) 3840615a326SDavid Hildenbrand allow_cpu_feat(KVM_S390_VM_CPU_FEAT_SIIF); 38577d18f6dSDavid Hildenbrand if (sclp.has_gpere) 38677d18f6dSDavid Hildenbrand allow_cpu_feat(KVM_S390_VM_CPU_FEAT_GPERE); 387a1b7b9b2SDavid Hildenbrand if (sclp.has_gsls) 388a1b7b9b2SDavid Hildenbrand allow_cpu_feat(KVM_S390_VM_CPU_FEAT_GSLS); 3895630a8e8SDavid Hildenbrand if (sclp.has_ib) 3905630a8e8SDavid Hildenbrand allow_cpu_feat(KVM_S390_VM_CPU_FEAT_IB); 39113ee3f67SDavid Hildenbrand if (sclp.has_cei) 39213ee3f67SDavid Hildenbrand allow_cpu_feat(KVM_S390_VM_CPU_FEAT_CEI); 3937fd7f39dSDavid Hildenbrand if (sclp.has_ibs) 3947fd7f39dSDavid Hildenbrand allow_cpu_feat(KVM_S390_VM_CPU_FEAT_IBS); 395730cd632SFarhan Ali if (sclp.has_kss) 396730cd632SFarhan Ali allow_cpu_feat(KVM_S390_VM_CPU_FEAT_KSS); 3975d3876a8SDavid Hildenbrand /* 3985d3876a8SDavid Hildenbrand * KVM_S390_VM_CPU_FEAT_SKEY: Wrong shadow of PTE.I bits will make 3995d3876a8SDavid Hildenbrand * all skey handling functions read/set the skey from the PGSTE 4005d3876a8SDavid Hildenbrand * instead of the real storage key. 4015d3876a8SDavid Hildenbrand * 4025d3876a8SDavid Hildenbrand * KVM_S390_VM_CPU_FEAT_CMMA: Wrong shadow of PTE.I bits will make 4035d3876a8SDavid Hildenbrand * pages being detected as preserved although they are resident. 4045d3876a8SDavid Hildenbrand * 4055d3876a8SDavid Hildenbrand * KVM_S390_VM_CPU_FEAT_PFMFI: Wrong shadow of PTE.I bits will 4065d3876a8SDavid Hildenbrand * have the same effect as for KVM_S390_VM_CPU_FEAT_SKEY. 4075d3876a8SDavid Hildenbrand * 4085d3876a8SDavid Hildenbrand * For KVM_S390_VM_CPU_FEAT_SKEY, KVM_S390_VM_CPU_FEAT_CMMA and 4095d3876a8SDavid Hildenbrand * KVM_S390_VM_CPU_FEAT_PFMFI, all PTE.I and PGSTE bits have to be 4105d3876a8SDavid Hildenbrand * correctly shadowed. We can do that for the PGSTE but not for PTE.I. 4115d3876a8SDavid Hildenbrand * 4125d3876a8SDavid Hildenbrand * KVM_S390_VM_CPU_FEAT_SIGPIF: Wrong SCB addresses in the SCA. We 4135d3876a8SDavid Hildenbrand * cannot easily shadow the SCA because of the ipte lock. 4145d3876a8SDavid Hildenbrand */ 41522be5a13SDavid Hildenbrand } 41622be5a13SDavid Hildenbrand 417b0c632dbSHeiko Carstens int kvm_arch_init(void *opaque) 418b0c632dbSHeiko Carstens { 419308c3e66SMichael Mueller int rc; 420308c3e66SMichael Mueller 42178f26131SChristian Borntraeger kvm_s390_dbf = debug_register("kvm-trace", 32, 1, 7 * sizeof(long)); 42278f26131SChristian Borntraeger if (!kvm_s390_dbf) 42378f26131SChristian Borntraeger return -ENOMEM; 42478f26131SChristian Borntraeger 42578f26131SChristian Borntraeger if (debug_register_view(kvm_s390_dbf, &debug_sprintf_view)) { 426308c3e66SMichael Mueller rc = -ENOMEM; 427308c3e66SMichael Mueller goto out_debug_unreg; 42878f26131SChristian Borntraeger } 42978f26131SChristian Borntraeger 43022be5a13SDavid Hildenbrand kvm_s390_cpu_feat_init(); 43122be5a13SDavid Hildenbrand 43284877d93SCornelia Huck /* Register floating interrupt controller interface. */ 433308c3e66SMichael Mueller rc = kvm_register_device_ops(&kvm_flic_ops, KVM_DEV_TYPE_FLIC); 434308c3e66SMichael Mueller if (rc) { 4358d43d570SMichael Mueller pr_err("A FLIC registration call failed with rc=%d\n", rc); 436308c3e66SMichael Mueller goto out_debug_unreg; 437308c3e66SMichael Mueller } 438*b1d1e76eSMichael Mueller 439*b1d1e76eSMichael Mueller rc = kvm_s390_gib_init(GAL_ISC); 440*b1d1e76eSMichael Mueller if (rc) 441*b1d1e76eSMichael Mueller goto out_gib_destroy; 442*b1d1e76eSMichael Mueller 443308c3e66SMichael Mueller return 0; 444308c3e66SMichael Mueller 445*b1d1e76eSMichael Mueller out_gib_destroy: 446*b1d1e76eSMichael Mueller kvm_s390_gib_destroy(); 447308c3e66SMichael Mueller out_debug_unreg: 448308c3e66SMichael Mueller debug_unregister(kvm_s390_dbf); 449308c3e66SMichael Mueller return rc; 450b0c632dbSHeiko Carstens } 451b0c632dbSHeiko Carstens 45278f26131SChristian Borntraeger void kvm_arch_exit(void) 45378f26131SChristian Borntraeger { 4541282c21eSMichael Mueller kvm_s390_gib_destroy(); 45578f26131SChristian Borntraeger debug_unregister(kvm_s390_dbf); 45678f26131SChristian Borntraeger } 45778f26131SChristian Borntraeger 458b0c632dbSHeiko Carstens /* Section: device related */ 459b0c632dbSHeiko Carstens long kvm_arch_dev_ioctl(struct file *filp, 460b0c632dbSHeiko Carstens unsigned int ioctl, unsigned long arg) 461b0c632dbSHeiko Carstens { 462b0c632dbSHeiko Carstens if (ioctl == KVM_S390_ENABLE_SIE) 463b0c632dbSHeiko Carstens return s390_enable_sie(); 464b0c632dbSHeiko Carstens return -EINVAL; 465b0c632dbSHeiko Carstens } 466b0c632dbSHeiko Carstens 467784aa3d7SAlexander Graf int kvm_vm_ioctl_check_extension(struct kvm *kvm, long ext) 468b0c632dbSHeiko Carstens { 469d7b0b5ebSCarsten Otte int r; 470d7b0b5ebSCarsten Otte 4712bd0ac4eSCarsten Otte switch (ext) { 472d7b0b5ebSCarsten Otte case KVM_CAP_S390_PSW: 473b6cf8788SChristian Borntraeger case KVM_CAP_S390_GMAP: 47452e16b18SChristian Borntraeger case KVM_CAP_SYNC_MMU: 4751efd0f59SCarsten Otte #ifdef CONFIG_KVM_S390_UCONTROL 4761efd0f59SCarsten Otte case KVM_CAP_S390_UCONTROL: 4771efd0f59SCarsten Otte #endif 4783c038e6bSDominik Dingel case KVM_CAP_ASYNC_PF: 47960b413c9SChristian Borntraeger case KVM_CAP_SYNC_REGS: 48014eebd91SCarsten Otte case KVM_CAP_ONE_REG: 481d6712df9SCornelia Huck case KVM_CAP_ENABLE_CAP: 482fa6b7fe9SCornelia Huck case KVM_CAP_S390_CSS_SUPPORT: 48310ccaa1eSCornelia Huck case KVM_CAP_IOEVENTFD: 484c05c4186SJens Freimann case KVM_CAP_DEVICE_CTRL: 48578599d90SCornelia Huck case KVM_CAP_S390_IRQCHIP: 486f2061656SDominik Dingel case KVM_CAP_VM_ATTRIBUTES: 4876352e4d2SDavid Hildenbrand case KVM_CAP_MP_STATE: 488460df4c1SPaolo Bonzini case KVM_CAP_IMMEDIATE_EXIT: 48947b43c52SJens Freimann case KVM_CAP_S390_INJECT_IRQ: 4902444b352SDavid Hildenbrand case KVM_CAP_S390_USER_SIGP: 491e44fc8c9SEkaterina Tumanova case KVM_CAP_S390_USER_STSI: 49230ee2a98SJason J. Herne case KVM_CAP_S390_SKEYS: 493816c7667SJens Freimann case KVM_CAP_S390_IRQ_STATE: 4946502a34cSDavid Hildenbrand case KVM_CAP_S390_USER_INSTR0: 4954036e387SClaudio Imbrenda case KVM_CAP_S390_CMMA_MIGRATION: 49647a4693eSYi Min Zhao case KVM_CAP_S390_AIS: 497da9a1446SChristian Borntraeger case KVM_CAP_S390_AIS_MIGRATION: 498d7b0b5ebSCarsten Otte r = 1; 499d7b0b5ebSCarsten Otte break; 500a4499382SJanosch Frank case KVM_CAP_S390_HPAGE_1M: 501a4499382SJanosch Frank r = 0; 50240ebdb8eSJanosch Frank if (hpage && !kvm_is_ucontrol(kvm)) 503a4499382SJanosch Frank r = 1; 504a4499382SJanosch Frank break; 50541408c28SThomas Huth case KVM_CAP_S390_MEM_OP: 50641408c28SThomas Huth r = MEM_OP_MAX_SIZE; 50741408c28SThomas Huth break; 508e726b1bdSChristian Borntraeger case KVM_CAP_NR_VCPUS: 509e726b1bdSChristian Borntraeger case KVM_CAP_MAX_VCPUS: 51076a6dd72SDavid Hildenbrand r = KVM_S390_BSCA_CPU_SLOTS; 511a6940674SDavid Hildenbrand if (!kvm_s390_use_sca_entries()) 512a6940674SDavid Hildenbrand r = KVM_MAX_VCPUS; 513a6940674SDavid Hildenbrand else if (sclp.has_esca && sclp.has_64bscao) 51476a6dd72SDavid Hildenbrand r = KVM_S390_ESCA_CPU_SLOTS; 515e726b1bdSChristian Borntraeger break; 516e1e2e605SNick Wang case KVM_CAP_NR_MEMSLOTS: 517e1e2e605SNick Wang r = KVM_USER_MEM_SLOTS; 518e1e2e605SNick Wang break; 5191526bf9cSChristian Borntraeger case KVM_CAP_S390_COW: 520abf09bedSMartin Schwidefsky r = MACHINE_HAS_ESOP; 5211526bf9cSChristian Borntraeger break; 52268c55750SEric Farman case KVM_CAP_S390_VECTOR_REGISTERS: 52368c55750SEric Farman r = MACHINE_HAS_VX; 52468c55750SEric Farman break; 525c6e5f166SFan Zhang case KVM_CAP_S390_RI: 526c6e5f166SFan Zhang r = test_facility(64); 527c6e5f166SFan Zhang break; 5284e0b1ab7SFan Zhang case KVM_CAP_S390_GS: 5294e0b1ab7SFan Zhang r = test_facility(133); 5304e0b1ab7SFan Zhang break; 53135b3fde6SChristian Borntraeger case KVM_CAP_S390_BPB: 53235b3fde6SChristian Borntraeger r = test_facility(82); 53335b3fde6SChristian Borntraeger break; 5342bd0ac4eSCarsten Otte default: 535d7b0b5ebSCarsten Otte r = 0; 536b0c632dbSHeiko Carstens } 537d7b0b5ebSCarsten Otte return r; 5382bd0ac4eSCarsten Otte } 539b0c632dbSHeiko Carstens 54015f36ebdSJason J. Herne static void kvm_s390_sync_dirty_log(struct kvm *kvm, 54115f36ebdSJason J. Herne struct kvm_memory_slot *memslot) 54215f36ebdSJason J. Herne { 5430959e168SJanosch Frank int i; 54415f36ebdSJason J. Herne gfn_t cur_gfn, last_gfn; 5450959e168SJanosch Frank unsigned long gaddr, vmaddr; 54615f36ebdSJason J. Herne struct gmap *gmap = kvm->arch.gmap; 5470959e168SJanosch Frank DECLARE_BITMAP(bitmap, _PAGE_ENTRIES); 54815f36ebdSJason J. Herne 5490959e168SJanosch Frank /* Loop over all guest segments */ 5500959e168SJanosch Frank cur_gfn = memslot->base_gfn; 55115f36ebdSJason J. Herne last_gfn = memslot->base_gfn + memslot->npages; 5520959e168SJanosch Frank for (; cur_gfn <= last_gfn; cur_gfn += _PAGE_ENTRIES) { 5530959e168SJanosch Frank gaddr = gfn_to_gpa(cur_gfn); 5540959e168SJanosch Frank vmaddr = gfn_to_hva_memslot(memslot, cur_gfn); 5550959e168SJanosch Frank if (kvm_is_error_hva(vmaddr)) 5560959e168SJanosch Frank continue; 55715f36ebdSJason J. Herne 5580959e168SJanosch Frank bitmap_zero(bitmap, _PAGE_ENTRIES); 5590959e168SJanosch Frank gmap_sync_dirty_log_pmd(gmap, bitmap, gaddr, vmaddr); 5600959e168SJanosch Frank for (i = 0; i < _PAGE_ENTRIES; i++) { 5610959e168SJanosch Frank if (test_bit(i, bitmap)) 5620959e168SJanosch Frank mark_page_dirty(kvm, cur_gfn + i); 5630959e168SJanosch Frank } 5640959e168SJanosch Frank 5651763f8d0SChristian Borntraeger if (fatal_signal_pending(current)) 5661763f8d0SChristian Borntraeger return; 56770c88a00SChristian Borntraeger cond_resched(); 56815f36ebdSJason J. Herne } 56915f36ebdSJason J. Herne } 57015f36ebdSJason J. Herne 571b0c632dbSHeiko Carstens /* Section: vm related */ 572a6e2f683SEugene (jno) Dvurechenski static void sca_del_vcpu(struct kvm_vcpu *vcpu); 573a6e2f683SEugene (jno) Dvurechenski 574b0c632dbSHeiko Carstens /* 575b0c632dbSHeiko Carstens * Get (and clear) the dirty memory log for a memory slot. 576b0c632dbSHeiko Carstens */ 577b0c632dbSHeiko Carstens int kvm_vm_ioctl_get_dirty_log(struct kvm *kvm, 578b0c632dbSHeiko Carstens struct kvm_dirty_log *log) 579b0c632dbSHeiko Carstens { 58015f36ebdSJason J. Herne int r; 58115f36ebdSJason J. Herne unsigned long n; 5829f6b8029SPaolo Bonzini struct kvm_memslots *slots; 58315f36ebdSJason J. Herne struct kvm_memory_slot *memslot; 58415f36ebdSJason J. Herne int is_dirty = 0; 58515f36ebdSJason J. Herne 586e1e8a962SJanosch Frank if (kvm_is_ucontrol(kvm)) 587e1e8a962SJanosch Frank return -EINVAL; 588e1e8a962SJanosch Frank 58915f36ebdSJason J. Herne mutex_lock(&kvm->slots_lock); 59015f36ebdSJason J. Herne 59115f36ebdSJason J. Herne r = -EINVAL; 59215f36ebdSJason J. Herne if (log->slot >= KVM_USER_MEM_SLOTS) 59315f36ebdSJason J. Herne goto out; 59415f36ebdSJason J. Herne 5959f6b8029SPaolo Bonzini slots = kvm_memslots(kvm); 5969f6b8029SPaolo Bonzini memslot = id_to_memslot(slots, log->slot); 59715f36ebdSJason J. Herne r = -ENOENT; 59815f36ebdSJason J. Herne if (!memslot->dirty_bitmap) 59915f36ebdSJason J. Herne goto out; 60015f36ebdSJason J. Herne 60115f36ebdSJason J. Herne kvm_s390_sync_dirty_log(kvm, memslot); 60215f36ebdSJason J. Herne r = kvm_get_dirty_log(kvm, log, &is_dirty); 60315f36ebdSJason J. Herne if (r) 60415f36ebdSJason J. Herne goto out; 60515f36ebdSJason J. Herne 60615f36ebdSJason J. Herne /* Clear the dirty log */ 60715f36ebdSJason J. Herne if (is_dirty) { 60815f36ebdSJason J. Herne n = kvm_dirty_bitmap_bytes(memslot); 60915f36ebdSJason J. Herne memset(memslot->dirty_bitmap, 0, n); 61015f36ebdSJason J. Herne } 61115f36ebdSJason J. Herne r = 0; 61215f36ebdSJason J. Herne out: 61315f36ebdSJason J. Herne mutex_unlock(&kvm->slots_lock); 61415f36ebdSJason J. Herne return r; 615b0c632dbSHeiko Carstens } 616b0c632dbSHeiko Carstens 6176502a34cSDavid Hildenbrand static void icpt_operexc_on_all_vcpus(struct kvm *kvm) 6186502a34cSDavid Hildenbrand { 6196502a34cSDavid Hildenbrand unsigned int i; 6206502a34cSDavid Hildenbrand struct kvm_vcpu *vcpu; 6216502a34cSDavid Hildenbrand 6226502a34cSDavid Hildenbrand kvm_for_each_vcpu(i, vcpu, kvm) { 6236502a34cSDavid Hildenbrand kvm_s390_sync_request(KVM_REQ_ICPT_OPEREXC, vcpu); 6246502a34cSDavid Hildenbrand } 6256502a34cSDavid Hildenbrand } 6266502a34cSDavid Hildenbrand 627e5d83c74SPaolo Bonzini int kvm_vm_ioctl_enable_cap(struct kvm *kvm, struct kvm_enable_cap *cap) 628d938dc55SCornelia Huck { 629d938dc55SCornelia Huck int r; 630d938dc55SCornelia Huck 631d938dc55SCornelia Huck if (cap->flags) 632d938dc55SCornelia Huck return -EINVAL; 633d938dc55SCornelia Huck 634d938dc55SCornelia Huck switch (cap->cap) { 63584223598SCornelia Huck case KVM_CAP_S390_IRQCHIP: 636c92ea7b9SChristian Borntraeger VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_IRQCHIP"); 63784223598SCornelia Huck kvm->arch.use_irqchip = 1; 63884223598SCornelia Huck r = 0; 63984223598SCornelia Huck break; 6402444b352SDavid Hildenbrand case KVM_CAP_S390_USER_SIGP: 641c92ea7b9SChristian Borntraeger VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_USER_SIGP"); 6422444b352SDavid Hildenbrand kvm->arch.user_sigp = 1; 6432444b352SDavid Hildenbrand r = 0; 6442444b352SDavid Hildenbrand break; 64568c55750SEric Farman case KVM_CAP_S390_VECTOR_REGISTERS: 6465967c17bSDavid Hildenbrand mutex_lock(&kvm->lock); 647a03825bbSPaolo Bonzini if (kvm->created_vcpus) { 6485967c17bSDavid Hildenbrand r = -EBUSY; 6495967c17bSDavid Hildenbrand } else if (MACHINE_HAS_VX) { 650c54f0d6aSDavid Hildenbrand set_kvm_facility(kvm->arch.model.fac_mask, 129); 651c54f0d6aSDavid Hildenbrand set_kvm_facility(kvm->arch.model.fac_list, 129); 6522f87d942SGuenther Hutzl if (test_facility(134)) { 6532f87d942SGuenther Hutzl set_kvm_facility(kvm->arch.model.fac_mask, 134); 6542f87d942SGuenther Hutzl set_kvm_facility(kvm->arch.model.fac_list, 134); 6552f87d942SGuenther Hutzl } 65653743aa7SMaxim Samoylov if (test_facility(135)) { 65753743aa7SMaxim Samoylov set_kvm_facility(kvm->arch.model.fac_mask, 135); 65853743aa7SMaxim Samoylov set_kvm_facility(kvm->arch.model.fac_list, 135); 65953743aa7SMaxim Samoylov } 66018280d8bSMichael Mueller r = 0; 66118280d8bSMichael Mueller } else 66218280d8bSMichael Mueller r = -EINVAL; 6635967c17bSDavid Hildenbrand mutex_unlock(&kvm->lock); 664c92ea7b9SChristian Borntraeger VM_EVENT(kvm, 3, "ENABLE: CAP_S390_VECTOR_REGISTERS %s", 665c92ea7b9SChristian Borntraeger r ? "(not available)" : "(success)"); 66668c55750SEric Farman break; 667c6e5f166SFan Zhang case KVM_CAP_S390_RI: 668c6e5f166SFan Zhang r = -EINVAL; 669c6e5f166SFan Zhang mutex_lock(&kvm->lock); 670a03825bbSPaolo Bonzini if (kvm->created_vcpus) { 671c6e5f166SFan Zhang r = -EBUSY; 672c6e5f166SFan Zhang } else if (test_facility(64)) { 673c54f0d6aSDavid Hildenbrand set_kvm_facility(kvm->arch.model.fac_mask, 64); 674c54f0d6aSDavid Hildenbrand set_kvm_facility(kvm->arch.model.fac_list, 64); 675c6e5f166SFan Zhang r = 0; 676c6e5f166SFan Zhang } 677c6e5f166SFan Zhang mutex_unlock(&kvm->lock); 678c6e5f166SFan Zhang VM_EVENT(kvm, 3, "ENABLE: CAP_S390_RI %s", 679c6e5f166SFan Zhang r ? "(not available)" : "(success)"); 680c6e5f166SFan Zhang break; 68147a4693eSYi Min Zhao case KVM_CAP_S390_AIS: 68247a4693eSYi Min Zhao mutex_lock(&kvm->lock); 68347a4693eSYi Min Zhao if (kvm->created_vcpus) { 68447a4693eSYi Min Zhao r = -EBUSY; 68547a4693eSYi Min Zhao } else { 68647a4693eSYi Min Zhao set_kvm_facility(kvm->arch.model.fac_mask, 72); 68747a4693eSYi Min Zhao set_kvm_facility(kvm->arch.model.fac_list, 72); 68847a4693eSYi Min Zhao r = 0; 68947a4693eSYi Min Zhao } 69047a4693eSYi Min Zhao mutex_unlock(&kvm->lock); 69147a4693eSYi Min Zhao VM_EVENT(kvm, 3, "ENABLE: AIS %s", 69247a4693eSYi Min Zhao r ? "(not available)" : "(success)"); 69347a4693eSYi Min Zhao break; 6944e0b1ab7SFan Zhang case KVM_CAP_S390_GS: 6954e0b1ab7SFan Zhang r = -EINVAL; 6964e0b1ab7SFan Zhang mutex_lock(&kvm->lock); 697241e3ec0SChristian Borntraeger if (kvm->created_vcpus) { 6984e0b1ab7SFan Zhang r = -EBUSY; 6994e0b1ab7SFan Zhang } else if (test_facility(133)) { 7004e0b1ab7SFan Zhang set_kvm_facility(kvm->arch.model.fac_mask, 133); 7014e0b1ab7SFan Zhang set_kvm_facility(kvm->arch.model.fac_list, 133); 7024e0b1ab7SFan Zhang r = 0; 7034e0b1ab7SFan Zhang } 7044e0b1ab7SFan Zhang mutex_unlock(&kvm->lock); 7054e0b1ab7SFan Zhang VM_EVENT(kvm, 3, "ENABLE: CAP_S390_GS %s", 7064e0b1ab7SFan Zhang r ? "(not available)" : "(success)"); 7074e0b1ab7SFan Zhang break; 708a4499382SJanosch Frank case KVM_CAP_S390_HPAGE_1M: 709a4499382SJanosch Frank mutex_lock(&kvm->lock); 710a4499382SJanosch Frank if (kvm->created_vcpus) 711a4499382SJanosch Frank r = -EBUSY; 71240ebdb8eSJanosch Frank else if (!hpage || kvm->arch.use_cmma || kvm_is_ucontrol(kvm)) 713a4499382SJanosch Frank r = -EINVAL; 714a4499382SJanosch Frank else { 715a4499382SJanosch Frank r = 0; 716df88f318SJanosch Frank down_write(&kvm->mm->mmap_sem); 717a4499382SJanosch Frank kvm->mm->context.allow_gmap_hpage_1m = 1; 718df88f318SJanosch Frank up_write(&kvm->mm->mmap_sem); 719a4499382SJanosch Frank /* 720a4499382SJanosch Frank * We might have to create fake 4k page 721a4499382SJanosch Frank * tables. To avoid that the hardware works on 722a4499382SJanosch Frank * stale PGSTEs, we emulate these instructions. 723a4499382SJanosch Frank */ 724a4499382SJanosch Frank kvm->arch.use_skf = 0; 725a4499382SJanosch Frank kvm->arch.use_pfmfi = 0; 726a4499382SJanosch Frank } 727a4499382SJanosch Frank mutex_unlock(&kvm->lock); 728a4499382SJanosch Frank VM_EVENT(kvm, 3, "ENABLE: CAP_S390_HPAGE %s", 729a4499382SJanosch Frank r ? "(not available)" : "(success)"); 730a4499382SJanosch Frank break; 731e44fc8c9SEkaterina Tumanova case KVM_CAP_S390_USER_STSI: 732c92ea7b9SChristian Borntraeger VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_USER_STSI"); 733e44fc8c9SEkaterina Tumanova kvm->arch.user_stsi = 1; 734e44fc8c9SEkaterina Tumanova r = 0; 735e44fc8c9SEkaterina Tumanova break; 7366502a34cSDavid Hildenbrand case KVM_CAP_S390_USER_INSTR0: 7376502a34cSDavid Hildenbrand VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_USER_INSTR0"); 7386502a34cSDavid Hildenbrand kvm->arch.user_instr0 = 1; 7396502a34cSDavid Hildenbrand icpt_operexc_on_all_vcpus(kvm); 7406502a34cSDavid Hildenbrand r = 0; 7416502a34cSDavid Hildenbrand break; 742d938dc55SCornelia Huck default: 743d938dc55SCornelia Huck r = -EINVAL; 744d938dc55SCornelia Huck break; 745d938dc55SCornelia Huck } 746d938dc55SCornelia Huck return r; 747d938dc55SCornelia Huck } 748d938dc55SCornelia Huck 7498c0a7ce6SDominik Dingel static int kvm_s390_get_mem_control(struct kvm *kvm, struct kvm_device_attr *attr) 7508c0a7ce6SDominik Dingel { 7518c0a7ce6SDominik Dingel int ret; 7528c0a7ce6SDominik Dingel 7538c0a7ce6SDominik Dingel switch (attr->attr) { 7548c0a7ce6SDominik Dingel case KVM_S390_VM_MEM_LIMIT_SIZE: 7558c0a7ce6SDominik Dingel ret = 0; 756c92ea7b9SChristian Borntraeger VM_EVENT(kvm, 3, "QUERY: max guest memory: %lu bytes", 757a3a92c31SDominik Dingel kvm->arch.mem_limit); 758a3a92c31SDominik Dingel if (put_user(kvm->arch.mem_limit, (u64 __user *)attr->addr)) 7598c0a7ce6SDominik Dingel ret = -EFAULT; 7608c0a7ce6SDominik Dingel break; 7618c0a7ce6SDominik Dingel default: 7628c0a7ce6SDominik Dingel ret = -ENXIO; 7638c0a7ce6SDominik Dingel break; 7648c0a7ce6SDominik Dingel } 7658c0a7ce6SDominik Dingel return ret; 7668c0a7ce6SDominik Dingel } 7678c0a7ce6SDominik Dingel 7688c0a7ce6SDominik Dingel static int kvm_s390_set_mem_control(struct kvm *kvm, struct kvm_device_attr *attr) 7694f718eabSDominik Dingel { 7704f718eabSDominik Dingel int ret; 7714f718eabSDominik Dingel unsigned int idx; 7724f718eabSDominik Dingel switch (attr->attr) { 7734f718eabSDominik Dingel case KVM_S390_VM_MEM_ENABLE_CMMA: 774f9cbd9b0SDavid Hildenbrand ret = -ENXIO; 775c24cc9c8SDavid Hildenbrand if (!sclp.has_cmma) 776e6db1d61SDominik Dingel break; 777e6db1d61SDominik Dingel 778c92ea7b9SChristian Borntraeger VM_EVENT(kvm, 3, "%s", "ENABLE: CMMA support"); 7794f718eabSDominik Dingel mutex_lock(&kvm->lock); 780a4499382SJanosch Frank if (kvm->created_vcpus) 781a4499382SJanosch Frank ret = -EBUSY; 782a4499382SJanosch Frank else if (kvm->mm->context.allow_gmap_hpage_1m) 783a4499382SJanosch Frank ret = -EINVAL; 784a4499382SJanosch Frank else { 7854f718eabSDominik Dingel kvm->arch.use_cmma = 1; 786c9f0a2b8SJanosch Frank /* Not compatible with cmma. */ 787c9f0a2b8SJanosch Frank kvm->arch.use_pfmfi = 0; 7884f718eabSDominik Dingel ret = 0; 7894f718eabSDominik Dingel } 7904f718eabSDominik Dingel mutex_unlock(&kvm->lock); 7914f718eabSDominik Dingel break; 7924f718eabSDominik Dingel case KVM_S390_VM_MEM_CLR_CMMA: 793f9cbd9b0SDavid Hildenbrand ret = -ENXIO; 794f9cbd9b0SDavid Hildenbrand if (!sclp.has_cmma) 795f9cbd9b0SDavid Hildenbrand break; 796c3489155SDominik Dingel ret = -EINVAL; 797c3489155SDominik Dingel if (!kvm->arch.use_cmma) 798c3489155SDominik Dingel break; 799c3489155SDominik Dingel 800c92ea7b9SChristian Borntraeger VM_EVENT(kvm, 3, "%s", "RESET: CMMA states"); 8014f718eabSDominik Dingel mutex_lock(&kvm->lock); 8024f718eabSDominik Dingel idx = srcu_read_lock(&kvm->srcu); 803a13cff31SDominik Dingel s390_reset_cmma(kvm->arch.gmap->mm); 8044f718eabSDominik Dingel srcu_read_unlock(&kvm->srcu, idx); 8054f718eabSDominik Dingel mutex_unlock(&kvm->lock); 8064f718eabSDominik Dingel ret = 0; 8074f718eabSDominik Dingel break; 8088c0a7ce6SDominik Dingel case KVM_S390_VM_MEM_LIMIT_SIZE: { 8098c0a7ce6SDominik Dingel unsigned long new_limit; 8108c0a7ce6SDominik Dingel 8118c0a7ce6SDominik Dingel if (kvm_is_ucontrol(kvm)) 8128c0a7ce6SDominik Dingel return -EINVAL; 8138c0a7ce6SDominik Dingel 8148c0a7ce6SDominik Dingel if (get_user(new_limit, (u64 __user *)attr->addr)) 8158c0a7ce6SDominik Dingel return -EFAULT; 8168c0a7ce6SDominik Dingel 817a3a92c31SDominik Dingel if (kvm->arch.mem_limit != KVM_S390_NO_MEM_LIMIT && 818a3a92c31SDominik Dingel new_limit > kvm->arch.mem_limit) 8198c0a7ce6SDominik Dingel return -E2BIG; 8208c0a7ce6SDominik Dingel 821a3a92c31SDominik Dingel if (!new_limit) 822a3a92c31SDominik Dingel return -EINVAL; 823a3a92c31SDominik Dingel 8246ea427bbSMartin Schwidefsky /* gmap_create takes last usable address */ 825a3a92c31SDominik Dingel if (new_limit != KVM_S390_NO_MEM_LIMIT) 826a3a92c31SDominik Dingel new_limit -= 1; 827a3a92c31SDominik Dingel 8288c0a7ce6SDominik Dingel ret = -EBUSY; 8298c0a7ce6SDominik Dingel mutex_lock(&kvm->lock); 830a03825bbSPaolo Bonzini if (!kvm->created_vcpus) { 8316ea427bbSMartin Schwidefsky /* gmap_create will round the limit up */ 8326ea427bbSMartin Schwidefsky struct gmap *new = gmap_create(current->mm, new_limit); 8338c0a7ce6SDominik Dingel 8348c0a7ce6SDominik Dingel if (!new) { 8358c0a7ce6SDominik Dingel ret = -ENOMEM; 8368c0a7ce6SDominik Dingel } else { 8376ea427bbSMartin Schwidefsky gmap_remove(kvm->arch.gmap); 8388c0a7ce6SDominik Dingel new->private = kvm; 8398c0a7ce6SDominik Dingel kvm->arch.gmap = new; 8408c0a7ce6SDominik Dingel ret = 0; 8418c0a7ce6SDominik Dingel } 8428c0a7ce6SDominik Dingel } 8438c0a7ce6SDominik Dingel mutex_unlock(&kvm->lock); 844a3a92c31SDominik Dingel VM_EVENT(kvm, 3, "SET: max guest address: %lu", new_limit); 845a3a92c31SDominik Dingel VM_EVENT(kvm, 3, "New guest asce: 0x%pK", 846a3a92c31SDominik Dingel (void *) kvm->arch.gmap->asce); 8478c0a7ce6SDominik Dingel break; 8488c0a7ce6SDominik Dingel } 8494f718eabSDominik Dingel default: 8504f718eabSDominik Dingel ret = -ENXIO; 8514f718eabSDominik Dingel break; 8524f718eabSDominik Dingel } 8534f718eabSDominik Dingel return ret; 8544f718eabSDominik Dingel } 8554f718eabSDominik Dingel 856a374e892STony Krowiak static void kvm_s390_vcpu_crypto_setup(struct kvm_vcpu *vcpu); 857a374e892STony Krowiak 85820c922f0STony Krowiak void kvm_s390_vcpu_crypto_reset_all(struct kvm *kvm) 859a374e892STony Krowiak { 860a374e892STony Krowiak struct kvm_vcpu *vcpu; 861a374e892STony Krowiak int i; 862a374e892STony Krowiak 86320c922f0STony Krowiak kvm_s390_vcpu_block_all(kvm); 86420c922f0STony Krowiak 8653194cdb7SDavid Hildenbrand kvm_for_each_vcpu(i, vcpu, kvm) { 86620c922f0STony Krowiak kvm_s390_vcpu_crypto_setup(vcpu); 8673194cdb7SDavid Hildenbrand /* recreate the shadow crycb by leaving the VSIE handler */ 8683194cdb7SDavid Hildenbrand kvm_s390_sync_request(KVM_REQ_VSIE_RESTART, vcpu); 8693194cdb7SDavid Hildenbrand } 87020c922f0STony Krowiak 87120c922f0STony Krowiak kvm_s390_vcpu_unblock_all(kvm); 87220c922f0STony Krowiak } 87320c922f0STony Krowiak 87420c922f0STony Krowiak static int kvm_s390_vm_set_crypto(struct kvm *kvm, struct kvm_device_attr *attr) 87520c922f0STony Krowiak { 876a374e892STony Krowiak mutex_lock(&kvm->lock); 877a374e892STony Krowiak switch (attr->attr) { 878a374e892STony Krowiak case KVM_S390_VM_CRYPTO_ENABLE_AES_KW: 8798e41bd54SChristian Borntraeger if (!test_kvm_facility(kvm, 76)) { 8808e41bd54SChristian Borntraeger mutex_unlock(&kvm->lock); 88137940fb0STony Krowiak return -EINVAL; 8828e41bd54SChristian Borntraeger } 883a374e892STony Krowiak get_random_bytes( 884a374e892STony Krowiak kvm->arch.crypto.crycb->aes_wrapping_key_mask, 885a374e892STony Krowiak sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask)); 886a374e892STony Krowiak kvm->arch.crypto.aes_kw = 1; 887c92ea7b9SChristian Borntraeger VM_EVENT(kvm, 3, "%s", "ENABLE: AES keywrapping support"); 888a374e892STony Krowiak break; 889a374e892STony Krowiak case KVM_S390_VM_CRYPTO_ENABLE_DEA_KW: 8908e41bd54SChristian Borntraeger if (!test_kvm_facility(kvm, 76)) { 8918e41bd54SChristian Borntraeger mutex_unlock(&kvm->lock); 89237940fb0STony Krowiak return -EINVAL; 8938e41bd54SChristian Borntraeger } 894a374e892STony Krowiak get_random_bytes( 895a374e892STony Krowiak kvm->arch.crypto.crycb->dea_wrapping_key_mask, 896a374e892STony Krowiak sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask)); 897a374e892STony Krowiak kvm->arch.crypto.dea_kw = 1; 898c92ea7b9SChristian Borntraeger VM_EVENT(kvm, 3, "%s", "ENABLE: DEA keywrapping support"); 899a374e892STony Krowiak break; 900a374e892STony Krowiak case KVM_S390_VM_CRYPTO_DISABLE_AES_KW: 9018e41bd54SChristian Borntraeger if (!test_kvm_facility(kvm, 76)) { 9028e41bd54SChristian Borntraeger mutex_unlock(&kvm->lock); 90337940fb0STony Krowiak return -EINVAL; 9048e41bd54SChristian Borntraeger } 905a374e892STony Krowiak kvm->arch.crypto.aes_kw = 0; 906a374e892STony Krowiak memset(kvm->arch.crypto.crycb->aes_wrapping_key_mask, 0, 907a374e892STony Krowiak sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask)); 908c92ea7b9SChristian Borntraeger VM_EVENT(kvm, 3, "%s", "DISABLE: AES keywrapping support"); 909a374e892STony Krowiak break; 910a374e892STony Krowiak case KVM_S390_VM_CRYPTO_DISABLE_DEA_KW: 9118e41bd54SChristian Borntraeger if (!test_kvm_facility(kvm, 76)) { 9128e41bd54SChristian Borntraeger mutex_unlock(&kvm->lock); 91337940fb0STony Krowiak return -EINVAL; 9148e41bd54SChristian Borntraeger } 915a374e892STony Krowiak kvm->arch.crypto.dea_kw = 0; 916a374e892STony Krowiak memset(kvm->arch.crypto.crycb->dea_wrapping_key_mask, 0, 917a374e892STony Krowiak sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask)); 918c92ea7b9SChristian Borntraeger VM_EVENT(kvm, 3, "%s", "DISABLE: DEA keywrapping support"); 919a374e892STony Krowiak break; 92037940fb0STony Krowiak case KVM_S390_VM_CRYPTO_ENABLE_APIE: 92137940fb0STony Krowiak if (!ap_instructions_available()) { 92237940fb0STony Krowiak mutex_unlock(&kvm->lock); 92337940fb0STony Krowiak return -EOPNOTSUPP; 92437940fb0STony Krowiak } 92537940fb0STony Krowiak kvm->arch.crypto.apie = 1; 92637940fb0STony Krowiak break; 92737940fb0STony Krowiak case KVM_S390_VM_CRYPTO_DISABLE_APIE: 92837940fb0STony Krowiak if (!ap_instructions_available()) { 92937940fb0STony Krowiak mutex_unlock(&kvm->lock); 93037940fb0STony Krowiak return -EOPNOTSUPP; 93137940fb0STony Krowiak } 93237940fb0STony Krowiak kvm->arch.crypto.apie = 0; 93337940fb0STony Krowiak break; 934a374e892STony Krowiak default: 935a374e892STony Krowiak mutex_unlock(&kvm->lock); 936a374e892STony Krowiak return -ENXIO; 937a374e892STony Krowiak } 938a374e892STony Krowiak 93920c922f0STony Krowiak kvm_s390_vcpu_crypto_reset_all(kvm); 940a374e892STony Krowiak mutex_unlock(&kvm->lock); 941a374e892STony Krowiak return 0; 942a374e892STony Krowiak } 943a374e892STony Krowiak 944190df4a2SClaudio Imbrenda static void kvm_s390_sync_request_broadcast(struct kvm *kvm, int req) 945190df4a2SClaudio Imbrenda { 946190df4a2SClaudio Imbrenda int cx; 947190df4a2SClaudio Imbrenda struct kvm_vcpu *vcpu; 948190df4a2SClaudio Imbrenda 949190df4a2SClaudio Imbrenda kvm_for_each_vcpu(cx, vcpu, kvm) 950190df4a2SClaudio Imbrenda kvm_s390_sync_request(req, vcpu); 951190df4a2SClaudio Imbrenda } 952190df4a2SClaudio Imbrenda 953190df4a2SClaudio Imbrenda /* 954190df4a2SClaudio Imbrenda * Must be called with kvm->srcu held to avoid races on memslots, and with 9551de1ea7eSChristian Borntraeger * kvm->slots_lock to avoid races with ourselves and kvm_s390_vm_stop_migration. 