1 /* SPDX-License-Identifier: GPL-2.0 */ 2 /* 3 * definition for kernel virtual machines on s390 4 * 5 * Copyright IBM Corp. 2008, 2018 6 * 7 * Author(s): Carsten Otte <cotte@de.ibm.com> 8 */ 9 10 11 #ifndef ASM_KVM_HOST_H 12 #define ASM_KVM_HOST_H 13 14 #include <linux/types.h> 15 #include <linux/hrtimer.h> 16 #include <linux/interrupt.h> 17 #include <linux/kvm_types.h> 18 #include <linux/kvm_host.h> 19 #include <linux/kvm.h> 20 #include <linux/seqlock.h> 21 #include <asm/debug.h> 22 #include <asm/cpu.h> 23 #include <asm/fpu/api.h> 24 #include <asm/isc.h> 25 #include <asm/guarded_storage.h> 26 27 #define KVM_S390_BSCA_CPU_SLOTS 64 28 #define KVM_S390_ESCA_CPU_SLOTS 248 29 #define KVM_MAX_VCPUS 255 30 #define KVM_USER_MEM_SLOTS 32 31 32 /* 33 * These seem to be used for allocating ->chip in the routing table, 34 * which we don't use. 4096 is an out-of-thin-air value. If we need 35 * to look at ->chip later on, we'll need to revisit this. 36 */ 37 #define KVM_NR_IRQCHIPS 1 38 #define KVM_IRQCHIP_NUM_PINS 4096 39 #define KVM_HALT_POLL_NS_DEFAULT 80000 40 41 /* s390-specific vcpu->requests bit members */ 42 #define KVM_REQ_ENABLE_IBS KVM_ARCH_REQ(0) 43 #define KVM_REQ_DISABLE_IBS KVM_ARCH_REQ(1) 44 #define KVM_REQ_ICPT_OPEREXC KVM_ARCH_REQ(2) 45 #define KVM_REQ_START_MIGRATION KVM_ARCH_REQ(3) 46 #define KVM_REQ_STOP_MIGRATION KVM_ARCH_REQ(4) 47 48 #define SIGP_CTRL_C 0x80 49 #define SIGP_CTRL_SCN_MASK 0x3f 50 51 union bsca_sigp_ctrl { 52 __u8 value; 53 struct { 54 __u8 c : 1; 55 __u8 r : 1; 56 __u8 scn : 6; 57 }; 58 }; 59 60 union esca_sigp_ctrl { 61 __u16 value; 62 struct { 63 __u8 c : 1; 64 __u8 reserved: 7; 65 __u8 scn; 66 }; 67 }; 68 69 struct esca_entry { 70 union esca_sigp_ctrl sigp_ctrl; 71 __u16 reserved1[3]; 72 __u64 sda; 73 __u64 reserved2[6]; 74 }; 75 76 struct bsca_entry { 77 __u8 reserved0; 78 union bsca_sigp_ctrl sigp_ctrl; 79 __u16 reserved[3]; 80 __u64 sda; 81 __u64 reserved2[2]; 82 }; 83 84 union ipte_control { 85 unsigned long val; 86 struct { 87 unsigned long k : 1; 88 unsigned long kh : 31; 89 unsigned long kg : 32; 90 }; 91 }; 92 93 struct bsca_block { 94 union ipte_control ipte_control; 95 __u64 reserved[5]; 96 __u64 mcn; 97 __u64 reserved2; 98 struct bsca_entry cpu[KVM_S390_BSCA_CPU_SLOTS]; 99 }; 100 101 struct esca_block { 102 union ipte_control ipte_control; 103 __u64 reserved1[7]; 104 __u64 mcn[4]; 105 __u64 reserved2[20]; 106 struct esca_entry cpu[KVM_S390_ESCA_CPU_SLOTS]; 107 }; 108 109 /* 110 * This struct is used to store some machine check info from lowcore 111 * for machine checks that happen while the guest is running. 112 * This info in host's lowcore might be overwritten by a second machine 113 * check from host when host is in the machine check's high-level handling. 114 * The size is 24 bytes. 