1/* SPDX-License-Identifier: GPL-2.0 */ 2/* 3 * definition for kernel virtual machines on s390 4 * 5 * Copyright IBM Corp. 2008, 2018 6 * 7 * Author(s): Carsten Otte <cotte@de.ibm.com> 8 */ 9 10 11#ifndef ASM_KVM_HOST_H 12#define ASM_KVM_HOST_H 13 14#include <linux/types.h> 15#include <linux/hrtimer.h> 16#include <linux/interrupt.h> 17#include <linux/kvm_types.h> 18#include <linux/kvm_host.h> 19#include <linux/kvm.h> 20#include <linux/seqlock.h> 21#include <linux/module.h> 22#include <linux/pci.h> 23#include <linux/mmu_notifier.h> 24#include <asm/debug.h> 25#include <asm/cpu.h> 26#include <asm/fpu.h> 27#include <asm/isc.h> 28#include <asm/guarded_storage.h> 29 30#define KVM_S390_BSCA_CPU_SLOTS 64 31#define KVM_S390_ESCA_CPU_SLOTS 248 32#define KVM_MAX_VCPUS 255 33 34/* 35 * These seem to be used for allocating ->chip in the routing table, which we 36 * don't use. 1 is as small as we can get to reduce the needed memory. If we 37 * need to look at ->chip later on, we'll need to revisit this. 38 */ 39#define KVM_NR_IRQCHIPS 1 40#define KVM_IRQCHIP_NUM_PINS 1 41#define KVM_HALT_POLL_NS_DEFAULT 50000 42 43/* s390-specific vcpu->requests bit members */ 44#define KVM_REQ_ENABLE_IBS KVM_ARCH_REQ(0) 45#define KVM_REQ_DISABLE_IBS KVM_ARCH_REQ(1) 46#define KVM_REQ_ICPT_OPEREXC KVM_ARCH_REQ(2) 47#define KVM_REQ_START_MIGRATION KVM_ARCH_REQ(3) 48#define KVM_REQ_STOP_MIGRATION KVM_ARCH_REQ(4) 49#define KVM_REQ_VSIE_RESTART KVM_ARCH_REQ(5) 50#define KVM_REQ_REFRESH_GUEST_PREFIX \ 51 KVM_ARCH_REQ_FLAGS(6, KVM_REQUEST_WAIT | KVM_REQUEST_NO_WAKEUP) 52 53#define SIGP_CTRL_C 0x80 54#define SIGP_CTRL_SCN_MASK 0x3f 55 56union bsca_sigp_ctrl { 57 __u8 value; 58 struct { 59 __u8 c : 1; 60 __u8 r : 1; 61 __u8 scn : 6; 62 }; 63}; 64 65union esca_sigp_ctrl { 66 __u16 value; 67 struct { 68 __u8 c : 1; 69 __u8 reserved: 7; 70 __u8 scn; 71 }; 72}; 73 74struct esca_entry { 75 union esca_sigp_ctrl sigp_ctrl; 76 __u16 reserved1[3]; 77 __u64 sda; 78 __u64 reserved2[6]; 79}; 80 81struct bsca_entry { 82 __u8 reserved0; 83 union bsca_sigp_ctrl sigp_ctrl; 84 __u16 reserved[3]; 85 __u64 sda; 86 __u64 reserved2[2]; 87}; 88 89union ipte_control { 90 unsigned long val; 91 struct { 92 unsigned long k : 1; 93 unsigned long kh : 31; 94 unsigned long kg : 32; 95 }; 96}; 97 98union sca_utility { 99 __u16 val; 100 struct { 101 __u16 mtcr : 1; 102 __u16 reserved : 15; 103 }; 104}; 105 106struct bsca_block { 107 union ipte_control ipte_control; 108 __u64 reserved[5]; 109 __u64 mcn; 110 union sca_utility utility; 111 __u8 reserved2[6]; 112 struct bsca_entry cpu[KVM_S390_BSCA_CPU_SLOTS]; 113}; 114 115struct esca_block { 116 union ipte_control ipte_control; 117 __u64 reserved1[6]; 118 union sca_utility utility; 119 __u8 reserved2[6]; 120 __u64 mcn[4]; 121 __u64 reserved3[20]; 122 struct esca_entry cpu[KVM_S390_ESCA_CPU_SLOTS]; 123}; 124 125/* 126 * This struct is used to store some machine check info from lowcore 127 * for machine checks that happen while the guest is running. 128 * This info in host's lowcore might be overwritten by a second machine 129 * check from host when host is in the machine check's high-level handling. 130 * The size is 24 bytes. 131 */ 132struct mcck_volatile_info { 133 __u64 mcic; 134 __u64 failing_storage_address; 135 __u32 ext_damage_code; 136 __u32 reserved; 137}; 138 139#define CR0_INITIAL_MASK (CR0_UNUSED_56 | CR0_INTERRUPT_KEY_SUBMASK | \ 140 CR0_MEASUREMENT_ALERT_SUBMASK) 141#define CR14_INITIAL_MASK (CR14_UNUSED_32 | CR14_UNUSED_33 | \ 142 CR14_EXTERNAL_DAMAGE_SUBMASK) 143 144#define SIDAD_SIZE_MASK 0xff 145#define sida_addr(sie_block) phys_to_virt((sie_block)->sidad & PAGE_MASK) 146#define sida_size(sie_block) \ 147 ((((sie_block)->sidad & SIDAD_SIZE_MASK) + 1) * PAGE_SIZE) 148 149#define CPUSTAT_STOPPED 0x80000000 150#define CPUSTAT_WAIT 0x10000000 