956190df4a2SClaudio Imbrenda */ 957190df4a2SClaudio Imbrenda static int kvm_s390_vm_start_migration(struct kvm *kvm) 958190df4a2SClaudio Imbrenda { 959190df4a2SClaudio Imbrenda struct kvm_memory_slot *ms; 960190df4a2SClaudio Imbrenda struct kvm_memslots *slots; 961afdad616SClaudio Imbrenda unsigned long ram_pages = 0; 962190df4a2SClaudio Imbrenda int slotnr; 963190df4a2SClaudio Imbrenda 964190df4a2SClaudio Imbrenda /* migration mode already enabled */ 965afdad616SClaudio Imbrenda if (kvm->arch.migration_mode) 966190df4a2SClaudio Imbrenda return 0; 967190df4a2SClaudio Imbrenda slots = kvm_memslots(kvm); 968190df4a2SClaudio Imbrenda if (!slots || !slots->used_slots) 969190df4a2SClaudio Imbrenda return -EINVAL; 970190df4a2SClaudio Imbrenda 971afdad616SClaudio Imbrenda if (!kvm->arch.use_cmma) { 972afdad616SClaudio Imbrenda kvm->arch.migration_mode = 1; 973afdad616SClaudio Imbrenda return 0; 974190df4a2SClaudio Imbrenda } 975190df4a2SClaudio Imbrenda /* mark all the pages in active slots as dirty */ 976190df4a2SClaudio Imbrenda for (slotnr = 0; slotnr < slots->used_slots; slotnr++) { 977190df4a2SClaudio Imbrenda ms = slots->memslots + slotnr; 978afdad616SClaudio Imbrenda /* 979afdad616SClaudio Imbrenda * The second half of the bitmap is only used on x86, 980afdad616SClaudio Imbrenda * and would be wasted otherwise, so we put it to good 981afdad616SClaudio Imbrenda * use here to keep track of the state of the storage 982afdad616SClaudio Imbrenda * attributes. 983afdad616SClaudio Imbrenda */ 984afdad616SClaudio Imbrenda memset(kvm_second_dirty_bitmap(ms), 0xff, kvm_dirty_bitmap_bytes(ms)); 985afdad616SClaudio Imbrenda ram_pages += ms->npages; 986190df4a2SClaudio Imbrenda } 987afdad616SClaudio Imbrenda atomic64_set(&kvm->arch.cmma_dirty_pages, ram_pages); 988afdad616SClaudio Imbrenda kvm->arch.migration_mode = 1; 989190df4a2SClaudio Imbrenda kvm_s390_sync_request_broadcast(kvm, KVM_REQ_START_MIGRATION); 990190df4a2SClaudio Imbrenda return 0; 991190df4a2SClaudio Imbrenda } 992190df4a2SClaudio Imbrenda 993190df4a2SClaudio Imbrenda /* 9941de1ea7eSChristian Borntraeger * Must be called with kvm->slots_lock to avoid races with ourselves and 995190df4a2SClaudio Imbrenda * kvm_s390_vm_start_migration. 996190df4a2SClaudio Imbrenda */ 997190df4a2SClaudio Imbrenda static int kvm_s390_vm_stop_migration(struct kvm *kvm) 998190df4a2SClaudio Imbrenda { 999190df4a2SClaudio Imbrenda /* migration mode already disabled */ 1000afdad616SClaudio Imbrenda if (!kvm->arch.migration_mode) 1001190df4a2SClaudio Imbrenda return 0; 1002afdad616SClaudio Imbrenda kvm->arch.migration_mode = 0; 1003afdad616SClaudio Imbrenda if (kvm->arch.use_cmma) 1004190df4a2SClaudio Imbrenda kvm_s390_sync_request_broadcast(kvm, KVM_REQ_STOP_MIGRATION); 1005190df4a2SClaudio Imbrenda return 0; 1006190df4a2SClaudio Imbrenda } 1007190df4a2SClaudio Imbrenda 1008190df4a2SClaudio Imbrenda static int kvm_s390_vm_set_migration(struct kvm *kvm, 1009190df4a2SClaudio Imbrenda struct kvm_device_attr *attr) 1010190df4a2SClaudio Imbrenda { 10111de1ea7eSChristian Borntraeger int res = -ENXIO; 1012190df4a2SClaudio Imbrenda 10131de1ea7eSChristian Borntraeger mutex_lock(&kvm->slots_lock); 1014190df4a2SClaudio Imbrenda switch (attr->attr) { 1015190df4a2SClaudio Imbrenda case KVM_S390_VM_MIGRATION_START: 1016190df4a2SClaudio Imbrenda res = kvm_s390_vm_start_migration(kvm); 1017190df4a2SClaudio Imbrenda break; 1018190df4a2SClaudio Imbrenda case KVM_S390_VM_MIGRATION_STOP: 1019190df4a2SClaudio Imbrenda res = kvm_s390_vm_stop_migration(kvm); 1020190df4a2SClaudio Imbrenda break; 1021190df4a2SClaudio Imbrenda default: 1022190df4a2SClaudio Imbrenda break; 1023190df4a2SClaudio Imbrenda } 10241de1ea7eSChristian Borntraeger mutex_unlock(&kvm->slots_lock); 1025190df4a2SClaudio Imbrenda 1026190df4a2SClaudio Imbrenda return res; 1027190df4a2SClaudio Imbrenda } 1028190df4a2SClaudio Imbrenda 1029190df4a2SClaudio Imbrenda static int kvm_s390_vm_get_migration(struct kvm *kvm, 1030190df4a2SClaudio Imbrenda struct kvm_device_attr *attr) 1031190df4a2SClaudio Imbrenda { 1032afdad616SClaudio Imbrenda u64 mig = kvm->arch.migration_mode; 1033190df4a2SClaudio Imbrenda 1034190df4a2SClaudio Imbrenda if (attr->attr != KVM_S390_VM_MIGRATION_STATUS) 1035190df4a2SClaudio Imbrenda return -ENXIO; 1036190df4a2SClaudio Imbrenda 1037190df4a2SClaudio Imbrenda if (copy_to_user((void __user *)attr->addr, &mig, sizeof(mig))) 1038190df4a2SClaudio Imbrenda return -EFAULT; 1039190df4a2SClaudio Imbrenda return 0; 1040190df4a2SClaudio Imbrenda } 1041190df4a2SClaudio Imbrenda 10428fa1696eSCollin L. Walling static int kvm_s390_set_tod_ext(struct kvm *kvm, struct kvm_device_attr *attr) 10438fa1696eSCollin L. Walling { 10448fa1696eSCollin L. Walling struct kvm_s390_vm_tod_clock gtod; 10458fa1696eSCollin L. Walling 10468fa1696eSCollin L. Walling if (copy_from_user(>od, (void __user *)attr->addr, sizeof(gtod))) 10478fa1696eSCollin L. Walling return -EFAULT; 10488fa1696eSCollin L. Walling 10490e7def5fSDavid Hildenbrand if (!test_kvm_facility(kvm, 139) && gtod.epoch_idx) 10508fa1696eSCollin L. Walling return -EINVAL; 10510e7def5fSDavid Hildenbrand kvm_s390_set_tod_clock(kvm, >od); 10528fa1696eSCollin L. Walling 10538fa1696eSCollin L. Walling VM_EVENT(kvm, 3, "SET: TOD extension: 0x%x, TOD base: 0x%llx", 10548fa1696eSCollin L. Walling gtod.epoch_idx, gtod.tod); 10558fa1696eSCollin L. Walling 10568fa1696eSCollin L. Walling return 0; 10578fa1696eSCollin L. Walling } 10588fa1696eSCollin L. Walling 105972f25020SJason J. Herne static int kvm_s390_set_tod_high(struct kvm *kvm, struct kvm_device_attr *attr) 106072f25020SJason J. Herne { 106172f25020SJason J. Herne u8 gtod_high; 106272f25020SJason J. Herne 106372f25020SJason J. Herne if (copy_from_user(>od_high, (void __user *)attr->addr, 106472f25020SJason J. Herne sizeof(gtod_high))) 106572f25020SJason J. Herne return -EFAULT; 106672f25020SJason J. Herne 106772f25020SJason J. Herne if (gtod_high != 0) 106872f25020SJason J. Herne return -EINVAL; 106958c383c6SChristian Borntraeger VM_EVENT(kvm, 3, "SET: TOD extension: 0x%x", gtod_high); 107072f25020SJason J. Herne 107172f25020SJason J. Herne return 0; 107272f25020SJason J. Herne } 107372f25020SJason J. Herne 107472f25020SJason J. Herne static int kvm_s390_set_tod_low(struct kvm *kvm, struct kvm_device_attr *attr) 107572f25020SJason J. Herne { 10760e7def5fSDavid Hildenbrand struct kvm_s390_vm_tod_clock gtod = { 0 }; 107772f25020SJason J. Herne 10780e7def5fSDavid Hildenbrand if (copy_from_user(>od.tod, (void __user *)attr->addr, 10790e7def5fSDavid Hildenbrand sizeof(gtod.tod))) 108072f25020SJason J. Herne return -EFAULT; 108172f25020SJason J. Herne 10820e7def5fSDavid Hildenbrand kvm_s390_set_tod_clock(kvm, >od); 10830e7def5fSDavid Hildenbrand VM_EVENT(kvm, 3, "SET: TOD base: 0x%llx", gtod.tod); 108472f25020SJason J. Herne return 0; 108572f25020SJason J. Herne } 108672f25020SJason J. Herne 108772f25020SJason J. Herne static int kvm_s390_set_tod(struct kvm *kvm, struct kvm_device_attr *attr) 108872f25020SJason J. Herne { 108972f25020SJason J. Herne int ret; 109072f25020SJason J. Herne 109172f25020SJason J. Herne if (attr->flags) 109272f25020SJason J. Herne return -EINVAL; 109372f25020SJason J. Herne 109472f25020SJason J. Herne switch (attr->attr) { 10958fa1696eSCollin L. Walling case KVM_S390_VM_TOD_EXT: 10968fa1696eSCollin L. Walling ret = kvm_s390_set_tod_ext(kvm, attr); 10978fa1696eSCollin L. Walling break; 109872f25020SJason J. Herne case KVM_S390_VM_TOD_HIGH: 109972f25020SJason J. Herne ret = kvm_s390_set_tod_high(kvm, attr); 110072f25020SJason J. Herne break; 110172f25020SJason J. Herne case KVM_S390_VM_TOD_LOW: 110272f25020SJason J. Herne ret = kvm_s390_set_tod_low(kvm, attr); 110372f25020SJason J. Herne break; 110472f25020SJason J. Herne default: 110572f25020SJason J. Herne ret = -ENXIO; 110672f25020SJason J. Herne break; 110772f25020SJason J. Herne } 110872f25020SJason J. Herne return ret; 110972f25020SJason J. Herne } 111072f25020SJason J. Herne 111133d1b272SDavid Hildenbrand static void kvm_s390_get_tod_clock(struct kvm *kvm, 11128fa1696eSCollin L. Walling struct kvm_s390_vm_tod_clock *gtod) 11138fa1696eSCollin L. Walling { 11148fa1696eSCollin L. Walling struct kvm_s390_tod_clock_ext htod; 11158fa1696eSCollin L. Walling 11168fa1696eSCollin L. Walling preempt_disable(); 11178fa1696eSCollin L. Walling 11188fa1696eSCollin L. Walling get_tod_clock_ext((char *)&htod); 11198fa1696eSCollin L. Walling 11208fa1696eSCollin L. Walling gtod->tod = htod.tod + kvm->arch.epoch; 112133d1b272SDavid Hildenbrand gtod->epoch_idx = 0; 112233d1b272SDavid Hildenbrand if (test_kvm_facility(kvm, 139)) { 11238fa1696eSCollin L. Walling gtod->epoch_idx = htod.epoch_idx + kvm->arch.epdx; 11248fa1696eSCollin L. Walling if (gtod->tod < htod.tod) 11258fa1696eSCollin L. Walling gtod->epoch_idx += 1; 112633d1b272SDavid Hildenbrand } 11278fa1696eSCollin L. Walling 11288fa1696eSCollin L. Walling preempt_enable(); 11298fa1696eSCollin L. Walling } 11308fa1696eSCollin L. Walling 11318fa1696eSCollin L. Walling static int kvm_s390_get_tod_ext(struct kvm *kvm, struct kvm_device_attr *attr) 11328fa1696eSCollin L. Walling { 11338fa1696eSCollin L. Walling struct kvm_s390_vm_tod_clock gtod; 11348fa1696eSCollin L. Walling 11358fa1696eSCollin L. Walling memset(>od, 0, sizeof(gtod)); 113633d1b272SDavid Hildenbrand kvm_s390_get_tod_clock(kvm, >od); 11378fa1696eSCollin L. Walling if (copy_to_user((void __user *)attr->addr, >od, sizeof(gtod))) 11388fa1696eSCollin L. Walling return -EFAULT; 11398fa1696eSCollin L. Walling 11408fa1696eSCollin L. Walling VM_EVENT(kvm, 3, "QUERY: TOD extension: 0x%x, TOD base: 0x%llx", 11418fa1696eSCollin L. Walling gtod.epoch_idx, gtod.tod); 11428fa1696eSCollin L. Walling return 0; 11438fa1696eSCollin L. Walling } 11448fa1696eSCollin L. Walling 114572f25020SJason J. Herne static int kvm_s390_get_tod_high(struct kvm *kvm, struct kvm_device_attr *attr) 114672f25020SJason J. Herne { 114772f25020SJason J. Herne u8 gtod_high = 0; 114872f25020SJason J. Herne 114972f25020SJason J. Herne if (copy_to_user((void __user *)attr->addr, >od_high, 115072f25020SJason J. Herne sizeof(gtod_high))) 115172f25020SJason J. Herne return -EFAULT; 115258c383c6SChristian Borntraeger VM_EVENT(kvm, 3, "QUERY: TOD extension: 0x%x", gtod_high); 115372f25020SJason J. Herne 115472f25020SJason J. Herne return 0; 115572f25020SJason J. Herne } 115672f25020SJason J. Herne 115772f25020SJason J. Herne static int kvm_s390_get_tod_low(struct kvm *kvm, struct kvm_device_attr *attr) 115872f25020SJason J. Herne { 11595a3d883aSDavid Hildenbrand u64 gtod; 116072f25020SJason J. Herne 116160417fccSDavid Hildenbrand gtod = kvm_s390_get_tod_clock_fast(kvm); 116272f25020SJason J. Herne if (copy_to_user((void __user *)attr->addr, >od, sizeof(gtod))) 116372f25020SJason J. Herne return -EFAULT; 116458c383c6SChristian Borntraeger VM_EVENT(kvm, 3, "QUERY: TOD base: 0x%llx", gtod); 116572f25020SJason J. Herne 116672f25020SJason J. Herne return 0; 116772f25020SJason J. Herne } 116872f25020SJason J. Herne 116972f25020SJason J. Herne static int kvm_s390_get_tod(struct kvm *kvm, struct kvm_device_attr *attr) 117072f25020SJason J. Herne { 117172f25020SJason J. Herne int ret; 117272f25020SJason J. Herne 117372f25020SJason J. Herne if (attr->flags) 117472f25020SJason J. Herne return -EINVAL; 117572f25020SJason J. Herne 117672f25020SJason J. Herne switch (attr->attr) { 11778fa1696eSCollin L. Walling case KVM_S390_VM_TOD_EXT: 11788fa1696eSCollin L. Walling ret = kvm_s390_get_tod_ext(kvm, attr); 11798fa1696eSCollin L. Walling break; 118072f25020SJason J. Herne case KVM_S390_VM_TOD_HIGH: 118172f25020SJason J. Herne ret = kvm_s390_get_tod_high(kvm, attr); 118272f25020SJason J. Herne break; 118372f25020SJason J. Herne case KVM_S390_VM_TOD_LOW: 118472f25020SJason J. Herne ret = kvm_s390_get_tod_low(kvm, attr); 118572f25020SJason J. Herne break; 118672f25020SJason J. Herne default: 118772f25020SJason J. Herne ret = -ENXIO; 118872f25020SJason J. Herne break; 118972f25020SJason J. Herne } 119072f25020SJason J. Herne return ret; 119172f25020SJason J. Herne } 119272f25020SJason J. Herne 1193658b6edaSMichael Mueller static int kvm_s390_set_processor(struct kvm *kvm, struct kvm_device_attr *attr) 1194658b6edaSMichael Mueller { 1195658b6edaSMichael Mueller struct kvm_s390_vm_cpu_processor *proc; 1196053dd230SDavid Hildenbrand u16 lowest_ibc, unblocked_ibc; 1197658b6edaSMichael Mueller int ret = 0; 1198658b6edaSMichael Mueller 1199658b6edaSMichael Mueller mutex_lock(&kvm->lock); 1200a03825bbSPaolo Bonzini if (kvm->created_vcpus) { 1201658b6edaSMichael Mueller ret = -EBUSY; 1202658b6edaSMichael Mueller goto out; 1203658b6edaSMichael Mueller } 1204658b6edaSMichael Mueller proc = kzalloc(sizeof(*proc), GFP_KERNEL); 1205658b6edaSMichael Mueller if (!proc) { 1206658b6edaSMichael Mueller ret = -ENOMEM; 1207658b6edaSMichael Mueller goto out; 1208658b6edaSMichael Mueller } 1209658b6edaSMichael Mueller if (!copy_from_user(proc, (void __user *)attr->addr, 1210658b6edaSMichael Mueller sizeof(*proc))) { 12119bb0ec09SDavid Hildenbrand kvm->arch.model.cpuid = proc->cpuid; 1212053dd230SDavid Hildenbrand lowest_ibc = sclp.ibc >> 16 & 0xfff; 1213053dd230SDavid Hildenbrand unblocked_ibc = sclp.ibc & 0xfff; 12140487c44dSDavid Hildenbrand if (lowest_ibc && proc->ibc) { 1215053dd230SDavid Hildenbrand if (proc->ibc > unblocked_ibc) 1216053dd230SDavid Hildenbrand kvm->arch.model.ibc = unblocked_ibc; 1217053dd230SDavid Hildenbrand else if (proc->ibc < lowest_ibc) 1218053dd230SDavid Hildenbrand kvm->arch.model.ibc = lowest_ibc; 1219053dd230SDavid Hildenbrand else 1220658b6edaSMichael Mueller kvm->arch.model.ibc = proc->ibc; 1221053dd230SDavid Hildenbrand } 1222c54f0d6aSDavid Hildenbrand memcpy(kvm->arch.model.fac_list, proc->fac_list, 1223658b6edaSMichael Mueller S390_ARCH_FAC_LIST_SIZE_BYTE); 1224a8c39dd7SChristian Borntraeger VM_EVENT(kvm, 3, "SET: guest ibc: 0x%4.4x, guest cpuid: 0x%16.16llx", 1225a8c39dd7SChristian Borntraeger kvm->arch.model.ibc, 1226a8c39dd7SChristian Borntraeger kvm->arch.model.cpuid); 1227a8c39dd7SChristian Borntraeger VM_EVENT(kvm, 3, "SET: guest faclist: 0x%16.16llx.%16.16llx.%16.16llx", 1228a8c39dd7SChristian Borntraeger kvm->arch.model.fac_list[0], 1229a8c39dd7SChristian Borntraeger kvm->arch.model.fac_list[1], 1230a8c39dd7SChristian Borntraeger kvm->arch.model.fac_list[2]); 1231658b6edaSMichael Mueller } else 1232658b6edaSMichael Mueller ret = -EFAULT; 1233658b6edaSMichael Mueller kfree(proc); 1234658b6edaSMichael Mueller out: 1235658b6edaSMichael Mueller mutex_unlock(&kvm->lock); 1236658b6edaSMichael Mueller return ret; 1237658b6edaSMichael Mueller } 1238658b6edaSMichael Mueller 123915c9705fSDavid Hildenbrand static int kvm_s390_set_processor_feat(struct kvm *kvm, 124015c9705fSDavid Hildenbrand struct kvm_device_attr *attr) 124115c9705fSDavid Hildenbrand { 124215c9705fSDavid Hildenbrand struct kvm_s390_vm_cpu_feat data; 124315c9705fSDavid Hildenbrand 124415c9705fSDavid Hildenbrand if (copy_from_user(&data, (void __user *)attr->addr, sizeof(data))) 124515c9705fSDavid Hildenbrand return -EFAULT; 124615c9705fSDavid Hildenbrand if (!bitmap_subset((unsigned long *) data.feat, 124715c9705fSDavid Hildenbrand kvm_s390_available_cpu_feat, 124815c9705fSDavid Hildenbrand KVM_S390_VM_CPU_FEAT_NR_BITS)) 124915c9705fSDavid Hildenbrand return -EINVAL; 125015c9705fSDavid Hildenbrand 125115c9705fSDavid Hildenbrand mutex_lock(&kvm->lock); 12522f8311c9SChristian Borntraeger if (kvm->created_vcpus) { 12532f8311c9SChristian Borntraeger mutex_unlock(&kvm->lock); 12542f8311c9SChristian Borntraeger return -EBUSY; 12552f8311c9SChristian Borntraeger } 125615c9705fSDavid Hildenbrand bitmap_copy(kvm->arch.cpu_feat, (unsigned long *) data.feat, 125715c9705fSDavid Hildenbrand KVM_S390_VM_CPU_FEAT_NR_BITS); 125815c9705fSDavid Hildenbrand mutex_unlock(&kvm->lock); 12592f8311c9SChristian Borntraeger VM_EVENT(kvm, 3, "SET: guest feat: 0x%16.16llx.0x%16.16llx.0x%16.16llx", 12602f8311c9SChristian Borntraeger data.feat[0], 12612f8311c9SChristian Borntraeger data.feat[1], 12622f8311c9SChristian Borntraeger data.feat[2]); 12632f8311c9SChristian Borntraeger return 0; 126415c9705fSDavid Hildenbrand } 126515c9705fSDavid Hildenbrand 12660a763c78SDavid Hildenbrand static int kvm_s390_set_processor_subfunc(struct kvm *kvm, 12670a763c78SDavid Hildenbrand struct kvm_device_attr *attr) 12680a763c78SDavid Hildenbrand { 12690a763c78SDavid Hildenbrand /* 12700a763c78SDavid Hildenbrand * Once supported by kernel + hw, we have to store the subfunctions 12710a763c78SDavid Hildenbrand * in kvm->arch and remember that user space configured them. 12720a763c78SDavid Hildenbrand */ 12730a763c78SDavid Hildenbrand return -ENXIO; 12740a763c78SDavid Hildenbrand } 12750a763c78SDavid Hildenbrand 1276658b6edaSMichael Mueller static int kvm_s390_set_cpu_model(struct kvm *kvm, struct kvm_device_attr *attr) 1277658b6edaSMichael Mueller { 1278658b6edaSMichael Mueller int ret = -ENXIO; 1279658b6edaSMichael Mueller 1280658b6edaSMichael Mueller switch (attr->attr) { 1281658b6edaSMichael Mueller case KVM_S390_VM_CPU_PROCESSOR: 1282658b6edaSMichael Mueller ret = kvm_s390_set_processor(kvm, attr); 1283658b6edaSMichael Mueller break; 128415c9705fSDavid Hildenbrand case KVM_S390_VM_CPU_PROCESSOR_FEAT: 128515c9705fSDavid Hildenbrand ret = kvm_s390_set_processor_feat(kvm, attr); 128615c9705fSDavid Hildenbrand break; 12870a763c78SDavid Hildenbrand case KVM_S390_VM_CPU_PROCESSOR_SUBFUNC: 12880a763c78SDavid Hildenbrand ret = kvm_s390_set_processor_subfunc(kvm, attr); 12890a763c78SDavid Hildenbrand break; 1290658b6edaSMichael Mueller } 1291658b6edaSMichael Mueller return ret; 1292658b6edaSMichael Mueller } 1293658b6edaSMichael Mueller 1294658b6edaSMichael Mueller static int kvm_s390_get_processor(struct kvm *kvm, struct kvm_device_attr *attr) 1295658b6edaSMichael Mueller { 1296658b6edaSMichael Mueller struct kvm_s390_vm_cpu_processor *proc; 1297658b6edaSMichael Mueller int ret = 0; 1298658b6edaSMichael Mueller 1299658b6edaSMichael Mueller proc = kzalloc(sizeof(*proc), GFP_KERNEL); 1300658b6edaSMichael Mueller if (!proc) { 1301658b6edaSMichael Mueller ret = -ENOMEM; 1302658b6edaSMichael Mueller goto out; 1303658b6edaSMichael Mueller } 13049bb0ec09SDavid Hildenbrand proc->cpuid = kvm->arch.model.cpuid; 1305658b6edaSMichael Mueller proc->ibc = kvm->arch.model.ibc; 1306c54f0d6aSDavid Hildenbrand memcpy(&proc->fac_list, kvm->arch.model.fac_list, 1307c54f0d6aSDavid Hildenbrand S390_ARCH_FAC_LIST_SIZE_BYTE); 1308a8c39dd7SChristian Borntraeger VM_EVENT(kvm, 3, "GET: guest ibc: 0x%4.4x, guest cpuid: 0x%16.16llx", 1309a8c39dd7SChristian Borntraeger kvm->arch.model.ibc, 1310a8c39dd7SChristian Borntraeger kvm->arch.model.cpuid); 1311a8c39dd7SChristian Borntraeger VM_EVENT(kvm, 3, "GET: guest faclist: 0x%16.16llx.%16.16llx.%16.16llx", 1312a8c39dd7SChristian Borntraeger kvm->arch.model.fac_list[0], 1313a8c39dd7SChristian Borntraeger kvm->arch.model.fac_list[1], 1314a8c39dd7SChristian Borntraeger kvm->arch.model.fac_list[2]); 1315658b6edaSMichael Mueller if (copy_to_user((void __user *)attr->addr, proc, sizeof(*proc))) 1316658b6edaSMichael Mueller ret = -EFAULT; 1317658b6edaSMichael Mueller kfree(proc); 1318658b6edaSMichael Mueller out: 1319658b6edaSMichael Mueller return ret; 1320658b6edaSMichael Mueller } 1321658b6edaSMichael Mueller 1322658b6edaSMichael Mueller static int kvm_s390_get_machine(struct kvm *kvm, struct kvm_device_attr *attr) 1323658b6edaSMichael Mueller { 1324658b6edaSMichael Mueller struct kvm_s390_vm_cpu_machine *mach; 1325658b6edaSMichael Mueller int ret = 0; 1326658b6edaSMichael Mueller 1327658b6edaSMichael Mueller mach = kzalloc(sizeof(*mach), GFP_KERNEL); 1328658b6edaSMichael Mueller if (!mach) { 1329658b6edaSMichael Mueller ret = -ENOMEM; 1330658b6edaSMichael Mueller goto out; 1331658b6edaSMichael Mueller } 1332658b6edaSMichael Mueller get_cpu_id((struct cpuid *) &mach->cpuid); 133337c5f6c8SDavid Hildenbrand mach->ibc = sclp.ibc; 1334c54f0d6aSDavid Hildenbrand memcpy(&mach->fac_mask, kvm->arch.model.fac_mask, 1335981467c9SMichael Mueller S390_ARCH_FAC_LIST_SIZE_BYTE); 1336658b6edaSMichael Mueller memcpy((unsigned long *)&mach->fac_list, S390_lowcore.stfle_fac_list, 133704478197SChristian Borntraeger sizeof(S390_lowcore.stfle_fac_list)); 1338a8c39dd7SChristian Borntraeger VM_EVENT(kvm, 3, "GET: host ibc: 0x%4.4x, host cpuid: 0x%16.16llx", 1339a8c39dd7SChristian Borntraeger kvm->arch.model.ibc, 1340a8c39dd7SChristian Borntraeger kvm->arch.model.cpuid); 1341a8c39dd7SChristian Borntraeger VM_EVENT(kvm, 3, "GET: host facmask: 0x%16.16llx.%16.16llx.%16.16llx", 1342a8c39dd7SChristian Borntraeger mach->fac_mask[0], 1343a8c39dd7SChristian Borntraeger mach->fac_mask[1], 1344a8c39dd7SChristian Borntraeger mach->fac_mask[2]); 1345a8c39dd7SChristian Borntraeger VM_EVENT(kvm, 3, "GET: host faclist: 0x%16.16llx.%16.16llx.