xref: /linux/arch/s390/kvm/intercept.c (revision a5e0acea9ed644d622281a4a8fde94a2e24ec7e8)
1d809aa23SGreg Kroah-Hartman // SPDX-License-Identifier: GPL-2.0
28f2abe6aSChristian Borntraeger /*
3a53c8fabSHeiko Carstens  * in-kernel handling for sie intercepts
48f2abe6aSChristian Borntraeger  *
59a558ee3SThomas Huth  * Copyright IBM Corp. 2008, 2014
68f2abe6aSChristian Borntraeger  *
78f2abe6aSChristian Borntraeger  *    Author(s): Carsten Otte <cotte@de.ibm.com>
88f2abe6aSChristian Borntraeger  *               Christian Borntraeger <borntraeger@de.ibm.com>
98f2abe6aSChristian Borntraeger  */
108f2abe6aSChristian Borntraeger 
118f2abe6aSChristian Borntraeger #include <linux/kvm_host.h>
128f2abe6aSChristian Borntraeger #include <linux/errno.h>
138f2abe6aSChristian Borntraeger #include <linux/pagemap.h>
148f2abe6aSChristian Borntraeger 
158f2abe6aSChristian Borntraeger #include <asm/kvm_host.h>
16a86dcc24SMichael Mueller #include <asm/asm-offsets.h>
17f14d82e0SThomas Huth #include <asm/irq.h>
18b7c92f1aSQingFeng Hao #include <asm/sysinfo.h>
198f2abe6aSChristian Borntraeger 
208f2abe6aSChristian Borntraeger #include "kvm-s390.h"
21ba5c1e9bSCarsten Otte #include "gaccess.h"
225786fffaSCornelia Huck #include "trace.h"
23ade38c31SCornelia Huck #include "trace-s390.h"
24ba5c1e9bSCarsten Otte 
250e8bc06aSDavid Hildenbrand u8 kvm_s390_get_ilen(struct kvm_vcpu *vcpu)
2604b41acdSThomas Huth {
2704b41acdSThomas Huth 	struct kvm_s390_sie_block *sie_block = vcpu->arch.sie_block;
280e8bc06aSDavid Hildenbrand 	u8 ilen = 0;
2904b41acdSThomas Huth 
300e8bc06aSDavid Hildenbrand 	switch (vcpu->arch.sie_block->icptcode) {
310e8bc06aSDavid Hildenbrand 	case ICPT_INST:
320e8bc06aSDavid Hildenbrand 	case ICPT_INSTPROGI:
330e8bc06aSDavid Hildenbrand 	case ICPT_OPEREXC:
340e8bc06aSDavid Hildenbrand 	case ICPT_PARTEXEC:
350e8bc06aSDavid Hildenbrand 	case ICPT_IOINST:
360e8bc06aSDavid Hildenbrand 		/* instruction only stored for these icptcodes */
370e8bc06aSDavid Hildenbrand 		ilen = insn_length(vcpu->arch.sie_block->ipa >> 8);
3804b41acdSThomas Huth 		/* Use the length of the EXECUTE instruction if necessary */
3904b41acdSThomas Huth 		if (sie_block->icptstatus & 1) {
400e8bc06aSDavid Hildenbrand 			ilen = (sie_block->icptstatus >> 4) & 0x6;
410e8bc06aSDavid Hildenbrand 			if (!ilen)
420e8bc06aSDavid Hildenbrand 				ilen = 4;
4304b41acdSThomas Huth 		}
440e8bc06aSDavid Hildenbrand 		break;
450e8bc06aSDavid Hildenbrand 	case ICPT_PROGI:
460e8bc06aSDavid Hildenbrand 		/* bit 1+2 of pgmilc are the ilc, so we directly get ilen */
470e8bc06aSDavid Hildenbrand 		ilen = vcpu->arch.sie_block->pgmilc & 0x6;
480e8bc06aSDavid Hildenbrand 		break;
490e8bc06aSDavid Hildenbrand 	}
500e8bc06aSDavid Hildenbrand 	return ilen;
5104b41acdSThomas Huth }
5204b41acdSThomas Huth 
538f2abe6aSChristian Borntraeger static int handle_stop(struct kvm_vcpu *vcpu)
548f2abe6aSChristian Borntraeger {
556cddd432SDavid Hildenbrand 	struct kvm_s390_local_interrupt *li = &vcpu->arch.local_int;
569ace903dSChristian Ehrhardt 	int rc = 0;
576cddd432SDavid Hildenbrand 	uint8_t flags, stop_pending;
585288fbf0SChristian Borntraeger 
598f2abe6aSChristian Borntraeger 	vcpu->stat.exit_stop_request++;
60ade38c31SCornelia Huck 
619a022067SDavid Hildenbrand 	/* delay the stop if any non-stop irq is pending */
629a022067SDavid Hildenbrand 	if (kvm_s390_vcpu_has_irq(vcpu, 1))