151#define CPUSTAT_ECALL_PEND 0x08000000 152#define CPUSTAT_STOP_INT 0x04000000 153#define CPUSTAT_IO_INT 0x02000000 154#define CPUSTAT_EXT_INT 0x01000000 155#define CPUSTAT_RUNNING 0x00800000 156#define CPUSTAT_RETAINED 0x00400000 157#define CPUSTAT_TIMING_SUB 0x00020000 158#define CPUSTAT_SIE_SUB 0x00010000 159#define CPUSTAT_RRF 0x00008000 160#define CPUSTAT_SLSV 0x00004000 161#define CPUSTAT_SLSR 0x00002000 162#define CPUSTAT_ZARCH 0x00000800 163#define CPUSTAT_MCDS 0x00000100 164#define CPUSTAT_KSS 0x00000200 165#define CPUSTAT_SM 0x00000080 166#define CPUSTAT_IBS 0x00000040 167#define CPUSTAT_GED2 0x00000010 168#define CPUSTAT_G 0x00000008 169#define CPUSTAT_GED 0x00000004 170#define CPUSTAT_J 0x00000002 171#define CPUSTAT_P 0x00000001 172 173struct kvm_s390_sie_block { 174 atomic_t cpuflags; /* 0x0000 */ 175 __u32 : 1; /* 0x0004 */ 176 __u32 prefix : 18; 177 __u32 : 1; 178 __u32 ibc : 12; 179 __u8 reserved08[4]; /* 0x0008 */ 180#define PROG_IN_SIE (1<<0) 181 __u32 prog0c; /* 0x000c */ 182 union { 183 __u8 reserved10[16]; /* 0x0010 */ 184 struct { 185 __u64 pv_handle_cpu; 186 __u64 pv_handle_config; 187 }; 188 }; 189#define PROG_BLOCK_SIE (1<<0) 190#define PROG_REQUEST (1<<1) 191 atomic_t prog20; /* 0x0020 */ 192 __u8 reserved24[4]; /* 0x0024 */ 193 __u64 cputm; /* 0x0028 */ 194 __u64 ckc; /* 0x0030 */ 195 __u64 epoch; /* 0x0038 */ 196 __u32 svcc; /* 0x0040 */ 197#define LCTL_CR0 0x8000 198#define LCTL_CR6 0x0200 199#define LCTL_CR9 0x0040 200#define LCTL_CR10 0x0020 201#define LCTL_CR11 0x0010 202#define LCTL_CR14 0x0002 203 __u16 lctl; /* 0x0044 */ 204 __s16 icpua; /* 0x0046 */ 205#define ICTL_OPEREXC 0x80000000 206#define ICTL_PINT 0x20000000 207#define ICTL_LPSW 0x00400000 208#define ICTL_STCTL 0x00040000 209#define ICTL_ISKE 0x00004000 210#define ICTL_SSKE 0x00002000 211#define ICTL_RRBE 0x00001000 212#define ICTL_TPROT 0x00000200 213 __u32 ictl; /* 0x0048 */ 214#define ECA_CEI 0x80000000 215#define ECA_IB 0x40000000 216#define ECA_SIGPI 0x10000000 217#define ECA_MVPGI 0x01000000 218#define ECA_AIV 0x00200000 219#define ECA_VX 0x00020000 220#define ECA_PROTEXCI 0x00002000 221#define ECA_APIE 0x00000008 222#define ECA_SII 0x00000001 223 __u32 eca; /* 0x004c */ 224#define ICPT_INST 0x04 225#define ICPT_PROGI 0x08 226#define ICPT_INSTPROGI 0x0C 227#define ICPT_EXTREQ 0x10 228#define ICPT_EXTINT 0x14 229#define ICPT_IOREQ 0x18 230#define ICPT_WAIT 0x1c 231#define ICPT_VALIDITY 0x20 232#define ICPT_STOP 0x28 233#define ICPT_OPEREXC 0x2C 234#define ICPT_PARTEXEC 0x38 235#define ICPT_IOINST 0x40 236#define ICPT_KSS 0x5c 237#define ICPT_MCHKREQ 0x60 238#define ICPT_INT_ENABLE 0x64 239#define ICPT_PV_INSTR 0x68 240#define ICPT_PV_NOTIFY 0x6c 241#define ICPT_PV_PREF 0x70 242 __u8 icptcode; /* 0x0050 */ 243 __u8 icptstatus; /* 0x0051 */ 244 __u16 ihcpu; /* 0x0052 */ 245 __u8 reserved54; /* 0x0054 */ 246#define IICTL_CODE_NONE 0x00 247#define IICTL_CODE_MCHK 0x01 248#define IICTL_CODE_EXT 0x02 249#define IICTL_CODE_IO 0x03 250#define IICTL_CODE_RESTART 0x04 251#define IICTL_CODE_SPECIFICATION 0x10 252#define IICTL_CODE_OPERAND 0x11 253 __u8 iictl; /* 0x0055 */ 254 __u16 ipa; /* 0x0056 */ 255 __u32 ipb; /* 0x0058 */ 256 __u32 scaoh; /* 0x005c */ 257#define FPF_BPBC 0x20 258 __u8 fpf; /* 0x0060 */ 259#define ECB_GS 0x40 260#define ECB_TE 0x10 261#define ECB_SPECI 0x08 262#define ECB_SRSI 0x04 263#define ECB_HOSTPROTINT 0x02 264#define ECB_PTF 0x01 265 __u8 ecb; /* 0x0061 */ 266#define ECB2_CMMA 0x80 267#define ECB2_IEP 0x20 268#define ECB2_PFMFI 0x08 269#define ECB2_ESCA 0x04 270#define ECB2_ZPCI_LSI 0x02 271 __u8 ecb2; /* 0x0062 */ 272#define ECB3_AISI 0x20 273#define ECB3_AISII 0x10 274#define ECB3_DEA 0x08 275#define ECB3_AES 0x04 276#define ECB3_RI 0x01 277 __u8 ecb3; /* 0x0063 */ 278#define ESCA_SCAOL_MASK ~0x3fU 279 __u32 scaol; /* 