Merge tag 'split-asm_system_h-for-linus-20120328' of git://git.kernel.org/pub/scm...
[linux-flexiantxendom0-3.2.10.git] / arch / s390 / kvm / kvm-s390.c
1 /*
2  * s390host.c --  hosting zSeries kernel virtual machines
3  *
4  * Copyright IBM Corp. 2008,2009
5  *
6  * This program is free software; you can redistribute it and/or modify
7  * it under the terms of the GNU General Public License (version 2 only)
8  * as published by the Free Software Foundation.
9  *
10  *    Author(s): Carsten Otte <cotte@de.ibm.com>
11  *               Christian Borntraeger <borntraeger@de.ibm.com>
12  *               Heiko Carstens <heiko.carstens@de.ibm.com>
13  *               Christian Ehrhardt <ehrhardt@de.ibm.com>
14  */
15
16 #include <linux/compiler.h>
17 #include <linux/err.h>
18 #include <linux/fs.h>
19 #include <linux/hrtimer.h>
20 #include <linux/init.h>
21 #include <linux/kvm.h>
22 #include <linux/kvm_host.h>
23 #include <linux/module.h>
24 #include <linux/slab.h>
25 #include <linux/timer.h>
26 #include <asm/asm-offsets.h>
27 #include <asm/lowcore.h>
28 #include <asm/pgtable.h>
29 #include <asm/nmi.h>
30 #include <asm/switch_to.h>
31 #include "kvm-s390.h"
32 #include "gaccess.h"
33
34 #define VCPU_STAT(x) offsetof(struct kvm_vcpu, stat.x), KVM_STAT_VCPU
35
36 struct kvm_stats_debugfs_item debugfs_entries[] = {
37         { "userspace_handled", VCPU_STAT(exit_userspace) },
38         { "exit_null", VCPU_STAT(exit_null) },
39         { "exit_validity", VCPU_STAT(exit_validity) },
40         { "exit_stop_request", VCPU_STAT(exit_stop_request) },
41         { "exit_external_request", VCPU_STAT(exit_external_request) },
42         { "exit_external_interrupt", VCPU_STAT(exit_external_interrupt) },
43         { "exit_instruction", VCPU_STAT(exit_instruction) },
44         { "exit_program_interruption", VCPU_STAT(exit_program_interruption) },
45         { "exit_instr_and_program_int", VCPU_STAT(exit_instr_and_program) },
46         { "instruction_lctlg", VCPU_STAT(instruction_lctlg) },
47         { "instruction_lctl", VCPU_STAT(instruction_lctl) },
48         { "deliver_emergency_signal", VCPU_STAT(deliver_emergency_signal) },
49         { "deliver_external_call", VCPU_STAT(deliver_external_call) },
50         { "deliver_service_signal", VCPU_STAT(deliver_service_signal) },
51         { "deliver_virtio_interrupt", VCPU_STAT(deliver_virtio_interrupt) },
52         { "deliver_stop_signal", VCPU_STAT(deliver_stop_signal) },
53         { "deliver_prefix_signal", VCPU_STAT(deliver_prefix_signal) },
54         { "deliver_restart_signal", VCPU_STAT(deliver_restart_signal) },
55         { "deliver_program_interruption", VCPU_STAT(deliver_program_int) },
56         { "exit_wait_state", VCPU_STAT(exit_wait_state) },
57         { "instruction_stidp", VCPU_STAT(instruction_stidp) },
58         { "instruction_spx", VCPU_STAT(instruction_spx) },
59         { "instruction_stpx", VCPU_STAT(instruction_stpx) },
60         { "instruction_stap", VCPU_STAT(instruction_stap) },
61         { "instruction_storage_key", VCPU_STAT(instruction_storage_key) },
62         { "instruction_stsch", VCPU_STAT(instruction_stsch) },
63         { "instruction_chsc", VCPU_STAT(instruction_chsc) },
64         { "instruction_stsi", VCPU_STAT(instruction_stsi) },
65         { "instruction_stfl", VCPU_STAT(instruction_stfl) },
66         { "instruction_tprot", VCPU_STAT(instruction_tprot) },
67         { "instruction_sigp_sense", VCPU_STAT(instruction_sigp_sense) },
68         { "instruction_sigp_sense_running", VCPU_STAT(instruction_sigp_sense_running) },
69         { "instruction_sigp_external_call", VCPU_STAT(instruction_sigp_external_call) },
70         { "instruction_sigp_emergency", VCPU_STAT(instruction_sigp_emergency) },
71         { "instruction_sigp_stop", VCPU_STAT(instruction_sigp_stop) },
72         { "instruction_sigp_set_arch", VCPU_STAT(instruction_sigp_arch) },
73         { "instruction_sigp_set_prefix", VCPU_STAT(instruction_sigp_prefix) },
74         { "instruction_sigp_restart", VCPU_STAT(instruction_sigp_restart) },
75         { "diagnose_10", VCPU_STAT(diagnose_10) },
76         { "diagnose_44", VCPU_STAT(diagnose_44) },
