Linux kernel mirror (for testing)
git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel
os
linux
fork
Configure Feed
Select the types of activity you want to include in your feed.
1/* SPDX-License-Identifier: GPL-2.0 */
2/*
3 * definition for kernel virtual machines on s390
4 *
5 * Copyright IBM Corp. 2008, 2018
6 *
7 * Author(s): Carsten Otte <cotte@de.ibm.com>
8 */
9
10
11#ifndef ASM_KVM_HOST_H
12#define ASM_KVM_HOST_H
13
14#include <linux/types.h>
15#include <linux/hrtimer.h>
16#include <linux/interrupt.h>
17#include <linux/kvm_types.h>
18#include <linux/kvm_host.h>
19#include <linux/kvm.h>
20#include <linux/seqlock.h>
21#include <asm/debug.h>
22#include <asm/cpu.h>
23#include <asm/fpu/api.h>
24#include <asm/isc.h>
25#include <asm/guarded_storage.h>
26
27#define KVM_S390_BSCA_CPU_SLOTS 64
28#define KVM_S390_ESCA_CPU_SLOTS 248
29#define KVM_MAX_VCPUS 255
30#define KVM_USER_MEM_SLOTS 32
31
32/*
33 * These seem to be used for allocating ->chip in the routing table,
34 * which we don't use. 4096 is an out-of-thin-air value. If we need
35 * to look at ->chip later on, we'll need to revisit this.
36 */
37#define KVM_NR_IRQCHIPS 1
38#define KVM_IRQCHIP_NUM_PINS 4096
39#define KVM_HALT_POLL_NS_DEFAULT 80000
40
41/* s390-specific vcpu->requests bit members */
42#define KVM_REQ_ENABLE_IBS KVM_ARCH_REQ(0)
43#define KVM_REQ_DISABLE_IBS KVM_ARCH_REQ(1)
44#define KVM_REQ_ICPT_OPEREXC KVM_ARCH_REQ(2)
45#define KVM_REQ_START_MIGRATION KVM_ARCH_REQ(3)
46#define KVM_REQ_STOP_MIGRATION KVM_ARCH_REQ(4)
47#define KVM_REQ_VSIE_RESTART KVM_ARCH_REQ(5)
48
49#define SIGP_CTRL_C 0x80
50#define SIGP_CTRL_SCN_MASK 0x3f
51
52union bsca_sigp_ctrl {
53 __u8 value;
54 struct {
55 __u8 c : 1;
56 __u8 r : 1;
57 __u8 scn : 6;
58 };
59};
60
61union esca_sigp_ctrl {
62 __u16 value;
63 struct {
64 __u8 c : 1;
65 __u8 reserved: 7;
66 __u8 scn;
67 };
68};
69
70struct esca_entry {
71 union esca_sigp_ctrl sigp_ctrl;
72 __u16 reserved1[3];
73 __u64 sda;
74 __u64 reserved2[6];
75};
76
77struct bsca_entry {
78 __u8 reserved0;
79 union bsca_sigp_ctrl sigp_ctrl;
80 __u16 reserved[3];
81 __u64 sda;
82 __u64 reserved2[2];
83};
84
85union ipte_control {
86 unsigned long val;
87 struct {
88 unsigned long k : 1;
89 unsigned long kh : 31;
90 unsigned long kg : 32;
91 };
92};
93
94struct bsca_block {
95 union ipte_control ipte_control;
96 __u64 reserved[5];
97 __u64 mcn;
98 __u64 reserved2;
99 struct bsca_entry cpu[KVM_S390_BSCA_CPU_SLOTS];
100};
101
102struct esca_block {
103 union ipte_control ipte_control;
104 __u64 reserved1[7];
105 __u64 mcn[4];
106 __u64 reserved2[20];
107 struct esca_entry cpu[KVM_S390_ESCA_CPU_SLOTS];
108};
109
110/*
111 * This struct is used to store some machine check info from lowcore
112 * for machine checks that happen while the guest is running.
113 * This info in host's lowcore might be overwritten by a second machine
114 * check from host when host is in the machine check's high-level handling.
115 * The size is 24 bytes.