0x0064 */ 280 __u8 sdf; /* 0x0068 */ 281 __u8 epdx; /* 0x0069 */ 282 __u8 cpnc; /* 0x006a */ 283 __u8 reserved6b; /* 0x006b */ 284 __u32 todpr; /* 0x006c */ 285#define GISA_FORMAT1 0x00000001 286 __u32 gd; /* 0x0070 */ 287 __u8 reserved74[12]; /* 0x0074 */ 288 __u64 mso; /* 0x0080 */ 289 __u64 msl; /* 0x0088 */ 290 psw_t gpsw; /* 0x0090 */ 291 __u64 gg14; /* 0x00a0 */ 292 __u64 gg15; /* 0x00a8 */ 293 __u8 reservedb0[8]; /* 0x00b0 */ 294#define HPID_KVM 0x4 295#define HPID_VSIE 0x5 296 __u8 hpid; /* 0x00b8 */ 297 __u8 reservedb9[7]; /* 0x00b9 */ 298 union { 299 struct { 300 __u32 eiparams; /* 0x00c0 */ 301 __u16 extcpuaddr; /* 0x00c4 */ 302 __u16 eic; /* 0x00c6 */ 303 }; 304 __u64 mcic; /* 0x00c0 */ 305 } __packed; 306 __u32 reservedc8; /* 0x00c8 */ 307 union { 308 struct { 309 __u16 pgmilc; /* 0x00cc */ 310 __u16 iprcc; /* 0x00ce */ 311 }; 312 __u32 edc; /* 0x00cc */ 313 } __packed; 314 union { 315 struct { 316 __u32 dxc; /* 0x00d0 */ 317 __u16 mcn; /* 0x00d4 */ 318 __u8 perc; /* 0x00d6 */ 319 __u8 peratmid; /* 0x00d7 */ 320 }; 321 __u64 faddr; /* 0x00d0 */ 322 } __packed; 323 __u64 peraddr; /* 0x00d8 */ 324 __u8 eai; /* 0x00e0 */ 325 __u8 peraid; /* 0x00e1 */ 326 __u8 oai; /* 0x00e2 */ 327 __u8 armid; /* 0x00e3 */ 328 __u8 reservede4[4]; /* 0x00e4 */ 329 union { 330 __u64 tecmc; /* 0x00e8 */ 331 struct { 332 __u16 subchannel_id; /* 0x00e8 */ 333 __u16 subchannel_nr; /* 0x00ea */ 334 __u32 io_int_parm; /* 0x00ec */ 335 __u32 io_int_word; /* 0x00f0 */ 336 }; 337 } __packed; 338 __u8 reservedf4[8]; /* 0x00f4 */ 339#define CRYCB_FORMAT_MASK 0x00000003 340#define CRYCB_FORMAT0 0x00000000 341#define CRYCB_FORMAT1 0x00000001 342#define CRYCB_FORMAT2 0x00000003 343 __u32 crycbd; /* 0x00fc */ 344 __u64 gcr[16]; /* 0x0100 */ 345 union { 346 __u64 gbea; /* 0x0180 */ 347 __u64 sidad; 348 }; 349 __u8 reserved188[8]; /* 0x0188 */ 350 __u64 sdnxo; /* 0x0190 */ 351 __u8 reserved198[8]; /* 0x0198 */ 352 __u32 fac; /* 0x01a0 */ 353 __u8 reserved1a4[20]; /* 0x01a4 */ 354 __u64 cbrlo; /* 0x01b8 */ 355 __u8 reserved1c0[8]; /* 0x01c0 */ 356#define ECD_HOSTREGMGMT 0x20000000 357#define ECD_MEF 0x08000000 358#define ECD_ETOKENF 0x02000000 359#define ECD_ECC 0x00200000 360 __u32 ecd; /* 0x01c8 */ 361 __u8 reserved1cc[18]; /* 0x01cc */ 362 __u64 pp; /* 0x01de */ 363 __u8 reserved1e6[2]; /* 0x01e6 */ 364 __u64 itdba; /* 0x01e8 */ 365 __u64 riccbd; /* 0x01f0 */ 366 __u64 gvrd; /* 0x01f8 */ 367} __packed __aligned(512); 368 369struct kvm_s390_itdb { 370 __u8 data[256]; 371}; 372 373struct sie_page { 374 struct kvm_s390_sie_block sie_block; 375 struct mcck_volatile_info mcck_info; /* 0x0200 */ 376 __u8 reserved218[360]; /* 0x0218 */ 377 __u64 pv_grregs[16]; /* 0x0380 */ 378 __u8 reserved400[512]; /* 0x0400 */ 379 struct kvm_s390_itdb itdb; /* 0x0600 */ 380 __u8 reserved700[2304]; /* 0x0700 */ 381}; 382 383struct kvm_vcpu_stat { 384 struct kvm_vcpu_stat_generic generic; 385 u64 exit_userspace; 386 u64 exit_null; 387 u64 exit_external_request; 388 u64 exit_io_request; 389 u64 exit_external_interrupt; 390 u64 exit_stop_request; 391 u64 exit_validity; 392 u64 exit_instruction; 393 u64 exit_pei; 394 u64 halt_no_poll_steal; 395 u64 instruction_lctl; 396 u64 instruction_lctlg; 397 u64 instruction_stctl; 398 u64 instruction_stctg; 399 u64 exit_program_interruption; 400 u64 exit_instr_and_program; 401 u64 exit_operation_exception; 402 u64 deliver_ckc; 403 u64 deliver_cputm; 404 u64 deliver_external_call; 405 u64 deliver_emergency_signal; 406 u64 deliver_service_signal; 407 u64 deliver_virtio; 408 u64 deliver_stop_signal; 409 u64 deliver_prefix_signal; 410 u64 deliver_restart_signal; 411 u64 deliver_program; 412 u64 deliver_io; 413 u64 deliver_machine_check; 414 u64 exit_wait_state; 415 u64 inject_ckc; 416 u64 inject_cputm; 417 u64 inject_external_call; 418 u64 