1 /* SPDX-License-Identifier: GPL-2.0 */
2 /*
3 * definition for kernel virtual machines on s390
4 *
5 * Copyright IBM Corp. 2008, 2018
6 *
7 * Author(s): Carsten Otte <cotte@de.ibm.com>
8 */
9
10
11 #ifndef ASM_KVM_HOST_H
12 #define ASM_KVM_HOST_H
13
14 #include <linux/types.h>
15 #include <linux/hrtimer.h>
16 #include <linux/interrupt.h>
17 #include <linux/kvm_types.h>
18 #include <linux/kvm_host.h>
19 #include <linux/kvm.h>
20 #include <linux/seqlock.h>
21 #include <asm/debug.h>
22 #include <asm/cpu.h>
23 #include <asm/fpu/api.h>
24 #include <asm/isc.h>
25 #include <asm/guarded_storage.h>
26
27 #define KVM_S390_BSCA_CPU_SLOTS 64
28 #define KVM_S390_ESCA_CPU_SLOTS 248
29 #define KVM_MAX_VCPUS 255
30 #define KVM_USER_MEM_SLOTS 32
31
32 /*
33 * These seem to be used for allocating ->chip in the routing table,
34 * which we don't use. 4096 is an out-of-thin-air value. If we need
35 * to look at ->chip later on, we'll need to revisit this.
36 */
37 #define KVM_NR_IRQCHIPS 1
38 #define KVM_IRQCHIP_NUM_PINS 4096
39 #define KVM_HALT_POLL_NS_DEFAULT 80000
40
41 /* s390-specific vcpu->requests bit members */
42 #define KVM_REQ_ENABLE_IBS KVM_ARCH_REQ(0)
43 #define KVM_REQ_DISABLE_IBS KVM_ARCH_REQ(1)
44 #define KVM_REQ_ICPT_OPEREXC KVM_ARCH_REQ(2)
45 #define KVM_REQ_START_MIGRATION KVM_ARCH_REQ(3)
46 #define KVM_REQ_STOP_MIGRATION KVM_ARCH_REQ(4)
47
48 #define SIGP_CTRL_C 0x80
49 #define SIGP_CTRL_SCN_MASK 0x3f
50
51 union bsca_sigp_ctrl {
52 __u8 value;
53 struct {
54 __u8 c : 1;
55 __u8 r : 1;
56 __u8 scn : 6;
57 };
58 };
59
60 union esca_sigp_ctrl {
61 __u16 value;
62 struct {
63 __u8 c : 1;
64 __u8 reserved: 7;
65 __u8 scn;
66 };
67 };
68
69 struct esca_entry {
70 union esca_sigp_ctrl sigp_ctrl;
71 __u16 reserved1[3];
72 __u64 sda;
73 __u64 reserved2[6];
74 };
75
76 struct bsca_entry {
77 __u8 reserved0;
78 union bsca_sigp_ctrl sigp_ctrl;
79 __u16 reserved[3];
80 __u64 sda;
81 __u64 reserved2[2];
82 };
83
84 union ipte_control {
85 unsigned long val;
86 struct {
87 unsigned long k : 1;
88 unsigned long kh : 31;
89 unsigned long kg : 32;
90 };
91 };
92
93 struct bsca_block {
94 union ipte_control ipte_control;
95 __u64 reserved[5];
96 __u64 mcn;
97 __u64 reserved2;
98 struct bsca_entry cpu[KVM_S390_BSCA_CPU_SLOTS];
99 };
100
101 struct esca_block {
102 union ipte_control ipte_control;
103 __u64 reserved1[7];
104 __u64 mcn[4];
105 __u64 reserved2[20];
106 struct esca_entry cpu[KVM_S390_ESCA_CPU_SLOTS];
107 };
108
109 /*
110 * This struct is used to store some machine check info from lowcore
111 * for machine checks that happen while the guest is running.
112 * This info in host's lowcore might be overwritten by a second machine
113 * check from host when host is in the machine check's high-level handling.
114 * The size is 24 bytes.