116 */
117struct mcck_volatile_info {
118 __u64 mcic;
119 __u64 failing_storage_address;
120 __u32 ext_damage_code;
121 __u32 reserved;
122};
123
124#define CPUSTAT_STOPPED 0x80000000
125#define CPUSTAT_WAIT 0x10000000
126#define CPUSTAT_ECALL_PEND 0x08000000
127#define CPUSTAT_STOP_INT 0x04000000
128#define CPUSTAT_IO_INT 0x02000000
129#define CPUSTAT_EXT_INT 0x01000000
130#define CPUSTAT_RUNNING 0x00800000
131#define CPUSTAT_RETAINED 0x00400000
132#define CPUSTAT_TIMING_SUB 0x00020000
133#define CPUSTAT_SIE_SUB 0x00010000
134#define CPUSTAT_RRF 0x00008000
135#define CPUSTAT_SLSV 0x00004000
136#define CPUSTAT_SLSR 0x00002000
137#define CPUSTAT_ZARCH 0x00000800
138#define CPUSTAT_MCDS 0x00000100
139#define CPUSTAT_KSS 0x00000200
140#define CPUSTAT_SM 0x00000080
141#define CPUSTAT_IBS 0x00000040
142#define CPUSTAT_GED2 0x00000010
143#define CPUSTAT_G 0x00000008
144#define CPUSTAT_GED 0x00000004
145#define CPUSTAT_J 0x00000002
146#define CPUSTAT_P 0x00000001
147
148struct kvm_s390_sie_block {
149 atomic_t cpuflags; /* 0x0000 */
150 __u32 : 1; /* 0x0004 */
151 __u32 prefix : 18;
152 __u32 : 1;
153 __u32 ibc : 12;
154 __u8 reserved08[4]; /* 0x0008 */
155#define PROG_IN_SIE (1<<0)
156 __u32 prog0c; /* 0x000c */
157 __u8 reserved10[16]; /* 0x0010 */
158#define PROG_BLOCK_SIE (1<<0)
159#define PROG_REQUEST (1<<1)
160 atomic_t prog20; /* 0x0020 */
161 __u8 reserved24[4]; /* 0x0024 */
162 __u64 cputm; /* 0x0028 */
163 __u64 ckc; /* 0x0030 */
164 __u64 epoch; /* 0x0038 */
165 __u32 svcc; /* 0x0040 */
166#define LCTL_CR0 0x8000
167#define LCTL_CR6 0x0200
168#define LCTL_CR9 0x0040
169#define LCTL_CR10 0x0020
170#define LCTL_CR11 0x0010
171#define LCTL_CR14 0x0002
172 __u16 lctl; /* 0x0044 */
173 __s16 icpua; /* 0x0046 */
174#define ICTL_OPEREXC 0x80000000
175#define ICTL_PINT 0x20000000
176#define ICTL_LPSW 0x00400000
177#define ICTL_STCTL 0x00040000
178#define ICTL_ISKE 0x00004000
179#define ICTL_SSKE 0x00002000
180#define ICTL_RRBE 0x00001000
181#define ICTL_TPROT 0x00000200
182 __u32 ictl; /* 0x0048 */
183#define ECA_CEI 0x80000000
184#define ECA_IB 0x40000000
185#define ECA_SIGPI 0x10000000
186#define ECA_MVPGI 0x01000000
187#define ECA_AIV 0x00200000
188#define ECA_VX 0x00020000
189#define ECA_PROTEXCI 0x00002000
190#define ECA_APIE 0x00000008
191#define ECA_SII 0x00000001
192 __u32 eca; /* 0x004c */
193#define ICPT_INST 0x04
194#define ICPT_PROGI 0x08
195#define ICPT_INSTPROGI 0x0C
196#define ICPT_EXTREQ 0x10
197#define ICPT_EXTINT 0x14
198#define ICPT_IOREQ 0x18
199#define ICPT_WAIT 0x1c
200#define ICPT_VALIDITY 0x20
201#define ICPT_STOP 0x28
202#define ICPT_OPEREXC 0x2C
203#define ICPT_PARTEXEC 0x38
204#define ICPT_IOINST 0x40
205#define ICPT_KSS 0x5c
206 __u8 icptcode; /* 0x0050 */
207 __u8 icptstatus; /* 0x0051 */
208 __u16 ihcpu; /* 0x0052 */
209 __u8 reserved54[2]; /* 0x0054 */
210 __u16 ipa; /* 0x0056 */
211 __u32 ipb; /* 0x0058 */
212 __u32 scaoh; /* 0x005c */
213#define FPF_BPBC 0x20
214 __u8 fpf; /* 0x0060 */
215#define ECB_GS 0x40
216#define ECB_TE 0x10
217#define ECB_SRSI 0x04
218#define ECB_HOSTPROTINT 0x02
219 __u8 ecb; /* 0x0061 */
220#define ECB2_CMMA 0x80
221#define ECB2_IEP 0x20
222#define ECB2_PFMFI 0x08
223#define ECB2_ESCA 0x04
224 __u8 ecb2; /* 0x0062 */
225#define ECB3_DEA 0x08
226#define ECB3_AES 0x04