inject_emergency_signal; 419 u64 inject_mchk; 420 u64 inject_pfault_init; 421 u64 inject_program; 422 u64 inject_restart; 423 u64 inject_set_prefix; 424 u64 inject_stop_signal; 425 u64 instruction_epsw; 426 u64 instruction_gs; 427 u64 instruction_io_other; 428 u64 instruction_lpsw; 429 u64 instruction_lpswe; 430 u64 instruction_pfmf; 431 u64 instruction_ptff; 432 u64 instruction_sck; 433 u64 instruction_sckpf; 434 u64 instruction_stidp; 435 u64 instruction_spx; 436 u64 instruction_stpx; 437 u64 instruction_stap; 438 u64 instruction_iske; 439 u64 instruction_ri; 440 u64 instruction_rrbe; 441 u64 instruction_sske; 442 u64 instruction_ipte_interlock; 443 u64 instruction_stsi; 444 u64 instruction_stfl; 445 u64 instruction_tb; 446 u64 instruction_tpi; 447 u64 instruction_tprot; 448 u64 instruction_tsch; 449 u64 instruction_sie; 450 u64 instruction_essa; 451 u64 instruction_sthyi; 452 u64 instruction_sigp_sense; 453 u64 instruction_sigp_sense_running; 454 u64 instruction_sigp_external_call; 455 u64 instruction_sigp_emergency; 456 u64 instruction_sigp_cond_emergency; 457 u64 instruction_sigp_start; 458 u64 instruction_sigp_stop; 459 u64 instruction_sigp_stop_store_status; 460 u64 instruction_sigp_store_status; 461 u64 instruction_sigp_store_adtl_status; 462 u64 instruction_sigp_arch; 463 u64 instruction_sigp_prefix; 464 u64 instruction_sigp_restart; 465 u64 instruction_sigp_init_cpu_reset; 466 u64 instruction_sigp_cpu_reset; 467 u64 instruction_sigp_unknown; 468 u64 instruction_diagnose_10; 469 u64 instruction_diagnose_44; 470 u64 instruction_diagnose_9c; 471 u64 diag_9c_ignored; 472 u64 diag_9c_forward; 473 u64 instruction_diagnose_258; 474 u64 instruction_diagnose_308; 475 u64 instruction_diagnose_500; 476 u64 instruction_diagnose_other; 477 u64 pfault_sync; 478}; 479 480#define PGM_OPERATION 0x01 481#define PGM_PRIVILEGED_OP 0x02 482#define PGM_EXECUTE 0x03 483#define PGM_PROTECTION 0x04 484#define PGM_ADDRESSING 0x05 485#define PGM_SPECIFICATION 0x06 486#define PGM_DATA 0x07 487#define PGM_FIXED_POINT_OVERFLOW 0x08 488#define PGM_FIXED_POINT_DIVIDE 0x09 489#define PGM_DECIMAL_OVERFLOW 0x0a 490#define PGM_DECIMAL_DIVIDE 0x0b 491#define PGM_HFP_EXPONENT_OVERFLOW 0x0c 492#define PGM_HFP_EXPONENT_UNDERFLOW 0x0d 493#define PGM_HFP_SIGNIFICANCE 0x0e 494#define PGM_HFP_DIVIDE 0x0f 495#define PGM_SEGMENT_TRANSLATION 0x10 496#define PGM_PAGE_TRANSLATION 0x11 497#define PGM_TRANSLATION_SPEC 0x12 498#define PGM_SPECIAL_OPERATION 0x13 499#define PGM_OPERAND 0x15 500#define PGM_TRACE_TABEL 0x16 501#define PGM_VECTOR_PROCESSING 0x1b 502#define PGM_SPACE_SWITCH 0x1c 503#define PGM_HFP_SQUARE_ROOT 0x1d 504#define PGM_PC_TRANSLATION_SPEC 0x1f 505#define PGM_AFX_TRANSLATION 0x20 506#define PGM_ASX_TRANSLATION 0x21 507#define PGM_LX_TRANSLATION 0x22 508#define PGM_EX_TRANSLATION 0x23 509#define PGM_PRIMARY_AUTHORITY 0x24 510#define PGM_SECONDARY_AUTHORITY 0x25 511#define PGM_LFX_TRANSLATION 0x26 512#define PGM_LSX_TRANSLATION 0x27 513#define PGM_ALET_SPECIFICATION 0x28 514#define PGM_ALEN_TRANSLATION 0x29 515#define PGM_ALE_SEQUENCE 0x2a 516#define PGM_ASTE_VALIDITY 0x2b 517#define PGM_ASTE_SEQUENCE 0x2c 518#define PGM_EXTENDED_AUTHORITY 0x2d 519#define PGM_LSTE_SEQUENCE 0x2e 520#define PGM_ASTE_INSTANCE 0x2f 521#define PGM_STACK_FULL 0x30 522#define PGM_STACK_EMPTY 0x31 523#define PGM_STACK_SPECIFICATION 0x32 524#define PGM_STACK_TYPE 0x33 525#define PGM_STACK_OPERATION 0x34 526#define PGM_ASCE_TYPE 0x38 527#define PGM_REGION_FIRST_TRANS 0x39 528#define PGM_REGION_SECOND_TRANS 0x3a 529#define PGM_REGION_THIRD_TRANS 0x3b 530#define PGM_MONITOR 0x40 531#define PGM_PER 0x80 532#define PGM_CRYPTO_OPERATION 0x119 533 534/* irq types in ascend order of priorities */ 535enum irq_types { 536 IRQ_PEND_SET_PREFIX = 0, 537 IRQ_PEND_RESTART, 538 IRQ_PEND_SIGP_STOP, 539 