%16.16llx", 1346a8c39dd7SChristian Borntraeger mach->fac_list[0], 1347a8c39dd7SChristian Borntraeger mach->fac_list[1], 1348a8c39dd7SChristian Borntraeger mach->fac_list[2]); 1349658b6edaSMichael Mueller if (copy_to_user((void __user *)attr->addr, mach, sizeof(*mach))) 1350658b6edaSMichael Mueller ret = -EFAULT; 1351658b6edaSMichael Mueller kfree(mach); 1352658b6edaSMichael Mueller out: 1353658b6edaSMichael Mueller return ret; 1354658b6edaSMichael Mueller } 1355658b6edaSMichael Mueller 135615c9705fSDavid Hildenbrand static int kvm_s390_get_processor_feat(struct kvm *kvm, 135715c9705fSDavid Hildenbrand struct kvm_device_attr *attr) 135815c9705fSDavid Hildenbrand { 135915c9705fSDavid Hildenbrand struct kvm_s390_vm_cpu_feat data; 136015c9705fSDavid Hildenbrand 136115c9705fSDavid Hildenbrand bitmap_copy((unsigned long *) data.feat, kvm->arch.cpu_feat, 136215c9705fSDavid Hildenbrand KVM_S390_VM_CPU_FEAT_NR_BITS); 136315c9705fSDavid Hildenbrand if (copy_to_user((void __user *)attr->addr, &data, sizeof(data))) 136415c9705fSDavid Hildenbrand return -EFAULT; 13652f8311c9SChristian Borntraeger VM_EVENT(kvm, 3, "GET: guest feat: 0x%16.16llx.0x%16.16llx.0x%16.16llx", 13662f8311c9SChristian Borntraeger data.feat[0], 13672f8311c9SChristian Borntraeger data.feat[1], 13682f8311c9SChristian Borntraeger data.feat[2]); 136915c9705fSDavid Hildenbrand return 0; 137015c9705fSDavid Hildenbrand } 137115c9705fSDavid Hildenbrand 137215c9705fSDavid Hildenbrand static int kvm_s390_get_machine_feat(struct kvm *kvm, 137315c9705fSDavid Hildenbrand struct kvm_device_attr *attr) 137415c9705fSDavid Hildenbrand { 137515c9705fSDavid Hildenbrand struct kvm_s390_vm_cpu_feat data; 137615c9705fSDavid Hildenbrand 137715c9705fSDavid Hildenbrand bitmap_copy((unsigned long *) data.feat, 137815c9705fSDavid Hildenbrand kvm_s390_available_cpu_feat, 137915c9705fSDavid Hildenbrand KVM_S390_VM_CPU_FEAT_NR_BITS); 138015c9705fSDavid Hildenbrand if (copy_to_user((void __user *)attr->addr, &data, sizeof(data))) 138115c9705fSDavid Hildenbrand return -EFAULT; 13822f8311c9SChristian Borntraeger VM_EVENT(kvm, 3, "GET: host feat: 0x%16.16llx.0x%16.16llx.0x%16.16llx", 13832f8311c9SChristian Borntraeger data.feat[0], 13842f8311c9SChristian Borntraeger data.feat[1], 13852f8311c9SChristian Borntraeger data.feat[2]); 138615c9705fSDavid Hildenbrand return 0; 138715c9705fSDavid Hildenbrand } 138815c9705fSDavid Hildenbrand 13890a763c78SDavid Hildenbrand static int kvm_s390_get_processor_subfunc(struct kvm *kvm, 13900a763c78SDavid Hildenbrand struct kvm_device_attr *attr) 13910a763c78SDavid Hildenbrand { 13920a763c78SDavid Hildenbrand /* 13930a763c78SDavid Hildenbrand * Once we can actually configure subfunctions (kernel + hw support), 13940a763c78SDavid Hildenbrand * we have to check if they were already set by user space, if so copy 13950a763c78SDavid Hildenbrand * them from kvm->arch. 13960a763c78SDavid Hildenbrand */ 13970a763c78SDavid Hildenbrand return -ENXIO; 13980a763c78SDavid Hildenbrand } 13990a763c78SDavid Hildenbrand 14000a763c78SDavid Hildenbrand static int kvm_s390_get_machine_subfunc(struct kvm *kvm, 14010a763c78SDavid Hildenbrand struct kvm_device_attr *attr) 14020a763c78SDavid Hildenbrand { 14030a763c78SDavid Hildenbrand if (copy_to_user((void __user *)attr->addr, &kvm_s390_available_subfunc, 14040a763c78SDavid Hildenbrand sizeof(struct kvm_s390_vm_cpu_subfunc))) 14050a763c78SDavid Hildenbrand return -EFAULT; 14060a763c78SDavid Hildenbrand return 0; 14070a763c78SDavid Hildenbrand } 1408658b6edaSMichael Mueller static int kvm_s390_get_cpu_model(struct kvm *kvm, struct kvm_device_attr *attr) 1409658b6edaSMichael Mueller { 1410658b6edaSMichael Mueller int ret = -ENXIO; 1411658b6edaSMichael Mueller 1412658b6edaSMichael Mueller switch (attr->attr) { 1413658b6edaSMichael Mueller case KVM_S390_VM_CPU_PROCESSOR: 1414658b6edaSMichael Mueller ret = kvm_s390_get_processor(kvm, attr); 1415658b6edaSMichael Mueller break; 1416658b6edaSMichael Mueller case KVM_S390_VM_CPU_MACHINE: 1417658b6edaSMichael Mueller ret = kvm_s390_get_machine(kvm, attr); 1418658b6edaSMichael Mueller break; 141915c9705fSDavid Hildenbrand case KVM_S390_VM_CPU_PROCESSOR_FEAT: 142015c9705fSDavid Hildenbrand ret = kvm_s390_get_processor_feat(kvm, attr); 142115c9705fSDavid Hildenbrand break; 142215c9705fSDavid Hildenbrand case KVM_S390_VM_CPU_MACHINE_FEAT: 142315c9705fSDavid Hildenbrand ret = kvm_s390_get_machine_feat(kvm, attr); 142415c9705fSDavid Hildenbrand break; 14250a763c78SDavid Hildenbrand case KVM_S390_VM_CPU_PROCESSOR_SUBFUNC: 14260a763c78SDavid Hildenbrand ret = kvm_s390_get_processor_subfunc(kvm, attr); 14270a763c78SDavid Hildenbrand break; 14280a763c78SDavid Hildenbrand case KVM_S390_VM_CPU_MACHINE_SUBFUNC: 14290a763c78SDavid Hildenbrand ret = kvm_s390_get_machine_subfunc(kvm, attr); 14300a763c78SDavid Hildenbrand break; 1431658b6edaSMichael Mueller } 1432658b6edaSMichael Mueller return ret; 1433658b6edaSMichael Mueller } 1434658b6edaSMichael Mueller 1435f2061656SDominik Dingel static int kvm_s390_vm_set_attr(struct kvm *kvm, struct kvm_device_attr *attr) 1436f2061656SDominik Dingel { 1437f2061656SDominik Dingel int ret; 1438f2061656SDominik Dingel 1439f2061656SDominik Dingel switch (attr->group) { 14404f718eabSDominik Dingel case KVM_S390_VM_MEM_CTRL: 14418c0a7ce6SDominik Dingel ret = kvm_s390_set_mem_control(kvm, attr); 14424f718eabSDominik Dingel break; 144372f25020SJason J. Herne case KVM_S390_VM_TOD: 144472f25020SJason J. Herne ret = kvm_s390_set_tod(kvm, attr); 144572f25020SJason J. Herne break; 1446658b6edaSMichael Mueller case KVM_S390_VM_CPU_MODEL: 1447658b6edaSMichael Mueller ret = kvm_s390_set_cpu_model(kvm, attr); 1448658b6edaSMichael Mueller break; 1449a374e892STony Krowiak case KVM_S390_VM_CRYPTO: 1450a374e892STony Krowiak ret = kvm_s390_vm_set_crypto(kvm, attr); 1451a374e892STony Krowiak break; 1452190df4a2SClaudio Imbrenda case KVM_S390_VM_MIGRATION: 1453190df4a2SClaudio Imbrenda ret = kvm_s390_vm_set_migration(kvm, attr); 1454190df4a2SClaudio Imbrenda break; 1455f2061656SDominik Dingel default: 1456f2061656SDominik Dingel ret = -ENXIO; 1457f2061656SDominik Dingel break; 1458f2061656SDominik Dingel } 1459f2061656SDominik Dingel 1460f2061656SDominik Dingel return ret; 1461f2061656SDominik Dingel } 1462f2061656SDominik Dingel 1463f2061656SDominik Dingel static int kvm_s390_vm_get_attr(struct kvm *kvm, struct kvm_device_attr *attr) 1464f2061656SDominik Dingel { 14658c0a7ce6SDominik Dingel int ret; 14668c0a7ce6SDominik Dingel 14678c0a7ce6SDominik Dingel switch (attr->group) { 14688c0a7ce6SDominik Dingel case KVM_S390_VM_MEM_CTRL: 14698c0a7ce6SDominik Dingel ret = kvm_s390_get_mem_control(kvm, attr); 14708c0a7ce6SDominik Dingel break; 147172f25020SJason J. Herne case KVM_S390_VM_TOD: 147272f25020SJason J. Herne ret = kvm_s390_get_tod(kvm, attr); 147372f25020SJason J. Herne break; 1474658b6edaSMichael Mueller case KVM_S390_VM_CPU_MODEL: 1475658b6edaSMichael Mueller ret = kvm_s390_get_cpu_model(kvm, attr); 1476658b6edaSMichael Mueller break; 1477190df4a2SClaudio Imbrenda case KVM_S390_VM_MIGRATION: 1478190df4a2SClaudio Imbrenda ret = kvm_s390_vm_get_migration(kvm, attr); 1479190df4a2SClaudio Imbrenda break; 14808c0a7ce6SDominik Dingel default: 14818c0a7ce6SDominik Dingel ret = -ENXIO; 14828c0a7ce6SDominik Dingel break; 14838c0a7ce6SDominik Dingel } 14848c0a7ce6SDominik Dingel 14858c0a7ce6SDominik Dingel return ret; 1486f2061656SDominik Dingel } 1487f2061656SDominik Dingel 1488f2061656SDominik Dingel static int kvm_s390_vm_has_attr(struct kvm *kvm, struct kvm_device_attr *attr) 1489f2061656SDominik Dingel { 1490f2061656SDominik Dingel int ret; 1491f2061656SDominik Dingel 1492f2061656SDominik Dingel switch (attr->group) { 14934f718eabSDominik Dingel case KVM_S390_VM_MEM_CTRL: 14944f718eabSDominik Dingel switch (attr->attr) { 14954f718eabSDominik Dingel case KVM_S390_VM_MEM_ENABLE_CMMA: 14964f718eabSDominik Dingel case KVM_S390_VM_MEM_CLR_CMMA: 1497f9cbd9b0SDavid Hildenbrand ret = sclp.has_cmma ? 0 : -ENXIO; 1498f9cbd9b0SDavid Hildenbrand break; 14998c0a7ce6SDominik Dingel case KVM_S390_VM_MEM_LIMIT_SIZE: 15004f718eabSDominik Dingel ret = 0; 15014f718eabSDominik Dingel break; 15024f718eabSDominik Dingel default: 15034f718eabSDominik Dingel ret = -ENXIO; 15044f718eabSDominik Dingel break; 15054f718eabSDominik Dingel } 15064f718eabSDominik Dingel break; 150772f25020SJason J. Herne case KVM_S390_VM_TOD: 150872f25020SJason J. Herne switch (attr->attr) { 150972f25020SJason J. Herne case KVM_S390_VM_TOD_LOW: 151072f25020SJason J. Herne case KVM_S390_VM_TOD_HIGH: 151172f25020SJason J. Herne ret = 0; 151272f25020SJason J. Herne break; 151372f25020SJason J. Herne default: 151472f25020SJason J. Herne ret = -ENXIO; 151572f25020SJason J. Herne break; 151672f25020SJason J. Herne } 151772f25020SJason J. Herne break; 1518658b6edaSMichael Mueller case KVM_S390_VM_CPU_MODEL: 1519658b6edaSMichael Mueller switch (attr->attr) { 1520658b6edaSMichael Mueller case KVM_S390_VM_CPU_PROCESSOR: 1521658b6edaSMichael Mueller case KVM_S390_VM_CPU_MACHINE: 152215c9705fSDavid Hildenbrand case KVM_S390_VM_CPU_PROCESSOR_FEAT: 152315c9705fSDavid Hildenbrand case KVM_S390_VM_CPU_MACHINE_FEAT: 15240a763c78SDavid Hildenbrand case KVM_S390_VM_CPU_MACHINE_SUBFUNC: 1525658b6edaSMichael Mueller ret = 0; 1526658b6edaSMichael Mueller break; 15270a763c78SDavid Hildenbrand /* configuring subfunctions is not supported yet */ 15280a763c78SDavid Hildenbrand case KVM_S390_VM_CPU_PROCESSOR_SUBFUNC: 1529658b6edaSMichael Mueller default: 1530658b6edaSMichael Mueller ret = -ENXIO; 1531658b6edaSMichael Mueller break; 1532658b6edaSMichael Mueller } 1533658b6edaSMichael Mueller break; 1534a374e892STony Krowiak case KVM_S390_VM_CRYPTO: 1535a374e892STony Krowiak switch (attr->attr) { 1536a374e892STony Krowiak case KVM_S390_VM_CRYPTO_ENABLE_AES_KW: 1537a374e892STony Krowiak case KVM_S390_VM_CRYPTO_ENABLE_DEA_KW: 1538a374e892STony Krowiak case KVM_S390_VM_CRYPTO_DISABLE_AES_KW: 1539a374e892STony Krowiak case KVM_S390_VM_CRYPTO_DISABLE_DEA_KW: 1540a374e892STony Krowiak ret = 0; 1541a374e892STony Krowiak break; 154237940fb0STony Krowiak case KVM_S390_VM_CRYPTO_ENABLE_APIE: 154337940fb0STony Krowiak case KVM_S390_VM_CRYPTO_DISABLE_APIE: 154437940fb0STony Krowiak ret = ap_instructions_available() ? 0 : -ENXIO; 154537940fb0STony Krowiak break; 1546a374e892STony Krowiak default: 1547a374e892STony Krowiak ret = -ENXIO; 1548a374e892STony Krowiak break; 1549a374e892STony Krowiak } 1550a374e892STony Krowiak break; 1551190df4a2SClaudio Imbrenda case KVM_S390_VM_MIGRATION: 1552190df4a2SClaudio Imbrenda ret = 0; 1553190df4a2SClaudio Imbrenda break; 1554f2061656SDominik Dingel default: 1555f2061656SDominik Dingel ret = -ENXIO; 1556f2061656SDominik Dingel break; 1557f2061656SDominik Dingel } 1558f2061656SDominik Dingel 1559f2061656SDominik Dingel return ret; 1560f2061656SDominik Dingel } 1561f2061656SDominik Dingel 156230ee2a98SJason J. Herne static long kvm_s390_get_skeys(struct kvm *kvm, struct kvm_s390_skeys *args) 156330ee2a98SJason J. Herne { 156430ee2a98SJason J. Herne uint8_t *keys; 156530ee2a98SJason J. Herne uint64_t hva; 15664f899147SChristian Borntraeger int srcu_idx, i, r = 0; 156730ee2a98SJason J. Herne 156830ee2a98SJason J. Herne if (args->flags != 0) 156930ee2a98SJason J. Herne return -EINVAL; 157030ee2a98SJason J. Herne 157130ee2a98SJason J. Herne /* Is this guest using storage keys? */ 157255531b74SJanosch Frank if (!mm_uses_skeys(current->mm)) 157330ee2a98SJason J. Herne return KVM_S390_GET_SKEYS_NONE; 157430ee2a98SJason J. Herne 157530ee2a98SJason J. Herne /* Enforce sane limit on memory allocation */ 157630ee2a98SJason J. Herne if (args->count < 1 || args->count > KVM_S390_SKEYS_MAX) 157730ee2a98SJason J. Herne return -EINVAL; 157830ee2a98SJason J. Herne 1579752ade68SMichal Hocko keys = kvmalloc_array(args->count, sizeof(uint8_t), GFP_KERNEL); 158030ee2a98SJason J. Herne if (!keys) 158130ee2a98SJason J. Herne return -ENOMEM; 158230ee2a98SJason J. Herne 1583d3ed1ceeSMartin Schwidefsky down_read(¤t->mm->mmap_sem); 15844f899147SChristian Borntraeger srcu_idx = srcu_read_lock(&kvm->srcu); 158530ee2a98SJason J. Herne for (i = 0; i < args->count; i++) { 158630ee2a98SJason J. Herne hva = gfn_to_hva(kvm, args->start_gfn + i); 158730ee2a98SJason J. Herne if (kvm_is_error_hva(hva)) { 158830ee2a98SJason J. Herne r = -EFAULT; 1589d3ed1ceeSMartin Schwidefsky break; 159030ee2a98SJason J. Herne } 159130ee2a98SJason J. Herne 1592154c8c19SDavid Hildenbrand r = get_guest_storage_key(current->mm, hva, &keys[i]); 1593154c8c19SDavid Hildenbrand if (r) 1594d3ed1ceeSMartin Schwidefsky break; 159530ee2a98SJason J. Herne } 15964f899147SChristian Borntraeger srcu_read_unlock(&kvm->srcu, srcu_idx); 1597d3ed1ceeSMartin Schwidefsky up_read(¤t->mm->mmap_sem); 159830ee2a98SJason J. Herne 1599d3ed1ceeSMartin Schwidefsky if (!r) { 160030ee2a98SJason J. Herne r = copy_to_user((uint8_t __user *)args->skeydata_addr, keys, 160130ee2a98SJason J. Herne sizeof(uint8_t) * args->count); 160230ee2a98SJason J. Herne if (r) 160330ee2a98SJason J. Herne r = -EFAULT; 1604d3ed1ceeSMartin Schwidefsky } 1605d3ed1ceeSMartin Schwidefsky 160630ee2a98SJason J. Herne kvfree(keys); 160730ee2a98SJason J. Herne return r; 160830ee2a98SJason J. Herne } 160930ee2a98SJason J. Herne 161030ee2a98SJason J. Herne static long kvm_s390_set_skeys(struct kvm *kvm, struct kvm_s390_skeys *args) 161130ee2a98SJason J. Herne { 161230ee2a98SJason J. Herne uint8_t *keys; 161330ee2a98SJason J. Herne uint64_t hva; 16144f899147SChristian Borntraeger int srcu_idx, i, r = 0; 1615bd096f64SJanosch Frank bool unlocked; 161630ee2a98SJason J. Herne 161730ee2a98SJason J. Herne if (args->flags != 0) 161830ee2a98SJason J. Herne return -EINVAL; 161930ee2a98SJason J. Herne 162030ee2a98SJason J. Herne /* Enforce sane limit on memory allocation */ 162130ee2a98SJason J. Herne if (args->count < 1 || args->count > KVM_S390_SKEYS_MAX) 162230ee2a98SJason J. Herne return -EINVAL; 162330ee2a98SJason J. Herne 1624752ade68SMichal Hocko keys = kvmalloc_array(args->count, sizeof(uint8_t), GFP_KERNEL); 162530ee2a98SJason J. Herne if (!keys) 162630ee2a98SJason J. Herne return -ENOMEM; 162730ee2a98SJason J. Herne 162830ee2a98SJason J. Herne r = copy_from_user(keys, (uint8_t __user *)args->skeydata_addr, 162930ee2a98SJason J. Herne sizeof(uint8_t) * args->count); 163030ee2a98SJason J. Herne if (r) { 163130ee2a98SJason J. Herne r = -EFAULT; 163230ee2a98SJason J. Herne goto out; 163330ee2a98SJason J. Herne } 163430ee2a98SJason J. Herne 163530ee2a98SJason J. Herne /* Enable storage key handling for the guest */ 163614d4a425SDominik Dingel r = s390_enable_skey(); 163714d4a425SDominik Dingel if (r) 163814d4a425SDominik Dingel goto out; 163930ee2a98SJason J. Herne 1640bd096f64SJanosch Frank i = 0; 1641d3ed1ceeSMartin Schwidefsky down_read(¤t->mm->mmap_sem); 16424f899147SChristian Borntraeger srcu_idx = srcu_read_lock(&kvm->srcu); 1643bd096f64SJanosch Frank while (i < args->count) { 1644bd096f64SJanosch Frank unlocked = false; 164530ee2a98SJason J. Herne hva = gfn_to_hva(kvm, args->start_gfn + i); 164630ee2a98SJason J. Herne if (kvm_is_error_hva(hva)) { 164730ee2a98SJason J. Herne r = -EFAULT; 1648d3ed1ceeSMartin Schwidefsky break; 164930ee2a98SJason J. Herne } 165030ee2a98SJason J. Herne 165130ee2a98SJason J. Herne /* Lowest order bit is reserved */ 165230ee2a98SJason J. Herne if (keys[i] & 0x01) { 165330ee2a98SJason J. Herne r = -EINVAL; 1654d3ed1ceeSMartin Schwidefsky break; 165530ee2a98SJason J. Herne } 165630ee2a98SJason J. Herne 1657fe69eabfSDavid Hildenbrand r = set_guest_storage_key(current->mm, hva, keys[i], 0); 1658bd096f64SJanosch Frank if (r) { 1659bd096f64SJanosch Frank r = fixup_user_fault(current, current->mm, hva, 1660bd096f64SJanosch Frank FAULT_FLAG_WRITE, &unlocked); 166130ee2a98SJason J. Herne if (r) 1662d3ed1ceeSMartin Schwidefsky break; 166330ee2a98SJason J. Herne } 1664bd096f64SJanosch Frank if (!r) 1665bd096f64SJanosch Frank i++; 1666bd096f64SJanosch Frank } 16674f899147SChristian Borntraeger srcu_read_unlock(&kvm->srcu, srcu_idx); 1668d3ed1ceeSMartin Schwidefsky up_read(¤t->mm->mmap_sem); 166930ee2a98SJason J. Herne out: 167030ee2a98SJason J. Herne kvfree(keys); 167130ee2a98SJason J. Herne return r; 167230ee2a98SJason J. Herne } 167330ee2a98SJason J. Herne 16744036e387SClaudio Imbrenda /* 16754036e387SClaudio Imbrenda * Base address and length must be sent at the start of each block, therefore 16764036e387SClaudio Imbrenda * it's cheaper to send some clean data, as long as it's less than the size of 16774036e387SClaudio Imbrenda * two longs. 16784036e387SClaudio Imbrenda */ 16794036e387SClaudio Imbrenda #define KVM_S390_MAX_BIT_DISTANCE (2 * sizeof(void *)) 16804036e387SClaudio Imbrenda /* for consistency */ 16814036e387SClaudio Imbrenda #define KVM_S390_CMMA_SIZE_MAX ((u32)KVM_S390_SKEYS_MAX) 16824036e387SClaudio Imbrenda 16834036e387SClaudio Imbrenda /* 1684afdad616SClaudio Imbrenda * Similar to gfn_to_memslot, but returns the index of a memslot also when the 1685afdad616SClaudio Imbrenda * address falls in a hole. In that case the index of one of the memslots 1686afdad616SClaudio Imbrenda * bordering the hole is returned. 1687afdad616SClaudio Imbrenda */ 1688afdad616SClaudio Imbrenda static int gfn_to_memslot_approx(struct kvm_memslots *slots, gfn_t gfn) 1689afdad616SClaudio Imbrenda { 1690afdad616SClaudio Imbrenda int start = 0, end = slots->used_slots; 1691afdad616SClaudio Imbrenda int slot = atomic_read(&slots->lru_slot); 1692afdad616SClaudio Imbrenda struct kvm_memory_slot *memslots = slots->memslots; 1693afdad616SClaudio Imbrenda 1694afdad616SClaudio Imbrenda if (gfn >= memslots[slot].base_gfn && 1695afdad616SClaudio Imbrenda gfn < memslots[slot].base_gfn + memslots[slot].npages) 1696afdad616SClaudio Imbrenda return slot; 1697afdad616SClaudio Imbrenda 1698afdad616SClaudio Imbrenda while (start < end) { 1699afdad616SClaudio Imbrenda slot = start + (end - start) / 2; 1700afdad616SClaudio Imbrenda 1701afdad616SClaudio Imbrenda if (gfn >= memslots[slot].base_gfn) 1702afdad616SClaudio Imbrenda end = slot; 1703afdad616SClaudio Imbrenda else 1704afdad616SClaudio Imbrenda start = slot + 1; 1705afdad616SClaudio Imbrenda } 1706afdad616SClaudio Imbrenda 1707afdad616SClaudio Imbrenda if (gfn >= memslots[start].base_gfn && 1708afdad616SClaudio Imbrenda gfn < memslots[start].base_gfn + memslots[start].npages) { 1709afdad616SClaudio Imbrenda atomic_set(&slots->lru_slot, start); 1710afdad616SClaudio Imbrenda } 1711afdad616SClaudio Imbrenda 1712afdad616SClaudio Imbrenda return start; 1713afdad616SClaudio Imbrenda } 1714afdad616SClaudio Imbrenda 1715afdad616SClaudio Imbrenda static int kvm_s390_peek_cmma(struct kvm *kvm, struct kvm_s390_cmma_log *args, 1716afdad616SClaudio Imbrenda u8 *res, unsigned long bufsize) 1717afdad616SClaudio Imbrenda { 1718afdad616SClaudio Imbrenda unsigned long pgstev, hva, cur_gfn = args->start_gfn; 1719afdad616SClaudio Imbrenda 1720afdad616SClaudio Imbrenda args->count = 0; 1721afdad616SClaudio Imbrenda while (args->count < bufsize) { 1722afdad616SClaudio Imbrenda hva = gfn_to_hva(kvm, cur_gfn); 1723afdad616SClaudio Imbrenda /* 1724afdad616SClaudio Imbrenda * We return an error if the first value was invalid, but we 1725afdad616SClaudio Imbrenda * return successfully if at least one value was copied. 1726afdad616SClaudio Imbrenda */ 1727afdad616SClaudio Imbrenda if (kvm_is_error_hva(hva)) 1728afdad616SClaudio Imbrenda return args->count ? 0 : -EFAULT; 1729afdad616SClaudio Imbrenda if (get_pgste(kvm->mm, hva, &pgstev) < 0) 1730afdad616SClaudio Imbrenda pgstev = 0; 1731afdad616SClaudio Imbrenda res[args->count++] = (pgstev >> 24) & 0x43; 1732afdad616SClaudio Imbrenda cur_gfn++; 1733afdad616SClaudio Imbrenda } 1734afdad616SClaudio Imbrenda 1735afdad616SClaudio Imbrenda return 0; 1736afdad616SClaudio Imbrenda } 1737afdad616SClaudio Imbrenda 1738afdad616SClaudio Imbrenda static unsigned long kvm_s390_next_dirty_cmma(struct kvm_memslots *slots, 1739afdad616SClaudio Imbrenda unsigned long cur_gfn) 1740afdad616SClaudio Imbrenda { 1741afdad616SClaudio Imbrenda int slotidx = gfn_to_memslot_approx(slots, cur_gfn); 1742afdad616SClaudio Imbrenda struct kvm_memory_slot *ms = slots->memslots + slotidx; 1743afdad616SClaudio Imbrenda unsigned long ofs = cur_gfn - ms->base_gfn; 1744afdad616SClaudio Imbrenda 1745afdad616SClaudio Imbrenda if (ms->base_gfn + ms->npages <= cur_gfn) { 1746afdad616SClaudio Imbrenda slotidx--; 1747afdad616SClaudio Imbrenda /* If we are above the highest slot, wrap around */ 1748afdad616SClaudio Imbrenda if (slotidx < 0) 1749afdad616SClaudio Imbrenda slotidx = slots->used_slots - 1; 1750afdad616SClaudio Imbrenda 1751afdad616SClaudio Imbrenda ms = slots->memslots + slotidx; 1752afdad616SClaudio Imbrenda ofs = 0; 1753afdad616SClaudio Imbrenda } 1754afdad616SClaudio Imbrenda ofs = find_next_bit(kvm_second_dirty_bitmap(ms), ms->npages, ofs); 1755afdad616SClaudio Imbrenda while ((slotidx > 0) && (ofs >= ms->npages)) { 1756afdad616SClaudio Imbrenda slotidx--; 1757afdad616SClaudio Imbrenda ms = slots->memslots + slotidx; 1758afdad616SClaudio Imbrenda ofs = find_next_bit(kvm_second_dirty_bitmap(ms), ms->npages, 0); 1759afdad616SClaudio Imbrenda } 1760afdad616SClaudio Imbrenda return ms->base_gfn + ofs; 1761afdad616SClaudio Imbrenda } 1762afdad616SClaudio Imbrenda 1763afdad616SClaudio Imbrenda static int kvm_s390_get_cmma(struct kvm *kvm, struct kvm_s390_cmma_log *args, 1764afdad616SClaudio Imbrenda u8 *res, unsigned long bufsize) 1765afdad616SClaudio Imbrenda { 1766afdad616SClaudio Imbrenda unsigned long mem_end, cur_gfn, next_gfn, hva, pgstev; 1767afdad616SClaudio Imbrenda struct kvm_memslots *slots = kvm_memslots(kvm); 1768afdad616SClaudio Imbrenda struct kvm_memory_slot *ms; 1769afdad616SClaudio Imbrenda 1770afdad616SClaudio Imbrenda cur_gfn = kvm_s390_next_dirty_cmma(slots, args->start_gfn); 1771afdad616SClaudio Imbrenda ms = gfn_to_memslot(kvm, cur_gfn); 1772afdad616SClaudio Imbrenda args->count = 0; 1773afdad616SClaudio Imbrenda args->start_gfn = cur_gfn; 1774afdad616SClaudio Imbrenda if (!ms) 1775afdad616SClaudio Imbrenda return 0; 1776afdad616SClaudio Imbrenda next_gfn = kvm_s390_next_dirty_cmma(slots, cur_gfn + 1); 1777afdad616SClaudio Imbrenda mem_end = slots->memslots[0].base_gfn + slots->memslots[0].npages; 1778afdad616SClaudio Imbrenda 1779afdad616SClaudio Imbrenda while (args->count < bufsize) { 1780afdad616SClaudio Imbrenda hva = gfn_to_hva(kvm, cur_gfn); 1781afdad616SClaudio Imbrenda if (kvm_is_error_hva(hva)) 1782afdad616SClaudio Imbrenda return 0; 1783afdad616SClaudio Imbrenda /* Decrement only if we actually flipped the bit to 0 */ 1784afdad616SClaudio Imbrenda if (test_and_clear_bit(cur_gfn - ms->base_gfn, kvm_second_dirty_bitmap(ms))) 1785afdad616SClaudio Imbrenda atomic64_dec(&kvm->arch.cmma_dirty_pages); 1786afdad616SClaudio Imbrenda if (get_pgste(kvm->mm, hva, &pgstev) < 0) 1787afdad616SClaudio Imbrenda pgstev = 0; 1788afdad616SClaudio Imbrenda /* Save the value */ 1789afdad616SClaudio Imbrenda res[args->count++] = (pgstev >> 24) & 0x43; 1790afdad616SClaudio Imbrenda /* If the next bit is too far away, stop. */ 1791afdad616SClaudio Imbrenda if (next_gfn > cur_gfn + KVM_S390_MAX_BIT_DISTANCE) 1792afdad616SClaudio Imbrenda return 0; 1793afdad616SClaudio Imbrenda /* If we reached the previous "next", find the next one */ 1794afdad616SClaudio Imbrenda if (cur_gfn == next_gfn) 1795afdad616SClaudio Imbrenda next_gfn = kvm_s390_next_dirty_cmma(slots, cur_gfn + 1); 1796afdad616SClaudio Imbrenda /* Reached the end of memory or of the buffer, stop */ 1797afdad616SClaudio Imbrenda if ((next_gfn >= mem_end) || 1798afdad616SClaudio Imbrenda (next_gfn - args->start_gfn >= bufsize)) 1799afdad616SClaudio Imbrenda return 0; 1800afdad616SClaudio Imbrenda cur_gfn++; 1801afdad616SClaudio Imbrenda /* Reached the end of the current memslot, take the next one. */ 1802afdad616SClaudio Imbrenda if (cur_gfn - ms->base_gfn >= ms->npages) { 1803afdad616SClaudio Imbrenda ms = gfn_to_memslot(kvm, cur_gfn); 1804afdad616SClaudio Imbrenda if (!ms) 1805afdad616SClaudio Imbrenda return 0; 1806afdad616SClaudio Imbrenda } 1807afdad616SClaudio Imbrenda } 1808afdad616SClaudio Imbrenda return 0; 1809afdad616SClaudio Imbrenda } 1810afdad616SClaudio Imbrenda 1811afdad616SClaudio Imbrenda /* 18124036e387SClaudio Imbrenda * This function searches for the next page with dirty CMMA attributes, and 18134036e387SClaudio Imbrenda * saves the attributes in the buffer up to either the end of the buffer or 18144036e387SClaudio Imbrenda * until a block of at least KVM_S390_MAX_BIT_DISTANCE clean bits is found; 18154036e387SClaudio Imbrenda * no trailing clean bytes are saved. 18164036e387SClaudio Imbrenda * In case no dirty bits were found, or if CMMA was not enabled or used, the 18174036e387SClaudio Imbrenda * output buffer will indicate 0 as length. 18184036e387SClaudio Imbrenda */ 18194036e387SClaudio Imbrenda static int kvm_s390_get_cmma_bits(struct kvm *kvm, 18204036e387SClaudio Imbrenda struct kvm_s390_cmma_log *args) 18214036e387SClaudio Imbrenda { 1822afdad616SClaudio Imbrenda unsigned long bufsize; 1823afdad616SClaudio Imbrenda int srcu_idx, peek, ret; 1824afdad616SClaudio Imbrenda u8 *values; 18254036e387SClaudio Imbrenda 1826afdad616SClaudio Imbrenda if (!kvm->arch.use_cmma) 18274036e387SClaudio Imbrenda return -ENXIO; 18284036e387SClaudio Imbrenda /* Invalid/unsupported flags were specified */ 18294036e387SClaudio Imbrenda if (args->flags & ~KVM_S390_CMMA_PEEK) 18304036e387SClaudio Imbrenda return -EINVAL; 18314036e387SClaudio Imbrenda /* Migration mode query, and we are not doing a migration */ 18324036e387SClaudio Imbrenda peek = !!(args->flags & KVM_S390_CMMA_PEEK); 1833afdad616SClaudio Imbrenda if (!peek && !kvm->arch.migration_mode) 18344036e387SClaudio Imbrenda return -EINVAL; 18354036e387SClaudio Imbrenda /* CMMA is disabled or was not used, or the buffer has length zero */ 18364036e387SClaudio Imbrenda bufsize = min(args->count, KVM_S390_CMMA_SIZE_MAX); 1837c9f0a2b8SJanosch Frank if (!bufsize || !kvm->mm->context.uses_cmm) { 18384036e387SClaudio Imbrenda memset(args, 0, sizeof(*args)); 18394036e387SClaudio Imbrenda return 0; 18404036e387SClaudio Imbrenda } 18414036e387SClaudio Imbrenda /* We are not peeking, and there are no dirty pages */ 1842afdad616SClaudio Imbrenda if (!peek && !atomic64_read(&kvm->arch.cmma_dirty_pages)) { 18434036e387SClaudio Imbrenda memset(args, 0, sizeof(*args)); 18444036e387SClaudio Imbrenda return 0; 18454036e387SClaudio Imbrenda } 18464036e387SClaudio Imbrenda 1847afdad616SClaudio Imbrenda values = vmalloc(bufsize); 1848afdad616SClaudio Imbrenda if (!values) 18494036e387SClaudio Imbrenda return -ENOMEM; 18504036e387SClaudio Imbrenda 18514036e387SClaudio Imbrenda down_read(&kvm->mm->mmap_sem); 18524036e387SClaudio Imbrenda srcu_idx = srcu_read_lock(&kvm->srcu); 1853afdad616SClaudio Imbrenda if (peek) 1854afdad616SClaudio Imbrenda ret = kvm_s390_peek_cmma(kvm, args, values, bufsize); 1855afdad616SClaudio Imbrenda else 1856afdad616SClaudio Imbrenda ret = kvm_s390_get_cmma(kvm, args, values, bufsize); 18574036e387SClaudio Imbrenda srcu_read_unlock(&kvm->srcu, srcu_idx); 18584036e387SClaudio Imbrenda up_read(&kvm->mm->mmap_sem); 18594036e387SClaudio Imbrenda 1860afdad616SClaudio Imbrenda if (kvm->arch.migration_mode) 1861afdad616SClaudio Imbrenda args->remaining = atomic64_read(&kvm->arch.cmma_dirty_pages); 1862afdad616SClaudio Imbrenda else 1863afdad616SClaudio Imbrenda args->remaining = 0; 18644036e387SClaudio Imbrenda 1865afdad616SClaudio Imbrenda if (copy_to_user((void __user *)args->values, values, args->count)) 1866afdad616SClaudio Imbrenda ret = -EFAULT; 1867afdad616SClaudio Imbrenda 1868afdad616SClaudio Imbrenda vfree(values); 1869afdad616SClaudio Imbrenda return ret; 18704036e387SClaudio Imbrenda } 18714036e387SClaudio Imbrenda 18724036e387SClaudio Imbrenda /* 18734036e387SClaudio Imbrenda * This function sets the CMMA attributes for the given pages. If the input 18744036e387SClaudio Imbrenda * buffer has zero length, no action is taken, otherwise the attributes are 1875c9f0a2b8SJanosch Frank * set and the mm->context.uses_cmm flag is set. 18764036e387SClaudio Imbrenda */ 18774036e387SClaudio Imbrenda static int kvm_s390_set_cmma_bits(struct kvm *kvm, 18784036e387SClaudio Imbrenda const struct kvm_s390_cmma_log *args) 18794036e387SClaudio Imbrenda { 18804036e387SClaudio Imbrenda unsigned long hva, mask, pgstev, i; 18814036e387SClaudio Imbrenda uint8_t *bits; 18824036e387SClaudio Imbrenda int srcu_idx, r = 0; 18834036e387SClaudio Imbrenda 18844036e387SClaudio Imbrenda mask = args->mask; 18854036e387SClaudio Imbrenda 18864036e387SClaudio Imbrenda if (!kvm->arch.use_cmma) 18874036e387SClaudio Imbrenda return -ENXIO; 18884036e387SClaudio Imbrenda /* invalid/unsupported flags */ 18894036e387SClaudio Imbrenda if (args->flags != 0) 18904036e387SClaudio Imbrenda return -EINVAL; 18914036e387SClaudio Imbrenda /* Enforce sane limit on memory allocation */ 18924036e387SClaudio Imbrenda if (args->count > KVM_S390_CMMA_SIZE_MAX) 18934036e387SClaudio Imbrenda return -EINVAL; 18944036e387SClaudio Imbrenda /* Nothing to do */ 18954036e387SClaudio Imbrenda if (args->count == 0) 18964036e387SClaudio Imbrenda return 0; 18974036e387SClaudio Imbrenda 189842bc47b3SKees Cook bits = vmalloc(array_size(sizeof(*bits), args->count)); 18994036e387SClaudio Imbrenda if (!bits) 19004036e387SClaudio Imbrenda return -ENOMEM; 19014036e387SClaudio Imbrenda 19024036e387SClaudio Imbrenda r = copy_from_user(bits, (void __user *)args->values, args->count); 19034036e387SClaudio Imbrenda if (r) { 19044036e387SClaudio Imbrenda r = -EFAULT; 19054036e387SClaudio Imbrenda goto out; 19064036e387SClaudio Imbrenda } 19074036e387SClaudio Imbrenda 19084036e387SClaudio Imbrenda down_read(&kvm->mm->mmap_sem); 19094036e387SClaudio Imbrenda srcu_idx = srcu_read_lock(&kvm->srcu); 19104036e387SClaudio Imbrenda for (i = 0; i < args->count; i++) { 19114036e387SClaudio Imbrenda hva = gfn_to_hva(kvm, args->start_gfn + i); 19124036e387SClaudio Imbrenda if (kvm_is_error_hva(hva)) { 19134036e387SClaudio Imbrenda r = -EFAULT; 19144036e387SClaudio Imbrenda break; 19154036e387SClaudio Imbrenda } 