227#define ECB3_RI 0x01
228 __u8 ecb3; /* 0x0063 */
229 __u32 scaol; /* 0x0064 */
230 __u8 reserved68; /* 0x0068 */
231 __u8 epdx; /* 0x0069 */
232 __u8 reserved6a[2]; /* 0x006a */
233 __u32 todpr; /* 0x006c */
234#define GISA_FORMAT1 0x00000001
235 __u32 gd; /* 0x0070 */
236 __u8 reserved74[12]; /* 0x0074 */
237 __u64 mso; /* 0x0080 */
238 __u64 msl; /* 0x0088 */
239 psw_t gpsw; /* 0x0090 */
240 __u64 gg14; /* 0x00a0 */
241 __u64 gg15; /* 0x00a8 */
242 __u8 reservedb0[8]; /* 0x00b0 */
243#define HPID_KVM 0x4
244#define HPID_VSIE 0x5
245 __u8 hpid; /* 0x00b8 */
246 __u8 reservedb9[11]; /* 0x00b9 */
247 __u16 extcpuaddr; /* 0x00c4 */
248 __u16 eic; /* 0x00c6 */
249 __u32 reservedc8; /* 0x00c8 */
250 __u16 pgmilc; /* 0x00cc */
251 __u16 iprcc; /* 0x00ce */
252 __u32 dxc; /* 0x00d0 */
253 __u16 mcn; /* 0x00d4 */
254 __u8 perc; /* 0x00d6 */
255 __u8 peratmid; /* 0x00d7 */
256 __u64 peraddr; /* 0x00d8 */
257 __u8 eai; /* 0x00e0 */
258 __u8 peraid; /* 0x00e1 */
259 __u8 oai; /* 0x00e2 */
260 __u8 armid; /* 0x00e3 */
261 __u8 reservede4[4]; /* 0x00e4 */
262 __u64 tecmc; /* 0x00e8 */
263 __u8 reservedf0[12]; /* 0x00f0 */
264#define CRYCB_FORMAT_MASK 0x00000003
265#define CRYCB_FORMAT0 0x00000000
266#define CRYCB_FORMAT1 0x00000001
267#define CRYCB_FORMAT2 0x00000003
268 __u32 crycbd; /* 0x00fc */
269 __u64 gcr[16]; /* 0x0100 */
270 __u64 gbea; /* 0x0180 */
271 __u8 reserved188[8]; /* 0x0188 */
272 __u64 sdnxo; /* 0x0190 */
273 __u8 reserved198[8]; /* 0x0198 */
274 __u32 fac; /* 0x01a0 */
275 __u8 reserved1a4[20]; /* 0x01a4 */
276 __u64 cbrlo; /* 0x01b8 */
277 __u8 reserved1c0[8]; /* 0x01c0 */
278#define ECD_HOSTREGMGMT 0x20000000
279#define ECD_MEF 0x08000000
280#define ECD_ETOKENF 0x02000000
281 __u32 ecd; /* 0x01c8 */
282 __u8 reserved1cc[18]; /* 0x01cc */
283 __u64 pp; /* 0x01de */
284 __u8 reserved1e6[2]; /* 0x01e6 */
285 __u64 itdba; /* 0x01e8 */
286 __u64 riccbd; /* 0x01f0 */
287 __u64 gvrd; /* 0x01f8 */
288} __attribute__((packed));
289
290struct kvm_s390_itdb {
291 __u8 data[256];
292};
293
294struct sie_page {
295 struct kvm_s390_sie_block sie_block;
296 struct mcck_volatile_info mcck_info; /* 0x0200 */
297 __u8 reserved218[1000]; /* 0x0218 */
298 struct kvm_s390_itdb itdb; /* 0x0600 */
299 __u8 reserved700[2304]; /* 0x0700 */
300};
301
302struct kvm_vcpu_stat {
303 u64 exit_userspace;
304 u64 exit_null;
305 u64 exit_external_request;
306 u64 exit_io_request;
307 u64 exit_external_interrupt;
308 u64 exit_stop_request;
309 u64 exit_validity;
310 u64 exit_instruction;
311 u64 exit_pei;
312 u64 halt_successful_poll;
313 u64 halt_attempted_poll;
314 u64 halt_poll_invalid;
315 u64 halt_wakeup;
316 u64 instruction_lctl;
317 u64 instruction_lctlg;
318 u64 instruction_stctl;
319 u64 instruction_stctg;
320 u64 exit_program_interruption;
321 u64 exit_instr_and_program;
322 u64 exit_operation_exception;
323 u64 deliver_ckc;
324 u64 deliver_cputm;
325 u64 deliver_external_call;
326 u64 deliver_emergency_signal;
327 u64 deliver_service_signal;
328 u64 deliver_virtio;
329 u64 deliver_stop_signal;
330 u64 deliver_prefix_signal;
331 u64 deliver_restart_signal;
332 u64 deliver_program;
333 u64 deliver_io;
334 u64 deliver_machine_check;
335 u64 exit_wait_state;
336 u64 inject_ckc;
337 u64 inject_cputm;
