kvm-s390.c 22.2 KB
Newer Older
1 2 3
/*
 * s390host.c --  hosting zSeries kernel virtual machines
 *
4
 * Copyright IBM Corp. 2008,2009
5 6 7 8 9 10 11 12
 *
 * This program is free software; you can redistribute it and/or modify
 * it under the terms of the GNU General Public License (version 2 only)
 * as published by the Free Software Foundation.
 *
 *    Author(s): Carsten Otte <cotte@de.ibm.com>
 *               Christian Borntraeger <borntraeger@de.ibm.com>
 *               Heiko Carstens <heiko.carstens@de.ibm.com>
13
 *               Christian Ehrhardt <ehrhardt@de.ibm.com>
14 15 16 17 18
 */

#include <linux/compiler.h>
#include <linux/err.h>
#include <linux/fs.h>
19
#include <linux/hrtimer.h>
20 21 22 23 24
#include <linux/init.h>
#include <linux/kvm.h>
#include <linux/kvm_host.h>
#include <linux/module.h>
#include <linux/slab.h>
25
#include <linux/timer.h>
26
#include <asm/asm-offsets.h>
27 28
#include <asm/lowcore.h>
#include <asm/pgtable.h>
29
#include <asm/nmi.h>
30
#include <asm/system.h>
31
#include "kvm-s390.h"
32 33 34 35 36 37
#include "gaccess.h"

#define VCPU_STAT(x) offsetof(struct kvm_vcpu, stat.x), KVM_STAT_VCPU

struct kvm_stats_debugfs_item debugfs_entries[] = {
	{ "userspace_handled", VCPU_STAT(exit_userspace) },
38
	{ "exit_null", VCPU_STAT(exit_null) },
39 40 41 42
	{ "exit_validity", VCPU_STAT(exit_validity) },
	{ "exit_stop_request", VCPU_STAT(exit_stop_request) },
	{ "exit_external_request", VCPU_STAT(exit_external_request) },
	{ "exit_external_interrupt", VCPU_STAT(exit_external_interrupt) },
43 44 45
	{ "exit_instruction", VCPU_STAT(exit_instruction) },
	{ "exit_program_interruption", VCPU_STAT(exit_program_interruption) },
	{ "exit_instr_and_program_int", VCPU_STAT(exit_instr_and_program) },
46
	{ "instruction_lctlg", VCPU_STAT(instruction_lctlg) },
47 48
	{ "instruction_lctl", VCPU_STAT(instruction_lctl) },
	{ "deliver_emergency_signal", VCPU_STAT(deliver_emergency_signal) },
49
	{ "deliver_external_call", VCPU_STAT(deliver_external_call) },
50 51 52 53 54 55 56
	{ "deliver_service_signal", VCPU_STAT(deliver_service_signal) },
	{ "deliver_virtio_interrupt", VCPU_STAT(deliver_virtio_interrupt) },
	{ "deliver_stop_signal", VCPU_STAT(deliver_stop_signal) },
	{ "deliver_prefix_signal", VCPU_STAT(deliver_prefix_signal) },
	{ "deliver_restart_signal", VCPU_STAT(deliver_restart_signal) },
	{ "deliver_program_interruption", VCPU_STAT(deliver_program_int) },
	{ "exit_wait_state", VCPU_STAT(exit_wait_state) },
57 58 59 60 61 62 63 64 65
	{ "instruction_stidp", VCPU_STAT(instruction_stidp) },
	{ "instruction_spx", VCPU_STAT(instruction_spx) },
	{ "instruction_stpx", VCPU_STAT(instruction_stpx) },
	{ "instruction_stap", VCPU_STAT(instruction_stap) },
	{ "instruction_storage_key", VCPU_STAT(instruction_storage_key) },
	{ "instruction_stsch", VCPU_STAT(instruction_stsch) },
	{ "instruction_chsc", VCPU_STAT(instruction_chsc) },
	{ "instruction_stsi", VCPU_STAT(instruction_stsi) },
	{ "instruction_stfl", VCPU_STAT(instruction_stfl) },
66
	{ "instruction_tprot", VCPU_STAT(instruction_tprot) },
67
	{ "instruction_sigp_sense", VCPU_STAT(instruction_sigp_sense) },
68
	{ "instruction_sigp_sense_running", VCPU_STAT(instruction_sigp_sense_running) },
69
	{ "instruction_sigp_external_call", VCPU_STAT(instruction_sigp_external_call) },
70 71 72 73 74
	{ "instruction_sigp_emergency", VCPU_STAT(instruction_sigp_emergency) },
	{ "instruction_sigp_stop", VCPU_STAT(instruction_sigp_stop) },
	{ "instruction_sigp_set_arch", VCPU_STAT(instruction_sigp_arch) },
	{ "instruction_sigp_set_prefix", VCPU_STAT(instruction_sigp_prefix) },
	{ "instruction_sigp_restart", VCPU_STAT(instruction_sigp_restart) },
75
	{ "diagnose_10", VCPU_STAT(diagnose_10) },
76
	{ "diagnose_44", VCPU_STAT(diagnose_44) },
77 78 79
	{ NULL }
};

