xref: /linux/arch/s390/include/asm/kvm_host.h (revision 71dfa617ea9f18e4585fe78364217cd32b1fc382)
1 /* SPDX-License-Identifier: GPL-2.0 */
2 /*
3  * definition for kernel virtual machines on s390
4  *
5  * Copyright IBM Corp. 2008, 2018
6  *
7  *    Author(s): Carsten Otte <cotte@de.ibm.com>
8  */
9 
10 
11 #ifndef ASM_KVM_HOST_H
12 #define ASM_KVM_HOST_H
13 
14 #include <linux/types.h>
15 #include <linux/hrtimer.h>
16 #include <linux/interrupt.h>
17 #include <linux/kvm_types.h>
18 #include <linux/kvm_host.h>
19 #include <linux/kvm.h>
20 #include <linux/seqlock.h>
21 #include <linux/module.h>
22 #include <linux/pci.h>
23 #include <linux/mmu_notifier.h>
24 #include <asm/debug.h>
25 #include <asm/cpu.h>
26 #include <asm/fpu.h>
27 #include <asm/isc.h>
28 #include <asm/guarded_storage.h>
29 
30 #define KVM_S390_BSCA_CPU_SLOTS 64
31 #define KVM_S390_ESCA_CPU_SLOTS 248
32 #define KVM_MAX_VCPUS 255
33 
34 /*
35  * These seem to be used for allocating ->chip in the routing table, which we
36  * don't use. 1 is as small as we can get to reduce the needed memory. If we
37  * need to look at ->chip later on, we'll need to revisit this.
38  */
39 #define KVM_NR_IRQCHIPS 1
40 #define KVM_IRQCHIP_NUM_PINS 1
41 #define KVM_HALT_POLL_NS_DEFAULT 50000
42 
43 /* s390-specific vcpu->requests bit members */
44 #define KVM_REQ_ENABLE_IBS	KVM_ARCH_REQ(0)
45 #define KVM_REQ_DISABLE_IBS	KVM_ARCH_REQ(1)
46 #define KVM_REQ_ICPT_OPEREXC	KVM_ARCH_REQ(2)
47 #define KVM_REQ_START_MIGRATION KVM_ARCH_REQ(3)
48 #define KVM_REQ_STOP_MIGRATION  KVM_ARCH_REQ(4)
49 #define KVM_REQ_VSIE_RESTART	KVM_ARCH_REQ(5)
50 #define KVM_REQ_REFRESH_GUEST_PREFIX	\
51 	KVM_ARCH_REQ_FLAGS(6, KVM_REQUEST_WAIT | KVM_REQUEST_NO_WAKEUP)
52 
53 #define SIGP_CTRL_C		0x80
54 #define SIGP_CTRL_SCN_MASK	0x3f
55 
56 union bsca_sigp_ctrl {
57 	__u8 value;
58 	struct {
59 		__u8 c : 1;
60 		__u8 r : 1;
61 		__u8 scn : 6;
62 	};
63 };
64 
65 union esca_sigp_ctrl {
66 	__u16 value;
67 	struct {
68 		__u8 c : 1;
69 		__u8 reserved: 7;
70 		__u8 scn;
71 	};
72 };
73 
74 struct esca_entry {
75 	union esca_sigp_ctrl sigp_ctrl;
76 	__u16   reserved1[3];
77 	__u64   sda;
78 	__u64   reserved2[6];
79 };
80 
81 struct bsca_entry {
82 	__u8	reserved0;
83 	union bsca_sigp_ctrl	sigp_ctrl;
84 	__u16	reserved[3];
85 	__u64	sda;
86 	__u64	reserved2[2];
87 };
88 
89 union ipte_control {
90 	unsigned long val;
91 	struct {
92 		unsigned long k  : 1;
93 		unsigned long kh : 31;
94 		unsigned long kg : 32;
95 	};
96 };
97 
98 union sca_utility {
99 	__u16 val;
100 	struct {
101 		__u16 mtcr : 1;
102 		__u16 reserved : 15;
103 	};
104 };
105 
106 struct bsca_block {
107 	union ipte_control ipte_control;
108 	__u64	reserved[5];
109 	__u64	mcn;
110 	union sca_utility utility;
111 	__u8	reserved2[6];
112 	struct bsca_entry cpu[KVM_S390_BSCA_CPU_SLOTS];
113 };
114 
115 struct esca_block {
116 	union ipte_control ipte_control;
117 	__u64   reserved1[6];
118 	union sca_utility utility;
119 	__u8	reserved2[6];
120 	__u64   mcn[4];
121 	__u64   reserved3[20];
122 	struct esca_entry cpu[KVM_S390_ESCA_CPU_SLOTS];
123 };
124 
125 /*
126  * This struct is used to store some machine check info from lowcore
127  * for machine checks that happen while the guest is running.
