xref: /openbmc/linux/arch/s390/boot/uv.c (revision 83146efc)
1 // SPDX-License-Identifier: GPL-2.0
2 #include <asm/uv.h>
3 #include <asm/boot_data.h>
4 #include <asm/facility.h>
5 #include <asm/sections.h>
6 
7 #include "boot.h"
8 #include "uv.h"
9 
10 /* will be used in arch/s390/kernel/uv.c */
11 #ifdef CONFIG_PROTECTED_VIRTUALIZATION_GUEST
12 int __bootdata_preserved(prot_virt_guest);
13 #endif
14 #if IS_ENABLED(CONFIG_KVM)
15 int __bootdata_preserved(prot_virt_host);
16 #endif
17 struct uv_info __bootdata_preserved(uv_info);
18 
19 void uv_query_info(void)
20 {
21 	struct uv_cb_qui uvcb = {
22 		.header.cmd = UVC_CMD_QUI,
23 		.header.len = sizeof(uvcb)
24 	};
25 
26 	if (!test_facility(158))
27 		return;
28 
29 	/* rc==0x100 means that there is additional data we do not process */
30 	if (uv_call(0, (uint64_t)&uvcb) && uvcb.header.rc != 0x100)
31 		return;
32 
33 	if (IS_ENABLED(CONFIG_KVM)) {
34 		memcpy(uv_info.inst_calls_list, uvcb.inst_calls_list, sizeof(uv_info.inst_calls_list));
35 		uv_info.uv_base_stor_len = uvcb.uv_base_stor_len;
36 		uv_info.guest_base_stor_len = uvcb.conf_base_phys_stor_len;
37 		uv_info.guest_virt_base_stor_len = uvcb.conf_base_virt_stor_len;
38 		uv_info.guest_virt_var_stor_len = uvcb.conf_virt_var_stor_len;
39 		uv_info.guest_cpu_stor_len = uvcb.cpu_stor_len;
40 		uv_info.max_sec_stor_addr = ALIGN(uvcb.max_guest_stor_addr, PAGE_SIZE);
41 		uv_info.max_num_sec_conf = uvcb.max_num_sec_conf;
42 		uv_info.max_guest_cpu_id = uvcb.max_guest_cpu_id;
43 		uv_info.uv_feature_indications = uvcb.uv_feature_indications;
44 		uv_info.supp_se_hdr_ver = uvcb.supp_se_hdr_versions;
45 		uv_info.supp_se_hdr_pcf = uvcb.supp_se_hdr_pcf;
46 		uv_info.conf_dump_storage_state_len = uvcb.conf_dump_storage_state_len;
47 		uv_info.conf_dump_finalize_len = uvcb.conf_dump_finalize_len;
48 		uv_info.supp_att_req_hdr_ver = uvcb.supp_att_req_hdr_ver;
49 		uv_info.supp_att_pflags = uvcb.supp_att_pflags;
50 		uv_info.supp_add_secret_req_ver = uvcb.supp_add_secret_req_ver;
51 		uv_info.supp_add_secret_pcf = uvcb.supp_add_secret_pcf;
52 		uv_info.supp_secret_types = uvcb.supp_secret_types;
53 		uv_info.max_secrets = uvcb.max_secrets;
54 	}
55 
56 #ifdef CONFIG_PROTECTED_VIRTUALIZATION_GUEST
57 	if (test_bit_inv(BIT_UVC_CMD_SET_SHARED_ACCESS, (unsigned long *)uvcb.inst_calls_list) &&
58 	    test_bit_inv(BIT_UVC_CMD_REMOVE_SHARED_ACCESS, (unsigned long *)uvcb.inst_calls_list))
59 		prot_virt_guest = 1;
60 #endif
61 }
62 
63 #if IS_ENABLED(CONFIG_KVM)
64 unsigned long adjust_to_uv_max(unsigned long limit)
65 {
66 	if (is_prot_virt_host() && uv_info.max_sec_stor_addr)
67 		limit = min_t(unsigned long, limit, uv_info.max_sec_stor_addr);
68 	return limit;
69 }
70 
71 static int is_prot_virt_host_capable(void)
72 {
73 	/* disable if no prot_virt=1 given on command-line */
74 	if (!is_prot_virt_host())
75 		return 0;
76 	/* disable if protected guest virtualization is enabled */
77 	if (is_prot_virt_guest())
78 		return 0;
79 	/* disable if no hardware support */
80 	if (!test_facility(158))
81 		return 0;
82 	/* disable if kdump */
83 	if (oldmem_data.start)
84 		return 0;
85 	/* disable if stand-alone dump */
86 	if (ipl_block_valid && is_ipl_block_dump())
87 		return 0;
88 	return 1;
89 }
90 
91 void sanitize_prot_virt_host(void)
92 {
93 	prot_virt_host = is_prot_virt_host_capable();
94 }
95 #endif
96