18c2ecf20Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0
28c2ecf20Sopenharmony_ci/*
38c2ecf20Sopenharmony_ci * kvm nested virtualization support for s390x
48c2ecf20Sopenharmony_ci *
58c2ecf20Sopenharmony_ci * Copyright IBM Corp. 2016, 2018
68c2ecf20Sopenharmony_ci *
78c2ecf20Sopenharmony_ci *    Author(s): David Hildenbrand <dahi@linux.vnet.ibm.com>
88c2ecf20Sopenharmony_ci */
98c2ecf20Sopenharmony_ci#include <linux/vmalloc.h>
108c2ecf20Sopenharmony_ci#include <linux/kvm_host.h>
118c2ecf20Sopenharmony_ci#include <linux/bug.h>
128c2ecf20Sopenharmony_ci#include <linux/list.h>
138c2ecf20Sopenharmony_ci#include <linux/bitmap.h>
148c2ecf20Sopenharmony_ci#include <linux/sched/signal.h>
158c2ecf20Sopenharmony_ci
168c2ecf20Sopenharmony_ci#include <asm/gmap.h>
178c2ecf20Sopenharmony_ci#include <asm/mmu_context.h>
188c2ecf20Sopenharmony_ci#include <asm/sclp.h>
198c2ecf20Sopenharmony_ci#include <asm/nmi.h>
208c2ecf20Sopenharmony_ci#include <asm/dis.h>
218c2ecf20Sopenharmony_ci#include "kvm-s390.h"
228c2ecf20Sopenharmony_ci#include "gaccess.h"
238c2ecf20Sopenharmony_ci
248c2ecf20Sopenharmony_cistruct vsie_page {
258c2ecf20Sopenharmony_ci	struct kvm_s390_sie_block scb_s;	/* 0x0000 */
268c2ecf20Sopenharmony_ci	/*
278c2ecf20Sopenharmony_ci	 * the backup info for machine check. ensure it's at
288c2ecf20Sopenharmony_ci	 * the same offset as that in struct sie_page!
298c2ecf20Sopenharmony_ci	 */
308c2ecf20Sopenharmony_ci	struct mcck_volatile_info mcck_info;    /* 0x0200 */
318c2ecf20Sopenharmony_ci	/*
328c2ecf20Sopenharmony_ci	 * The pinned original scb. Be aware that other VCPUs can modify
338c2ecf20Sopenharmony_ci	 * it while we read from it. Values that are used for conditions or
348c2ecf20Sopenharmony_ci	 * are reused conditionally, should be accessed via READ_ONCE.
358c2ecf20Sopenharmony_ci	 */
368c2ecf20Sopenharmony_ci	struct kvm_s390_sie_block *scb_o;	/* 0x0218 */
378c2ecf20Sopenharmony_ci	/* the shadow gmap in use by the vsie_page */
388c2ecf20Sopenharmony_ci	struct gmap *gmap;			/* 0x0220 */
398c2ecf20Sopenharmony_ci	/* address of the last reported fault to guest2 */
408c2ecf20Sopenharmony_ci	unsigned long fault_addr;		/* 0x0228 */
418c2ecf20Sopenharmony_ci	/* calculated guest addresses of satellite control blocks */
428c2ecf20Sopenharmony_ci	gpa_t sca_gpa;				/* 0x0230 */
438c2ecf20Sopenharmony_ci	gpa_t itdba_gpa;			/* 0x0238 */
448c2ecf20Sopenharmony_ci	gpa_t gvrd_gpa;				/* 0x0240 */
458c2ecf20Sopenharmony_ci	gpa_t riccbd_gpa;			/* 0x0248 */
468c2ecf20Sopenharmony_ci	gpa_t sdnx_gpa;				/* 0x0250 */
478c2ecf20Sopenharmony_ci	__u8 reserved[0x0700 - 0x0258];		/* 0x0258 */
488c2ecf20Sopenharmony_ci	struct kvm_s390_crypto_cb crycb;	/* 0x0700 */
498c2ecf20Sopenharmony_ci	__u8 fac[S390_ARCH_FAC_LIST_SIZE_BYTE];	/* 0x0800 */
508c2ecf20Sopenharmony_ci};
518c2ecf20Sopenharmony_ci
528c2ecf20Sopenharmony_ci/* trigger a validity icpt for the given scb */
538c2ecf20Sopenharmony_cistatic int set_validity_icpt(struct kvm_s390_sie_block *scb,
548c2ecf20Sopenharmony_ci			     __u16 reason_code)
558c2ecf20Sopenharmony_ci{
568c2ecf20Sopenharmony_ci	scb->ipa = 0x1000;
578c2ecf20Sopenharmony_ci	scb->ipb = ((__u32) reason_code) << 16;
588c2ecf20Sopenharmony_ci	scb->icptcode = ICPT_VALIDITY;
598c2ecf20Sopenharmony_ci	return 1;
608c2ecf20Sopenharmony_ci}
618c2ecf20Sopenharmony_ci
628c2ecf20Sopenharmony_ci/* mark the prefix as unmapped, this will block the VSIE */
638c2ecf20Sopenharmony_cistatic void prefix_unmapped(struct vsie_page *vsie_page)
648c2ecf20Sopenharmony_ci{
658c2ecf20Sopenharmony_ci	atomic_or(PROG_REQUEST, &vsie_page->scb_s.prog20);
668c2ecf20Sopenharmony_ci}
678c2ecf20Sopenharmony_ci
688c2ecf20Sopenharmony_ci/* mark the prefix as unmapped and wait until the VSIE has been left */
698c2ecf20Sopenharmony_cistatic void prefix_unmapped_sync(struct vsie_page *vsie_page)
708c2ecf20Sopenharmony_ci{
718c2ecf20Sopenharmony_ci	prefix_unmapped(vsie_page);
728c2ecf20Sopenharmony_ci	if (vsie_page->scb_s.prog0c & PROG_IN_SIE)
738c2ecf20Sopenharmony_ci		atomic_or(CPUSTAT_STOP_INT, &vsie_page->scb_s.cpuflags);
748c2ecf20Sopenharmony_ci	while (vsie_page->scb_s.prog0c & PROG_IN_SIE)
758c2ecf20Sopenharmony_ci		cpu_relax();
768c2ecf20Sopenharmony_ci}
778c2ecf20Sopenharmony_ci
788c2ecf20Sopenharmony_ci/* mark the prefix as mapped, this will allow the VSIE to run */
798c2ecf20Sopenharmony_cistatic void prefix_mapped(struct vsie_page *vsie_page)
808c2ecf20Sopenharmony_ci{
818c2ecf20Sopenharmony_ci	atomic_andnot(PROG_REQUEST, &vsie_page->scb_s.prog20);
828c2ecf20Sopenharmony_ci}
838c2ecf20Sopenharmony_ci
848c2ecf20Sopenharmony_ci/* test if the prefix is mapped into the gmap shadow */
858c2ecf20Sopenharmony_cistatic int prefix_is_mapped(struct vsie_page *vsie_page)
868c2ecf20Sopenharmony_ci{
878c2ecf20Sopenharmony_ci	return !(atomic_read(&vsie_page->scb_s.prog20) & PROG_REQUEST);
888c2ecf20Sopenharmony_ci}
898c2ecf20Sopenharmony_ci
908c2ecf20Sopenharmony_ci/* copy the updated intervention request bits into the shadow scb */
918c2ecf20Sopenharmony_cistatic void update_intervention_requests(struct vsie_page *vsie_page)
928c2ecf20Sopenharmony_ci{
938c2ecf20Sopenharmony_ci	const int bits = CPUSTAT_STOP_INT | CPUSTAT_IO_INT | CPUSTAT_EXT_INT;
948c2ecf20Sopenharmony_ci	int cpuflags;
958c2ecf20Sopenharmony_ci
968c2ecf20Sopenharmony_ci	cpuflags = atomic_read(&vsie_page->scb_o->cpuflags);
978c2ecf20Sopenharmony_ci	atomic_andnot(bits, &vsie_page->scb_s.cpuflags);
988c2ecf20Sopenharmony_ci	atomic_or(cpuflags & bits, &vsie_page->scb_s.cpuflags);
998c2ecf20Sopenharmony_ci}
1008c2ecf20Sopenharmony_ci
1018c2ecf20Sopenharmony_ci/* shadow (filter and validate) the cpuflags  */
1028c2ecf20Sopenharmony_cistatic int prepare_cpuflags(struct kvm_vcpu *vcpu, struct vsie_page *vsie_page)
1038c2ecf20Sopenharmony_ci{
1048c2ecf20Sopenharmony_ci	struct kvm_s390_sie_block *scb_s = &vsie_page->scb_s;
1058c2ecf20Sopenharmony_ci	struct kvm_s390_sie_block *scb_o = vsie_page->scb_o;
1068c2ecf20Sopenharmony_ci	int newflags, cpuflags = atomic_read(&scb_o->cpuflags);
1078c2ecf20Sopenharmony_ci
1088c2ecf20Sopenharmony_ci	/* we don't allow ESA/390 guests */
1098c2ecf20Sopenharmony_ci	if (!(cpuflags & CPUSTAT_ZARCH))
1108c2ecf20Sopenharmony_ci		return set_validity_icpt(scb_s, 0x0001U);
1118c2ecf20Sopenharmony_ci
1128c2ecf20Sopenharmony_ci	if (cpuflags & (CPUSTAT_RRF | CPUSTAT_MCDS))
1138c2ecf20Sopenharmony_ci		return set_validity_icpt(scb_s, 0x0001U);
1148c2ecf20Sopenharmony_ci	else if (cpuflags & (CPUSTAT_SLSV | CPUSTAT_SLSR))
1158c2ecf20Sopenharmony_ci		return set_validity_icpt(scb_s, 0x0007U);
1168c2ecf20Sopenharmony_ci
1178c2ecf20Sopenharmony_ci	/* intervention requests will be set later */
1188c2ecf20Sopenharmony_ci	newflags = CPUSTAT_ZARCH;
1198c2ecf20Sopenharmony_ci	if (cpuflags & CPUSTAT_GED && test_kvm_facility(vcpu->kvm, 8))
1208c2ecf20Sopenharmony_ci		newflags |= CPUSTAT_GED;
1218c2ecf20Sopenharmony_ci	if (cpuflags & CPUSTAT_GED2 && test_kvm_facility(vcpu->kvm, 78)) {
1228c2ecf20Sopenharmony_ci		if (cpuflags & CPUSTAT_GED)
1238c2ecf20Sopenharmony_ci			return set_validity_icpt(scb_s, 0x0001U);
1248c2ecf20Sopenharmony_ci		newflags |= CPUSTAT_GED2;
1258c2ecf20Sopenharmony_ci	}
1268c2ecf20Sopenharmony_ci	if (test_kvm_cpu_feat(vcpu->kvm, KVM_S390_VM_CPU_FEAT_GPERE))
1278c2ecf20Sopenharmony_ci		newflags |= cpuflags & CPUSTAT_P;
1288c2ecf20Sopenharmony_ci	if (test_kvm_cpu_feat(vcpu->kvm, KVM_S390_VM_CPU_FEAT_GSLS))
1298c2ecf20Sopenharmony_ci		newflags |= cpuflags & CPUSTAT_SM;
1308c2ecf20Sopenharmony_ci	if (test_kvm_cpu_feat(vcpu->kvm, KVM_S390_VM_CPU_FEAT_IBS))
1318c2ecf20Sopenharmony_ci		newflags |= cpuflags & CPUSTAT_IBS;
1328c2ecf20Sopenharmony_ci	if (test_kvm_cpu_feat(vcpu->kvm, KVM_S390_VM_CPU_FEAT_KSS))
1338c2ecf20Sopenharmony_ci		newflags |= cpuflags & CPUSTAT_KSS;
1348c2ecf20Sopenharmony_ci
1358c2ecf20Sopenharmony_ci	atomic_set(&scb_s->cpuflags, newflags);
1368c2ecf20Sopenharmony_ci	return 0;
1378c2ecf20Sopenharmony_ci}
1388c2ecf20Sopenharmony_ci/* Copy to APCB FORMAT1 from APCB FORMAT0 */
1398c2ecf20Sopenharmony_cistatic int setup_apcb10(struct kvm_vcpu *vcpu, struct kvm_s390_apcb1 *apcb_s,
1408c2ecf20Sopenharmony_ci			unsigned long apcb_o, struct kvm_s390_apcb1 *apcb_h)
1418c2ecf20Sopenharmony_ci{
1428c2ecf20Sopenharmony_ci	struct kvm_s390_apcb0 tmp;
1438c2ecf20Sopenharmony_ci
1448c2ecf20Sopenharmony_ci	if (read_guest_real(vcpu, apcb_o, &tmp, sizeof(struct kvm_s390_apcb0)))
1458c2ecf20Sopenharmony_ci		return -EFAULT;
1468c2ecf20Sopenharmony_ci
1478c2ecf20Sopenharmony_ci	apcb_s->apm[0] = apcb_h->apm[0] & tmp.apm[0];
1488c2ecf20Sopenharmony_ci	apcb_s->aqm[0] = apcb_h->aqm[0] & tmp.aqm[0] & 0xffff000000000000UL;
1498c2ecf20Sopenharmony_ci	apcb_s->adm[0] = apcb_h->adm[0] & tmp.adm[0] & 0xffff000000000000UL;
1508c2ecf20Sopenharmony_ci
1518c2ecf20Sopenharmony_ci	return 0;
1528c2ecf20Sopenharmony_ci
1538c2ecf20Sopenharmony_ci}
1548c2ecf20Sopenharmony_ci
1558c2ecf20Sopenharmony_ci/**
1568c2ecf20Sopenharmony_ci * setup_apcb00 - Copy to APCB FORMAT0 from APCB FORMAT0
1578c2ecf20Sopenharmony_ci * @vcpu: pointer to the virtual CPU
1588c2ecf20Sopenharmony_ci * @apcb_s: pointer to start of apcb in the shadow crycb
1598c2ecf20Sopenharmony_ci * @apcb_o: pointer to start of original apcb in the guest2
1608c2ecf20Sopenharmony_ci * @apcb_h: pointer to start of apcb in the guest1
1618c2ecf20Sopenharmony_ci *
1628c2ecf20Sopenharmony_ci * Returns 0 and -EFAULT on error reading guest apcb
1638c2ecf20Sopenharmony_ci */
1648c2ecf20Sopenharmony_cistatic int setup_apcb00(struct kvm_vcpu *vcpu, unsigned long *apcb_s,
1658c2ecf20Sopenharmony_ci			unsigned long apcb_o, unsigned long *apcb_h)
1668c2ecf20Sopenharmony_ci{
1678c2ecf20Sopenharmony_ci	if (read_guest_real(vcpu, apcb_o, apcb_s,
1688c2ecf20Sopenharmony_ci			    sizeof(struct kvm_s390_apcb0)))
1698c2ecf20Sopenharmony_ci		return -EFAULT;
1708c2ecf20Sopenharmony_ci
1718c2ecf20Sopenharmony_ci	bitmap_and(apcb_s, apcb_s, apcb_h,
1728c2ecf20Sopenharmony_ci		   BITS_PER_BYTE * sizeof(struct kvm_s390_apcb0));
1738c2ecf20Sopenharmony_ci
1748c2ecf20Sopenharmony_ci	return 0;
1758c2ecf20Sopenharmony_ci}
1768c2ecf20Sopenharmony_ci
1778c2ecf20Sopenharmony_ci/**
1788c2ecf20Sopenharmony_ci * setup_apcb11 - Copy the FORMAT1 APCB from the guest to the shadow CRYCB
1798c2ecf20Sopenharmony_ci * @vcpu: pointer to the virtual CPU
1808c2ecf20Sopenharmony_ci * @apcb_s: pointer to start of apcb in the shadow crycb
1818c2ecf20Sopenharmony_ci * @apcb_o: pointer to start of original guest apcb
1828c2ecf20Sopenharmony_ci * @apcb_h: pointer to start of apcb in the host
1838c2ecf20Sopenharmony_ci *
1848c2ecf20Sopenharmony_ci * Returns 0 and -EFAULT on error reading guest apcb
1858c2ecf20Sopenharmony_ci */
1868c2ecf20Sopenharmony_cistatic int setup_apcb11(struct kvm_vcpu *vcpu, unsigned long *apcb_s,
1878c2ecf20Sopenharmony_ci			unsigned long apcb_o,
1888c2ecf20Sopenharmony_ci			unsigned long *apcb_h)
1898c2ecf20Sopenharmony_ci{
1908c2ecf20Sopenharmony_ci	if (read_guest_real(vcpu, apcb_o, apcb_s,
1918c2ecf20Sopenharmony_ci			    sizeof(struct kvm_s390_apcb1)))
1928c2ecf20Sopenharmony_ci		return -EFAULT;
1938c2ecf20Sopenharmony_ci
1948c2ecf20Sopenharmony_ci	bitmap_and(apcb_s, apcb_s, apcb_h,
1958c2ecf20Sopenharmony_ci		   BITS_PER_BYTE * sizeof(struct kvm_s390_apcb1));
1968c2ecf20Sopenharmony_ci
1978c2ecf20Sopenharmony_ci	return 0;
1988c2ecf20Sopenharmony_ci}
1998c2ecf20Sopenharmony_ci
2008c2ecf20Sopenharmony_ci/**
2018c2ecf20Sopenharmony_ci * setup_apcb - Create a shadow copy of the apcb.