80
static unsigned long long *facilities;
81 82

/* Section: not file related */
83
int kvm_arch_hardware_enable(void *garbage)
84 85
{
	/* every s390 is virtualization enabled ;-) */
86
	return 0;
87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125
}

void kvm_arch_hardware_disable(void *garbage)
{
}

int kvm_arch_hardware_setup(void)
{
	return 0;
}

void kvm_arch_hardware_unsetup(void)
{
}

void kvm_arch_check_processor_compat(void *rtn)
{
}

int kvm_arch_init(void *opaque)
{
	return 0;
}

void kvm_arch_exit(void)
{
}

/* Section: device related */
long kvm_arch_dev_ioctl(struct file *filp,
			unsigned int ioctl, unsigned long arg)
{
	if (ioctl == KVM_S390_ENABLE_SIE)
		return s390_enable_sie();
	return -EINVAL;
}

int kvm_dev_ioctl_check_extension(long ext)
{
126 127
	int r;

128
	switch (ext) {
129
	case KVM_CAP_S390_PSW:
130
	case KVM_CAP_S390_GMAP:
131
	case KVM_CAP_SYNC_MMU:
132 133 134
#ifdef CONFIG_KVM_S390_UCONTROL
	case KVM_CAP_S390_UCONTROL:
#endif
135 136
		r = 1;
		break;
137
	default:
138
		r = 0;
139
	}
140
	return r;
141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160
}

/* Section: vm related */
/*
 * Get (and clear) the dirty memory log for a memory slot.
 */
int kvm_vm_ioctl_get_dirty_log(struct kvm *kvm,
			       struct kvm_dirty_log *log)
{
	return 0;
}

long kvm_arch_vm_ioctl(struct file *filp,
		       unsigned int ioctl, unsigned long arg)
{
	struct kvm *kvm = filp->private_data;
	void __user *argp = (void __user *)arg;
	int r;

	switch (ioctl) {
161 162 163 164 165 166 167 168 169
	case KVM_S390_INTERRUPT: {
		struct kvm_s390_interrupt s390int;

		r = -EFAULT;
		if (copy_from_user(&s390int, argp, sizeof(s390int)))
			break;
		r = kvm_s390_inject_vm(kvm, &s390int);
		break;
	}
170
	default:
171
		r = -ENOTTY;
172 173 174 175 176
	}

	return r;
}

177
int kvm_arch_init_vm(struct kvm *kvm, unsigned long type)
178 179 180 181
{
	int rc;
	char debug_name[16];

182 183 184 185 186 187 188 189 190 191 192
	rc = -EINVAL;
#ifdef CONFIG_KVM_S390_UCONTROL
	if (type & ~KVM_VM_S390_UCONTROL)
		goto out_err;
	if ((type & KVM_VM_S390_UCONTROL) && (!capable(CAP_SYS_ADMIN)))
		goto out_err;
#else
	if (type)
		goto out_err;
#endif

193 194
	rc = s390_enable_sie();
	if (rc)
195
		goto out_err;
196

197 198
	rc = -ENOMEM;

199 200
	kvm->arch.sca = (struct sca_block *) get_zeroed_page(GFP_KERNEL);
	if (!kvm->arch.sca)
201
		goto out_err;
202 203 204 205 206 207 208

	sprintf(debug_name, "kvm-%u", current->pid);

	kvm->arch.dbf = debug_register(debug_name, 8, 2, 8 * sizeof(long));
	if (!kvm->arch.dbf)
		goto out_nodbf;

209 210 211
	spin_lock_init(&kvm->arch.float_int.lock);
	INIT_LIST_HEAD(&kvm->arch.float_int.list);

212 213 214
	debug_register_view(kvm->arch.dbf, &debug_sprintf_view);
	VM_EVENT(kvm, 3, "%s", "vm created");

215 216 217 218 219 220 221
	if (type & KVM_VM_S390_UCONTROL) {
		kvm->arch.gmap = NULL;
	} else {
		kvm->arch.gmap = gmap_alloc(current->mm);
		if (!kvm->arch.gmap)
			goto out_nogmap;
	}
222
	return 0;
223 224
out_nogmap:
	debug_unregister(kvm->arch.dbf);
225 226
out_nodbf:
	free_page((unsigned long)(kvm->arch.sca));
227 228
out_err:
	return rc;
229 230
}