115 */
116 struct mcck_volatile_info {
117 __u64 mcic;
118 __u64 failing_storage_address;
119 __u32 ext_damage_code;
120 __u32 reserved;
121 };
122
123 #define CPUSTAT_STOPPED 0x80000000
124 #define CPUSTAT_WAIT 0x10000000
125 #define CPUSTAT_ECALL_PEND 0x08000000
126 #define CPUSTAT_STOP_INT 0x04000000
127 #define CPUSTAT_IO_INT 0x02000000
128 #define CPUSTAT_EXT_INT 0x01000000
129 #define CPUSTAT_RUNNING 0x00800000
130 #define CPUSTAT_RETAINED 0x00400000
131 #define CPUSTAT_TIMING_SUB 0x00020000
132 #define CPUSTAT_SIE_SUB 0x00010000
133 #define CPUSTAT_RRF 0x00008000
134 #define CPUSTAT_SLSV 0x00004000
135 #define CPUSTAT_SLSR 0x00002000
136 #define CPUSTAT_ZARCH 0x00000800
137 #define CPUSTAT_MCDS 0x00000100
138 #define CPUSTAT_KSS 0x00000200
139 #define CPUSTAT_SM 0x00000080
140 #define CPUSTAT_IBS 0x00000040
141 #define CPUSTAT_GED2 0x00000010
142 #define CPUSTAT_G 0x00000008
143 #define CPUSTAT_GED 0x00000004
144 #define CPUSTAT_J 0x00000002
145 #define CPUSTAT_P 0x00000001
146
147 struct kvm_s390_sie_block {
148 atomic_t cpuflags; /* 0x0000 */
149 __u32 : 1; /* 0x0004 */
150 __u32 prefix : 18;
151 __u32 : 1;
152 __u32 ibc : 12;
153 __u8 reserved08[4]; /* 0x0008 */
154 #define PROG_IN_SIE (1<<0)
155 __u32 prog0c; /* 0x000c */
156 __u8 reserved10[16]; /* 0x0010 */
157 #define PROG_BLOCK_SIE (1<<0)
158 #define PROG_REQUEST (1<<1)
159 atomic_t prog20; /* 0x0020 */
160 __u8 reserved24[4]; /* 0x0024 */
161 __u64 cputm; /* 0x0028 */
162 __u64 ckc; /* 0x0030 */
163 __u64 epoch; /* 0x0038 */
164 __u32 svcc; /* 0x0040 */
165 #define LCTL_CR0 0x8000
166 #define LCTL_CR6 0x0200
167 #define LCTL_CR9 0x0040
168 #define LCTL_CR10 0x0020
169 #define LCTL_CR11 0x0010
170 #define LCTL_CR14 0x0002
171 __u16 lctl; /* 0x0044 */
172 __s16 icpua; /* 0x0046 */
173 #define ICTL_OPEREXC 0x80000000
174 #define ICTL_PINT 0x20000000
175 #define ICTL_LPSW 0x00400000
176 #define ICTL_STCTL 0x00040000
177 #define ICTL_ISKE 0x00004000
178 #define ICTL_SSKE 0x00002000
179 #define ICTL_RRBE 0x00001000
180 #define ICTL_TPROT 0x00000200
181 __u32 ictl; /* 0x0048 */
182 #define ECA_CEI 0x80000000
183 #define ECA_IB 0x40000000
184 #define ECA_SIGPI 0x10000000
185 #define ECA_MVPGI 0x01000000
186 #define ECA_AIV 0x00200000
187 #define ECA_VX 0x00020000
188 #define ECA_PROTEXCI 0x00002000
189 #define ECA_SII 0x00000001
190 __u32 eca; /* 0x004c */
191 #define ICPT_INST 0x04
192 #define ICPT_PROGI 0x08
193 #define ICPT_INSTPROGI 0x0C
194 #define ICPT_EXTREQ 0x10
195 #define ICPT_EXTINT 0x14
196 #define ICPT_IOREQ 0x18
197 #define ICPT_WAIT 0x1c
198 #define ICPT_VALIDITY 0x20
199 #define ICPT_STOP 0x28
200 #define ICPT_OPEREXC 0x2C
201 #define ICPT_PARTEXEC 0x38
202 #define ICPT_IOINST 0x40
203 #define ICPT_KSS 0x5c
204 __u8 icptcode; /* 0x0050 */
205 __u8 icptstatus; /* 0x0051 */
206 __u16 ihcpu; /* 0x0052 */
207 __u8 reserved54[2]; /* 0x0054 */
208 __u16 ipa; /* 0x0056 */
209 __u32 ipb; /* 0x0058 */
210 __u32 scaoh; /* 0x005c */
211 #define FPF_BPBC 0x20
212 __u8 fpf; /* 0x0060 */
213 #define ECB_GS 0x40
214 #define ECB_TE 0x10
215 #define ECB_SRSI 0x04
216 #define ECB_HOSTPROTINT 0x02
217 __u8 ecb; /* 0x0061 */
218 #define ECB2_CMMA 0x80
219 #define ECB2_IEP 0x20
220 #define ECB2_PFMFI 0x08
221 #define ECB2_ESCA 0x04
222 __u8 ecb2; /* 0x0062 */