2028c2ecf20Sopenharmony_ci * @vcpu: pointer to the virtual CPU
2038c2ecf20Sopenharmony_ci * @crycb_s: pointer to shadow crycb
2048c2ecf20Sopenharmony_ci * @crycb_o: pointer to original guest crycb
2058c2ecf20Sopenharmony_ci * @crycb_h: pointer to the host crycb
2068c2ecf20Sopenharmony_ci * @fmt_o: format of the original guest crycb.
2078c2ecf20Sopenharmony_ci * @fmt_h: format of the host crycb.
2088c2ecf20Sopenharmony_ci *
2098c2ecf20Sopenharmony_ci * Checks the compatibility between the guest and host crycb and calls the
2108c2ecf20Sopenharmony_ci * appropriate copy function.
2118c2ecf20Sopenharmony_ci *
2128c2ecf20Sopenharmony_ci * Return 0 or an error number if the guest and host crycb are incompatible.
2138c2ecf20Sopenharmony_ci */
2148c2ecf20Sopenharmony_cistatic int setup_apcb(struct kvm_vcpu *vcpu, struct kvm_s390_crypto_cb *crycb_s,
2158c2ecf20Sopenharmony_ci	       const u32 crycb_o,
2168c2ecf20Sopenharmony_ci	       struct kvm_s390_crypto_cb *crycb_h,
2178c2ecf20Sopenharmony_ci	       int fmt_o, int fmt_h)
2188c2ecf20Sopenharmony_ci{
2198c2ecf20Sopenharmony_ci	struct kvm_s390_crypto_cb *crycb;
2208c2ecf20Sopenharmony_ci
2218c2ecf20Sopenharmony_ci	crycb = (struct kvm_s390_crypto_cb *) (unsigned long)crycb_o;
2228c2ecf20Sopenharmony_ci
2238c2ecf20Sopenharmony_ci	switch (fmt_o) {
2248c2ecf20Sopenharmony_ci	case CRYCB_FORMAT2:
2258c2ecf20Sopenharmony_ci		if ((crycb_o & PAGE_MASK) != ((crycb_o + 256) & PAGE_MASK))
2268c2ecf20Sopenharmony_ci			return -EACCES;
2278c2ecf20Sopenharmony_ci		if (fmt_h != CRYCB_FORMAT2)
2288c2ecf20Sopenharmony_ci			return -EINVAL;
2298c2ecf20Sopenharmony_ci		return setup_apcb11(vcpu, (unsigned long *)&crycb_s->apcb1,
2308c2ecf20Sopenharmony_ci				    (unsigned long) &crycb->apcb1,
2318c2ecf20Sopenharmony_ci				    (unsigned long *)&crycb_h->apcb1);
2328c2ecf20Sopenharmony_ci	case CRYCB_FORMAT1:
2338c2ecf20Sopenharmony_ci		switch (fmt_h) {
2348c2ecf20Sopenharmony_ci		case CRYCB_FORMAT2:
2358c2ecf20Sopenharmony_ci			return setup_apcb10(vcpu, &crycb_s->apcb1,
2368c2ecf20Sopenharmony_ci					    (unsigned long) &crycb->apcb0,
2378c2ecf20Sopenharmony_ci					    &crycb_h->apcb1);
2388c2ecf20Sopenharmony_ci		case CRYCB_FORMAT1:
2398c2ecf20Sopenharmony_ci			return setup_apcb00(vcpu,
2408c2ecf20Sopenharmony_ci					    (unsigned long *) &crycb_s->apcb0,
2418c2ecf20Sopenharmony_ci					    (unsigned long) &crycb->apcb0,
2428c2ecf20Sopenharmony_ci					    (unsigned long *) &crycb_h->apcb0);
2438c2ecf20Sopenharmony_ci		}
2448c2ecf20Sopenharmony_ci		break;
2458c2ecf20Sopenharmony_ci	case CRYCB_FORMAT0:
2468c2ecf20Sopenharmony_ci		if ((crycb_o & PAGE_MASK) != ((crycb_o + 32) & PAGE_MASK))
2478c2ecf20Sopenharmony_ci			return -EACCES;
2488c2ecf20Sopenharmony_ci
2498c2ecf20Sopenharmony_ci		switch (fmt_h) {
2508c2ecf20Sopenharmony_ci		case CRYCB_FORMAT2:
2518c2ecf20Sopenharmony_ci			return setup_apcb10(vcpu, &crycb_s->apcb1,
2528c2ecf20Sopenharmony_ci					    (unsigned long) &crycb->apcb0,
2538c2ecf20Sopenharmony_ci					    &crycb_h->apcb1);
2548c2ecf20Sopenharmony_ci		case CRYCB_FORMAT1:
2558c2ecf20Sopenharmony_ci		case CRYCB_FORMAT0:
2568c2ecf20Sopenharmony_ci			return setup_apcb00(vcpu,
2578c2ecf20Sopenharmony_ci					    (unsigned long *) &crycb_s->apcb0,
2588c2ecf20Sopenharmony_ci					    (unsigned long) &crycb->apcb0,
2598c2ecf20Sopenharmony_ci					    (unsigned long *) &crycb_h->apcb0);
2608c2ecf20Sopenharmony_ci		}
2618c2ecf20Sopenharmony_ci	}
2628c2ecf20Sopenharmony_ci	return -EINVAL;
2638c2ecf20Sopenharmony_ci}
2648c2ecf20Sopenharmony_ci
2658c2ecf20Sopenharmony_ci/**
2668c2ecf20Sopenharmony_ci * shadow_crycb - Create a shadow copy of the crycb block
2678c2ecf20Sopenharmony_ci * @vcpu: a pointer to the virtual CPU
2688c2ecf20Sopenharmony_ci * @vsie_page: a pointer to internal date used for the vSIE
2698c2ecf20Sopenharmony_ci *
2708c2ecf20Sopenharmony_ci * Create a shadow copy of the crycb block and setup key wrapping, if
2718c2ecf20Sopenharmony_ci * requested for guest 3 and enabled for guest 2.
2728c2ecf20Sopenharmony_ci *
2738c2ecf20Sopenharmony_ci * We accept format-1 or format-2, but we convert format-1 into format-2
2748c2ecf20Sopenharmony_ci * in the shadow CRYCB.
2758c2ecf20Sopenharmony_ci * Using format-2 enables the firmware to choose the right format when
2768c2ecf20Sopenharmony_ci * scheduling the SIE.
2778c2ecf20Sopenharmony_ci * There is nothing to do for format-0.
2788c2ecf20Sopenharmony_ci *
2798c2ecf20Sopenharmony_ci * This function centralize the issuing of set_validity_icpt() for all
2808c2ecf20Sopenharmony_ci * the subfunctions working on the crycb.
2818c2ecf20Sopenharmony_ci *
2828c2ecf20Sopenharmony_ci * Returns: - 0 if shadowed or nothing to do
2838c2ecf20Sopenharmony_ci *          - > 0 if control has to be given to guest 2
2848c2ecf20Sopenharmony_ci */
2858c2ecf20Sopenharmony_cistatic int shadow_crycb(struct kvm_vcpu *vcpu, struct vsie_page *vsie_page)
2868c2ecf20Sopenharmony_ci{
2878c2ecf20Sopenharmony_ci	struct kvm_s390_sie_block *scb_s = &vsie_page->scb_s;
2888c2ecf20Sopenharmony_ci	struct kvm_s390_sie_block *scb_o = vsie_page->scb_o;
2898c2ecf20Sopenharmony_ci	const uint32_t crycbd_o = READ_ONCE(scb_o->crycbd);
2908c2ecf20Sopenharmony_ci	const u32 crycb_addr = crycbd_o & 0x7ffffff8U;
2918c2ecf20Sopenharmony_ci	unsigned long *b1, *b2;
2928c2ecf20Sopenharmony_ci	u8 ecb3_flags;
2938c2ecf20Sopenharmony_ci	u32 ecd_flags;
2948c2ecf20Sopenharmony_ci	int apie_h;
2958c2ecf20Sopenharmony_ci	int apie_s;
2968c2ecf20Sopenharmony_ci	int key_msk = test_kvm_facility(vcpu->kvm, 76);
2978c2ecf20Sopenharmony_ci	int fmt_o = crycbd_o & CRYCB_FORMAT_MASK;
2988c2ecf20Sopenharmony_ci	int fmt_h = vcpu->arch.sie_block->crycbd & CRYCB_FORMAT_MASK;
2998c2ecf20Sopenharmony_ci	int ret = 0;
3008c2ecf20Sopenharmony_ci
3018c2ecf20Sopenharmony_ci	scb_s->crycbd = 0;
3028c2ecf20Sopenharmony_ci
3038c2ecf20Sopenharmony_ci	apie_h = vcpu->arch.sie_block->eca & ECA_APIE;
3048c2ecf20Sopenharmony_ci	apie_s = apie_h & scb_o->eca;
3058c2ecf20Sopenharmony_ci	if (!apie_s && (!key_msk || (fmt_o == CRYCB_FORMAT0)))
3068c2ecf20Sopenharmony_ci		return 0;
3078c2ecf20Sopenharmony_ci
3088c2ecf20Sopenharmony_ci	if (!crycb_addr)
3098c2ecf20Sopenharmony_ci		return set_validity_icpt(scb_s, 0x0039U);
3108c2ecf20Sopenharmony_ci
3118c2ecf20Sopenharmony_ci	if (fmt_o == CRYCB_FORMAT1)
3128c2ecf20Sopenharmony_ci		if ((crycb_addr & PAGE_MASK) !=
3138c2ecf20Sopenharmony_ci		    ((crycb_addr + 128) & PAGE_MASK))
3148c2ecf20Sopenharmony_ci			return set_validity_icpt(scb_s, 0x003CU);
3158c2ecf20Sopenharmony_ci
3168c2ecf20Sopenharmony_ci	if (apie_s) {
3178c2ecf20Sopenharmony_ci		ret = setup_apcb(vcpu, &vsie_page->crycb, crycb_addr,
3188c2ecf20Sopenharmony_ci				 vcpu->kvm->arch.crypto.crycb,
3198c2ecf20Sopenharmony_ci				 fmt_o, fmt_h);
3208c2ecf20Sopenharmony_ci		if (ret)
3218c2ecf20Sopenharmony_ci			goto end;
3228c2ecf20Sopenharmony_ci		scb_s->eca |= scb_o->eca & ECA_APIE;
3238c2ecf20Sopenharmony_ci	}
3248c2ecf20Sopenharmony_ci
3258c2ecf20Sopenharmony_ci	/* we may only allow it if enabled for guest 2 */
3268c2ecf20Sopenharmony_ci	ecb3_flags = scb_o->ecb3 & vcpu->arch.sie_block->ecb3 &
3278c2ecf20Sopenharmony_ci		     (ECB3_AES | ECB3_DEA);
3288c2ecf20Sopenharmony_ci	ecd_flags = scb_o->ecd & vcpu->arch.sie_block->ecd & ECD_ECC;
3298c2ecf20Sopenharmony_ci	if (!ecb3_flags && !ecd_flags)
3308c2ecf20Sopenharmony_ci		goto end;
3318c2ecf20Sopenharmony_ci
3328c2ecf20Sopenharmony_ci	/* copy only the wrapping keys */
3338c2ecf20Sopenharmony_ci	if (read_guest_real(vcpu, crycb_addr + 72,
3348c2ecf20Sopenharmony_ci			    vsie_page->crycb.dea_wrapping_key_mask, 56))
3358c2ecf20Sopenharmony_ci		return set_validity_icpt(scb_s, 0x0035U);
3368c2ecf20Sopenharmony_ci
3378c2ecf20Sopenharmony_ci	scb_s->ecb3 |= ecb3_flags;
3388c2ecf20Sopenharmony_ci	scb_s->ecd |= ecd_flags;
3398c2ecf20Sopenharmony_ci
3408c2ecf20Sopenharmony_ci	/* xor both blocks in one run */
3418c2ecf20Sopenharmony_ci	b1 = (unsigned long *) vsie_page->crycb.dea_wrapping_key_mask;
3428c2ecf20Sopenharmony_ci	b2 = (unsigned long *)
3438c2ecf20Sopenharmony_ci			    vcpu->kvm->arch.crypto.crycb->dea_wrapping_key_mask;
3448c2ecf20Sopenharmony_ci	/* as 56%8 == 0, bitmap_xor won't overwrite any data */
3458c2ecf20Sopenharmony_ci	bitmap_xor(b1, b1, b2, BITS_PER_BYTE * 56);
3468c2ecf20Sopenharmony_ciend:
3478c2ecf20Sopenharmony_ci	switch (ret) {
3488c2ecf20Sopenharmony_ci	case -EINVAL:
3498c2ecf20Sopenharmony_ci		return set_validity_icpt(scb_s, 0x0022U);
3508c2ecf20Sopenharmony_ci	case -EFAULT:
3518c2ecf20Sopenharmony_ci		return set_validity_icpt(scb_s, 0x0035U);
3528c2ecf20Sopenharmony_ci	case -EACCES:
3538c2ecf20Sopenharmony_ci		return set_validity_icpt(scb_s, 0x003CU);
3548c2ecf20Sopenharmony_ci	}
3558c2ecf20Sopenharmony_ci	scb_s->crycbd = ((__u32)(__u64) &vsie_page->crycb) | CRYCB_FORMAT2;
3568c2ecf20Sopenharmony_ci	return 0;
3578c2ecf20Sopenharmony_ci}
3588c2ecf20Sopenharmony_ci
3598c2ecf20Sopenharmony_ci/* shadow (round up/down) the ibc to avoid validity icpt */
3608c2ecf20Sopenharmony_cistatic void prepare_ibc(struct kvm_vcpu *vcpu, struct vsie_page *vsie_page)
3618c2ecf20Sopenharmony_ci{
3628c2ecf20Sopenharmony_ci	struct kvm_s390_sie_block *scb_s = &vsie_page->scb_s;
3638c2ecf20Sopenharmony_ci	struct kvm_s390_sie_block *scb_o = vsie_page->scb_o;
3648c2ecf20Sopenharmony_ci	/* READ_ONCE does not work on bitfields - use a temporary variable */
3658c2ecf20Sopenharmony_ci	const uint32_t __new_ibc = scb_o->ibc;
3668c2ecf20Sopenharmony_ci	const uint32_t new_ibc = READ_ONCE(__new_ibc) & 0x0fffU;
3678c2ecf20Sopenharmony_ci	__u64 min_ibc = (sclp.ibc >> 16) & 0x0fffU;
3688c2ecf20Sopenharmony_ci
3698c2ecf20Sopenharmony_ci	scb_s->ibc = 0;
3708c2ecf20Sopenharmony_ci	/* ibc installed in g2 and requested for g3 */
3718c2ecf20Sopenharmony_ci	if (vcpu->kvm->arch.model.ibc && new_ibc) {
3728c2ecf20Sopenharmony_ci		scb_s->ibc = new_ibc;
3738c2ecf20Sopenharmony_ci		/* takte care of the minimum ibc level of the machine */
3748c2ecf20Sopenharmony_ci		if (scb_s->ibc < min_ibc)
3758c2ecf20Sopenharmony_ci			scb_s->ibc = min_ibc;
3768c2ecf20Sopenharmony_ci		/* take care of the maximum ibc level set for the guest */
3778c2ecf20Sopenharmony_ci		if (scb_s->ibc > vcpu->kvm->arch.model.ibc)
3788c2ecf20Sopenharmony_ci			scb_s->ibc = vcpu->kvm->arch.model.ibc;
3798c2ecf20Sopenharmony_ci	}
3808c2ecf20Sopenharmony_ci}
3818c2ecf20Sopenharmony_ci
3828c2ecf20Sopenharmony_ci/* unshadow the scb, copying parameters back to the real scb */
3838c2ecf20Sopenharmony_cistatic void unshadow_scb(struct kvm_vcpu *vcpu, struct vsie_page *vsie_page)
3848c2ecf20Sopenharmony_ci{