231 232 233
void kvm_arch_vcpu_destroy(struct kvm_vcpu *vcpu)
{
	VCPU_EVENT(vcpu, 3, "%s", "free cpu");
C
Carsten Otte 已提交
234 235 236 237 238 239 240
	if (!kvm_is_ucontrol(vcpu->kvm)) {
		clear_bit(63 - vcpu->vcpu_id,
			  (unsigned long *) &vcpu->kvm->arch.sca->mcn);
		if (vcpu->kvm->arch.sca->cpu[vcpu->vcpu_id].sda ==
		    (__u64) vcpu->arch.sie_block)
			vcpu->kvm->arch.sca->cpu[vcpu->vcpu_id].sda = 0;
	}
241
	smp_mb();
242 243 244 245

	if (kvm_is_ucontrol(vcpu->kvm))
		gmap_free(vcpu->arch.gmap);

246
	free_page((unsigned long)(vcpu->arch.sie_block));
247
	kvm_vcpu_uninit(vcpu);
248 249 250 251 252 253
	kfree(vcpu);
}

static void kvm_free_vcpus(struct kvm *kvm)
{
	unsigned int i;
254
	struct kvm_vcpu *vcpu;
255

256 257 258 259 260 261 262 263 264
	kvm_for_each_vcpu(i, vcpu, kvm)
		kvm_arch_vcpu_destroy(vcpu);

	mutex_lock(&kvm->lock);
	for (i = 0; i < atomic_read(&kvm->online_vcpus); i++)
		kvm->vcpus[i] = NULL;

	atomic_set(&kvm->online_vcpus, 0);
	mutex_unlock(&kvm->lock);
265 266
}

267 268 269 270
void kvm_arch_sync_events(struct kvm *kvm)
{
}

271 272
void kvm_arch_destroy_vm(struct kvm *kvm)
{
273
	kvm_free_vcpus(kvm);
274
	free_page((unsigned long)(kvm->arch.sca));
275
	debug_unregister(kvm->arch.dbf);
276 277
	if (!kvm_is_ucontrol(kvm))
		gmap_free(kvm->arch.gmap);
278 279 280 281 282
}

/* Section: vcpu related */
int kvm_arch_vcpu_init(struct kvm_vcpu *vcpu)
{
283 284 285 286 287 288 289
	if (kvm_is_ucontrol(vcpu->kvm)) {
		vcpu->arch.gmap = gmap_alloc(current->mm);
		if (!vcpu->arch.gmap)
			return -ENOMEM;
		return 0;
	}

290
	vcpu->arch.gmap = vcpu->kvm->arch.gmap;
291 292 293 294 295
	return 0;
}

void kvm_arch_vcpu_uninit(struct kvm_vcpu *vcpu)
{
296
	/* Nothing todo */
297 298 299 300 301 302 303 304 305
}

void kvm_arch_vcpu_load(struct kvm_vcpu *vcpu, int cpu)
{
	save_fp_regs(&vcpu->arch.host_fpregs);
	save_access_regs(vcpu->arch.host_acrs);
	vcpu->arch.guest_fpregs.fpc &= FPC_VALID_MASK;
	restore_fp_regs(&vcpu->arch.guest_fpregs);
	restore_access_regs(vcpu->arch.guest_acrs);
306
	gmap_enable(vcpu->arch.gmap);
307
	atomic_set_mask(CPUSTAT_RUNNING, &vcpu->arch.sie_block->cpuflags);
308 309 310 311
}

void kvm_arch_vcpu_put(struct kvm_vcpu *vcpu)
{
312
	atomic_clear_mask(CPUSTAT_RUNNING, &vcpu->arch.sie_block->cpuflags);
313
	gmap_disable(vcpu->arch.gmap);
314 315 316 317 318 319 320 321 322 323 324
	save_fp_regs(&vcpu->arch.guest_fpregs);
	save_access_regs(vcpu->arch.guest_acrs);
	restore_fp_regs(&vcpu->arch.host_fpregs);
	restore_access_regs(vcpu->arch.host_acrs);
}