77         { NULL }
78 };
79
80 static unsigned long long *facilities;
81
82 /* Section: not file related */
83 int kvm_arch_hardware_enable(void *garbage)
84 {
85         /* every s390 is virtualization enabled ;-) */
86         return 0;
87 }
88
89 void kvm_arch_hardware_disable(void *garbage)
90 {
91 }
92
93 int kvm_arch_hardware_setup(void)
94 {
95         return 0;
96 }
97
98 void kvm_arch_hardware_unsetup(void)
99 {
100 }
101
102 void kvm_arch_check_processor_compat(void *rtn)
103 {
104 }
105
106 int kvm_arch_init(void *opaque)
107 {
108         return 0;
109 }
110
111 void kvm_arch_exit(void)
112 {
113 }
114
115 /* Section: device related */
116 long kvm_arch_dev_ioctl(struct file *filp,
117                         unsigned int ioctl, unsigned long arg)
118 {
119         if (ioctl == KVM_S390_ENABLE_SIE)
120                 return s390_enable_sie();
121         return -EINVAL;
122 }
123
124 int kvm_dev_ioctl_check_extension(long ext)
125 {
126         int r;
127
128         switch (ext) {
129         case KVM_CAP_S390_PSW:
130         case KVM_CAP_S390_GMAP:
131         case KVM_CAP_SYNC_MMU:
132 #ifdef CONFIG_KVM_S390_UCONTROL
133         case KVM_CAP_S390_UCONTROL:
134 #endif
135         case KVM_CAP_SYNC_REGS:
136                 r = 1;
137                 break;
138         default:
139                 r = 0;
140         }
141         return r;
142 }
143
144 /* Section: vm related */
145 /*
146  * Get (and clear) the dirty memory log for a memory slot.
147  */
148 int kvm_vm_ioctl_get_dirty_log(struct kvm *kvm,
149                                struct kvm_dirty_log *log)
150 {
151         return 0;
152 }
153
154 long kvm_arch_vm_ioctl(struct file *filp,
155                        unsigned int ioctl, unsigned long arg)
156 {
157         struct kvm *kvm = filp->private_data;
158         void __user *argp = (void __user *)arg;
159         int r;
160
161         switch (ioctl) {
162         case KVM_S390_INTERRUPT: {
163                 struct kvm_s390_interrupt s390int;
164
165                 r = -EFAULT;
166                 if (copy_from_user(&s390int, argp, sizeof(s390int)))
167                         break;
168                 r = kvm_s390_inject_vm(kvm, &s390int);
169                 break;
170         }
171         default:
172                 r = -ENOTTY;
173         }
174
175         return r;
176 }
177
178 int kvm_arch_init_vm(struct kvm *kvm, unsigned long type)
179 {
180         int rc;
181         char debug_name[16];
182
183         rc = -EINVAL;
184 #ifdef CONFIG_KVM_S390_UCONTROL
185         if (type & ~KVM_VM_S390_UCONTROL)
186                 goto out_err;
187         if ((type & KVM_VM_S390_UCONTROL) && (!capable(CAP_SYS_ADMIN)))
188                 goto out_err;
189 #else
190         if (type)
191                 goto out_err;
192 #endif
193
194         rc = s390_enable_sie();
195         if (rc)
196                 goto out_err;
197
198         rc = -ENOMEM;
199
200         kvm->arch.sca = (struct sca_block *) get_zeroed_page(GFP_KERNEL);
201         if (!kvm->arch.sca)
202                 goto out_err;
203
204         sprintf(debug_name, "kvm-%u", current->pid);
205
206         kvm->arch.dbf = debug_register(debug_name, 8, 2, 8 * sizeof(long));
207         if (!kvm->arch.dbf)
208                 goto out_nodbf;
209
210         spin_lock_init(&kvm->arch.float_int.lock);
211         INIT_LIST_HEAD(&kvm->arch.float_int.list);
212
213         debug_register_view(kvm->arch.dbf, &debug_sprintf_view);
214         VM_EVENT(kvm, 3, "%s", "vm created");
215
216         if (type & KVM_VM_S390_UCONTROL) {
217                 kvm->arch.gmap = NULL;
218         } else {
219                 kvm->arch.gmap = gmap_alloc(current->mm);
220                 if (!kvm->arch.gmap)
221                         goto out_nogmap;
222         }
223         return 0;
224 out_nogmap:
225         debug_unregister(kvm->arch.dbf);
226 out_nodbf:
227         free_page((unsigned long)(kvm->arch.sca));
228 out_err:
229         return rc;
230 }
231
232 void kvm_arch_vcpu_destroy(struct kvm_vcpu *vcpu)
233 {
234         VCPU_EVENT(vcpu, 3, "%s", "free cpu");