128  * This info in host's lowcore might be overwritten by a second machine
129  * check from host when host is in the machine check's high-level handling.
130  * The size is 24 bytes.
131  */
132 struct mcck_volatile_info {
133 	__u64 mcic;
134 	__u64 failing_storage_address;
135 	__u32 ext_damage_code;
136 	__u32 reserved;
137 };
138 
139 #define CR0_INITIAL_MASK (CR0_UNUSED_56 | CR0_INTERRUPT_KEY_SUBMASK | \
140 			  CR0_MEASUREMENT_ALERT_SUBMASK)
141 #define CR14_INITIAL_MASK (CR14_UNUSED_32 | CR14_UNUSED_33 | \
142 			   CR14_EXTERNAL_DAMAGE_SUBMASK)
143 
144 #define SIDAD_SIZE_MASK		0xff
145 #define sida_addr(sie_block) phys_to_virt((sie_block)->sidad & PAGE_MASK)
146 #define sida_size(sie_block) \
147 	((((sie_block)->sidad & SIDAD_SIZE_MASK) + 1) * PAGE_SIZE)
148 
149 #define CPUSTAT_STOPPED    0x80000000
150 #define CPUSTAT_WAIT       0x10000000
151 #define CPUSTAT_ECALL_PEND 0x08000000
152 #define CPUSTAT_STOP_INT   0x04000000
153 #define CPUSTAT_IO_INT     0x02000000
154 #define CPUSTAT_EXT_INT    0x01000000
155 #define CPUSTAT_RUNNING    0x00800000
156 #define CPUSTAT_RETAINED   0x00400000
157 #define CPUSTAT_TIMING_SUB 0x00020000
158 #define CPUSTAT_SIE_SUB    0x00010000
159 #define CPUSTAT_RRF        0x00008000
160 #define CPUSTAT_SLSV       0x00004000
161 #define CPUSTAT_SLSR       0x00002000
162 #define CPUSTAT_ZARCH      0x00000800
163 #define CPUSTAT_MCDS       0x00000100
164 #define CPUSTAT_KSS        0x00000200
165 #define CPUSTAT_SM         0x00000080
166 #define CPUSTAT_IBS        0x00000040
167 #define CPUSTAT_GED2       0x00000010
168 #define CPUSTAT_G          0x00000008
169 #define CPUSTAT_GED        0x00000004
170 #define CPUSTAT_J          0x00000002
171 #define CPUSTAT_P          0x00000001
172 
173 struct kvm_s390_sie_block {
174 	atomic_t cpuflags;		/* 0x0000 */
175 	__u32 : 1;			/* 0x0004 */
176 	__u32 prefix : 18;
177 	__u32 : 1;
178 	__u32 ibc : 12;
179 	__u8	reserved08[4];		/* 0x0008 */
180 #define PROG_IN_SIE (1<<0)
181 	__u32	prog0c;			/* 0x000c */
182 	union {
183 		__u8	reserved10[16];		/* 0x0010 */
184 		struct {
185 			__u64	pv_handle_cpu;
186 			__u64	pv_handle_config;
187 		};
188 	};
189 #define PROG_BLOCK_SIE	(1<<0)
190 #define PROG_REQUEST	(1<<1)
191 	atomic_t prog20;		/* 0x0020 */
192 	__u8	reserved24[4];		/* 0x0024 */
193 	__u64	cputm;			/* 0x0028 */
194 	__u64	ckc;			/* 0x0030 */
195 	__u64	epoch;			/* 0x0038 */
196 	__u32	svcc;			/* 0x0040 */
197 #define LCTL_CR0	0x8000
198 #define LCTL_CR6	0x0200
199 #define LCTL_CR9	0x0040
200 #define LCTL_CR10	0x0020
201 #define LCTL_CR11	0x0010
202 #define LCTL_CR14	0x0002
203 	__u16   lctl;			/* 0x0044 */