639a022067SDavid Hildenbrand 		return 0;
649a022067SDavid Hildenbrand 
656cddd432SDavid Hildenbrand 	/* avoid races with the injection/SIGP STOP code */
666cddd432SDavid Hildenbrand 	spin_lock(&li->lock);
676cddd432SDavid Hildenbrand 	flags = li->irq.stop.flags;
686cddd432SDavid Hildenbrand 	stop_pending = kvm_s390_is_stop_irq_pending(vcpu);
696cddd432SDavid Hildenbrand 	spin_unlock(&li->lock);
709ace903dSChristian Ehrhardt 
716cddd432SDavid Hildenbrand 	trace_kvm_s390_stop_request(stop_pending, flags);
726cddd432SDavid Hildenbrand 	if (!stop_pending)
7332f5ff63SDavid Hildenbrand 		return 0;
7432f5ff63SDavid Hildenbrand 
756cddd432SDavid Hildenbrand 	if (flags & KVM_S390_STOP_FLAG_STORE_STATUS) {
769e0d5473SJens Freimann 		rc = kvm_s390_vcpu_store_status(vcpu,
779e0d5473SJens Freimann 						KVM_S390_STORE_STATUS_NOADDR);
7832f5ff63SDavid Hildenbrand 		if (rc)
795288fbf0SChristian Borntraeger 			return rc;
808f2abe6aSChristian Borntraeger 	}
818f2abe6aSChristian Borntraeger 
826352e4d2SDavid Hildenbrand 	if (!kvm_s390_user_cpu_state_ctrl(vcpu->kvm))
8332f5ff63SDavid Hildenbrand 		kvm_s390_vcpu_stop(vcpu);
8432f5ff63SDavid Hildenbrand 	return -EOPNOTSUPP;
8532f5ff63SDavid Hildenbrand }
8632f5ff63SDavid Hildenbrand 
878f2abe6aSChristian Borntraeger static int handle_validity(struct kvm_vcpu *vcpu)
888f2abe6aSChristian Borntraeger {
898f2abe6aSChristian Borntraeger 	int viwhy = vcpu->arch.sie_block->ipb >> 16;
903edbcff9SCarsten Otte 
918f2abe6aSChristian Borntraeger 	vcpu->stat.exit_validity++;
925786fffaSCornelia Huck 	trace_kvm_s390_intercept_validity(vcpu, viwhy);
93a5efb6b6SChristian Borntraeger 	KVM_EVENT(3, "validity intercept 0x%x for pid %u (kvm 0x%pK)", viwhy,
94a5efb6b6SChristian Borntraeger 		  current->pid, vcpu->kvm);
95a5efb6b6SChristian Borntraeger 
96a5efb6b6SChristian Borntraeger 	/* do not warn on invalid runtime instrumentation mode */
97a5efb6b6SChristian Borntraeger 	WARN_ONCE(viwhy != 0x44, "kvm: unhandled validity intercept 0x%x\n",
98a5efb6b6SChristian Borntraeger 		  viwhy);
99a5efb6b6SChristian Borntraeger 	return -EINVAL;
1008f2abe6aSChristian Borntraeger }
1018f2abe6aSChristian Borntraeger 
102ba5c1e9bSCarsten Otte static int handle_instruction(struct kvm_vcpu *vcpu)
103ba5c1e9bSCarsten Otte {
104ba5c1e9bSCarsten Otte 	vcpu->stat.exit_instruction++;
1055786fffaSCornelia Huck 	trace_kvm_s390_intercept_instruction(vcpu,
1065786fffaSCornelia Huck 					     vcpu->arch.sie_block->ipa,
1075786fffaSCornelia Huck 					     vcpu->arch.sie_block->ipb);
108cb7485daSChristian Borntraeger 
109cb7485daSChristian Borntraeger 	switch (vcpu->arch.sie_block->ipa >> 8) {
110cb7485daSChristian Borntraeger 	case 0x01:
111cb7485daSChristian Borntraeger 		return kvm_s390_handle_01(vcpu);
112cb7485daSChristian Borntraeger 	case 0x82:
113cb7485daSChristian Borntraeger 		return kvm_s390_handle_lpsw(vcpu);
114cb7485daSChristian Borntraeger 	case 0x83:
115cb7485daSChristian Borntraeger 		return kvm_s390_handle_diag(vcpu);
116cb7485daSChristian Borntraeger 	case 0xaa:
117cb7485daSChristian Borntraeger 		return kvm_s390_handle_aa(vcpu);
118cb7485daSChristian Borntraeger 	case 0xae:
119cb7485daSChristian Borntraeger 		return kvm_s390_handle_sigp(vcpu);
120cb7485daSChristian Borntraeger 	case 0xb2:
121cb7485daSChristian Borntraeger 		return kvm_s390_handle_b2(vcpu);
122cb7485daSChristian Borntraeger 	case 0xb6:
123cb7485daSChristian Borntraeger 		return kvm_s390_handle_stctl(vcpu);
124cb7485daSChristian Borntraeger 	case 0xb7:
125cb7485daSChristian Borntraeger 		return kvm_s390_handle_lctl(vcpu);
126cb7485daSChristian Borntraeger 	case 0xb9:
127cb7485daSChristian Borntraeger 		return kvm_s390_handle_b9(vcpu);
128cb7485daSChristian Borntraeger 	case 0xe3:
129cb7485daSChristian Borntraeger 		return kvm_s390_handle_e3(vcpu);
130cb7485daSChristian Borntraeger 	case 0xe5:
131cb7485daSChristian Borntraeger 		return kvm_s390_handle_e5(vcpu);
132cb7485daSChristian Borntraeger 	case 0xeb:
133cb7485daSChristian Borntraeger 		return kvm_s390_handle_eb(vcpu);
134cb7485daSChristian Borntraeger 	default:
135b8e660b8SHeiko Carstens 		return -EOPNOTSUPP;
136ba5c1e9bSCarsten Otte 	}
137cb7485daSChristian Borntraeger }
138ba5c1e9bSCarsten Otte 
139f6af84e7SDavid Hildenbrand static int inject_prog_on_prog_intercept(struct kvm_vcpu *vcpu)
140439716a5SDavid Hildenbrand {
141f6af84e7SDavid Hildenbrand 	struct kvm_s390_pgm_info pgm_info = {
142f6af84e7SDavid Hildenbrand 		.code = vcpu->arch.sie_block->iprcc,
143eaa4f416SDavid Hildenbrand 		/* the PSW has already been rewound */
144eaa4f416SDavid Hildenbrand 		.flags = KVM_S390_PGM_FLAGS_NO_REWIND,
145f6af84e7SDavid Hildenbrand 	};
146439716a5SDavid Hildenbrand 
147439716a5SDavid Hildenbrand 	switch (vcpu->arch.sie_block->iprcc & ~PGM_PER) {
148439716a5SDavid Hildenbrand 	case PGM_AFX_TRANSLATION:
149439716a5SDavid Hildenbrand 	case PGM_ASX_TRANSLATION:
150439716a5SDavid Hildenbrand 	case PGM_EX_TRANSLATION:
151439716a5SDavid Hildenbrand 	case PGM_LFX_TRANSLATION:
152439716a5SDavid Hildenbrand 	case PGM_LSTE_SEQUENCE:
153439716a5SDavid Hildenbrand 	case PGM_LSX_TRANSLATION:
154439716a5SDavid Hildenbrand 	case PGM_LX_TRANSLATION:
155439716a5SDavid Hildenbrand 	case PGM_PRIMARY_AUTHORITY:
156439716a5SDavid Hildenbrand 	case PGM_SECONDARY_AUTHORITY:
157439716a5SDavid Hildenbrand 	case PGM_SPACE_SWITCH:
158f6af84e7SDavid Hildenbrand 		pgm_info.trans_exc_code = vcpu->arch.sie_block->tecmc;
159439716a5SDavid Hildenbrand 		break;
160439716a5SDavid Hildenbrand 	case PGM_ALEN_TRANSLATION:
161439716a5SDavid Hildenbrand 	case PGM_ALE_SEQUENCE:
162439716a5SDavid Hildenbrand 	case PGM_ASTE_INSTANCE:
163439716a5SDavid Hildenbrand 	case PGM_ASTE_SEQUENCE:
164439716a5SDavid Hildenbrand 	case PGM_ASTE_VALIDITY:
165439716a5SDavid Hildenbrand 	case PGM_EXTENDED_AUTHORITY:
166f6af84e7SDavid Hildenbrand 		pgm_info.exc_access_id = vcpu->arch.sie_block->eai;
167439716a5SDavid Hildenbrand 		break;
168439716a5SDavid Hildenbrand 	case PGM_ASCE_TYPE:
169439716a5SDavid Hildenbrand 	case PGM_PAGE_TRANSLATION:
170439716a5SDavid Hildenbrand 	case PGM_REGION_FIRST_TRANS:
171439716a5SDavid Hildenbrand 	case PGM_REGION_SECOND_TRANS:
172439716a5SDavid Hildenbrand 	case PGM_REGION_THIRD_TRANS:
173439716a5SDavid Hildenbrand 	case PGM_SEGMENT_TRANSLATION:
174f6af84e7SDavid Hildenbrand 		pgm_info.trans_exc_code = vcpu->arch.sie_block->tecmc;
175f6af84e7SDavid Hildenbrand 		pgm_info.exc_access_id  = vcpu->arch.sie_block->eai;
176f6af84e7SDavid Hildenbrand 		pgm_info.op_access_id  = vcpu->arch.sie_block->oai;
177439716a5SDavid Hildenbrand 		break;
178439716a5SDavid Hildenbrand 	case PGM_MONITOR:
179f6af84e7SDavid Hildenbrand 		pgm_info.mon_class_nr = vcpu->arch.sie_block->mcn;
180f6af84e7SDavid Hildenbrand 		pgm_info.mon_code = vcpu->arch.sie_block->tecmc;