235         if (!kvm_is_ucontrol(vcpu->kvm)) {
236                 clear_bit(63 - vcpu->vcpu_id,
237                           (unsigned long *) &vcpu->kvm->arch.sca->mcn);
238                 if (vcpu->kvm->arch.sca->cpu[vcpu->vcpu_id].sda ==
239                     (__u64) vcpu->arch.sie_block)
240                         vcpu->kvm->arch.sca->cpu[vcpu->vcpu_id].sda = 0;
241         }
242         smp_mb();
243
244         if (kvm_is_ucontrol(vcpu->kvm))
245                 gmap_free(vcpu->arch.gmap);
246
247         free_page((unsigned long)(vcpu->arch.sie_block));
248         kvm_vcpu_uninit(vcpu);
249         kfree(vcpu);
250 }
251
252 static void kvm_free_vcpus(struct kvm *kvm)
253 {
254         unsigned int i;
255         struct kvm_vcpu *vcpu;
256
257         kvm_for_each_vcpu(i, vcpu, kvm)
258                 kvm_arch_vcpu_destroy(vcpu);
259
260         mutex_lock(&kvm->lock);
261         for (i = 0; i < atomic_read(&kvm->online_vcpus); i++)
262                 kvm->vcpus[i] = NULL;
263
264         atomic_set(&kvm->online_vcpus, 0);
265         mutex_unlock(&kvm->lock);
266 }
267
268 void kvm_arch_sync_events(struct kvm *kvm)
269 {
270 }
271
272 void kvm_arch_destroy_vm(struct kvm *kvm)
273 {
274         kvm_free_vcpus(kvm);
275         free_page((unsigned long)(kvm->arch.sca));
276         debug_unregister(kvm->arch.dbf);
277         if (!kvm_is_ucontrol(kvm))
278                 gmap_free(kvm->arch.gmap);
279 }
280
281 /* Section: vcpu related */
282 int kvm_arch_vcpu_init(struct kvm_vcpu *vcpu)
283 {
284         if (kvm_is_ucontrol(vcpu->kvm)) {
285                 vcpu->arch.gmap = gmap_alloc(current->mm);
286                 if (!vcpu->arch.gmap)
287                         return -ENOMEM;
288                 return 0;
289         }
290
291         vcpu->arch.gmap = vcpu->kvm->arch.gmap;
292         vcpu->run->kvm_valid_regs = KVM_SYNC_PREFIX |
293                                     KVM_SYNC_GPRS |
294                                     KVM_SYNC_ACRS |
295                                     KVM_SYNC_CRS;
296         return 0;
297 }
298
299 void kvm_arch_vcpu_uninit(struct kvm_vcpu *vcpu)
300 {
301         /* Nothing todo */
302 }
303
304 void kvm_arch_vcpu_load(struct kvm_vcpu *vcpu, int cpu)
305 {
306         save_fp_regs(&vcpu->arch.host_fpregs);
307         save_access_regs(vcpu->arch.host_acrs);
308         vcpu->arch.guest_fpregs.fpc &= FPC_VALID_MASK;
309         restore_fp_regs(&vcpu->arch.guest_fpregs);
310         restore_access_regs(vcpu->run->s.regs.acrs);
311         gmap_enable(vcpu->arch.gmap);
312         atomic_set_mask(CPUSTAT_RUNNING, &vcpu->arch.sie_block->cpuflags);
313 }
314
315 void kvm_arch_vcpu_put(struct kvm_vcpu *vcpu)
316 {
317         atomic_clear_mask(CPUSTAT_RUNNING, &vcpu->arch.sie_block->cpuflags);
318         gmap_disable(vcpu->arch.gmap);
319         save_fp_regs(&vcpu->arch.guest_fpregs);
320         save_access_regs(vcpu->run->s.regs.acrs);
321         restore_fp_regs(&vcpu->arch.host_fpregs);
322         restore_access_regs(vcpu->arch.host_acrs);
323 }
324
325 static void kvm_s390_vcpu_initial_reset(struct kvm_vcpu *vcpu)
326 {
327         /* this equals initial cpu reset in pop, but we don't switch to ESA */
328         vcpu->arch.sie_block->gpsw.mask = 0UL;
329         vcpu->arch.sie_block->gpsw.addr = 0UL;
330         kvm_s390_set_prefix(vcpu, 0);
331         vcpu->arch.sie_block->cputm     = 0UL;
332         vcpu->arch.sie_block->ckc       = 0UL;
333         vcpu->arch.sie_block->todpr     = 0;
334         memset(vcpu->arch.sie_block->gcr, 0, 16 * sizeof(__u64));
335         vcpu->arch.sie_block->gcr[0]  = 0xE0UL;
336         vcpu->arch.sie_block->gcr[14] = 0xC2000000UL;
337         vcpu->arch.guest_fpregs.fpc = 0;
338         asm volatile("lfpc %0" : : "Q" (vcpu->arch.guest_fpregs.fpc));
339         vcpu->arch.sie_block->gbea = 1;
340 }
341
342 int kvm_arch_vcpu_setup(struct kvm_vcpu *vcpu)
343 {
344         atomic_set(&vcpu->arch.sie_block->cpuflags, CPUSTAT_ZARCH |
345                                                     CPUSTAT_SM |
346                                                     CPUSTAT_STOPPED);
347         vcpu->arch.sie_block->ecb   = 6;