223 #define ECB3_DEA 0x08
224 #define ECB3_AES 0x04
225 #define ECB3_RI 0x01
226 __u8 ecb3; /* 0x0063 */
227 __u32 scaol; /* 0x0064 */
228 __u8 reserved68; /* 0x0068 */
229 __u8 epdx; /* 0x0069 */
230 __u8 reserved6a[2]; /* 0x006a */
231 __u32 todpr; /* 0x006c */
232 #define GISA_FORMAT1 0x00000001
233 __u32 gd; /* 0x0070 */
234 __u8 reserved74[12]; /* 0x0074 */
235 __u64 mso; /* 0x0080 */
236 __u64 msl; /* 0x0088 */
237 psw_t gpsw; /* 0x0090 */
238 __u64 gg14; /* 0x00a0 */
239 __u64 gg15; /* 0x00a8 */
240 __u8 reservedb0[20]; /* 0x00b0 */
241 __u16 extcpuaddr; /* 0x00c4 */
242 __u16 eic; /* 0x00c6 */
243 __u32 reservedc8; /* 0x00c8 */
244 __u16 pgmilc; /* 0x00cc */
245 __u16 iprcc; /* 0x00ce */
246 __u32 dxc; /* 0x00d0 */
247 __u16 mcn; /* 0x00d4 */
248 __u8 perc; /* 0x00d6 */
249 __u8 peratmid; /* 0x00d7 */
250 __u64 peraddr; /* 0x00d8 */
251 __u8 eai; /* 0x00e0 */
252 __u8 peraid; /* 0x00e1 */
253 __u8 oai; /* 0x00e2 */
254 __u8 armid; /* 0x00e3 */
255 __u8 reservede4[4]; /* 0x00e4 */
256 __u64 tecmc; /* 0x00e8 */
257 __u8 reservedf0[12]; /* 0x00f0 */
258 #define CRYCB_FORMAT1 0x00000001
259 #define CRYCB_FORMAT2 0x00000003
260 __u32 crycbd; /* 0x00fc */
261 __u64 gcr[16]; /* 0x0100 */
262 __u64 gbea; /* 0x0180 */
263 __u8 reserved188[8]; /* 0x0188 */
264 __u64 sdnxo; /* 0x0190 */
265 __u8 reserved198[8]; /* 0x0198 */
266 __u32 fac; /* 0x01a0 */
267 __u8 reserved1a4[20]; /* 0x01a4 */
268 __u64 cbrlo; /* 0x01b8 */
269 __u8 reserved1c0[8]; /* 0x01c0 */
270 #define ECD_HOSTREGMGMT 0x20000000
271 #define ECD_MEF 0x08000000
272 #define ECD_ETOKENF 0x02000000
273 __u32 ecd; /* 0x01c8 */
274 __u8 reserved1cc[18]; /* 0x01cc */
275 __u64 pp; /* 0x01de */
276 __u8 reserved1e6[2]; /* 0x01e6 */
277 __u64 itdba; /* 0x01e8 */
278 __u64 riccbd; /* 0x01f0 */
279 __u64 gvrd; /* 0x01f8 */
280 } __attribute__((packed));
281
282 struct kvm_s390_itdb {
283 __u8 data[256];
284 };
285
286 struct sie_page {
287 struct kvm_s390_sie_block sie_block;
288 struct mcck_volatile_info mcck_info; /* 0x0200 */
289 __u8 reserved218[1000]; /* 0x0218 */
290 struct kvm_s390_itdb itdb; /* 0x0600 */
291 __u8 reserved700[2304]; /* 0x0700 */
292 };
293
294 struct kvm_vcpu_stat {
295 u64 exit_userspace;
296 u64 exit_null;
297 u64 exit_external_request;
298 u64 exit_io_request;
299 u64 exit_external_interrupt;
300 u64 exit_stop_request;
301 u64 exit_validity;
302 u64 exit_instruction;
303 u64 exit_pei;
304 u64 halt_successful_poll;
305 u64 halt_attempted_poll;
306 u64 halt_poll_invalid;
307 u64 halt_wakeup;
308 u64 instruction_lctl;
309 u64 instruction_lctlg;
310 u64 instruction_stctl;
311 u64 instruction_stctg;
312 u64 exit_program_interruption;
313 u64 exit_instr_and_program;
314 u64 exit_operation_exception;
315 u64 deliver_ckc;
316 u64 deliver_cputm;
317 u64 deliver_external_call;
318 u64 deliver_emergency_signal;
319 u64 deliver_service_signal;
320 u64 deliver_virtio;
321 u64 deliver_stop_signal;
322 u64 deliver_prefix_signal;
323 u64 deliver_restart_signal;
324 u64 deliver_program;
325 u64 deliver_io;
326 u64 deliver_machine_check;
327 u64 exit_wait_state;
328 u64 inject_ckc;
329 u64 inject_cputm;
330 u64 inject_external_call;
331 u64 inject_emergency_signal;
332 u64 inject_mchk;
333 u64 inject_pfault_init;
334 u64 inject_program;