static void kvm_s390_vcpu_initial_reset(struct kvm_vcpu *vcpu)
{
	/* this equals initial cpu reset in pop, but we don't switch to ESA */
	vcpu->arch.sie_block->gpsw.mask = 0UL;
	vcpu->arch.sie_block->gpsw.addr = 0UL;
325
	kvm_s390_set_prefix(vcpu, 0);
326 327 328 329 330 331 332 333 334 335 336 337 338
	vcpu->arch.sie_block->cputm     = 0UL;
	vcpu->arch.sie_block->ckc       = 0UL;
	vcpu->arch.sie_block->todpr     = 0;
	memset(vcpu->arch.sie_block->gcr, 0, 16 * sizeof(__u64));
	vcpu->arch.sie_block->gcr[0]  = 0xE0UL;
	vcpu->arch.sie_block->gcr[14] = 0xC2000000UL;
	vcpu->arch.guest_fpregs.fpc = 0;
	asm volatile("lfpc %0" : : "Q" (vcpu->arch.guest_fpregs.fpc));
	vcpu->arch.sie_block->gbea = 1;
}

int kvm_arch_vcpu_setup(struct kvm_vcpu *vcpu)
{
339 340 341
	atomic_set(&vcpu->arch.sie_block->cpuflags, CPUSTAT_ZARCH |
						    CPUSTAT_SM |
						    CPUSTAT_STOPPED);
342
	vcpu->arch.sie_block->ecb   = 6;
343
	vcpu->arch.sie_block->eca   = 0xC1002001U;
344
	vcpu->arch.sie_block->fac   = (int) (long) facilities;
345 346 347 348
	hrtimer_init(&vcpu->arch.ckc_timer, CLOCK_REALTIME, HRTIMER_MODE_ABS);
	tasklet_init(&vcpu->arch.tasklet, kvm_s390_tasklet,
		     (unsigned long) vcpu);
	vcpu->arch.ckc_timer.function = kvm_s390_idle_wakeup;
349
	get_cpu_id(&vcpu->arch.cpu_id);
350
	vcpu->arch.cpu_id.version = 0xff;
351 352 353 354 355 356
	return 0;
}

struct kvm_vcpu *kvm_arch_vcpu_create(struct kvm *kvm,
				      unsigned int id)
{
357 358 359 360 361 362 363
	struct kvm_vcpu *vcpu;
	int rc = -EINVAL;

	if (id >= KVM_MAX_VCPUS)
		goto out;

	rc = -ENOMEM;
364

365
	vcpu = kzalloc(sizeof(struct kvm_vcpu), GFP_KERNEL);
366
	if (!vcpu)
367
		goto out;
368

369 370
	vcpu->arch.sie_block = (struct kvm_s390_sie_block *)
					get_zeroed_page(GFP_KERNEL);
371 372 373 374 375

	if (!vcpu->arch.sie_block)
		goto out_free_cpu;

	vcpu->arch.sie_block->icpua = id;
C
Carsten Otte 已提交
376 377 378 379 380 381 382 383 384 385 386 387 388
	if (!kvm_is_ucontrol(kvm)) {
		if (!kvm->arch.sca) {
			WARN_ON_ONCE(1);
			goto out_free_cpu;
		}
		if (!kvm->arch.sca->cpu[id].sda)
			kvm->arch.sca->cpu[id].sda =
				(__u64) vcpu->arch.sie_block;
		vcpu->arch.sie_block->scaoh =
			(__u32)(((__u64)kvm->arch.sca) >> 32);
		vcpu->arch.sie_block->scaol = (__u32)(__u64)kvm->arch.sca;
		set_bit(63 - id, (unsigned long *) &kvm->arch.sca->mcn);
	}
389

390 391 392
	spin_lock_init(&vcpu->arch.local_int.lock);
	INIT_LIST_HEAD(&vcpu->arch.local_int.list);
	vcpu->arch.local_int.float_int = &kvm->arch.float_int;
393
	spin_lock(&kvm->arch.float_int.lock);
394 395
	kvm->arch.float_int.local_int[id] = &vcpu->arch.local_int;
	init_waitqueue_head(&vcpu->arch.local_int.wq);
396
	vcpu->arch.local_int.cpuflags = &vcpu->arch.sie_block->cpuflags;
397
	spin_unlock(&kvm->arch.float_int.lock);
398

399 400
	rc = kvm_vcpu_init(vcpu, kvm, id);
	if (rc)
401
		goto out_free_sie_block;
402 403 404 405
	VM_EVENT(kvm, 3, "create cpu %d at %p, sie block at %p", id, vcpu,
		 vcpu->arch.sie_block);

	return vcpu;
406 407
out_free_sie_block:
	free_page((unsigned long)(vcpu->arch.sie_block));
408 409
out_free_cpu:
	kfree(vcpu);
410
out:
411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443
	return ERR_PTR(rc);
}

int kvm_arch_vcpu_runnable(struct kvm_vcpu *vcpu)
{
	/* kvm common code refers to this, but never calls it */
	BUG();
	return 0;
}

static int kvm_arch_vcpu_ioctl_initial_reset(struct kvm_vcpu *vcpu)
{
	kvm_s390_vcpu_initial_reset(vcpu);
	return 0;
}