348         vcpu->arch.sie_block->eca   = 0xC1002001U;
349         vcpu->arch.sie_block->fac   = (int) (long) facilities;
350         hrtimer_init(&vcpu->arch.ckc_timer, CLOCK_REALTIME, HRTIMER_MODE_ABS);
351         tasklet_init(&vcpu->arch.tasklet, kvm_s390_tasklet,
352                      (unsigned long) vcpu);
353         vcpu->arch.ckc_timer.function = kvm_s390_idle_wakeup;
354         get_cpu_id(&vcpu->arch.cpu_id);
355         vcpu->arch.cpu_id.version = 0xff;
356         return 0;
357 }
358
359 struct kvm_vcpu *kvm_arch_vcpu_create(struct kvm *kvm,
360                                       unsigned int id)
361 {
362         struct kvm_vcpu *vcpu;
363         int rc = -EINVAL;
364
365         if (id >= KVM_MAX_VCPUS)
366                 goto out;
367
368         rc = -ENOMEM;
369
370         vcpu = kzalloc(sizeof(struct kvm_vcpu), GFP_KERNEL);
371         if (!vcpu)
372                 goto out;
373
374         vcpu->arch.sie_block = (struct kvm_s390_sie_block *)
375                                         get_zeroed_page(GFP_KERNEL);
376
377         if (!vcpu->arch.sie_block)
378                 goto out_free_cpu;
379
380         vcpu->arch.sie_block->icpua = id;
381         if (!kvm_is_ucontrol(kvm)) {
382                 if (!kvm->arch.sca) {
383                         WARN_ON_ONCE(1);
384                         goto out_free_cpu;
385                 }
386                 if (!kvm->arch.sca->cpu[id].sda)
387                         kvm->arch.sca->cpu[id].sda =
388                                 (__u64) vcpu->arch.sie_block;
389                 vcpu->arch.sie_block->scaoh =
390                         (__u32)(((__u64)kvm->arch.sca) >> 32);
391                 vcpu->arch.sie_block->scaol = (__u32)(__u64)kvm->arch.sca;
392                 set_bit(63 - id, (unsigned long *) &kvm->arch.sca->mcn);
393         }
394
395         spin_lock_init(&vcpu->arch.local_int.lock);
396         INIT_LIST_HEAD(&vcpu->arch.local_int.list);
397         vcpu->arch.local_int.float_int = &kvm->arch.float_int;
398         spin_lock(&kvm->arch.float_int.lock);
399         kvm->arch.float_int.local_int[id] = &vcpu->arch.local_int;
400         init_waitqueue_head(&vcpu->arch.local_int.wq);
401         vcpu->arch.local_int.cpuflags = &vcpu->arch.sie_block->cpuflags;
402         spin_unlock(&kvm->arch.float_int.lock);
403
404         rc = kvm_vcpu_init(vcpu, kvm, id);
405         if (rc)
406                 goto out_free_sie_block;
407         VM_EVENT(kvm, 3, "create cpu %d at %p, sie block at %p", id, vcpu,
408                  vcpu->arch.sie_block);
409
410         return vcpu;
411 out_free_sie_block:
412         free_page((unsigned long)(vcpu->arch.sie_block));
413 out_free_cpu:
414         kfree(vcpu);
415 out:
416         return ERR_PTR(rc);
417 }
418
419 int kvm_arch_vcpu_runnable(struct kvm_vcpu *vcpu)
420 {
421         /* kvm common code refers to this, but never calls it */
422         BUG();
423         return 0;
424 }
425
426 static int kvm_arch_vcpu_ioctl_initial_reset(struct kvm_vcpu *vcpu)
427 {
428         kvm_s390_vcpu_initial_reset(vcpu);
429         return 0;
430 }
431
432 int kvm_arch_vcpu_ioctl_set_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs)
433 {
434         memcpy(&vcpu->run->s.regs.gprs, &regs->gprs, sizeof(regs->gprs));
435         return 0;
436 }
437
438 int kvm_arch_vcpu_ioctl_get_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs)
439 {
440         memcpy(&regs->gprs, &vcpu->run->s.regs.gprs, sizeof(regs->gprs));
441         return 0;
442 }
443
444 int kvm_arch_vcpu_ioctl_set_sregs(struct kvm_vcpu *vcpu,
445                                   struct kvm_sregs *sregs)
446 {
447         memcpy(&vcpu->run->s.regs.acrs, &sregs->acrs, sizeof(sregs->acrs));
448         memcpy(&vcpu->arch.sie_block->gcr, &sregs->crs, sizeof(sregs->crs));
449         restore_access_regs(vcpu->run->s.regs.acrs);
450         return 0;
451 }
452
453 int kvm_arch_vcpu_ioctl_get_sregs(struct kvm_vcpu *vcpu,
454                                   struct kvm_sregs *sregs)
455 {
456         memcpy(&sregs->acrs, &vcpu->run->s.regs.acrs, sizeof(sregs->acrs));