115 */ 116 struct mcck_volatile_info { 117 __u64 mcic; 118 __u64 failing_storage_address; 119 __u32 ext_damage_code; 120 __u32 reserved; 121 }; 122 123 #define CPUSTAT_STOPPED 0x80000000 124 #define CPUSTAT_WAIT 0x10000000 125 #define CPUSTAT_ECALL_PEND 0x08000000 126 #define CPUSTAT_STOP_INT 0x04000000 127 #define CPUSTAT_IO_INT 0x02000000 128 #define CPUSTAT_EXT_INT 0x01000000 129 #define CPUSTAT_RUNNING 0x00800000 130 #define CPUSTAT_RETAINED 0x00400000 131 #define CPUSTAT_TIMING_SUB 0x00020000 132 #define CPUSTAT_SIE_SUB 0x00010000 133 #define CPUSTAT_RRF 0x00008000 134 #define CPUSTAT_SLSV 0x00004000 135 #define CPUSTAT_SLSR 0x00002000 136 #define CPUSTAT_ZARCH 0x00000800 137 #define CPUSTAT_MCDS 0x00000100 138 #define CPUSTAT_KSS 0x00000200 139 #define CPUSTAT_SM 0x00000080 140 #define CPUSTAT_IBS 0x00000040 141 #define CPUSTAT_GED2 0x00000010 142 #define CPUSTAT_G 0x00000008 143 #define CPUSTAT_GED 0x00000004 144 #define CPUSTAT_J 0x00000002 145 #define CPUSTAT_P 0x00000001 146 147 struct kvm_s390_sie_block { 148 atomic_t cpuflags; /* 0x0000 */ 149 __u32 : 1; /* 0x0004 */ 150 __u32 prefix : 18; 151 __u32 : 1; 152 __u32 ibc : 12; 153 __u8 reserved08[4]; /* 0x0008 */ 154 #define PROG_IN_SIE (1<<0) 155 __u32 prog0c; /* 0x000c */ 156 __u8 reserved10[16]; /* 0x0010 */ 157 #define PROG_BLOCK_SIE (1<<0) 158 #define PROG_REQUEST (1<<1) 159 atomic_t prog20; /* 0x0020 */ 160 __u8 reserved24[4]; /* 0x0024 */ 161 __u64 cputm; /* 0x0028 */ 162 __u64 ckc; /* 0x0030 */ 163 __u64 epoch; /* 0x0038 */ 164 __u32 svcc; /* 0x0040 */ 165 #define LCTL_CR0 0x8000 166 #define LCTL_CR6 0x0200 167 #define LCTL_CR9 0x0040 168 #define LCTL_CR10 0x0020 169 #define LCTL_CR11 0x0010 170 #define LCTL_CR14 0x0002 171 __u16 lctl; /* 0x0044 */ 172 __s16 icpua; /* 0x0046 */ 173 #define ICTL_OPEREXC 0x80000000 174 #define ICTL_PINT 0x20000000 175 #define ICTL_LPSW 0x00400000 176 #define ICTL_STCTL 0x00040000 177 #define ICTL_ISKE 0x00004000 178 #define ICTL_SSKE 0x00002000 179 #define ICTL_RRBE 0x00001000 180 #define ICTL_TPROT 0x00000200 181 __u32 ictl; /* 0x0048 */ 182 #define ECA_CEI 0x80000000 183 #define ECA_IB 0x40000000 184 #define ECA_SIGPI 0x10000000 185 #define ECA_MVPGI 0x01000000 186 #define ECA_AIV 0x00200000 187 #define ECA_VX 0x00020000 188 #define ECA_PROTEXCI 0x00002000 189 #define ECA_SII 0x00000001 190 __u32 eca; /* 0x004c */ 191 #define ICPT_INST 0x04 192 #define ICPT_PROGI 0x08 193 #define ICPT_INSTPROGI 0x0C 194 #define ICPT_EXTREQ 0x10 195 #define ICPT_EXTINT 0x14 196 #define ICPT_IOREQ 0x18 197 #define ICPT_WAIT 0x1c 198 #define ICPT_VALIDITY 0x20 199 #define ICPT_STOP 0x28 200 #define ICPT_OPEREXC 0x2C 201 #define ICPT_PARTEXEC 0x38 202 #define ICPT_IOINST 0x40 203 #define ICPT_KSS 0x5c 204 __u8 icptcode; /* 0x0050 */ 205 __u8 icptstatus; /* 0x0051 */ 206 __u16 ihcpu; /* 0x0052 */ 207 __u8 reserved54[2]; /* 0x0054 */ 208 __u16 ipa; /* 0x0056 */ 209 __u32 ipb; /* 0x0058 */ 210 __u32 scaoh; /* 0x005c */ 211 #define FPF_BPBC 0x20 212 __u8 fpf; /* 0x0060 */ 213 #define ECB_GS 0x40 214 #define ECB_TE 0x10 215 #define ECB_SRSI 0x04 216 #define ECB_HOSTPROTINT 0x02 217 __u8 ecb; /* 0x0061 */ 218 #define ECB2_CMMA 0x80 219 #define ECB2_IEP 0x20 220 #define ECB2_PFMFI 0x08 221 #define ECB2_ESCA 0x04 222 __u8 ecb2; /* 0x0062 */ 223 #define ECB3_DEA 0x08 224 #define ECB3_AES 0x04 225 #define ECB3_RI 0x01 226 __u8 ecb3; /* 0x0063 */ 227 __u32 scaol; /* 0x0064 */ 228 __u8 reserved68; /* 0x0068 */ 229 __u8 epdx; /* 0x0069 */ 230 __u8 reserved6a[2]; /* 0x006a */ 231 __u32 todpr; /* 0x006c */ 232 #define GISA_FORMAT1 0x00000001 