IRQ_PEND_IO_ISC_7, 540 IRQ_PEND_IO_ISC_6, 541 IRQ_PEND_IO_ISC_5, 542 IRQ_PEND_IO_ISC_4, 543 IRQ_PEND_IO_ISC_3, 544 IRQ_PEND_IO_ISC_2, 545 IRQ_PEND_IO_ISC_1, 546 IRQ_PEND_IO_ISC_0, 547 IRQ_PEND_VIRTIO, 548 IRQ_PEND_PFAULT_DONE, 549 IRQ_PEND_PFAULT_INIT, 550 IRQ_PEND_EXT_HOST, 551 IRQ_PEND_EXT_SERVICE, 552 IRQ_PEND_EXT_SERVICE_EV, 553 IRQ_PEND_EXT_TIMING, 554 IRQ_PEND_EXT_CPU_TIMER, 555 IRQ_PEND_EXT_CLOCK_COMP, 556 IRQ_PEND_EXT_EXTERNAL, 557 IRQ_PEND_EXT_EMERGENCY, 558 IRQ_PEND_EXT_MALFUNC, 559 IRQ_PEND_EXT_IRQ_KEY, 560 IRQ_PEND_MCHK_REP, 561 IRQ_PEND_PROG, 562 IRQ_PEND_SVC, 563 IRQ_PEND_MCHK_EX, 564 IRQ_PEND_COUNT 565}; 566 567/* We have 2M for virtio device descriptor pages. Smallest amount of 568 * memory per page is 24 bytes (1 queue), so (2048*1024) / 24 = 87381 569 */ 570#define KVM_S390_MAX_VIRTIO_IRQS 87381 571 572/* 573 * Repressible (non-floating) machine check interrupts 574 * subclass bits in MCIC 575 */ 576#define MCHK_EXTD_BIT 58 577#define MCHK_DEGR_BIT 56 578#define MCHK_WARN_BIT 55 579#define MCHK_REP_MASK ((1UL << MCHK_DEGR_BIT) | \ 580 (1UL << MCHK_EXTD_BIT) | \ 581 (1UL << MCHK_WARN_BIT)) 582 583/* Exigent machine check interrupts subclass bits in MCIC */ 584#define MCHK_SD_BIT 63 585#define MCHK_PD_BIT 62 586#define MCHK_EX_MASK ((1UL << MCHK_SD_BIT) | (1UL << MCHK_PD_BIT)) 587 588#define IRQ_PEND_EXT_MASK ((1UL << IRQ_PEND_EXT_IRQ_KEY) | \ 589 (1UL << IRQ_PEND_EXT_CLOCK_COMP) | \ 590 (1UL << IRQ_PEND_EXT_CPU_TIMER) | \ 591 (1UL << IRQ_PEND_EXT_MALFUNC) | \ 592 (1UL << IRQ_PEND_EXT_EMERGENCY) | \ 593 (1UL << IRQ_PEND_EXT_EXTERNAL) | \ 594 (1UL << IRQ_PEND_EXT_TIMING) | \ 595 (1UL << IRQ_PEND_EXT_HOST) | \ 596 (1UL << IRQ_PEND_EXT_SERVICE) | \ 597 (1UL << IRQ_PEND_EXT_SERVICE_EV) | \ 598 (1UL << IRQ_PEND_VIRTIO) | \ 599 (1UL << IRQ_PEND_PFAULT_INIT) | \ 600 (1UL << IRQ_PEND_PFAULT_DONE)) 601 602#define IRQ_PEND_IO_MASK ((1UL << IRQ_PEND_IO_ISC_0) | \ 603 (1UL << IRQ_PEND_IO_ISC_1) | \ 604 (1UL << IRQ_PEND_IO_ISC_2) | \ 605 (1UL << IRQ_PEND_IO_ISC_3) | \ 606 (1UL << IRQ_PEND_IO_ISC_4) | \ 607 (1UL << IRQ_PEND_IO_ISC_5) | \ 608 (1UL << IRQ_PEND_IO_ISC_6) | \ 609 (1UL << IRQ_PEND_IO_ISC_7)) 610 611#define IRQ_PEND_MCHK_MASK ((1UL << IRQ_PEND_MCHK_REP) | \ 612 (1UL << IRQ_PEND_MCHK_EX)) 613 614#define IRQ_PEND_EXT_II_MASK ((1UL << IRQ_PEND_EXT_CPU_TIMER) | \ 615 (1UL << IRQ_PEND_EXT_CLOCK_COMP) | \ 616 (1UL << IRQ_PEND_EXT_EMERGENCY) | \ 617 (1UL << IRQ_PEND_EXT_EXTERNAL) | \ 618 (1UL << IRQ_PEND_EXT_SERVICE) | \ 619 (1UL << IRQ_PEND_EXT_SERVICE_EV)) 620 621struct kvm_s390_interrupt_info { 622 struct list_head list; 623 u64 type; 624 union { 625 struct kvm_s390_io_info io; 626 struct kvm_s390_ext_info ext; 627 struct kvm_s390_pgm_info pgm; 628 struct kvm_s390_emerg_info emerg; 629 struct kvm_s390_extcall_info extcall; 630 struct kvm_s390_prefix_info prefix; 631 struct kvm_s390_stop_info stop; 632 struct kvm_s390_mchk_info mchk; 633 }; 634}; 635 636struct kvm_s390_irq_payload { 637 struct kvm_s390_io_info io; 638 struct kvm_s390_ext_info ext; 639 struct kvm_s390_pgm_info pgm; 640 struct kvm_s390_emerg_info emerg; 641 struct kvm_s390_extcall_info extcall; 642 struct kvm_s390_prefix_info prefix; 643 struct kvm_s390_stop_info stop; 644 struct kvm_s390_mchk_info mchk; 645}; 646 647struct kvm_s390_local_interrupt { 648 spinlock_t lock; 649 DECLARE_BITMAP(sigp_emerg_pending, KVM_MAX_VCPUS); 650 struct kvm_s390_irq_payload irq; 651 unsigned long pending_irqs; 652}; 653 654#define FIRQ_LIST_IO_ISC_0 0 655#define FIRQ_LIST_IO_ISC_1 1 656#define FIRQ_LIST_IO_ISC_2 2 657#define FIRQ_LIST_IO_ISC_3 3 658#define FIRQ_LIST_IO_ISC_4 4 659#define FIRQ_LIST_IO_ISC_5 5 660#define FIRQ_LIST_IO_ISC_6 6 661#define FIRQ_LIST_IO_ISC_7 7 662#define FIRQ_LIST_PFAULT 8 663#define FIRQ_LIST_VIRTIO 9 664#define FIRQ_LIST_COUNT 10 665#define FIRQ_CNTR_IO 0 