457         memcpy(&sregs->crs, &vcpu->arch.sie_block->gcr, sizeof(sregs->crs));
458         return 0;
459 }
460
461 int kvm_arch_vcpu_ioctl_set_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu)
462 {
463         memcpy(&vcpu->arch.guest_fpregs.fprs, &fpu->fprs, sizeof(fpu->fprs));
464         vcpu->arch.guest_fpregs.fpc = fpu->fpc & FPC_VALID_MASK;
465         restore_fp_regs(&vcpu->arch.guest_fpregs);
466         return 0;
467 }
468
469 int kvm_arch_vcpu_ioctl_get_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu)
470 {
471         memcpy(&fpu->fprs, &vcpu->arch.guest_fpregs.fprs, sizeof(fpu->fprs));
472         fpu->fpc = vcpu->arch.guest_fpregs.fpc;
473         return 0;
474 }
475
476 static int kvm_arch_vcpu_ioctl_set_initial_psw(struct kvm_vcpu *vcpu, psw_t psw)
477 {
478         int rc = 0;
479
480         if (!(atomic_read(&vcpu->arch.sie_block->cpuflags) & CPUSTAT_STOPPED))
481                 rc = -EBUSY;
482         else {
483                 vcpu->run->psw_mask = psw.mask;
484                 vcpu->run->psw_addr = psw.addr;
485         }
486         return rc;
487 }
488
489 int kvm_arch_vcpu_ioctl_translate(struct kvm_vcpu *vcpu,
490                                   struct kvm_translation *tr)
491 {
492         return -EINVAL; /* not implemented yet */
493 }
494
495 int kvm_arch_vcpu_ioctl_set_guest_debug(struct kvm_vcpu *vcpu,
496                                         struct kvm_guest_debug *dbg)
497 {
498         return -EINVAL; /* not implemented yet */
499 }
500
501 int kvm_arch_vcpu_ioctl_get_mpstate(struct kvm_vcpu *vcpu,
502                                     struct kvm_mp_state *mp_state)
503 {
504         return -EINVAL; /* not implemented yet */
505 }
506
507 int kvm_arch_vcpu_ioctl_set_mpstate(struct kvm_vcpu *vcpu,
508                                     struct kvm_mp_state *mp_state)
509 {
510         return -EINVAL; /* not implemented yet */
511 }
512
513 static int __vcpu_run(struct kvm_vcpu *vcpu)
514 {
515         int rc;
516
517         memcpy(&vcpu->arch.sie_block->gg14, &vcpu->run->s.regs.gprs[14], 16);
518
519         if (need_resched())
520                 schedule();
521
522         if (test_thread_flag(TIF_MCCK_PENDING))
523                 s390_handle_mcck();
524
525         if (!kvm_is_ucontrol(vcpu->kvm))
526                 kvm_s390_deliver_pending_interrupts(vcpu);
527
528         vcpu->arch.sie_block->icptcode = 0;
529         local_irq_disable();
530         kvm_guest_enter();
531         local_irq_enable();
532         VCPU_EVENT(vcpu, 6, "entering sie flags %x",
533                    atomic_read(&vcpu->arch.sie_block->cpuflags));
534         rc = sie64a(vcpu->arch.sie_block, vcpu->run->s.regs.gprs);
535         if (rc) {
536                 if (kvm_is_ucontrol(vcpu->kvm)) {
537                         rc = SIE_INTERCEPT_UCONTROL;
538                 } else {
539                         VCPU_EVENT(vcpu, 3, "%s", "fault in sie instruction");
540                         kvm_s390_inject_program_int(vcpu, PGM_ADDRESSING);
541                         rc = 0;
542                 }
543         }
544         VCPU_EVENT(vcpu, 6, "exit sie icptcode %d",
545                    vcpu->arch.sie_block->icptcode);
546         local_irq_disable();
547         kvm_guest_exit();
548         local_irq_enable();
549
550         memcpy(&vcpu->run->s.regs.gprs[14], &vcpu->arch.sie_block->gg14, 16);
551         return rc;
552 }
553
554 int kvm_arch_vcpu_ioctl_run(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
555 {
556         int rc;
557         sigset_t sigsaved;
558
559 rerun_vcpu:
560         if (vcpu->sigset_active)
561                 sigprocmask(SIG_SETMASK, &vcpu->sigset, &sigsaved);
562
563         atomic_clear_mask(CPUSTAT_STOPPED, &vcpu->arch.sie_block->cpuflags);
564
565         BUG_ON(vcpu->kvm->arch.float_int.local_int[vcpu->vcpu_id] == NULL);
566
567         switch (kvm_run->exit_reason) {
568         case KVM_EXIT_S390_SIEIC:
569         case KVM_EXIT_UNKNOWN:
570         case KVM_EXIT_INTR:
571         case KVM_EXIT_S390_RESET:
572         case KVM_EXIT_S390_UCONTROL:
573                 break;
574         default:
575                 BUG();