181439716a5SDavid Hildenbrand 		break;
182403c8648SEric Farman 	case PGM_VECTOR_PROCESSING:
183439716a5SDavid Hildenbrand 	case PGM_DATA:
184f6af84e7SDavid Hildenbrand 		pgm_info.data_exc_code = vcpu->arch.sie_block->dxc;
185439716a5SDavid Hildenbrand 		break;
186439716a5SDavid Hildenbrand 	case PGM_PROTECTION:
187f6af84e7SDavid Hildenbrand 		pgm_info.trans_exc_code = vcpu->arch.sie_block->tecmc;
188f6af84e7SDavid Hildenbrand 		pgm_info.exc_access_id  = vcpu->arch.sie_block->eai;
189439716a5SDavid Hildenbrand 		break;
190439716a5SDavid Hildenbrand 	default:
191439716a5SDavid Hildenbrand 		break;
192439716a5SDavid Hildenbrand 	}
193439716a5SDavid Hildenbrand 
194439716a5SDavid Hildenbrand 	if (vcpu->arch.sie_block->iprcc & PGM_PER) {
195f6af84e7SDavid Hildenbrand 		pgm_info.per_code = vcpu->arch.sie_block->perc;
196f6af84e7SDavid Hildenbrand 		pgm_info.per_atmid = vcpu->arch.sie_block->peratmid;
197f6af84e7SDavid Hildenbrand 		pgm_info.per_address = vcpu->arch.sie_block->peraddr;
198f6af84e7SDavid Hildenbrand 		pgm_info.per_access_id = vcpu->arch.sie_block->peraid;
199439716a5SDavid Hildenbrand 	}
200f6af84e7SDavid Hildenbrand 	return kvm_s390_inject_prog_irq(vcpu, &pgm_info);
201439716a5SDavid Hildenbrand }
202439716a5SDavid Hildenbrand 
203e325fe69SMichael Mueller /*
204e325fe69SMichael Mueller  * restore ITDB to program-interruption TDB in guest lowcore
205e325fe69SMichael Mueller  * and set TX abort indication if required
206e325fe69SMichael Mueller */
207e325fe69SMichael Mueller static int handle_itdb(struct kvm_vcpu *vcpu)
208e325fe69SMichael Mueller {
209e325fe69SMichael Mueller 	struct kvm_s390_itdb *itdb;
210e325fe69SMichael Mueller 	int rc;
211e325fe69SMichael Mueller 
212e325fe69SMichael Mueller 	if (!IS_TE_ENABLED(vcpu) || !IS_ITDB_VALID(vcpu))
213e325fe69SMichael Mueller 		return 0;
214e325fe69SMichael Mueller 	if (current->thread.per_flags & PER_FLAG_NO_TE)
215e325fe69SMichael Mueller 		return 0;
216e325fe69SMichael Mueller 	itdb = (struct kvm_s390_itdb *)vcpu->arch.sie_block->itdba;
217e325fe69SMichael Mueller 	rc = write_guest_lc(vcpu, __LC_PGM_TDB, itdb, sizeof(*itdb));
218e325fe69SMichael Mueller 	if (rc)
219e325fe69SMichael Mueller 		return rc;
220e325fe69SMichael Mueller 	memset(itdb, 0, sizeof(*itdb));
221e325fe69SMichael Mueller 
222e325fe69SMichael Mueller 	return 0;
223e325fe69SMichael Mueller }
224e325fe69SMichael Mueller 
22527291e21SDavid Hildenbrand #define per_event(vcpu) (vcpu->arch.sie_block->iprcc & PGM_PER)
22627291e21SDavid Hildenbrand 
227ba5c1e9bSCarsten Otte static int handle_prog(struct kvm_vcpu *vcpu)
228ba5c1e9bSCarsten Otte {
229684135e0SThomas Huth 	psw_t psw;
2300040e7d2SHeiko Carstens 	int rc;
2310040e7d2SHeiko Carstens 
232ba5c1e9bSCarsten Otte 	vcpu->stat.exit_program_interruption++;
2337feb6bb8SMichael Mueller 
23427291e21SDavid Hildenbrand 	if (guestdbg_enabled(vcpu) && per_event(vcpu)) {
235a69cbe81SDavid Hildenbrand 		rc = kvm_s390_handle_per_event(vcpu);
236a69cbe81SDavid Hildenbrand 		if (rc)
237a69cbe81SDavid Hildenbrand 			return rc;
23827291e21SDavid Hildenbrand 		/* the interrupt might have been filtered out completely */
23927291e21SDavid Hildenbrand 		if (vcpu->arch.sie_block->iprcc == 0)
24027291e21SDavid Hildenbrand 			return 0;
24127291e21SDavid Hildenbrand 	}
24227291e21SDavid Hildenbrand 
243e325fe69SMichael Mueller 	trace_kvm_s390_intercept_prog(vcpu, vcpu->arch.sie_block->iprcc);