335 u64 inject_restart;
336 u64 inject_set_prefix;
337 u64 inject_stop_signal;
338 u64 instruction_epsw;
339 u64 instruction_gs;
340 u64 instruction_io_other;
341 u64 instruction_lpsw;
342 u64 instruction_lpswe;
343 u64 instruction_pfmf;
344 u64 instruction_ptff;
345 u64 instruction_sck;
346 u64 instruction_sckpf;
347 u64 instruction_stidp;
348 u64 instruction_spx;
349 u64 instruction_stpx;
350 u64 instruction_stap;
351 u64 instruction_iske;
352 u64 instruction_ri;
353 u64 instruction_rrbe;
354 u64 instruction_sske;
355 u64 instruction_ipte_interlock;
356 u64 instruction_stsi;
357 u64 instruction_stfl;
358 u64 instruction_tb;
359 u64 instruction_tpi;
360 u64 instruction_tprot;
361 u64 instruction_tsch;
362 u64 instruction_sie;
363 u64 instruction_essa;
364 u64 instruction_sthyi;
365 u64 instruction_sigp_sense;
366 u64 instruction_sigp_sense_running;
367 u64 instruction_sigp_external_call;
368 u64 instruction_sigp_emergency;
369 u64 instruction_sigp_cond_emergency;
370 u64 instruction_sigp_start;
371 u64 instruction_sigp_stop;
372 u64 instruction_sigp_stop_store_status;
373 u64 instruction_sigp_store_status;
374 u64 instruction_sigp_store_adtl_status;
375 u64 instruction_sigp_arch;
376 u64 instruction_sigp_prefix;
377 u64 instruction_sigp_restart;
378 u64 instruction_sigp_init_cpu_reset;
379 u64 instruction_sigp_cpu_reset;
380 u64 instruction_sigp_unknown;
381 u64 diagnose_10;
382 u64 diagnose_44;
383 u64 diagnose_9c;
384 u64 diagnose_258;
385 u64 diagnose_308;
386 u64 diagnose_500;
387 u64 diagnose_other;
388 };
389
390 #define PGM_OPERATION 0x01
391 #define PGM_PRIVILEGED_OP 0x02
392 #define PGM_EXECUTE 0x03
393 #define PGM_PROTECTION 0x04
394 #define PGM_ADDRESSING 0x05
395 #define PGM_SPECIFICATION 0x06
396 #define PGM_DATA 0x07
397 #define PGM_FIXED_POINT_OVERFLOW 0x08
398 #define PGM_FIXED_POINT_DIVIDE 0x09
399 #define PGM_DECIMAL_OVERFLOW 0x0a
400 #define PGM_DECIMAL_DIVIDE 0x0b
401 #define PGM_HFP_EXPONENT_OVERFLOW 0x0c
402 #define PGM_HFP_EXPONENT_UNDERFLOW 0x0d
403 #define PGM_HFP_SIGNIFICANCE 0x0e
404 #define PGM_HFP_DIVIDE 0x0f
405 #define PGM_SEGMENT_TRANSLATION 0x10
406 #define PGM_PAGE_TRANSLATION 0x11
407 #define PGM_TRANSLATION_SPEC 0x12
408 #define PGM_SPECIAL_OPERATION 0x13
409 #define PGM_OPERAND 0x15
410 #define PGM_TRACE_TABEL 0x16
411 #define PGM_VECTOR_PROCESSING 0x1b
412 #define PGM_SPACE_SWITCH 0x1c
413 #define PGM_HFP_SQUARE_ROOT 0x1d
414 #define PGM_PC_TRANSLATION_SPEC 0x1f
415 #define PGM_AFX_TRANSLATION 0x20
416 #define PGM_ASX_TRANSLATION 0x21
417 #define PGM_LX_TRANSLATION 0x22
418 #define PGM_EX_TRANSLATION 0x23
419 #define PGM_PRIMARY_AUTHORITY 0x24
420 #define PGM_SECONDARY_AUTHORITY 0x25
421 #define PGM_LFX_TRANSLATION 0x26
422 #define PGM_LSX_TRANSLATION 0x27
423 #define PGM_ALET_SPECIFICATION 0x28
424 #define PGM_ALEN_TRANSLATION 0x29
425 #define PGM_ALE_SEQUENCE 0x2a
426 #define PGM_ASTE_VALIDITY 0x2b
427 #define PGM_ASTE_SEQUENCE 0x2c
428 #define PGM_EXTENDED_AUTHORITY 0x2d
429 #define PGM_LSTE_SEQUENCE 0x2e
430 #define PGM_ASTE_INSTANCE 0x2f
431 #define PGM_STACK_FULL 0x30
432 #define PGM_STACK_EMPTY 0x31
433 #define PGM_STACK_SPECIFICATION 0x32
434 #define PGM_STACK_TYPE 0x33
435 #define PGM_STACK_OPERATION 0x34
436 #define PGM_ASCE_TYPE 0x38
437 #define PGM_REGION_FIRST_TRANS 0x39