233 __u32 gd; /* 0x0070 */ 234 __u8 reserved74[12]; /* 0x0074 */ 235 __u64 mso; /* 0x0080 */ 236 __u64 msl; /* 0x0088 */ 237 psw_t gpsw; /* 0x0090 */ 238 __u64 gg14; /* 0x00a0 */ 239 __u64 gg15; /* 0x00a8 */ 240 __u8 reservedb0[20]; /* 0x00b0 */ 241 __u16 extcpuaddr; /* 0x00c4 */ 242 __u16 eic; /* 0x00c6 */ 243 __u32 reservedc8; /* 0x00c8 */ 244 __u16 pgmilc; /* 0x00cc */ 245 __u16 iprcc; /* 0x00ce */ 246 __u32 dxc; /* 0x00d0 */ 247 __u16 mcn; /* 0x00d4 */ 248 __u8 perc; /* 0x00d6 */ 249 __u8 peratmid; /* 0x00d7 */ 250 __u64 peraddr; /* 0x00d8 */ 251 __u8 eai; /* 0x00e0 */ 252 __u8 peraid; /* 0x00e1 */ 253 __u8 oai; /* 0x00e2 */ 254 __u8 armid; /* 0x00e3 */ 255 __u8 reservede4[4]; /* 0x00e4 */ 256 __u64 tecmc; /* 0x00e8 */ 257 __u8 reservedf0[12]; /* 0x00f0 */ 258 #define CRYCB_FORMAT1 0x00000001 259 #define CRYCB_FORMAT2 0x00000003 260 __u32 crycbd; /* 0x00fc */ 261 __u64 gcr[16]; /* 0x0100 */ 262 __u64 gbea; /* 0x0180 */ 263 __u8 reserved188[8]; /* 0x0188 */ 264 __u64 sdnxo; /* 0x0190 */ 265 __u8 reserved198[8]; /* 0x0198 */ 266 __u32 fac; /* 0x01a0 */ 267 __u8 reserved1a4[20]; /* 0x01a4 */ 268 __u64 cbrlo; /* 0x01b8 */ 269 __u8 reserved1c0[8]; /* 0x01c0 */ 270 #define ECD_HOSTREGMGMT 0x20000000 271 #define ECD_MEF 0x08000000 272 #define ECD_ETOKENF 0x02000000 273 __u32 ecd; /* 0x01c8 */ 274 __u8 reserved1cc[18]; /* 0x01cc */ 275 __u64 pp; /* 0x01de */ 276 __u8 reserved1e6[2]; /* 0x01e6 */ 277 __u64 itdba; /* 0x01e8 */ 278 __u64 riccbd; /* 0x01f0 */ 279 __u64 gvrd; /* 0x01f8 */ 280 } __attribute__((packed)); 281 282 struct kvm_s390_itdb { 283 __u8 data[256]; 284 }; 285 286 struct sie_page { 287 struct kvm_s390_sie_block sie_block; 288 struct mcck_volatile_info mcck_info; /* 0x0200 */ 289 __u8 reserved218[1000]; /* 0x0218 */ 290 struct kvm_s390_itdb itdb; /* 0x0600 */ 291 __u8 reserved700[2304]; /* 0x0700 */ 292 }; 293 294 struct kvm_vcpu_stat { 295 u64 exit_userspace; 296 u64 exit_null; 297 u64 exit_external_request; 298 u64 exit_io_request; 299 u64 exit_external_interrupt; 300 u64 exit_stop_request; 301 u64 exit_validity; 302 u64 exit_instruction; 303 u64 exit_pei; 304 u64 halt_successful_poll; 305 u64 halt_attempted_poll; 306 u64 halt_poll_invalid; 307 u64 halt_wakeup; 308 u64 instruction_lctl; 309 u64 instruction_lctlg; 310 u64 instruction_stctl; 311 u64 instruction_stctg; 312 u64 exit_program_interruption; 313 u64 exit_instr_and_program; 314 u64 exit_operation_exception; 315 u64 deliver_ckc; 316 u64 deliver_cputm; 317 u64 deliver_external_call; 318 u64 deliver_emergency_signal; 319 u64 deliver_service_signal; 320 u64 deliver_virtio; 321 u64 deliver_stop_signal; 322 u64 deliver_prefix_signal; 323 u64 deliver_restart_signal; 324 u64 deliver_program; 325 u64 deliver_io; 326 u64 deliver_machine_check; 327 u64 exit_wait_state; 328 u64 inject_ckc; 329 u64 inject_cputm; 330 u64 inject_external_call; 331 u64 inject_emergency_signal; 332 u64 inject_mchk; 333 u64 inject_pfault_init; 334 u64 inject_program; 335 u64 inject_restart; 336 u64 inject_set_prefix; 337 u64 inject_stop_signal; 338 u64 instruction_epsw; 339 u64 instruction_gs; 340 u64 instruction_io_other; 341 u64 instruction_lpsw; 342 u64 instruction_lpswe; 343 u64 