244684135e0SThomas Huth 	if (vcpu->arch.sie_block->iprcc == PGM_SPECIFICATION) {
245684135e0SThomas Huth 		rc = read_guest_lc(vcpu, __LC_PGM_NEW_PSW, &psw, sizeof(psw_t));
246684135e0SThomas Huth 		if (rc)
247684135e0SThomas Huth 			return rc;
248684135e0SThomas Huth 		/* Avoid endless loops of specification exceptions */
249684135e0SThomas Huth 		if (!is_valid_psw(&psw))
250684135e0SThomas Huth 			return -EOPNOTSUPP;
251684135e0SThomas Huth 	}
252e325fe69SMichael Mueller 	rc = handle_itdb(vcpu);
2530040e7d2SHeiko Carstens 	if (rc)
2540040e7d2SHeiko Carstens 		return rc;
255439716a5SDavid Hildenbrand 
256f6af84e7SDavid Hildenbrand 	return inject_prog_on_prog_intercept(vcpu);
257ba5c1e9bSCarsten Otte }
258ba5c1e9bSCarsten Otte 
2599a558ee3SThomas Huth /**
260f14d82e0SThomas Huth  * handle_external_interrupt - used for external interruption interceptions
261f14d82e0SThomas Huth  *
262f14d82e0SThomas Huth  * This interception only occurs if the CPUSTAT_EXT_INT bit was set, or if
263f14d82e0SThomas Huth  * the new PSW does not have external interrupts disabled. In the first case,
264f14d82e0SThomas Huth  * we've got to deliver the interrupt manually, and in the second case, we
265f14d82e0SThomas Huth  * drop to userspace to handle the situation there.
266f14d82e0SThomas Huth  */
267f14d82e0SThomas Huth static int handle_external_interrupt(struct kvm_vcpu *vcpu)
268f14d82e0SThomas Huth {
269f14d82e0SThomas Huth 	u16 eic = vcpu->arch.sie_block->eic;
270383d0b05SJens Freimann 	struct kvm_s390_irq irq;
271f14d82e0SThomas Huth 	psw_t newpsw;
272f14d82e0SThomas Huth 	int rc;
273f14d82e0SThomas Huth 
274f14d82e0SThomas Huth 	vcpu->stat.exit_external_interrupt++;
275f14d82e0SThomas Huth 
276f14d82e0SThomas Huth 	rc = read_guest_lc(vcpu, __LC_EXT_NEW_PSW, &newpsw, sizeof(psw_t));
277f14d82e0SThomas Huth 	if (rc)
278f14d82e0SThomas Huth 		return rc;
279f14d82e0SThomas Huth 	/* We can not handle clock comparator or timer interrupt with bad PSW */
280f14d82e0SThomas Huth 	if ((eic == EXT_IRQ_CLK_COMP || eic == EXT_IRQ_CPU_TIMER) &&
281f14d82e0SThomas Huth 	    (newpsw.mask & PSW_MASK_EXT))
282f14d82e0SThomas Huth 		return -EOPNOTSUPP;
283f14d82e0SThomas Huth 
284f14d82e0SThomas Huth 	switch (eic) {
285f14d82e0SThomas Huth 	case EXT_IRQ_CLK_COMP:
286f14d82e0SThomas Huth 		irq.type = KVM_S390_INT_CLOCK_COMP;
287f14d82e0SThomas Huth 		break;
288f14d82e0SThomas Huth 	case EXT_IRQ_CPU_TIMER:
289f14d82e0SThomas Huth 		irq.type = KVM_S390_INT_CPU_TIMER;
290f14d82e0SThomas Huth 		break;
291f14d82e0SThomas Huth 	case EXT_IRQ_EXTERNAL_CALL:
292f14d82e0SThomas Huth 		irq.type = KVM_S390_INT_EXTERNAL_CALL;
293383d0b05SJens Freimann 		irq.u.extcall.code = vcpu->arch.sie_block->extcpuaddr;
294ea5f4969SDavid Hildenbrand 		rc = kvm_s390_inject_vcpu(vcpu, &irq);
295ea5f4969SDavid Hildenbrand 		/* ignore if another external call is already pending */
296ea5f4969SDavid Hildenbrand 		if (rc == -EBUSY)
297ea5f4969SDavid Hildenbrand 			return 0;
298ea5f4969SDavid Hildenbrand 		return rc;
299f14d82e0SThomas Huth 	default:
300f14d82e0SThomas Huth 		return -EOPNOTSUPP;
301f14d82e0SThomas Huth 	}
302f14d82e0SThomas Huth 
303f14d82e0SThomas Huth 	return kvm_s390_inject_vcpu(vcpu, &irq);
304f14d82e0SThomas Huth }
305f14d82e0SThomas Huth 
306f14d82e0SThomas Huth /**
3079a558ee3SThomas Huth  * Handle MOVE PAGE partial execution interception.