438 #define PGM_REGION_SECOND_TRANS 0x3a
439 #define PGM_REGION_THIRD_TRANS 0x3b
440 #define PGM_MONITOR 0x40
441 #define PGM_PER 0x80
442 #define PGM_CRYPTO_OPERATION 0x119
443
444 /* irq types in ascend order of priorities */
445 enum irq_types {
446 IRQ_PEND_SET_PREFIX = 0,
447 IRQ_PEND_RESTART,
448 IRQ_PEND_SIGP_STOP,
449 IRQ_PEND_IO_ISC_7,
450 IRQ_PEND_IO_ISC_6,
451 IRQ_PEND_IO_ISC_5,
452 IRQ_PEND_IO_ISC_4,
453 IRQ_PEND_IO_ISC_3,
454 IRQ_PEND_IO_ISC_2,
455 IRQ_PEND_IO_ISC_1,
456 IRQ_PEND_IO_ISC_0,
457 IRQ_PEND_VIRTIO,
458 IRQ_PEND_PFAULT_DONE,
459 IRQ_PEND_PFAULT_INIT,
460 IRQ_PEND_EXT_HOST,
461 IRQ_PEND_EXT_SERVICE,
462 IRQ_PEND_EXT_TIMING,
463 IRQ_PEND_EXT_CPU_TIMER,
464 IRQ_PEND_EXT_CLOCK_COMP,
465 IRQ_PEND_EXT_EXTERNAL,
466 IRQ_PEND_EXT_EMERGENCY,
467 IRQ_PEND_EXT_MALFUNC,
468 IRQ_PEND_EXT_IRQ_KEY,
469 IRQ_PEND_MCHK_REP,
470 IRQ_PEND_PROG,
471 IRQ_PEND_SVC,
472 IRQ_PEND_MCHK_EX,
473 IRQ_PEND_COUNT
474 };
475
476 /* We have 2M for virtio device descriptor pages. Smallest amount of
477 * memory per page is 24 bytes (1 queue), so (2048*1024) / 24 = 87381
478 */
479 #define KVM_S390_MAX_VIRTIO_IRQS 87381
480
481 /*
482 * Repressible (non-floating) machine check interrupts
483 * subclass bits in MCIC
484 */
485 #define MCHK_EXTD_BIT 58
486 #define MCHK_DEGR_BIT 56
487 #define MCHK_WARN_BIT 55
488 #define MCHK_REP_MASK ((1UL << MCHK_DEGR_BIT) | \
489 (1UL << MCHK_EXTD_BIT) | \
490 (1UL << MCHK_WARN_BIT))
491
492 /* Exigent machine check interrupts subclass bits in MCIC */
493 #define MCHK_SD_BIT 63
494 #define MCHK_PD_BIT 62
495 #define MCHK_EX_MASK ((1UL << MCHK_SD_BIT) | (1UL << MCHK_PD_BIT))
496
497 #define IRQ_PEND_EXT_MASK ((1UL << IRQ_PEND_EXT_IRQ_KEY) | \
498 (1UL << IRQ_PEND_EXT_CLOCK_COMP) | \
499 (1UL << IRQ_PEND_EXT_CPU_TIMER) | \
500 (1UL << IRQ_PEND_EXT_MALFUNC) | \
501 (1UL << IRQ_PEND_EXT_EMERGENCY) | \
502 (1UL << IRQ_PEND_EXT_EXTERNAL) | \
503 (1UL << IRQ_PEND_EXT_TIMING) | \
504 (1UL << IRQ_PEND_EXT_HOST) | \
505 (1UL << IRQ_PEND_EXT_SERVICE) | \
506 (1UL << IRQ_PEND_VIRTIO) | \
507 (1UL << IRQ_PEND_PFAULT_INIT) | \
508 (1UL << IRQ_PEND_PFAULT_DONE))
509
510 #define IRQ_PEND_IO_MASK ((1UL << IRQ_PEND_IO_ISC_0) | \
511 (1UL << IRQ_PEND_IO_ISC_1) | \
512 (1UL << IRQ_PEND_IO_ISC_2) | \
513 (1UL << IRQ_PEND_IO_ISC_3) | \
514 (1UL << IRQ_PEND_IO_ISC_4) | \
515 (1UL << IRQ_PEND_IO_ISC_5) | \
516 (1UL << IRQ_PEND_IO_ISC_6) | \
517 (1UL << IRQ_PEND_IO_ISC_7))
518
519 #define IRQ_PEND_MCHK_MASK ((1UL << IRQ_PEND_MCHK_REP) | \
520 (1UL << IRQ_PEND_MCHK_EX))
521
522 struct kvm_s390_interrupt_info {
523 struct list_head list;
524 u64 type;
525 union {
526 struct kvm_s390_io_info io;
527 struct kvm_s390_ext_info ext;
528 struct kvm_s390_pgm_info pgm;
529 struct kvm_s390_emerg_info emerg;
530 struct kvm_s390_extcall_info extcall;
531 struct kvm_s390_prefix_info prefix;
532 struct kvm_s390_stop_info stop;
533 struct kvm_s390_mchk_info mchk;
534 };
535 };
536
537 struct kvm_s390_irq_payload {
538 struct kvm_s390_io_info io;
539 struct kvm_s390_ext_info ext;
540 struct kvm_s390_pgm_info pgm;
541 struct kvm_s390_emerg_info emerg;
542 struct kvm_s390_extcall_info extcall;
543 struct kvm_s390_prefix_info prefix;
544 struct kvm_s390_stop_info stop;
545 struct kvm_s390_mchk_info mchk;
546 };
547