19164036e387SClaudio Imbrenda 19174036e387SClaudio Imbrenda pgstev = bits[i]; 19184036e387SClaudio Imbrenda pgstev = pgstev << 24; 19191bab1c02SClaudio Imbrenda mask &= _PGSTE_GPS_USAGE_MASK | _PGSTE_GPS_NODAT; 19204036e387SClaudio Imbrenda set_pgste_bits(kvm->mm, hva, mask, pgstev); 19214036e387SClaudio Imbrenda } 19224036e387SClaudio Imbrenda srcu_read_unlock(&kvm->srcu, srcu_idx); 19234036e387SClaudio Imbrenda up_read(&kvm->mm->mmap_sem); 19244036e387SClaudio Imbrenda 1925c9f0a2b8SJanosch Frank if (!kvm->mm->context.uses_cmm) { 19264036e387SClaudio Imbrenda down_write(&kvm->mm->mmap_sem); 1927c9f0a2b8SJanosch Frank kvm->mm->context.uses_cmm = 1; 19284036e387SClaudio Imbrenda up_write(&kvm->mm->mmap_sem); 19294036e387SClaudio Imbrenda } 19304036e387SClaudio Imbrenda out: 19314036e387SClaudio Imbrenda vfree(bits); 19324036e387SClaudio Imbrenda return r; 19334036e387SClaudio Imbrenda } 19344036e387SClaudio Imbrenda 1935b0c632dbSHeiko Carstens long kvm_arch_vm_ioctl(struct file *filp, 1936b0c632dbSHeiko Carstens unsigned int ioctl, unsigned long arg) 1937b0c632dbSHeiko Carstens { 1938b0c632dbSHeiko Carstens struct kvm *kvm = filp->private_data; 1939b0c632dbSHeiko Carstens void __user *argp = (void __user *)arg; 1940f2061656SDominik Dingel struct kvm_device_attr attr; 1941b0c632dbSHeiko Carstens int r; 1942b0c632dbSHeiko Carstens 1943b0c632dbSHeiko Carstens switch (ioctl) { 1944ba5c1e9bSCarsten Otte case KVM_S390_INTERRUPT: { 1945ba5c1e9bSCarsten Otte struct kvm_s390_interrupt s390int; 1946ba5c1e9bSCarsten Otte 1947ba5c1e9bSCarsten Otte r = -EFAULT; 1948ba5c1e9bSCarsten Otte if (copy_from_user(&s390int, argp, sizeof(s390int))) 1949ba5c1e9bSCarsten Otte break; 1950ba5c1e9bSCarsten Otte r = kvm_s390_inject_vm(kvm, &s390int); 1951ba5c1e9bSCarsten Otte break; 1952ba5c1e9bSCarsten Otte } 195384223598SCornelia Huck case KVM_CREATE_IRQCHIP: { 195484223598SCornelia Huck struct kvm_irq_routing_entry routing; 195584223598SCornelia Huck 195684223598SCornelia Huck r = -EINVAL; 195784223598SCornelia Huck if (kvm->arch.use_irqchip) { 195884223598SCornelia Huck /* Set up dummy routing. */ 195984223598SCornelia Huck memset(&routing, 0, sizeof(routing)); 1960152b2839SNicholas Krause r = kvm_set_irq_routing(kvm, &routing, 0, 0); 196184223598SCornelia Huck } 196284223598SCornelia Huck break; 196384223598SCornelia Huck } 1964f2061656SDominik Dingel case KVM_SET_DEVICE_ATTR: { 1965f2061656SDominik Dingel r = -EFAULT; 1966f2061656SDominik Dingel if (copy_from_user(&attr, (void __user *)arg, sizeof(attr))) 1967f2061656SDominik Dingel break; 1968f2061656SDominik Dingel r = kvm_s390_vm_set_attr(kvm, &attr); 1969f2061656SDominik Dingel break; 1970f2061656SDominik Dingel } 1971f2061656SDominik Dingel case KVM_GET_DEVICE_ATTR: { 1972f2061656SDominik Dingel r = -EFAULT; 1973f2061656SDominik Dingel if (copy_from_user(&attr, (void __user *)arg, sizeof(attr))) 1974f2061656SDominik Dingel break; 1975f2061656SDominik Dingel r = kvm_s390_vm_get_attr(kvm, &attr); 1976f2061656SDominik Dingel break; 1977f2061656SDominik Dingel } 1978f2061656SDominik Dingel case KVM_HAS_DEVICE_ATTR: { 1979f2061656SDominik Dingel r = -EFAULT; 1980f2061656SDominik Dingel if (copy_from_user(&attr, (void __user *)arg, sizeof(attr))) 1981f2061656SDominik Dingel break; 1982f2061656SDominik Dingel r = kvm_s390_vm_has_attr(kvm, &attr); 1983f2061656SDominik Dingel break; 1984f2061656SDominik Dingel } 198530ee2a98SJason J. Herne case KVM_S390_GET_SKEYS: { 198630ee2a98SJason J. Herne struct kvm_s390_skeys args; 198730ee2a98SJason J. Herne 198830ee2a98SJason J. Herne r = -EFAULT; 198930ee2a98SJason J. Herne if (copy_from_user(&args, argp, 199030ee2a98SJason J. Herne sizeof(struct kvm_s390_skeys))) 199130ee2a98SJason J. Herne break; 199230ee2a98SJason J. Herne r = kvm_s390_get_skeys(kvm, &args); 199330ee2a98SJason J. Herne break; 199430ee2a98SJason J. Herne } 199530ee2a98SJason J. Herne case KVM_S390_SET_SKEYS: { 199630ee2a98SJason J. Herne struct kvm_s390_skeys args; 199730ee2a98SJason J. Herne 199830ee2a98SJason J. Herne r = -EFAULT; 199930ee2a98SJason J. Herne if (copy_from_user(&args, argp, 200030ee2a98SJason J. Herne sizeof(struct kvm_s390_skeys))) 200130ee2a98SJason J. Herne break; 200230ee2a98SJason J. Herne r = kvm_s390_set_skeys(kvm, &args); 200330ee2a98SJason J. Herne break; 200430ee2a98SJason J. Herne } 20054036e387SClaudio Imbrenda case KVM_S390_GET_CMMA_BITS: { 20064036e387SClaudio Imbrenda struct kvm_s390_cmma_log args; 20074036e387SClaudio Imbrenda 20084036e387SClaudio Imbrenda r = -EFAULT; 20094036e387SClaudio Imbrenda if (copy_from_user(&args, argp, sizeof(args))) 20104036e387SClaudio Imbrenda break; 20111de1ea7eSChristian Borntraeger mutex_lock(&kvm->slots_lock); 20124036e387SClaudio Imbrenda r = kvm_s390_get_cmma_bits(kvm, &args); 20131de1ea7eSChristian Borntraeger mutex_unlock(&kvm->slots_lock); 20144036e387SClaudio Imbrenda if (!r) { 20154036e387SClaudio Imbrenda r = copy_to_user(argp, &args, sizeof(args)); 20164036e387SClaudio Imbrenda if (r) 20174036e387SClaudio Imbrenda r = -EFAULT; 20184036e387SClaudio Imbrenda } 20194036e387SClaudio Imbrenda break; 20204036e387SClaudio Imbrenda } 20214036e387SClaudio Imbrenda case KVM_S390_SET_CMMA_BITS: { 20224036e387SClaudio Imbrenda struct kvm_s390_cmma_log args; 20234036e387SClaudio Imbrenda 20244036e387SClaudio Imbrenda r = -EFAULT; 20254036e387SClaudio Imbrenda if (copy_from_user(&args, argp, sizeof(args))) 20264036e387SClaudio Imbrenda break; 20271de1ea7eSChristian Borntraeger mutex_lock(&kvm->slots_lock); 20284036e387SClaudio Imbrenda r = kvm_s390_set_cmma_bits(kvm, &args); 20291de1ea7eSChristian Borntraeger mutex_unlock(&kvm->slots_lock); 20304036e387SClaudio Imbrenda break; 20314036e387SClaudio Imbrenda } 2032b0c632dbSHeiko Carstens default: 2033367e1319SAvi Kivity r = -ENOTTY; 2034b0c632dbSHeiko Carstens } 2035b0c632dbSHeiko Carstens 2036b0c632dbSHeiko Carstens return r; 2037b0c632dbSHeiko Carstens } 2038b0c632dbSHeiko Carstens 203945c9b47cSTony Krowiak static int kvm_s390_apxa_installed(void) 204045c9b47cSTony Krowiak { 2041e585b24aSTony Krowiak struct ap_config_info info; 204245c9b47cSTony Krowiak 2043e585b24aSTony Krowiak if (ap_instructions_available()) { 2044e585b24aSTony Krowiak if (ap_qci(&info) == 0) 2045e585b24aSTony Krowiak return info.apxa; 204645c9b47cSTony Krowiak } 204745c9b47cSTony Krowiak 204845c9b47cSTony Krowiak return 0; 204945c9b47cSTony Krowiak } 205045c9b47cSTony Krowiak 2051e585b24aSTony Krowiak /* 2052e585b24aSTony Krowiak * The format of the crypto control block (CRYCB) is specified in the 3 low 2053e585b24aSTony Krowiak * order bits of the CRYCB designation (CRYCBD) field as follows: 2054e585b24aSTony Krowiak * Format 0: Neither the message security assist extension 3 (MSAX3) nor the 2055e585b24aSTony Krowiak * AP extended addressing (APXA) facility are installed. 2056e585b24aSTony Krowiak * Format 1: The APXA facility is not installed but the MSAX3 facility is. 2057e585b24aSTony Krowiak * Format 2: Both the APXA and MSAX3 facilities are installed 2058e585b24aSTony Krowiak */ 205945c9b47cSTony Krowiak static void kvm_s390_set_crycb_format(struct kvm *kvm) 206045c9b47cSTony Krowiak { 206145c9b47cSTony Krowiak kvm->arch.crypto.crycbd = (__u32)(unsigned long) kvm->arch.crypto.crycb; 206245c9b47cSTony Krowiak 2063e585b24aSTony Krowiak /* Clear the CRYCB format bits - i.e., set format 0 by default */ 2064e585b24aSTony Krowiak kvm->arch.crypto.crycbd &= ~(CRYCB_FORMAT_MASK); 2065e585b24aSTony Krowiak 2066e585b24aSTony Krowiak /* Check whether MSAX3 is installed */ 2067e585b24aSTony Krowiak if (!test_kvm_facility(kvm, 76)) 2068e585b24aSTony Krowiak return; 2069e585b24aSTony Krowiak 207045c9b47cSTony Krowiak if (kvm_s390_apxa_installed()) 207145c9b47cSTony Krowiak kvm->arch.crypto.crycbd |= CRYCB_FORMAT2; 207245c9b47cSTony Krowiak else 207345c9b47cSTony Krowiak kvm->arch.crypto.crycbd |= CRYCB_FORMAT1; 207445c9b47cSTony Krowiak } 207545c9b47cSTony Krowiak 20760e237e44SPierre Morel void kvm_arch_crypto_set_masks(struct kvm *kvm, unsigned long *apm, 20770e237e44SPierre Morel unsigned long *aqm, unsigned long *adm) 20780e237e44SPierre Morel { 20790e237e44SPierre Morel struct kvm_s390_crypto_cb *crycb = kvm->arch.crypto.crycb; 20800e237e44SPierre Morel 20810e237e44SPierre Morel mutex_lock(&kvm->lock); 20820e237e44SPierre Morel kvm_s390_vcpu_block_all(kvm); 20830e237e44SPierre Morel 20840e237e44SPierre Morel switch (kvm->arch.crypto.crycbd & CRYCB_FORMAT_MASK) { 20850e237e44SPierre Morel case CRYCB_FORMAT2: /* APCB1 use 256 bits */ 20860e237e44SPierre Morel memcpy(crycb->apcb1.apm, apm, 32); 20870e237e44SPierre Morel VM_EVENT(kvm, 3, "SET CRYCB: apm %016lx %016lx %016lx %016lx", 20880e237e44SPierre Morel apm[0], apm[1], apm[2], apm[3]); 20890e237e44SPierre Morel memcpy(crycb->apcb1.aqm, aqm, 32); 20900e237e44SPierre Morel VM_EVENT(kvm, 3, "SET CRYCB: aqm %016lx %016lx %016lx %016lx", 20910e237e44SPierre Morel aqm[0], aqm[1], aqm[2], aqm[3]); 20920e237e44SPierre Morel memcpy(crycb->apcb1.adm, adm, 32); 20930e237e44SPierre Morel VM_EVENT(kvm, 3, "SET CRYCB: adm %016lx %016lx %016lx %016lx", 20940e237e44SPierre Morel adm[0], adm[1], adm[2], adm[3]); 20950e237e44SPierre Morel break; 20960e237e44SPierre Morel case CRYCB_FORMAT1: 20970e237e44SPierre Morel case CRYCB_FORMAT0: /* Fall through both use APCB0 */ 20980e237e44SPierre Morel memcpy(crycb->apcb0.apm, apm, 8); 20990e237e44SPierre Morel memcpy(crycb->apcb0.aqm, aqm, 2); 21000e237e44SPierre Morel memcpy(crycb->apcb0.adm, adm, 2); 21010e237e44SPierre Morel VM_EVENT(kvm, 3, "SET CRYCB: apm %016lx aqm %04x adm %04x", 21020e237e44SPierre Morel apm[0], *((unsigned short *)aqm), 21030e237e44SPierre Morel *((unsigned short *)adm)); 21040e237e44SPierre Morel break; 21050e237e44SPierre Morel default: /* Can not happen */ 21060e237e44SPierre Morel break; 21070e237e44SPierre Morel } 21080e237e44SPierre Morel 21090e237e44SPierre Morel /* recreate the shadow crycb for each vcpu */ 21100e237e44SPierre Morel kvm_s390_sync_request_broadcast(kvm, KVM_REQ_VSIE_RESTART); 21110e237e44SPierre Morel kvm_s390_vcpu_unblock_all(kvm); 21120e237e44SPierre Morel mutex_unlock(&kvm->lock); 21130e237e44SPierre Morel } 21140e237e44SPierre Morel EXPORT_SYMBOL_GPL(kvm_arch_crypto_set_masks); 21150e237e44SPierre Morel 211642104598STony Krowiak void kvm_arch_crypto_clear_masks(struct kvm *kvm) 211742104598STony Krowiak { 211842104598STony Krowiak mutex_lock(&kvm->lock); 211942104598STony Krowiak kvm_s390_vcpu_block_all(kvm); 212042104598STony Krowiak 212142104598STony Krowiak memset(&kvm->arch.crypto.crycb->apcb0, 0, 212242104598STony Krowiak sizeof(kvm->arch.crypto.crycb->apcb0)); 212342104598STony Krowiak memset(&kvm->arch.crypto.crycb->apcb1, 0, 212442104598STony Krowiak sizeof(kvm->arch.crypto.crycb->apcb1)); 212542104598STony Krowiak 21260e237e44SPierre Morel VM_EVENT(kvm, 3, "%s", "CLR CRYCB:"); 21276cc571b1SPierre Morel /* recreate the shadow crycb for each vcpu */ 21286cc571b1SPierre Morel kvm_s390_sync_request_broadcast(kvm, KVM_REQ_VSIE_RESTART); 212942104598STony Krowiak kvm_s390_vcpu_unblock_all(kvm); 213042104598STony Krowiak mutex_unlock(&kvm->lock); 213142104598STony Krowiak } 213242104598STony Krowiak EXPORT_SYMBOL_GPL(kvm_arch_crypto_clear_masks); 213342104598STony Krowiak 21349bb0ec09SDavid Hildenbrand static u64 kvm_s390_get_initial_cpuid(void) 21359d8d5786SMichael Mueller { 21369bb0ec09SDavid Hildenbrand struct cpuid cpuid; 21379bb0ec09SDavid Hildenbrand 21389bb0ec09SDavid Hildenbrand get_cpu_id(&cpuid); 21399bb0ec09SDavid Hildenbrand cpuid.version = 0xff; 21409bb0ec09SDavid Hildenbrand return *((u64 *) &cpuid); 21419d8d5786SMichael Mueller } 21429d8d5786SMichael Mueller 2143c54f0d6aSDavid Hildenbrand static void kvm_s390_crypto_init(struct kvm *kvm) 21445102ee87STony Krowiak { 2145c54f0d6aSDavid Hildenbrand kvm->arch.crypto.crycb = &kvm->arch.sie_page2->crycb; 214645c9b47cSTony Krowiak kvm_s390_set_crycb_format(kvm); 21475102ee87STony Krowiak 2148e585b24aSTony Krowiak if (!test_kvm_facility(kvm, 76)) 2149e585b24aSTony Krowiak return; 2150e585b24aSTony Krowiak 2151ed6f76b4STony Krowiak /* Enable AES/DEA protected key functions by default */ 2152ed6f76b4STony Krowiak kvm->arch.crypto.aes_kw = 1; 2153ed6f76b4STony Krowiak kvm->arch.crypto.dea_kw = 1; 2154ed6f76b4STony Krowiak get_random_bytes(kvm->arch.crypto.crycb->aes_wrapping_key_mask, 2155ed6f76b4STony Krowiak sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask)); 2156ed6f76b4STony Krowiak get_random_bytes(kvm->arch.crypto.crycb->dea_wrapping_key_mask, 2157ed6f76b4STony Krowiak sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask)); 21585102ee87STony Krowiak } 21595102ee87STony Krowiak 21607d43bafcSEugene (jno) Dvurechenski static void sca_dispose(struct kvm *kvm) 21617d43bafcSEugene (jno) Dvurechenski { 21627d43bafcSEugene (jno) Dvurechenski if (kvm->arch.use_esca) 21635e044315SEugene (jno) Dvurechenski free_pages_exact(kvm->arch.sca, sizeof(struct esca_block)); 21647d43bafcSEugene (jno) Dvurechenski else 21657d43bafcSEugene (jno) Dvurechenski free_page((unsigned long)(kvm->arch.sca)); 21667d43bafcSEugene (jno) Dvurechenski kvm->arch.sca = NULL; 21677d43bafcSEugene (jno) Dvurechenski } 21687d43bafcSEugene (jno) Dvurechenski 2169e08b9637SCarsten Otte int kvm_arch_init_vm(struct kvm *kvm, unsigned long type) 2170b0c632dbSHeiko Carstens { 217176a6dd72SDavid Hildenbrand gfp_t alloc_flags = GFP_KERNEL; 21729d8d5786SMichael Mueller int i, rc; 2173b0c632dbSHeiko Carstens char debug_name[16]; 2174f6c137ffSChristian Borntraeger static unsigned long sca_offset; 2175b0c632dbSHeiko Carstens 2176e08b9637SCarsten Otte rc = -EINVAL; 2177e08b9637SCarsten Otte #ifdef CONFIG_KVM_S390_UCONTROL 2178e08b9637SCarsten Otte if (type & ~KVM_VM_S390_UCONTROL) 2179e08b9637SCarsten Otte goto out_err; 2180e08b9637SCarsten Otte if ((type & KVM_VM_S390_UCONTROL) && (!capable(CAP_SYS_ADMIN))) 2181e08b9637SCarsten Otte goto out_err; 2182e08b9637SCarsten Otte #else 2183e08b9637SCarsten Otte if (type) 2184e08b9637SCarsten Otte goto out_err; 2185e08b9637SCarsten Otte #endif 2186e08b9637SCarsten Otte 2187b0c632dbSHeiko Carstens rc = s390_enable_sie(); 2188b0c632dbSHeiko Carstens if (rc) 2189d89f5effSJan Kiszka goto out_err; 2190b0c632dbSHeiko Carstens 2191b290411aSCarsten Otte rc = -ENOMEM; 2192b290411aSCarsten Otte 219376a6dd72SDavid Hildenbrand if (!sclp.has_64bscao) 219476a6dd72SDavid Hildenbrand alloc_flags |= GFP_DMA; 21955e044315SEugene (jno) Dvurechenski rwlock_init(&kvm->arch.sca_lock); 21969ac96d75SDavid Hildenbrand /* start with basic SCA */ 219776a6dd72SDavid Hildenbrand kvm->arch.sca = (struct bsca_block *) get_zeroed_page(alloc_flags); 2198b0c632dbSHeiko Carstens if (!kvm->arch.sca) 2199d89f5effSJan Kiszka goto out_err; 2200f6c137ffSChristian Borntraeger spin_lock(&kvm_lock); 2201c5c2c393SDavid Hildenbrand sca_offset += 16; 2202bc784cceSEugene (jno) Dvurechenski if (sca_offset + sizeof(struct bsca_block) > PAGE_SIZE) 2203c5c2c393SDavid Hildenbrand sca_offset = 0; 2204bc784cceSEugene (jno) Dvurechenski kvm->arch.sca = (struct bsca_block *) 2205bc784cceSEugene (jno) Dvurechenski ((char *) kvm->arch.sca + sca_offset); 2206f6c137ffSChristian Borntraeger spin_unlock(&kvm_lock); 2207b0c632dbSHeiko Carstens 2208b0c632dbSHeiko Carstens sprintf(debug_name, "kvm-%u", current->pid); 2209b0c632dbSHeiko Carstens 22101cb9cf72SChristian Borntraeger kvm->arch.dbf = debug_register(debug_name, 32, 1, 7 * sizeof(long)); 2211b0c632dbSHeiko Carstens if (!kvm->arch.dbf) 221240f5b735SDominik Dingel goto out_err; 2213b0c632dbSHeiko Carstens 221419114bebSMichael Mueller BUILD_BUG_ON(sizeof(struct sie_page2) != 4096); 2215c54f0d6aSDavid Hildenbrand kvm->arch.sie_page2 = 2216c54f0d6aSDavid Hildenbrand (struct sie_page2 *) get_zeroed_page(GFP_KERNEL | GFP_DMA); 2217c54f0d6aSDavid Hildenbrand if (!kvm->arch.sie_page2) 221840f5b735SDominik Dingel goto out_err; 22199d8d5786SMichael Mueller 222025c84dbaSMichael Mueller kvm->arch.sie_page2->kvm = kvm; 2221c54f0d6aSDavid Hildenbrand kvm->arch.model.fac_list = kvm->arch.sie_page2->fac_list; 2222c3b9e3e1SChristian Borntraeger 2223c3b9e3e1SChristian Borntraeger for (i = 0; i < kvm_s390_fac_size(); i++) { 2224c3b9e3e1SChristian Borntraeger kvm->arch.model.fac_mask[i] = S390_lowcore.stfle_fac_list[i] & 2225c3b9e3e1SChristian Borntraeger (kvm_s390_fac_base[i] | 2226c3b9e3e1SChristian Borntraeger kvm_s390_fac_ext[i]); 2227c3b9e3e1SChristian Borntraeger kvm->arch.model.fac_list[i] = S390_lowcore.stfle_fac_list[i] & 2228c3b9e3e1SChristian Borntraeger kvm_s390_fac_base[i]; 2229c3b9e3e1SChristian Borntraeger } 2230981467c9SMichael Mueller 22311935222dSDavid Hildenbrand /* we are always in czam mode - even on pre z14 machines */ 22321935222dSDavid Hildenbrand set_kvm_facility(kvm->arch.model.fac_mask, 138); 22331935222dSDavid Hildenbrand set_kvm_facility(kvm->arch.model.fac_list, 138); 22341935222dSDavid Hildenbrand /* we emulate STHYI in kvm */ 223595ca2cb5SJanosch Frank set_kvm_facility(kvm->arch.model.fac_mask, 74); 223695ca2cb5SJanosch Frank set_kvm_facility(kvm->arch.model.fac_list, 74); 22371bab1c02SClaudio Imbrenda if (MACHINE_HAS_TLB_GUEST) { 22381bab1c02SClaudio Imbrenda set_kvm_facility(kvm->arch.model.fac_mask, 147); 22391bab1c02SClaudio Imbrenda set_kvm_facility(kvm->arch.model.fac_list, 147); 22401bab1c02SClaudio Imbrenda } 224195ca2cb5SJanosch Frank 22429bb0ec09SDavid Hildenbrand kvm->arch.model.cpuid = kvm_s390_get_initial_cpuid(); 224337c5f6c8SDavid Hildenbrand kvm->arch.model.ibc = sclp.ibc & 0x0fff; 22449d8d5786SMichael Mueller 2245c54f0d6aSDavid Hildenbrand kvm_s390_crypto_init(kvm); 22465102ee87STony Krowiak 224751978393SFei Li mutex_init(&kvm->arch.float_int.ais_lock); 2248ba5c1e9bSCarsten Otte spin_lock_init(&kvm->arch.float_int.lock); 22496d3da241SJens Freimann for (i = 0; i < FIRQ_LIST_COUNT; i++) 22506d3da241SJens Freimann INIT_LIST_HEAD(&kvm->arch.float_int.lists[i]); 22518a242234SHeiko Carstens init_waitqueue_head(&kvm->arch.ipte_wq); 2252a6b7e459SThomas Huth mutex_init(&kvm->arch.ipte_mutex); 2253ba5c1e9bSCarsten Otte 2254b0c632dbSHeiko Carstens debug_register_view(kvm->arch.dbf, &debug_sprintf_view); 225578f26131SChristian Borntraeger VM_EVENT(kvm, 3, "vm created with type %lu", type); 2256b0c632dbSHeiko Carstens 2257e08b9637SCarsten Otte if (type & KVM_VM_S390_UCONTROL) { 2258e08b9637SCarsten Otte kvm->arch.gmap = NULL; 2259a3a92c31SDominik Dingel kvm->arch.mem_limit = KVM_S390_NO_MEM_LIMIT; 2260e08b9637SCarsten Otte } else { 226132e6b236SGuenther Hutzl if (sclp.hamax == U64_MAX) 2262ee71d16dSMartin Schwidefsky kvm->arch.mem_limit = TASK_SIZE_MAX; 226332e6b236SGuenther Hutzl else 2264ee71d16dSMartin Schwidefsky kvm->arch.mem_limit = min_t(unsigned long, TASK_SIZE_MAX, 226532e6b236SGuenther Hutzl sclp.hamax + 1); 22666ea427bbSMartin Schwidefsky kvm->arch.gmap = gmap_create(current->mm, kvm->arch.mem_limit - 1); 2267598841caSCarsten Otte if (!kvm->arch.gmap) 226840f5b735SDominik Dingel goto out_err; 22692c70fe44SChristian Borntraeger kvm->arch.gmap->private = kvm; 227024eb3a82SDominik Dingel kvm->arch.gmap->pfault_enabled = 0; 2271e08b9637SCarsten Otte } 2272fa6b7fe9SCornelia Huck 2273c9f0a2b8SJanosch Frank kvm->arch.use_pfmfi = sclp.has_pfmfi; 227455531b74SJanosch Frank kvm->arch.use_skf = sclp.has_skey; 22758ad35755SDavid Hildenbrand spin_lock_init(&kvm->arch.start_stop_lock); 2276a3508fbeSDavid Hildenbrand kvm_s390_vsie_init(kvm); 2277d7c5cb01SMichael Mueller kvm_s390_gisa_init(kvm); 22788335713aSChristian Borntraeger KVM_EVENT(3, "vm 0x%pK created by pid %u", kvm, current->pid); 22798ad35755SDavid Hildenbrand 2280d89f5effSJan Kiszka return 0; 2281d89f5effSJan Kiszka out_err: 2282c54f0d6aSDavid Hildenbrand free_page((unsigned long)kvm->arch.sie_page2); 228340f5b735SDominik Dingel debug_unregister(kvm->arch.dbf); 22847d43bafcSEugene (jno) Dvurechenski sca_dispose(kvm); 228578f26131SChristian Borntraeger KVM_EVENT(3, "creation of vm failed: %d", rc); 2286d89f5effSJan Kiszka return rc; 2287b0c632dbSHeiko Carstens } 2288b0c632dbSHeiko Carstens 2289235539b4SLuiz Capitulino bool kvm_arch_has_vcpu_debugfs(void) 2290235539b4SLuiz Capitulino { 2291235539b4SLuiz Capitulino return false; 2292235539b4SLuiz Capitulino } 2293235539b4SLuiz Capitulino 2294235539b4SLuiz Capitulino int kvm_arch_create_vcpu_debugfs(struct kvm_vcpu *vcpu) 2295235539b4SLuiz Capitulino { 2296235539b4SLuiz Capitulino return 0; 2297235539b4SLuiz Capitulino } 2298235539b4SLuiz Capitulino 2299d329c035SChristian Borntraeger void kvm_arch_vcpu_destroy(struct kvm_vcpu *vcpu) 2300d329c035SChristian Borntraeger { 2301d329c035SChristian Borntraeger VCPU_EVENT(vcpu, 3, "%s", "free cpu"); 2302ade38c31SCornelia Huck trace_kvm_s390_destroy_vcpu(vcpu->vcpu_id); 230367335e63SChristian Borntraeger kvm_s390_clear_local_irqs(vcpu); 23043c038e6bSDominik Dingel kvm_clear_async_pf_completion_queue(vcpu); 2305bc784cceSEugene (jno) Dvurechenski if (!kvm_is_ucontrol(vcpu->kvm)) 2306a6e2f683SEugene (jno) Dvurechenski sca_del_vcpu(vcpu); 230727e0393fSCarsten Otte 230827e0393fSCarsten Otte if (kvm_is_ucontrol(vcpu->kvm)) 23096ea427bbSMartin Schwidefsky gmap_remove(vcpu->arch.gmap); 231027e0393fSCarsten Otte 2311e6db1d61SDominik Dingel if (vcpu->kvm->arch.use_cmma) 2312b31605c1SDominik Dingel kvm_s390_vcpu_unsetup_cmma(vcpu); 2313d329c035SChristian Borntraeger free_page((unsigned long)(vcpu->arch.sie_block)); 2314b31288faSKonstantin Weitz 23156692cef3SChristian Borntraeger kvm_vcpu_uninit(vcpu); 2316b110feafSMichael Mueller kmem_cache_free(kvm_vcpu_cache, vcpu); 2317d329c035SChristian Borntraeger } 2318d329c035SChristian Borntraeger 2319d329c035SChristian Borntraeger static void kvm_free_vcpus(struct kvm *kvm) 2320d329c035SChristian Borntraeger { 2321d329c035SChristian Borntraeger unsigned int i; 2322988a2caeSGleb Natapov struct kvm_vcpu *vcpu; 2323d329c035SChristian Borntraeger 2324988a2caeSGleb Natapov kvm_for_each_vcpu(i, vcpu, kvm) 2325988a2caeSGleb Natapov kvm_arch_vcpu_destroy(vcpu); 2326988a2caeSGleb Natapov 2327988a2caeSGleb Natapov mutex_lock(&kvm->lock); 2328988a2caeSGleb Natapov for (i = 0; i < atomic_read(&kvm->online_vcpus); i++) 2329d329c035SChristian Borntraeger kvm->vcpus[i] = NULL; 2330988a2caeSGleb Natapov 2331988a2caeSGleb Natapov atomic_set(&kvm->online_vcpus, 0); 2332988a2caeSGleb Natapov mutex_unlock(&kvm->lock); 2333d329c035SChristian Borntraeger } 2334d329c035SChristian Borntraeger 2335b0c632dbSHeiko Carstens void kvm_arch_destroy_vm(struct kvm *kvm) 2336b0c632dbSHeiko Carstens { 2337d329c035SChristian Borntraeger kvm_free_vcpus(kvm); 23387d43bafcSEugene (jno) Dvurechenski sca_dispose(kvm); 2339d329c035SChristian Borntraeger debug_unregister(kvm->arch.dbf); 2340d7c5cb01SMichael Mueller kvm_s390_gisa_destroy(kvm); 2341c54f0d6aSDavid Hildenbrand free_page((unsigned long)kvm->arch.sie_page2); 234227e0393fSCarsten Otte if (!kvm_is_ucontrol(kvm)) 23436ea427bbSMartin Schwidefsky gmap_remove(kvm->arch.gmap); 2344841b91c5SCornelia Huck kvm_s390_destroy_adapters(kvm); 234567335e63SChristian Borntraeger kvm_s390_clear_float_irqs(kvm); 2346a3508fbeSDavid Hildenbrand kvm_s390_vsie_destroy(kvm); 23478335713aSChristian Borntraeger KVM_EVENT(3, "vm 0x%pK destroyed", kvm); 2348b0c632dbSHeiko Carstens } 2349b0c632dbSHeiko Carstens 2350b0c632dbSHeiko Carstens /* Section: vcpu related */ 2351dafd032aSDominik Dingel static int __kvm_ucontrol_vcpu_init(struct kvm_vcpu *vcpu) 2352b0c632dbSHeiko Carstens { 23536ea427bbSMartin Schwidefsky vcpu->arch.gmap = gmap_create(current->mm, -1UL); 235427e0393fSCarsten Otte if (!vcpu->arch.gmap) 235527e0393fSCarsten Otte return -ENOMEM; 23562c70fe44SChristian Borntraeger vcpu->arch.gmap->private = vcpu->kvm; 2357dafd032aSDominik Dingel 235827e0393fSCarsten Otte return 0; 235927e0393fSCarsten Otte } 236027e0393fSCarsten Otte 2361a6e2f683SEugene (jno) Dvurechenski static void sca_del_vcpu(struct kvm_vcpu *vcpu) 2362a6e2f683SEugene (jno) Dvurechenski { 2363a6940674SDavid Hildenbrand if (!kvm_s390_use_sca_entries()) 2364a6940674SDavid Hildenbrand return; 23655e044315SEugene (jno) Dvurechenski read_lock(&vcpu->kvm->arch.sca_lock); 23667d43bafcSEugene (jno) Dvurechenski if (vcpu->kvm->arch.use_esca) { 23677d43bafcSEugene (jno) Dvurechenski struct esca_block *sca = vcpu->kvm->arch.sca; 23687d43bafcSEugene (jno) Dvurechenski 23697d43bafcSEugene (jno) Dvurechenski clear_bit_inv(vcpu->vcpu_id, (unsigned long *) sca->mcn); 23707d43bafcSEugene (jno) Dvurechenski sca->cpu[vcpu->vcpu_id].sda = 0; 23717d43bafcSEugene (jno) Dvurechenski } else { 2372bc784cceSEugene (jno) Dvurechenski struct bsca_block *sca = vcpu->kvm->arch.sca; 2373a6e2f683SEugene (jno) Dvurechenski 2374a6e2f683SEugene (jno) Dvurechenski clear_bit_inv(vcpu->vcpu_id, (unsigned long *) &sca->mcn); 2375a6e2f683SEugene (jno) Dvurechenski sca->cpu[vcpu->vcpu_id].sda = 0; 2376a6e2f683SEugene (jno) Dvurechenski } 23775e044315SEugene (jno) Dvurechenski read_unlock(&vcpu->kvm->arch.sca_lock); 23787d43bafcSEugene (jno) Dvurechenski } 2379a6e2f683SEugene (jno) Dvurechenski 2380eaa78f34SDavid Hildenbrand static void sca_add_vcpu(struct kvm_vcpu *vcpu) 2381a6e2f683SEugene (jno) Dvurechenski { 2382a6940674SDavid Hildenbrand if (!kvm_s390_use_sca_entries()) { 2383a6940674SDavid Hildenbrand struct bsca_block *sca = vcpu->kvm->arch.sca; 2384a6940674SDavid Hildenbrand 2385a6940674SDavid Hildenbrand /* we still need the basic sca for the ipte control */ 2386a6940674SDavid Hildenbrand vcpu->arch.sie_block->scaoh = (__u32)(((__u64)sca) >> 32); 2387a6940674SDavid Hildenbrand vcpu->arch.sie_block->scaol = (__u32)(__u64)sca; 2388f07afa04SDavid Hildenbrand return; 2389a6940674SDavid Hildenbrand } 2390eaa78f34SDavid Hildenbrand read_lock(&vcpu->kvm->arch.sca_lock); 2391eaa78f34SDavid Hildenbrand if (vcpu->kvm->arch.use_esca) { 2392eaa78f34SDavid Hildenbrand struct esca_block *sca = vcpu->kvm->arch.sca; 23937d43bafcSEugene (jno) Dvurechenski 2394eaa78f34SDavid Hildenbrand sca->cpu[vcpu->vcpu_id].sda = (__u64) vcpu->arch.sie_block; 23957d43bafcSEugene (jno) Dvurechenski vcpu->arch.sie_block->scaoh = (__u32)(((__u64)sca) >> 32); 23967d43bafcSEugene (jno) Dvurechenski vcpu->arch.sie_block->scaol = (__u32)(__u64)sca & ~0x3fU; 23970c9d8683SDavid Hildenbrand vcpu->arch.sie_block->ecb2 |= ECB2_ESCA; 2398eaa78f34SDavid Hildenbrand set_bit_inv(vcpu->vcpu_id, (unsigned long *) sca->mcn); 23997d43bafcSEugene (jno) Dvurechenski } else { 2400eaa78f34SDavid Hildenbrand struct bsca_block *sca = vcpu->kvm->arch.sca; 2401a6e2f683SEugene (jno) Dvurechenski 2402eaa78f34SDavid Hildenbrand sca->cpu[vcpu->vcpu_id].sda = (__u64) vcpu->arch.sie_block; 2403a6e2f683SEugene (jno) Dvurechenski vcpu->arch.sie_block->scaoh = (__u32)(((__u64)sca) >> 32); 2404a6e2f683SEugene (jno) Dvurechenski vcpu->arch.sie_block->scaol = (__u32)(__u64)sca; 2405eaa78f34SDavid Hildenbrand set_bit_inv(vcpu->vcpu_id, (unsigned long *) &sca->mcn); 2406a6e2f683SEugene (jno) Dvurechenski } 2407eaa78f34SDavid Hildenbrand read_unlock(&vcpu->kvm->arch.sca_lock); 24085e044315SEugene (jno) Dvurechenski } 24095e044315SEugene (jno) Dvurechenski 24105e044315SEugene (jno) Dvurechenski /* Basic SCA to Extended SCA data copy routines */ 24115e044315SEugene (jno) Dvurechenski static inline void sca_copy_entry(struct esca_entry *d, struct bsca_entry *s) 24125e044315SEugene (jno) Dvurechenski { 24135e044315SEugene (jno) Dvurechenski d->sda = s->sda; 24145e044315SEugene (jno) Dvurechenski d->sigp_ctrl.c = s->sigp_ctrl.c; 24155e044315SEugene (jno) Dvurechenski d->sigp_ctrl.scn = s->sigp_ctrl.scn; 24165e044315SEugene (jno) Dvurechenski } 24175e044315SEugene (jno) Dvurechenski 24185e044315SEugene (jno) Dvurechenski static void sca_copy_b_to_e(struct esca_block *d, struct bsca_block *s) 24195e044315SEugene (jno) Dvurechenski { 24205e044315SEugene (jno) Dvurechenski int i; 24215e044315SEugene (jno) Dvurechenski 24225e044315SEugene (jno) Dvurechenski d->ipte_control = s->ipte_control; 24235e044315SEugene (jno) Dvurechenski d->mcn[0] = s->mcn; 24245e044315SEugene (jno) Dvurechenski for (i = 0; i < KVM_S390_BSCA_CPU_SLOTS; i++) 24255e044315SEugene (jno) Dvurechenski sca_copy_entry(&d->cpu[i], &s->cpu[i]); 24265e044315SEugene (jno) Dvurechenski } 24275e044315SEugene (jno) Dvurechenski 24285e044315SEugene (jno) Dvurechenski static int sca_switch_to_extended(struct kvm *kvm) 24295e044315SEugene (jno) Dvurechenski { 24305e044315SEugene (jno) Dvurechenski struct bsca_block *old_sca = kvm->arch.sca; 24315e044315SEugene (jno) Dvurechenski struct esca_block *new_sca; 24325e044315SEugene (jno) Dvurechenski struct kvm_vcpu *vcpu; 24335e044315SEugene (jno) Dvurechenski unsigned int vcpu_idx; 24345e044315SEugene (jno) Dvurechenski u32 scaol, scaoh; 24355e044315SEugene (jno) Dvurechenski 24365e044315SEugene (jno) Dvurechenski new_sca = alloc_pages_exact(sizeof(*new_sca), GFP_KERNEL|__GFP_ZERO); 24375e044315SEugene (jno) Dvurechenski if (!new_sca) 24385e044315SEugene (jno) Dvurechenski return -ENOMEM; 24395e044315SEugene (jno) Dvurechenski 24405e044315SEugene (jno) Dvurechenski scaoh = (u32)((u64)(new_sca) >> 32); 24415e044315SEugene (jno) Dvurechenski scaol = (u32)(u64)(new_sca) & ~0x3fU; 24425e044315SEugene (jno) Dvurechenski 24435e044315SEugene (jno) Dvurechenski kvm_s390_vcpu_block_all(kvm); 24445e044315SEugene (jno) Dvurechenski write_lock(&kvm->arch.sca_lock); 24455e044315SEugene (jno) Dvurechenski 24465e044315SEugene (jno) Dvurechenski sca_copy_b_to_e(new_sca, old_sca); 24475e044315SEugene (jno) Dvurechenski 24485e044315SEugene (jno) Dvurechenski kvm_for_each_vcpu(vcpu_idx, vcpu, kvm) { 24495e044315SEugene (jno) Dvurechenski vcpu->arch.sie_block->scaoh = scaoh; 24505e044315SEugene (jno) Dvurechenski vcpu->arch.sie_block->scaol = scaol; 24510c9d8683SDavid Hildenbrand vcpu->arch.sie_block->ecb2 |= ECB2_ESCA; 24525e044315SEugene (jno) Dvurechenski } 24535e044315SEugene (jno) Dvurechenski kvm->arch.sca = new_sca; 24545e044315SEugene (jno) Dvurechenski kvm->arch.use_esca = 1; 24555e044315SEugene (jno) Dvurechenski 24565e044315SEugene (jno) Dvurechenski write_unlock(&kvm->arch.sca_lock); 24575e044315SEugene (jno) Dvurechenski kvm_s390_vcpu_unblock_all(kvm); 24585e044315SEugene (jno) Dvurechenski 24595e044315SEugene (jno) Dvurechenski free_page((unsigned long)old_sca); 24605e044315SEugene (jno) Dvurechenski 24618335713aSChristian Borntraeger VM_EVENT(kvm, 2, "Switched to ESCA (0x%pK -> 0x%pK)", 24628335713aSChristian Borntraeger old_sca, kvm->arch.sca); 24635e044315SEugene (jno) Dvurechenski return 0; 24647d43bafcSEugene (jno) Dvurechenski } 2465a6e2f683SEugene (jno) Dvurechenski 2466a6e2f683SEugene (jno) Dvurechenski static int sca_can_add_vcpu(struct kvm *kvm, unsigned int id) 2467a6e2f683SEugene (jno) Dvurechenski { 24685e044315SEugene (jno) Dvurechenski int rc; 24695e044315SEugene (jno) Dvurechenski 2470a6940674SDavid Hildenbrand if (!kvm_s390_use_sca_entries()) { 2471a6940674SDavid Hildenbrand if (id < KVM_MAX_VCPUS) 2472a6940674SDavid Hildenbrand return true; 2473a6940674SDavid Hildenbrand return false; 2474a6940674SDavid Hildenbrand } 24755e044315SEugene (jno) Dvurechenski if (id < KVM_S390_BSCA_CPU_SLOTS) 24765e044315SEugene (jno) Dvurechenski return true; 247776a6dd72SDavid Hildenbrand if (!sclp.has_esca || !sclp.has_64bscao) 24785e044315SEugene (jno) Dvurechenski return false; 24795e044315SEugene (jno) Dvurechenski 24805e044315SEugene (jno) Dvurechenski mutex_lock(&kvm->lock); 24815e044315SEugene (jno) Dvurechenski rc = kvm->arch.use_esca ? 0 : sca_switch_to_extended(kvm); 24825e044315SEugene (jno) Dvurechenski mutex_unlock(&kvm->lock); 24835e044315SEugene (jno) Dvurechenski 24845e044315SEugene (jno) Dvurechenski return rc == 0 && id < KVM_S390_ESCA_CPU_SLOTS; 2485a6e2f683SEugene (jno) Dvurechenski } 2486a6e2f683SEugene (jno) Dvurechenski 2487dafd032aSDominik Dingel int kvm_arch_vcpu_init(struct kvm_vcpu *vcpu) 2488dafd032aSDominik Dingel { 2489dafd032aSDominik Dingel vcpu->arch.pfault_token = KVM_S390_PFAULT_TOKEN_INVALID; 2490dafd032aSDominik Dingel kvm_clear_async_pf_completion_queue(vcpu); 249159674c1aSChristian Borntraeger vcpu->run->kvm_valid_regs = KVM_SYNC_PREFIX | 249259674c1aSChristian Borntraeger KVM_SYNC_GPRS | 24939eed0735SChristian Borntraeger KVM_SYNC_ACRS | 2494b028ee3eSDavid Hildenbrand KVM_SYNC_CRS | 2495b028ee3eSDavid Hildenbrand KVM_SYNC_ARCH0 | 2496b028ee3eSDavid Hildenbrand KVM_SYNC_PFAULT; 249775a4615cSJulius Niedworok kvm_s390_set_prefix(vcpu, 0); 2498c6e5f166SFan Zhang if (test_kvm_facility(vcpu->kvm, 64)) 2499c6e5f166SFan Zhang vcpu->run->kvm_valid_regs |= KVM_SYNC_RICCB; 250035b3fde6SChristian Borntraeger if (test_kvm_facility(vcpu->kvm, 82)) 250135b3fde6SChristian Borntraeger vcpu->run->kvm_valid_regs |= KVM_SYNC_BPBC; 25024e0b1ab7SFan Zhang if (test_kvm_facility(vcpu->kvm, 133)) 25034e0b1ab7SFan Zhang vcpu->run->kvm_valid_regs |= KVM_SYNC_GSCB; 2504a3da7b4aSChristian Borntraeger if (test_kvm_facility(vcpu->kvm, 156)) 2505a3da7b4aSChristian Borntraeger vcpu->run->kvm_valid_regs |= KVM_SYNC_ETOKEN; 2506f6aa6dc4SDavid Hildenbrand /* fprs can be synchronized via vrs, even if the guest has no vx. With 2507f6aa6dc4SDavid Hildenbrand * MACHINE_HAS_VX, (load|store)_fpu_regs() will work with vrs format. 2508f6aa6dc4SDavid Hildenbrand */ 2509f6aa6dc4SDavid Hildenbrand if (MACHINE_HAS_VX) 251068c55750SEric Farman vcpu->run->kvm_valid_regs |= KVM_SYNC_VRS; 25116fd8e67dSDavid Hildenbrand else 25126fd8e67dSDavid Hildenbrand vcpu->run->kvm_valid_regs |= KVM_SYNC_FPRS; 2513dafd032aSDominik Dingel 2514dafd032aSDominik Dingel if (kvm_is_ucontrol(vcpu->kvm)) 2515dafd032aSDominik Dingel return __kvm_ucontrol_vcpu_init(vcpu); 2516dafd032aSDominik Dingel 2517b0c632dbSHeiko Carstens return 0; 2518b0c632dbSHeiko Carstens } 2519b0c632dbSHeiko Carstens 2520db0758b2SDavid Hildenbrand /* needs disabled preemption to protect from TOD sync and vcpu_load/put */ 2521db0758b2SDavid Hildenbrand static void __start_cpu_timer_accounting(struct kvm_vcpu *vcpu) 2522db0758b2SDavid Hildenbrand { 2523db0758b2SDavid Hildenbrand WARN_ON_ONCE(vcpu->arch.cputm_start != 0); 25249c23a131SDavid Hildenbrand raw_write_seqcount_begin(&vcpu->arch.cputm_seqcount); 2525db0758b2SDavid Hildenbrand vcpu->arch.cputm_start = get_tod_clock_fast(); 25269c23a131SDavid Hildenbrand raw_write_seqcount_end(&vcpu->arch.cputm_seqcount); 2527db0758b2SDavid Hildenbrand } 2528db0758b2SDavid Hildenbrand 2529db0758b2SDavid Hildenbrand /* needs disabled preemption to protect from TOD sync and vcpu_load/put */ 2530db0758b2SDavid Hildenbrand static void __stop_cpu_timer_accounting(struct kvm_vcpu *vcpu) 2531db0758b2SDavid Hildenbrand { 2532db0758b2SDavid Hildenbrand WARN_ON_ONCE(vcpu->arch.cputm_start == 0); 25339c23a131SDavid Hildenbrand raw_write_seqcount_begin(&vcpu->arch.cputm_seqcount); 2534db0758b2SDavid Hildenbrand vcpu->arch.sie_block->cputm -= get_tod_clock_fast() - vcpu->arch.cputm_start; 2535db0758b2SDavid Hildenbrand vcpu->arch.cputm_start = 0; 25369c23a131SDavid Hildenbrand raw_write_seqcount_end(&vcpu->arch.cputm_seqcount); 2537db0758b2SDavid Hildenbrand } 2538db0758b2SDavid Hildenbrand 2539db0758b2SDavid Hildenbrand /* needs disabled preemption to protect from TOD sync and vcpu_load/put */ 2540db0758b2SDavid Hildenbrand static void __enable_cpu_timer_accounting(struct kvm_vcpu *vcpu) 2541db0758b2SDavid Hildenbrand { 2542db0758b2SDavid Hildenbrand WARN_ON_ONCE(vcpu->arch.cputm_enabled); 2543db0758b2SDavid Hildenbrand vcpu->arch.cputm_enabled = true; 2544db0758b2SDavid Hildenbrand __start_cpu_timer_accounting(vcpu); 2545db0758b2SDavid Hildenbrand } 2546db0758b2SDavid Hildenbrand 2547db0758b2SDavid Hildenbrand /* needs disabled preemption to protect from TOD sync and vcpu_load/put */ 2548db0758b2SDavid Hildenbrand static void __disable_cpu_timer_accounting(struct kvm_vcpu *vcpu) 2549db0758b2SDavid Hildenbrand { 2550db0758b2SDavid Hildenbrand WARN_ON_ONCE(!vcpu->arch.cputm_enabled); 2551db0758b2SDavid Hildenbrand __stop_cpu_timer_accounting(vcpu); 2552db0758b2SDavid Hildenbrand vcpu->arch.cputm_enabled = false; 2553db0758b2SDavid Hildenbrand } 2554db0758b2SDavid Hildenbrand 2555db0758b2SDavid Hildenbrand static void enable_cpu_timer_accounting(struct kvm_vcpu *vcpu) 2556db0758b2SDavid Hildenbrand { 2557db0758b2SDavid Hildenbrand preempt_disable(); /* protect from TOD sync and vcpu_load/put */ 2558db0758b2SDavid Hildenbrand __enable_cpu_timer_accounting(vcpu); 2559db0758b2SDavid Hildenbrand preempt_enable(); 2560db0758b2SDavid Hildenbrand } 2561db0758b2SDavid Hildenbrand 2562db0758b2SDavid Hildenbrand static void disable_cpu_timer_accounting(struct kvm_vcpu *vcpu) 2563db0758b2SDavid Hildenbrand { 2564db0758b2SDavid Hildenbrand preempt_disable(); /* protect from TOD sync and vcpu_load/put */ 2565db0758b2SDavid Hildenbrand __disable_cpu_timer_accounting(vcpu); 2566db0758b2SDavid Hildenbrand preempt_enable(); 2567db0758b2SDavid Hildenbrand } 2568db0758b2SDavid Hildenbrand 25694287f247SDavid Hildenbrand /* set the cpu timer - may only be called from the VCPU thread itself */ 25704287f247SDavid Hildenbrand void kvm_s390_set_cpu_timer(struct kvm_vcpu *vcpu, __u64 cputm) 25714287f247SDavid Hildenbrand { 2572db0758b2SDavid Hildenbrand preempt_disable(); /* protect from TOD sync and vcpu_load/put */ 25739c23a131SDavid Hildenbrand raw_write_seqcount_begin(&vcpu->arch.cputm_seqcount); 2574db0758b2SDavid Hildenbrand if (vcpu->arch.cputm_enabled) 2575db0758b2SDavid Hildenbrand vcpu->arch.cputm_start = get_tod_clock_fast(); 25764287f247SDavid Hildenbrand vcpu->arch.sie_block->cputm = cputm; 25779c23a131SDavid Hildenbrand raw_write_seqcount_end(&vcpu->arch.cputm_seqcount); 2578db0758b2SDavid Hildenbrand preempt_enable(); 25794287f247SDavid Hildenbrand } 25804287f247SDavid Hildenbrand 2581db0758b2SDavid Hildenbrand /* update and get the cpu timer - can also be called from other VCPU threads */ 25824287f247SDavid Hildenbrand __u64 kvm_s390_get_cpu_timer(struct kvm_vcpu *vcpu) 25834287f247SDavid Hildenbrand { 25849c23a131SDavid Hildenbrand unsigned int seq; 2585db0758b2SDavid Hildenbrand __u64 value; 2586db0758b2SDavid Hildenbrand 2587db0758b2SDavid Hildenbrand if (unlikely(!vcpu->arch.cputm_enabled)) 25884287f247SDavid Hildenbrand return vcpu->arch.sie_block->cputm; 2589db0758b2SDavid Hildenbrand 25909c23a131SDavid Hildenbrand preempt_disable(); /* protect from TOD sync and vcpu_load/put */ 25919c23a131SDavid Hildenbrand do { 25929c23a131SDavid Hildenbrand seq = raw_read_seqcount(&vcpu->arch.cputm_seqcount); 25939c23a131SDavid Hildenbrand /* 25949c23a131SDavid Hildenbrand * If the writer would ever execute a read in the critical 25959c23a131SDavid Hildenbrand * section, e.g. in irq context, we have a deadlock. 25969c23a131SDavid Hildenbrand */ 25979c23a131SDavid Hildenbrand WARN_ON_ONCE((seq & 1) && smp_processor_id() == vcpu->cpu); 2598db0758b2SDavid Hildenbrand value = vcpu->arch.sie_block->cputm; 25999c23a131SDavid Hildenbrand /* if cputm_start is 0, accounting is being started/stopped */ 26009c23a131SDavid Hildenbrand if (likely(vcpu->arch.cputm_start)) 2601db0758b2SDavid Hildenbrand value -= get_tod_clock_fast() - vcpu->arch.cputm_start; 26029c23a131SDavid Hildenbrand } while (read_seqcount_retry(&vcpu->arch.cputm_seqcount, seq & ~1)); 26039c23a131SDavid Hildenbrand preempt_enable(); 2604db0758b2SDavid Hildenbrand return value; 26054287f247SDavid Hildenbrand } 26064287f247SDavid Hildenbrand 2607b0c632dbSHeiko Carstens void kvm_arch_vcpu_load(struct kvm_vcpu *vcpu, int cpu) 2608b0c632dbSHeiko Carstens { 26099977e886SHendrik Brueckner 261037d9df98SDavid Hildenbrand gmap_enable(vcpu->arch.enabled_gmap); 2611ef8f4f49SDavid Hildenbrand kvm_s390_set_cpuflags(vcpu, CPUSTAT_RUNNING); 26125ebda316SDavid Hildenbrand if (vcpu->arch.cputm_enabled && !is_vcpu_idle(vcpu)) 2613db0758b2SDavid Hildenbrand __start_cpu_timer_accounting(vcpu); 261401a745acSDavid Hildenbrand vcpu->cpu = cpu; 2615b0c632dbSHeiko Carstens } 2616b0c632dbSHeiko Carstens 2617b0c632dbSHeiko Carstens void kvm_arch_vcpu_put(struct kvm_vcpu *vcpu) 2618b0c632dbSHeiko Carstens { 261901a745acSDavid Hildenbrand vcpu->cpu = -1; 26205ebda316SDavid Hildenbrand if (vcpu->arch.cputm_enabled && !is_vcpu_idle(vcpu)) 2621db0758b2SDavid Hildenbrand __stop_cpu_timer_accounting(vcpu); 26229daecfc6SDavid Hildenbrand kvm_s390_clear_cpuflags(vcpu, CPUSTAT_RUNNING); 262337d9df98SDavid Hildenbrand vcpu->arch.enabled_gmap = gmap_get_enabled(); 262437d9df98SDavid Hildenbrand gmap_disable(vcpu->arch.enabled_gmap); 26259977e886SHendrik Brueckner 2626b0c632dbSHeiko Carstens } 2627b0c632dbSHeiko Carstens 2628b0c632dbSHeiko Carstens static void kvm_s390_vcpu_initial_reset(struct kvm_vcpu *vcpu) 2629b0c632dbSHeiko Carstens { 2630b0c632dbSHeiko Carstens /* this equals initial cpu reset in pop, but we don't switch to ESA */ 2631b0c632dbSHeiko Carstens vcpu->arch.sie_block->gpsw.mask = 0UL; 2632b0c632dbSHeiko Carstens vcpu->arch.sie_block->gpsw.addr = 0UL; 26338d26cf7bSChristian Borntraeger kvm_s390_set_prefix(vcpu, 0); 26344287f247SDavid Hildenbrand kvm_s390_set_cpu_timer(vcpu, 0); 2635b0c632dbSHeiko Carstens vcpu->arch.sie_block->ckc = 0UL; 2636b0c632dbSHeiko Carstens vcpu->arch.sie_block->todpr = 0; 2637b0c632dbSHeiko Carstens memset(vcpu->arch.sie_block->gcr, 0, 16 * sizeof(__u64)); 2638b9224cd7SDavid Hildenbrand vcpu->arch.sie_block->gcr[0] = CR0_UNUSED_56 | 2639b9224cd7SDavid Hildenbrand CR0_INTERRUPT_KEY_SUBMASK | 2640b9224cd7SDavid Hildenbrand CR0_MEASUREMENT_ALERT_SUBMASK; 2641b9224cd7SDavid Hildenbrand vcpu->arch.sie_block->gcr[14] = CR14_UNUSED_32 | 2642b9224cd7SDavid Hildenbrand CR14_UNUSED_33 | 2643b9224cd7SDavid Hildenbrand CR14_EXTERNAL_DAMAGE_SUBMASK; 26449abc2a08SDavid Hildenbrand /* make sure the new fpc will be lazily loaded */ 26459abc2a08SDavid Hildenbrand save_fpu_regs(); 26469abc2a08SDavid Hildenbrand current->thread.fpu.fpc = 0; 2647b0c632dbSHeiko Carstens vcpu->arch.sie_block->gbea = 1; 2648672550fbSChristian Borntraeger vcpu->arch.sie_block->pp = 0; 264935b3fde6SChristian Borntraeger vcpu->arch.sie_block->fpf &= ~FPF_BPBC; 26503c038e6bSDominik Dingel vcpu->arch.pfault_token = KVM_S390_PFAULT_TOKEN_INVALID; 26513c038e6bSDominik Dingel kvm_clear_async_pf_completion_queue(vcpu); 26526352e4d2SDavid Hildenbrand if (!kvm_s390_user_cpu_state_ctrl(vcpu->kvm)) 26536852d7b6SDavid Hildenbrand kvm_s390_vcpu_stop(vcpu); 26542ed10cc1SJens Freimann kvm_s390_clear_local_irqs(vcpu); 2655b0c632dbSHeiko Carstens } 2656b0c632dbSHeiko Carstens 265731928aa5SDominik Dingel void kvm_arch_vcpu_postcreate(struct kvm_vcpu *vcpu) 265842897d86SMarcelo Tosatti { 265972f25020SJason J. Herne mutex_lock(&vcpu->kvm->lock); 2660fdf03650SFan Zhang preempt_disable(); 266172f25020SJason J. Herne vcpu->arch.sie_block->epoch = vcpu->kvm->arch.epoch; 2662d16b52cbSDavid Hildenbrand vcpu->arch.sie_block->epdx = vcpu->kvm->arch.epdx; 2663fdf03650SFan Zhang preempt_enable(); 266472f25020SJason J. Herne mutex_unlock(&vcpu->kvm->lock); 266525508824SDavid Hildenbrand if (!kvm_is_ucontrol(vcpu->kvm)) { 2666dafd032aSDominik Dingel vcpu->arch.gmap = vcpu->kvm->arch.gmap; 2667eaa78f34SDavid Hildenbrand sca_add_vcpu(vcpu); 266825508824SDavid Hildenbrand } 26696502a34cSDavid Hildenbrand if (test_kvm_facility(vcpu->kvm, 74) || vcpu->kvm->arch.user_instr0) 26706502a34cSDavid Hildenbrand vcpu->arch.sie_block->ictl |= ICTL_OPEREXC; 267137d9df98SDavid Hildenbrand /* make vcpu_load load the right gmap on the first trigger */ 267237d9df98SDavid Hildenbrand vcpu->arch.enabled_gmap = vcpu->arch.gmap; 267342897d86SMarcelo Tosatti } 267442897d86SMarcelo Tosatti 26755102ee87STony Krowiak static void kvm_s390_vcpu_crypto_setup(struct kvm_vcpu *vcpu) 26765102ee87STony Krowiak { 2677e585b24aSTony Krowiak /* 2678e585b24aSTony Krowiak * If the AP instructions are not being interpreted and the MSAX3 2679e585b24aSTony Krowiak * facility is not configured for the guest, there is nothing to set up. 2680e585b24aSTony Krowiak */ 2681e585b24aSTony Krowiak if (!vcpu->kvm->arch.crypto.apie && !test_kvm_facility(vcpu->kvm, 76)) 26825102ee87STony Krowiak return; 26835102ee87STony Krowiak 2684e585b24aSTony Krowiak vcpu->arch.sie_block->crycbd = vcpu->kvm->arch.crypto.crycbd; 2685a374e892STony Krowiak vcpu->arch.sie_block->ecb3 &= ~(ECB3_AES | ECB3_DEA); 268637940fb0STony Krowiak vcpu->arch.sie_block->eca &= ~ECA_APIE; 2687a374e892STony Krowiak 2688e585b24aSTony Krowiak if (vcpu->kvm->arch.crypto.apie) 2689e585b24aSTony Krowiak vcpu->arch.sie_block->eca |= ECA_APIE; 2690e585b24aSTony Krowiak 2691e585b24aSTony Krowiak /* Set up protected key support */ 2692a374e892STony Krowiak if (vcpu->kvm->arch.crypto.aes_kw) 2693a374e892STony Krowiak vcpu->arch.sie_block->ecb3 |= ECB3_AES; 2694a374e892STony Krowiak if (vcpu->kvm->arch.crypto.dea_kw) 2695a374e892STony Krowiak vcpu->arch.sie_block->ecb3 |= ECB3_DEA; 26965102ee87STony Krowiak } 26975102ee87STony Krowiak 2698b31605c1SDominik Dingel void kvm_s390_vcpu_unsetup_cmma(struct kvm_vcpu *vcpu) 2699b31605c1SDominik Dingel { 2700b31605c1SDominik Dingel free_page(vcpu->arch.sie_block->cbrlo); 2701b31605c1SDominik Dingel vcpu->arch.sie_block->cbrlo = 0; 2702b31605c1SDominik Dingel } 2703b31605c1SDominik Dingel 2704b31605c1SDominik Dingel int kvm_s390_vcpu_setup_cmma(struct kvm_vcpu *vcpu) 2705b31605c1SDominik Dingel { 2706b31605c1SDominik Dingel vcpu->arch.sie_block->cbrlo = get_zeroed_page(GFP_KERNEL); 2707b31605c1SDominik Dingel if (!vcpu->arch.sie_block->cbrlo) 2708b31605c1SDominik Dingel return -ENOMEM; 2709b31605c1SDominik Dingel return 0; 2710b31605c1SDominik Dingel } 2711b31605c1SDominik Dingel 271291520f1aSMichael Mueller static void kvm_s390_vcpu_setup_model(struct kvm_vcpu *vcpu) 271391520f1aSMichael Mueller { 271491520f1aSMichael Mueller struct kvm_s390_cpu_model *model = &vcpu->kvm->arch.model; 271591520f1aSMichael Mueller 271691520f1aSMichael Mueller vcpu->arch.sie_block->ibc = model->ibc; 271780bc79dcSDavid Hildenbrand if (test_kvm_facility(vcpu->kvm, 7)) 2718c54f0d6aSDavid Hildenbrand vcpu->arch.sie_block->fac = (u32)(u64) model->fac_list; 271991520f1aSMichael Mueller } 272091520f1aSMichael Mueller 2721b0c632dbSHeiko Carstens int kvm_arch_vcpu_setup(struct kvm_vcpu *vcpu) 2722b0c632dbSHeiko Carstens { 2723b31605c1SDominik Dingel int rc = 0; 2724b31288faSKonstantin Weitz 27259e6dabefSCornelia Huck atomic_set(&vcpu->arch.sie_block->cpuflags, CPUSTAT_ZARCH | 27269e6dabefSCornelia Huck CPUSTAT_SM | 2727a4a4f191SGuenther Hutzl CPUSTAT_STOPPED); 2728a4a4f191SGuenther Hutzl 272953df84f8SGuenther Hutzl if (test_kvm_facility(vcpu->kvm, 78)) 2730ef8f4f49SDavid Hildenbrand kvm_s390_set_cpuflags(vcpu, CPUSTAT_GED2); 273153df84f8SGuenther Hutzl else if (test_kvm_facility(vcpu->kvm, 8)) 2732ef8f4f49SDavid Hildenbrand kvm_s390_set_cpuflags(vcpu, CPUSTAT_GED); 2733a4a4f191SGuenther Hutzl 273491520f1aSMichael Mueller kvm_s390_vcpu_setup_model(vcpu); 273591520f1aSMichael Mueller 2736bdab09f3SDavid Hildenbrand /* pgste_set_pte has special handling for !MACHINE_HAS_ESOP */ 2737bdab09f3SDavid Hildenbrand if (MACHINE_HAS_ESOP) 27380c9d8683SDavid Hildenbrand vcpu->arch.sie_block->ecb |= ECB_HOSTPROTINT; 2739bd50e8ecSDavid Hildenbrand if (test_kvm_facility(vcpu->kvm, 9)) 27400c9d8683SDavid Hildenbrand vcpu->arch.sie_block->ecb |= ECB_SRSI; 2741f597d24eSDavid Hildenbrand if (test_kvm_facility(vcpu->kvm, 73)) 27420c9d8683SDavid Hildenbrand vcpu->arch.sie_block->ecb |= ECB_TE; 27437feb6bb8SMichael Mueller 2744c9f0a2b8SJanosch Frank if (test_kvm_facility(vcpu->kvm, 8) && vcpu->kvm->arch.use_pfmfi) 27450c9d8683SDavid Hildenbrand vcpu->arch.sie_block->ecb2 |= ECB2_PFMFI; 2746cd1836f5SJanosch Frank if (test_kvm_facility(vcpu->kvm, 130)) 27470c9d8683SDavid Hildenbrand vcpu->arch.sie_block->ecb2 |= ECB2_IEP; 27480c9d8683SDavid Hildenbrand vcpu->arch.sie_block->eca = ECA_MVPGI | ECA_PROTEXCI; 274948ee7d3aSDavid Hildenbrand if (sclp.has_cei) 27500c9d8683SDavid Hildenbrand vcpu->arch.sie_block->eca |= ECA_CEI; 275111ad65b7SDavid Hildenbrand if (sclp.has_ib) 27520c9d8683SDavid Hildenbrand vcpu->arch.sie_block->eca |= ECA_IB; 275337c5f6c8SDavid Hildenbrand if (sclp.has_siif) 27540c9d8683SDavid Hildenbrand vcpu->arch.sie_block->eca |= ECA_SII; 275537c5f6c8SDavid Hildenbrand if (sclp.has_sigpif) 27560c9d8683SDavid Hildenbrand vcpu->arch.sie_block->eca |= ECA_SIGPI; 275718280d8bSMichael Mueller if (test_kvm_facility(vcpu->kvm, 129)) { 27580c9d8683SDavid Hildenbrand vcpu->arch.sie_block->eca |= ECA_VX; 27590c9d8683SDavid Hildenbrand vcpu->arch.sie_block->ecd |= ECD_HOSTREGMGMT; 276013211ea7SEric Farman } 27618fa1696eSCollin L. Walling if (test_kvm_facility(vcpu->kvm, 139)) 27628fa1696eSCollin L. Walling vcpu->arch.sie_block->ecd |= ECD_MEF; 2763a3da7b4aSChristian Borntraeger if (test_kvm_facility(vcpu->kvm, 156)) 2764a3da7b4aSChristian Borntraeger vcpu->arch.sie_block->ecd |= ECD_ETOKENF; 2765d7c5cb01SMichael Mueller if (vcpu->arch.sie_block->gd) { 2766d7c5cb01SMichael Mueller vcpu->arch.sie_block->eca |= ECA_AIV; 2767d7c5cb01SMichael Mueller VCPU_EVENT(vcpu, 3, "AIV gisa format-%u enabled for cpu %03u", 2768d7c5cb01SMichael Mueller vcpu->arch.sie_block->gd & 0x3, vcpu->vcpu_id); 2769d7c5cb01SMichael Mueller } 27704e0b1ab7SFan Zhang vcpu->arch.sie_block->sdnxo = ((unsigned long) &vcpu->run->s.regs.sdnx) 27714e0b1ab7SFan Zhang | SDNXC; 2772c6e5f166SFan Zhang vcpu->arch.sie_block->riccbd = (unsigned long) &vcpu->run->s.regs.riccb; 2773730cd632SFarhan Ali 2774730cd632SFarhan Ali if (sclp.has_kss) 2775ef8f4f49SDavid Hildenbrand kvm_s390_set_cpuflags(vcpu, CPUSTAT_KSS); 2776730cd632SFarhan Ali else 2777492d8642SThomas Huth vcpu->arch.sie_block->ictl |= ICTL_ISKE | ICTL_SSKE | ICTL_RRBE; 27785a5e6536SMatthew Rosato 2779e6db1d61SDominik Dingel if (vcpu->kvm->arch.use_cmma) { 2780b31605c1SDominik Dingel rc = kvm_s390_vcpu_setup_cmma(vcpu); 2781b31605c1SDominik Dingel if (rc) 2782b31605c1SDominik Dingel return rc; 2783b31288faSKonstantin Weitz } 27840ac96cafSDavid Hildenbrand hrtimer_init(&vcpu->arch.ckc_timer, CLOCK_MONOTONIC, HRTIMER_MODE_REL); 2785ca872302SChristian Borntraeger vcpu->arch.ckc_timer.function = kvm_s390_idle_wakeup; 27869d8d5786SMichael Mueller 278767d49d52SCollin Walling vcpu->arch.sie_block->hpid = HPID_KVM; 278867d49d52SCollin Walling 27895102ee87STony Krowiak kvm_s390_vcpu_crypto_setup(vcpu); 27905102ee87STony Krowiak 2791b31605c1SDominik Dingel return rc; 2792b0c632dbSHeiko Carstens } 2793b0c632dbSHeiko Carstens 2794b0c632dbSHeiko Carstens struct kvm_vcpu *kvm_arch_vcpu_create(struct kvm *kvm, 2795b0c632dbSHeiko Carstens unsigned int id) 2796b0c632dbSHeiko Carstens { 27974d47555aSCarsten Otte struct kvm_vcpu *vcpu; 27987feb6bb8SMichael Mueller struct sie_page *sie_page; 27994d47555aSCarsten Otte int rc = -EINVAL; 2800b0c632dbSHeiko Carstens 28014215825eSDavid Hildenbrand if (!kvm_is_ucontrol(kvm) && !sca_can_add_vcpu(kvm, id)) 28024d47555aSCarsten Otte goto out; 28034d47555aSCarsten Otte 28044d47555aSCarsten Otte rc = -ENOMEM; 28054d47555aSCarsten Otte 2806b110feafSMichael Mueller vcpu = kmem_cache_zalloc(kvm_vcpu_cache, GFP_KERNEL); 2807b0c632dbSHeiko Carstens if (!vcpu) 28084d47555aSCarsten Otte goto out; 2809b0c632dbSHeiko Carstens 2810da72ca4dSQingFeng Hao BUILD_BUG_ON(sizeof(struct sie_page) != 4096); 28117feb6bb8SMichael Mueller sie_page = (struct sie_page *) get_zeroed_page(GFP_KERNEL); 28127feb6bb8SMichael Mueller if (!sie_page) 2813b0c632dbSHeiko Carstens goto out_free_cpu; 2814b0c632dbSHeiko Carstens 28157feb6bb8SMichael Mueller vcpu->arch.sie_block = &sie_page->sie_block; 28167feb6bb8SMichael Mueller vcpu->arch.sie_block->itdba = (unsigned long) &sie_page->itdb; 28177feb6bb8SMichael Mueller 2818efed1104SDavid Hildenbrand /* the real guest size will always be smaller than msl */ 2819efed1104SDavid Hildenbrand vcpu->arch.sie_block->mso = 0; 2820efed1104SDavid Hildenbrand vcpu->arch.sie_block->msl = sclp.hamax; 2821efed1104SDavid Hildenbrand 2822b0c632dbSHeiko Carstens vcpu->arch.sie_block->icpua = id; 2823ba5c1e9bSCarsten Otte spin_lock_init(&vcpu->arch.local_int.lock); 2824982cff42SMichael Mueller vcpu->arch.sie_block->gd = (u32)(u64)kvm->arch.gisa_int.origin; 28254b9f9525SMichael Mueller if (vcpu->arch.sie_block->gd && sclp.has_gisaf) 28264b9f9525SMichael Mueller vcpu->arch.sie_block->gd |= GISA_FORMAT1; 28279c23a131SDavid Hildenbrand seqcount_init(&vcpu->arch.cputm_seqcount); 2828ba5c1e9bSCarsten Otte 2829b0c632dbSHeiko Carstens rc = kvm_vcpu_init(vcpu, kvm, id); 2830b0c632dbSHeiko Carstens if (rc) 28319abc2a08SDavid Hildenbrand goto out_free_sie_block; 28328335713aSChristian Borntraeger VM_EVENT(kvm, 3, "create cpu %d at 0x%pK, sie block at 0x%pK", id, vcpu, 2833b0c632dbSHeiko Carstens vcpu->arch.sie_block); 2834ade38c31SCornelia Huck trace_kvm_s390_create_vcpu(id, vcpu, vcpu->arch.sie_block); 2835b0c632dbSHeiko Carstens 2836b0c632dbSHeiko Carstens return vcpu; 28377b06bf2fSWei Yongjun out_free_sie_block: 28387b06bf2fSWei Yongjun free_page((unsigned long)(vcpu->arch.sie_block)); 2839b0c632dbSHeiko Carstens out_free_cpu: 2840b110feafSMichael Mueller kmem_cache_free(kvm_vcpu_cache, vcpu); 28414d47555aSCarsten Otte out: 2842b0c632dbSHeiko Carstens return ERR_PTR(rc); 2843b0c632dbSHeiko Carstens } 2844b0c632dbSHeiko Carstens 2845b0c632dbSHeiko Carstens int kvm_arch_vcpu_runnable(struct kvm_vcpu *vcpu) 2846b0c632dbSHeiko Carstens { 28479a022067SDavid Hildenbrand return kvm_s390_vcpu_has_irq(vcpu, 0); 2848b0c632dbSHeiko Carstens } 2849b0c632dbSHeiko Carstens 2850199b5763SLongpeng(Mike) bool kvm_arch_vcpu_in_kernel(struct kvm_vcpu *vcpu) 2851199b5763SLongpeng(Mike) { 28520546c63dSLongpeng(Mike) return !