3089a558ee3SThomas Huth  *
3099a558ee3SThomas Huth  * This interception can only happen for guests with DAT disabled and
3109a558ee3SThomas Huth  * addresses that are currently not mapped in the host. Thus we try to
3119a558ee3SThomas Huth  * set up the mappings for the corresponding user pages here (or throw
3129a558ee3SThomas Huth  * addressing exceptions in case of illegal guest addresses).
3139a558ee3SThomas Huth  */
3149a558ee3SThomas Huth static int handle_mvpg_pei(struct kvm_vcpu *vcpu)
3159a558ee3SThomas Huth {
316f22166dcSThomas Huth 	unsigned long srcaddr, dstaddr;
3179a558ee3SThomas Huth 	int reg1, reg2, rc;
3189a558ee3SThomas Huth 
3199a558ee3SThomas Huth 	kvm_s390_get_regs_rre(vcpu, &reg1, &reg2);
3209a558ee3SThomas Huth 
3219a558ee3SThomas Huth 	/* Make sure that the source is paged-in */
3223cfad023SThomas Huth 	rc = guest_translate_address(vcpu, vcpu->run->s.regs.gprs[reg2],
32392c96321SDavid Hildenbrand 				     reg2, &srcaddr, GACC_FETCH);
3243cfad023SThomas Huth 	if (rc)
3253cfad023SThomas Huth 		return kvm_s390_inject_prog_cond(vcpu, rc);
326f22166dcSThomas Huth 	rc = kvm_arch_fault_in_page(vcpu, srcaddr, 0);
327f22166dcSThomas Huth 	if (rc != 0)
3289a558ee3SThomas Huth 		return rc;
3299a558ee3SThomas Huth 
3309a558ee3SThomas Huth 	/* Make sure that the destination is paged-in */
3313cfad023SThomas Huth 	rc = guest_translate_address(vcpu, vcpu->run->s.regs.gprs[reg1],
33292c96321SDavid Hildenbrand 				     reg1, &dstaddr, GACC_STORE);
3333cfad023SThomas Huth 	if (rc)
3343cfad023SThomas Huth 		return kvm_s390_inject_prog_cond(vcpu, rc);
335f22166dcSThomas Huth 	rc = kvm_arch_fault_in_page(vcpu, dstaddr, 1);
336f22166dcSThomas Huth 	if (rc != 0)
3379a558ee3SThomas Huth 		return rc;
3389a558ee3SThomas Huth 
3390e8bc06aSDavid Hildenbrand 	kvm_s390_retry_instr(vcpu);
3409a558ee3SThomas Huth 
3419a558ee3SThomas Huth 	return 0;
3429a558ee3SThomas Huth }
3439a558ee3SThomas Huth 
3449a558ee3SThomas Huth static int handle_partial_execution(struct kvm_vcpu *vcpu)
3459a558ee3SThomas Huth {
3469ec6de19SAlexander Yarygin 	vcpu->stat.exit_pei++;
3479ec6de19SAlexander Yarygin 
3489a558ee3SThomas Huth 	if (vcpu->arch.sie_block->ipa == 0xb254)	/* MVPG */
3499a558ee3SThomas Huth 		return handle_mvpg_pei(vcpu);
3504953919fSDavid Hildenbrand 	if (vcpu->arch.sie_block->ipa >> 8 == 0xae)	/* SIGP */
3514953919fSDavid Hildenbrand 		return kvm_s390_handle_sigp_pei(vcpu);
3529a558ee3SThomas Huth 
3539a558ee3SThomas Huth 	return -EOPNOTSUPP;
3549a558ee3SThomas Huth }
3559a558ee3SThomas Huth 
356b7c92f1aSQingFeng Hao /*
357b7c92f1aSQingFeng Hao  * Handle the sthyi instruction that provides the guest with system
358b7c92f1aSQingFeng Hao  * information, like current CPU resources available at each level of
359b7c92f1aSQingFeng Hao  * the machine.