3858c2ecf20Sopenharmony_ci	struct kvm_s390_sie_block *scb_s = &vsie_page->scb_s;
3868c2ecf20Sopenharmony_ci	struct kvm_s390_sie_block *scb_o = vsie_page->scb_o;
3878c2ecf20Sopenharmony_ci
3888c2ecf20Sopenharmony_ci	/* interception */
3898c2ecf20Sopenharmony_ci	scb_o->icptcode = scb_s->icptcode;
3908c2ecf20Sopenharmony_ci	scb_o->icptstatus = scb_s->icptstatus;
3918c2ecf20Sopenharmony_ci	scb_o->ipa = scb_s->ipa;
3928c2ecf20Sopenharmony_ci	scb_o->ipb = scb_s->ipb;
3938c2ecf20Sopenharmony_ci	scb_o->gbea = scb_s->gbea;
3948c2ecf20Sopenharmony_ci
3958c2ecf20Sopenharmony_ci	/* timer */
3968c2ecf20Sopenharmony_ci	scb_o->cputm = scb_s->cputm;
3978c2ecf20Sopenharmony_ci	scb_o->ckc = scb_s->ckc;
3988c2ecf20Sopenharmony_ci	scb_o->todpr = scb_s->todpr;
3998c2ecf20Sopenharmony_ci
4008c2ecf20Sopenharmony_ci	/* guest state */
4018c2ecf20Sopenharmony_ci	scb_o->gpsw = scb_s->gpsw;
4028c2ecf20Sopenharmony_ci	scb_o->gg14 = scb_s->gg14;
4038c2ecf20Sopenharmony_ci	scb_o->gg15 = scb_s->gg15;
4048c2ecf20Sopenharmony_ci	memcpy(scb_o->gcr, scb_s->gcr, 128);
4058c2ecf20Sopenharmony_ci	scb_o->pp = scb_s->pp;
4068c2ecf20Sopenharmony_ci
4078c2ecf20Sopenharmony_ci	/* branch prediction */
4088c2ecf20Sopenharmony_ci	if (test_kvm_facility(vcpu->kvm, 82)) {
4098c2ecf20Sopenharmony_ci		scb_o->fpf &= ~FPF_BPBC;
4108c2ecf20Sopenharmony_ci		scb_o->fpf |= scb_s->fpf & FPF_BPBC;
4118c2ecf20Sopenharmony_ci	}
4128c2ecf20Sopenharmony_ci
4138c2ecf20Sopenharmony_ci	/* interrupt intercept */
4148c2ecf20Sopenharmony_ci	switch (scb_s->icptcode) {
4158c2ecf20Sopenharmony_ci	case ICPT_PROGI:
4168c2ecf20Sopenharmony_ci	case ICPT_INSTPROGI:
4178c2ecf20Sopenharmony_ci	case ICPT_EXTINT:
4188c2ecf20Sopenharmony_ci		memcpy((void *)((u64)scb_o + 0xc0),
4198c2ecf20Sopenharmony_ci		       (void *)((u64)scb_s + 0xc0), 0xf0 - 0xc0);
4208c2ecf20Sopenharmony_ci		break;
4218c2ecf20Sopenharmony_ci	}
4228c2ecf20Sopenharmony_ci
4238c2ecf20Sopenharmony_ci	if (scb_s->ihcpu != 0xffffU)
4248c2ecf20Sopenharmony_ci		scb_o->ihcpu = scb_s->ihcpu;
4258c2ecf20Sopenharmony_ci}
4268c2ecf20Sopenharmony_ci
4278c2ecf20Sopenharmony_ci/*
4288c2ecf20Sopenharmony_ci * Setup the shadow scb by copying and checking the relevant parts of the g2
4298c2ecf20Sopenharmony_ci * provided scb.
4308c2ecf20Sopenharmony_ci *
4318c2ecf20Sopenharmony_ci * Returns: - 0 if the scb has been shadowed
4328c2ecf20Sopenharmony_ci *          - > 0 if control has to be given to guest 2
4338c2ecf20Sopenharmony_ci */
4348c2ecf20Sopenharmony_cistatic int shadow_scb(struct kvm_vcpu *vcpu, struct vsie_page *vsie_page)
4358c2ecf20Sopenharmony_ci{
4368c2ecf20Sopenharmony_ci	struct kvm_s390_sie_block *scb_o = vsie_page->scb_o;
4378c2ecf20Sopenharmony_ci	struct kvm_s390_sie_block *scb_s = &vsie_page->scb_s;
4388c2ecf20Sopenharmony_ci	/* READ_ONCE does not work on bitfields - use a temporary variable */
4398c2ecf20Sopenharmony_ci	const uint32_t __new_prefix = scb_o->prefix;
4408c2ecf20Sopenharmony_ci	const uint32_t new_prefix = READ_ONCE(__new_prefix);
4418c2ecf20Sopenharmony_ci	const bool wants_tx = READ_ONCE(scb_o->ecb) & ECB_TE;
4428c2ecf20Sopenharmony_ci	bool had_tx = scb_s->ecb & ECB_TE;
4438c2ecf20Sopenharmony_ci	unsigned long new_mso = 0;
4448c2ecf20Sopenharmony_ci	int rc;
4458c2ecf20Sopenharmony_ci
4468c2ecf20Sopenharmony_ci	/* make sure we don't have any leftovers when reusing the scb */
4478c2ecf20Sopenharmony_ci	scb_s->icptcode = 0;
4488c2ecf20Sopenharmony_ci	scb_s->eca = 0;
4498c2ecf20Sopenharmony_ci	scb_s->ecb = 0;
4508c2ecf20Sopenharmony_ci	scb_s->ecb2 = 0;
4518c2ecf20Sopenharmony_ci	scb_s->ecb3 = 0;
4528c2ecf20Sopenharmony_ci	scb_s->ecd = 0;
4538c2ecf20Sopenharmony_ci	scb_s->fac = 0;
4548c2ecf20Sopenharmony_ci	scb_s->fpf = 0;
4558c2ecf20Sopenharmony_ci
4568c2ecf20Sopenharmony_ci	rc = prepare_cpuflags(vcpu, vsie_page);
4578c2ecf20Sopenharmony_ci	if (rc)
4588c2ecf20Sopenharmony_ci		goto out;
4598c2ecf20Sopenharmony_ci
4608c2ecf20Sopenharmony_ci	/* timer */
4618c2ecf20Sopenharmony_ci	scb_s->cputm = scb_o->cputm;
4628c2ecf20Sopenharmony_ci	scb_s->ckc = scb_o->ckc;
4638c2ecf20Sopenharmony_ci	scb_s->todpr = scb_o->todpr;
4648c2ecf20Sopenharmony_ci	scb_s->epoch = scb_o->epoch;
4658c2ecf20Sopenharmony_ci
4668c2ecf20Sopenharmony_ci	/* guest state */
4678c2ecf20Sopenharmony_ci	scb_s->gpsw = scb_o->gpsw;
4688c2ecf20Sopenharmony_ci	scb_s->gg14 = scb_o->gg14;
4698c2ecf20Sopenharmony_ci	scb_s->gg15 = scb_o->gg15;
4708c2ecf20Sopenharmony_ci	memcpy(scb_s->gcr, scb_o->gcr, 128);
4718c2ecf20Sopenharmony_ci	scb_s->pp = scb_o->pp;
4728c2ecf20Sopenharmony_ci
4738c2ecf20Sopenharmony_ci	/* interception / execution handling */
4748c2ecf20Sopenharmony_ci	scb_s->gbea = scb_o->gbea;
4758c2ecf20Sopenharmony_ci	scb_s->lctl = scb_o->lctl;
4768c2ecf20Sopenharmony_ci	scb_s->svcc = scb_o->svcc;
4778c2ecf20Sopenharmony_ci	scb_s->ictl = scb_o->ictl;
4788c2ecf20Sopenharmony_ci	/*
4798c2ecf20Sopenharmony_ci	 * SKEY handling functions can't deal with false setting of PTE invalid
4808c2ecf20Sopenharmony_ci	 * bits. Therefore we cannot provide interpretation and would later
4818c2ecf20Sopenharmony_ci	 * have to provide own emulation handlers.
4828c2ecf20Sopenharmony_ci	 */
4838c2ecf20Sopenharmony_ci	if (!(atomic_read(&scb_s->cpuflags) & CPUSTAT_KSS))
4848c2ecf20Sopenharmony_ci		scb_s->ictl |= ICTL_ISKE | ICTL_SSKE | ICTL_RRBE;
4858c2ecf20Sopenharmony_ci
4868c2ecf20Sopenharmony_ci	scb_s->icpua = scb_o->icpua;
4878c2ecf20Sopenharmony_ci
4888c2ecf20Sopenharmony_ci	if (!(atomic_read(&scb_s->cpuflags) & CPUSTAT_SM))
4898c2ecf20Sopenharmony_ci		new_mso = READ_ONCE(scb_o->mso) & 0xfffffffffff00000UL;
4908c2ecf20Sopenharmony_ci	/* if the hva of the prefix changes, we have to remap the prefix */
4918c2ecf20Sopenharmony_ci	if (scb_s->mso != new_mso || scb_s->prefix != new_prefix)
4928c2ecf20Sopenharmony_ci		prefix_unmapped(vsie_page);
4938c2ecf20Sopenharmony_ci	 /* SIE will do mso/msl validity and exception checks for us */
4948c2ecf20Sopenharmony_ci	scb_s->msl = scb_o->msl & 0xfffffffffff00000UL;
4958c2ecf20Sopenharmony_ci	scb_s->mso = new_mso;
4968c2ecf20Sopenharmony_ci	scb_s->prefix = new_prefix;
4978c2ecf20Sopenharmony_ci
4988c2ecf20Sopenharmony_ci	/* We have to definetly flush the tlb if this scb never ran */
4998c2ecf20Sopenharmony_ci	if (scb_s->ihcpu != 0xffffU)
5008c2ecf20Sopenharmony_ci		scb_s->ihcpu = scb_o->ihcpu;
5018c2ecf20Sopenharmony_ci
5028c2ecf20Sopenharmony_ci	/* MVPG and Protection Exception Interpretation are always available */
5038c2ecf20Sopenharmony_ci	scb_s->eca |= scb_o->eca & (ECA_MVPGI | ECA_PROTEXCI);
5048c2ecf20Sopenharmony_ci	/* Host-protection-interruption introduced with ESOP */
5058c2ecf20Sopenharmony_ci	if (test_kvm_cpu_feat(vcpu->kvm, KVM_S390_VM_CPU_FEAT_ESOP))
5068c2ecf20Sopenharmony_ci		scb_s->ecb |= scb_o->ecb & ECB_HOSTPROTINT;
5078c2ecf20Sopenharmony_ci	/* transactional execution */
5088c2ecf20Sopenharmony_ci	if (test_kvm_facility(vcpu->kvm, 73) && wants_tx) {
5098c2ecf20Sopenharmony_ci		/* remap the prefix is tx is toggled on */
5108c2ecf20Sopenharmony_ci		if (!had_tx)
5118c2ecf20Sopenharmony_ci			prefix_unmapped(vsie_page);
5128c2ecf20Sopenharmony_ci		scb_s->ecb |= ECB_TE;
5138c2ecf20Sopenharmony_ci	}
5148c2ecf20Sopenharmony_ci	/* branch prediction */
5158c2ecf20Sopenharmony_ci	if (test_kvm_facility(vcpu->kvm, 82))
5168c2ecf20Sopenharmony_ci		scb_s->fpf |= scb_o->fpf & FPF_BPBC;
5178c2ecf20Sopenharmony_ci	/* SIMD */
5188c2ecf20Sopenharmony_ci	if (test_kvm_facility(vcpu->kvm, 129)) {
5198c2ecf20Sopenharmony_ci		scb_s->eca |= scb_o->eca & ECA_VX;
5208c2ecf20Sopenharmony_ci		scb_s->ecd |= scb_o->ecd & ECD_HOSTREGMGMT;
5218c2ecf20Sopenharmony_ci	}
5228c2ecf20Sopenharmony_ci	/* Run-time-Instrumentation */
5238c2ecf20Sopenharmony_ci	if (test_kvm_facility(vcpu->kvm, 64))
5248c2ecf20Sopenharmony_ci		scb_s->ecb3 |= scb_o->ecb3 & ECB3_RI;
5258c2ecf20Sopenharmony_ci	/* Instruction Execution Prevention */
5268c2ecf20Sopenharmony_ci	if (test_kvm_facility(vcpu->kvm, 130))
5278c2ecf20Sopenharmony_ci		scb_s->ecb2 |= scb_o->ecb2 & ECB2_IEP;
5288c2ecf20Sopenharmony_ci	/* Guarded Storage */
5298c2ecf20Sopenharmony_ci	if (test_kvm_facility(vcpu->kvm, 133)) {
5308c2ecf20Sopenharmony_ci		scb_s->ecb |= scb_o->ecb & ECB_GS;
5318c2ecf20Sopenharmony_ci		scb_s->ecd |= scb_o->ecd & ECD_HOSTREGMGMT;
5328c2ecf20Sopenharmony_ci	}
5338c2ecf20Sopenharmony_ci	if (test_kvm_cpu_feat(vcpu->kvm, KVM_S390_VM_CPU_FEAT_SIIF))
5348c2ecf20Sopenharmony_ci		scb_s->eca |= scb_o->eca & ECA_SII;
5358c2ecf20Sopenharmony_ci	if (test_kvm_cpu_feat(vcpu->kvm, KVM_S390_VM_CPU_FEAT_IB))
5368c2ecf20Sopenharmony_ci		scb_s->eca |= scb_o->eca & ECA_IB;
5378c2ecf20Sopenharmony_ci	if (test_kvm_cpu_feat(vcpu->kvm, KVM_S390_VM_CPU_FEAT_CEI))
5388c2ecf20Sopenharmony_ci		scb_s->eca |= scb_o->eca & ECA_CEI;
5398c2ecf20Sopenharmony_ci	/* Epoch Extension */
5408c2ecf20Sopenharmony_ci	if (test_kvm_facility(vcpu->kvm, 139)) {
5418c2ecf20Sopenharmony_ci		scb_s->ecd |= scb_o->ecd & ECD_MEF;
5428c2ecf20Sopenharmony_ci		scb_s->epdx = scb_o->epdx;
5438c2ecf20Sopenharmony_ci	}
5448c2ecf20Sopenharmony_ci
5458c2ecf20Sopenharmony_ci	/* etoken */
5468c2ecf20Sopenharmony_ci	if (test_kvm_facility(vcpu->kvm, 156))
5478c2ecf20Sopenharmony_ci		scb_s->ecd |= scb_o->ecd & ECD_ETOKENF;
5488c2ecf20Sopenharmony_ci
5498c2ecf20Sopenharmony_ci	scb_s->hpid = HPID_VSIE;
5508c2ecf20Sopenharmony_ci	scb_s->cpnc = scb_o->cpnc;
5518c2ecf20Sopenharmony_ci
5528c2ecf20Sopenharmony_ci	prepare_ibc(vcpu, vsie_page);
5538c2ecf20Sopenharmony_ci	rc = shadow_crycb(vcpu, vsie_page);
5548c2ecf20Sopenharmony_ciout:
5558c2ecf20Sopenharmony_ci	if (rc)
5568c2ecf20Sopenharmony_ci		unshadow_scb(vcpu, vsie_page);
5578c2ecf20Sopenharmony_ci	return rc;
5588c2ecf20Sopenharmony_ci}
5598c2ecf20Sopenharmony_ci
5608c2ecf20Sopenharmony_civoid kvm_s390_vsie_gmap_notifier(struct gmap *gmap, unsigned long start,
5618c2ecf20Sopenharmony_ci				 unsigned long end)
5628c2ecf20Sopenharmony_ci{
5638c2ecf20Sopenharmony_ci	struct kvm *kvm = gmap->private;
5648c2ecf20Sopenharmony_ci	struct vsie_page *cur;
5658c2ecf20Sopenharmony_ci	unsigned long prefix;
5668c2ecf20Sopenharmony_ci	struct page *page;
5678c2ecf20Sopenharmony_ci	int i;
5688c2ecf20Sopenharmony_ci
5698c2ecf20Sopenharmony_ci	if (!gmap_is_shadow(gmap))
5708c2ecf20Sopenharmony_ci		return;
5718c2ecf20Sopenharmony_ci	if (start >= 1UL << 31)
5728c2ecf20Sopenharmony_ci		/* We are only interested in prefix pages */
5738c2ecf20Sopenharmony_ci		return;
5748c2ecf20Sopenharmony_ci
5758c2ecf20Sopenharmony_ci	/*
5768c2ecf20Sopenharmony_ci	 * Only new shadow blocks are added to the list during runtime,
5778c2ecf20Sopenharmony_ci	 * therefore we can safely reference them all the time.