576         }
577
578         vcpu->arch.sie_block->gpsw.mask = kvm_run->psw_mask;
579         vcpu->arch.sie_block->gpsw.addr = kvm_run->psw_addr;
580         if (kvm_run->kvm_dirty_regs & KVM_SYNC_PREFIX) {
581                 kvm_run->kvm_dirty_regs &= ~KVM_SYNC_PREFIX;
582                 kvm_s390_set_prefix(vcpu, kvm_run->s.regs.prefix);
583         }
584         if (kvm_run->kvm_dirty_regs & KVM_SYNC_CRS) {
585                 kvm_run->kvm_dirty_regs &= ~KVM_SYNC_CRS;
586                 memcpy(&vcpu->arch.sie_block->gcr, &kvm_run->s.regs.crs, 128);
587                 kvm_s390_set_prefix(vcpu, kvm_run->s.regs.prefix);
588         }
589
590         might_fault();
591
592         do {
593                 rc = __vcpu_run(vcpu);
594                 if (rc)
595                         break;
596                 if (kvm_is_ucontrol(vcpu->kvm))
597                         rc = -EOPNOTSUPP;
598                 else
599                         rc = kvm_handle_sie_intercept(vcpu);
600         } while (!signal_pending(current) && !rc);
601
602         if (rc == SIE_INTERCEPT_RERUNVCPU)
603                 goto rerun_vcpu;
604
605         if (signal_pending(current) && !rc) {
606                 kvm_run->exit_reason = KVM_EXIT_INTR;
607                 rc = -EINTR;
608         }
609
610 #ifdef CONFIG_KVM_S390_UCONTROL
611         if (rc == SIE_INTERCEPT_UCONTROL) {
612                 kvm_run->exit_reason = KVM_EXIT_S390_UCONTROL;
613                 kvm_run->s390_ucontrol.trans_exc_code =
614                         current->thread.gmap_addr;
615                 kvm_run->s390_ucontrol.pgm_code = 0x10;
616                 rc = 0;
617         }
618 #endif
619
620         if (rc == -EOPNOTSUPP) {
621                 /* intercept cannot be handled in-kernel, prepare kvm-run */
622                 kvm_run->exit_reason         = KVM_EXIT_S390_SIEIC;
623                 kvm_run->s390_sieic.icptcode = vcpu->arch.sie_block->icptcode;
624                 kvm_run->s390_sieic.ipa      = vcpu->arch.sie_block->ipa;
625                 kvm_run->s390_sieic.ipb      = vcpu->arch.sie_block->ipb;
626                 rc = 0;
627         }
628
629         if (rc == -EREMOTE) {
630                 /* intercept was handled, but userspace support is needed
631                  * kvm_run has been prepared by the handler */
632                 rc = 0;
633         }
634
635         kvm_run->psw_mask     = vcpu->arch.sie_block->gpsw.mask;
636         kvm_run->psw_addr     = vcpu->arch.sie_block->gpsw.addr;
637         kvm_run->s.regs.prefix = vcpu->arch.sie_block->prefix;
638         memcpy(&kvm_run->s.regs.crs, &vcpu->arch.sie_block->gcr, 128);
639
640         if (vcpu->sigset_active)
641                 sigprocmask(SIG_SETMASK, &sigsaved, NULL);
642
643         vcpu->stat.exit_userspace++;
644         return rc;
645 }
646
647 static int __guestcopy(struct kvm_vcpu *vcpu, u64 guestdest, void *from,
648                        unsigned long n, int prefix)
649 {
650         if (prefix)
651                 return copy_to_guest(vcpu, guestdest, from, n);
652         else
653                 return copy_to_guest_absolute(vcpu, guestdest, from, n);
654 }
655
656 /*
657  * store status at address
658  * we use have two special cases:
659  * KVM_S390_STORE_STATUS_NOADDR: -> 0x1200 on 64 bit
660  * KVM_S390_STORE_STATUS_PREFIXED: -> prefix
661  */
662 int kvm_s390_vcpu_store_status(struct kvm_vcpu *vcpu, unsigned long addr)
663 {
664         unsigned char archmode = 1;
665         int prefix;
666
667         if (addr == KVM_S390_STORE_STATUS_NOADDR) {
668                 if (copy_to_guest_absolute(vcpu, 163ul, &archmode, 1))
669                         return -EFAULT;
670                 addr = SAVE_AREA_BASE;
671                 prefix = 0;
672         } else if (addr == KVM_S390_STORE_STATUS_PREFIXED) {
673                 if (copy_to_guest(vcpu, 163ul, &archmode, 1))
674                         return -EFAULT;
675                 addr = SAVE_AREA_BASE;
676                 prefix = 1;
677         } else
678                 prefix = 0;
679
680         if (__guestcopy(vcpu, addr + offsetof(struct save_area, fp_regs),