666#define FIRQ_CNTR_SERVICE 1 667#define FIRQ_CNTR_VIRTIO 2 668#define FIRQ_CNTR_PFAULT 3 669#define FIRQ_MAX_COUNT 4 670 671/* mask the AIS mode for a given ISC */ 672#define AIS_MODE_MASK(isc) (0x80 >> isc) 673 674#define KVM_S390_AIS_MODE_ALL 0 675#define KVM_S390_AIS_MODE_SINGLE 1 676 677struct kvm_s390_float_interrupt { 678 unsigned long pending_irqs; 679 unsigned long masked_irqs; 680 spinlock_t lock; 681 struct list_head lists[FIRQ_LIST_COUNT]; 682 int counters[FIRQ_MAX_COUNT]; 683 struct kvm_s390_mchk_info mchk; 684 struct kvm_s390_ext_info srv_signal; 685 int next_rr_cpu; 686 struct mutex ais_lock; 687 u8 simm; 688 u8 nimm; 689}; 690 691struct kvm_hw_wp_info_arch { 692 unsigned long addr; 693 unsigned long phys_addr; 694 int len; 695 char *old_data; 696}; 697 698struct kvm_hw_bp_info_arch { 699 unsigned long addr; 700 int len; 701}; 702 703/* 704 * Only the upper 16 bits of kvm_guest_debug->control are arch specific. 705 * Further KVM_GUESTDBG flags which an be used from userspace can be found in 706 * arch/s390/include/uapi/asm/kvm.h 707 */ 708#define KVM_GUESTDBG_EXIT_PENDING 0x10000000 709 710#define guestdbg_enabled(vcpu) \ 711 (vcpu->guest_debug & KVM_GUESTDBG_ENABLE) 712#define guestdbg_sstep_enabled(vcpu) \ 713 (vcpu->guest_debug & KVM_GUESTDBG_SINGLESTEP) 714#define guestdbg_hw_bp_enabled(vcpu) \ 715 (vcpu->guest_debug & KVM_GUESTDBG_USE_HW_BP) 716#define guestdbg_exit_pending(vcpu) (guestdbg_enabled(vcpu) && \ 717 (vcpu->guest_debug & KVM_GUESTDBG_EXIT_PENDING)) 718 719#define KVM_GUESTDBG_VALID_MASK \ 720 (KVM_GUESTDBG_ENABLE | KVM_GUESTDBG_SINGLESTEP |\ 721 KVM_GUESTDBG_USE_HW_BP | KVM_GUESTDBG_EXIT_PENDING) 722 723struct kvm_guestdbg_info_arch { 724 unsigned long cr0; 725 unsigned long cr9; 726 unsigned long cr10; 727 unsigned long cr11; 728 struct kvm_hw_bp_info_arch *hw_bp_info; 729 struct kvm_hw_wp_info_arch *hw_wp_info; 730 int nr_hw_bp; 731 int nr_hw_wp; 732 unsigned long last_bp; 733}; 734 735struct kvm_s390_pv_vcpu { 736 u64 handle; 737 unsigned long stor_base; 738}; 739 740struct kvm_vcpu_arch { 741 struct kvm_s390_sie_block *sie_block; 742 /* if vsie is active, currently executed shadow sie control block */ 743 struct kvm_s390_sie_block *vsie_block; 744 unsigned int host_acrs[NUM_ACRS]; 745 struct gs_cb *host_gscb; 746 struct kvm_s390_local_interrupt local_int; 747 struct hrtimer ckc_timer; 748 struct kvm_s390_pgm_info pgm; 749 struct gmap *gmap; 750 /* backup location for the currently enabled gmap when scheduled out */ 751 struct gmap *enabled_gmap; 752 struct kvm_guestdbg_info_arch guestdbg; 753 unsigned long pfault_token; 754 unsigned long pfault_select; 755 unsigned long pfault_compare; 756 bool cputm_enabled; 757 /* 758 * The seqcount protects updates to cputm_start and sie_block.cputm, 759 * this way we can have non-blocking reads with consistent values. 760 * Only the owning VCPU thread (vcpu->cpu) is allowed to change these 761 * values and to start/stop/enable/disable cpu timer accounting. 762 */ 763 seqcount_t cputm_seqcount; 764 __u64 cputm_start; 765 bool gs_enabled; 766 bool skey_enabled; 767 /* Indicator if the access registers have been loaded from guest */ 768 bool acrs_loaded; 769 struct kvm_s390_pv_vcpu pv; 770 union diag318_info diag318_info; 771}; 772 773struct kvm_vm_stat { 774 struct kvm_vm_stat_generic generic; 775 u64 inject_io; 776 u64 inject_float_mchk; 777 u64 inject_pfault_done; 778 u64 inject_service_signal; 779 u64 inject_virtio; 780 u64 aen_forward; 781 u64 gmap_shadow_create; 782 u64 gmap_shadow_reuse; 783 u64 gmap_shadow_r1_entry; 784 u64 gmap_shadow_r2_entry; 785 u64 gmap_shadow_r3_entry; 786 u64 gmap_shadow_sg_entry; 787 u64 gmap_shadow_pg_entry; 788}; 789 790struct kvm_arch_memory_slot { 791}; 792 793struct s390_map_info { 794 struct list_head list; 795 __u64 guest_addr; 