instruction_pfmf; 344 u64 instruction_ptff; 345 u64 instruction_sck; 346 u64 instruction_sckpf; 347 u64 instruction_stidp; 348 u64 instruction_spx; 349 u64 instruction_stpx; 350 u64 instruction_stap; 351 u64 instruction_iske; 352 u64 instruction_ri; 353 u64 instruction_rrbe; 354 u64 instruction_sske; 355 u64 instruction_ipte_interlock; 356 u64 instruction_stsi; 357 u64 instruction_stfl; 358 u64 instruction_tb; 359 u64 instruction_tpi; 360 u64 instruction_tprot; 361 u64 instruction_tsch; 362 u64 instruction_sie; 363 u64 instruction_essa; 364 u64 instruction_sthyi; 365 u64 instruction_sigp_sense; 366 u64 instruction_sigp_sense_running; 367 u64 instruction_sigp_external_call; 368 u64 instruction_sigp_emergency; 369 u64 instruction_sigp_cond_emergency; 370 u64 instruction_sigp_start; 371 u64 instruction_sigp_stop; 372 u64 instruction_sigp_stop_store_status; 373 u64 instruction_sigp_store_status; 374 u64 instruction_sigp_store_adtl_status; 375 u64 instruction_sigp_arch; 376 u64 instruction_sigp_prefix; 377 u64 instruction_sigp_restart; 378 u64 instruction_sigp_init_cpu_reset; 379 u64 instruction_sigp_cpu_reset; 380 u64 instruction_sigp_unknown; 381 u64 diagnose_10; 382 u64 diagnose_44; 383 u64 diagnose_9c; 384 u64 diagnose_258; 385 u64 diagnose_308; 386 u64 diagnose_500; 387 u64 diagnose_other; 388 }; 389 390 #define PGM_OPERATION 0x01 391 #define PGM_PRIVILEGED_OP 0x02 392 #define PGM_EXECUTE 0x03 393 #define PGM_PROTECTION 0x04 394 #define PGM_ADDRESSING 0x05 395 #define PGM_SPECIFICATION 0x06 396 #define PGM_DATA 0x07 397 #define PGM_FIXED_POINT_OVERFLOW 0x08 398 #define PGM_FIXED_POINT_DIVIDE 0x09 399 #define PGM_DECIMAL_OVERFLOW 0x0a 400 #define PGM_DECIMAL_DIVIDE 0x0b 401 #define PGM_HFP_EXPONENT_OVERFLOW 0x0c 402 #define PGM_HFP_EXPONENT_UNDERFLOW 0x0d 403 #define PGM_HFP_SIGNIFICANCE 0x0e 404 #define PGM_HFP_DIVIDE 0x0f 405 #define PGM_SEGMENT_TRANSLATION 0x10 406 #define PGM_PAGE_TRANSLATION 0x11 407 #define PGM_TRANSLATION_SPEC 0x12 408 #define PGM_SPECIAL_OPERATION 0x13 409 #define PGM_OPERAND 0x15 410 #define PGM_TRACE_TABEL 0x16 411 #define PGM_VECTOR_PROCESSING 0x1b 412 #define PGM_SPACE_SWITCH 0x1c 413 #define PGM_HFP_SQUARE_ROOT 0x1d 414 #define PGM_PC_TRANSLATION_SPEC 0x1f 415 #define PGM_AFX_TRANSLATION 0x20 416 #define PGM_ASX_TRANSLATION 0x21 417 #define PGM_LX_TRANSLATION 0x22 418 #define PGM_EX_TRANSLATION 0x23 419 #define PGM_PRIMARY_AUTHORITY 0x24 420 #define PGM_SECONDARY_AUTHORITY 0x25 421 #define PGM_LFX_TRANSLATION 0x26 422 #define PGM_LSX_TRANSLATION 0x27 423 #define PGM_ALET_SPECIFICATION 0x28 424 #define PGM_ALEN_TRANSLATION 0x29 425 #define PGM_ALE_SEQUENCE 0x2a 426 #define PGM_ASTE_VALIDITY 0x2b 427 #define PGM_ASTE_SEQUENCE 0x2c 428 #define PGM_EXTENDED_AUTHORITY 0x2d 429 #define PGM_LSTE_SEQUENCE 0x2e 430 #define PGM_ASTE_INSTANCE 0x2f 431 #define PGM_STACK_FULL 0x30 432 #define PGM_STACK_EMPTY 0x31 433 #define PGM_STACK_SPECIFICATION 0x32 434 #define PGM_STACK_TYPE 0x33 435 #define PGM_STACK_OPERATION 0x34 436 #define PGM_ASCE_TYPE 0x38 437 #define PGM_REGION_FIRST_TRANS 0x39 438 #define PGM_REGION_SECOND_TRANS 0x3a 439 #define PGM_REGION_THIRD_TRANS 0x3b 440 #define PGM_MONITOR 0x40 