204 	__s16	icpua;			/* 0x0046 */
205 #define ICTL_OPEREXC	0x80000000
206 #define ICTL_PINT	0x20000000
207 #define ICTL_LPSW	0x00400000
208 #define ICTL_STCTL	0x00040000
209 #define ICTL_ISKE	0x00004000
210 #define ICTL_SSKE	0x00002000
211 #define ICTL_RRBE	0x00001000
212 #define ICTL_TPROT	0x00000200
213 	__u32	ictl;			/* 0x0048 */
214 #define ECA_CEI		0x80000000
215 #define ECA_IB		0x40000000
216 #define ECA_SIGPI	0x10000000
217 #define ECA_MVPGI	0x01000000
218 #define ECA_AIV		0x00200000
219 #define ECA_VX		0x00020000
220 #define ECA_PROTEXCI	0x00002000
221 #define ECA_APIE	0x00000008
222 #define ECA_SII		0x00000001
223 	__u32	eca;			/* 0x004c */
224 #define ICPT_INST	0x04
225 #define ICPT_PROGI	0x08
226 #define ICPT_INSTPROGI	0x0C
227 #define ICPT_EXTREQ	0x10
228 #define ICPT_EXTINT	0x14
229 #define ICPT_IOREQ	0x18
230 #define ICPT_WAIT	0x1c
231 #define ICPT_VALIDITY	0x20
232 #define ICPT_STOP	0x28
233 #define ICPT_OPEREXC	0x2C
234 #define ICPT_PARTEXEC	0x38
235 #define ICPT_IOINST	0x40
236 #define ICPT_KSS	0x5c
237 #define ICPT_MCHKREQ	0x60
238 #define ICPT_INT_ENABLE	0x64
239 #define ICPT_PV_INSTR	0x68
240 #define ICPT_PV_NOTIFY	0x6c
241 #define ICPT_PV_PREF	0x70
242 	__u8	icptcode;		/* 0x0050 */
243 	__u8	icptstatus;		/* 0x0051 */
244 	__u16	ihcpu;			/* 0x0052 */
245 	__u8	reserved54;		/* 0x0054 */
246 #define IICTL_CODE_NONE		 0x00
247 #define IICTL_CODE_MCHK		 0x01
248 #define IICTL_CODE_EXT		 0x02
249 #define IICTL_CODE_IO		 0x03
250 #define IICTL_CODE_RESTART	 0x04
251 #define IICTL_CODE_SPECIFICATION 0x10
252 #define IICTL_CODE_OPERAND	 0x11
253 	__u8	iictl;			/* 0x0055 */
254 	__u16	ipa;			/* 0x0056 */
255 	__u32	ipb;			/* 0x0058 */
256 	__u32	scaoh;			/* 0x005c */
257 #define FPF_BPBC 	0x20
258 	__u8	fpf;			/* 0x0060 */
259 #define ECB_GS		0x40
260 #define ECB_TE		0x10
261 #define ECB_SPECI	0x08
262 #define ECB_SRSI	0x04
263 #define ECB_HOSTPROTINT	0x02
264 #define ECB_PTF		0x01
265 	__u8	ecb;			/* 0x0061 */
266 #define ECB2_CMMA	0x80
267 #define ECB2_IEP	0x20
268 #define ECB2_PFMFI	0x08
269 #define ECB2_ESCA	0x04
270 #define ECB2_ZPCI_LSI	0x02
271 	__u8    ecb2;                   /* 0x0062 */
272 #define ECB3_AISI	0x20
273 #define ECB3_AISII	0x10
274 #define ECB3_DEA 0x08
275 #define ECB3_AES 0x04
276 #define ECB3_RI  0x01
277 	__u8    ecb3;			/* 0x0063 */
278 #define ESCA_SCAOL_MASK ~0x3fU
279 	__u32	scaol;			/* 0x0064 */
280 	__u8	sdf;			/* 0x0068 */
281 	__u8    epdx;			/* 0x0069 */
282 	__u8	cpnc;			/* 0x006a */
283 	__u8	reserved6b;		/* 0x006b */
284 	__u32	todpr;			/* 0x006c */
285 #define GISA_FORMAT1 0x00000001
286 	__u32	gd;			/* 0x0070 */
287 	__u8	reserved74[12];		/* 0x0074 */
288 	__u64	mso;			/* 0x0080 */