5788c2ecf20Sopenharmony_ci	 */
5798c2ecf20Sopenharmony_ci	for (i = 0; i < kvm->arch.vsie.page_count; i++) {
5808c2ecf20Sopenharmony_ci		page = READ_ONCE(kvm->arch.vsie.pages[i]);
5818c2ecf20Sopenharmony_ci		if (!page)
5828c2ecf20Sopenharmony_ci			continue;
5838c2ecf20Sopenharmony_ci		cur = page_to_virt(page);
5848c2ecf20Sopenharmony_ci		if (READ_ONCE(cur->gmap) != gmap)
5858c2ecf20Sopenharmony_ci			continue;
5868c2ecf20Sopenharmony_ci		prefix = cur->scb_s.prefix << GUEST_PREFIX_SHIFT;
5878c2ecf20Sopenharmony_ci		/* with mso/msl, the prefix lies at an offset */
5888c2ecf20Sopenharmony_ci		prefix += cur->scb_s.mso;
5898c2ecf20Sopenharmony_ci		if (prefix <= end && start <= prefix + 2 * PAGE_SIZE - 1)
5908c2ecf20Sopenharmony_ci			prefix_unmapped_sync(cur);
5918c2ecf20Sopenharmony_ci	}
5928c2ecf20Sopenharmony_ci}
5938c2ecf20Sopenharmony_ci
5948c2ecf20Sopenharmony_ci/*
5958c2ecf20Sopenharmony_ci * Map the first prefix page and if tx is enabled also the second prefix page.
5968c2ecf20Sopenharmony_ci *
5978c2ecf20Sopenharmony_ci * The prefix will be protected, a gmap notifier will inform about unmaps.
5988c2ecf20Sopenharmony_ci * The shadow scb must not be executed until the prefix is remapped, this is
5998c2ecf20Sopenharmony_ci * guaranteed by properly handling PROG_REQUEST.
6008c2ecf20Sopenharmony_ci *
6018c2ecf20Sopenharmony_ci * Returns: - 0 on if successfully mapped or already mapped
6028c2ecf20Sopenharmony_ci *          - > 0 if control has to be given to guest 2
6038c2ecf20Sopenharmony_ci *          - -EAGAIN if the caller can retry immediately
6048c2ecf20Sopenharmony_ci *          - -ENOMEM if out of memory
6058c2ecf20Sopenharmony_ci */
6068c2ecf20Sopenharmony_cistatic int map_prefix(struct kvm_vcpu *vcpu, struct vsie_page *vsie_page)
6078c2ecf20Sopenharmony_ci{
6088c2ecf20Sopenharmony_ci	struct kvm_s390_sie_block *scb_s = &vsie_page->scb_s;
6098c2ecf20Sopenharmony_ci	u64 prefix = scb_s->prefix << GUEST_PREFIX_SHIFT;
6108c2ecf20Sopenharmony_ci	int rc;
6118c2ecf20Sopenharmony_ci
6128c2ecf20Sopenharmony_ci	if (prefix_is_mapped(vsie_page))
6138c2ecf20Sopenharmony_ci		return 0;
6148c2ecf20Sopenharmony_ci
6158c2ecf20Sopenharmony_ci	/* mark it as mapped so we can catch any concurrent unmappers */
6168c2ecf20Sopenharmony_ci	prefix_mapped(vsie_page);
6178c2ecf20Sopenharmony_ci
6188c2ecf20Sopenharmony_ci	/* with mso/msl, the prefix lies at offset *mso* */
6198c2ecf20Sopenharmony_ci	prefix += scb_s->mso;
6208c2ecf20Sopenharmony_ci
6218c2ecf20Sopenharmony_ci	rc = kvm_s390_shadow_fault(vcpu, vsie_page->gmap, prefix, NULL);
6228c2ecf20Sopenharmony_ci	if (!rc && (scb_s->ecb & ECB_TE))
6238c2ecf20Sopenharmony_ci		rc = kvm_s390_shadow_fault(vcpu, vsie_page->gmap,
6248c2ecf20Sopenharmony_ci					   prefix + PAGE_SIZE, NULL);
6258c2ecf20Sopenharmony_ci	/*
6268c2ecf20Sopenharmony_ci	 * We don't have to mprotect, we will be called for all unshadows.
6278c2ecf20Sopenharmony_ci	 * SIE will detect if protection applies and trigger a validity.
6288c2ecf20Sopenharmony_ci	 */
6298c2ecf20Sopenharmony_ci	if (rc)
6308c2ecf20Sopenharmony_ci		prefix_unmapped(vsie_page);
6318c2ecf20Sopenharmony_ci	if (rc > 0 || rc == -EFAULT)
6328c2ecf20Sopenharmony_ci		rc = set_validity_icpt(scb_s, 0x0037U);
6338c2ecf20Sopenharmony_ci	return rc;
6348c2ecf20Sopenharmony_ci}
6358c2ecf20Sopenharmony_ci
6368c2ecf20Sopenharmony_ci/*
6378c2ecf20Sopenharmony_ci * Pin the guest page given by gpa and set hpa to the pinned host address.
6388c2ecf20Sopenharmony_ci * Will always be pinned writable.
6398c2ecf20Sopenharmony_ci *
6408c2ecf20Sopenharmony_ci * Returns: - 0 on success
6418c2ecf20Sopenharmony_ci *          - -EINVAL if the gpa is not valid guest storage
6428c2ecf20Sopenharmony_ci */
6438c2ecf20Sopenharmony_cistatic int pin_guest_page(struct kvm *kvm, gpa_t gpa, hpa_t *hpa)
6448c2ecf20Sopenharmony_ci{
6458c2ecf20Sopenharmony_ci	struct page *page;
6468c2ecf20Sopenharmony_ci
6478c2ecf20Sopenharmony_ci	page = gfn_to_page(kvm, gpa_to_gfn(gpa));
6488c2ecf20Sopenharmony_ci	if (is_error_page(page))
6498c2ecf20Sopenharmony_ci		return -EINVAL;
6508c2ecf20Sopenharmony_ci	*hpa = (hpa_t) page_to_virt(page) + (gpa & ~PAGE_MASK);
6518c2ecf20Sopenharmony_ci	return 0;
6528c2ecf20Sopenharmony_ci}
6538c2ecf20Sopenharmony_ci
6548c2ecf20Sopenharmony_ci/* Unpins a page previously pinned via pin_guest_page, marking it as dirty. */
6558c2ecf20Sopenharmony_cistatic void unpin_guest_page(struct kvm *kvm, gpa_t gpa, hpa_t hpa)
6568c2ecf20Sopenharmony_ci{
6578c2ecf20Sopenharmony_ci	kvm_release_pfn_dirty(hpa >> PAGE_SHIFT);
6588c2ecf20Sopenharmony_ci	/* mark the page always as dirty for migration */
6598c2ecf20Sopenharmony_ci	mark_page_dirty(kvm, gpa_to_gfn(gpa));
6608c2ecf20Sopenharmony_ci}
6618c2ecf20Sopenharmony_ci
6628c2ecf20Sopenharmony_ci/* unpin all blocks previously pinned by pin_blocks(), marking them dirty */
6638c2ecf20Sopenharmony_cistatic void unpin_blocks(struct kvm_vcpu *vcpu, struct vsie_page *vsie_page)
6648c2ecf20Sopenharmony_ci{
6658c2ecf20Sopenharmony_ci	struct kvm_s390_sie_block *scb_s = &vsie_page->scb_s;
6668c2ecf20Sopenharmony_ci	hpa_t hpa;
6678c2ecf20Sopenharmony_ci
6688c2ecf20Sopenharmony_ci	hpa = (u64) scb_s->scaoh << 32 | scb_s->scaol;
6698c2ecf20Sopenharmony_ci	if (hpa) {
6708c2ecf20Sopenharmony_ci		unpin_guest_page(vcpu->kvm, vsie_page->sca_gpa, hpa);
6718c2ecf20Sopenharmony_ci		vsie_page->sca_gpa = 0;
6728c2ecf20Sopenharmony_ci		scb_s->scaol = 0;
6738c2ecf20Sopenharmony_ci		scb_s->scaoh = 0;
6748c2ecf20Sopenharmony_ci	}
6758c2ecf20Sopenharmony_ci
6768c2ecf20Sopenharmony_ci	hpa = scb_s->itdba;
6778c2ecf20Sopenharmony_ci	if (hpa) {
6788c2ecf20Sopenharmony_ci		unpin_guest_page(vcpu->kvm, vsie_page->itdba_gpa, hpa);
6798c2ecf20Sopenharmony_ci		vsie_page->itdba_gpa = 0;
6808c2ecf20Sopenharmony_ci		scb_s->itdba = 0;
6818c2ecf20Sopenharmony_ci	}
6828c2ecf20Sopenharmony_ci
6838c2ecf20Sopenharmony_ci	hpa = scb_s->gvrd;
6848c2ecf20Sopenharmony_ci	if (hpa) {
6858c2ecf20Sopenharmony_ci		unpin_guest_page(vcpu->kvm, vsie_page->gvrd_gpa, hpa);
6868c2ecf20Sopenharmony_ci		vsie_page->gvrd_gpa = 0;
6878c2ecf20Sopenharmony_ci		scb_s->gvrd = 0;
6888c2ecf20Sopenharmony_ci	}
6898c2ecf20Sopenharmony_ci
6908c2ecf20Sopenharmony_ci	hpa = scb_s->riccbd;
6918c2ecf20Sopenharmony_ci	if (hpa) {
6928c2ecf20Sopenharmony_ci		unpin_guest_page(vcpu->kvm, vsie_page->riccbd_gpa, hpa);
6938c2ecf20Sopenharmony_ci		vsie_page->riccbd_gpa = 0;
6948c2ecf20Sopenharmony_ci		scb_s->riccbd = 0;
6958c2ecf20Sopenharmony_ci	}
6968c2ecf20Sopenharmony_ci
6978c2ecf20Sopenharmony_ci	hpa = scb_s->sdnxo;
6988c2ecf20Sopenharmony_ci	if (hpa) {
6998c2ecf20Sopenharmony_ci		unpin_guest_page(vcpu->kvm, vsie_page->sdnx_gpa, hpa);
7008c2ecf20Sopenharmony_ci		vsie_page->sdnx_gpa = 0;
7018c2ecf20Sopenharmony_ci		scb_s->sdnxo = 0;
7028c2ecf20Sopenharmony_ci	}
7038c2ecf20Sopenharmony_ci}
7048c2ecf20Sopenharmony_ci
7058c2ecf20Sopenharmony_ci/*
7068c2ecf20Sopenharmony_ci * Instead of shadowing some blocks, we can simply forward them because the
7078c2ecf20Sopenharmony_ci * addresses in the scb are 64 bit long.
7088c2ecf20Sopenharmony_ci *
7098c2ecf20Sopenharmony_ci * This works as long as the data lies in one page. If blocks ever exceed one
7108c2ecf20Sopenharmony_ci * page, we have to fall back to shadowing.
7118c2ecf20Sopenharmony_ci *
7128c2ecf20Sopenharmony_ci * As we reuse the sca, the vcpu pointers contained in it are invalid. We must
7138c2ecf20Sopenharmony_ci * therefore not enable any facilities that access these pointers (e.g. SIGPIF).
7148c2ecf20Sopenharmony_ci *
7158c2ecf20Sopenharmony_ci * Returns: - 0 if all blocks were pinned.