338 u64 inject_external_call;
339 u64 inject_emergency_signal;
340 u64 inject_mchk;
341 u64 inject_pfault_init;
342 u64 inject_program;
343 u64 inject_restart;
344 u64 inject_set_prefix;
345 u64 inject_stop_signal;
346 u64 instruction_epsw;
347 u64 instruction_gs;
348 u64 instruction_io_other;
349 u64 instruction_lpsw;
350 u64 instruction_lpswe;
351 u64 instruction_pfmf;
352 u64 instruction_ptff;
353 u64 instruction_sck;
354 u64 instruction_sckpf;
355 u64 instruction_stidp;
356 u64 instruction_spx;
357 u64 instruction_stpx;
358 u64 instruction_stap;
359 u64 instruction_iske;
360 u64 instruction_ri;
361 u64 instruction_rrbe;
362 u64 instruction_sske;
363 u64 instruction_ipte_interlock;
364 u64 instruction_stsi;
365 u64 instruction_stfl;
366 u64 instruction_tb;
367 u64 instruction_tpi;
368 u64 instruction_tprot;
369 u64 instruction_tsch;
370 u64 instruction_sie;
371 u64 instruction_essa;
372 u64 instruction_sthyi;
373 u64 instruction_sigp_sense;
374 u64 instruction_sigp_sense_running;
375 u64 instruction_sigp_external_call;
376 u64 instruction_sigp_emergency;
377 u64 instruction_sigp_cond_emergency;
378 u64 instruction_sigp_start;
379 u64 instruction_sigp_stop;
380 u64 instruction_sigp_stop_store_status;
381 u64 instruction_sigp_store_status;
382 u64 instruction_sigp_store_adtl_status;
383 u64 instruction_sigp_arch;
384 u64 instruction_sigp_prefix;
385 u64 instruction_sigp_restart;
386 u64 instruction_sigp_init_cpu_reset;
387 u64 instruction_sigp_cpu_reset;
388 u64 instruction_sigp_unknown;
389 u64 diagnose_10;
390 u64 diagnose_44;
391 u64 diagnose_9c;
392 u64 diagnose_258;
393 u64 diagnose_308;
394 u64 diagnose_500;
395 u64 diagnose_other;
396};
397
398#define PGM_OPERATION 0x01
399#define PGM_PRIVILEGED_OP 0x02
400#define PGM_EXECUTE 0x03
401#define PGM_PROTECTION 0x04
402#define PGM_ADDRESSING 0x05
403#define PGM_SPECIFICATION 0x06
404#define PGM_DATA 0x07
405#define PGM_FIXED_POINT_OVERFLOW 0x08
406#define PGM_FIXED_POINT_DIVIDE 0x09
407#define PGM_DECIMAL_OVERFLOW 0x0a
408#define PGM_DECIMAL_DIVIDE 0x0b
409#define PGM_HFP_EXPONENT_OVERFLOW 0x0c
410#define PGM_HFP_EXPONENT_UNDERFLOW 0x0d
411#define PGM_HFP_SIGNIFICANCE 0x0e
412#define PGM_HFP_DIVIDE 0x0f
413#define PGM_SEGMENT_TRANSLATION 0x10
414#define PGM_PAGE_TRANSLATION 0x11
415#define PGM_TRANSLATION_SPEC 0x12
416#define PGM_SPECIAL_OPERATION 0x13
417#define PGM_OPERAND 0x15
418#define PGM_TRACE_TABEL 0x16
419#define PGM_VECTOR_PROCESSING 0x1b
420#define PGM_SPACE_SWITCH 0x1c
421#define PGM_HFP_SQUARE_ROOT 0x1d
422#define PGM_PC_TRANSLATION_SPEC 0x1f
423#define PGM_AFX_TRANSLATION 0x20
424#define PGM_ASX_TRANSLATION 0x21
425#define PGM_LX_TRANSLATION 0x22
426#define PGM_EX_TRANSLATION 0x23
427#define PGM_PRIMARY_AUTHORITY 0x24
428#define PGM_SECONDARY_AUTHORITY 0x25
429#define PGM_LFX_TRANSLATION 0x26
430#define PGM_LSX_TRANSLATION 0x27
431#define PGM_ALET_SPECIFICATION 0x28
432#define PGM_ALEN_TRANSLATION 0x29
433#define PGM_ALE_SEQUENCE 0x2a
434#define PGM_ASTE_VALIDITY 0x2b
435#define PGM_ASTE_SEQUENCE 0x2c
436#define PGM_EXTENDED_AUTHORITY 0x2d
437#define PGM_LSTE_SEQUENCE 0x2e
438#define PGM_ASTE_INSTANCE 0x2f
439#define PGM_STACK_FULL 0x30
440#define PGM_STACK_EMPTY 0x31
441#define PGM_STACK_SPECIFICATION 0x32
442#define PGM_STACK_TYPE 0x33
443#define PGM_STACK_OPERATION 0x34