289 	__u64	msl;			/* 0x0088 */
290 	psw_t	gpsw;			/* 0x0090 */
291 	__u64	gg14;			/* 0x00a0 */
292 	__u64	gg15;			/* 0x00a8 */
293 	__u8	reservedb0[8];		/* 0x00b0 */
294 #define HPID_KVM	0x4
295 #define HPID_VSIE	0x5
296 	__u8	hpid;			/* 0x00b8 */
297 	__u8	reservedb9[7];		/* 0x00b9 */
298 	union {
299 		struct {
300 			__u32	eiparams;	/* 0x00c0 */
301 			__u16	extcpuaddr;	/* 0x00c4 */
302 			__u16	eic;		/* 0x00c6 */
303 		};
304 		__u64	mcic;			/* 0x00c0 */
305 	} __packed;
306 	__u32	reservedc8;		/* 0x00c8 */
307 	union {
308 		struct {
309 			__u16	pgmilc;		/* 0x00cc */
310 			__u16	iprcc;		/* 0x00ce */
311 		};
312 		__u32	edc;			/* 0x00cc */
313 	} __packed;
314 	union {
315 		struct {
316 			__u32	dxc;		/* 0x00d0 */
317 			__u16	mcn;		/* 0x00d4 */
318 			__u8	perc;		/* 0x00d6 */
319 			__u8	peratmid;	/* 0x00d7 */
320 		};
321 		__u64	faddr;			/* 0x00d0 */
322 	} __packed;
323 	__u64	peraddr;		/* 0x00d8 */
324 	__u8	eai;			/* 0x00e0 */
325 	__u8	peraid;			/* 0x00e1 */
326 	__u8	oai;			/* 0x00e2 */
327 	__u8	armid;			/* 0x00e3 */
328 	__u8	reservede4[4];		/* 0x00e4 */
329 	union {
330 		__u64	tecmc;		/* 0x00e8 */
331 		struct {
332 			__u16	subchannel_id;	/* 0x00e8 */
333 			__u16	subchannel_nr;	/* 0x00ea */
334 			__u32	io_int_parm;	/* 0x00ec */
335 			__u32	io_int_word;	/* 0x00f0 */
336 		};
337 	} __packed;
338 	__u8	reservedf4[8];		/* 0x00f4 */
339 #define CRYCB_FORMAT_MASK 0x00000003
340 #define CRYCB_FORMAT0 0x00000000
341 #define CRYCB_FORMAT1 0x00000001
342 #define CRYCB_FORMAT2 0x00000003
343 	__u32	crycbd;			/* 0x00fc */
344 	__u64	gcr[16];		/* 0x0100 */
345 	union {
346 		__u64	gbea;		/* 0x0180 */
347 		__u64	sidad;
348 	};
349 	__u8    reserved188[8];		/* 0x0188 */
350 	__u64   sdnxo;			/* 0x0190 */
351 	__u8    reserved198[8];		/* 0x0198 */
352 	__u32	fac;			/* 0x01a0 */
353 	__u8	reserved1a4[20];	/* 0x01a4 */
354 	__u64	cbrlo;			/* 0x01b8 */
355 	__u8	reserved1c0[8];		/* 0x01c0 */
356 #define ECD_HOSTREGMGMT	0x20000000
357 #define ECD_MEF		0x08000000
358 #define ECD_ETOKENF	0x02000000
359 #define ECD_ECC		0x00200000
360 	__u32	ecd;			/* 0x01c8 */
361 	__u8	reserved1cc[18];	/* 0x01cc */
362 	__u64	pp;			/* 0x01de */
363 	__u8	reserved1e6[2];		/* 0x01e6 */
364 	__u64	itdba;			/* 0x01e8 */
365 	__u64   riccbd;			/* 0x01f0 */
366 	__u64	gvrd;			/* 0x01f8 */
367 } __packed __aligned(512);
368 
369 struct kvm_s390_itdb {
370 	__u8	data[256];
371 };
372 
373 struct sie_page {
374 	struct kvm_s390_sie_block sie_block;
375 	struct mcck_volatile_info mcck_info;	/* 0x0200 */
376 	__u8 reserved218[360];		/* 0x0218 */
377 	__u64 pv_grregs[16];		/* 0x0380 */
378 	__u8 reserved400[512];		/* 0x0400 */