int kvm_arch_vcpu_ioctl_set_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs)
{
	memcpy(&vcpu->arch.guest_gprs, &regs->gprs, sizeof(regs->gprs));
	return 0;
}

int kvm_arch_vcpu_ioctl_get_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs)
{
	memcpy(&regs->gprs, &vcpu->arch.guest_gprs, sizeof(regs->gprs));
	return 0;
}

int kvm_arch_vcpu_ioctl_set_sregs(struct kvm_vcpu *vcpu,
				  struct kvm_sregs *sregs)
{
	memcpy(&vcpu->arch.guest_acrs, &sregs->acrs, sizeof(sregs->acrs));
	memcpy(&vcpu->arch.sie_block->gcr, &sregs->crs, sizeof(sregs->crs));
C
Carsten Otte 已提交
444
	restore_access_regs(vcpu->arch.guest_acrs);
445 446 447 448 449 450 451 452 453 454 455 456 457 458 459
	return 0;
}

int kvm_arch_vcpu_ioctl_get_sregs(struct kvm_vcpu *vcpu,
				  struct kvm_sregs *sregs)
{
	memcpy(&sregs->acrs, &vcpu->arch.guest_acrs, sizeof(sregs->acrs));
	memcpy(&sregs->crs, &vcpu->arch.sie_block->gcr, sizeof(sregs->crs));
	return 0;
}

int kvm_arch_vcpu_ioctl_set_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu)
{
	memcpy(&vcpu->arch.guest_fpregs.fprs, &fpu->fprs, sizeof(fpu->fprs));
	vcpu->arch.guest_fpregs.fpc = fpu->fpc;
C
Carsten Otte 已提交
460
	restore_fp_regs(&vcpu->arch.guest_fpregs);
461 462 463 464 465 466 467 468 469 470 471 472 473 474
	return 0;
}

int kvm_arch_vcpu_ioctl_get_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu)
{
	memcpy(&fpu->fprs, &vcpu->arch.guest_fpregs.fprs, sizeof(fpu->fprs));
	fpu->fpc = vcpu->arch.guest_fpregs.fpc;
	return 0;
}

static int kvm_arch_vcpu_ioctl_set_initial_psw(struct kvm_vcpu *vcpu, psw_t psw)
{
	int rc = 0;

475
	if (!(atomic_read(&vcpu->arch.sie_block->cpuflags) & CPUSTAT_STOPPED))
476
		rc = -EBUSY;
477 478 479 480
	else {
		vcpu->run->psw_mask = psw.mask;
		vcpu->run->psw_addr = psw.addr;
	}
481 482 483 484 485 486 487 488 489
	return rc;
}

int kvm_arch_vcpu_ioctl_translate(struct kvm_vcpu *vcpu,
				  struct kvm_translation *tr)
{
	return -EINVAL; /* not implemented yet */
}

J
Jan Kiszka 已提交
490 491
int kvm_arch_vcpu_ioctl_set_guest_debug(struct kvm_vcpu *vcpu,
					struct kvm_guest_debug *dbg)
492 493 494 495
{
	return -EINVAL; /* not implemented yet */
}

496 497 498 499 500 501 502 503 504 505 506 507
int kvm_arch_vcpu_ioctl_get_mpstate(struct kvm_vcpu *vcpu,
				    struct kvm_mp_state *mp_state)
{
	return -EINVAL; /* not implemented yet */
}

int kvm_arch_vcpu_ioctl_set_mpstate(struct kvm_vcpu *vcpu,
				    struct kvm_mp_state *mp_state)
{
	return -EINVAL; /* not implemented yet */
}

508
static int __vcpu_run(struct kvm_vcpu *vcpu)
509
{
510 511
	int rc;

512 513 514 515 516
	memcpy(&vcpu->arch.sie_block->gg14, &vcpu->arch.guest_gprs[14], 16);

	if (need_resched())
		schedule();

517 518 519
	if (test_thread_flag(TIF_MCCK_PENDING))
		s390_handle_mcck();

520 521
	if (!kvm_is_ucontrol(vcpu->kvm))
		kvm_s390_deliver_pending_interrupts(vcpu);
C
Carsten Otte 已提交
522