7168c2ecf20Sopenharmony_ci *          - > 0 if control has to be given to guest 2
7178c2ecf20Sopenharmony_ci *          - -ENOMEM if out of memory
7188c2ecf20Sopenharmony_ci */
7198c2ecf20Sopenharmony_cistatic int pin_blocks(struct kvm_vcpu *vcpu, struct vsie_page *vsie_page)
7208c2ecf20Sopenharmony_ci{
7218c2ecf20Sopenharmony_ci	struct kvm_s390_sie_block *scb_o = vsie_page->scb_o;
7228c2ecf20Sopenharmony_ci	struct kvm_s390_sie_block *scb_s = &vsie_page->scb_s;
7238c2ecf20Sopenharmony_ci	hpa_t hpa;
7248c2ecf20Sopenharmony_ci	gpa_t gpa;
7258c2ecf20Sopenharmony_ci	int rc = 0;
7268c2ecf20Sopenharmony_ci
7278c2ecf20Sopenharmony_ci	gpa = READ_ONCE(scb_o->scaol) & ~0xfUL;
7288c2ecf20Sopenharmony_ci	if (test_kvm_cpu_feat(vcpu->kvm, KVM_S390_VM_CPU_FEAT_64BSCAO))
7298c2ecf20Sopenharmony_ci		gpa |= (u64) READ_ONCE(scb_o->scaoh) << 32;
7308c2ecf20Sopenharmony_ci	if (gpa) {
7318c2ecf20Sopenharmony_ci		if (gpa < 2 * PAGE_SIZE)
7328c2ecf20Sopenharmony_ci			rc = set_validity_icpt(scb_s, 0x0038U);
7338c2ecf20Sopenharmony_ci		else if ((gpa & ~0x1fffUL) == kvm_s390_get_prefix(vcpu))
7348c2ecf20Sopenharmony_ci			rc = set_validity_icpt(scb_s, 0x0011U);
7358c2ecf20Sopenharmony_ci		else if ((gpa & PAGE_MASK) !=
7368c2ecf20Sopenharmony_ci			 ((gpa + sizeof(struct bsca_block) - 1) & PAGE_MASK))
7378c2ecf20Sopenharmony_ci			rc = set_validity_icpt(scb_s, 0x003bU);
7388c2ecf20Sopenharmony_ci		if (!rc) {
7398c2ecf20Sopenharmony_ci			rc = pin_guest_page(vcpu->kvm, gpa, &hpa);
7408c2ecf20Sopenharmony_ci			if (rc)
7418c2ecf20Sopenharmony_ci				rc = set_validity_icpt(scb_s, 0x0034U);
7428c2ecf20Sopenharmony_ci		}
7438c2ecf20Sopenharmony_ci		if (rc)
7448c2ecf20Sopenharmony_ci			goto unpin;
7458c2ecf20Sopenharmony_ci		vsie_page->sca_gpa = gpa;
7468c2ecf20Sopenharmony_ci		scb_s->scaoh = (u32)((u64)hpa >> 32);
7478c2ecf20Sopenharmony_ci		scb_s->scaol = (u32)(u64)hpa;
7488c2ecf20Sopenharmony_ci	}
7498c2ecf20Sopenharmony_ci
7508c2ecf20Sopenharmony_ci	gpa = READ_ONCE(scb_o->itdba) & ~0xffUL;
7518c2ecf20Sopenharmony_ci	if (gpa && (scb_s->ecb & ECB_TE)) {
7528c2ecf20Sopenharmony_ci		if (gpa < 2 * PAGE_SIZE) {
7538c2ecf20Sopenharmony_ci			rc = set_validity_icpt(scb_s, 0x0080U);
7548c2ecf20Sopenharmony_ci			goto unpin;
7558c2ecf20Sopenharmony_ci		}
7568c2ecf20Sopenharmony_ci		/* 256 bytes cannot cross page boundaries */
7578c2ecf20Sopenharmony_ci		rc = pin_guest_page(vcpu->kvm, gpa, &hpa);
7588c2ecf20Sopenharmony_ci		if (rc) {
7598c2ecf20Sopenharmony_ci			rc = set_validity_icpt(scb_s, 0x0080U);
7608c2ecf20Sopenharmony_ci			goto unpin;
7618c2ecf20Sopenharmony_ci		}
7628c2ecf20Sopenharmony_ci		vsie_page->itdba_gpa = gpa;
7638c2ecf20Sopenharmony_ci		scb_s->itdba = hpa;
7648c2ecf20Sopenharmony_ci	}
7658c2ecf20Sopenharmony_ci
7668c2ecf20Sopenharmony_ci	gpa = READ_ONCE(scb_o->gvrd) & ~0x1ffUL;
7678c2ecf20Sopenharmony_ci	if (gpa && (scb_s->eca & ECA_VX) && !(scb_s->ecd & ECD_HOSTREGMGMT)) {
7688c2ecf20Sopenharmony_ci		if (gpa < 2 * PAGE_SIZE) {
7698c2ecf20Sopenharmony_ci			rc = set_validity_icpt(scb_s, 0x1310U);
7708c2ecf20Sopenharmony_ci			goto unpin;
7718c2ecf20Sopenharmony_ci		}
7728c2ecf20Sopenharmony_ci		/*
7738c2ecf20Sopenharmony_ci		 * 512 bytes vector registers cannot cross page boundaries
7748c2ecf20Sopenharmony_ci		 * if this block gets bigger, we have to shadow it.
7758c2ecf20Sopenharmony_ci		 */
7768c2ecf20Sopenharmony_ci		rc = pin_guest_page(vcpu->kvm, gpa, &hpa);
7778c2ecf20Sopenharmony_ci		if (rc) {
7788c2ecf20Sopenharmony_ci			rc = set_validity_icpt(scb_s, 0x1310U);
7798c2ecf20Sopenharmony_ci			goto unpin;
7808c2ecf20Sopenharmony_ci		}
7818c2ecf20Sopenharmony_ci		vsie_page->gvrd_gpa = gpa;
7828c2ecf20Sopenharmony_ci		scb_s->gvrd = hpa;
7838c2ecf20Sopenharmony_ci	}
7848c2ecf20Sopenharmony_ci
7858c2ecf20Sopenharmony_ci	gpa = READ_ONCE(scb_o->riccbd) & ~0x3fUL;
7868c2ecf20Sopenharmony_ci	if (gpa && (scb_s->ecb3 & ECB3_RI)) {
7878c2ecf20Sopenharmony_ci		if (gpa < 2 * PAGE_SIZE) {
7888c2ecf20Sopenharmony_ci			rc = set_validity_icpt(scb_s, 0x0043U);
7898c2ecf20Sopenharmony_ci			goto unpin;
7908c2ecf20Sopenharmony_ci		}
7918c2ecf20Sopenharmony_ci		/* 64 bytes cannot cross page boundaries */
7928c2ecf20Sopenharmony_ci		rc = pin_guest_page(vcpu->kvm, gpa, &hpa);
7938c2ecf20Sopenharmony_ci		if (rc) {
7948c2ecf20Sopenharmony_ci			rc = set_validity_icpt(scb_s, 0x0043U);
7958c2ecf20Sopenharmony_ci			goto unpin;
7968c2ecf20Sopenharmony_ci		}
7978c2ecf20Sopenharmony_ci		/* Validity 0x0044 will be checked by SIE */
7988c2ecf20Sopenharmony_ci		vsie_page->riccbd_gpa = gpa;
7998c2ecf20Sopenharmony_ci		scb_s->riccbd = hpa;
8008c2ecf20Sopenharmony_ci	}
8018c2ecf20Sopenharmony_ci	if (((scb_s->ecb & ECB_GS) && !(scb_s->ecd & ECD_HOSTREGMGMT)) ||
8028c2ecf20Sopenharmony_ci	    (scb_s->ecd & ECD_ETOKENF)) {
8038c2ecf20Sopenharmony_ci		unsigned long sdnxc;
8048c2ecf20Sopenharmony_ci
8058c2ecf20Sopenharmony_ci		gpa = READ_ONCE(scb_o->sdnxo) & ~0xfUL;
8068c2ecf20Sopenharmony_ci		sdnxc = READ_ONCE(scb_o->sdnxo) & 0xfUL;
8078c2ecf20Sopenharmony_ci		if (!gpa || gpa < 2 * PAGE_SIZE) {
8088c2ecf20Sopenharmony_ci			rc = set_validity_icpt(scb_s, 0x10b0U);
8098c2ecf20Sopenharmony_ci			goto unpin;
8108c2ecf20Sopenharmony_ci		}
8118c2ecf20Sopenharmony_ci		if (sdnxc < 6 || sdnxc > 12) {
8128c2ecf20Sopenharmony_ci			rc = set_validity_icpt(scb_s, 0x10b1U);
8138c2ecf20Sopenharmony_ci			goto unpin;
8148c2ecf20Sopenharmony_ci		}
8158c2ecf20Sopenharmony_ci		if (gpa & ((1 << sdnxc) - 1)) {
8168c2ecf20Sopenharmony_ci			rc = set_validity_icpt(scb_s, 0x10b2U);
8178c2ecf20Sopenharmony_ci			goto unpin;
8188c2ecf20Sopenharmony_ci		}
8198c2ecf20Sopenharmony_ci		/* Due to alignment rules (checked above) this cannot
8208c2ecf20Sopenharmony_ci		 * cross page boundaries
8218c2ecf20Sopenharmony_ci		 */
8228c2ecf20Sopenharmony_ci		rc = pin_guest_page(vcpu->kvm, gpa, &hpa);
8238c2ecf20Sopenharmony_ci		if (rc) {
8248c2ecf20Sopenharmony_ci			rc = set_validity_icpt(scb_s, 0x10b0U);
8258c2ecf20Sopenharmony_ci			goto unpin;
8268c2ecf20Sopenharmony_ci		}
8278c2ecf20Sopenharmony_ci		vsie_page->sdnx_gpa = gpa;
8288c2ecf20Sopenharmony_ci		scb_s->sdnxo = hpa | sdnxc;
8298c2ecf20Sopenharmony_ci	}
8308c2ecf20Sopenharmony_ci	return 0;
8318c2ecf20Sopenharmony_ciunpin:
8328c2ecf20Sopenharmony_ci	unpin_blocks(vcpu, vsie_page);
8338c2ecf20Sopenharmony_ci	return rc;
8348c2ecf20Sopenharmony_ci}
8358c2ecf20Sopenharmony_ci
8368c2ecf20Sopenharmony_ci/* unpin the scb provided by guest 2, marking it as dirty */
8378c2ecf20Sopenharmony_cistatic void unpin_scb(struct kvm_vcpu *vcpu, struct vsie_page *vsie_page,
8388c2ecf20Sopenharmony_ci		      gpa_t gpa)
8398c2ecf20Sopenharmony_ci{
8408c2ecf20Sopenharmony_ci	hpa_t hpa = (hpa_t) vsie_page->scb_o;
8418c2ecf20Sopenharmony_ci
8428c2ecf20Sopenharmony_ci	if (hpa)
8438c2ecf20Sopenharmony_ci		unpin_guest_page(vcpu->kvm, gpa, hpa);
8448c2ecf20Sopenharmony_ci	vsie_page->scb_o = NULL;
8458c2ecf20Sopenharmony_ci}
8468c2ecf20Sopenharmony_ci
8478c2ecf20Sopenharmony_ci/*
8488c2ecf20Sopenharmony_ci * Pin the scb at gpa provided by guest 2 at vsie_page->scb_o.
8498c2ecf20Sopenharmony_ci *
8508c2ecf20Sopenharmony_ci * Returns: - 0 if the scb was pinned.
8518c2ecf20Sopenharmony_ci *          - > 0 if control has to be given to guest 2
8528c2ecf20Sopenharmony_ci */
8538c2ecf20Sopenharmony_cistatic int pin_scb(struct kvm_vcpu *vcpu, struct vsie_page *vsie_page,
8548c2ecf20Sopenharmony_ci		   gpa_t gpa)
8558c2ecf20Sopenharmony_ci{
8568c2ecf20Sopenharmony_ci	hpa_t hpa;
8578c2ecf20Sopenharmony_ci	int rc;
8588c2ecf20Sopenharmony_ci
8598c2ecf20Sopenharmony_ci	rc = pin_guest_page(vcpu->kvm, gpa, &hpa);
8608c2ecf20Sopenharmony_ci	if (rc) {
8618c2ecf20Sopenharmony_ci		rc = kvm_s390_inject_program_int(vcpu, PGM_ADDRESSING);
8628c2ecf20Sopenharmony_ci		WARN_ON_ONCE(rc);
8638c2ecf20Sopenharmony_ci		return 1;
8648c2ecf20Sopenharmony_ci	}
8658c2ecf20Sopenharmony_ci	vsie_page->scb_o = (struct kvm_s390_sie_block *) hpa;
8668c2ecf20Sopenharmony_ci	return 0;
8678c2ecf20Sopenharmony_ci}
8688c2ecf20Sopenharmony_ci
8698c2ecf20Sopenharmony_ci/*
8708c2ecf20Sopenharmony_ci * Inject a fault into guest 2.
8718c2ecf20Sopenharmony_ci *
8728c2ecf20Sopenharmony_ci * Returns: - > 0 if control has to be given to guest 2
8738c2ecf20Sopenharmony_ci *            < 0 if an error occurred during injection.
8748c2ecf20Sopenharmony_ci */
8758c2ecf20Sopenharmony_cistatic int inject_fault(struct kvm_vcpu *vcpu, __u16 code, __u64 vaddr,
8768c2ecf20Sopenharmony_ci			bool write_flag)
8778c2ecf20Sopenharmony_ci{
8788c2ecf20Sopenharmony_ci	struct kvm_s390_pgm_info pgm = {
8798c2ecf20Sopenharmony_ci		.code = code,
8808c2ecf20Sopenharmony_ci		.trans_exc_code =
8818c2ecf20Sopenharmony_ci			/* 0-51: virtual address */
8828c2ecf20Sopenharmony_ci			(vaddr & 0xfffffffffffff000UL) |
8838c2ecf20Sopenharmony_ci			/* 52-53: store / fetch */
8848c2ecf20Sopenharmony_ci			(((unsigned int) !write_flag) + 1) << 10,
8858c2ecf20Sopenharmony_ci			/* 62-63: asce id (alway primary == 0) */
8868c2ecf20Sopenharmony_ci		.exc_access_id = 0, /* always primary */
8878c2ecf20Sopenharmony_ci		.op_access_id = 0, /* not MVPG */
8888c2ecf20Sopenharmony_ci	};
8898c2ecf20Sopenharmony_ci	int rc;
8908c2ecf20Sopenharmony_ci
8918c2ecf20Sopenharmony_ci	if (code == PGM_PROTECTION)
8928c2ecf20Sopenharmony_ci		pgm.trans_exc_code |= 0x4UL;
8938c2ecf20Sopenharmony_ci
8948c2ecf20Sopenharmony_ci	rc = kvm_s390_inject_prog_irq(vcpu, &pgm);
8958c2ecf20Sopenharmony_ci	return rc ? rc : 1;
8968c2ecf20Sopenharmony_ci}
8978c2ecf20Sopenharmony_ci
8988c2ecf20Sopenharmony_ci/*
8998c2ecf20Sopenharmony_ci * Handle a fault during vsie execution on a gmap shadow.