796 __u64 addr; 797 struct page *page; 798}; 799 800struct s390_io_adapter { 801 unsigned int id; 802 int isc; 803 bool maskable; 804 bool masked; 805 bool swap; 806 bool suppressible; 807}; 808 809#define MAX_S390_IO_ADAPTERS ((MAX_ISC + 1) * 8) 810#define MAX_S390_ADAPTER_MAPS 256 811 812/* maximum size of facilities and facility mask is 2k bytes */ 813#define S390_ARCH_FAC_LIST_SIZE_BYTE (1<<11) 814#define S390_ARCH_FAC_LIST_SIZE_U64 \ 815 (S390_ARCH_FAC_LIST_SIZE_BYTE / sizeof(u64)) 816#define S390_ARCH_FAC_MASK_SIZE_BYTE S390_ARCH_FAC_LIST_SIZE_BYTE 817#define S390_ARCH_FAC_MASK_SIZE_U64 \ 818 (S390_ARCH_FAC_MASK_SIZE_BYTE / sizeof(u64)) 819 820struct kvm_s390_cpu_model { 821 /* facility mask supported by kvm & hosting machine */ 822 __u64 fac_mask[S390_ARCH_FAC_MASK_SIZE_U64]; 823 struct kvm_s390_vm_cpu_subfunc subfuncs; 824 /* facility list requested by guest (in dma page) */ 825 __u64 *fac_list; 826 u64 cpuid; 827 unsigned short ibc; 828 /* subset of available UV-features for pv-guests enabled by user space */ 829 struct kvm_s390_vm_cpu_uv_feat uv_feat_guest; 830}; 831 832typedef int (*crypto_hook)(struct kvm_vcpu *vcpu); 833 834struct kvm_s390_crypto { 835 struct kvm_s390_crypto_cb *crycb; 836 struct rw_semaphore pqap_hook_rwsem; 837 crypto_hook *pqap_hook; 838 __u32 crycbd; 839 __u8 aes_kw; 840 __u8 dea_kw; 841 __u8 apie; 842}; 843 844#define APCB0_MASK_SIZE 1 845struct kvm_s390_apcb0 { 846 __u64 apm[APCB0_MASK_SIZE]; /* 0x0000 */ 847 __u64 aqm[APCB0_MASK_SIZE]; /* 0x0008 */ 848 __u64 adm[APCB0_MASK_SIZE]; /* 0x0010 */ 849 __u64 reserved18; /* 0x0018 */ 850}; 851 852#define APCB1_MASK_SIZE 4 853struct kvm_s390_apcb1 { 854 __u64 apm[APCB1_MASK_SIZE]; /* 0x0000 */ 855 __u64 aqm[APCB1_MASK_SIZE]; /* 0x0020 */ 856 __u64 adm[APCB1_MASK_SIZE]; /* 0x0040 */ 857 __u64 reserved60[4]; /* 0x0060 */ 858}; 859 860struct kvm_s390_crypto_cb { 861 struct kvm_s390_apcb0 apcb0; /* 0x0000 */ 862 __u8 reserved20[0x0048 - 0x0020]; /* 0x0020 */ 863 __u8 dea_wrapping_key_mask[24]; /* 0x0048 */ 864 __u8 aes_wrapping_key_mask[32]; /* 0x0060 */ 865 struct kvm_s390_apcb1 apcb1; /* 0x0080 */ 866}; 867 868struct kvm_s390_gisa { 869 union { 870 struct { /* common to all formats */ 871 u32 next_alert; 872 u8 ipm; 873 u8 reserved01[2]; 874 u8 iam; 875 }; 876 struct { /* format 0 */ 877 u32 next_alert; 878 u8 ipm; 879 u8 reserved01; 880 u8 : 6; 881 u8 g : 1; 882 u8 c : 1; 883 u8 iam; 884 u8 reserved02[4]; 885 u32 airq_count; 886 } g0; 887 struct { /* format 1 */ 888 u32 next_alert; 889 u8 ipm; 890 u8 simm; 891 u8 nimm; 892 u8 iam; 893 u8 aism[8]; 894 u8 : 6; 895 u8 g : 1; 896 u8 c : 1; 897 u8 reserved03[11]; 898 u32 airq_count; 899 } g1; 900 struct { 901 u64 word[4]; 902 } u64; 903 }; 904}; 905 906struct kvm_s390_gib { 907 u32 alert_list_origin; 908 u32 reserved01; 909 u8:5; 910 u8 nisc:3; 911 u8 reserved03[3]; 912 u32 reserved04[5]; 913}; 914 915/* 916 * sie_page2 has to be allocated as DMA because fac_list, crycb and 917 * gisa need 31bit addresses in the sie control block. 918 */ 919struct sie_page2 { 920 __u64 fac_list[S390_ARCH_FAC_LIST_SIZE_U64]; /* 0x0000 */ 921 struct kvm_s390_crypto_cb crycb; /* 0x0800 */ 922 struct kvm_s390_gisa gisa; /* 0x0900 */ 923 struct kvm *kvm; /* 0x0920 */ 924 u8 reserved928[0x1000 - 0x928]; /* 0x0928 */ 925}; 926 927struct kvm_s390_vsie { 928 struct mutex mutex; 929 struct radix_tree_root addr_to_page; 930 int page_count; 931 int next; 932 struct page *pages[KVM_MAX_VCPUS]; 933}; 934 935struct kvm_s390_gisa_iam { 936 u8 mask; 937 spinlock_t ref_lock; 938 u32 ref_count[MAX_ISC + 1]; 939}; 940 941struct kvm_s390_gisa_interrupt { 942 struct kvm_s390_gisa *origin; 943 struct kvm_s390_gisa_iam alert; 944 struct hrtimer timer; 945 u64 expires; 946 DECLARE_BITMAP(kicked_mask, KVM_MAX_VCPUS); 947}; 948 949struct kvm_s390_pv { 950 