681                         vcpu->arch.guest_fpregs.fprs, 128, prefix))
682                 return -EFAULT;
683
684         if (__guestcopy(vcpu, addr + offsetof(struct save_area, gp_regs),
685                         vcpu->run->s.regs.gprs, 128, prefix))
686                 return -EFAULT;
687
688         if (__guestcopy(vcpu, addr + offsetof(struct save_area, psw),
689                         &vcpu->arch.sie_block->gpsw, 16, prefix))
690                 return -EFAULT;
691
692         if (__guestcopy(vcpu, addr + offsetof(struct save_area, pref_reg),
693                         &vcpu->arch.sie_block->prefix, 4, prefix))
694                 return -EFAULT;
695
696         if (__guestcopy(vcpu,
697                         addr + offsetof(struct save_area, fp_ctrl_reg),
698                         &vcpu->arch.guest_fpregs.fpc, 4, prefix))
699                 return -EFAULT;
700
701         if (__guestcopy(vcpu, addr + offsetof(struct save_area, tod_reg),
702                         &vcpu->arch.sie_block->todpr, 4, prefix))
703                 return -EFAULT;
704
705         if (__guestcopy(vcpu, addr + offsetof(struct save_area, timer),
706                         &vcpu->arch.sie_block->cputm, 8, prefix))
707                 return -EFAULT;
708
709         if (__guestcopy(vcpu, addr + offsetof(struct save_area, clk_cmp),
710                         &vcpu->arch.sie_block->ckc, 8, prefix))
711                 return -EFAULT;
712
713         if (__guestcopy(vcpu, addr + offsetof(struct save_area, acc_regs),
714                         &vcpu->run->s.regs.acrs, 64, prefix))
715                 return -EFAULT;
716
717         if (__guestcopy(vcpu,
718                         addr + offsetof(struct save_area, ctrl_regs),
719                         &vcpu->arch.sie_block->gcr, 128, prefix))
720                 return -EFAULT;
721         return 0;
722 }
723
724 long kvm_arch_vcpu_ioctl(struct file *filp,
725                          unsigned int ioctl, unsigned long arg)
726 {
727         struct kvm_vcpu *vcpu = filp->private_data;
728         void __user *argp = (void __user *)arg;
729         long r;
730
731         switch (ioctl) {
732         case KVM_S390_INTERRUPT: {
733                 struct kvm_s390_interrupt s390int;
734
735                 r = -EFAULT;
736                 if (copy_from_user(&s390int, argp, sizeof(s390int)))
737                         break;
738                 r = kvm_s390_inject_vcpu(vcpu, &s390int);
739                 break;
740         }
741         case KVM_S390_STORE_STATUS:
742                 r = kvm_s390_vcpu_store_status(vcpu, arg);
743                 break;
744         case KVM_S390_SET_INITIAL_PSW: {
745                 psw_t psw;
746
747                 r = -EFAULT;
748                 if (copy_from_user(&psw, argp, sizeof(psw)))
749                         break;
750                 r = kvm_arch_vcpu_ioctl_set_initial_psw(vcpu, psw);
751                 break;
752         }
753         case KVM_S390_INITIAL_RESET:
754                 r = kvm_arch_vcpu_ioctl_initial_reset(vcpu);
755                 break;
756 #ifdef CONFIG_KVM_S390_UCONTROL
757         case KVM_S390_UCAS_MAP: {
758                 struct kvm_s390_ucas_mapping ucasmap;
759
760                 if (copy_from_user(&ucasmap, argp, sizeof(ucasmap))) {
761                         r = -EFAULT;
762                         break;
763                 }
764
765                 if (!kvm_is_ucontrol(vcpu->kvm)) {
766                         r = -EINVAL;
767                         break;
768                 }
769
770                 r = gmap_map_segment(vcpu->arch.gmap, ucasmap.user_addr,
771                                      ucasmap.vcpu_addr, ucasmap.length);
772                 break;
773         }
774         case KVM_S390_UCAS_UNMAP: {
775                 struct kvm_s390_ucas_mapping ucasmap;
776
777                 if (copy_from_user(&ucasmap, argp, sizeof(ucasmap))) {
778                         r = -EFAULT;
779                         break;
780                 }
781
782                 if (!kvm_is_ucontrol(vcpu->kvm)) {
783                         r = -EINVAL;