441 #define PGM_PER 0x80 442 #define PGM_CRYPTO_OPERATION 0x119 443 444 /* irq types in ascend order of priorities */ 445 enum irq_types { 446 IRQ_PEND_SET_PREFIX = 0, 447 IRQ_PEND_RESTART, 448 IRQ_PEND_SIGP_STOP, 449 IRQ_PEND_IO_ISC_7, 450 IRQ_PEND_IO_ISC_6, 451 IRQ_PEND_IO_ISC_5, 452 IRQ_PEND_IO_ISC_4, 453 IRQ_PEND_IO_ISC_3, 454 IRQ_PEND_IO_ISC_2, 455 IRQ_PEND_IO_ISC_1, 456 IRQ_PEND_IO_ISC_0, 457 IRQ_PEND_VIRTIO, 458 IRQ_PEND_PFAULT_DONE, 459 IRQ_PEND_PFAULT_INIT, 460 IRQ_PEND_EXT_HOST, 461 IRQ_PEND_EXT_SERVICE, 462 IRQ_PEND_EXT_TIMING, 463 IRQ_PEND_EXT_CPU_TIMER, 464 IRQ_PEND_EXT_CLOCK_COMP, 465 IRQ_PEND_EXT_EXTERNAL, 466 IRQ_PEND_EXT_EMERGENCY, 467 IRQ_PEND_EXT_MALFUNC, 468 IRQ_PEND_EXT_IRQ_KEY, 469 IRQ_PEND_MCHK_REP, 470 IRQ_PEND_PROG, 471 IRQ_PEND_SVC, 472 IRQ_PEND_MCHK_EX, 473 IRQ_PEND_COUNT 474 }; 475 476 /* We have 2M for virtio device descriptor pages. Smallest amount of 477 * memory per page is 24 bytes (1 queue), so (2048*1024) / 24 = 87381 478 */ 479 #define KVM_S390_MAX_VIRTIO_IRQS 87381 480 481 /* 482 * Repressible (non-floating) machine check interrupts 483 * subclass bits in MCIC 484 */ 485 #define MCHK_EXTD_BIT 58 486 #define MCHK_DEGR_BIT 56 487 #define MCHK_WARN_BIT 55 488 #define MCHK_REP_MASK ((1UL << MCHK_DEGR_BIT) | \ 489 (1UL << MCHK_EXTD_BIT) | \ 490 (1UL << MCHK_WARN_BIT)) 491 492 /* Exigent machine check interrupts subclass bits in MCIC */ 493 #define MCHK_SD_BIT 63 494 #define MCHK_PD_BIT 62 495 #define MCHK_EX_MASK ((1UL << MCHK_SD_BIT) | (1UL << MCHK_PD_BIT)) 496 497 #define IRQ_PEND_EXT_MASK ((1UL << IRQ_PEND_EXT_IRQ_KEY) | \ 498 (1UL << IRQ_PEND_EXT_CLOCK_COMP) | \ 499 (1UL << IRQ_PEND_EXT_CPU_TIMER) | \ 500 (1UL << IRQ_PEND_EXT_MALFUNC) | \ 501 (1UL << IRQ_PEND_EXT_EMERGENCY) | \ 502 (1UL << IRQ_PEND_EXT_EXTERNAL) | \ 503 (1UL << IRQ_PEND_EXT_TIMING) | \ 504 (1UL << IRQ_PEND_EXT_HOST) | \ 505 (1UL << IRQ_PEND_EXT_SERVICE) | \ 506 (1UL << IRQ_PEND_VIRTIO) | \ 507 (1UL << IRQ_PEND_PFAULT_INIT) | \ 508 (1UL << IRQ_PEND_PFAULT_DONE)) 509 510 #define IRQ_PEND_IO_MASK ((1UL << IRQ_PEND_IO_ISC_0) | \ 511 (1UL << IRQ_PEND_IO_ISC_1) | \ 512 (1UL << IRQ_PEND_IO_ISC_2) | \ 513 (1UL << IRQ_PEND_IO_ISC_3) | \ 514 (1UL << IRQ_PEND_IO_ISC_4) | \ 515 (1UL << IRQ_PEND_IO_ISC_5) | \ 516 (1UL << IRQ_PEND_IO_ISC_6) | \ 517 (1UL << IRQ_PEND_IO_ISC_7)) 518 519 #define IRQ_PEND_MCHK_MASK ((1UL << IRQ_PEND_MCHK_REP) | \ 520 (1UL << IRQ_PEND_MCHK_EX)) 521 522 struct kvm_s390_interrupt_info { 523 struct list_head list; 524 u64 type; 525 union { 526 struct kvm_s390_io_info io; 527 struct kvm_s390_ext_info ext; 528 struct kvm_s390_pgm_info pgm; 529 struct kvm_s390_emerg_info emerg; 530 struct kvm_s390_extcall_info extcall; 531 struct kvm_s390_prefix_info prefix; 532 struct kvm_s390_stop_info stop; 533 struct kvm_s390_mchk_info mchk; 534 }; 535 }; 536 537 struct kvm_s390_irq_payload { 538 struct kvm_s390_io_info io; 539 struct kvm_s390_ext_info ext; 540 struct kvm_s390_pgm_info pgm; 541 struct kvm_s390_emerg_info emerg; 542 struct kvm_s390_extcall_info extcall; 543 struct kvm_s390_prefix_info prefix; 544 struct kvm_s390_stop_info stop; 545 struct kvm_s390_mchk_info mchk; 546 }; 547 548 struct kvm_s390_local_interrupt { 549 spinlock_t lock; 550 DECLARE_BITMAP(sigp_emerg_pending, KVM_MAX_VCPUS); 551 struct kvm_s390_irq_payload irq; 552 unsigned long pending_irqs; 553 }; 554 555 #define FIRQ_LIST_IO_ISC_0 0 556 #define FIRQ_LIST_IO_ISC_1 1 557 #define FIRQ_LIST_IO_ISC_2 2 558 #define FIRQ_LIST_IO_ISC_3 3 559 #define FIRQ_LIST_IO_ISC_4 4 560 #define FIRQ_LIST_IO_ISC_5 5 561 #define FIRQ_LIST_IO_ISC_6 6 562 #define FIRQ_LIST_IO_ISC_7 7 563 #define FIRQ_LIST_PFAULT 8 564 #define FIRQ_LIST_VIRTIO 9 565 #define FIRQ_LIST_COUNT 10 566 #define FIRQ_CNTR_IO 0 567 #define FIRQ_CNTR_SERVICE 1 568 #define FIRQ_CNTR_VIRTIO 2 569 #define FIRQ_CNTR_PFAULT 3 570 #define FIRQ_MAX_COUNT 4 571 572 /* mask the AIS mode for a given ISC */ 573 #define AIS_MODE_MASK(isc) (0x80 >> isc) 574 575 #define KVM_S390_AIS_MODE_ALL 0 576 #define KVM_S390_AIS_MODE_SINGLE 1 577 578 struct kvm_s390_float_interrupt { 579 unsigned long pending_irqs; 580 spinlock_t lock; 581 struct list_head lists[FIRQ_LIST_COUNT]; 582 int counters[FIRQ_MAX_COUNT]; 583 struct kvm_s390_mchk_info mchk; 584 struct kvm_s390_ext_info srv_signal; 585 int next_rr_cpu; 586 unsigned long idle_mask[BITS_TO_LONGS(KVM_MAX_VCPUS)]; 587 struct mutex ais_lock; 588 u8 simm; 589 u8 nimm; 590 }; 591 592 struct kvm_hw_wp_info_arch { 593 unsigned long addr; 594 unsigned long phys_addr; 595 int len; 596 char *old_data; 597 }; 598 599 struct kvm_hw_bp_info_arch { 600 unsigned long addr; 601 int len; 602 }; 603 604 /* 605 * Only the upper 16 bits of kvm_guest_debug->control are arch specific. 606 * Further KVM_GUESTDBG flags which an be used from userspace can be found in 607 * arch/s390/include/uapi/asm/kvm.h 608 */ 609 #define KVM_GUESTDBG_EXIT_PENDING 0x10000000 610 611 #define guestdbg_enabled(vcpu) \ 612 (vcpu->guest_debug & KVM_GUESTDBG_ENABLE) 613 #define guestdbg_sstep_enabled(vcpu) \ 614 (vcpu->guest_debug & KVM_GUESTDBG_SINGLESTEP) 615 #define guestdbg_hw_bp_enabled(vcpu) \ 616 (vcpu->guest_debug & KVM_GUESTDBG_USE_HW_BP) 617 #define guestdbg_exit_pending(vcpu) (guestdbg_enabled(vcpu) && \ 618 (vcpu->guest_debug & KVM_GUESTDBG_EXIT_PENDING)) 619 620 struct kvm_guestdbg_info_arch { 621 unsigned long cr0; 622 unsigned long cr9; 623 unsigned long cr10; 624 unsigned long cr11; 625 struct kvm_hw_bp_info_arch *hw_bp_info; 626 struct kvm_hw_wp_info_arch *hw_wp_info; 627 int nr_hw_bp; 628 int nr_hw_wp; 629 unsigned long last_bp; 630 }; 631 632 struct kvm_vcpu_arch { 633 struct kvm_s390_sie_block *sie_block; 634 /* if vsie is active, currently executed shadow sie control block */ 635 struct kvm_s390_sie_block *vsie_block; 636 unsigned int host_acrs[NUM_ACRS]; 637 struct gs_cb *host_gscb; 638 struct fpu host_fpregs; 639 struct kvm_s390_local_interrupt local_int; 640 struct hrtimer ckc_timer; 641 struct kvm_s390_pgm_info pgm; 642 struct gmap *gmap; 643 /* backup location for the currently enabled gmap when scheduled out */ 644 struct gmap *enabled_gmap; 645 struct kvm_guestdbg_info_arch guestdbg; 646 unsigned long pfault_token; 647 unsigned long pfault_select; 648 unsigned long pfault_compare; 649 bool cputm_enabled; 650 /* 651 * The seqcount protects updates to cputm_start and sie_block.cputm, 652 * this way we can have non-blocking reads with consistent values. 