379 	struct kvm_s390_itdb itdb;	/* 0x0600 */
380 	__u8 reserved700[2304];		/* 0x0700 */
381 };
382 
383 struct kvm_vcpu_stat {
384 	struct kvm_vcpu_stat_generic generic;
385 	u64 exit_userspace;
386 	u64 exit_null;
387 	u64 exit_external_request;
388 	u64 exit_io_request;
389 	u64 exit_external_interrupt;
390 	u64 exit_stop_request;
391 	u64 exit_validity;
392 	u64 exit_instruction;
393 	u64 exit_pei;
394 	u64 halt_no_poll_steal;
395 	u64 instruction_lctl;
396 	u64 instruction_lctlg;
397 	u64 instruction_stctl;
398 	u64 instruction_stctg;
399 	u64 exit_program_interruption;
400 	u64 exit_instr_and_program;
401 	u64 exit_operation_exception;
402 	u64 deliver_ckc;
403 	u64 deliver_cputm;
404 	u64 deliver_external_call;
405 	u64 deliver_emergency_signal;
406 	u64 deliver_service_signal;
407 	u64 deliver_virtio;
408 	u64 deliver_stop_signal;
409 	u64 deliver_prefix_signal;
410 	u64 deliver_restart_signal;
411 	u64 deliver_program;
412 	u64 deliver_io;
413 	u64 deliver_machine_check;
414 	u64 exit_wait_state;
415 	u64 inject_ckc;
416 	u64 inject_cputm;
417 	u64 inject_external_call;
418 	u64 inject_emergency_signal;
419 	u64 inject_mchk;
420 	u64 inject_pfault_init;
421 	u64 inject_program;
422 	u64 inject_restart;
423 	u64 inject_set_prefix;
424 	u64 inject_stop_signal;
425 	u64 instruction_epsw;
426 	u64 instruction_gs;
427 	u64 instruction_io_other;
428 	u64 instruction_lpsw;
429 	u64 instruction_lpswe;
430 	u64 instruction_pfmf;
431 	u64 instruction_ptff;
432 	u64 instruction_sck;
433 	u64 instruction_sckpf;
434 	u64 instruction_stidp;
435 	u64 instruction_spx;
436 	u64 instruction_stpx;
437 	u64 instruction_stap;
438 	u64 instruction_iske;
439 	u64 instruction_ri;
440 	u64 instruction_rrbe;
441 	u64 instruction_sske;
442 	u64 instruction_ipte_interlock;
443 	u64 instruction_stsi;
444 	u64 instruction_stfl;
445 	u64 instruction_tb;
446 	u64 instruction_tpi;
447 	u64 instruction_tprot;
448 	u64 instruction_tsch;
449 	u64 instruction_sie;
450 	u64 instruction_essa;
451 	u64 instruction_sthyi;
452 	u64 instruction_sigp_sense;
453 	u64 instruction_sigp_sense_running;
454 	u64 instruction_sigp_external_call;
455 	u64 instruction_sigp_emergency;
456 	u64 instruction_sigp_cond_emergency;
457 	u64 instruction_sigp_start;
458 	u64 instruction_sigp_stop;
459 	u64 instruction_sigp_stop_store_status;
460 	u64 instruction_sigp_store_status;
461 	u64 instruction_sigp_store_adtl_status;
462 	u64 instruction_sigp_arch;
463 	u64 instruction_sigp_prefix;
464 	u64 instruction_sigp_restart;
465 	u64 instruction_sigp_init_cpu_reset;
466 	u64 instruction_sigp_cpu_reset;
467 	u64 instruction_sigp_unknown;