523 524 525 526 527 528
	vcpu->arch.sie_block->icptcode = 0;
	local_irq_disable();
	kvm_guest_enter();
	local_irq_enable();
	VCPU_EVENT(vcpu, 6, "entering sie flags %x",
		   atomic_read(&vcpu->arch.sie_block->cpuflags));
529 530 531 532 533 534 535 536 537
	rc = sie64a(vcpu->arch.sie_block, vcpu->arch.guest_gprs);
	if (rc) {
		if (kvm_is_ucontrol(vcpu->kvm)) {
			rc = SIE_INTERCEPT_UCONTROL;
		} else {
			VCPU_EVENT(vcpu, 3, "%s", "fault in sie instruction");
			kvm_s390_inject_program_int(vcpu, PGM_ADDRESSING);
			rc = 0;
		}
538
	}
539 540 541 542 543 544 545
	VCPU_EVENT(vcpu, 6, "exit sie icptcode %d",
		   vcpu->arch.sie_block->icptcode);
	local_irq_disable();
	kvm_guest_exit();
	local_irq_enable();

	memcpy(&vcpu->arch.guest_gprs[14], &vcpu->arch.sie_block->gg14, 16);
546
	return rc;
547 548 549 550
}

int kvm_arch_vcpu_ioctl_run(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
{
551
	int rc;
552 553
	sigset_t sigsaved;

554
rerun_vcpu:
555 556 557
	if (vcpu->sigset_active)
		sigprocmask(SIG_SETMASK, &vcpu->sigset, &sigsaved);

558
	atomic_clear_mask(CPUSTAT_STOPPED, &vcpu->arch.sie_block->cpuflags);
559

560 561
	BUG_ON(vcpu->kvm->arch.float_int.local_int[vcpu->vcpu_id] == NULL);

562 563 564
	switch (kvm_run->exit_reason) {
	case KVM_EXIT_S390_SIEIC:
	case KVM_EXIT_UNKNOWN:
565
	case KVM_EXIT_INTR:
566
	case KVM_EXIT_S390_RESET:
567
	case KVM_EXIT_S390_UCONTROL:
568 569 570 571 572
		break;
	default:
		BUG();
	}

573 574 575
	vcpu->arch.sie_block->gpsw.mask = kvm_run->psw_mask;
	vcpu->arch.sie_block->gpsw.addr = kvm_run->psw_addr;

576
	might_fault();
577 578

	do {
579 580 581
		rc = __vcpu_run(vcpu);
		if (rc)
			break;
582 583 584 585
		if (kvm_is_ucontrol(vcpu->kvm))
			rc = -EOPNOTSUPP;
		else
			rc = kvm_handle_sie_intercept(vcpu);
586 587
	} while (!signal_pending(current) && !rc);

588 589 590
	if (rc == SIE_INTERCEPT_RERUNVCPU)
		goto rerun_vcpu;

591 592
	if (signal_pending(current) && !rc) {
		kvm_run->exit_reason = KVM_EXIT_INTR;
593
		rc = -EINTR;
594
	}
595

596 597 598 599 600 601 602 603 604 605
#ifdef CONFIG_KVM_S390_UCONTROL
	if (rc == SIE_INTERCEPT_UCONTROL) {
		kvm_run->exit_reason = KVM_EXIT_S390_UCONTROL;
		kvm_run->s390_ucontrol.trans_exc_code =
			current->thread.gmap_addr;
		kvm_run->s390_ucontrol.pgm_code = 0x10;
		rc = 0;
	}
#endif

606
	if (rc == -EOPNOTSUPP) {
607 608 609 610 611 612 613 614 615 616 617 618 619
		/* intercept cannot be handled in-kernel, prepare kvm-run */
		kvm_run->exit_reason         = KVM_EXIT_S390_SIEIC;
		kvm_run->s390_sieic.icptcode = vcpu->arch.sie_block->icptcode;
		kvm_run->s390_sieic.ipa      = vcpu->arch.sie_block->ipa;
		kvm_run->s390_sieic.ipb      = vcpu->arch.sie_block->ipb;
		rc = 0;
	}

	if (rc == -EREMOTE) {
		/* intercept was handled, but userspace support is needed
		 * kvm_run has been prepared by the handler */
		rc = 0;
	}
620

621 622 623
	kvm_run->psw_mask     = vcpu->arch.sie_block->gpsw.mask;
	kvm_run->psw_addr     = vcpu->arch.sie_block->gpsw.addr;

624 625 626 627
	if (vcpu->sigset_active)
		sigprocmask(SIG_SETMASK, &sigsaved, NULL);

	vcpu->stat.exit_userspace++;
628
	return rc;
629 630
}

631
static int __guestcopy(struct kvm_vcpu *vcpu, u64 guestdest, void *from,
632 633 634 635 636 637 638 639 640 641 642 643 644 645
		       unsigned long n, int prefix)
{
	if (prefix)
		return copy_to_guest(vcpu, guestdest, from, n);
	else
		return copy_to_guest_absolute(vcpu, guestdest, from, n);
}