u64 handle; 951 u64 guest_len; 952 unsigned long stor_base; 953 void *stor_var; 954 bool dumping; 955 void *set_aside; 956 struct list_head need_cleanup; 957 struct mmu_notifier mmu_notifier; 958}; 959 960struct kvm_arch{ 961 void *sca; 962 int use_esca; 963 rwlock_t sca_lock; 964 debug_info_t *dbf; 965 struct kvm_s390_float_interrupt float_int; 966 struct kvm_device *flic; 967 struct gmap *gmap; 968 unsigned long mem_limit; 969 int css_support; 970 int use_irqchip; 971 int use_cmma; 972 int use_pfmfi; 973 int use_skf; 974 int use_zpci_interp; 975 int user_cpu_state_ctrl; 976 int user_sigp; 977 int user_stsi; 978 int user_instr0; 979 struct s390_io_adapter *adapters[MAX_S390_IO_ADAPTERS]; 980 wait_queue_head_t ipte_wq; 981 int ipte_lock_count; 982 struct mutex ipte_mutex; 983 spinlock_t start_stop_lock; 984 struct sie_page2 *sie_page2; 985 struct kvm_s390_cpu_model model; 986 struct kvm_s390_crypto crypto; 987 struct kvm_s390_vsie vsie; 988 u8 epdx; 989 u64 epoch; 990 int migration_mode; 991 atomic64_t cmma_dirty_pages; 992 /* subset of available cpu features enabled by user space */ 993 DECLARE_BITMAP(cpu_feat, KVM_S390_VM_CPU_FEAT_NR_BITS); 994 /* indexed by vcpu_idx */ 995 DECLARE_BITMAP(idle_mask, KVM_MAX_VCPUS); 996 struct kvm_s390_gisa_interrupt gisa_int; 997 struct kvm_s390_pv pv; 998 struct list_head kzdev_list; 999 spinlock_t kzdev_list_lock; 1000}; 1001 1002#define KVM_HVA_ERR_BAD (-1UL) 1003#define KVM_HVA_ERR_RO_BAD (-2UL) 1004 1005static inline bool kvm_is_error_hva(unsigned long addr) 1006{ 1007 return IS_ERR_VALUE(addr); 1008} 1009 1010#define ASYNC_PF_PER_VCPU 64 1011struct kvm_arch_async_pf { 1012 unsigned long pfault_token; 1013}; 1014 1015bool kvm_arch_can_dequeue_async_page_present(struct kvm_vcpu *vcpu); 1016 1017void kvm_arch_async_page_ready(struct kvm_vcpu *vcpu, 1018 struct kvm_async_pf *work); 1019 1020bool kvm_arch_async_page_not_present(struct kvm_vcpu *vcpu, 1021 struct kvm_async_pf *work); 1022 1023void kvm_arch_async_page_present(struct kvm_vcpu *vcpu, 1024 struct kvm_async_pf *work); 1025 1026static inline void kvm_arch_async_page_present_queued(struct kvm_vcpu *vcpu) {} 1027 1028void kvm_arch_crypto_clear_masks(struct kvm *kvm); 1029void kvm_arch_crypto_set_masks(struct kvm *kvm, unsigned long *apm, 1030 unsigned long *aqm, unsigned long *adm); 1031 1032int __sie64a(phys_addr_t sie_block_phys, struct kvm_s390_sie_block *sie_block, u64 *rsa); 1033 1034static inline int sie64a(struct kvm_s390_sie_block *sie_block, u64 *rsa) 1035{ 1036 return __sie64a(virt_to_phys(sie_block), sie_block, rsa); 1037} 1038 1039extern char sie_exit; 1040 1041bool kvm_s390_pv_is_protected(struct kvm *kvm); 1042bool kvm_s390_pv_cpu_is_protected(struct kvm_vcpu *vcpu); 1043 1044extern int kvm_s390_gisc_register(struct kvm *kvm, u32 gisc); 1045extern int kvm_s390_gisc_unregister(struct kvm *kvm, u32 gisc); 1046 1047static inline void kvm_arch_sync_events(struct kvm *kvm) {} 1048static inline void kvm_arch_sched_in(struct kvm_vcpu *vcpu, int cpu) {} 1049static inline void kvm_arch_free_memslot(struct kvm *kvm, 1050 struct kvm_memory_slot *slot) {} 1051static inline void kvm_arch_memslots_updated(struct kvm *kvm, u64 gen) {} 1052static inline void kvm_arch_flush_shadow_all(struct kvm *kvm) {} 1053static inline void kvm_arch_flush_shadow_memslot(struct kvm *kvm, 1054 struct kvm_memory_slot *slot) {} 1055static inline void kvm_arch_vcpu_blocking(struct kvm_vcpu *vcpu) {} 1056static inline void kvm_arch_vcpu_unblocking(struct kvm_vcpu *vcpu) {} 1057 1058#define __KVM_HAVE_ARCH_VM_FREE 1059void kvm_arch_free_vm(struct kvm *kvm); 1060 1061struct zpci_kvm_hook { 1062 int (*kvm_register)(void *opaque, struct kvm *kvm); 1063 void (*kvm_unregister)(void *opaque); 1064}; 1065 1066extern struct zpci_kvm_hook zpci_kvm_hook; 1067 1068#endif 1069