548 struct kvm_s390_local_interrupt {
549 spinlock_t lock;
550 DECLARE_BITMAP(sigp_emerg_pending, KVM_MAX_VCPUS);
551 struct kvm_s390_irq_payload irq;
552 unsigned long pending_irqs;
553 };
554
555 #define FIRQ_LIST_IO_ISC_0 0
556 #define FIRQ_LIST_IO_ISC_1 1
557 #define FIRQ_LIST_IO_ISC_2 2
558 #define FIRQ_LIST_IO_ISC_3 3
559 #define FIRQ_LIST_IO_ISC_4 4
560 #define FIRQ_LIST_IO_ISC_5 5
561 #define FIRQ_LIST_IO_ISC_6 6
562 #define FIRQ_LIST_IO_ISC_7 7
563 #define FIRQ_LIST_PFAULT 8
564 #define FIRQ_LIST_VIRTIO 9
565 #define FIRQ_LIST_COUNT 10
566 #define FIRQ_CNTR_IO 0
567 #define FIRQ_CNTR_SERVICE 1
568 #define FIRQ_CNTR_VIRTIO 2
569 #define FIRQ_CNTR_PFAULT 3
570 #define FIRQ_MAX_COUNT 4
571
572 /* mask the AIS mode for a given ISC */
573 #define AIS_MODE_MASK(isc) (0x80 >> isc)
574
575 #define KVM_S390_AIS_MODE_ALL 0
576 #define KVM_S390_AIS_MODE_SINGLE 1
577
578 struct kvm_s390_float_interrupt {
579 unsigned long pending_irqs;
580 spinlock_t lock;
581 struct list_head lists[FIRQ_LIST_COUNT];
582 int counters[FIRQ_MAX_COUNT];
583 struct kvm_s390_mchk_info mchk;
584 struct kvm_s390_ext_info srv_signal;
585 int next_rr_cpu;
586 unsigned long idle_mask[BITS_TO_LONGS(KVM_MAX_VCPUS)];
587 struct mutex ais_lock;
588 u8 simm;
589 u8 nimm;
590 };
591
592 struct kvm_hw_wp_info_arch {
593 unsigned long addr;
594 unsigned long phys_addr;
595 int len;
596 char *old_data;
597 };
598
599 struct kvm_hw_bp_info_arch {
600 unsigned long addr;
601 int len;
602 };
603
604 /*
605 * Only the upper 16 bits of kvm_guest_debug->control are arch specific.
606 * Further KVM_GUESTDBG flags which an be used from userspace can be found in
607 * arch/s390/include/uapi/asm/kvm.h
608 */
609 #define KVM_GUESTDBG_EXIT_PENDING 0x10000000
610
611 #define guestdbg_enabled(vcpu) \
612 (vcpu->guest_debug & KVM_GUESTDBG_ENABLE)
613 #define guestdbg_sstep_enabled(vcpu) \
614 (vcpu->guest_debug & KVM_GUESTDBG_SINGLESTEP)
615 #define guestdbg_hw_bp_enabled(vcpu) \
616 (vcpu->guest_debug & KVM_GUESTDBG_USE_HW_BP)
617 #define guestdbg_exit_pending(vcpu) (guestdbg_enabled(vcpu) && \
618 (vcpu->guest_debug & KVM_GUESTDBG_EXIT_PENDING))
619
620 struct kvm_guestdbg_info_arch {
621 unsigned long cr0;
622 unsigned long cr9;
623 unsigned long cr10;
624 unsigned long cr11;
625 struct kvm_hw_bp_info_arch *hw_bp_info;
626 struct kvm_hw_wp_info_arch *hw_wp_info;
627 int nr_hw_bp;
628 int nr_hw_wp;
629 unsigned long last_bp;
630 };
631
632 struct kvm_vcpu_arch {
633 struct kvm_s390_sie_block *sie_block;
634 /* if vsie is active, currently executed shadow sie control block */
635 struct kvm_s390_sie_block *vsie_block;
636 unsigned int host_acrs[NUM_ACRS];
637 struct gs_cb *host_gscb;
638 struct fpu host_fpregs;
639 struct kvm_s390_local_interrupt local_int;
640 struct hrtimer ckc_timer;
641 struct kvm_s390_pgm_info pgm;
642 struct gmap *gmap;
643 /* backup location for the currently enabled gmap when scheduled out */
644 struct gmap *enabled_gmap;
645 struct kvm_guestdbg_info_arch guestdbg;
646 unsigned long pfault_token;
647 unsigned long pfault_select;
648 unsigned long pfault_compare;
649 bool cputm_enabled;
650 /*
651 * The seqcount protects updates to cputm_start and sie_block.cputm,
652 * this way we can have non-blocking reads with consistent values.