/*
 * store status at address
 * we use have two special cases:
 * KVM_S390_STORE_STATUS_NOADDR: -> 0x1200 on 64 bit
 * KVM_S390_STORE_STATUS_PREFIXED: -> prefix
 */
646
int kvm_s390_vcpu_store_status(struct kvm_vcpu *vcpu, unsigned long addr)
647
{
648
	unsigned char archmode = 1;
649 650 651 652 653 654 655 656 657 658 659 660 661 662 663
	int prefix;

	if (addr == KVM_S390_STORE_STATUS_NOADDR) {
		if (copy_to_guest_absolute(vcpu, 163ul, &archmode, 1))
			return -EFAULT;
		addr = SAVE_AREA_BASE;
		prefix = 0;
	} else if (addr == KVM_S390_STORE_STATUS_PREFIXED) {
		if (copy_to_guest(vcpu, 163ul, &archmode, 1))
			return -EFAULT;
		addr = SAVE_AREA_BASE;
		prefix = 1;
	} else
		prefix = 0;

664
	if (__guestcopy(vcpu, addr + offsetof(struct save_area, fp_regs),
665 666 667
			vcpu->arch.guest_fpregs.fprs, 128, prefix))
		return -EFAULT;

668
	if (__guestcopy(vcpu, addr + offsetof(struct save_area, gp_regs),
669 670 671
			vcpu->arch.guest_gprs, 128, prefix))
		return -EFAULT;

672
	if (__guestcopy(vcpu, addr + offsetof(struct save_area, psw),
673 674 675
			&vcpu->arch.sie_block->gpsw, 16, prefix))
		return -EFAULT;

676
	if (__guestcopy(vcpu, addr + offsetof(struct save_area, pref_reg),
677 678 679 680
			&vcpu->arch.sie_block->prefix, 4, prefix))
		return -EFAULT;

	if (__guestcopy(vcpu,
681
			addr + offsetof(struct save_area, fp_ctrl_reg),
682 683 684
			&vcpu->arch.guest_fpregs.fpc, 4, prefix))
		return -EFAULT;

685
	if (__guestcopy(vcpu, addr + offsetof(struct save_area, tod_reg),
686 687 688
			&vcpu->arch.sie_block->todpr, 4, prefix))
		return -EFAULT;

689
	if (__guestcopy(vcpu, addr + offsetof(struct save_area, timer),
690 691 692
			&vcpu->arch.sie_block->cputm, 8, prefix))
		return -EFAULT;

693
	if (__guestcopy(vcpu, addr + offsetof(struct save_area, clk_cmp),
694 695 696
			&vcpu->arch.sie_block->ckc, 8, prefix))
		return -EFAULT;

697
	if (__guestcopy(vcpu, addr + offsetof(struct save_area, acc_regs),
698 699 700 701
			&vcpu->arch.guest_acrs, 64, prefix))
		return -EFAULT;

	if (__guestcopy(vcpu,
702
			addr + offsetof(struct save_area, ctrl_regs),
703 704 705 706 707 708 709 710 711 712
			&vcpu->arch.sie_block->gcr, 128, prefix))
		return -EFAULT;
	return 0;
}

long kvm_arch_vcpu_ioctl(struct file *filp,
			 unsigned int ioctl, unsigned long arg)
{
	struct kvm_vcpu *vcpu = filp->private_data;
	void __user *argp = (void __user *)arg;
713
	long r;
714

715 716
	switch (ioctl) {
	case KVM_S390_INTERRUPT: {
717 718
		struct kvm_s390_interrupt s390int;

719
		r = -EFAULT;
720
		if (copy_from_user(&s390int, argp, sizeof(s390int)))
721 722 723
			break;
		r = kvm_s390_inject_vcpu(vcpu, &s390int);
		break;
724
	}
725
	case KVM_S390_STORE_STATUS:
726 727
		r = kvm_s390_vcpu_store_status(vcpu, arg);
		break;
728 729 730
	case KVM_S390_SET_INITIAL_PSW: {
		psw_t psw;