653 * Only the owning VCPU thread (vcpu->cpu) is allowed to change these 654 * values and to start/stop/enable/disable cpu timer accounting. 655 */ 656 seqcount_t cputm_seqcount; 657 __u64 cputm_start; 658 bool gs_enabled; 659 bool skey_enabled; 660 }; 661 662 struct kvm_vm_stat { 663 u64 inject_io; 664 u64 inject_float_mchk; 665 u64 inject_pfault_done; 666 u64 inject_service_signal; 667 u64 inject_virtio; 668 u64 remote_tlb_flush; 669 }; 670 671 struct kvm_arch_memory_slot { 672 }; 673 674 struct s390_map_info { 675 struct list_head list; 676 __u64 guest_addr; 677 __u64 addr; 678 struct page *page; 679 }; 680 681 struct s390_io_adapter { 682 unsigned int id; 683 int isc; 684 bool maskable; 685 bool masked; 686 bool swap; 687 bool suppressible; 688 struct rw_semaphore maps_lock; 689 struct list_head maps; 690 atomic_t nr_maps; 691 }; 692 693 #define MAX_S390_IO_ADAPTERS ((MAX_ISC + 1) * 8) 694 #define MAX_S390_ADAPTER_MAPS 256 695 696 /* maximum size of facilities and facility mask is 2k bytes */ 697 #define S390_ARCH_FAC_LIST_SIZE_BYTE (1<<11) 698 #define S390_ARCH_FAC_LIST_SIZE_U64 \ 699 (S390_ARCH_FAC_LIST_SIZE_BYTE / sizeof(u64)) 700 #define S390_ARCH_FAC_MASK_SIZE_BYTE S390_ARCH_FAC_LIST_SIZE_BYTE 701 #define S390_ARCH_FAC_MASK_SIZE_U64 \ 702 (S390_ARCH_FAC_MASK_SIZE_BYTE / sizeof(u64)) 703 704 struct kvm_s390_cpu_model { 705 /* facility mask supported by kvm & hosting machine */ 706 __u64 fac_mask[S390_ARCH_FAC_LIST_SIZE_U64]; 707 /* facility list requested by guest (in dma page) */ 708 __u64 *fac_list; 709 u64 cpuid; 710 unsigned short ibc; 711 }; 712 713 struct kvm_s390_crypto { 714 struct kvm_s390_crypto_cb *crycb; 715 __u32 crycbd; 716 __u8 aes_kw; 717 __u8 dea_kw; 718 }; 719 720 #define APCB0_MASK_SIZE 1 721 struct kvm_s390_apcb0 { 722 __u64 apm[APCB0_MASK_SIZE]; /* 0x0000 */ 723 __u64 aqm[APCB0_MASK_SIZE]; /* 0x0008 */ 724 __u64 adm[APCB0_MASK_SIZE]; /* 0x0010 */ 725 __u64 reserved18; /* 0x0018 */ 726 }; 727 728 #define APCB1_MASK_SIZE 4 729 struct kvm_s390_apcb1 { 730 __u64 apm[APCB1_MASK_SIZE]; /* 0x0000 */ 731 __u64 aqm[APCB1_MASK_SIZE]; /* 0x0020 */ 732 __u64 adm[APCB1_MASK_SIZE]; /* 0x0040 */ 733 __u64 reserved60[4]; /* 0x0060 */ 734 }; 735 736 struct kvm_s390_crypto_cb { 737 struct kvm_s390_apcb0 apcb0; /* 0x0000 */ 738 __u8 reserved20[0x0048 - 0x0020]; /* 0x0020 */ 739 __u8 dea_wrapping_key_mask[24]; /* 0x0048 */ 740 __u8 aes_wrapping_key_mask[32]; /* 0x0060 */ 741 struct kvm_s390_apcb1 apcb1; /* 0x0080 */ 742 }; 743 744 struct kvm_s390_gisa { 745 union { 746 struct { /* common to all formats */ 747 u32 next_alert; 748 u8 ipm; 749 u8 reserved01[2]; 750 u8 iam; 751 }; 752 struct { /* format 0 */ 753 u32 next_alert; 754 u8 ipm; 755 u8 reserved01; 756 u8 : 6; 757 u8 g : 1; 758 u8 c : 1; 759 u8 iam; 760 u8 reserved02[4]; 761 u32 airq_count; 762 } g0; 763 struct { /* format 1 */ 764 u32 next_alert; 765 u8 ipm; 766 u8 simm; 767 u8 nimm; 768 u8 iam; 769 u8 aism[8]; 770 u8 : 6; 771 u8 g : 1; 772 u8 c : 1; 773 u8 reserved03[11]; 774 u32 airq_count; 775 } g1; 776 }; 777 }; 778 779 /* 780 * sie_page2 has to be allocated as DMA because fac_list, crycb and 781 * gisa need 31bit addresses in the sie control block. 