9008c2ecf20Sopenharmony_ci *
9018c2ecf20Sopenharmony_ci * Returns: - 0 if the fault was resolved
9028c2ecf20Sopenharmony_ci *          - > 0 if control has to be given to guest 2
9038c2ecf20Sopenharmony_ci *          - < 0 if an error occurred
9048c2ecf20Sopenharmony_ci */
9058c2ecf20Sopenharmony_cistatic int handle_fault(struct kvm_vcpu *vcpu, struct vsie_page *vsie_page)
9068c2ecf20Sopenharmony_ci{
9078c2ecf20Sopenharmony_ci	int rc;
9088c2ecf20Sopenharmony_ci
9098c2ecf20Sopenharmony_ci	if (current->thread.gmap_int_code == PGM_PROTECTION)
9108c2ecf20Sopenharmony_ci		/* we can directly forward all protection exceptions */
9118c2ecf20Sopenharmony_ci		return inject_fault(vcpu, PGM_PROTECTION,
9128c2ecf20Sopenharmony_ci				    current->thread.gmap_addr, 1);
9138c2ecf20Sopenharmony_ci
9148c2ecf20Sopenharmony_ci	rc = kvm_s390_shadow_fault(vcpu, vsie_page->gmap,
9158c2ecf20Sopenharmony_ci				   current->thread.gmap_addr, NULL);
9168c2ecf20Sopenharmony_ci	if (rc > 0) {
9178c2ecf20Sopenharmony_ci		rc = inject_fault(vcpu, rc,
9188c2ecf20Sopenharmony_ci				  current->thread.gmap_addr,
9198c2ecf20Sopenharmony_ci				  current->thread.gmap_write_flag);
9208c2ecf20Sopenharmony_ci		if (rc >= 0)
9218c2ecf20Sopenharmony_ci			vsie_page->fault_addr = current->thread.gmap_addr;
9228c2ecf20Sopenharmony_ci	}
9238c2ecf20Sopenharmony_ci	return rc;
9248c2ecf20Sopenharmony_ci}
9258c2ecf20Sopenharmony_ci
9268c2ecf20Sopenharmony_ci/*
9278c2ecf20Sopenharmony_ci * Retry the previous fault that required guest 2 intervention. This avoids
9288c2ecf20Sopenharmony_ci * one superfluous SIE re-entry and direct exit.
9298c2ecf20Sopenharmony_ci *
9308c2ecf20Sopenharmony_ci * Will ignore any errors. The next SIE fault will do proper fault handling.
9318c2ecf20Sopenharmony_ci */
9328c2ecf20Sopenharmony_cistatic void handle_last_fault(struct kvm_vcpu *vcpu,
9338c2ecf20Sopenharmony_ci			      struct vsie_page *vsie_page)
9348c2ecf20Sopenharmony_ci{
9358c2ecf20Sopenharmony_ci	if (vsie_page->fault_addr)
9368c2ecf20Sopenharmony_ci		kvm_s390_shadow_fault(vcpu, vsie_page->gmap,
9378c2ecf20Sopenharmony_ci				      vsie_page->fault_addr, NULL);
9388c2ecf20Sopenharmony_ci	vsie_page->fault_addr = 0;
9398c2ecf20Sopenharmony_ci}
9408c2ecf20Sopenharmony_ci
9418c2ecf20Sopenharmony_cistatic inline void clear_vsie_icpt(struct vsie_page *vsie_page)
9428c2ecf20Sopenharmony_ci{
9438c2ecf20Sopenharmony_ci	vsie_page->scb_s.icptcode = 0;
9448c2ecf20Sopenharmony_ci}
9458c2ecf20Sopenharmony_ci
9468c2ecf20Sopenharmony_ci/* rewind the psw and clear the vsie icpt, so we can retry execution */
9478c2ecf20Sopenharmony_cistatic void retry_vsie_icpt(struct vsie_page *vsie_page)
9488c2ecf20Sopenharmony_ci{
9498c2ecf20Sopenharmony_ci	struct kvm_s390_sie_block *scb_s = &vsie_page->scb_s;
9508c2ecf20Sopenharmony_ci	int ilen = insn_length(scb_s->ipa >> 8);
9518c2ecf20Sopenharmony_ci
9528c2ecf20Sopenharmony_ci	/* take care of EXECUTE instructions */
9538c2ecf20Sopenharmony_ci	if (scb_s->icptstatus & 1) {
9548c2ecf20Sopenharmony_ci		ilen = (scb_s->icptstatus >> 4) & 0x6;
9558c2ecf20Sopenharmony_ci		if (!ilen)
9568c2ecf20Sopenharmony_ci			ilen = 4;
9578c2ecf20Sopenharmony_ci	}
9588c2ecf20Sopenharmony_ci	scb_s->gpsw.addr = __rewind_psw(scb_s->gpsw, ilen);
9598c2ecf20Sopenharmony_ci	clear_vsie_icpt(vsie_page);
9608c2ecf20Sopenharmony_ci}
9618c2ecf20Sopenharmony_ci
9628c2ecf20Sopenharmony_ci/*
9638c2ecf20Sopenharmony_ci * Try to shadow + enable the guest 2 provided facility list.
9648c2ecf20Sopenharmony_ci * Retry instruction execution if enabled for and provided by guest 2.
9658c2ecf20Sopenharmony_ci *
9668c2ecf20Sopenharmony_ci * Returns: - 0 if handled (retry or guest 2 icpt)
9678c2ecf20Sopenharmony_ci *          - > 0 if control has to be given to guest 2
9688c2ecf20Sopenharmony_ci */
9698c2ecf20Sopenharmony_cistatic int handle_stfle(struct kvm_vcpu *vcpu, struct vsie_page *vsie_page)
9708c2ecf20Sopenharmony_ci{
9718c2ecf20Sopenharmony_ci	struct kvm_s390_sie_block *scb_s = &vsie_page->scb_s;
9728c2ecf20Sopenharmony_ci	__u32 fac = READ_ONCE(vsie_page->scb_o->fac) & 0x7ffffff8U;
9738c2ecf20Sopenharmony_ci
9748c2ecf20Sopenharmony_ci	if (fac && test_kvm_facility(vcpu->kvm, 7)) {
9758c2ecf20Sopenharmony_ci		retry_vsie_icpt(vsie_page);
9768c2ecf20Sopenharmony_ci		if (read_guest_real(vcpu, fac, &vsie_page->fac,
9778c2ecf20Sopenharmony_ci				    sizeof(vsie_page->fac)))
9788c2ecf20Sopenharmony_ci			return set_validity_icpt(scb_s, 0x1090U);
9798c2ecf20Sopenharmony_ci		scb_s->fac = (__u32)(__u64) &vsie_page->fac;
9808c2ecf20Sopenharmony_ci	}
9818c2ecf20Sopenharmony_ci	return 0;
9828c2ecf20Sopenharmony_ci}
9838c2ecf20Sopenharmony_ci
9848c2ecf20Sopenharmony_ci/*
9858c2ecf20Sopenharmony_ci * Get a register for a nested guest.
9868c2ecf20Sopenharmony_ci * @vcpu the vcpu of the guest
9878c2ecf20Sopenharmony_ci * @vsie_page the vsie_page for the nested guest
9888c2ecf20Sopenharmony_ci * @reg the register number, the upper 4 bits are ignored.
9898c2ecf20Sopenharmony_ci * returns: the value of the register.
9908c2ecf20Sopenharmony_ci */
9918c2ecf20Sopenharmony_cistatic u64 vsie_get_register(struct kvm_vcpu *vcpu, struct vsie_page *vsie_page, u8 reg)
9928c2ecf20Sopenharmony_ci{
9938c2ecf20Sopenharmony_ci	/* no need to validate the parameter and/or perform error handling */
9948c2ecf20Sopenharmony_ci	reg &= 0xf;
9958c2ecf20Sopenharmony_ci	switch (reg) {
9968c2ecf20Sopenharmony_ci	case 15:
9978c2ecf20Sopenharmony_ci		return vsie_page->scb_s.gg15;
9988c2ecf20Sopenharmony_ci	case 14:
9998c2ecf20Sopenharmony_ci		return vsie_page->scb_s.gg14;
10008c2ecf20Sopenharmony_ci	default:
10018c2ecf20Sopenharmony_ci		return vcpu->run->s.regs.gprs[reg];
10028c2ecf20Sopenharmony_ci	}
10038c2ecf20Sopenharmony_ci}
10048c2ecf20Sopenharmony_ci
10058c2ecf20Sopenharmony_cistatic int vsie_handle_mvpg(struct kvm_vcpu *vcpu, struct vsie_page *vsie_page)
10068c2ecf20Sopenharmony_ci{
10078c2ecf20Sopenharmony_ci	struct kvm_s390_sie_block *scb_s = &vsie_page->scb_s;
10088c2ecf20Sopenharmony_ci	unsigned long pei_dest, pei_src, src, dest, mask, prefix;
10098c2ecf20Sopenharmony_ci	u64 *pei_block = &vsie_page->scb_o->mcic;
10108c2ecf20Sopenharmony_ci	int edat, rc_dest, rc_src;
10118c2ecf20Sopenharmony_ci	union ctlreg0 cr0;
10128c2ecf20Sopenharmony_ci
10138c2ecf20Sopenharmony_ci	cr0.val = vcpu->arch.sie_block->gcr[0];
10148c2ecf20Sopenharmony_ci	edat = cr0.edat && test_kvm_facility(vcpu->kvm, 8);
10158c2ecf20Sopenharmony_ci	mask = _kvm_s390_logical_to_effective(&scb_s->gpsw, PAGE_MASK);
10168c2ecf20Sopenharmony_ci	prefix = scb_s->prefix << GUEST_PREFIX_SHIFT;
10178c2ecf20Sopenharmony_ci
10188c2ecf20Sopenharmony_ci	dest = vsie_get_register(vcpu, vsie_page, scb_s->ipb >> 20) & mask;
10198c2ecf20Sopenharmony_ci	dest = _kvm_s390_real_to_abs(prefix, dest) + scb_s->mso;
10208c2ecf20Sopenharmony_ci	src = vsie_get_register(vcpu, vsie_page, scb_s->ipb >> 16) & mask;
10218c2ecf20Sopenharmony_ci	src = _kvm_s390_real_to_abs(prefix, src) + scb_s->mso;
10228c2ecf20Sopenharmony_ci
10238c2ecf20Sopenharmony_ci	rc_dest = kvm_s390_shadow_fault(vcpu, vsie_page->gmap, dest, &pei_dest);
10248c2ecf20Sopenharmony_ci	rc_src = kvm_s390_shadow_fault(vcpu, vsie_page->gmap, src, &pei_src);
10258c2ecf20Sopenharmony_ci	/*
10268c2ecf20Sopenharmony_ci	 * Either everything went well, or something non-critical went wrong
10278c2ecf20Sopenharmony_ci	 * e.g. because of a race. In either case, simply retry.
10288c2ecf20Sopenharmony_ci	 */
10298c2ecf20Sopenharmony_ci	if (rc_dest == -EAGAIN || rc_src == -EAGAIN || (!rc_dest && !rc_src)) {
10308c2ecf20Sopenharmony_ci		retry_vsie_icpt(vsie_page);
10318c2ecf20Sopenharmony_ci		return -EAGAIN;
10328c2ecf20Sopenharmony_ci	}
10338c2ecf20Sopenharmony_ci	/* Something more serious went wrong, propagate the error */
10348c2ecf20Sopenharmony_ci	if (rc_dest < 0)
10358c2ecf20Sopenharmony_ci		return rc_dest;
10368c2ecf20Sopenharmony_ci	if (rc_src < 0)
10378c2ecf20Sopenharmony_ci		return rc_src;
10388c2ecf20Sopenharmony_ci
10398c2ecf20Sopenharmony_ci	/* The only possible suppressing exception: just deliver it */
10408c2ecf20Sopenharmony_ci	if (rc_dest == PGM_TRANSLATION_SPEC || rc_src == PGM_TRANSLATION_SPEC) {
10418c2ecf20Sopenharmony_ci		clear_vsie_icpt(vsie_page);
10428c2ecf20Sopenharmony_ci		rc_dest = kvm_s390_inject_program_int(vcpu, PGM_TRANSLATION_SPEC);
10438c2ecf20Sopenharmony_ci		WARN_ON_ONCE(rc_dest);
10448c2ecf20Sopenharmony_ci		return 1;
10458c2ecf20Sopenharmony_ci	}
10468c2ecf20Sopenharmony_ci
10478c2ecf20Sopenharmony_ci	/*
10488c2ecf20Sopenharmony_ci	 * Forward the PEI intercept to the guest if it was a page fault, or
10498c2ecf20Sopenharmony_ci	 * also for segment and region table faults if EDAT applies.
10508c2ecf20Sopenharmony_ci	 */
10518c2ecf20Sopenharmony_ci	if (edat) {
10528c2ecf20Sopenharmony_ci		rc_dest = rc_dest == PGM_ASCE_TYPE ? rc_dest : 0;
10538c2ecf20Sopenharmony_ci		rc_src = rc_src == PGM_ASCE_TYPE ? rc_src : 0;
10548c2ecf20Sopenharmony_ci	} else {
10558c2ecf20Sopenharmony_ci		rc_dest = rc_dest != PGM_PAGE_TRANSLATION ? rc_dest : 0;
10568c2ecf20Sopenharmony_ci		rc_src = rc_src != PGM_PAGE_TRANSLATION ? rc_src : 0;
10578c2ecf20Sopenharmony_ci	}
10588c2ecf20Sopenharmony_ci	if (!rc_dest && !rc_src) {
10598c2ecf20Sopenharmony_ci		pei_block[0] = pei_dest;
10608c2ecf20Sopenharmony_ci		pei_block[1] = pei_src;
10618c2ecf20Sopenharmony_ci		return 1;
10628c2ecf20Sopenharmony_ci	}
10638c2ecf20Sopenharmony_ci
10648c2ecf20Sopenharmony_ci	retry_vsie_icpt(vsie_page);
10658c2ecf20Sopenharmony_ci
10668c2ecf20Sopenharmony_ci	/*
10678c2ecf20Sopenharmony_ci	 * The host has edat, and the guest does not, or it was an ASCE type
10688c2ecf20Sopenharmony_ci	 * exception. The host needs to inject the appropriate DAT interrupts
10698c2ecf20Sopenharmony_ci	 * into the guest.
10708c2ecf20Sopenharmony_ci	 */
10718c2ecf20Sopenharmony_ci	if (rc_dest)
10728c2ecf20Sopenharmony_ci		return inject_fault(vcpu, rc_dest, dest, 1);
10738c2ecf20Sopenharmony_ci	return inject_fault(vcpu, rc_src, src, 0);
10748c2ecf20Sopenharmony_ci}
10758c2ecf20Sopenharmony_ci
10768c2ecf20Sopenharmony_ci/*
10778c2ecf20Sopenharmony_ci * Run the vsie on a shadow scb and a shadow gmap, without any further
10788c2ecf20Sopenharmony_ci * sanity checks, handling SIE faults.
10798c2ecf20Sopenharmony_ci *
10808c2ecf20Sopenharmony_ci * Returns: - 0 everything went fine
10818c2ecf20Sopenharmony_ci *          - > 0 if control has to be given to guest 2
10828c2ecf20Sopenharmony_ci *          - < 0 if an error occurred
10838c2ecf20Sopenharmony_ci */
10848c2ecf20Sopenharmony_cistatic int do_vsie_run(struct kvm_vcpu *vcpu, struct vsie_page *vsie_page)
10858c2ecf20Sopenharmony_ci	__releases(vcpu->kvm->srcu)
10868c2ecf20Sopenharmony_ci	__acquires(vcpu->kvm->srcu)
10878c2ecf20Sopenharmony_ci{
10888c2ecf20Sopenharmony_ci	struct kvm_s390_sie_block *scb_s = &vsie_page->scb_s;
10898c2ecf20Sopenharmony_ci	struct kvm_s390_sie_block *scb_o = vsie_page->scb_o;
10908c2ecf20Sopenharmony_ci	int guest_bp_isolation;
10918c2ecf20Sopenharmony_ci	int rc = 0;
10928c2ecf20Sopenharmony_ci
10938c2ecf20Sopenharmony_ci	handle_last_fault(vcpu, vsie_page);
10948c2ecf20Sopenharmony_ci
10958c2ecf20Sopenharmony_ci	srcu_read_unlock(&vcpu->kvm->srcu, vcpu->srcu_idx);
10968c2ecf20Sopenharmony_ci
10978c2ecf20Sopenharmony_ci	/* save current guest state of bp isolation override */
10988c2ecf20Sopenharmony_ci	guest_bp_isolation = test_thread_flag(TIF_ISOLATE_BP_GUEST);
10998c2ecf20Sopenharmony_ci
11008c2ecf20Sopenharmony_ci	/*
11018c2ecf20Sopenharmony_ci	 * The guest is running with BPBC, so we have to force it on for our
11028c2ecf20Sopenharmony_ci	 * nested guest. This is done by enabling BPBC globally, so the BPBC
11038c2ecf20Sopenharmony_ci	 * control in the SCB (which the nested guest can modify) is simply
11048c2ecf20Sopenharmony_ci	 * ignored.