468 	u64 instruction_diagnose_10;
469 	u64 instruction_diagnose_44;
470 	u64 instruction_diagnose_9c;
471 	u64 diag_9c_ignored;
472 	u64 diag_9c_forward;
473 	u64 instruction_diagnose_258;
474 	u64 instruction_diagnose_308;
475 	u64 instruction_diagnose_500;
476 	u64 instruction_diagnose_other;
477 	u64 pfault_sync;
478 };
479 
480 #define PGM_OPERATION			0x01
481 #define PGM_PRIVILEGED_OP		0x02
482 #define PGM_EXECUTE			0x03
483 #define PGM_PROTECTION			0x04
484 #define PGM_ADDRESSING			0x05
485 #define PGM_SPECIFICATION		0x06
486 #define PGM_DATA			0x07
487 #define PGM_FIXED_POINT_OVERFLOW	0x08
488 #define PGM_FIXED_POINT_DIVIDE		0x09
489 #define PGM_DECIMAL_OVERFLOW		0x0a
490 #define PGM_DECIMAL_DIVIDE		0x0b
491 #define PGM_HFP_EXPONENT_OVERFLOW	0x0c
492 #define PGM_HFP_EXPONENT_UNDERFLOW	0x0d
493 #define PGM_HFP_SIGNIFICANCE		0x0e
494 #define PGM_HFP_DIVIDE			0x0f
495 #define PGM_SEGMENT_TRANSLATION		0x10
496 #define PGM_PAGE_TRANSLATION		0x11
497 #define PGM_TRANSLATION_SPEC		0x12
498 #define PGM_SPECIAL_OPERATION		0x13
499 #define PGM_OPERAND			0x15
500 #define PGM_TRACE_TABEL			0x16
501 #define PGM_VECTOR_PROCESSING		0x1b
502 #define PGM_SPACE_SWITCH		0x1c
503 #define PGM_HFP_SQUARE_ROOT		0x1d
504 #define PGM_PC_TRANSLATION_SPEC		0x1f
505 #define PGM_AFX_TRANSLATION		0x20
506 #define PGM_ASX_TRANSLATION		0x21
507 #define PGM_LX_TRANSLATION		0x22
508 #define PGM_EX_TRANSLATION		0x23
509 #define PGM_PRIMARY_AUTHORITY		0x24
510 #define PGM_SECONDARY_AUTHORITY		0x25
511 #define PGM_LFX_TRANSLATION		0x26
512 #define PGM_LSX_TRANSLATION		0x27
513 #define PGM_ALET_SPECIFICATION		0x28
514 #define PGM_ALEN_TRANSLATION		0x29
515 #define PGM_ALE_SEQUENCE		0x2a
516 #define PGM_ASTE_VALIDITY		0x2b
517 #define PGM_ASTE_SEQUENCE		0x2c
518 #define PGM_EXTENDED_AUTHORITY		0x2d
519 #define PGM_LSTE_SEQUENCE		0x2e
520 #define PGM_ASTE_INSTANCE		0x2f
521 #define PGM_STACK_FULL			0x30
522 #define PGM_STACK_EMPTY			0x31
523 #define PGM_STACK_SPECIFICATION		0x32
524 #define PGM_STACK_TYPE			0x33
525 #define PGM_STACK_OPERATION		0x34
526 #define PGM_ASCE_TYPE			0x38
527 #define PGM_REGION_FIRST_TRANS		0x39
528 #define PGM_REGION_SECOND_TRANS		0x3a
529 #define PGM_REGION_THIRD_TRANS		0x3b
530 #define PGM_MONITOR			0x40
531 #define PGM_PER				0x80
532 #define PGM_CRYPTO_OPERATION		0x119
533 
534 /* irq types in ascend order of priorities */
535 enum irq_types {
536 	IRQ_PEND_SET_PREFIX = 0,
537 	IRQ_PEND_RESTART,
538 	IRQ_PEND_SIGP_STOP,
539 	IRQ_PEND_IO_ISC_7,
540 	IRQ_PEND_IO_ISC_6,
541 	IRQ_PEND_IO_ISC_5,
542 	IRQ_PEND_IO_ISC_4,
543 	IRQ_PEND_IO_ISC_3,
544 	IRQ_PEND_IO_ISC_2,
545 	IRQ_PEND_IO_ISC_1,
546 	IRQ_PEND_IO_ISC_0,