444#define PGM_ASCE_TYPE 0x38
445#define PGM_REGION_FIRST_TRANS 0x39
446#define PGM_REGION_SECOND_TRANS 0x3a
447#define PGM_REGION_THIRD_TRANS 0x3b
448#define PGM_MONITOR 0x40
449#define PGM_PER 0x80
450#define PGM_CRYPTO_OPERATION 0x119
451
452/* irq types in ascend order of priorities */
453enum irq_types {
454 IRQ_PEND_SET_PREFIX = 0,
455 IRQ_PEND_RESTART,
456 IRQ_PEND_SIGP_STOP,
457 IRQ_PEND_IO_ISC_7,
458 IRQ_PEND_IO_ISC_6,
459 IRQ_PEND_IO_ISC_5,
460 IRQ_PEND_IO_ISC_4,
461 IRQ_PEND_IO_ISC_3,
462 IRQ_PEND_IO_ISC_2,
463 IRQ_PEND_IO_ISC_1,
464 IRQ_PEND_IO_ISC_0,
465 IRQ_PEND_VIRTIO,
466 IRQ_PEND_PFAULT_DONE,
467 IRQ_PEND_PFAULT_INIT,
468 IRQ_PEND_EXT_HOST,
469 IRQ_PEND_EXT_SERVICE,
470 IRQ_PEND_EXT_TIMING,
471 IRQ_PEND_EXT_CPU_TIMER,
472 IRQ_PEND_EXT_CLOCK_COMP,
473 IRQ_PEND_EXT_EXTERNAL,
474 IRQ_PEND_EXT_EMERGENCY,
475 IRQ_PEND_EXT_MALFUNC,
476 IRQ_PEND_EXT_IRQ_KEY,
477 IRQ_PEND_MCHK_REP,
478 IRQ_PEND_PROG,
479 IRQ_PEND_SVC,
480 IRQ_PEND_MCHK_EX,
481 IRQ_PEND_COUNT
482};
483
484/* We have 2M for virtio device descriptor pages. Smallest amount of
485 * memory per page is 24 bytes (1 queue), so (2048*1024) / 24 = 87381
486 */
487#define KVM_S390_MAX_VIRTIO_IRQS 87381
488
489/*
490 * Repressible (non-floating) machine check interrupts
491 * subclass bits in MCIC
492 */
493#define MCHK_EXTD_BIT 58
494#define MCHK_DEGR_BIT 56
495#define MCHK_WARN_BIT 55
496#define MCHK_REP_MASK ((1UL << MCHK_DEGR_BIT) | \
497 (1UL << MCHK_EXTD_BIT) | \
498 (1UL << MCHK_WARN_BIT))
499
500/* Exigent machine check interrupts subclass bits in MCIC */
501#define MCHK_SD_BIT 63
502#define MCHK_PD_BIT 62
503#define MCHK_EX_MASK ((1UL << MCHK_SD_BIT) | (1UL << MCHK_PD_BIT))
504
505#define IRQ_PEND_EXT_MASK ((1UL << IRQ_PEND_EXT_IRQ_KEY) | \
506 (1UL << IRQ_PEND_EXT_CLOCK_COMP) | \
507 (1UL << IRQ_PEND_EXT_CPU_TIMER) | \
508 (1UL << IRQ_PEND_EXT_MALFUNC) | \
509 (1UL << IRQ_PEND_EXT_EMERGENCY) | \
510 (1UL << IRQ_PEND_EXT_EXTERNAL) | \
511 (1UL << IRQ_PEND_EXT_TIMING) | \
512 (1UL << IRQ_PEND_EXT_HOST) | \
513 (1UL << IRQ_PEND_EXT_SERVICE) | \
514 (1UL << IRQ_PEND_VIRTIO) | \
515 (1UL << IRQ_PEND_PFAULT_INIT) | \
516 (1UL << IRQ_PEND_PFAULT_DONE))
517
518#define IRQ_PEND_IO_MASK ((1UL << IRQ_PEND_IO_ISC_0) | \
519 (1UL << IRQ_PEND_IO_ISC_1) | \
520 (1UL << IRQ_PEND_IO_ISC_2) | \
521 (1UL << IRQ_PEND_IO_ISC_3) | \
522 (1UL << IRQ_PEND_IO_ISC_4) | \
523 (1UL << IRQ_PEND_IO_ISC_5) | \
524 (1UL << IRQ_PEND_IO_ISC_6) | \
525 (1UL << IRQ_PEND_IO_ISC_7))
526
527#define IRQ_PEND_MCHK_MASK ((1UL << IRQ_PEND_MCHK_REP) | \
528 (1UL << IRQ_PEND_MCHK_EX))
529
530struct kvm_s390_interrupt_info {
531 struct list_head list;
532 u64 type;
533 union {
534 struct kvm_s390_io_info io;
535 struct kvm_s390_ext_info ext;
536 struct kvm_s390_pgm_info pgm;
537 struct kvm_s390_emerg_info emerg;
538 struct kvm_s390_extcall_info extcall;
539 struct kvm_s390_prefix_info prefix;
540 struct kvm_s390_stop_info stop;
541 struct kvm_s390_mchk_info mchk;
542 };
543};
544
545struct kvm_s390_irq_payload {
546 struct kvm_s390_io_info io;
547 struct kvm_s390_ext_info ext;
548 struct kvm_s390_pgm_info pgm;
549 struct kvm_s390_emerg_info emerg;
550 struct kvm_s390_extcall_info extcall;
551 struct kvm_s390_prefix_info prefix;
552 struct kvm_s390_stop_info stop;