(vcpu->arch.sie_block->gpsw.mask & PSW_MASK_PSTATE); 2853199b5763SLongpeng(Mike) } 2854199b5763SLongpeng(Mike) 285527406cd5SChristian Borntraeger void kvm_s390_vcpu_block(struct kvm_vcpu *vcpu) 285649b99e1eSChristian Borntraeger { 2857805de8f4SPeter Zijlstra atomic_or(PROG_BLOCK_SIE, &vcpu->arch.sie_block->prog20); 285861a6df54SDavid Hildenbrand exit_sie(vcpu); 285949b99e1eSChristian Borntraeger } 286049b99e1eSChristian Borntraeger 286127406cd5SChristian Borntraeger void kvm_s390_vcpu_unblock(struct kvm_vcpu *vcpu) 286249b99e1eSChristian Borntraeger { 2863805de8f4SPeter Zijlstra atomic_andnot(PROG_BLOCK_SIE, &vcpu->arch.sie_block->prog20); 286449b99e1eSChristian Borntraeger } 286549b99e1eSChristian Borntraeger 28668e236546SChristian Borntraeger static void kvm_s390_vcpu_request(struct kvm_vcpu *vcpu) 28678e236546SChristian Borntraeger { 2868805de8f4SPeter Zijlstra atomic_or(PROG_REQUEST, &vcpu->arch.sie_block->prog20); 286961a6df54SDavid Hildenbrand exit_sie(vcpu); 28708e236546SChristian Borntraeger } 28718e236546SChristian Borntraeger 28729ea59728SDavid Hildenbrand bool kvm_s390_vcpu_sie_inhibited(struct kvm_vcpu *vcpu) 28739ea59728SDavid Hildenbrand { 28749ea59728SDavid Hildenbrand return atomic_read(&vcpu->arch.sie_block->prog20) & 28759ea59728SDavid Hildenbrand (PROG_BLOCK_SIE | PROG_REQUEST); 28769ea59728SDavid Hildenbrand } 28779ea59728SDavid Hildenbrand 28788e236546SChristian Borntraeger static void kvm_s390_vcpu_request_handled(struct kvm_vcpu *vcpu) 28798e236546SChristian Borntraeger { 28809bf9fde2SJason J. Herne atomic_andnot(PROG_REQUEST, &vcpu->arch.sie_block->prog20); 28818e236546SChristian Borntraeger } 28828e236546SChristian Borntraeger 288349b99e1eSChristian Borntraeger /* 28849ea59728SDavid Hildenbrand * Kick a guest cpu out of (v)SIE and wait until (v)SIE is not running. 288549b99e1eSChristian Borntraeger * If the CPU is not running (e.g. waiting as idle) the function will 288649b99e1eSChristian Borntraeger * return immediately. */ 288749b99e1eSChristian Borntraeger void exit_sie(struct kvm_vcpu *vcpu) 288849b99e1eSChristian Borntraeger { 2889ef8f4f49SDavid Hildenbrand kvm_s390_set_cpuflags(vcpu, CPUSTAT_STOP_INT); 28909ea59728SDavid Hildenbrand kvm_s390_vsie_kick(vcpu); 289149b99e1eSChristian Borntraeger while (vcpu->arch.sie_block->prog0c & PROG_IN_SIE) 289249b99e1eSChristian Borntraeger cpu_relax(); 289349b99e1eSChristian Borntraeger } 289449b99e1eSChristian Borntraeger 28958e236546SChristian Borntraeger /* Kick a guest cpu out of SIE to process a request synchronously */ 28968e236546SChristian Borntraeger void kvm_s390_sync_request(int req, struct kvm_vcpu *vcpu) 289749b99e1eSChristian Borntraeger { 28988e236546SChristian Borntraeger kvm_make_request(req, vcpu); 28998e236546SChristian Borntraeger kvm_s390_vcpu_request(vcpu); 290049b99e1eSChristian Borntraeger } 290149b99e1eSChristian Borntraeger 2902414d3b07SMartin Schwidefsky static void kvm_gmap_notifier(struct gmap *gmap, unsigned long start, 2903414d3b07SMartin Schwidefsky unsigned long end) 29042c70fe44SChristian Borntraeger { 29052c70fe44SChristian Borntraeger struct kvm *kvm = gmap->private; 29062c70fe44SChristian Borntraeger struct kvm_vcpu *vcpu; 2907414d3b07SMartin Schwidefsky unsigned long prefix; 2908414d3b07SMartin Schwidefsky int i; 29092c70fe44SChristian Borntraeger 291065d0b0d4SDavid Hildenbrand if (gmap_is_shadow(gmap)) 291165d0b0d4SDavid Hildenbrand return; 2912414d3b07SMartin Schwidefsky if (start >= 1UL << 31) 2913414d3b07SMartin Schwidefsky /* We are only interested in prefix pages */ 2914414d3b07SMartin Schwidefsky return; 29152c70fe44SChristian Borntraeger kvm_for_each_vcpu(i, vcpu, kvm) { 29162c70fe44SChristian Borntraeger /* match against both prefix pages */ 2917414d3b07SMartin Schwidefsky prefix = kvm_s390_get_prefix(vcpu); 2918414d3b07SMartin Schwidefsky if (prefix <= end && start <= prefix + 2*PAGE_SIZE - 1) { 2919414d3b07SMartin Schwidefsky VCPU_EVENT(vcpu, 2, "gmap notifier for %lx-%lx", 2920414d3b07SMartin Schwidefsky start, end); 29218e236546SChristian Borntraeger kvm_s390_sync_request(KVM_REQ_MMU_RELOAD, vcpu); 29222c70fe44SChristian Borntraeger } 29232c70fe44SChristian Borntraeger } 29242c70fe44SChristian Borntraeger } 29252c70fe44SChristian Borntraeger 2926b6d33834SChristoffer Dall int kvm_arch_vcpu_should_kick(struct kvm_vcpu *vcpu) 2927b6d33834SChristoffer Dall { 2928b6d33834SChristoffer Dall /* kvm common code refers to this, but never calls it */ 2929b6d33834SChristoffer Dall BUG(); 2930b6d33834SChristoffer Dall return 0; 2931b6d33834SChristoffer Dall } 2932b6d33834SChristoffer Dall 293314eebd91SCarsten Otte static int kvm_arch_vcpu_ioctl_get_one_reg(struct kvm_vcpu *vcpu, 293414eebd91SCarsten Otte struct kvm_one_reg *reg) 293514eebd91SCarsten Otte { 293614eebd91SCarsten Otte int r = -EINVAL; 293714eebd91SCarsten Otte 293814eebd91SCarsten Otte switch (reg->id) { 293929b7c71bSCarsten Otte case KVM_REG_S390_TODPR: 294029b7c71bSCarsten Otte r = put_user(vcpu->arch.sie_block->todpr, 294129b7c71bSCarsten Otte (u32 __user *)reg->addr); 294229b7c71bSCarsten Otte break; 294329b7c71bSCarsten Otte case KVM_REG_S390_EPOCHDIFF: 294429b7c71bSCarsten Otte r = put_user(vcpu->arch.sie_block->epoch, 294529b7c71bSCarsten Otte (u64 __user *)reg->addr); 294629b7c71bSCarsten Otte break; 294746a6dd1cSJason J. herne case KVM_REG_S390_CPU_TIMER: 29484287f247SDavid Hildenbrand r = put_user(kvm_s390_get_cpu_timer(vcpu), 294946a6dd1cSJason J. herne (u64 __user *)reg->addr); 295046a6dd1cSJason J. herne break; 295146a6dd1cSJason J. herne case KVM_REG_S390_CLOCK_COMP: 295246a6dd1cSJason J. herne r = put_user(vcpu->arch.sie_block->ckc, 295346a6dd1cSJason J. herne (u64 __user *)reg->addr); 295446a6dd1cSJason J. herne break; 2955536336c2SDominik Dingel case KVM_REG_S390_PFTOKEN: 2956536336c2SDominik Dingel r = put_user(vcpu->arch.pfault_token, 2957536336c2SDominik Dingel (u64 __user *)reg->addr); 2958536336c2SDominik Dingel break; 2959536336c2SDominik Dingel case KVM_REG_S390_PFCOMPARE: 2960536336c2SDominik Dingel r = put_user(vcpu->arch.pfault_compare, 2961536336c2SDominik Dingel (u64 __user *)reg->addr); 2962536336c2SDominik Dingel break; 2963536336c2SDominik Dingel case KVM_REG_S390_PFSELECT: 2964536336c2SDominik Dingel r = put_user(vcpu->arch.pfault_select, 2965536336c2SDominik Dingel (u64 __user *)reg->addr); 2966536336c2SDominik Dingel break; 2967672550fbSChristian Borntraeger case KVM_REG_S390_PP: 2968672550fbSChristian Borntraeger r = put_user(vcpu->arch.sie_block->pp, 2969672550fbSChristian Borntraeger (u64 __user *)reg->addr); 2970672550fbSChristian Borntraeger break; 2971afa45ff5SChristian Borntraeger case KVM_REG_S390_GBEA: 2972afa45ff5SChristian Borntraeger r = put_user(vcpu->arch.sie_block->gbea, 2973afa45ff5SChristian Borntraeger (u64 __user *)reg->addr); 2974afa45ff5SChristian Borntraeger break; 297514eebd91SCarsten Otte default: 297614eebd91SCarsten Otte break; 297714eebd91SCarsten Otte } 297814eebd91SCarsten Otte 297914eebd91SCarsten Otte return r; 298014eebd91SCarsten Otte } 298114eebd91SCarsten Otte 298214eebd91SCarsten Otte static int kvm_arch_vcpu_ioctl_set_one_reg(struct kvm_vcpu *vcpu, 298314eebd91SCarsten Otte struct kvm_one_reg *reg) 298414eebd91SCarsten Otte { 298514eebd91SCarsten Otte int r = -EINVAL; 29864287f247SDavid Hildenbrand __u64 val; 298714eebd91SCarsten Otte 298814eebd91SCarsten Otte switch (reg->id) { 298929b7c71bSCarsten Otte case KVM_REG_S390_TODPR: 299029b7c71bSCarsten Otte r = get_user(vcpu->arch.sie_block->todpr, 299129b7c71bSCarsten Otte (u32 __user *)reg->addr); 299229b7c71bSCarsten Otte break; 299329b7c71bSCarsten Otte case KVM_REG_S390_EPOCHDIFF: 299429b7c71bSCarsten Otte r = get_user(vcpu->arch.sie_block->epoch, 299529b7c71bSCarsten Otte (u64 __user *)reg->addr); 299629b7c71bSCarsten Otte break; 299746a6dd1cSJason J. herne case KVM_REG_S390_CPU_TIMER: 29984287f247SDavid Hildenbrand r = get_user(val, (u64 __user *)reg->addr); 29994287f247SDavid Hildenbrand if (!r) 30004287f247SDavid Hildenbrand kvm_s390_set_cpu_timer(vcpu, val); 300146a6dd1cSJason J. herne break; 300246a6dd1cSJason J. herne case KVM_REG_S390_CLOCK_COMP: 300346a6dd1cSJason J. herne r = get_user(vcpu->arch.sie_block->ckc, 300446a6dd1cSJason J. herne (u64 __user *)reg->addr); 300546a6dd1cSJason J. herne break; 3006536336c2SDominik Dingel case KVM_REG_S390_PFTOKEN: 3007536336c2SDominik Dingel r = get_user(vcpu->arch.pfault_token, 3008536336c2SDominik Dingel (u64 __user *)reg->addr); 30099fbd8082SDavid Hildenbrand if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID) 30109fbd8082SDavid Hildenbrand kvm_clear_async_pf_completion_queue(vcpu); 3011536336c2SDominik Dingel break; 3012536336c2SDominik Dingel case KVM_REG_S390_PFCOMPARE: 3013536336c2SDominik Dingel r = get_user(vcpu->arch.pfault_compare, 3014536336c2SDominik Dingel (u64 __user *)reg->addr); 3015536336c2SDominik Dingel break; 3016536336c2SDominik Dingel case KVM_REG_S390_PFSELECT: 3017536336c2SDominik Dingel r = get_user(vcpu->arch.pfault_select, 3018536336c2SDominik Dingel (u64 __user *)reg->addr); 3019536336c2SDominik Dingel break; 3020672550fbSChristian Borntraeger case KVM_REG_S390_PP: 3021672550fbSChristian Borntraeger r = get_user(vcpu->arch.sie_block->pp, 3022672550fbSChristian Borntraeger (u64 __user *)reg->addr); 3023672550fbSChristian Borntraeger break; 3024afa45ff5SChristian Borntraeger case KVM_REG_S390_GBEA: 3025afa45ff5SChristian Borntraeger r = get_user(vcpu->arch.sie_block->gbea, 3026afa45ff5SChristian Borntraeger (u64 __user *)reg->addr); 3027afa45ff5SChristian Borntraeger break; 302814eebd91SCarsten Otte default: 302914eebd91SCarsten Otte break; 303014eebd91SCarsten Otte } 303114eebd91SCarsten Otte 303214eebd91SCarsten Otte return r; 303314eebd91SCarsten Otte } 3034b6d33834SChristoffer Dall 3035b0c632dbSHeiko Carstens static int kvm_arch_vcpu_ioctl_initial_reset(struct kvm_vcpu *vcpu) 3036b0c632dbSHeiko Carstens { 3037b0c632dbSHeiko Carstens kvm_s390_vcpu_initial_reset(vcpu); 3038b0c632dbSHeiko Carstens return 0; 3039b0c632dbSHeiko Carstens } 3040b0c632dbSHeiko Carstens 3041b0c632dbSHeiko Carstens int kvm_arch_vcpu_ioctl_set_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs) 3042b0c632dbSHeiko Carstens { 3043875656feSChristoffer Dall vcpu_load(vcpu); 30445a32c1afSChristian Borntraeger memcpy(&vcpu->run->s.regs.gprs, ®s->gprs, sizeof(regs->gprs)); 3045875656feSChristoffer Dall vcpu_put(vcpu); 3046b0c632dbSHeiko Carstens return 0; 3047b0c632dbSHeiko Carstens } 3048b0c632dbSHeiko Carstens 3049b0c632dbSHeiko Carstens int kvm_arch_vcpu_ioctl_get_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs) 3050b0c632dbSHeiko Carstens { 30511fc9b76bSChristoffer Dall vcpu_load(vcpu); 30525a32c1afSChristian Borntraeger memcpy(®s->gprs, &vcpu->run->s.regs.gprs, sizeof(regs->gprs)); 30531fc9b76bSChristoffer Dall vcpu_put(vcpu); 3054b0c632dbSHeiko Carstens return 0; 3055b0c632dbSHeiko Carstens } 3056b0c632dbSHeiko Carstens 3057b0c632dbSHeiko Carstens int kvm_arch_vcpu_ioctl_set_sregs(struct kvm_vcpu *vcpu, 3058b0c632dbSHeiko Carstens struct kvm_sregs *sregs) 3059b0c632dbSHeiko Carstens { 3060b4ef9d4eSChristoffer Dall vcpu_load(vcpu); 3061b4ef9d4eSChristoffer Dall 306259674c1aSChristian Borntraeger memcpy(&vcpu->run->s.regs.acrs, &sregs->acrs, sizeof(sregs->acrs)); 3063b0c632dbSHeiko Carstens memcpy(&vcpu->arch.sie_block->gcr, &sregs->crs, sizeof(sregs->crs)); 3064b4ef9d4eSChristoffer Dall 3065b4ef9d4eSChristoffer Dall vcpu_put(vcpu); 3066b0c632dbSHeiko Carstens return 0; 3067b0c632dbSHeiko Carstens } 3068b0c632dbSHeiko Carstens 3069b0c632dbSHeiko Carstens int kvm_arch_vcpu_ioctl_get_sregs(struct kvm_vcpu *vcpu, 3070b0c632dbSHeiko Carstens struct kvm_sregs *sregs) 3071b0c632dbSHeiko Carstens { 3072bcdec41cSChristoffer Dall vcpu_load(vcpu); 3073bcdec41cSChristoffer Dall 307459674c1aSChristian Borntraeger memcpy(&sregs->acrs, &vcpu->run->s.regs.acrs, sizeof(sregs->acrs)); 3075b0c632dbSHeiko Carstens memcpy(&sregs->crs, &vcpu->arch.sie_block->gcr, sizeof(sregs->crs)); 3076bcdec41cSChristoffer Dall 3077bcdec41cSChristoffer Dall vcpu_put(vcpu); 3078b0c632dbSHeiko Carstens return 0; 3079b0c632dbSHeiko Carstens } 3080b0c632dbSHeiko Carstens 3081b0c632dbSHeiko Carstens int kvm_arch_vcpu_ioctl_set_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu) 3082b0c632dbSHeiko Carstens { 30836a96bc7fSChristoffer Dall int ret = 0; 30846a96bc7fSChristoffer Dall 30856a96bc7fSChristoffer Dall vcpu_load(vcpu); 30866a96bc7fSChristoffer Dall 30876a96bc7fSChristoffer Dall if (test_fp_ctl(fpu->fpc)) { 30886a96bc7fSChristoffer Dall ret = -EINVAL; 30896a96bc7fSChristoffer Dall goto out; 30906a96bc7fSChristoffer Dall } 3091e1788bb9SChristian Borntraeger vcpu->run->s.regs.fpc = fpu->fpc; 30929abc2a08SDavid Hildenbrand if (MACHINE_HAS_VX) 3093a7d4b8f2SDavid Hildenbrand convert_fp_to_vx((__vector128 *) vcpu->run->s.regs.vrs, 3094a7d4b8f2SDavid Hildenbrand (freg_t *) fpu->fprs); 30959abc2a08SDavid Hildenbrand else 3096a7d4b8f2SDavid Hildenbrand memcpy(vcpu->run->s.regs.fprs, &fpu->fprs, sizeof(fpu->fprs)); 30976a96bc7fSChristoffer Dall 30986a96bc7fSChristoffer Dall out: 30996a96bc7fSChristoffer Dall vcpu_put(vcpu); 31006a96bc7fSChristoffer Dall return ret; 3101b0c632dbSHeiko Carstens } 3102b0c632dbSHeiko Carstens 3103b0c632dbSHeiko Carstens int kvm_arch_vcpu_ioctl_get_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu) 3104b0c632dbSHeiko Carstens { 31051393123eSChristoffer Dall vcpu_load(vcpu); 31061393123eSChristoffer Dall 31079abc2a08SDavid Hildenbrand /* make sure we have the latest values */ 31089abc2a08SDavid Hildenbrand save_fpu_regs(); 31099abc2a08SDavid Hildenbrand if (MACHINE_HAS_VX) 3110a7d4b8f2SDavid Hildenbrand convert_vx_to_fp((freg_t *) fpu->fprs, 3111a7d4b8f2SDavid Hildenbrand (__vector128 *) vcpu->run->s.regs.vrs); 31129abc2a08SDavid Hildenbrand else 3113a7d4b8f2SDavid Hildenbrand memcpy(fpu->fprs, vcpu->run->s.regs.fprs, sizeof(fpu->fprs)); 3114e1788bb9SChristian Borntraeger fpu->fpc = vcpu->run->s.regs.fpc; 31151393123eSChristoffer Dall 31161393123eSChristoffer Dall vcpu_put(vcpu); 3117b0c632dbSHeiko Carstens return 0; 3118b0c632dbSHeiko Carstens } 3119b0c632dbSHeiko Carstens 3120b0c632dbSHeiko Carstens static int kvm_arch_vcpu_ioctl_set_initial_psw(struct kvm_vcpu *vcpu, psw_t psw) 3121b0c632dbSHeiko Carstens { 3122b0c632dbSHeiko Carstens int rc = 0; 3123b0c632dbSHeiko Carstens 31247a42fdc2SDavid Hildenbrand if (!is_vcpu_stopped(vcpu)) 3125b0c632dbSHeiko Carstens rc = -EBUSY; 3126d7b0b5ebSCarsten Otte else { 3127d7b0b5ebSCarsten Otte vcpu->run->psw_mask = psw.mask; 3128d7b0b5ebSCarsten Otte vcpu->run->psw_addr = psw.addr; 3129d7b0b5ebSCarsten Otte } 3130b0c632dbSHeiko Carstens return rc; 3131b0c632dbSHeiko Carstens } 3132b0c632dbSHeiko Carstens 3133b0c632dbSHeiko Carstens int kvm_arch_vcpu_ioctl_translate(struct kvm_vcpu *vcpu, 3134b0c632dbSHeiko Carstens struct kvm_translation *tr) 3135b0c632dbSHeiko Carstens { 3136b0c632dbSHeiko Carstens return -EINVAL; /* not implemented yet */ 3137b0c632dbSHeiko Carstens } 3138b0c632dbSHeiko Carstens 313927291e21SDavid Hildenbrand #define VALID_GUESTDBG_FLAGS (KVM_GUESTDBG_SINGLESTEP | \ 314027291e21SDavid Hildenbrand KVM_GUESTDBG_USE_HW_BP | \ 314127291e21SDavid Hildenbrand KVM_GUESTDBG_ENABLE) 314227291e21SDavid Hildenbrand 3143d0bfb940SJan Kiszka int kvm_arch_vcpu_ioctl_set_guest_debug(struct kvm_vcpu *vcpu, 3144d0bfb940SJan Kiszka struct kvm_guest_debug *dbg) 3145b0c632dbSHeiko Carstens { 314627291e21SDavid Hildenbrand int rc = 0; 314727291e21SDavid Hildenbrand 314866b56562SChristoffer Dall vcpu_load(vcpu); 314966b56562SChristoffer Dall 315027291e21SDavid Hildenbrand vcpu->guest_debug = 0; 315127291e21SDavid Hildenbrand kvm_s390_clear_bp_data(vcpu); 315227291e21SDavid Hildenbrand 315366b56562SChristoffer Dall if (dbg->control & ~VALID_GUESTDBG_FLAGS) { 315466b56562SChristoffer Dall rc = -EINVAL; 315566b56562SChristoffer Dall goto out; 315666b56562SChristoffer Dall } 315766b56562SChristoffer Dall if (!sclp.has_gpere) { 315866b56562SChristoffer Dall rc = -EINVAL; 315966b56562SChristoffer Dall goto out; 316066b56562SChristoffer Dall } 316127291e21SDavid Hildenbrand 316227291e21SDavid Hildenbrand if (dbg->control & KVM_GUESTDBG_ENABLE) { 316327291e21SDavid Hildenbrand vcpu->guest_debug = dbg->control; 316427291e21SDavid Hildenbrand /* enforce guest PER */ 3165ef8f4f49SDavid Hildenbrand kvm_s390_set_cpuflags(vcpu, CPUSTAT_P); 316627291e21SDavid Hildenbrand 316727291e21SDavid Hildenbrand if (dbg->control & KVM_GUESTDBG_USE_HW_BP) 316827291e21SDavid Hildenbrand rc = kvm_s390_import_bp_data(vcpu, dbg); 316927291e21SDavid Hildenbrand } else { 31709daecfc6SDavid Hildenbrand kvm_s390_clear_cpuflags(vcpu, CPUSTAT_P); 317127291e21SDavid Hildenbrand vcpu->arch.guestdbg.last_bp = 0; 317227291e21SDavid Hildenbrand } 317327291e21SDavid Hildenbrand 317427291e21SDavid Hildenbrand if (rc) { 317527291e21SDavid Hildenbrand vcpu->guest_debug = 0; 317627291e21SDavid Hildenbrand kvm_s390_clear_bp_data(vcpu); 31779daecfc6SDavid Hildenbrand kvm_s390_clear_cpuflags(vcpu, CPUSTAT_P); 317827291e21SDavid Hildenbrand } 317927291e21SDavid Hildenbrand 318066b56562SChristoffer Dall out: 318166b56562SChristoffer Dall vcpu_put(vcpu); 318227291e21SDavid Hildenbrand return rc; 3183b0c632dbSHeiko Carstens } 3184b0c632dbSHeiko Carstens 318562d9f0dbSMarcelo Tosatti int kvm_arch_vcpu_ioctl_get_mpstate(struct kvm_vcpu *vcpu, 318662d9f0dbSMarcelo Tosatti struct kvm_mp_state *mp_state) 318762d9f0dbSMarcelo Tosatti { 3188fd232561SChristoffer Dall int ret; 3189fd232561SChristoffer Dall 3190fd232561SChristoffer Dall vcpu_load(vcpu); 3191fd232561SChristoffer Dall 31926352e4d2SDavid Hildenbrand /* CHECK_STOP and LOAD are not supported yet */ 3193fd232561SChristoffer Dall ret = is_vcpu_stopped(vcpu) ? KVM_MP_STATE_STOPPED : 31946352e4d2SDavid Hildenbrand KVM_MP_STATE_OPERATING; 3195fd232561SChristoffer Dall 3196fd232561SChristoffer Dall vcpu_put(vcpu); 3197fd232561SChristoffer Dall return ret; 319862d9f0dbSMarcelo Tosatti } 319962d9f0dbSMarcelo Tosatti 320062d9f0dbSMarcelo Tosatti int kvm_arch_vcpu_ioctl_set_mpstate(struct kvm_vcpu *vcpu, 320162d9f0dbSMarcelo Tosatti struct kvm_mp_state *mp_state) 320262d9f0dbSMarcelo Tosatti { 32036352e4d2SDavid Hildenbrand int rc = 0; 32046352e4d2SDavid Hildenbrand 3205e83dff5eSChristoffer Dall vcpu_load(vcpu); 3206e83dff5eSChristoffer Dall 32076352e4d2SDavid Hildenbrand /* user space knows about this interface - let it control the state */ 32086352e4d2SDavid Hildenbrand vcpu->kvm->arch.user_cpu_state_ctrl = 1; 32096352e4d2SDavid Hildenbrand 32106352e4d2SDavid Hildenbrand switch (mp_state->mp_state) { 32116352e4d2SDavid Hildenbrand case KVM_MP_STATE_STOPPED: 32126352e4d2SDavid Hildenbrand kvm_s390_vcpu_stop(vcpu); 32136352e4d2SDavid Hildenbrand break; 32146352e4d2SDavid Hildenbrand case KVM_MP_STATE_OPERATING: 32156352e4d2SDavid Hildenbrand kvm_s390_vcpu_start(vcpu); 32166352e4d2SDavid Hildenbrand break; 32176352e4d2SDavid Hildenbrand case KVM_MP_STATE_LOAD: 32186352e4d2SDavid Hildenbrand case KVM_MP_STATE_CHECK_STOP: 32196352e4d2SDavid Hildenbrand /* fall through - CHECK_STOP and LOAD are not supported yet */ 32206352e4d2SDavid Hildenbrand default: 32216352e4d2SDavid Hildenbrand rc = -ENXIO; 32226352e4d2SDavid Hildenbrand } 32236352e4d2SDavid Hildenbrand 3224e83dff5eSChristoffer Dall vcpu_put(vcpu); 32256352e4d2SDavid Hildenbrand return rc; 322662d9f0dbSMarcelo Tosatti } 322762d9f0dbSMarcelo Tosatti 32288ad35755SDavid Hildenbrand static bool ibs_enabled(struct kvm_vcpu *vcpu) 32298ad35755SDavid Hildenbrand { 32308d5fb0dcSDavid Hildenbrand return kvm_s390_test_cpuflags(vcpu, CPUSTAT_IBS); 32318ad35755SDavid Hildenbrand } 32328ad35755SDavid Hildenbrand 32332c70fe44SChristian Borntraeger static int kvm_s390_handle_requests(struct kvm_vcpu *vcpu) 32342c70fe44SChristian Borntraeger { 32358ad35755SDavid Hildenbrand retry: 32368e236546SChristian Borntraeger kvm_s390_vcpu_request_handled(vcpu); 32372fa6e1e1SRadim Krčmář if (!kvm_request_pending(vcpu)) 3238586b7ccdSChristian Borntraeger return 0; 32392c70fe44SChristian Borntraeger /* 32402c70fe44SChristian Borntraeger * We use MMU_RELOAD just to re-arm the ipte notifier for the 3241b2d73b2aSMartin Schwidefsky * guest prefix page. gmap_mprotect_notify will wait on the ptl lock. 32422c70fe44SChristian Borntraeger * This ensures that the ipte instruction for this request has 32432c70fe44SChristian Borntraeger * already finished. We might race against a second unmapper that 32442c70fe44SChristian Borntraeger * wants to set the blocking bit. Lets just retry the request loop. 32452c70fe44SChristian Borntraeger */ 32468ad35755SDavid Hildenbrand if (kvm_check_request(KVM_REQ_MMU_RELOAD, vcpu)) { 32472c70fe44SChristian Borntraeger int rc; 3248b2d73b2aSMartin Schwidefsky rc = gmap_mprotect_notify(vcpu->arch.gmap, 3249fda902cbSMichael Mueller kvm_s390_get_prefix(vcpu), 3250b2d73b2aSMartin Schwidefsky PAGE_SIZE * 2, PROT_WRITE); 3251aca411a4SJulius Niedworok if (rc) { 3252aca411a4SJulius Niedworok kvm_make_request(KVM_REQ_MMU_RELOAD, vcpu); 32532c70fe44SChristian Borntraeger return rc; 3254aca411a4SJulius Niedworok } 32558ad35755SDavid Hildenbrand goto retry; 32562c70fe44SChristian Borntraeger } 32578ad35755SDavid Hildenbrand 3258d3d692c8SDavid Hildenbrand if (kvm_check_request(KVM_REQ_TLB_FLUSH, vcpu)) { 3259d3d692c8SDavid Hildenbrand vcpu->arch.sie_block->ihcpu = 0xffff; 3260d3d692c8SDavid Hildenbrand goto retry; 3261d3d692c8SDavid Hildenbrand } 3262d3d692c8SDavid Hildenbrand 32638ad35755SDavid Hildenbrand if (kvm_check_request(KVM_REQ_ENABLE_IBS, vcpu)) { 32648ad35755SDavid Hildenbrand if (!ibs_enabled(vcpu)) { 32658ad35755SDavid Hildenbrand trace_kvm_s390_enable_disable_ibs(vcpu->vcpu_id, 1); 3266ef8f4f49SDavid Hildenbrand kvm_s390_set_cpuflags(vcpu, CPUSTAT_IBS); 32678ad35755SDavid Hildenbrand } 32688ad35755SDavid Hildenbrand goto retry; 32698ad35755SDavid Hildenbrand } 32708ad35755SDavid Hildenbrand 32718ad35755SDavid Hildenbrand if (kvm_check_request(KVM_REQ_DISABLE_IBS, vcpu)) { 32728ad35755SDavid Hildenbrand if (ibs_enabled(vcpu)) { 32738ad35755SDavid Hildenbrand trace_kvm_s390_enable_disable_ibs(vcpu->vcpu_id, 0); 32749daecfc6SDavid Hildenbrand kvm_s390_clear_cpuflags(vcpu, CPUSTAT_IBS); 32758ad35755SDavid Hildenbrand } 32768ad35755SDavid Hildenbrand goto retry; 32778ad35755SDavid Hildenbrand } 32788ad35755SDavid Hildenbrand 32796502a34cSDavid Hildenbrand if (kvm_check_request(KVM_REQ_ICPT_OPEREXC, vcpu)) { 32806502a34cSDavid Hildenbrand vcpu->arch.sie_block->ictl |= ICTL_OPEREXC; 32816502a34cSDavid Hildenbrand goto retry; 32826502a34cSDavid Hildenbrand } 32836502a34cSDavid Hildenbrand 3284190df4a2SClaudio Imbrenda if (kvm_check_request(KVM_REQ_START_MIGRATION, vcpu)) { 3285190df4a2SClaudio Imbrenda /* 3286c9f0a2b8SJanosch Frank * Disable CMM virtualization; we will emulate the ESSA 3287190df4a2SClaudio Imbrenda * instruction manually, in order to provide additional 3288190df4a2SClaudio Imbrenda * functionalities needed for live migration. 3289190df4a2SClaudio Imbrenda */ 3290190df4a2SClaudio Imbrenda vcpu->arch.sie_block->ecb2 &= ~ECB2_CMMA; 3291190df4a2SClaudio Imbrenda goto retry; 3292190df4a2SClaudio Imbrenda } 3293190df4a2SClaudio Imbrenda 3294190df4a2SClaudio Imbrenda if (kvm_check_request(KVM_REQ_STOP_MIGRATION, vcpu)) { 3295190df4a2SClaudio Imbrenda /* 3296c9f0a2b8SJanosch Frank * Re-enable CMM virtualization if CMMA is available and 3297c9f0a2b8SJanosch Frank * CMM has been used. 3298190df4a2SClaudio Imbrenda */ 3299190df4a2SClaudio Imbrenda if ((vcpu->kvm->arch.use_cmma) && 3300c9f0a2b8SJanosch Frank (vcpu->kvm->mm->context.uses_cmm)) 3301190df4a2SClaudio Imbrenda vcpu->arch.sie_block->ecb2 |= ECB2_CMMA; 3302190df4a2SClaudio Imbrenda goto retry; 3303190df4a2SClaudio Imbrenda } 3304190df4a2SClaudio Imbrenda 33050759d068SDavid Hildenbrand /* nothing to do, just clear the request */ 330672875d8aSRadim Krčmář kvm_clear_request(KVM_REQ_UNHALT, vcpu); 33073194cdb7SDavid Hildenbrand /* we left the vsie handler, nothing to do, just clear the request */ 33083194cdb7SDavid Hildenbrand kvm_clear_request(KVM_REQ_VSIE_RESTART, vcpu); 33090759d068SDavid Hildenbrand 33102c70fe44SChristian Borntraeger return 0; 33112c70fe44SChristian Borntraeger } 33122c70fe44SChristian Borntraeger 33130e7def5fSDavid Hildenbrand void kvm_s390_set_tod_clock(struct kvm *kvm, 33148fa1696eSCollin L. Walling const struct kvm_s390_vm_tod_clock *gtod) 33158fa1696eSCollin L. Walling { 33168fa1696eSCollin L. Walling struct kvm_vcpu *vcpu; 33178fa1696eSCollin L. Walling struct kvm_s390_tod_clock_ext htod; 33188fa1696eSCollin L. Walling int i; 33198fa1696eSCollin L. Walling 33208fa1696eSCollin L. Walling mutex_lock(&kvm->lock); 33218fa1696eSCollin L. Walling preempt_disable(); 33228fa1696eSCollin L. Walling 33238fa1696eSCollin L. Walling get_tod_clock_ext((char *)&htod); 33248fa1696eSCollin L. Walling 33258fa1696eSCollin L. Walling kvm->arch.epoch = gtod->tod - htod.tod; 33260e7def5fSDavid Hildenbrand kvm->arch.epdx = 0; 33270e7def5fSDavid Hildenbrand if (test_kvm_facility(kvm, 139)) { 33288fa1696eSCollin L. Walling kvm->arch.epdx = gtod->epoch_idx - htod.epoch_idx; 33298fa1696eSCollin L. Walling if (kvm->arch.epoch > gtod->tod) 33308fa1696eSCollin L. Walling kvm->arch.epdx -= 1; 33310e7def5fSDavid Hildenbrand } 33328fa1696eSCollin L. Walling 33338fa1696eSCollin L. Walling kvm_s390_vcpu_block_all(kvm); 33348fa1696eSCollin L. Walling kvm_for_each_vcpu(i, vcpu, kvm) { 33358fa1696eSCollin L. Walling vcpu->arch.sie_block->epoch = kvm->arch.epoch; 33368fa1696eSCollin L. Walling vcpu->arch.sie_block->epdx = kvm->arch.epdx; 33378fa1696eSCollin L. Walling } 33388fa1696eSCollin L. Walling 33398fa1696eSCollin L. Walling kvm_s390_vcpu_unblock_all(kvm); 33408fa1696eSCollin L. Walling preempt_enable(); 33418fa1696eSCollin L. Walling mutex_unlock(&kvm->lock); 33428fa1696eSCollin L. Walling } 33438fa1696eSCollin L. Walling 3344fa576c58SThomas Huth /** 3345fa576c58SThomas Huth * kvm_arch_fault_in_page - fault-in guest page if necessary 3346fa576c58SThomas Huth * @vcpu: The corresponding virtual cpu 3347fa576c58SThomas Huth * @gpa: Guest physical address 3348fa576c58SThomas Huth * @writable: Whether the page should be writable or not 3349fa576c58SThomas Huth * 3350fa576c58SThomas Huth * Make sure that a guest page has been faulted-in on the host. 3351fa576c58SThomas Huth * 3352fa576c58SThomas Huth * Return: Zero on success, negative error code otherwise. 