731
		r = -EFAULT;
732
		if (copy_from_user(&psw, argp, sizeof(psw)))
733 734 735
			break;
		r = kvm_arch_vcpu_ioctl_set_initial_psw(vcpu, psw);
		break;
736 737
	}
	case KVM_S390_INITIAL_RESET:
738 739
		r = kvm_arch_vcpu_ioctl_initial_reset(vcpu);
		break;
740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775
#ifdef CONFIG_KVM_S390_UCONTROL
	case KVM_S390_UCAS_MAP: {
		struct kvm_s390_ucas_mapping ucasmap;

		if (copy_from_user(&ucasmap, argp, sizeof(ucasmap))) {
			r = -EFAULT;
			break;
		}

		if (!kvm_is_ucontrol(vcpu->kvm)) {
			r = -EINVAL;
			break;
		}

		r = gmap_map_segment(vcpu->arch.gmap, ucasmap.user_addr,
				     ucasmap.vcpu_addr, ucasmap.length);
		break;
	}
	case KVM_S390_UCAS_UNMAP: {
		struct kvm_s390_ucas_mapping ucasmap;

		if (copy_from_user(&ucasmap, argp, sizeof(ucasmap))) {
			r = -EFAULT;
			break;
		}

		if (!kvm_is_ucontrol(vcpu->kvm)) {
			r = -EINVAL;
			break;
		}

		r = gmap_unmap_segment(vcpu->arch.gmap, ucasmap.vcpu_addr,
			ucasmap.length);
		break;
	}
#endif
776 777 778 779 780 781
	case KVM_S390_VCPU_FAULT: {
		r = gmap_fault(arg, vcpu->arch.gmap);
		if (!IS_ERR_VALUE(r))
			r = 0;
		break;
	}
782
	default:
783
		r = -ENOTTY;
784
	}
785
	return r;
786 787
}

788 789 790 791 792 793 794 795 796 797 798 799 800
int kvm_arch_vcpu_fault(struct kvm_vcpu *vcpu, struct vm_fault *vmf)
{
#ifdef CONFIG_KVM_S390_UCONTROL
	if ((vmf->pgoff == KVM_S390_SIE_PAGE_OFFSET)
		 && (kvm_is_ucontrol(vcpu->kvm))) {
		vmf->page = virt_to_page(vcpu->arch.sie_block);
		get_page(vmf->page);
		return 0;
	}
#endif
	return VM_FAULT_SIGBUS;
}

801
/* Section: memory related */
802 803 804 805 806
int kvm_arch_prepare_memory_region(struct kvm *kvm,
				   struct kvm_memory_slot *memslot,
				   struct kvm_memory_slot old,
				   struct kvm_userspace_memory_region *mem,
				   int user_alloc)
807 808 809 810 811 812 813 814
{
	/* A few sanity checks. We can have exactly one memory slot which has
	   to start at guest virtual zero and which has to be located at a
	   page boundary in userland and which has to end at a page boundary.
	   The memory in userland is ok to be fragmented into various different
	   vmas. It is okay to mmap() and munmap() stuff in this slot after
	   doing this call at any time */

815
	if (mem->slot)
816 817 818 819 820
		return -EINVAL;

	if (mem->guest_phys_addr)
		return -EINVAL;

821
	if (mem->userspace_addr & 0xffffful)
822 823
		return -EINVAL;

824
	if (mem->memory_size & 0xffffful)
825 826
		return -EINVAL;

827 828 829
	if (!user_alloc)
		return -EINVAL;

830 831 832 833 834 835 836 837
	return 0;
}

void kvm_arch_commit_memory_region(struct kvm *kvm,
				struct kvm_userspace_memory_region *mem,
				struct kvm_memory_slot old,
				int user_alloc)
{
838
	int rc;
839

840 841 842 843

	rc = gmap_map_segment(kvm->arch.gmap, mem->userspace_addr,
		mem->guest_phys_addr, mem->memory_size);
	if (rc)
844
		printk(KERN_WARNING "kvm-s390: failed to commit memory region\n");
845
	return;
846 847
}

848 849 850 851
void kvm_arch_flush_shadow(struct kvm *kvm)
{
}

852 853
static int __init kvm_s390_init(void)
{
854
	int ret;
855
	ret = kvm_init(NULL, sizeof(struct kvm_vcpu), 0, THIS_MODULE);
856 857 858 859 860
	if (ret)
		return ret;

	/*
	 * guests can ask for up to 255+1 double words, we need a full page
L
Lucas De Marchi 已提交
861
	 * to hold the maximum amount of facilities. On the other hand, we
862 863
	 * only set facilities that are known to work in KVM.
	 */
864
	facilities = (unsigned long long *) get_zeroed_page(GFP_KERNEL|GFP_DMA);
865 866 867 868
	if (!facilities) {
		kvm_exit();
		return -ENOMEM;
	}
869
	memcpy(facilities, S390_lowcore.stfle_fac_list, 16);
870
	facilities[0] &= 0xff00fff3f47c0000ULL;
871
	facilities[1] &= 0x201c000000000000ULL;
872
	return 0;
873 874 875 876
}

static void __exit kvm_s390_exit(void)
{
877
	free_page((unsigned long) facilities);
878 879 880 881 882
	kvm_exit();
}

module_init(kvm_s390_init);
module_exit(kvm_s390_exit);