553 struct kvm_s390_mchk_info mchk;
554};
555
556struct kvm_s390_local_interrupt {
557 spinlock_t lock;
558 DECLARE_BITMAP(sigp_emerg_pending, KVM_MAX_VCPUS);
559 struct kvm_s390_irq_payload irq;
560 unsigned long pending_irqs;
561};
562
563#define FIRQ_LIST_IO_ISC_0 0
564#define FIRQ_LIST_IO_ISC_1 1
565#define FIRQ_LIST_IO_ISC_2 2
566#define FIRQ_LIST_IO_ISC_3 3
567#define FIRQ_LIST_IO_ISC_4 4
568#define FIRQ_LIST_IO_ISC_5 5
569#define FIRQ_LIST_IO_ISC_6 6
570#define FIRQ_LIST_IO_ISC_7 7
571#define FIRQ_LIST_PFAULT 8
572#define FIRQ_LIST_VIRTIO 9
573#define FIRQ_LIST_COUNT 10
574#define FIRQ_CNTR_IO 0
575#define FIRQ_CNTR_SERVICE 1
576#define FIRQ_CNTR_VIRTIO 2
577#define FIRQ_CNTR_PFAULT 3
578#define FIRQ_MAX_COUNT 4
579
580/* mask the AIS mode for a given ISC */
581#define AIS_MODE_MASK(isc) (0x80 >> isc)
582
583#define KVM_S390_AIS_MODE_ALL 0
584#define KVM_S390_AIS_MODE_SINGLE 1
585
586struct kvm_s390_float_interrupt {
587 unsigned long pending_irqs;
588 spinlock_t lock;
589 struct list_head lists[FIRQ_LIST_COUNT];
590 int counters[FIRQ_MAX_COUNT];
591 struct kvm_s390_mchk_info mchk;
592 struct kvm_s390_ext_info srv_signal;
593 int next_rr_cpu;
594 unsigned long idle_mask[BITS_TO_LONGS(KVM_MAX_VCPUS)];
595 struct mutex ais_lock;
596 u8 simm;
597 u8 nimm;
598};
599
600struct kvm_hw_wp_info_arch {
601 unsigned long addr;
602 unsigned long phys_addr;
603 int len;
604 char *old_data;
605};
606
607struct kvm_hw_bp_info_arch {
608 unsigned long addr;
609 int len;
610};
611
612/*
613 * Only the upper 16 bits of kvm_guest_debug->control are arch specific.
614 * Further KVM_GUESTDBG flags which an be used from userspace can be found in
615 * arch/s390/include/uapi/asm/kvm.h
616 */
617#define KVM_GUESTDBG_EXIT_PENDING 0x10000000
618
619#define guestdbg_enabled(vcpu) \
620 (vcpu->guest_debug & KVM_GUESTDBG_ENABLE)
621#define guestdbg_sstep_enabled(vcpu) \
622 (vcpu->guest_debug & KVM_GUESTDBG_SINGLESTEP)
623#define guestdbg_hw_bp_enabled(vcpu) \
624 (vcpu->guest_debug & KVM_GUESTDBG_USE_HW_BP)
625#define guestdbg_exit_pending(vcpu) (guestdbg_enabled(vcpu) && \
626 (vcpu->guest_debug & KVM_GUESTDBG_EXIT_PENDING))
627
628struct kvm_guestdbg_info_arch {
629 unsigned long cr0;
630 unsigned long cr9;
631 unsigned long cr10;
632 unsigned long cr11;
633 struct kvm_hw_bp_info_arch *hw_bp_info;
634 struct kvm_hw_wp_info_arch *hw_wp_info;
635 int nr_hw_bp;
636 int nr_hw_wp;
637 unsigned long last_bp;
638};
639
640struct kvm_vcpu_arch {
641 struct kvm_s390_sie_block *sie_block;
642 /* if vsie is active, currently executed shadow sie control block */
643 struct kvm_s390_sie_block *vsie_block;
644 unsigned int host_acrs[NUM_ACRS];
645 struct gs_cb *host_gscb;
646 struct fpu host_fpregs;
647 struct kvm_s390_local_interrupt local_int;
648 struct hrtimer ckc_timer;
649 struct kvm_s390_pgm_info pgm;
650 struct gmap *gmap;
651 /* backup location for the currently enabled gmap when scheduled out */
652 struct gmap *enabled_gmap;
653 struct kvm_guestdbg_info_arch guestdbg;
654 unsigned long pfault_token;
655 unsigned long pfault_select;
656 unsigned long pfault_compare;
657 bool cputm_enabled;
658 /*
659 * The seqcount protects updates to cputm_start and sie_block.cputm,
660 * this way we can have non-blocking reads with consistent values.