547 	IRQ_PEND_VIRTIO,
548 	IRQ_PEND_PFAULT_DONE,
549 	IRQ_PEND_PFAULT_INIT,
550 	IRQ_PEND_EXT_HOST,
551 	IRQ_PEND_EXT_SERVICE,
552 	IRQ_PEND_EXT_SERVICE_EV,
553 	IRQ_PEND_EXT_TIMING,
554 	IRQ_PEND_EXT_CPU_TIMER,
555 	IRQ_PEND_EXT_CLOCK_COMP,
556 	IRQ_PEND_EXT_EXTERNAL,
557 	IRQ_PEND_EXT_EMERGENCY,
558 	IRQ_PEND_EXT_MALFUNC,
559 	IRQ_PEND_EXT_IRQ_KEY,
560 	IRQ_PEND_MCHK_REP,
561 	IRQ_PEND_PROG,
562 	IRQ_PEND_SVC,
563 	IRQ_PEND_MCHK_EX,
564 	IRQ_PEND_COUNT
565 };
566 
567 /* We have 2M for virtio device descriptor pages. Smallest amount of
568  * memory per page is 24 bytes (1 queue), so (2048*1024) / 24 = 87381
569  */
570 #define KVM_S390_MAX_VIRTIO_IRQS 87381
571 
572 /*
573  * Repressible (non-floating) machine check interrupts
574  * subclass bits in MCIC
575  */
576 #define MCHK_EXTD_BIT 58
577 #define MCHK_DEGR_BIT 56
578 #define MCHK_WARN_BIT 55
579 #define MCHK_REP_MASK ((1UL << MCHK_DEGR_BIT) | \
580 		       (1UL << MCHK_EXTD_BIT) | \
581 		       (1UL << MCHK_WARN_BIT))
582 
583 /* Exigent machine check interrupts subclass bits in MCIC */
584 #define MCHK_SD_BIT 63
585 #define MCHK_PD_BIT 62
586 #define MCHK_EX_MASK ((1UL << MCHK_SD_BIT) | (1UL << MCHK_PD_BIT))
587 
588 #define IRQ_PEND_EXT_MASK ((1UL << IRQ_PEND_EXT_IRQ_KEY)    | \
589 			   (1UL << IRQ_PEND_EXT_CLOCK_COMP) | \
590 			   (1UL << IRQ_PEND_EXT_CPU_TIMER)  | \
591 			   (1UL << IRQ_PEND_EXT_MALFUNC)    | \
592 			   (1UL << IRQ_PEND_EXT_EMERGENCY)  | \
593 			   (1UL << IRQ_PEND_EXT_EXTERNAL)   | \
594 			   (1UL << IRQ_PEND_EXT_TIMING)     | \
595 			   (1UL << IRQ_PEND_EXT_HOST)       | \
596 			   (1UL << IRQ_PEND_EXT_SERVICE)    | \
597 			   (1UL << IRQ_PEND_EXT_SERVICE_EV) | \
598 			   (1UL << IRQ_PEND_VIRTIO)         | \
599 			   (1UL << IRQ_PEND_PFAULT_INIT)    | \
600 			   (1UL << IRQ_PEND_PFAULT_DONE))
601 
602 #define IRQ_PEND_IO_MASK ((1UL << IRQ_PEND_IO_ISC_0) | \
603 			  (1UL << IRQ_PEND_IO_ISC_1) | \
604 			  (1UL << IRQ_PEND_IO_ISC_2) | \
605 			  (1UL << IRQ_PEND_IO_ISC_3) | \
606 			  (1UL << IRQ_PEND_IO_ISC_4) | \
607 			  (1UL << IRQ_PEND_IO_ISC_5) | \
608 			  (1UL << IRQ_PEND_IO_ISC_6) | \
609 			  (1UL << IRQ_PEND_IO_ISC_7))
610 
611 #define IRQ_PEND_MCHK_MASK ((1UL << IRQ_PEND_MCHK_REP) | \
612 			    (1UL << IRQ_PEND_MCHK_EX))
613 
614 #define IRQ_PEND_EXT_II_MASK ((1UL << IRQ_PEND_EXT_CPU_TIMER)  | \
615 			      (1UL << IRQ_PEND_EXT_CLOCK_COMP) | \
616 			      (1UL << IRQ_PEND_EXT_EMERGENCY)  | \
617 			      (1UL << IRQ_PEND_EXT_EXTERNAL)   | \
618 			      (1UL << IRQ_PEND_EXT_SERVICE)    | \
619 			      (1UL << IRQ_PEND_EXT_SERVICE_EV))
620 
621 struct kvm_s390_interrupt_info {
622 	struct list_head list;