360b7c92f1aSQingFeng Hao  */
361b7c92f1aSQingFeng Hao int handle_sthyi(struct kvm_vcpu *vcpu)
362b7c92f1aSQingFeng Hao {
363b7c92f1aSQingFeng Hao 	int reg1, reg2, r = 0;
364b7c92f1aSQingFeng Hao 	u64 code, addr, cc = 0, rc = 0;
365b7c92f1aSQingFeng Hao 	struct sthyi_sctns *sctns = NULL;
366b7c92f1aSQingFeng Hao 
367b7c92f1aSQingFeng Hao 	if (!test_kvm_facility(vcpu->kvm, 74))
368b7c92f1aSQingFeng Hao 		return kvm_s390_inject_program_int(vcpu, PGM_OPERATION);
369b7c92f1aSQingFeng Hao 
370b7c92f1aSQingFeng Hao 	kvm_s390_get_regs_rre(vcpu, &reg1, &reg2);
371b7c92f1aSQingFeng Hao 	code = vcpu->run->s.regs.gprs[reg1];
372b7c92f1aSQingFeng Hao 	addr = vcpu->run->s.regs.gprs[reg2];
373b7c92f1aSQingFeng Hao 
374b7c92f1aSQingFeng Hao 	vcpu->stat.instruction_sthyi++;
375b7c92f1aSQingFeng Hao 	VCPU_EVENT(vcpu, 3, "STHYI: fc: %llu addr: 0x%016llx", code, addr);
376b7c92f1aSQingFeng Hao 	trace_kvm_s390_handle_sthyi(vcpu, code, addr);
377b7c92f1aSQingFeng Hao 
378b7c92f1aSQingFeng Hao 	if (reg1 == reg2 || reg1 & 1 || reg2 & 1)
379b7c92f1aSQingFeng Hao 		return kvm_s390_inject_program_int(vcpu, PGM_SPECIFICATION);
380b7c92f1aSQingFeng Hao 
381b7c92f1aSQingFeng Hao 	if (code & 0xffff) {
382b7c92f1aSQingFeng Hao 		cc = 3;
383b7c92f1aSQingFeng Hao 		rc = 4;
384b7c92f1aSQingFeng Hao 		goto out;
385b7c92f1aSQingFeng Hao 	}
386b7c92f1aSQingFeng Hao 
387b7c92f1aSQingFeng Hao 	if (addr & ~PAGE_MASK)
388b7c92f1aSQingFeng Hao 		return kvm_s390_inject_program_int(vcpu, PGM_SPECIFICATION);
389b7c92f1aSQingFeng Hao 
390b7c92f1aSQingFeng Hao 	sctns = (void *)get_zeroed_page(GFP_KERNEL);
391b7c92f1aSQingFeng Hao 	if (!sctns)
392b7c92f1aSQingFeng Hao 		return -ENOMEM;
393b7c92f1aSQingFeng Hao 
394b7c92f1aSQingFeng Hao 	cc = sthyi_fill(sctns, &rc);
395b7c92f1aSQingFeng Hao 
396b7c92f1aSQingFeng Hao out:
397b7c92f1aSQingFeng Hao 	if (!cc) {
398b7c92f1aSQingFeng Hao 		r = write_guest(vcpu, addr, reg2, sctns, PAGE_SIZE);
399b7c92f1aSQingFeng Hao 		if (r) {
400b7c92f1aSQingFeng Hao 			free_page((unsigned long)sctns);
401b7c92f1aSQingFeng Hao 			return kvm_s390_inject_prog_cond(vcpu, r);
402b7c92f1aSQingFeng Hao 		}
403b7c92f1aSQingFeng Hao 	}
404b7c92f1aSQingFeng Hao 
405b7c92f1aSQingFeng Hao 	free_page((unsigned long)sctns);
406b7c92f1aSQingFeng Hao 	vcpu->run->s.regs.gprs[reg2 + 1] = rc;
407b7c92f1aSQingFeng Hao 	kvm_s390_set_psw_cc(vcpu, cc);
408b7c92f1aSQingFeng Hao 	return r;
409b7c92f1aSQingFeng Hao }
410b7c92f1aSQingFeng Hao 
411a011eeb2SJanosch Frank static int handle_operexc(struct kvm_vcpu *vcpu)
412a011eeb2SJanosch Frank {
413fb7dc1d4SChristian Borntraeger 	psw_t oldpsw, newpsw;
414fb7dc1d4SChristian Borntraeger 	int rc;
415fb7dc1d4SChristian Borntraeger 
416a011eeb2SJanosch Frank 	vcpu->stat.exit_operation_exception++;
417a011eeb2SJanosch Frank 	trace_kvm_s390_handle_operexc(vcpu, vcpu->arch.sie_block->ipa,
418a011eeb2SJanosch Frank 				      vcpu->arch.sie_block->ipb);
419a011eeb2SJanosch Frank 
420c0a6bfdcSChristian Borntraeger 	if (vcpu->arch.sie_block->ipa == 0xb256)
42195ca2cb5SJanosch Frank 		return handle_sthyi(vcpu);
42295ca2cb5SJanosch Frank 
4236502a34cSDavid Hildenbrand 	if (vcpu->arch.sie_block->ipa == 0 && vcpu->kvm->arch.user_instr0)
4246502a34cSDavid Hildenbrand 		return -EOPNOTSUPP;
425fb7dc1d4SChristian Borntraeger 	rc = read_guest_lc(vcpu, __LC_PGM_NEW_PSW, &newpsw, sizeof(psw_t));
426fb7dc1d4SChristian Borntraeger 	if (rc)
427fb7dc1d4SChristian Borntraeger 		return rc;
428fb7dc1d4SChristian Borntraeger 	/*
429fb7dc1d4SChristian Borntraeger 	 * Avoid endless loops of operation exceptions, if the pgm new
430fb7dc1d4SChristian Borntraeger 	 * PSW will cause a new operation exception.
431fb7dc1d4SChristian Borntraeger 	 * The heuristic checks if the pgm new psw is within 6 bytes before
432fb7dc1d4SChristian Borntraeger 	 * the faulting psw address (with same DAT, AS settings) and the
433fb7dc1d4SChristian Borntraeger 	 * new psw is not a wait psw and the fault was not triggered by
434fb7dc1d4SChristian Borntraeger 	 * problem state.