661 * Only the owning VCPU thread (vcpu->cpu) is allowed to change these
662 * values and to start/stop/enable/disable cpu timer accounting.
663 */
664 seqcount_t cputm_seqcount;
665 __u64 cputm_start;
666 bool gs_enabled;
667 bool skey_enabled;
668};
669
670struct kvm_vm_stat {
671 u64 inject_io;
672 u64 inject_float_mchk;
673 u64 inject_pfault_done;
674 u64 inject_service_signal;
675 u64 inject_virtio;
676 u64 remote_tlb_flush;
677};
678
679struct kvm_arch_memory_slot {
680};
681
682struct s390_map_info {
683 struct list_head list;
684 __u64 guest_addr;
685 __u64 addr;
686 struct page *page;
687};
688
689struct s390_io_adapter {
690 unsigned int id;
691 int isc;
692 bool maskable;
693 bool masked;
694 bool swap;
695 bool suppressible;
696 struct rw_semaphore maps_lock;
697 struct list_head maps;
698 atomic_t nr_maps;
699};
700
701#define MAX_S390_IO_ADAPTERS ((MAX_ISC + 1) * 8)
702#define MAX_S390_ADAPTER_MAPS 256
703
704/* maximum size of facilities and facility mask is 2k bytes */
705#define S390_ARCH_FAC_LIST_SIZE_BYTE (1<<11)
706#define S390_ARCH_FAC_LIST_SIZE_U64 \
707 (S390_ARCH_FAC_LIST_SIZE_BYTE / sizeof(u64))
708#define S390_ARCH_FAC_MASK_SIZE_BYTE S390_ARCH_FAC_LIST_SIZE_BYTE
709#define S390_ARCH_FAC_MASK_SIZE_U64 \
710 (S390_ARCH_FAC_MASK_SIZE_BYTE / sizeof(u64))
711
712struct kvm_s390_cpu_model {
713 /* facility mask supported by kvm & hosting machine */
714 __u64 fac_mask[S390_ARCH_FAC_LIST_SIZE_U64];
715 /* facility list requested by guest (in dma page) */
716 __u64 *fac_list;
717 u64 cpuid;
718 unsigned short ibc;
719};
720
721struct kvm_s390_crypto {
722 struct kvm_s390_crypto_cb *crycb;
723 __u32 crycbd;
724 __u8 aes_kw;
725 __u8 dea_kw;
726 __u8 apie;
727};
728
729#define APCB0_MASK_SIZE 1
730struct kvm_s390_apcb0 {
731 __u64 apm[APCB0_MASK_SIZE]; /* 0x0000 */
732 __u64 aqm[APCB0_MASK_SIZE]; /* 0x0008 */
733 __u64 adm[APCB0_MASK_SIZE]; /* 0x0010 */
734 __u64 reserved18; /* 0x0018 */
735};
736
737#define APCB1_MASK_SIZE 4
738struct kvm_s390_apcb1 {
739 __u64 apm[APCB1_MASK_SIZE]; /* 0x0000 */
740 __u64 aqm[APCB1_MASK_SIZE]; /* 0x0020 */
741 __u64 adm[APCB1_MASK_SIZE]; /* 0x0040 */
742 __u64 reserved60[4]; /* 0x0060 */
743};
744
745struct kvm_s390_crypto_cb {
746 struct kvm_s390_apcb0 apcb0; /* 0x0000 */
747 __u8 reserved20[0x0048 - 0x0020]; /* 0x0020 */
748 __u8 dea_wrapping_key_mask[24]; /* 0x0048 */
749 __u8 aes_wrapping_key_mask[32]; /* 0x0060 */
750 struct kvm_s390_apcb1 apcb1; /* 0x0080 */
751};
752
753struct kvm_s390_gisa {
754 union {
755 struct { /* common to all formats */
756 u32 next_alert;
757 u8 ipm;
758 u8 reserved01[2];
759 u8 iam;
760 };
761 struct { /* format 0 */
762 u32 next_alert;
763 u8 ipm;
764 u8 reserved01;
765 u8 : 6;
766 u8 g : 1;
767 u8 c : 1;
768 u8 iam;
769 u8 reserved02[4];
770 u32 airq_count;
771 } g0;
772 struct { /* format 1 */
773 u32 next_alert;
774 u8 ipm;
775 u8 simm;
776 u8 nimm;
777 u8 iam;
778 u8 aism[8];
779 u8 : 6;
780 u8 g : 1;
781 u8 c : 1;
782 u8 reserved03[11];
783 u32 airq_count;
784 } g1;
785 };
786};
787
788/*
789 * sie_page2 has to be allocated as DMA because fac_list, crycb and
790 * gisa need 31bit addresses in the sie control block.