653 * Only the owning VCPU thread (vcpu->cpu) is allowed to change these
654 * values and to start/stop/enable/disable cpu timer accounting.
655 */
656 seqcount_t cputm_seqcount;
657 __u64 cputm_start;
658 bool gs_enabled;
659 bool skey_enabled;
660 };
661
662 struct kvm_vm_stat {
663 u64 inject_io;
664 u64 inject_float_mchk;
665 u64 inject_pfault_done;
666 u64 inject_service_signal;
667 u64 inject_virtio;
668 u64 remote_tlb_flush;
669 };
670
671 struct kvm_arch_memory_slot {
672 };
673
674 struct s390_map_info {
675 struct list_head list;
676 __u64 guest_addr;
677 __u64 addr;
678 struct page *page;
679 };
680
681 struct s390_io_adapter {
682 unsigned int id;
683 int isc;
684 bool maskable;
685 bool masked;
686 bool swap;
687 bool suppressible;
688 struct rw_semaphore maps_lock;
689 struct list_head maps;
690 atomic_t nr_maps;
691 };
692
693 #define MAX_S390_IO_ADAPTERS ((MAX_ISC + 1) * 8)
694 #define MAX_S390_ADAPTER_MAPS 256
695
696 /* maximum size of facilities and facility mask is 2k bytes */
697 #define S390_ARCH_FAC_LIST_SIZE_BYTE (1<<11)
698 #define S390_ARCH_FAC_LIST_SIZE_U64 \
699 (S390_ARCH_FAC_LIST_SIZE_BYTE / sizeof(u64))
700 #define S390_ARCH_FAC_MASK_SIZE_BYTE S390_ARCH_FAC_LIST_SIZE_BYTE
701 #define S390_ARCH_FAC_MASK_SIZE_U64 \
702 (S390_ARCH_FAC_MASK_SIZE_BYTE / sizeof(u64))
703
704 struct kvm_s390_cpu_model {
705 /* facility mask supported by kvm & hosting machine */
706 __u64 fac_mask[S390_ARCH_FAC_LIST_SIZE_U64];
707 /* facility list requested by guest (in dma page) */
708 __u64 *fac_list;
709 u64 cpuid;
710 unsigned short ibc;
711 };
712
713 struct kvm_s390_crypto {
714 struct kvm_s390_crypto_cb *crycb;
715 __u32 crycbd;
716 __u8 aes_kw;
717 __u8 dea_kw;
718 };
719
720 #define APCB0_MASK_SIZE 1
721 struct kvm_s390_apcb0 {
722 __u64 apm[APCB0_MASK_SIZE]; /* 0x0000 */
723 __u64 aqm[APCB0_MASK_SIZE]; /* 0x0008 */
724 __u64 adm[APCB0_MASK_SIZE]; /* 0x0010 */
725 __u64 reserved18; /* 0x0018 */
726 };
727
728 #define APCB1_MASK_SIZE 4
729 struct kvm_s390_apcb1 {
730 __u64 apm[APCB1_MASK_SIZE]; /* 0x0000 */
731 __u64 aqm[APCB1_MASK_SIZE]; /* 0x0020 */
732 __u64 adm[APCB1_MASK_SIZE]; /* 0x0040 */
733 __u64 reserved60[4]; /* 0x0060 */
734 };
735
736 struct kvm_s390_crypto_cb {
737 struct kvm_s390_apcb0 apcb0; /* 0x0000 */
738 __u8 reserved20[0x0048 - 0x0020]; /* 0x0020 */
739 __u8 dea_wrapping_key_mask[24]; /* 0x0048 */
740 __u8 aes_wrapping_key_mask[32]; /* 0x0060 */
741 struct kvm_s390_apcb1 apcb1; /* 0x0080 */
742 };
743
744 struct kvm_s390_gisa {
745 union {
746 struct { /* common to all formats */
747 u32 next_alert;
748 u8 ipm;
749 u8 reserved01[2];
750 u8 iam;
751 };
752 struct { /* format 0 */
753 u32 next_alert;
754 u8 ipm;
755 u8 reserved01;
756 u8 : 6;
757 u8 g : 1;
758 u8 c : 1;
759 u8 iam;
760 u8 reserved02[4];
761 u32 airq_count;
762 } g0;
763 struct { /* format 1 */
764 u32 next_alert;
765 u8 ipm;
766 u8 simm;
767 u8 nimm;
768 u8 iam;
769 u8 aism[8];
770 u8 : 6;
771 u8 g : 1;
772 u8 c : 1;
773 u8 reserved03[11];
774 u32 airq_count;
775 } g1;
776 };
777 };
778
779 /*
780 * sie_page2 has to be allocated as DMA because fac_list, crycb and
781 * gisa need 31bit addresses in the sie control block.