3353fa576c58SThomas Huth */ 3354fa576c58SThomas Huth long kvm_arch_fault_in_page(struct kvm_vcpu *vcpu, gpa_t gpa, int writable) 335524eb3a82SDominik Dingel { 3356527e30b4SMartin Schwidefsky return gmap_fault(vcpu->arch.gmap, gpa, 3357527e30b4SMartin Schwidefsky writable ? FAULT_FLAG_WRITE : 0); 335824eb3a82SDominik Dingel } 335924eb3a82SDominik Dingel 33603c038e6bSDominik Dingel static void __kvm_inject_pfault_token(struct kvm_vcpu *vcpu, bool start_token, 33613c038e6bSDominik Dingel unsigned long token) 33623c038e6bSDominik Dingel { 33633c038e6bSDominik Dingel struct kvm_s390_interrupt inti; 3364383d0b05SJens Freimann struct kvm_s390_irq irq; 33653c038e6bSDominik Dingel 33663c038e6bSDominik Dingel if (start_token) { 3367383d0b05SJens Freimann irq.u.ext.ext_params2 = token; 3368383d0b05SJens Freimann irq.type = KVM_S390_INT_PFAULT_INIT; 3369383d0b05SJens Freimann WARN_ON_ONCE(kvm_s390_inject_vcpu(vcpu, &irq)); 33703c038e6bSDominik Dingel } else { 33713c038e6bSDominik Dingel inti.type = KVM_S390_INT_PFAULT_DONE; 3372383d0b05SJens Freimann inti.parm64 = token; 33733c038e6bSDominik Dingel WARN_ON_ONCE(kvm_s390_inject_vm(vcpu->kvm, &inti)); 33743c038e6bSDominik Dingel } 33753c038e6bSDominik Dingel } 33763c038e6bSDominik Dingel 33773c038e6bSDominik Dingel void kvm_arch_async_page_not_present(struct kvm_vcpu *vcpu, 33783c038e6bSDominik Dingel struct kvm_async_pf *work) 33793c038e6bSDominik Dingel { 33803c038e6bSDominik Dingel trace_kvm_s390_pfault_init(vcpu, work->arch.pfault_token); 33813c038e6bSDominik Dingel __kvm_inject_pfault_token(vcpu, true, work->arch.pfault_token); 33823c038e6bSDominik Dingel } 33833c038e6bSDominik Dingel 33843c038e6bSDominik Dingel void kvm_arch_async_page_present(struct kvm_vcpu *vcpu, 33853c038e6bSDominik Dingel struct kvm_async_pf *work) 33863c038e6bSDominik Dingel { 33873c038e6bSDominik Dingel trace_kvm_s390_pfault_done(vcpu, work->arch.pfault_token); 33883c038e6bSDominik Dingel __kvm_inject_pfault_token(vcpu, false, work->arch.pfault_token); 33893c038e6bSDominik Dingel } 33903c038e6bSDominik Dingel 33913c038e6bSDominik Dingel void kvm_arch_async_page_ready(struct kvm_vcpu *vcpu, 33923c038e6bSDominik Dingel struct kvm_async_pf *work) 33933c038e6bSDominik Dingel { 33943c038e6bSDominik Dingel /* s390 will always inject the page directly */ 33953c038e6bSDominik Dingel } 33963c038e6bSDominik Dingel 33973c038e6bSDominik Dingel bool kvm_arch_can_inject_async_page_present(struct kvm_vcpu *vcpu) 33983c038e6bSDominik Dingel { 33993c038e6bSDominik Dingel /* 34003c038e6bSDominik Dingel * s390 will always inject the page directly, 34013c038e6bSDominik Dingel * but we still want check_async_completion to cleanup 34023c038e6bSDominik Dingel */ 34033c038e6bSDominik Dingel return true; 34043c038e6bSDominik Dingel } 34053c038e6bSDominik Dingel 34063c038e6bSDominik Dingel static int kvm_arch_setup_async_pf(struct kvm_vcpu *vcpu) 34073c038e6bSDominik Dingel { 34083c038e6bSDominik Dingel hva_t hva; 34093c038e6bSDominik Dingel struct kvm_arch_async_pf arch; 34103c038e6bSDominik Dingel int rc; 34113c038e6bSDominik Dingel 34123c038e6bSDominik Dingel if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID) 34133c038e6bSDominik Dingel return 0; 34143c038e6bSDominik Dingel if ((vcpu->arch.sie_block->gpsw.mask & vcpu->arch.pfault_select) != 34153c038e6bSDominik Dingel vcpu->arch.pfault_compare) 34163c038e6bSDominik Dingel return 0; 34173c038e6bSDominik Dingel if (psw_extint_disabled(vcpu)) 34183c038e6bSDominik Dingel return 0; 34199a022067SDavid Hildenbrand if (kvm_s390_vcpu_has_irq(vcpu, 0)) 34203c038e6bSDominik Dingel return 0; 3421b9224cd7SDavid Hildenbrand if (!(vcpu->arch.sie_block->gcr[0] & CR0_SERVICE_SIGNAL_SUBMASK)) 34223c038e6bSDominik Dingel return 0; 34233c038e6bSDominik Dingel if (!vcpu->arch.gmap->pfault_enabled) 34243c038e6bSDominik Dingel return 0; 34253c038e6bSDominik Dingel 342681480cc1SHeiko Carstens hva = gfn_to_hva(vcpu->kvm, gpa_to_gfn(current->thread.gmap_addr)); 342781480cc1SHeiko Carstens hva += current->thread.gmap_addr & ~PAGE_MASK; 342881480cc1SHeiko Carstens if (read_guest_real(vcpu, vcpu->arch.pfault_token, &arch.pfault_token, 8)) 34293c038e6bSDominik Dingel return 0; 34303c038e6bSDominik Dingel 34313c038e6bSDominik Dingel rc = kvm_setup_async_pf(vcpu, current->thread.gmap_addr, hva, &arch); 34323c038e6bSDominik Dingel return rc; 34333c038e6bSDominik Dingel } 34343c038e6bSDominik Dingel 34353fb4c40fSThomas Huth static int vcpu_pre_run(struct kvm_vcpu *vcpu) 3436b0c632dbSHeiko Carstens { 34373fb4c40fSThomas Huth int rc, cpuflags; 3438e168bf8dSCarsten Otte 34393c038e6bSDominik Dingel /* 34403c038e6bSDominik Dingel * On s390 notifications for arriving pages will be delivered directly 34413c038e6bSDominik Dingel * to the guest but the house keeping for completed pfaults is 34423c038e6bSDominik Dingel * handled outside the worker. 34433c038e6bSDominik Dingel */ 34443c038e6bSDominik Dingel kvm_check_async_pf_completion(vcpu); 34453c038e6bSDominik Dingel 34467ec7c8c7SChristian Borntraeger vcpu->arch.sie_block->gg14 = vcpu->run->s.regs.gprs[14]; 34477ec7c8c7SChristian Borntraeger vcpu->arch.sie_block->gg15 = vcpu->run->s.regs.gprs[15]; 3448b0c632dbSHeiko Carstens 3449b0c632dbSHeiko Carstens if (need_resched()) 3450b0c632dbSHeiko Carstens schedule(); 3451b0c632dbSHeiko Carstens 3452d3a73acbSMartin Schwidefsky if (test_cpu_flag(CIF_MCCK_PENDING)) 345371cde587SChristian Borntraeger s390_handle_mcck(); 345471cde587SChristian Borntraeger 345579395031SJens Freimann if (!kvm_is_ucontrol(vcpu->kvm)) { 345679395031SJens Freimann rc = kvm_s390_deliver_pending_interrupts(vcpu); 345779395031SJens Freimann if (rc) 345879395031SJens Freimann return rc; 345979395031SJens Freimann } 34600ff31867SCarsten Otte 34612c70fe44SChristian Borntraeger rc = kvm_s390_handle_requests(vcpu); 34622c70fe44SChristian Borntraeger if (rc) 34632c70fe44SChristian Borntraeger return rc; 34642c70fe44SChristian Borntraeger 346527291e21SDavid Hildenbrand if (guestdbg_enabled(vcpu)) { 346627291e21SDavid Hildenbrand kvm_s390_backup_guest_per_regs(vcpu); 346727291e21SDavid Hildenbrand kvm_s390_patch_guest_per_regs(vcpu); 346827291e21SDavid Hildenbrand } 346927291e21SDavid Hildenbrand 34709f30f621SMichael Mueller clear_bit(vcpu->vcpu_id, vcpu->kvm->arch.gisa_int.kicked_mask); 34719f30f621SMichael Mueller 3472b0c632dbSHeiko Carstens vcpu->arch.sie_block->icptcode = 0; 34733fb4c40fSThomas Huth cpuflags = atomic_read(&vcpu->arch.sie_block->cpuflags); 34743fb4c40fSThomas Huth VCPU_EVENT(vcpu, 6, "entering sie flags %x", cpuflags); 34753fb4c40fSThomas Huth trace_kvm_s390_sie_enter(vcpu, cpuflags); 34762b29a9fdSDominik Dingel 34773fb4c40fSThomas Huth return 0; 34783fb4c40fSThomas Huth } 34793fb4c40fSThomas Huth 3480492d8642SThomas Huth static int vcpu_post_run_fault_in_sie(struct kvm_vcpu *vcpu) 3481492d8642SThomas Huth { 348256317920SDavid Hildenbrand struct kvm_s390_pgm_info pgm_info = { 348356317920SDavid Hildenbrand .code = PGM_ADDRESSING, 348456317920SDavid Hildenbrand }; 348556317920SDavid Hildenbrand u8 opcode, ilen; 3486492d8642SThomas Huth int rc; 3487492d8642SThomas Huth 3488492d8642SThomas Huth VCPU_EVENT(vcpu, 3, "%s", "fault in sie instruction"); 3489492d8642SThomas Huth trace_kvm_s390_sie_fault(vcpu); 3490492d8642SThomas Huth 3491492d8642SThomas Huth /* 3492492d8642SThomas Huth * We want to inject an addressing exception, which is defined as a 3493492d8642SThomas Huth * suppressing or terminating exception. However, since we came here 3494492d8642SThomas Huth * by a DAT access exception, the PSW still points to the faulting 3495492d8642SThomas Huth * instruction since DAT exceptions are nullifying. So we've got 3496492d8642SThomas Huth * to look up the current opcode to get the length of the instruction 3497492d8642SThomas Huth * to be able to forward the PSW. 3498492d8642SThomas Huth */ 34993fa8cad7SDavid Hildenbrand rc = read_guest_instr(vcpu, vcpu->arch.sie_block->gpsw.addr, &opcode, 1); 350056317920SDavid Hildenbrand ilen = insn_length(opcode); 35019b0d721aSDavid Hildenbrand if (rc < 0) { 35029b0d721aSDavid Hildenbrand return rc; 35039b0d721aSDavid Hildenbrand } else if (rc) { 35049b0d721aSDavid Hildenbrand /* Instruction-Fetching Exceptions - we can't detect the ilen. 35059b0d721aSDavid Hildenbrand * Forward by arbitrary ilc, injection will take care of 35069b0d721aSDavid Hildenbrand * nullification if necessary. 35079b0d721aSDavid Hildenbrand */ 35089b0d721aSDavid Hildenbrand pgm_info = vcpu->arch.pgm; 35099b0d721aSDavid Hildenbrand ilen = 4; 35109b0d721aSDavid Hildenbrand } 351156317920SDavid Hildenbrand pgm_info.flags = ilen | KVM_S390_PGM_FLAGS_ILC_VALID; 351256317920SDavid Hildenbrand kvm_s390_forward_psw(vcpu, ilen); 351356317920SDavid Hildenbrand return kvm_s390_inject_prog_irq(vcpu, &pgm_info); 3514492d8642SThomas Huth } 3515492d8642SThomas Huth 35163fb4c40fSThomas Huth static int vcpu_post_run(struct kvm_vcpu *vcpu, int exit_reason) 35173fb4c40fSThomas Huth { 35184d62fcc0SQingFeng Hao struct mcck_volatile_info *mcck_info; 35194d62fcc0SQingFeng Hao struct sie_page *sie_page; 35204d62fcc0SQingFeng Hao 35212b29a9fdSDominik Dingel VCPU_EVENT(vcpu, 6, "exit sie icptcode %d", 35222b29a9fdSDominik Dingel vcpu->arch.sie_block->icptcode); 35232b29a9fdSDominik Dingel trace_kvm_s390_sie_exit(vcpu, vcpu->arch.sie_block->icptcode); 35242b29a9fdSDominik Dingel 352527291e21SDavid Hildenbrand if (guestdbg_enabled(vcpu)) 352627291e21SDavid Hildenbrand kvm_s390_restore_guest_per_regs(vcpu); 352727291e21SDavid Hildenbrand 35287ec7c8c7SChristian Borntraeger vcpu->run->s.regs.gprs[14] = vcpu->arch.sie_block->gg14; 35297ec7c8c7SChristian Borntraeger vcpu->run->s.regs.gprs[15] = vcpu->arch.sie_block->gg15; 353071f116bfSDavid Hildenbrand 35314d62fcc0SQingFeng Hao if (exit_reason == -EINTR) { 35324d62fcc0SQingFeng Hao VCPU_EVENT(vcpu, 3, "%s", "machine check"); 35334d62fcc0SQingFeng Hao sie_page = container_of(vcpu->arch.sie_block, 35344d62fcc0SQingFeng Hao struct sie_page, sie_block); 35354d62fcc0SQingFeng Hao mcck_info = &sie_page->mcck_info; 35364d62fcc0SQingFeng Hao kvm_s390_reinject_machine_check(vcpu, mcck_info); 35374d62fcc0SQingFeng Hao return 0; 35384d62fcc0SQingFeng Hao } 35394d62fcc0SQingFeng Hao 354071f116bfSDavid Hildenbrand if (vcpu->arch.sie_block->icptcode > 0) { 354171f116bfSDavid Hildenbrand int rc = kvm_handle_sie_intercept(vcpu); 354271f116bfSDavid Hildenbrand 354371f116bfSDavid Hildenbrand if (rc != -EOPNOTSUPP) 354471f116bfSDavid Hildenbrand return rc; 354571f116bfSDavid Hildenbrand vcpu->run->exit_reason = KVM_EXIT_S390_SIEIC; 354671f116bfSDavid Hildenbrand vcpu->run->s390_sieic.icptcode = vcpu->arch.sie_block->icptcode; 354771f116bfSDavid Hildenbrand vcpu->run->s390_sieic.ipa = vcpu->arch.sie_block->ipa; 354871f116bfSDavid Hildenbrand vcpu->run->s390_sieic.ipb = vcpu->arch.sie_block->ipb; 354971f116bfSDavid Hildenbrand return -EREMOTE; 355071f116bfSDavid Hildenbrand } else if (exit_reason != -EFAULT) { 355171f116bfSDavid Hildenbrand vcpu->stat.exit_null++; 355271f116bfSDavid Hildenbrand return 0; 3553210b1607SThomas Huth } else if (kvm_is_ucontrol(vcpu->kvm)) { 3554210b1607SThomas Huth vcpu->run->exit_reason = KVM_EXIT_S390_UCONTROL; 3555210b1607SThomas Huth vcpu->run->s390_ucontrol.trans_exc_code = 3556210b1607SThomas Huth current->thread.gmap_addr; 3557210b1607SThomas Huth vcpu->run->s390_ucontrol.pgm_code = 0x10; 355871f116bfSDavid Hildenbrand return -EREMOTE; 355924eb3a82SDominik Dingel } else if (current->thread.gmap_pfault) { 35603c038e6bSDominik Dingel trace_kvm_s390_major_guest_pfault(vcpu); 356124eb3a82SDominik Dingel current->thread.gmap_pfault = 0; 356271f116bfSDavid Hildenbrand if (kvm_arch_setup_async_pf(vcpu)) 356371f116bfSDavid Hildenbrand return 0; 356471f116bfSDavid Hildenbrand return kvm_arch_fault_in_page(vcpu, current->thread.gmap_addr, 1); 3565fa576c58SThomas Huth } 356671f116bfSDavid Hildenbrand return vcpu_post_run_fault_in_sie(vcpu); 35673fb4c40fSThomas Huth } 35683fb4c40fSThomas Huth 35693fb4c40fSThomas Huth static int __vcpu_run(struct kvm_vcpu *vcpu) 35703fb4c40fSThomas Huth { 35713fb4c40fSThomas Huth int rc, exit_reason; 35723fb4c40fSThomas Huth 3573800c1065SThomas Huth /* 3574800c1065SThomas Huth * We try to hold kvm->srcu during most of vcpu_run (except when run- 3575800c1065SThomas Huth * ning the guest), so that memslots (and other stuff) are protected 3576800c1065SThomas Huth */ 3577800c1065SThomas Huth vcpu->srcu_idx = srcu_read_lock(&vcpu->kvm->srcu); 3578800c1065SThomas Huth 3579a76ccff6SThomas Huth do { 35803fb4c40fSThomas Huth rc = vcpu_pre_run(vcpu); 35813fb4c40fSThomas Huth if (rc) 3582a76ccff6SThomas Huth break; 35833fb4c40fSThomas Huth 3584800c1065SThomas Huth srcu_read_unlock(&vcpu->kvm->srcu, vcpu->srcu_idx); 35853fb4c40fSThomas Huth /* 3586a76ccff6SThomas Huth * As PF_VCPU will be used in fault handler, between 3587a76ccff6SThomas Huth * guest_enter and guest_exit should be no uaccess. 35883fb4c40fSThomas Huth */ 35890097d12eSChristian Borntraeger local_irq_disable(); 35906edaa530SPaolo Bonzini guest_enter_irqoff(); 3591db0758b2SDavid Hildenbrand __disable_cpu_timer_accounting(vcpu); 35920097d12eSChristian Borntraeger local_irq_enable(); 3593a76ccff6SThomas Huth exit_reason = sie64a(vcpu->arch.sie_block, 3594a76ccff6SThomas Huth vcpu->run->s.regs.gprs); 35950097d12eSChristian Borntraeger local_irq_disable(); 3596db0758b2SDavid Hildenbrand __enable_cpu_timer_accounting(vcpu); 35976edaa530SPaolo Bonzini guest_exit_irqoff(); 35980097d12eSChristian Borntraeger local_irq_enable(); 3599800c1065SThomas Huth vcpu->srcu_idx = srcu_read_lock(&vcpu->kvm->srcu); 36003fb4c40fSThomas Huth 36013fb4c40fSThomas Huth rc = vcpu_post_run(vcpu, exit_reason); 360227291e21SDavid Hildenbrand } while (!signal_pending(current) && !guestdbg_exit_pending(vcpu) && !rc); 36033fb4c40fSThomas Huth 3604800c1065SThomas Huth srcu_read_unlock(&vcpu->kvm->srcu, vcpu->srcu_idx); 3605e168bf8dSCarsten Otte return rc; 3606b0c632dbSHeiko Carstens } 3607b0c632dbSHeiko Carstens 3608b028ee3eSDavid Hildenbrand static void sync_regs(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run) 3609b028ee3eSDavid Hildenbrand { 36104d5f2c04SChristian Borntraeger struct runtime_instr_cb *riccb; 36114e0b1ab7SFan Zhang struct gs_cb *gscb; 36124d5f2c04SChristian Borntraeger 36134d5f2c04SChristian Borntraeger riccb = (struct runtime_instr_cb *) &kvm_run->s.regs.riccb; 36144e0b1ab7SFan Zhang gscb = (struct gs_cb *) &kvm_run->s.regs.gscb; 3615b028ee3eSDavid Hildenbrand vcpu->arch.sie_block->gpsw.mask = kvm_run->psw_mask; 3616b028ee3eSDavid Hildenbrand vcpu->arch.sie_block->gpsw.addr = kvm_run->psw_addr; 3617b028ee3eSDavid Hildenbrand if (kvm_run->kvm_dirty_regs & KVM_SYNC_PREFIX) 3618b028ee3eSDavid Hildenbrand kvm_s390_set_prefix(vcpu, kvm_run->s.regs.prefix); 3619b028ee3eSDavid Hildenbrand if (kvm_run->kvm_dirty_regs & KVM_SYNC_CRS) { 3620b028ee3eSDavid Hildenbrand memcpy(&vcpu->arch.sie_block->gcr, &kvm_run->s.regs.crs, 128); 3621d3d692c8SDavid Hildenbrand /* some control register changes require a tlb flush */ 3622d3d692c8SDavid Hildenbrand kvm_make_request(KVM_REQ_TLB_FLUSH, vcpu); 3623b028ee3eSDavid Hildenbrand } 3624b028ee3eSDavid Hildenbrand if (kvm_run->kvm_dirty_regs & KVM_SYNC_ARCH0) { 36254287f247SDavid Hildenbrand kvm_s390_set_cpu_timer(vcpu, kvm_run->s.regs.cputm); 3626b028ee3eSDavid Hildenbrand vcpu->arch.sie_block->ckc = kvm_run->s.regs.ckc; 3627b028ee3eSDavid Hildenbrand vcpu->arch.sie_block->todpr = kvm_run->s.regs.todpr; 3628b028ee3eSDavid Hildenbrand vcpu->arch.sie_block->pp = kvm_run->s.regs.pp; 3629b028ee3eSDavid Hildenbrand vcpu->arch.sie_block->gbea = kvm_run->s.regs.gbea; 3630b028ee3eSDavid Hildenbrand } 3631b028ee3eSDavid Hildenbrand if (kvm_run->kvm_dirty_regs & KVM_SYNC_PFAULT) { 3632b028ee3eSDavid Hildenbrand vcpu->arch.pfault_token = kvm_run->s.regs.pft; 3633b028ee3eSDavid Hildenbrand vcpu->arch.pfault_select = kvm_run->s.regs.pfs; 3634b028ee3eSDavid Hildenbrand vcpu->arch.pfault_compare = kvm_run->s.regs.pfc; 36359fbd8082SDavid Hildenbrand if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID) 36369fbd8082SDavid Hildenbrand kvm_clear_async_pf_completion_queue(vcpu); 3637b028ee3eSDavid Hildenbrand } 363880cd8763SFan Zhang /* 363980cd8763SFan Zhang * If userspace sets the riccb (e.g. after migration) to a valid state, 364080cd8763SFan Zhang * we should enable RI here instead of doing the lazy enablement. 364180cd8763SFan Zhang */ 364280cd8763SFan Zhang if ((kvm_run->kvm_dirty_regs & KVM_SYNC_RICCB) && 36434d5f2c04SChristian Borntraeger test_kvm_facility(vcpu->kvm, 64) && 3644bb59c2daSAlice Frosi riccb->v && 36450c9d8683SDavid Hildenbrand !(vcpu->arch.sie_block->ecb3 & ECB3_RI)) { 36464d5f2c04SChristian Borntraeger VCPU_EVENT(vcpu, 3, "%s", "ENABLE: RI (sync_regs)"); 36470c9d8683SDavid Hildenbrand vcpu->arch.sie_block->ecb3 |= ECB3_RI; 364880cd8763SFan Zhang } 36494e0b1ab7SFan Zhang /* 36504e0b1ab7SFan Zhang * If userspace sets the gscb (e.g. after migration) to non-zero, 36514e0b1ab7SFan Zhang * we should enable GS here instead of doing the lazy enablement. 36524e0b1ab7SFan Zhang */ 36534e0b1ab7SFan Zhang if ((kvm_run->kvm_dirty_regs & KVM_SYNC_GSCB) && 36544e0b1ab7SFan Zhang test_kvm_facility(vcpu->kvm, 133) && 36554e0b1ab7SFan Zhang gscb->gssm && 36564e0b1ab7SFan Zhang !vcpu->arch.gs_enabled) { 36574e0b1ab7SFan Zhang VCPU_EVENT(vcpu, 3, "%s", "ENABLE: GS (sync_regs)"); 36584e0b1ab7SFan Zhang vcpu->arch.sie_block->ecb |= ECB_GS; 36594e0b1ab7SFan Zhang vcpu->arch.sie_block->ecd |= ECD_HOSTREGMGMT; 36604e0b1ab7SFan Zhang vcpu->arch.gs_enabled = 1; 366180cd8763SFan Zhang } 366235b3fde6SChristian Borntraeger if ((kvm_run->kvm_dirty_regs & KVM_SYNC_BPBC) && 366335b3fde6SChristian Borntraeger test_kvm_facility(vcpu->kvm, 82)) { 366435b3fde6SChristian Borntraeger vcpu->arch.sie_block->fpf &= ~FPF_BPBC; 366535b3fde6SChristian Borntraeger vcpu->arch.sie_block->fpf |= kvm_run->s.regs.bpbc ? FPF_BPBC : 0; 366635b3fde6SChristian Borntraeger } 366731d8b8d4SChristian Borntraeger save_access_regs(vcpu->arch.host_acrs); 366831d8b8d4SChristian Borntraeger restore_access_regs(vcpu->run->s.regs.acrs); 3669e1788bb9SChristian Borntraeger /* save host (userspace) fprs/vrs */ 3670e1788bb9SChristian Borntraeger save_fpu_regs(); 3671e1788bb9SChristian Borntraeger vcpu->arch.host_fpregs.fpc = current->thread.fpu.fpc; 3672e1788bb9SChristian Borntraeger vcpu->arch.host_fpregs.regs = current->thread.fpu.regs; 3673e1788bb9SChristian Borntraeger if (MACHINE_HAS_VX) 3674e1788bb9SChristian Borntraeger current->thread.fpu.regs = vcpu->run->s.regs.vrs; 3675e1788bb9SChristian Borntraeger else 3676e1788bb9SChristian Borntraeger current->thread.fpu.regs = vcpu->run->s.regs.fprs; 3677e1788bb9SChristian Borntraeger current->thread.fpu.fpc = vcpu->run->s.regs.fpc; 3678e1788bb9SChristian Borntraeger if (test_fp_ctl(current->thread.fpu.fpc)) 3679e1788bb9SChristian Borntraeger /* User space provided an invalid FPC, let's clear it */ 3680e1788bb9SChristian Borntraeger current->thread.fpu.fpc = 0; 36814e0b1ab7SFan Zhang if (MACHINE_HAS_GS) { 36824e0b1ab7SFan Zhang preempt_disable(); 36834e0b1ab7SFan Zhang __ctl_set_bit(2, 4); 36844e0b1ab7SFan Zhang if (current->thread.gs_cb) { 36854e0b1ab7SFan Zhang vcpu->arch.host_gscb = current->thread.gs_cb; 36864e0b1ab7SFan Zhang save_gs_cb(vcpu->arch.host_gscb); 36874e0b1ab7SFan Zhang } 36884e0b1ab7SFan Zhang if (vcpu->arch.gs_enabled) { 36894e0b1ab7SFan Zhang current->thread.gs_cb = (struct gs_cb *) 36904e0b1ab7SFan Zhang &vcpu->run->s.regs.gscb; 36914e0b1ab7SFan Zhang restore_gs_cb(current->thread.gs_cb); 36924e0b1ab7SFan Zhang } 36934e0b1ab7SFan Zhang preempt_enable(); 36944e0b1ab7SFan Zhang } 3695a3da7b4aSChristian Borntraeger /* SIE will load etoken directly from SDNX and therefore kvm_run */ 369680cd8763SFan Zhang 3697b028ee3eSDavid Hildenbrand kvm_run->kvm_dirty_regs = 0; 3698b028ee3eSDavid Hildenbrand } 3699b028ee3eSDavid Hildenbrand 3700b028ee3eSDavid Hildenbrand static void store_regs(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run) 3701b028ee3eSDavid Hildenbrand { 3702b028ee3eSDavid Hildenbrand kvm_run->psw_mask = vcpu->arch.sie_block->gpsw.mask; 3703b028ee3eSDavid Hildenbrand kvm_run->psw_addr = vcpu->arch.sie_block->gpsw.addr; 3704b028ee3eSDavid Hildenbrand kvm_run->s.regs.prefix = kvm_s390_get_prefix(vcpu); 3705b028ee3eSDavid Hildenbrand memcpy(&kvm_run->s.regs.crs, &vcpu->arch.sie_block->gcr, 128); 37064287f247SDavid Hildenbrand kvm_run->s.regs.cputm = kvm_s390_get_cpu_timer(vcpu); 3707b028ee3eSDavid Hildenbrand kvm_run->s.regs.ckc = vcpu->arch.sie_block->ckc; 3708b028ee3eSDavid Hildenbrand kvm_run->s.regs.todpr = vcpu->arch.sie_block->todpr; 3709b028ee3eSDavid Hildenbrand kvm_run->s.regs.pp = vcpu->arch.sie_block->pp; 3710b028ee3eSDavid Hildenbrand kvm_run->s.regs.gbea = vcpu->arch.sie_block->gbea; 3711b028ee3eSDavid Hildenbrand kvm_run->s.regs.pft = vcpu->arch.pfault_token; 3712b028ee3eSDavid Hildenbrand kvm_run->s.regs.pfs = vcpu->arch.pfault_select; 3713b028ee3eSDavid Hildenbrand kvm_run->s.regs.pfc = vcpu->arch.pfault_compare; 371435b3fde6SChristian Borntraeger kvm_run->s.regs.bpbc = (vcpu->arch.sie_block->fpf & FPF_BPBC) == FPF_BPBC; 371531d8b8d4SChristian Borntraeger save_access_regs(vcpu->run->s.regs.acrs); 371631d8b8d4SChristian Borntraeger restore_access_regs(vcpu->arch.host_acrs); 3717e1788bb9SChristian Borntraeger /* Save guest register state */ 3718e1788bb9SChristian Borntraeger save_fpu_regs(); 3719e1788bb9SChristian Borntraeger vcpu->run->s.regs.fpc = current->thread.fpu.fpc; 3720e1788bb9SChristian Borntraeger /* Restore will be done lazily at return */ 3721e1788bb9SChristian Borntraeger current->thread.fpu.fpc = vcpu->arch.host_fpregs.fpc; 3722e1788bb9SChristian Borntraeger current->thread.fpu.regs = vcpu->arch.host_fpregs.regs; 37234e0b1ab7SFan Zhang if (MACHINE_HAS_GS) { 37244e0b1ab7SFan Zhang __ctl_set_bit(2, 4); 37254e0b1ab7SFan Zhang if (vcpu->arch.gs_enabled) 37264e0b1ab7SFan Zhang save_gs_cb(current->thread.gs_cb); 37274e0b1ab7SFan Zhang preempt_disable(); 37284e0b1ab7SFan Zhang current->thread.gs_cb = vcpu->arch.host_gscb; 37294e0b1ab7SFan Zhang restore_gs_cb(vcpu->arch.host_gscb); 37304e0b1ab7SFan Zhang preempt_enable(); 37314e0b1ab7SFan Zhang if (!vcpu->arch.host_gscb) 37324e0b1ab7SFan Zhang __ctl_clear_bit(2, 4); 37334e0b1ab7SFan Zhang vcpu->arch.host_gscb = NULL; 37344e0b1ab7SFan Zhang } 3735a3da7b4aSChristian Borntraeger /* SIE will save etoken directly into SDNX and therefore kvm_run */ 3736b028ee3eSDavid Hildenbrand } 3737b028ee3eSDavid Hildenbrand 3738b0c632dbSHeiko Carstens int kvm_arch_vcpu_ioctl_run(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run) 3739b0c632dbSHeiko Carstens { 37408f2abe6aSChristian Borntraeger int rc; 3741b0c632dbSHeiko Carstens 3742460df4c1SPaolo Bonzini if (kvm_run->immediate_exit) 3743460df4c1SPaolo Bonzini return -EINTR; 3744460df4c1SPaolo Bonzini 3745accb757dSChristoffer Dall vcpu_load(vcpu); 3746accb757dSChristoffer Dall 374727291e21SDavid Hildenbrand if (guestdbg_exit_pending(vcpu)) { 374827291e21SDavid Hildenbrand kvm_s390_prepare_debug_exit(vcpu); 3749accb757dSChristoffer Dall rc = 0; 3750accb757dSChristoffer Dall goto out; 375127291e21SDavid Hildenbrand } 375227291e21SDavid Hildenbrand 375320b7035cSJan H. Schönherr kvm_sigset_activate(vcpu); 3754b0c632dbSHeiko Carstens 37556352e4d2SDavid Hildenbrand if (!kvm_s390_user_cpu_state_ctrl(vcpu->kvm)) { 37566852d7b6SDavid Hildenbrand kvm_s390_vcpu_start(vcpu); 37576352e4d2SDavid Hildenbrand } else if (is_vcpu_stopped(vcpu)) { 3758ea2cdd27SDavid Hildenbrand pr_err_ratelimited("can't run stopped vcpu %d\n", 37596352e4d2SDavid Hildenbrand vcpu->vcpu_id); 3760accb757dSChristoffer Dall rc = -EINVAL; 3761accb757dSChristoffer Dall goto out; 37626352e4d2SDavid Hildenbrand } 3763b0c632dbSHeiko Carstens 3764b028ee3eSDavid Hildenbrand sync_regs(vcpu, kvm_run); 3765db0758b2SDavid Hildenbrand enable_cpu_timer_accounting(vcpu); 3766d7b0b5ebSCarsten Otte 3767dab4079dSHeiko Carstens might_fault(); 3768e168bf8dSCarsten Otte rc = __vcpu_run(vcpu); 37699ace903dSChristian Ehrhardt 3770b1d16c49SChristian Ehrhardt if (signal_pending(current) && !rc) { 3771b1d16c49SChristian Ehrhardt kvm_run->exit_reason = KVM_EXIT_INTR; 37728f2abe6aSChristian Borntraeger rc = -EINTR; 3773b1d16c49SChristian Ehrhardt } 37748f2abe6aSChristian Borntraeger 377527291e21SDavid Hildenbrand if (guestdbg_exit_pending(vcpu) && !rc) { 377627291e21SDavid Hildenbrand kvm_s390_prepare_debug_exit(vcpu); 377727291e21SDavid Hildenbrand rc = 0; 377827291e21SDavid Hildenbrand } 377927291e21SDavid Hildenbrand 37808f2abe6aSChristian Borntraeger if (rc == -EREMOTE) { 378171f116bfSDavid Hildenbrand /* userspace support is needed, kvm_run has been prepared */ 37828f2abe6aSChristian Borntraeger rc = 0; 37838f2abe6aSChristian Borntraeger } 37848f2abe6aSChristian Borntraeger 3785db0758b2SDavid Hildenbrand disable_cpu_timer_accounting(vcpu); 3786b028ee3eSDavid Hildenbrand store_regs(vcpu, kvm_run); 3787d7b0b5ebSCarsten Otte 378820b7035cSJan H. Schönherr kvm_sigset_deactivate(vcpu); 3789b0c632dbSHeiko Carstens 3790b0c632dbSHeiko Carstens vcpu->stat.exit_userspace++; 3791accb757dSChristoffer Dall out: 3792accb757dSChristoffer Dall vcpu_put(vcpu); 37937e8e6ab4SHeiko Carstens return rc; 3794b0c632dbSHeiko Carstens } 3795b0c632dbSHeiko Carstens 3796b0c632dbSHeiko Carstens /* 3797b0c632dbSHeiko Carstens * store status at address 3798b0c632dbSHeiko Carstens * we use have two special cases: 3799b0c632dbSHeiko Carstens * KVM_S390_STORE_STATUS_NOADDR: -> 0x1200 on 64 bit 3800b0c632dbSHeiko Carstens * KVM_S390_STORE_STATUS_PREFIXED: -> prefix 3801b0c632dbSHeiko Carstens */ 3802d0bce605SHeiko Carstens int kvm_s390_store_status_unloaded(struct kvm_vcpu *vcpu, unsigned long gpa) 3803b0c632dbSHeiko Carstens { 3804092670cdSCarsten Otte unsigned char archmode = 1; 38059abc2a08SDavid Hildenbrand freg_t fprs[NUM_FPRS]; 3806fda902cbSMichael Mueller unsigned int px; 38074287f247SDavid Hildenbrand u64 clkcomp, cputm; 3808d0bce605SHeiko Carstens int rc; 3809b0c632dbSHeiko Carstens 3810d9a3a09aSMartin Schwidefsky px = kvm_s390_get_prefix(vcpu); 3811d0bce605SHeiko Carstens if (gpa == KVM_S390_STORE_STATUS_NOADDR) { 3812d0bce605SHeiko Carstens if (write_guest_abs(vcpu, 163, &archmode, 1)) 3813b0c632dbSHeiko Carstens return -EFAULT; 3814d9a3a09aSMartin Schwidefsky gpa = 0; 3815d0bce605SHeiko Carstens } else if (gpa == KVM_S390_STORE_STATUS_PREFIXED) { 3816d0bce605SHeiko Carstens if (write_guest_real(vcpu, 163, &archmode, 1)) 3817b0c632dbSHeiko Carstens return -EFAULT; 3818d9a3a09aSMartin Schwidefsky gpa = px; 3819d9a3a09aSMartin Schwidefsky } else 3820d9a3a09aSMartin Schwidefsky gpa -= __LC_FPREGS_SAVE_AREA; 38219abc2a08SDavid Hildenbrand 38229abc2a08SDavid Hildenbrand /* manually convert vector registers if necessary */ 38239abc2a08SDavid Hildenbrand if (MACHINE_HAS_VX) { 38249522b37fSDavid