11058c2ecf20Sopenharmony_ci	 */
11068c2ecf20Sopenharmony_ci	if (test_kvm_facility(vcpu->kvm, 82) &&
11078c2ecf20Sopenharmony_ci	    vcpu->arch.sie_block->fpf & FPF_BPBC)
11088c2ecf20Sopenharmony_ci		set_thread_flag(TIF_ISOLATE_BP_GUEST);
11098c2ecf20Sopenharmony_ci
11108c2ecf20Sopenharmony_ci	local_irq_disable();
11118c2ecf20Sopenharmony_ci	guest_enter_irqoff();
11128c2ecf20Sopenharmony_ci	local_irq_enable();
11138c2ecf20Sopenharmony_ci
11148c2ecf20Sopenharmony_ci	/*
11158c2ecf20Sopenharmony_ci	 * Simulate a SIE entry of the VCPU (see sie64a), so VCPU blocking
11168c2ecf20Sopenharmony_ci	 * and VCPU requests also hinder the vSIE from running and lead
11178c2ecf20Sopenharmony_ci	 * to an immediate exit. kvm_s390_vsie_kick() has to be used to
11188c2ecf20Sopenharmony_ci	 * also kick the vSIE.
11198c2ecf20Sopenharmony_ci	 */
11208c2ecf20Sopenharmony_ci	vcpu->arch.sie_block->prog0c |= PROG_IN_SIE;
11218c2ecf20Sopenharmony_ci	barrier();
11228c2ecf20Sopenharmony_ci	if (!kvm_s390_vcpu_sie_inhibited(vcpu))
11238c2ecf20Sopenharmony_ci		rc = sie64a(scb_s, vcpu->run->s.regs.gprs);
11248c2ecf20Sopenharmony_ci	barrier();
11258c2ecf20Sopenharmony_ci	vcpu->arch.sie_block->prog0c &= ~PROG_IN_SIE;
11268c2ecf20Sopenharmony_ci
11278c2ecf20Sopenharmony_ci	local_irq_disable();
11288c2ecf20Sopenharmony_ci	guest_exit_irqoff();
11298c2ecf20Sopenharmony_ci	local_irq_enable();
11308c2ecf20Sopenharmony_ci
11318c2ecf20Sopenharmony_ci	/* restore guest state for bp isolation override */
11328c2ecf20Sopenharmony_ci	if (!guest_bp_isolation)
11338c2ecf20Sopenharmony_ci		clear_thread_flag(TIF_ISOLATE_BP_GUEST);
11348c2ecf20Sopenharmony_ci
11358c2ecf20Sopenharmony_ci	vcpu->srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
11368c2ecf20Sopenharmony_ci
11378c2ecf20Sopenharmony_ci	if (rc == -EINTR) {
11388c2ecf20Sopenharmony_ci		VCPU_EVENT(vcpu, 3, "%s", "machine check");
11398c2ecf20Sopenharmony_ci		kvm_s390_reinject_machine_check(vcpu, &vsie_page->mcck_info);
11408c2ecf20Sopenharmony_ci		return 0;
11418c2ecf20Sopenharmony_ci	}
11428c2ecf20Sopenharmony_ci
11438c2ecf20Sopenharmony_ci	if (rc > 0)
11448c2ecf20Sopenharmony_ci		rc = 0; /* we could still have an icpt */
11458c2ecf20Sopenharmony_ci	else if (rc == -EFAULT)
11468c2ecf20Sopenharmony_ci		return handle_fault(vcpu, vsie_page);
11478c2ecf20Sopenharmony_ci
11488c2ecf20Sopenharmony_ci	switch (scb_s->icptcode) {
11498c2ecf20Sopenharmony_ci	case ICPT_INST:
11508c2ecf20Sopenharmony_ci		if (scb_s->ipa == 0xb2b0)
11518c2ecf20Sopenharmony_ci			rc = handle_stfle(vcpu, vsie_page);
11528c2ecf20Sopenharmony_ci		break;
11538c2ecf20Sopenharmony_ci	case ICPT_STOP:
11548c2ecf20Sopenharmony_ci		/* stop not requested by g2 - must have been a kick */
11558c2ecf20Sopenharmony_ci		if (!(atomic_read(&scb_o->cpuflags) & CPUSTAT_STOP_INT))
11568c2ecf20Sopenharmony_ci			clear_vsie_icpt(vsie_page);
11578c2ecf20Sopenharmony_ci		break;
11588c2ecf20Sopenharmony_ci	case ICPT_VALIDITY:
11598c2ecf20Sopenharmony_ci		if ((scb_s->ipa & 0xf000) != 0xf000)
11608c2ecf20Sopenharmony_ci			scb_s->ipa += 0x1000;
11618c2ecf20Sopenharmony_ci		break;
11628c2ecf20Sopenharmony_ci	case ICPT_PARTEXEC:
11638c2ecf20Sopenharmony_ci		if (scb_s->ipa == 0xb254)
11648c2ecf20Sopenharmony_ci			rc = vsie_handle_mvpg(vcpu, vsie_page);
11658c2ecf20Sopenharmony_ci		break;
11668c2ecf20Sopenharmony_ci	}
11678c2ecf20Sopenharmony_ci	return rc;
11688c2ecf20Sopenharmony_ci}
11698c2ecf20Sopenharmony_ci
11708c2ecf20Sopenharmony_cistatic void release_gmap_shadow(struct vsie_page *vsie_page)
11718c2ecf20Sopenharmony_ci{
11728c2ecf20Sopenharmony_ci	if (vsie_page->gmap)
11738c2ecf20Sopenharmony_ci		gmap_put(vsie_page->gmap);
11748c2ecf20Sopenharmony_ci	WRITE_ONCE(vsie_page->gmap, NULL);
11758c2ecf20Sopenharmony_ci	prefix_unmapped(vsie_page);
11768c2ecf20Sopenharmony_ci}
11778c2ecf20Sopenharmony_ci
11788c2ecf20Sopenharmony_cistatic int acquire_gmap_shadow(struct kvm_vcpu *vcpu,
11798c2ecf20Sopenharmony_ci			       struct vsie_page *vsie_page)
11808c2ecf20Sopenharmony_ci{
11818c2ecf20Sopenharmony_ci	unsigned long asce;
11828c2ecf20Sopenharmony_ci	union ctlreg0 cr0;
11838c2ecf20Sopenharmony_ci	struct gmap *gmap;
11848c2ecf20Sopenharmony_ci	int edat;
11858c2ecf20Sopenharmony_ci
11868c2ecf20Sopenharmony_ci	asce = vcpu->arch.sie_block->gcr[1];
11878c2ecf20Sopenharmony_ci	cr0.val = vcpu->arch.sie_block->gcr[0];
11888c2ecf20Sopenharmony_ci	edat = cr0.edat && test_kvm_facility(vcpu->kvm, 8);
11898c2ecf20Sopenharmony_ci	edat += edat && test_kvm_facility(vcpu->kvm, 78);
11908c2ecf20Sopenharmony_ci
11918c2ecf20Sopenharmony_ci	/*
11928c2ecf20Sopenharmony_ci	 * ASCE or EDAT could have changed since last icpt, or the gmap
11938c2ecf20Sopenharmony_ci	 * we're holding has been unshadowed. If the gmap is still valid,
11948c2ecf20Sopenharmony_ci	 * we can safely reuse it.
11958c2ecf20Sopenharmony_ci	 */
11968c2ecf20Sopenharmony_ci	if (vsie_page->gmap && gmap_shadow_valid(vsie_page->gmap, asce, edat))
11978c2ecf20Sopenharmony_ci		return 0;
11988c2ecf20Sopenharmony_ci
11998c2ecf20Sopenharmony_ci	/* release the old shadow - if any, and mark the prefix as unmapped */
12008c2ecf20Sopenharmony_ci	release_gmap_shadow(vsie_page);
12018c2ecf20Sopenharmony_ci	gmap = gmap_shadow(vcpu->arch.gmap, asce, edat);
12028c2ecf20Sopenharmony_ci	if (IS_ERR(gmap))
12038c2ecf20Sopenharmony_ci		return PTR_ERR(gmap);
12048c2ecf20Sopenharmony_ci	gmap->private = vcpu->kvm;
12058c2ecf20Sopenharmony_ci	WRITE_ONCE(vsie_page->gmap, gmap);
12068c2ecf20Sopenharmony_ci	return 0;
12078c2ecf20Sopenharmony_ci}
12088c2ecf20Sopenharmony_ci
12098c2ecf20Sopenharmony_ci/*
12108c2ecf20Sopenharmony_ci * Register the shadow scb at the VCPU, e.g. for kicking out of vsie.
12118c2ecf20Sopenharmony_ci */
12128c2ecf20Sopenharmony_cistatic void register_shadow_scb(struct kvm_vcpu *vcpu,
12138c2ecf20Sopenharmony_ci				struct vsie_page *vsie_page)
12148c2ecf20Sopenharmony_ci{
12158c2ecf20Sopenharmony_ci	struct kvm_s390_sie_block *scb_s = &vsie_page->scb_s;
12168c2ecf20Sopenharmony_ci
12178c2ecf20Sopenharmony_ci	WRITE_ONCE(vcpu->arch.vsie_block, &vsie_page->scb_s);
12188c2ecf20Sopenharmony_ci	/*
12198c2ecf20Sopenharmony_ci	 * External calls have to lead to a kick of the vcpu and
12208c2ecf20Sopenharmony_ci	 * therefore the vsie -> Simulate Wait state.
12218c2ecf20Sopenharmony_ci	 */
12228c2ecf20Sopenharmony_ci	kvm_s390_set_cpuflags(vcpu, CPUSTAT_WAIT);
12238c2ecf20Sopenharmony_ci	/*
12248c2ecf20Sopenharmony_ci	 * We have to adjust the g3 epoch by the g2 epoch. The epoch will
12258c2ecf20Sopenharmony_ci	 * automatically be adjusted on tod clock changes via kvm_sync_clock.
12268c2ecf20Sopenharmony_ci	 */
12278c2ecf20Sopenharmony_ci	preempt_disable();
12288c2ecf20Sopenharmony_ci	scb_s->epoch += vcpu->kvm->arch.epoch;
12298c2ecf20Sopenharmony_ci
12308c2ecf20Sopenharmony_ci	if (scb_s->ecd & ECD_MEF) {
12318c2ecf20Sopenharmony_ci		scb_s->epdx += vcpu->kvm->arch.epdx;
12328c2ecf20Sopenharmony_ci		if (scb_s->epoch < vcpu->kvm->arch.epoch)
12338c2ecf20Sopenharmony_ci			scb_s->epdx += 1;
12348c2ecf20Sopenharmony_ci	}
12358c2ecf20Sopenharmony_ci
12368c2ecf20Sopenharmony_ci	preempt_enable();
12378c2ecf20Sopenharmony_ci}
12388c2ecf20Sopenharmony_ci
12398c2ecf20Sopenharmony_ci/*
12408c2ecf20Sopenharmony_ci * Unregister a shadow scb from a VCPU.
12418c2ecf20Sopenharmony_ci */
12428c2ecf20Sopenharmony_cistatic void unregister_shadow_scb(struct kvm_vcpu *vcpu)
12438c2ecf20Sopenharmony_ci{
12448c2ecf20Sopenharmony_ci	kvm_s390_clear_cpuflags(vcpu, CPUSTAT_WAIT);
12458c2ecf20Sopenharmony_ci	WRITE_ONCE(vcpu->arch.vsie_block, NULL);
12468c2ecf20Sopenharmony_ci}
12478c2ecf20Sopenharmony_ci
12488c2ecf20Sopenharmony_ci/*
12498c2ecf20Sopenharmony_ci * Run the vsie on a shadowed scb, managing the gmap shadow, handling
12508c2ecf20Sopenharmony_ci * prefix pages and faults.
12518c2ecf20Sopenharmony_ci *
12528c2ecf20Sopenharmony_ci * Returns: - 0 if no errors occurred
12538c2ecf20Sopenharmony_ci *          - > 0 if control has to be given to guest 2
12548c2ecf20Sopenharmony_ci *          - -ENOMEM if out of memory
12558c2ecf20Sopenharmony_ci */
12568c2ecf20Sopenharmony_cistatic int vsie_run(struct kvm_vcpu *vcpu, struct vsie_page *vsie_page)
12578c2ecf20Sopenharmony_ci{
12588c2ecf20Sopenharmony_ci	struct kvm_s390_sie_block *scb_s = &vsie_page->scb_s;
12598c2ecf20Sopenharmony_ci	int rc = 0;
12608c2ecf20Sopenharmony_ci
12618c2ecf20Sopenharmony_ci	while (1) {
12628c2ecf20Sopenharmony_ci		rc = acquire_gmap_shadow(vcpu, vsie_page);
12638c2ecf20Sopenharmony_ci		if (!rc)
12648c2ecf20Sopenharmony_ci			rc = map_prefix(vcpu, vsie_page);
12658c2ecf20Sopenharmony_ci		if (!rc) {
12668c2ecf20Sopenharmony_ci			gmap_enable(vsie_page->gmap);
12678c2ecf20Sopenharmony_ci			update_intervention_requests(vsie_page);
12688c2ecf20Sopenharmony_ci			rc = do_vsie_run(vcpu, vsie_page);
12698c2ecf20Sopenharmony_ci			gmap_enable(vcpu->arch.gmap);
12708c2ecf20Sopenharmony_ci		}
12718c2ecf20Sopenharmony_ci		atomic_andnot(PROG_BLOCK_SIE, &scb_s->prog20);
12728c2ecf20Sopenharmony_ci
12738c2ecf20Sopenharmony_ci		if (rc == -EAGAIN)
12748c2ecf20Sopenharmony_ci			rc = 0;
12758c2ecf20Sopenharmony_ci		if (rc || scb_s->icptcode || signal_pending(current) ||
12768c2ecf20Sopenharmony_ci		    kvm_s390_vcpu_has_irq(vcpu, 0) ||
12778c2ecf20Sopenharmony_ci		    kvm_s390_vcpu_sie_inhibited(vcpu))
12788c2ecf20Sopenharmony_ci			break;
12798c2ecf20Sopenharmony_ci		cond_resched();
12808c2ecf20Sopenharmony_ci	}
12818c2ecf20Sopenharmony_ci
12828c2ecf20Sopenharmony_ci	if (rc == -EFAULT) {
12838c2ecf20Sopenharmony_ci		/*
12848c2ecf20Sopenharmony_ci		 * Addressing exceptions are always presentes as intercepts.