791 */
792struct sie_page2 {
793 __u64 fac_list[S390_ARCH_FAC_LIST_SIZE_U64]; /* 0x0000 */
794 struct kvm_s390_crypto_cb crycb; /* 0x0800 */
795 struct kvm_s390_gisa gisa; /* 0x0900 */
796 u8 reserved920[0x1000 - 0x920]; /* 0x0920 */
797};
798
799struct kvm_s390_vsie {
800 struct mutex mutex;
801 struct radix_tree_root addr_to_page;
802 int page_count;
803 int next;
804 struct page *pages[KVM_MAX_VCPUS];
805};
806
807struct kvm_arch{
808 void *sca;
809 int use_esca;
810 rwlock_t sca_lock;
811 debug_info_t *dbf;
812 struct kvm_s390_float_interrupt float_int;
813 struct kvm_device *flic;
814 struct gmap *gmap;
815 unsigned long mem_limit;
816 int css_support;
817 int use_irqchip;
818 int use_cmma;
819 int use_pfmfi;
820 int use_skf;
821 int user_cpu_state_ctrl;
822 int user_sigp;
823 int user_stsi;
824 int user_instr0;
825 struct s390_io_adapter *adapters[MAX_S390_IO_ADAPTERS];
826 wait_queue_head_t ipte_wq;
827 int ipte_lock_count;
828 struct mutex ipte_mutex;
829 spinlock_t start_stop_lock;
830 struct sie_page2 *sie_page2;
831 struct kvm_s390_cpu_model model;
832 struct kvm_s390_crypto crypto;
833 struct kvm_s390_vsie vsie;
834 u8 epdx;
835 u64 epoch;
836 int migration_mode;
837 atomic64_t cmma_dirty_pages;
838 /* subset of available cpu features enabled by user space */
839 DECLARE_BITMAP(cpu_feat, KVM_S390_VM_CPU_FEAT_NR_BITS);
840 struct kvm_s390_gisa *gisa;
841};
842
843#define KVM_HVA_ERR_BAD (-1UL)
844#define KVM_HVA_ERR_RO_BAD (-2UL)
845
846static inline bool kvm_is_error_hva(unsigned long addr)
847{
848 return IS_ERR_VALUE(addr);
849}
850
851#define ASYNC_PF_PER_VCPU 64
852struct kvm_arch_async_pf {
853 unsigned long pfault_token;
854};
855
856bool kvm_arch_can_inject_async_page_present(struct kvm_vcpu *vcpu);
857
858void kvm_arch_async_page_ready(struct kvm_vcpu *vcpu,
859 struct kvm_async_pf *work);
860
861void kvm_arch_async_page_not_present(struct kvm_vcpu *vcpu,
862 struct kvm_async_pf *work);
863
864void kvm_arch_async_page_present(struct kvm_vcpu *vcpu,
865 struct kvm_async_pf *work);
866
867void kvm_arch_crypto_clear_masks(struct kvm *kvm);
868void kvm_arch_crypto_set_masks(struct kvm *kvm, unsigned long *apm,
869 unsigned long *aqm, unsigned long *adm);
870
871extern int sie64a(struct kvm_s390_sie_block *, u64 *);
872extern char sie_exit;
873
874static inline void kvm_arch_hardware_disable(void) {}
875static inline void kvm_arch_check_processor_compat(void *rtn) {}
876static inline void kvm_arch_sync_events(struct kvm *kvm) {}
877static inline void kvm_arch_vcpu_uninit(struct kvm_vcpu *vcpu) {}
878static inline void kvm_arch_sched_in(struct kvm_vcpu *vcpu, int cpu) {}
879static inline void kvm_arch_free_memslot(struct kvm *kvm,
880 struct kvm_memory_slot *free, struct kvm_memory_slot *dont) {}
881static inline void kvm_arch_memslots_updated(struct kvm *kvm, struct kvm_memslots *slots) {}
882static inline void kvm_arch_flush_shadow_all(struct kvm *kvm) {}
883static inline void kvm_arch_flush_shadow_memslot(struct kvm *kvm,
884 struct kvm_memory_slot *slot) {}
885static inline void kvm_arch_vcpu_blocking(struct kvm_vcpu *vcpu) {}
886static inline void kvm_arch_vcpu_unblocking(struct kvm_vcpu *vcpu) {}
887
888void kvm_arch_vcpu_block_finish(struct kvm_vcpu *vcpu);
889
890#endif