782 */ 783 struct sie_page2 { 784 __u64 fac_list[S390_ARCH_FAC_LIST_SIZE_U64]; /* 0x0000 */ 785 struct kvm_s390_crypto_cb crycb; /* 0x0800 */ 786 struct kvm_s390_gisa gisa; /* 0x0900 */ 787 u8 reserved920[0x1000 - 0x920]; /* 0x0920 */ 788 }; 789 790 struct kvm_s390_vsie { 791 struct mutex mutex; 792 struct radix_tree_root addr_to_page; 793 int page_count; 794 int next; 795 struct page *pages[KVM_MAX_VCPUS]; 796 }; 797 798 struct kvm_arch{ 799 void *sca; 800 int use_esca; 801 rwlock_t sca_lock; 802 debug_info_t *dbf; 803 struct kvm_s390_float_interrupt float_int; 804 struct kvm_device *flic; 805 struct gmap *gmap; 806 unsigned long mem_limit; 807 int css_support; 808 int use_irqchip; 809 int use_cmma; 810 int use_pfmfi; 811 int use_skf; 812 int user_cpu_state_ctrl; 813 int user_sigp; 814 int user_stsi; 815 int user_instr0; 816 struct s390_io_adapter *adapters[MAX_S390_IO_ADAPTERS]; 817 wait_queue_head_t ipte_wq; 818 int ipte_lock_count; 819 struct mutex ipte_mutex; 820 spinlock_t start_stop_lock; 821 struct sie_page2 *sie_page2; 822 struct kvm_s390_cpu_model model; 823 struct kvm_s390_crypto crypto; 824 struct kvm_s390_vsie vsie; 825 u8 epdx; 826 u64 epoch; 827 int migration_mode; 828 atomic64_t cmma_dirty_pages; 829 /* subset of available cpu features enabled by user space */ 830 DECLARE_BITMAP(cpu_feat, KVM_S390_VM_CPU_FEAT_NR_BITS); 831 struct kvm_s390_gisa *gisa; 832 }; 833 834 #define KVM_HVA_ERR_BAD (-1UL) 835 #define KVM_HVA_ERR_RO_BAD (-2UL) 836 837 static inline bool kvm_is_error_hva(unsigned long addr) 838 { 839 return IS_ERR_VALUE(addr); 840 } 841 842 #define ASYNC_PF_PER_VCPU 64 843 struct kvm_arch_async_pf { 844 unsigned long pfault_token; 845 }; 846 847 bool kvm_arch_can_inject_async_page_present(struct kvm_vcpu *vcpu); 848 849 void kvm_arch_async_page_ready(struct kvm_vcpu *vcpu, 850 struct kvm_async_pf *work); 851 852 void kvm_arch_async_page_not_present(struct kvm_vcpu *vcpu, 853 struct kvm_async_pf *work); 854 855 void kvm_arch_async_page_present(struct kvm_vcpu *vcpu, 856 struct kvm_async_pf *work); 857 858 extern int sie64a(struct kvm_s390_sie_block *, u64 *); 859 extern char sie_exit; 860 861 static inline void kvm_arch_hardware_disable(void) {} 862 static inline void kvm_arch_check_processor_compat(void *rtn) {} 863 static inline void kvm_arch_sync_events(struct kvm *kvm) {} 864 static inline void kvm_arch_vcpu_uninit(struct kvm_vcpu *vcpu) {} 865 static inline void kvm_arch_sched_in(struct kvm_vcpu *vcpu, int cpu) {} 866 static inline void kvm_arch_free_memslot(struct kvm *kvm, 867 struct kvm_memory_slot *free, struct kvm_memory_slot *dont) {} 868 static inline void kvm_arch_memslots_updated(struct kvm *kvm, struct kvm_memslots *slots) {} 869 static inline void kvm_arch_flush_shadow_all(struct kvm *kvm) {} 870 static inline void kvm_arch_flush_shadow_memslot(struct kvm *kvm, 871 struct kvm_memory_slot *slot) {} 872 static inline void kvm_arch_vcpu_blocking(struct kvm_vcpu *vcpu) {} 873 static inline void kvm_arch_vcpu_unblocking(struct kvm_vcpu *vcpu) {} 874 875 void kvm_arch_vcpu_block_finish(struct kvm_vcpu *vcpu); 876 877 #endif 878