782 */
783 struct sie_page2 {
784 __u64 fac_list[S390_ARCH_FAC_LIST_SIZE_U64]; /* 0x0000 */
785 struct kvm_s390_crypto_cb crycb; /* 0x0800 */
786 struct kvm_s390_gisa gisa; /* 0x0900 */
787 u8 reserved920[0x1000 - 0x920]; /* 0x0920 */
788 };
789
790 struct kvm_s390_vsie {
791 struct mutex mutex;
792 struct radix_tree_root addr_to_page;
793 int page_count;
794 int next;
795 struct page *pages[KVM_MAX_VCPUS];
796 };
797
798 struct kvm_arch{
799 void *sca;
800 int use_esca;
801 rwlock_t sca_lock;
802 debug_info_t *dbf;
803 struct kvm_s390_float_interrupt float_int;
804 struct kvm_device *flic;
805 struct gmap *gmap;
806 unsigned long mem_limit;
807 int css_support;
808 int use_irqchip;
809 int use_cmma;
810 int use_pfmfi;
811 int use_skf;
812 int user_cpu_state_ctrl;
813 int user_sigp;
814 int user_stsi;
815 int user_instr0;
816 struct s390_io_adapter *adapters[MAX_S390_IO_ADAPTERS];
817 wait_queue_head_t ipte_wq;
818 int ipte_lock_count;
819 struct mutex ipte_mutex;
820 spinlock_t start_stop_lock;
821 struct sie_page2 *sie_page2;
822 struct kvm_s390_cpu_model model;
823 struct kvm_s390_crypto crypto;
824 struct kvm_s390_vsie vsie;
825 u8 epdx;
826 u64 epoch;
827 int migration_mode;
828 atomic64_t cmma_dirty_pages;
829 /* subset of available cpu features enabled by user space */
830 DECLARE_BITMAP(cpu_feat, KVM_S390_VM_CPU_FEAT_NR_BITS);
831 struct kvm_s390_gisa *gisa;
832 };
833
834 #define KVM_HVA_ERR_BAD (-1UL)
835 #define KVM_HVA_ERR_RO_BAD (-2UL)
836
kvm_is_error_hva(unsigned long addr)837 static inline bool kvm_is_error_hva(unsigned long addr)
838 {
839 return IS_ERR_VALUE(addr);
840 }
841
842 #define ASYNC_PF_PER_VCPU 64
843 struct kvm_arch_async_pf {
844 unsigned long pfault_token;
845 };
846
847 bool kvm_arch_can_inject_async_page_present(struct kvm_vcpu *vcpu);
848
849 void kvm_arch_async_page_ready(struct kvm_vcpu *vcpu,
850 struct kvm_async_pf *work);
851
852 void kvm_arch_async_page_not_present(struct kvm_vcpu *vcpu,
853 struct kvm_async_pf *work);
854
855 void kvm_arch_async_page_present(struct kvm_vcpu *vcpu,
856 struct kvm_async_pf *work);
857
858 extern int sie64a(struct kvm_s390_sie_block *, u64 *);
859 extern char sie_exit;
860
kvm_arch_hardware_disable(void)861 static inline void kvm_arch_hardware_disable(void) {}
kvm_arch_check_processor_compat(void * rtn)862 static inline void kvm_arch_check_processor_compat(void *rtn) {}
kvm_arch_sync_events(struct kvm * kvm)863 static inline void kvm_arch_sync_events(struct kvm *kvm) {}
kvm_arch_vcpu_uninit(struct kvm_vcpu * vcpu)864 static inline void kvm_arch_vcpu_uninit(struct kvm_vcpu *vcpu) {}
kvm_arch_sched_in(struct kvm_vcpu * vcpu,int cpu)865 static inline void kvm_arch_sched_in(struct kvm_vcpu *vcpu, int cpu) {}
kvm_arch_free_memslot(struct kvm * kvm,struct kvm_memory_slot * free,struct kvm_memory_slot * dont)866 static inline void kvm_arch_free_memslot(struct kvm *kvm,
867 struct kvm_memory_slot *free, struct kvm_memory_slot *dont) {}
kvm_arch_memslots_updated(struct kvm * kvm,struct kvm_memslots * slots)868 static inline void kvm_arch_memslots_updated(struct kvm *kvm, struct kvm_memslots *slots) {}
kvm_arch_flush_shadow_all(struct kvm * kvm)869 static inline void kvm_arch_flush_shadow_all(struct kvm *kvm) {}
kvm_arch_flush_shadow_memslot(struct kvm * kvm,struct kvm_memory_slot * slot)870 static inline void kvm_arch_flush_shadow_memslot(struct kvm *kvm,
871 struct kvm_memory_slot *slot) {}
kvm_arch_vcpu_blocking(struct kvm_vcpu * vcpu)872 static inline void kvm_arch_vcpu_blocking(struct kvm_vcpu *vcpu) {}
kvm_arch_vcpu_unblocking(struct kvm_vcpu * vcpu)873 static inline void kvm_arch_vcpu_unblocking(struct kvm_vcpu *vcpu) {}
874
875 void kvm_arch_vcpu_block_finish(struct kvm_vcpu *vcpu);
876
877 #endif
878