Hildenbrand convert_vx_to_fp(fprs, (__vector128 *) vcpu->run->s.regs.vrs); 3825d9a3a09aSMartin Schwidefsky rc = write_guest_abs(vcpu, gpa + __LC_FPREGS_SAVE_AREA, 38269abc2a08SDavid Hildenbrand fprs, 128); 38279abc2a08SDavid Hildenbrand } else { 38289abc2a08SDavid Hildenbrand rc = write_guest_abs(vcpu, gpa + __LC_FPREGS_SAVE_AREA, 38296fd8e67dSDavid Hildenbrand vcpu->run->s.regs.fprs, 128); 38309abc2a08SDavid Hildenbrand } 3831d9a3a09aSMartin Schwidefsky rc |= write_guest_abs(vcpu, gpa + __LC_GPREGS_SAVE_AREA, 3832d0bce605SHeiko Carstens vcpu->run->s.regs.gprs, 128); 3833d9a3a09aSMartin Schwidefsky rc |= write_guest_abs(vcpu, gpa + __LC_PSW_SAVE_AREA, 3834d0bce605SHeiko Carstens &vcpu->arch.sie_block->gpsw, 16); 3835d9a3a09aSMartin Schwidefsky rc |= write_guest_abs(vcpu, gpa + __LC_PREFIX_SAVE_AREA, 3836fda902cbSMichael Mueller &px, 4); 3837d9a3a09aSMartin Schwidefsky rc |= write_guest_abs(vcpu, gpa + __LC_FP_CREG_SAVE_AREA, 38389abc2a08SDavid Hildenbrand &vcpu->run->s.regs.fpc, 4); 3839d9a3a09aSMartin Schwidefsky rc |= write_guest_abs(vcpu, gpa + __LC_TOD_PROGREG_SAVE_AREA, 3840d0bce605SHeiko Carstens &vcpu->arch.sie_block->todpr, 4); 38414287f247SDavid Hildenbrand cputm = kvm_s390_get_cpu_timer(vcpu); 3842d9a3a09aSMartin Schwidefsky rc |= write_guest_abs(vcpu, gpa + __LC_CPU_TIMER_SAVE_AREA, 38434287f247SDavid Hildenbrand &cputm, 8); 3844178bd789SThomas Huth clkcomp = vcpu->arch.sie_block->ckc >> 8; 3845d9a3a09aSMartin Schwidefsky rc |= write_guest_abs(vcpu, gpa + __LC_CLOCK_COMP_SAVE_AREA, 3846d0bce605SHeiko Carstens &clkcomp, 8); 3847d9a3a09aSMartin Schwidefsky rc |= write_guest_abs(vcpu, gpa + __LC_AREGS_SAVE_AREA, 3848d0bce605SHeiko Carstens &vcpu->run->s.regs.acrs, 64); 3849d9a3a09aSMartin Schwidefsky rc |= write_guest_abs(vcpu, gpa + __LC_CREGS_SAVE_AREA, 3850d0bce605SHeiko Carstens &vcpu->arch.sie_block->gcr, 128); 3851d0bce605SHeiko Carstens return rc ? -EFAULT : 0; 3852b0c632dbSHeiko Carstens } 3853b0c632dbSHeiko Carstens 3854e879892cSThomas Huth int kvm_s390_vcpu_store_status(struct kvm_vcpu *vcpu, unsigned long addr) 3855e879892cSThomas Huth { 3856e879892cSThomas Huth /* 3857e879892cSThomas Huth * The guest FPRS and ACRS are in the host FPRS/ACRS due to the lazy 385831d8b8d4SChristian Borntraeger * switch in the run ioctl. Let's update our copies before we save 3859e879892cSThomas Huth * it into the save area 3860e879892cSThomas Huth */ 3861d0164ee2SHendrik Brueckner save_fpu_regs(); 38629abc2a08SDavid Hildenbrand vcpu->run->s.regs.fpc = current->thread.fpu.fpc; 3863e879892cSThomas Huth save_access_regs(vcpu->run->s.regs.acrs); 3864e879892cSThomas Huth 3865e879892cSThomas Huth return kvm_s390_store_status_unloaded(vcpu, addr); 3866e879892cSThomas Huth } 3867e879892cSThomas Huth 38688ad35755SDavid Hildenbrand static void __disable_ibs_on_vcpu(struct kvm_vcpu *vcpu) 38698ad35755SDavid Hildenbrand { 38708ad35755SDavid Hildenbrand kvm_check_request(KVM_REQ_ENABLE_IBS, vcpu); 38718e236546SChristian Borntraeger kvm_s390_sync_request(KVM_REQ_DISABLE_IBS, vcpu); 38728ad35755SDavid Hildenbrand } 38738ad35755SDavid Hildenbrand 38748ad35755SDavid Hildenbrand static void __disable_ibs_on_all_vcpus(struct kvm *kvm) 38758ad35755SDavid Hildenbrand { 38768ad35755SDavid Hildenbrand unsigned int i; 38778ad35755SDavid Hildenbrand struct kvm_vcpu *vcpu; 38788ad35755SDavid Hildenbrand 38798ad35755SDavid Hildenbrand kvm_for_each_vcpu(i, vcpu, kvm) { 38808ad35755SDavid Hildenbrand __disable_ibs_on_vcpu(vcpu); 38818ad35755SDavid Hildenbrand } 38828ad35755SDavid Hildenbrand } 38838ad35755SDavid Hildenbrand 38848ad35755SDavid Hildenbrand static void __enable_ibs_on_vcpu(struct kvm_vcpu *vcpu) 38858ad35755SDavid Hildenbrand { 388609a400e7SDavid Hildenbrand if (!sclp.has_ibs) 388709a400e7SDavid Hildenbrand return; 38888ad35755SDavid Hildenbrand kvm_check_request(KVM_REQ_DISABLE_IBS, vcpu); 38898e236546SChristian Borntraeger kvm_s390_sync_request(KVM_REQ_ENABLE_IBS, vcpu); 38908ad35755SDavid Hildenbrand } 38918ad35755SDavid Hildenbrand 38926852d7b6SDavid Hildenbrand void kvm_s390_vcpu_start(struct kvm_vcpu *vcpu) 38936852d7b6SDavid Hildenbrand { 38948ad35755SDavid Hildenbrand int i, online_vcpus, started_vcpus = 0; 38958ad35755SDavid Hildenbrand 38968ad35755SDavid Hildenbrand if (!is_vcpu_stopped(vcpu)) 38978ad35755SDavid Hildenbrand return; 38988ad35755SDavid Hildenbrand 38996852d7b6SDavid Hildenbrand trace_kvm_s390_vcpu_start_stop(vcpu->vcpu_id, 1); 39008ad35755SDavid Hildenbrand /* Only one cpu at a time may enter/leave the STOPPED state. */ 3901433b9ee4SDavid Hildenbrand spin_lock(&vcpu->kvm->arch.start_stop_lock); 39028ad35755SDavid Hildenbrand online_vcpus = atomic_read(&vcpu->kvm->online_vcpus); 39038ad35755SDavid Hildenbrand 39048ad35755SDavid Hildenbrand for (i = 0; i < online_vcpus; i++) { 39058ad35755SDavid Hildenbrand if (!is_vcpu_stopped(vcpu->kvm->vcpus[i])) 39068ad35755SDavid Hildenbrand started_vcpus++; 39078ad35755SDavid Hildenbrand } 39088ad35755SDavid Hildenbrand 39098ad35755SDavid Hildenbrand if (started_vcpus == 0) { 39108ad35755SDavid Hildenbrand /* we're the only active VCPU -> speed it up */ 39118ad35755SDavid Hildenbrand __enable_ibs_on_vcpu(vcpu); 39128ad35755SDavid Hildenbrand } else if (started_vcpus == 1) { 39138ad35755SDavid Hildenbrand /* 39148ad35755SDavid Hildenbrand * As we are starting a second VCPU, we have to disable 39158ad35755SDavid Hildenbrand * the IBS facility on all VCPUs to remove potentially 39168ad35755SDavid Hildenbrand * oustanding ENABLE requests. 39178ad35755SDavid Hildenbrand */ 39188ad35755SDavid Hildenbrand __disable_ibs_on_all_vcpus(vcpu->kvm); 39198ad35755SDavid Hildenbrand } 39208ad35755SDavid Hildenbrand 39219daecfc6SDavid Hildenbrand kvm_s390_clear_cpuflags(vcpu, CPUSTAT_STOPPED); 39228ad35755SDavid Hildenbrand /* 39238ad35755SDavid Hildenbrand * Another VCPU might have used IBS while we were offline. 39248ad35755SDavid Hildenbrand * Let's play safe and flush the VCPU at startup. 39258ad35755SDavid Hildenbrand */ 3926d3d692c8SDavid Hildenbrand kvm_make_request(KVM_REQ_TLB_FLUSH, vcpu); 3927433b9ee4SDavid Hildenbrand spin_unlock(&vcpu->kvm->arch.start_stop_lock); 39288ad35755SDavid Hildenbrand return; 39296852d7b6SDavid Hildenbrand } 39306852d7b6SDavid Hildenbrand 39316852d7b6SDavid Hildenbrand void kvm_s390_vcpu_stop(struct kvm_vcpu *vcpu) 39326852d7b6SDavid Hildenbrand { 39338ad35755SDavid Hildenbrand int i, online_vcpus, started_vcpus = 0; 39348ad35755SDavid Hildenbrand struct kvm_vcpu *started_vcpu = NULL; 39358ad35755SDavid Hildenbrand 39368ad35755SDavid Hildenbrand if (is_vcpu_stopped(vcpu)) 39378ad35755SDavid Hildenbrand return; 39388ad35755SDavid Hildenbrand 39396852d7b6SDavid Hildenbrand trace_kvm_s390_vcpu_start_stop(vcpu->vcpu_id, 0); 39408ad35755SDavid Hildenbrand /* Only one cpu at a time may enter/leave the STOPPED state. */ 3941433b9ee4SDavid Hildenbrand spin_lock(&vcpu->kvm->arch.start_stop_lock); 39428ad35755SDavid Hildenbrand online_vcpus = atomic_read(&vcpu->kvm->online_vcpus); 39438ad35755SDavid Hildenbrand 394432f5ff63SDavid Hildenbrand /* SIGP STOP and SIGP STOP AND STORE STATUS has been fully processed */ 39456cddd432SDavid Hildenbrand kvm_s390_clear_stop_irq(vcpu); 394632f5ff63SDavid Hildenbrand 3947ef8f4f49SDavid Hildenbrand kvm_s390_set_cpuflags(vcpu, CPUSTAT_STOPPED); 39488ad35755SDavid Hildenbrand __disable_ibs_on_vcpu(vcpu); 39498ad35755SDavid Hildenbrand 39508ad35755SDavid Hildenbrand for (i = 0; i < online_vcpus; i++) { 39518ad35755SDavid Hildenbrand if (!is_vcpu_stopped(vcpu->kvm->vcpus[i])) { 39528ad35755SDavid Hildenbrand started_vcpus++; 39538ad35755SDavid Hildenbrand started_vcpu = vcpu->kvm->vcpus[i]; 39548ad35755SDavid Hildenbrand } 39558ad35755SDavid Hildenbrand } 39568ad35755SDavid Hildenbrand 39578ad35755SDavid Hildenbrand if (started_vcpus == 1) { 39588ad35755SDavid Hildenbrand /* 39598ad35755SDavid Hildenbrand * As we only have one VCPU left, we want to enable the 39608ad35755SDavid Hildenbrand * IBS facility for that VCPU to speed it up. 39618ad35755SDavid Hildenbrand */ 39628ad35755SDavid Hildenbrand __enable_ibs_on_vcpu(started_vcpu); 39638ad35755SDavid Hildenbrand } 39648ad35755SDavid Hildenbrand 3965433b9ee4SDavid Hildenbrand spin_unlock(&vcpu->kvm->arch.start_stop_lock); 39668ad35755SDavid Hildenbrand return; 39676852d7b6SDavid Hildenbrand } 39686852d7b6SDavid Hildenbrand 3969d6712df9SCornelia Huck static int kvm_vcpu_ioctl_enable_cap(struct kvm_vcpu *vcpu, 3970d6712df9SCornelia Huck struct kvm_enable_cap *cap) 3971d6712df9SCornelia Huck { 3972d6712df9SCornelia Huck int r; 3973d6712df9SCornelia Huck 3974d6712df9SCornelia Huck if (cap->flags) 3975d6712df9SCornelia Huck return -EINVAL; 3976d6712df9SCornelia Huck 3977d6712df9SCornelia Huck switch (cap->cap) { 3978fa6b7fe9SCornelia Huck case KVM_CAP_S390_CSS_SUPPORT: 3979fa6b7fe9SCornelia Huck if (!vcpu->kvm->arch.css_support) { 3980fa6b7fe9SCornelia Huck vcpu->kvm->arch.css_support = 1; 3981c92ea7b9SChristian Borntraeger VM_EVENT(vcpu->kvm, 3, "%s", "ENABLE: CSS support"); 3982fa6b7fe9SCornelia Huck trace_kvm_s390_enable_css(vcpu->kvm); 3983fa6b7fe9SCornelia Huck } 3984fa6b7fe9SCornelia Huck r = 0; 3985fa6b7fe9SCornelia Huck break; 3986d6712df9SCornelia Huck default: 3987d6712df9SCornelia Huck r = -EINVAL; 3988d6712df9SCornelia Huck break; 3989d6712df9SCornelia Huck } 3990d6712df9SCornelia Huck return r; 3991d6712df9SCornelia Huck } 3992d6712df9SCornelia Huck 399341408c28SThomas Huth static long kvm_s390_guest_mem_op(struct kvm_vcpu *vcpu, 399441408c28SThomas Huth struct kvm_s390_mem_op *mop) 399541408c28SThomas Huth { 399641408c28SThomas Huth void __user *uaddr = (void __user *)mop->buf; 399741408c28SThomas Huth void *tmpbuf = NULL; 399841408c28SThomas Huth int r, srcu_idx; 399941408c28SThomas Huth const u64 supported_flags = KVM_S390_MEMOP_F_INJECT_EXCEPTION 400041408c28SThomas Huth | KVM_S390_MEMOP_F_CHECK_ONLY; 400141408c28SThomas Huth 400241408c28SThomas Huth if (mop->flags & ~supported_flags) 400341408c28SThomas Huth return -EINVAL; 400441408c28SThomas Huth 400541408c28SThomas Huth if (mop->size > MEM_OP_MAX_SIZE) 400641408c28SThomas Huth return -E2BIG; 400741408c28SThomas Huth 400841408c28SThomas Huth if (!(mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY)) { 400941408c28SThomas Huth tmpbuf = vmalloc(mop->size); 401041408c28SThomas Huth if (!tmpbuf) 401141408c28SThomas Huth return -ENOMEM; 401241408c28SThomas Huth } 401341408c28SThomas Huth 401441408c28SThomas Huth srcu_idx = srcu_read_lock(&vcpu->kvm->srcu); 401541408c28SThomas Huth 401641408c28SThomas Huth switch (mop->op) { 401741408c28SThomas Huth case KVM_S390_MEMOP_LOGICAL_READ: 401841408c28SThomas Huth if (mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY) { 401992c96321SDavid Hildenbrand r = check_gva_range(vcpu, mop->gaddr, mop->ar, 402092c96321SDavid Hildenbrand mop->size, GACC_FETCH); 402141408c28SThomas Huth break; 402241408c28SThomas Huth } 402341408c28SThomas Huth r = read_guest(vcpu, mop->gaddr, mop->ar, tmpbuf, mop->size); 402441408c28SThomas Huth if (r == 0) { 402541408c28SThomas Huth if (copy_to_user(uaddr, tmpbuf, mop->size)) 402641408c28SThomas Huth r = -EFAULT; 402741408c28SThomas Huth } 402841408c28SThomas Huth break; 402941408c28SThomas Huth case KVM_S390_MEMOP_LOGICAL_WRITE: 403041408c28SThomas Huth if (mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY) { 403192c96321SDavid Hildenbrand r = check_gva_range(vcpu, mop->gaddr, mop->ar, 403292c96321SDavid Hildenbrand mop->size, GACC_STORE); 403341408c28SThomas Huth break; 403441408c28SThomas Huth } 403541408c28SThomas Huth if (copy_from_user(tmpbuf, uaddr, mop->size)) { 403641408c28SThomas Huth r = -EFAULT; 403741408c28SThomas Huth break; 403841408c28SThomas Huth } 403941408c28SThomas Huth r = write_guest(vcpu, mop->gaddr, mop->ar, tmpbuf, mop->size); 404041408c28SThomas Huth break; 404141408c28SThomas Huth default: 404241408c28SThomas Huth r = -EINVAL; 404341408c28SThomas Huth } 404441408c28SThomas Huth 404541408c28SThomas Huth srcu_read_unlock(&vcpu->kvm->srcu, srcu_idx); 404641408c28SThomas Huth 404741408c28SThomas Huth if (r > 0 && (mop->flags & KVM_S390_MEMOP_F_INJECT_EXCEPTION) != 0) 404841408c28SThomas Huth kvm_s390_inject_prog_irq(vcpu, &vcpu->arch.pgm); 404941408c28SThomas Huth 405041408c28SThomas Huth vfree(tmpbuf); 405141408c28SThomas Huth return r; 405241408c28SThomas Huth } 405341408c28SThomas Huth 40545cb0944cSPaolo Bonzini long kvm_arch_vcpu_async_ioctl(struct file *filp, 4055b0c632dbSHeiko Carstens unsigned int ioctl, unsigned long arg) 4056b0c632dbSHeiko Carstens { 4057b0c632dbSHeiko Carstens struct kvm_vcpu *vcpu = filp->private_data; 4058b0c632dbSHeiko Carstens void __user *argp = (void __user *)arg; 4059b0c632dbSHeiko Carstens 406093736624SAvi Kivity switch (ioctl) { 406147b43c52SJens Freimann case KVM_S390_IRQ: { 406247b43c52SJens Freimann struct kvm_s390_irq s390irq; 406347b43c52SJens Freimann 406447b43c52SJens Freimann if (copy_from_user(&s390irq, argp, sizeof(s390irq))) 40659b062471SChristoffer Dall return -EFAULT; 40669b062471SChristoffer Dall return kvm_s390_inject_vcpu(vcpu, &s390irq); 406747b43c52SJens Freimann } 406893736624SAvi Kivity case KVM_S390_INTERRUPT: { 4069ba5c1e9bSCarsten Otte struct kvm_s390_interrupt s390int; 4070383d0b05SJens Freimann struct kvm_s390_irq s390irq; 4071ba5c1e9bSCarsten Otte 4072ba5c1e9bSCarsten Otte if (copy_from_user(&s390int, argp, sizeof(s390int))) 40739b062471SChristoffer Dall return -EFAULT; 4074383d0b05SJens Freimann if (s390int_to_s390irq(&s390int, &s390irq)) 4075383d0b05SJens Freimann return -EINVAL; 40769b062471SChristoffer Dall return kvm_s390_inject_vcpu(vcpu, &s390irq); 4077ba5c1e9bSCarsten Otte } 40789b062471SChristoffer Dall } 40795cb0944cSPaolo Bonzini return -ENOIOCTLCMD; 40805cb0944cSPaolo Bonzini } 40815cb0944cSPaolo Bonzini 40825cb0944cSPaolo Bonzini long kvm_arch_vcpu_ioctl(struct file *filp, 40835cb0944cSPaolo Bonzini unsigned int ioctl, unsigned long arg) 40845cb0944cSPaolo Bonzini { 40855cb0944cSPaolo Bonzini struct kvm_vcpu *vcpu = filp->private_data; 40865cb0944cSPaolo Bonzini void __user *argp = (void __user *)arg; 40875cb0944cSPaolo Bonzini int idx; 40885cb0944cSPaolo Bonzini long r; 40899b062471SChristoffer Dall 40909b062471SChristoffer Dall vcpu_load(vcpu); 40919b062471SChristoffer Dall 40929b062471SChristoffer Dall switch (ioctl) { 4093b0c632dbSHeiko Carstens case KVM_S390_STORE_STATUS: 4094800c1065SThomas Huth idx = srcu_read_lock(&vcpu->kvm->srcu); 4095bc923cc9SAvi Kivity r = kvm_s390_vcpu_store_status(vcpu, arg); 4096800c1065SThomas Huth srcu_read_unlock(&vcpu->kvm->srcu, idx); 4097bc923cc9SAvi Kivity break; 4098b0c632dbSHeiko Carstens case KVM_S390_SET_INITIAL_PSW: { 4099b0c632dbSHeiko Carstens psw_t psw; 4100b0c632dbSHeiko Carstens 4101bc923cc9SAvi Kivity r = -EFAULT; 4102b0c632dbSHeiko Carstens if (copy_from_user(&psw, argp, sizeof(psw))) 4103bc923cc9SAvi Kivity break; 4104bc923cc9SAvi Kivity r = kvm_arch_vcpu_ioctl_set_initial_psw(vcpu, psw); 4105bc923cc9SAvi Kivity break; 4106b0c632dbSHeiko Carstens } 4107b0c632dbSHeiko Carstens case KVM_S390_INITIAL_RESET: 4108bc923cc9SAvi Kivity r = kvm_arch_vcpu_ioctl_initial_reset(vcpu); 4109bc923cc9SAvi Kivity break; 411014eebd91SCarsten Otte case KVM_SET_ONE_REG: 411114eebd91SCarsten Otte case KVM_GET_ONE_REG: { 411214eebd91SCarsten Otte struct kvm_one_reg reg; 411314eebd91SCarsten Otte r = -EFAULT; 411414eebd91SCarsten Otte if (copy_from_user(®, argp, sizeof(reg))) 411514eebd91SCarsten Otte break; 411614eebd91SCarsten Otte if (ioctl == KVM_SET_ONE_REG) 411714eebd91SCarsten Otte r = kvm_arch_vcpu_ioctl_set_one_reg(vcpu, ®); 411814eebd91SCarsten Otte else 411914eebd91SCarsten Otte r = kvm_arch_vcpu_ioctl_get_one_reg(vcpu, ®); 412014eebd91SCarsten Otte break; 412114eebd91SCarsten Otte } 412227e0393fSCarsten Otte #ifdef CONFIG_KVM_S390_UCONTROL 412327e0393fSCarsten Otte case KVM_S390_UCAS_MAP: { 412427e0393fSCarsten Otte struct kvm_s390_ucas_mapping ucasmap; 412527e0393fSCarsten Otte 412627e0393fSCarsten Otte if (copy_from_user(&ucasmap, argp, sizeof(ucasmap))) { 412727e0393fSCarsten Otte r = -EFAULT; 412827e0393fSCarsten Otte break; 412927e0393fSCarsten Otte } 413027e0393fSCarsten Otte 413127e0393fSCarsten Otte if (!kvm_is_ucontrol(vcpu->kvm)) { 413227e0393fSCarsten Otte r = -EINVAL; 413327e0393fSCarsten Otte break; 413427e0393fSCarsten Otte } 413527e0393fSCarsten Otte 413627e0393fSCarsten Otte r = gmap_map_segment(vcpu->arch.gmap, ucasmap.user_addr, 413727e0393fSCarsten Otte ucasmap.vcpu_addr, ucasmap.length); 413827e0393fSCarsten Otte break; 413927e0393fSCarsten Otte } 414027e0393fSCarsten Otte case KVM_S390_UCAS_UNMAP: { 414127e0393fSCarsten Otte struct kvm_s390_ucas_mapping ucasmap; 414227e0393fSCarsten Otte 414327e0393fSCarsten Otte if (copy_from_user(&ucasmap, argp, sizeof(ucasmap))) { 414427e0393fSCarsten Otte r = -EFAULT; 414527e0393fSCarsten Otte break; 414627e0393fSCarsten Otte } 414727e0393fSCarsten Otte 414827e0393fSCarsten Otte if (!kvm_is_ucontrol(vcpu->kvm)) { 414927e0393fSCarsten Otte r = -EINVAL; 415027e0393fSCarsten Otte break; 415127e0393fSCarsten Otte } 415227e0393fSCarsten Otte 415327e0393fSCarsten Otte r = gmap_unmap_segment(vcpu->arch.gmap, ucasmap.vcpu_addr, 415427e0393fSCarsten Otte ucasmap.length); 415527e0393fSCarsten Otte break; 415627e0393fSCarsten Otte } 415727e0393fSCarsten Otte #endif 4158ccc7910fSCarsten Otte case KVM_S390_VCPU_FAULT: { 4159527e30b4SMartin Schwidefsky r = gmap_fault(vcpu->arch.gmap, arg, 0); 4160ccc7910fSCarsten Otte break; 4161ccc7910fSCarsten Otte } 4162d6712df9SCornelia Huck case KVM_ENABLE_CAP: 4163d6712df9SCornelia Huck { 4164d6712df9SCornelia Huck struct kvm_enable_cap cap; 4165d6712df9SCornelia Huck r = -EFAULT; 4166d6712df9SCornelia Huck if (copy_from_user(&cap, argp, sizeof(cap))) 4167d6712df9SCornelia Huck break; 4168d6712df9SCornelia Huck r = kvm_vcpu_ioctl_enable_cap(vcpu, &cap); 4169d6712df9SCornelia Huck break; 4170d6712df9SCornelia Huck } 417141408c28SThomas Huth case KVM_S390_MEM_OP: { 417241408c28SThomas Huth struct kvm_s390_mem_op mem_op; 417341408c28SThomas Huth 417441408c28SThomas Huth if (copy_from_user(&mem_op, argp, sizeof(mem_op)) == 0) 417541408c28SThomas Huth r = kvm_s390_guest_mem_op(vcpu, &mem_op); 417641408c28SThomas Huth else 417741408c28SThomas Huth r = -EFAULT; 417841408c28SThomas Huth break; 417941408c28SThomas Huth } 4180816c7667SJens Freimann case KVM_S390_SET_IRQ_STATE: { 4181816c7667SJens Freimann struct kvm_s390_irq_state irq_state; 4182816c7667SJens Freimann 4183816c7667SJens Freimann r = -EFAULT; 4184816c7667SJens Freimann if (copy_from_user(&irq_state, argp, sizeof(irq_state))) 4185816c7667SJens Freimann break; 4186816c7667SJens Freimann if (irq_state.len > VCPU_IRQS_MAX_BUF || 4187816c7667SJens Freimann irq_state.len == 0 || 4188816c7667SJens Freimann irq_state.len % sizeof(struct kvm_s390_irq) > 0) { 4189816c7667SJens Freimann r = -EINVAL; 4190816c7667SJens Freimann break; 4191816c7667SJens Freimann } 4192bb64da9aSChristian Borntraeger /* do not use irq_state.flags, it will break old QEMUs */ 4193816c7667SJens Freimann r = kvm_s390_set_irq_state(vcpu, 4194816c7667SJens Freimann (void __user *) irq_state.buf, 4195816c7667SJens Freimann irq_state.len); 4196816c7667SJens Freimann break; 4197816c7667SJens Freimann } 4198816c7667SJens Freimann case KVM_S390_GET_IRQ_STATE: { 4199816c7667SJens Freimann struct kvm_s390_irq_state irq_state; 4200816c7667SJens Freimann 4201816c7667SJens Freimann r = -EFAULT; 4202816c7667SJens Freimann if (copy_from_user(&irq_state, argp, sizeof(irq_state))) 4203816c7667SJens Freimann break; 4204816c7667SJens Freimann if (irq_state.len == 0) { 4205816c7667SJens Freimann r = -EINVAL; 4206816c7667SJens Freimann break; 4207816c7667SJens Freimann } 4208bb64da9aSChristian Borntraeger /* do not use irq_state.flags, it will break old QEMUs */ 4209816c7667SJens Freimann r = kvm_s390_get_irq_state(vcpu, 4210816c7667SJens Freimann (__u8 __user *) irq_state.buf, 4211816c7667SJens Freimann irq_state.len); 4212816c7667SJens Freimann break; 4213816c7667SJens Freimann } 4214b0c632dbSHeiko Carstens default: 42153e6afcf1SCarsten Otte r = -ENOTTY; 4216b0c632dbSHeiko Carstens } 42179b062471SChristoffer Dall 42189b062471SChristoffer Dall vcpu_put(vcpu); 4219bc923cc9SAvi Kivity return r; 4220b0c632dbSHeiko Carstens } 4221b0c632dbSHeiko Carstens 42221499fa80SSouptick Joarder vm_fault_t kvm_arch_vcpu_fault(struct kvm_vcpu *vcpu, struct vm_fault *vmf) 42235b1c1493SCarsten Otte { 42245b1c1493SCarsten Otte #ifdef CONFIG_KVM_S390_UCONTROL 42255b1c1493SCarsten Otte if ((vmf->pgoff == KVM_S390_SIE_PAGE_OFFSET) 42265b1c1493SCarsten Otte && (kvm_is_ucontrol(vcpu->kvm))) { 42275b1c1493SCarsten Otte vmf->page = virt_to_page(vcpu->arch.sie_block); 42285b1c1493SCarsten Otte get_page(vmf->page); 42295b1c1493SCarsten Otte return 0; 42305b1c1493SCarsten Otte } 42315b1c1493SCarsten Otte #endif 42325b1c1493SCarsten Otte return VM_FAULT_SIGBUS; 42335b1c1493SCarsten Otte } 42345b1c1493SCarsten Otte 42355587027cSAneesh Kumar K.V int kvm_arch_create_memslot(struct kvm *kvm, struct kvm_memory_slot *slot, 42365587027cSAneesh Kumar K.V unsigned long npages) 4237db3fe4ebSTakuya Yoshikawa { 4238db3fe4ebSTakuya Yoshikawa return 0; 4239db3fe4ebSTakuya Yoshikawa } 4240db3fe4ebSTakuya Yoshikawa 4241b0c632dbSHeiko Carstens /* Section: memory related */ 4242f7784b8eSMarcelo Tosatti int kvm_arch_prepare_memory_region(struct kvm *kvm, 4243f7784b8eSMarcelo Tosatti struct kvm_memory_slot *memslot, 424409170a49SPaolo Bonzini const struct kvm_userspace_memory_region *mem, 42457b6195a9STakuya Yoshikawa enum kvm_mr_change change) 4246b0c632dbSHeiko Carstens { 4247dd2887e7SNick Wang /* A few sanity checks. We can have memory slots which have to be 4248dd2887e7SNick Wang located/ended at a segment boundary (1MB). The memory in userland is 4249dd2887e7SNick Wang ok to be fragmented into various different vmas. It is okay to mmap() 4250dd2887e7SNick Wang and munmap() stuff in this slot after doing this call at any time */ 4251b0c632dbSHeiko Carstens 4252598841caSCarsten Otte if (mem->userspace_addr & 0xffffful) 4253b0c632dbSHeiko Carstens return -EINVAL; 4254b0c632dbSHeiko Carstens 4255598841caSCarsten Otte if (mem->memory_size & 0xffffful) 4256b0c632dbSHeiko Carstens return -EINVAL; 4257b0c632dbSHeiko Carstens 4258a3a92c31SDominik Dingel if (mem->guest_phys_addr + mem->memory_size > kvm->arch.mem_limit) 4259a3a92c31SDominik Dingel return -EINVAL; 4260a3a92c31SDominik Dingel 4261f7784b8eSMarcelo Tosatti return 0; 4262f7784b8eSMarcelo Tosatti } 4263f7784b8eSMarcelo Tosatti 4264f7784b8eSMarcelo Tosatti void kvm_arch_commit_memory_region(struct kvm *kvm, 426509170a49SPaolo Bonzini const struct kvm_userspace_memory_region *mem, 42668482644aSTakuya Yoshikawa const struct kvm_memory_slot *old, 4267f36f3f28SPaolo Bonzini const struct kvm_memory_slot *new, 42688482644aSTakuya Yoshikawa enum kvm_mr_change change) 4269f7784b8eSMarcelo Tosatti { 4270f7850c92SCarsten Otte int rc; 4271f7784b8eSMarcelo Tosatti 42722cef4debSChristian Borntraeger /* If the basics of the memslot do not change, we do not want 42732cef4debSChristian Borntraeger * to update the gmap. Every update causes several unnecessary 42742cef4debSChristian Borntraeger * segment translation exceptions. This is usually handled just 42752cef4debSChristian Borntraeger * fine by the normal fault handler + gmap, but it will also 42762cef4debSChristian Borntraeger * cause faults on the prefix page of running guest CPUs. 42772cef4debSChristian Borntraeger */ 42782cef4debSChristian Borntraeger if (old->userspace_addr == mem->userspace_addr && 42792cef4debSChristian Borntraeger old->base_gfn * PAGE_SIZE == mem->guest_phys_addr && 42802cef4debSChristian Borntraeger old->npages * PAGE_SIZE == mem->memory_size) 42812cef4debSChristian Borntraeger return; 4282598841caSCarsten Otte 4283598841caSCarsten Otte rc = gmap_map_segment(kvm->arch.gmap, mem->userspace_addr, 4284598841caSCarsten Otte mem->guest_phys_addr, mem->memory_size); 4285598841caSCarsten Otte if (rc) 4286ea2cdd27SDavid Hildenbrand pr_warn("failed to commit memory region\n"); 4287598841caSCarsten Otte return; 4288b0c632dbSHeiko Carstens } 4289b0c632dbSHeiko Carstens 429060a37709SAlexander Yarygin static inline unsigned long nonhyp_mask(int i) 429160a37709SAlexander Yarygin { 429260a37709SAlexander Yarygin unsigned int nonhyp_fai = (sclp.hmfai << i * 2) >> 30; 429360a37709SAlexander Yarygin 429460a37709SAlexander Yarygin return 0x0000ffffffffffffUL >> (nonhyp_fai << 4); 429560a37709SAlexander Yarygin } 429660a37709SAlexander Yarygin 42973491caf2SChristian Borntraeger void kvm_arch_vcpu_block_finish(struct kvm_vcpu *vcpu) 42983491caf2SChristian Borntraeger { 42993491caf2SChristian Borntraeger vcpu->valid_wakeup = false; 43003491caf2SChristian Borntraeger } 43013491caf2SChristian Borntraeger 4302b0c632dbSHeiko Carstens static int __init kvm_s390_init(void) 4303b0c632dbSHeiko Carstens { 430460a37709SAlexander Yarygin int i; 430560a37709SAlexander Yarygin 430607197fd0SDavid Hildenbrand if (!sclp.has_sief2) { 43078d43d570SMichael Mueller pr_info("SIE is not available\n"); 430807197fd0SDavid Hildenbrand return -ENODEV; 430907197fd0SDavid Hildenbrand } 431007197fd0SDavid Hildenbrand 4311a4499382SJanosch Frank if (nested && hpage) { 43128d43d570SMichael Mueller pr_info("A KVM host that supports nesting cannot back its KVM guests with huge pages\n"); 4313a4499382SJanosch Frank return -EINVAL; 4314a4499382SJanosch Frank } 4315a4499382SJanosch Frank 431660a37709SAlexander Yarygin for (i = 0; i < 16; i++) 4317c3b9e3e1SChristian Borntraeger kvm_s390_fac_base[i] |= 431860a37709SAlexander Yarygin S390_lowcore.stfle_fac_list[i] & nonhyp_mask(i); 431960a37709SAlexander Yarygin 43209d8d5786SMichael Mueller return kvm_init(NULL, sizeof(struct kvm_vcpu), 0, THIS_MODULE); 4321b0c632dbSHeiko Carstens } 4322b0c632dbSHeiko Carstens 4323b0c632dbSHeiko Carstens static void __exit kvm_s390_exit(void) 4324b0c632dbSHeiko Carstens { 4325b0c632dbSHeiko Carstens kvm_exit(); 4326b0c632dbSHeiko Carstens } 4327b0c632dbSHeiko Carstens 4328b0c632dbSHeiko Carstens module_init(kvm_s390_init); 4329b0c632dbSHeiko Carstens module_exit(kvm_s390_exit); 4330566af940SCornelia Huck 4331566af940SCornelia Huck /* 4332566af940SCornelia Huck * Enable autoloading of the kvm module. 4333566af940SCornelia Huck * Note that we add the module alias here instead of virt/kvm/kvm_main.c 4334566af940SCornelia Huck * since x86 takes a different approach. 4335566af940SCornelia Huck */ 4336566af940SCornelia Huck #include <linux/miscdevice.h> 4337566af940SCornelia Huck MODULE_ALIAS_MISCDEV(KVM_MINOR); 4338566af940SCornelia Huck MODULE_ALIAS("devname:kvm"); 4339