435fb7dc1d4SChristian Borntraeger 	 */
436fb7dc1d4SChristian Borntraeger 	oldpsw = vcpu->arch.sie_block->gpsw;
437fb7dc1d4SChristian Borntraeger 	if (oldpsw.addr - newpsw.addr <= 6 &&
438fb7dc1d4SChristian Borntraeger 	    !(newpsw.mask & PSW_MASK_WAIT) &&
439fb7dc1d4SChristian Borntraeger 	    !(oldpsw.mask & PSW_MASK_PSTATE) &&
440fb7dc1d4SChristian Borntraeger 	    (newpsw.mask & PSW_MASK_ASC) == (oldpsw.mask & PSW_MASK_ASC) &&
441fb7dc1d4SChristian Borntraeger 	    (newpsw.mask & PSW_MASK_DAT) == (oldpsw.mask & PSW_MASK_DAT))
442fb7dc1d4SChristian Borntraeger 		return -EOPNOTSUPP;
4436502a34cSDavid Hildenbrand 
444a011eeb2SJanosch Frank 	return kvm_s390_inject_program_int(vcpu, PGM_OPERATION);
445a011eeb2SJanosch Frank }
446a011eeb2SJanosch Frank 
4478f2abe6aSChristian Borntraeger int kvm_handle_sie_intercept(struct kvm_vcpu *vcpu)
4488f2abe6aSChristian Borntraeger {
4495ffe466cSDavid Hildenbrand 	int rc, per_rc = 0;
4505ffe466cSDavid Hildenbrand 
45171f116bfSDavid Hildenbrand 	if (kvm_is_ucontrol(vcpu->kvm))
45271f116bfSDavid Hildenbrand 		return -EOPNOTSUPP;
45371f116bfSDavid Hildenbrand 
45446b708eaSChristian Borntraeger 	switch (vcpu->arch.sie_block->icptcode) {
455947b8972SFarhan Ali 	case ICPT_EXTREQ:
456*a5e0aceaSChristian Borntraeger 		vcpu->stat.exit_external_request++;
457*a5e0aceaSChristian Borntraeger 		return 0;
458947b8972SFarhan Ali 	case ICPT_IOREQ:
459*a5e0aceaSChristian Borntraeger 		vcpu->stat.exit_io_request++;
460*a5e0aceaSChristian Borntraeger 		return 0;
461947b8972SFarhan Ali 	case ICPT_INST:
4625ffe466cSDavid Hildenbrand 		rc = handle_instruction(vcpu);
4635ffe466cSDavid Hildenbrand 		break;
464947b8972SFarhan Ali 	case ICPT_PROGI:
46546b708eaSChristian Borntraeger 		return handle_prog(vcpu);
466947b8972SFarhan Ali 	case ICPT_EXTINT:
46746b708eaSChristian Borntraeger 		return handle_external_interrupt(vcpu);
468947b8972SFarhan Ali 	case ICPT_WAIT:
46946b708eaSChristian Borntraeger 		return kvm_s390_handle_wait(vcpu);
470947b8972SFarhan Ali 	case ICPT_VALIDITY:
47146b708eaSChristian Borntraeger 		return handle_validity(vcpu);
472947b8972SFarhan Ali 	case ICPT_STOP:
47346b708eaSChristian Borntraeger 		return handle_stop(vcpu);
474947b8972SFarhan Ali 	case ICPT_OPEREXC:
4755ffe466cSDavid Hildenbrand 		rc = handle_operexc(vcpu);
4765ffe466cSDavid Hildenbrand 		break;
477947b8972SFarhan Ali 	case ICPT_PARTEXEC:
4785ffe466cSDavid Hildenbrand 		rc = handle_partial_execution(vcpu);
4795ffe466cSDavid Hildenbrand 		break;
480730cd632SFarhan Ali 	case ICPT_KSS:
481730cd632SFarhan Ali 		rc = kvm_s390_skey_check_enable(vcpu);
482730cd632SFarhan Ali 		break;
48346b708eaSChristian Borntraeger 	default:
484b8e660b8SHeiko Carstens 		return -EOPNOTSUPP;
48546b708eaSChristian Borntraeger 	}
4865ffe466cSDavid Hildenbrand 
4875ffe466cSDavid Hildenbrand 	/* process PER, also if the instrution is processed in user space */
4885ffe466cSDavid Hildenbrand 	if (vcpu->arch.sie_block->icptstatus & 0x02 &&
4895ffe466cSDavid Hildenbrand 	    (!rc || rc == -EOPNOTSUPP))
4905ffe466cSDavid Hildenbrand 		per_rc = kvm_s390_handle_per_ifetch_icpt(vcpu);
4915ffe466cSDavid Hildenbrand 	return per_rc ? per_rc : rc;
4928f2abe6aSChristian Borntraeger }
493