12858c2ecf20Sopenharmony_ci		 * As addressing exceptions are suppressing and our guest 3 PSW
12868c2ecf20Sopenharmony_ci		 * points at the responsible instruction, we have to
12878c2ecf20Sopenharmony_ci		 * forward the PSW and set the ilc. If we can't read guest 3
12888c2ecf20Sopenharmony_ci		 * instruction, we can use an arbitrary ilc. Let's always use
12898c2ecf20Sopenharmony_ci		 * ilen = 4 for now, so we can avoid reading in guest 3 virtual
12908c2ecf20Sopenharmony_ci		 * memory. (we could also fake the shadow so the hardware
12918c2ecf20Sopenharmony_ci		 * handles it).
12928c2ecf20Sopenharmony_ci		 */
12938c2ecf20Sopenharmony_ci		scb_s->icptcode = ICPT_PROGI;
12948c2ecf20Sopenharmony_ci		scb_s->iprcc = PGM_ADDRESSING;
12958c2ecf20Sopenharmony_ci		scb_s->pgmilc = 4;
12968c2ecf20Sopenharmony_ci		scb_s->gpsw.addr = __rewind_psw(scb_s->gpsw, 4);
12978c2ecf20Sopenharmony_ci		rc = 1;
12988c2ecf20Sopenharmony_ci	}
12998c2ecf20Sopenharmony_ci	return rc;
13008c2ecf20Sopenharmony_ci}
13018c2ecf20Sopenharmony_ci
13028c2ecf20Sopenharmony_ci/*
13038c2ecf20Sopenharmony_ci * Get or create a vsie page for a scb address.
13048c2ecf20Sopenharmony_ci *
13058c2ecf20Sopenharmony_ci * Returns: - address of a vsie page (cached or new one)
13068c2ecf20Sopenharmony_ci *          - NULL if the same scb address is already used by another VCPU
13078c2ecf20Sopenharmony_ci *          - ERR_PTR(-ENOMEM) if out of memory
13088c2ecf20Sopenharmony_ci */
13098c2ecf20Sopenharmony_cistatic struct vsie_page *get_vsie_page(struct kvm *kvm, unsigned long addr)
13108c2ecf20Sopenharmony_ci{
13118c2ecf20Sopenharmony_ci	struct vsie_page *vsie_page;
13128c2ecf20Sopenharmony_ci	struct page *page;
13138c2ecf20Sopenharmony_ci	int nr_vcpus;
13148c2ecf20Sopenharmony_ci
13158c2ecf20Sopenharmony_ci	rcu_read_lock();
13168c2ecf20Sopenharmony_ci	page = radix_tree_lookup(&kvm->arch.vsie.addr_to_page, addr >> 9);
13178c2ecf20Sopenharmony_ci	rcu_read_unlock();
13188c2ecf20Sopenharmony_ci	if (page) {
13198c2ecf20Sopenharmony_ci		if (page_ref_inc_return(page) == 2)
13208c2ecf20Sopenharmony_ci			return page_to_virt(page);
13218c2ecf20Sopenharmony_ci		page_ref_dec(page);
13228c2ecf20Sopenharmony_ci	}
13238c2ecf20Sopenharmony_ci
13248c2ecf20Sopenharmony_ci	/*
13258c2ecf20Sopenharmony_ci	 * We want at least #online_vcpus shadows, so every VCPU can execute
13268c2ecf20Sopenharmony_ci	 * the VSIE in parallel.
13278c2ecf20Sopenharmony_ci	 */
13288c2ecf20Sopenharmony_ci	nr_vcpus = atomic_read(&kvm->online_vcpus);
13298c2ecf20Sopenharmony_ci
13308c2ecf20Sopenharmony_ci	mutex_lock(&kvm->arch.vsie.mutex);
13318c2ecf20Sopenharmony_ci	if (kvm->arch.vsie.page_count < nr_vcpus) {
13328c2ecf20Sopenharmony_ci		page = alloc_page(GFP_KERNEL | __GFP_ZERO | GFP_DMA);
13338c2ecf20Sopenharmony_ci		if (!page) {
13348c2ecf20Sopenharmony_ci			mutex_unlock(&kvm->arch.vsie.mutex);
13358c2ecf20Sopenharmony_ci			return ERR_PTR(-ENOMEM);
13368c2ecf20Sopenharmony_ci		}
13378c2ecf20Sopenharmony_ci		page_ref_inc(page);
13388c2ecf20Sopenharmony_ci		kvm->arch.vsie.pages[kvm->arch.vsie.page_count] = page;
13398c2ecf20Sopenharmony_ci		kvm->arch.vsie.page_count++;
13408c2ecf20Sopenharmony_ci	} else {
13418c2ecf20Sopenharmony_ci		/* reuse an existing entry that belongs to nobody */
13428c2ecf20Sopenharmony_ci		while (true) {
13438c2ecf20Sopenharmony_ci			page = kvm->arch.vsie.pages[kvm->arch.vsie.next];
13448c2ecf20Sopenharmony_ci			if (page_ref_inc_return(page) == 2)
13458c2ecf20Sopenharmony_ci				break;
13468c2ecf20Sopenharmony_ci			page_ref_dec(page);
13478c2ecf20Sopenharmony_ci			kvm->arch.vsie.next++;
13488c2ecf20Sopenharmony_ci			kvm->arch.vsie.next %= nr_vcpus;
13498c2ecf20Sopenharmony_ci		}
13508c2ecf20Sopenharmony_ci		radix_tree_delete(&kvm->arch.vsie.addr_to_page, page->index >> 9);
13518c2ecf20Sopenharmony_ci	}
13528c2ecf20Sopenharmony_ci	page->index = addr;
13538c2ecf20Sopenharmony_ci	/* double use of the same address */
13548c2ecf20Sopenharmony_ci	if (radix_tree_insert(&kvm->arch.vsie.addr_to_page, addr >> 9, page)) {
13558c2ecf20Sopenharmony_ci		page_ref_dec(page);
13568c2ecf20Sopenharmony_ci		mutex_unlock(&kvm->arch.vsie.mutex);
13578c2ecf20Sopenharmony_ci		return NULL;
13588c2ecf20Sopenharmony_ci	}
13598c2ecf20Sopenharmony_ci	mutex_unlock(&kvm->arch.vsie.mutex);
13608c2ecf20Sopenharmony_ci
13618c2ecf20Sopenharmony_ci	vsie_page = page_to_virt(page);
13628c2ecf20Sopenharmony_ci	memset(&vsie_page->scb_s, 0, sizeof(struct kvm_s390_sie_block));
13638c2ecf20Sopenharmony_ci	release_gmap_shadow(vsie_page);
13648c2ecf20Sopenharmony_ci	vsie_page->fault_addr = 0;
13658c2ecf20Sopenharmony_ci	vsie_page->scb_s.ihcpu = 0xffffU;
13668c2ecf20Sopenharmony_ci	return vsie_page;
13678c2ecf20Sopenharmony_ci}
13688c2ecf20Sopenharmony_ci
13698c2ecf20Sopenharmony_ci/* put a vsie page acquired via get_vsie_page */
13708c2ecf20Sopenharmony_cistatic void put_vsie_page(struct kvm *kvm, struct vsie_page *vsie_page)
13718c2ecf20Sopenharmony_ci{
13728c2ecf20Sopenharmony_ci	struct page *page = pfn_to_page(__pa(vsie_page) >> PAGE_SHIFT);
13738c2ecf20Sopenharmony_ci
13748c2ecf20Sopenharmony_ci	page_ref_dec(page);
13758c2ecf20Sopenharmony_ci}
13768c2ecf20Sopenharmony_ci
13778c2ecf20Sopenharmony_ciint kvm_s390_handle_vsie(struct kvm_vcpu *vcpu)
13788c2ecf20Sopenharmony_ci{
13798c2ecf20Sopenharmony_ci	struct vsie_page *vsie_page;
13808c2ecf20Sopenharmony_ci	unsigned long scb_addr;
13818c2ecf20Sopenharmony_ci	int rc;
13828c2ecf20Sopenharmony_ci
13838c2ecf20Sopenharmony_ci	vcpu->stat.instruction_sie++;
13848c2ecf20Sopenharmony_ci	if (!test_kvm_cpu_feat(vcpu->kvm, KVM_S390_VM_CPU_FEAT_SIEF2))
13858c2ecf20Sopenharmony_ci		return -EOPNOTSUPP;
13868c2ecf20Sopenharmony_ci	if (vcpu->arch.sie_block->gpsw.mask & PSW_MASK_PSTATE)
13878c2ecf20Sopenharmony_ci		return kvm_s390_inject_program_int(vcpu, PGM_PRIVILEGED_OP);
13888c2ecf20Sopenharmony_ci
13898c2ecf20Sopenharmony_ci	BUILD_BUG_ON(sizeof(struct vsie_page) != PAGE_SIZE);
13908c2ecf20Sopenharmony_ci	scb_addr = kvm_s390_get_base_disp_s(vcpu, NULL);
13918c2ecf20Sopenharmony_ci
13928c2ecf20Sopenharmony_ci	/* 512 byte alignment */
13938c2ecf20Sopenharmony_ci	if (unlikely(scb_addr & 0x1ffUL))
13948c2ecf20Sopenharmony_ci		return kvm_s390_inject_program_int(vcpu, PGM_SPECIFICATION);
13958c2ecf20Sopenharmony_ci
13968c2ecf20Sopenharmony_ci	if (signal_pending(current) || kvm_s390_vcpu_has_irq(vcpu, 0) ||
13978c2ecf20Sopenharmony_ci	    kvm_s390_vcpu_sie_inhibited(vcpu))
13988c2ecf20Sopenharmony_ci		return 0;
13998c2ecf20Sopenharmony_ci
14008c2ecf20Sopenharmony_ci	vsie_page = get_vsie_page(vcpu->kvm, scb_addr);
14018c2ecf20Sopenharmony_ci	if (IS_ERR(vsie_page))
14028c2ecf20Sopenharmony_ci		return PTR_ERR(vsie_page);
14038c2ecf20Sopenharmony_ci	else if (!vsie_page)
14048c2ecf20Sopenharmony_ci		/* double use of sie control block - simply do nothing */
14058c2ecf20Sopenharmony_ci		return 0;
14068c2ecf20Sopenharmony_ci
14078c2ecf20Sopenharmony_ci	rc = pin_scb(vcpu, vsie_page, scb_addr);
14088c2ecf20Sopenharmony_ci	if (rc)
14098c2ecf20Sopenharmony_ci		goto out_put;
14108c2ecf20Sopenharmony_ci	rc = shadow_scb(vcpu, vsie_page);
14118c2ecf20Sopenharmony_ci	if (rc)
14128c2ecf20Sopenharmony_ci		goto out_unpin_scb;
14138c2ecf20Sopenharmony_ci	rc = pin_blocks(vcpu, vsie_page);
14148c2ecf20Sopenharmony_ci	if (rc)
14158c2ecf20Sopenharmony_ci		goto out_unshadow;
14168c2ecf20Sopenharmony_ci	register_shadow_scb(vcpu, vsie_page);
14178c2ecf20Sopenharmony_ci	rc = vsie_run(vcpu, vsie_page);
14188c2ecf20Sopenharmony_ci	unregister_shadow_scb(vcpu);
14198c2ecf20Sopenharmony_ci	unpin_blocks(vcpu, vsie_page);
14208c2ecf20Sopenharmony_ciout_unshadow:
14218c2ecf20Sopenharmony_ci	unshadow_scb(vcpu, vsie_page);
14228c2ecf20Sopenharmony_ciout_unpin_scb:
14238c2ecf20Sopenharmony_ci	unpin_scb(vcpu, vsie_page, scb_addr);
14248c2ecf20Sopenharmony_ciout_put:
14258c2ecf20Sopenharmony_ci	put_vsie_page(vcpu->kvm, vsie_page);
14268c2ecf20Sopenharmony_ci
14278c2ecf20Sopenharmony_ci	return rc < 0 ? rc : 0;
14288c2ecf20Sopenharmony_ci}
14298c2ecf20Sopenharmony_ci
14308c2ecf20Sopenharmony_ci/* Init the vsie data structures. To be called when a vm is initialized. */
14318c2ecf20Sopenharmony_civoid kvm_s390_vsie_init(struct kvm *kvm)
14328c2ecf20Sopenharmony_ci{
14338c2ecf20Sopenharmony_ci	mutex_init(&kvm->arch.vsie.mutex);
14348c2ecf20Sopenharmony_ci	INIT_RADIX_TREE(&kvm->arch.vsie.addr_to_page, GFP_KERNEL);
14358c2ecf20Sopenharmony_ci}
14368c2ecf20Sopenharmony_ci
14378c2ecf20Sopenharmony_ci/* Destroy the vsie data structures. To be called when a vm is destroyed. */
14388c2ecf20Sopenharmony_civoid kvm_s390_vsie_destroy(struct kvm *kvm)
14398c2ecf20Sopenharmony_ci{
14408c2ecf20Sopenharmony_ci	struct vsie_page *vsie_page;
14418c2ecf20Sopenharmony_ci	struct page *page;
14428c2ecf20Sopenharmony_ci	int i;
14438c2ecf20Sopenharmony_ci
14448c2ecf20Sopenharmony_ci	mutex_lock(&kvm->arch.vsie.mutex);
14458c2ecf20Sopenharmony_ci	for (i = 0; i < kvm->arch.vsie.page_count; i++) {
14468c2ecf20Sopenharmony_ci		page = kvm->arch.vsie.pages[i];
14478c2ecf20Sopenharmony_ci		kvm->arch.vsie.pages[i] = NULL;
14488c2ecf20Sopenharmony_ci		vsie_page = page_to_virt(page);
14498c2ecf20Sopenharmony_ci		release_gmap_shadow(vsie_page);
14508c2ecf20Sopenharmony_ci		/* free the radix tree entry */
14518c2ecf20Sopenharmony_ci		radix_tree_delete(&kvm->arch.vsie.addr_to_page, page->index >> 9);
14528c2ecf20Sopenharmony_ci		__free_page(page);
14538c2ecf20Sopenharmony_ci	}
14548c2ecf20Sopenharmony_ci	kvm->arch.vsie.page_count = 0;
14558c2ecf20Sopenharmony_ci	mutex_unlock(&kvm->arch.vsie.mutex);
14568c2ecf20Sopenharmony_ci}
14578c2ecf20Sopenharmony_ci
14588c2ecf20Sopenharmony_civoid kvm_s390_vsie_kick(struct kvm_vcpu *vcpu)
14598c2ecf20Sopenharmony_ci{
14608c2ecf20Sopenharmony_ci	struct kvm_s390_sie_block *scb = READ_ONCE(vcpu->arch.vsie_block);
14618c2ecf20Sopenharmony_ci
14628c2ecf20Sopenharmony_ci	/*
14638c2ecf20Sopenharmony_ci	 * Even if the VCPU lets go of the shadow sie block reference, it is
14648c2ecf20Sopenharmony_ci	 * still valid in the cache. So we can safely kick it.
14658c2ecf20Sopenharmony_ci	 */
14668c2ecf20Sopenharmony_ci	if (scb) {
14678c2ecf20Sopenharmony_ci		atomic_or(PROG_BLOCK_SIE, &scb->prog20);
14688c2ecf20Sopenharmony_ci		if (scb->prog0c & PROG_IN_SIE)
14698c2ecf20Sopenharmony_ci			atomic_or(CPUSTAT_STOP_INT, &scb->cpuflags);
14708c2ecf20Sopenharmony_ci	}
14718c2ecf20Sopenharmony_ci}
1472