784                         break;
785                 }
786
787                 r = gmap_unmap_segment(vcpu->arch.gmap, ucasmap.vcpu_addr,
788                         ucasmap.length);
789                 break;
790         }
791 #endif
792         case KVM_S390_VCPU_FAULT: {
793                 r = gmap_fault(arg, vcpu->arch.gmap);
794                 if (!IS_ERR_VALUE(r))
795                         r = 0;
796                 break;
797         }
798         default:
799                 r = -ENOTTY;
800         }
801         return r;
802 }
803
804 int kvm_arch_vcpu_fault(struct kvm_vcpu *vcpu, struct vm_fault *vmf)
805 {
806 #ifdef CONFIG_KVM_S390_UCONTROL
807         if ((vmf->pgoff == KVM_S390_SIE_PAGE_OFFSET)
808                  && (kvm_is_ucontrol(vcpu->kvm))) {
809                 vmf->page = virt_to_page(vcpu->arch.sie_block);
810                 get_page(vmf->page);
811                 return 0;
812         }
813 #endif
814         return VM_FAULT_SIGBUS;
815 }
816
817 void kvm_arch_free_memslot(struct kvm_memory_slot *free,
818                            struct kvm_memory_slot *dont)
819 {
820 }
821
822 int kvm_arch_create_memslot(struct kvm_memory_slot *slot, unsigned long npages)
823 {
824         return 0;
825 }
826
827 /* Section: memory related */
828 int kvm_arch_prepare_memory_region(struct kvm *kvm,
829                                    struct kvm_memory_slot *memslot,
830                                    struct kvm_memory_slot old,
831                                    struct kvm_userspace_memory_region *mem,
832                                    int user_alloc)
833 {
834         /* A few sanity checks. We can have exactly one memory slot which has
835            to start at guest virtual zero and which has to be located at a
836            page boundary in userland and which has to end at a page boundary.
837            The memory in userland is ok to be fragmented into various different
838            vmas. It is okay to mmap() and munmap() stuff in this slot after
839            doing this call at any time */
840
841         if (mem->slot)
842                 return -EINVAL;
843
844         if (mem->guest_phys_addr)
845                 return -EINVAL;
846
847         if (mem->userspace_addr & 0xffffful)
848                 return -EINVAL;
849
850         if (mem->memory_size & 0xffffful)
851                 return -EINVAL;
852
853         if (!user_alloc)
854                 return -EINVAL;
855
856         return 0;
857 }
858
859 void kvm_arch_commit_memory_region(struct kvm *kvm,
860                                 struct kvm_userspace_memory_region *mem,
861                                 struct kvm_memory_slot old,
862                                 int user_alloc)
863 {
864         int rc;
865
866
867         rc = gmap_map_segment(kvm->arch.gmap, mem->userspace_addr,
868                 mem->guest_phys_addr, mem->memory_size);
869         if (rc)
870                 printk(KERN_WARNING "kvm-s390: failed to commit memory region\n");
871         return;
872 }
873
874 void kvm_arch_flush_shadow(struct kvm *kvm)
875 {
876 }
877
878 static int __init kvm_s390_init(void)
879 {
880         int ret;
881         ret = kvm_init(NULL, sizeof(struct kvm_vcpu), 0, THIS_MODULE);
882         if (ret)
883                 return ret;
884
885         /*
886          * guests can ask for up to 255+1 double words, we need a full page
887          * to hold the maximum amount of facilities. On the other hand, we
888          * only set facilities that are known to work in KVM.
889          */
890         facilities = (unsigned long long *) get_zeroed_page(GFP_KERNEL|GFP_DMA);
891         if (!facilities) {
892                 kvm_exit();
893                 return -ENOMEM;
894         }
895         memcpy(facilities, S390_lowcore.stfle_fac_list, 16);
896         facilities[0] &= 0xff00fff3f47c0000ULL;
897         facilities[1] &= 0x201c000000000000ULL;
898         return 0;
899 }
900
901 static void __exit kvm_s390_exit(void)
902 {
903         free_page((unsigned long) facilities);
904         kvm_exit();
905 }
906
907 module_init(kvm_s390_init);
908 module_exit(kvm_s390_exit);