623 	u64	type;
624 	union {
625 		struct kvm_s390_io_info io;
626 		struct kvm_s390_ext_info ext;
627 		struct kvm_s390_pgm_info pgm;
628 		struct kvm_s390_emerg_info emerg;
629 		struct kvm_s390_extcall_info extcall;
630 		struct kvm_s390_prefix_info prefix;
631 		struct kvm_s390_stop_info stop;
632 		struct kvm_s390_mchk_info mchk;
633 	};
634 };
635 
636 struct kvm_s390_irq_payload {
637 	struct kvm_s390_io_info io;
638 	struct kvm_s390_ext_info ext;
639 	struct kvm_s390_pgm_info pgm;
640 	struct kvm_s390_emerg_info emerg;
641 	struct kvm_s390_extcall_info extcall;
642 	struct kvm_s390_prefix_info prefix;
643 	struct kvm_s390_stop_info stop;
644 	struct kvm_s390_mchk_info mchk;
645 };
646 
647 struct kvm_s390_local_interrupt {
648 	spinlock_t lock;
649 	DECLARE_BITMAP(sigp_emerg_pending, KVM_MAX_VCPUS);
650 	struct kvm_s390_irq_payload irq;
651 	unsigned long pending_irqs;
652 };
653 
654 #define FIRQ_LIST_IO_ISC_0 0
655 #define FIRQ_LIST_IO_ISC_1 1
656 #define FIRQ_LIST_IO_ISC_2 2
657 #define FIRQ_LIST_IO_ISC_3 3
658 #define FIRQ_LIST_IO_ISC_4 4
659 #define FIRQ_LIST_IO_ISC_5 5
660 #define FIRQ_LIST_IO_ISC_6 6
661 #define FIRQ_LIST_IO_ISC_7 7
662 #define FIRQ_LIST_PFAULT   8
663 #define FIRQ_LIST_VIRTIO   9
664 #define FIRQ_LIST_COUNT   10
665 #define FIRQ_CNTR_IO       0
666 #define FIRQ_CNTR_SERVICE  1
667 #define FIRQ_CNTR_VIRTIO   2
668 #define FIRQ_CNTR_PFAULT   3
669 #define FIRQ_MAX_COUNT     4
670 
671 /* mask the AIS mode for a given ISC */
672 #define AIS_MODE_MASK(isc) (0x80 >> isc)
673 
674 #define KVM_S390_AIS_MODE_ALL    0
675 #define KVM_S390_AIS_MODE_SINGLE 1
676 
677 struct kvm_s390_float_interrupt {
678 	unsigned long pending_irqs;
679 	unsigned long masked_irqs;
680 	spinlock_t lock;
681 	struct list_head lists[FIRQ_LIST_COUNT];
682 	int counters[FIRQ_MAX_COUNT];
683 	struct kvm_s390_mchk_info mchk;
684 	struct kvm_s390_ext_info srv_signal;
685 	int next_rr_cpu;
686 	struct mutex ais_lock;
687 	u8 simm;
688 	u8 nimm;
689 };
690 
691 struct kvm_hw_wp_info_arch {
692 	unsigned long addr;
693 	unsigned long phys_addr;
694 	int len;
695 	char *old_data;
696 };
697 
698 struct kvm_hw_bp_info_arch {
699 	unsigned long addr;
700 	int len;
701 };
702 
703 /*
704  * Only the upper 16 bits of kvm_guest_debug->control are arch specific.
705  * Further KVM_GUESTDBG flags which an be used from userspace can be found in
706  * arch/s390/include/uapi/asm/kvm.h
707  */
708 #define KVM_GUESTDBG_EXIT_PENDING 0x10000000
709 
710 #define guestdbg_enabled(vcpu) \
711 		(vcpu->guest_debug & KVM_GUESTDBG_ENABLE)
712 #define guestdbg_sstep_enabled(vcpu) \
713 		(vcpu->guest_debug & KVM_GUESTDBG_SINGLESTEP)
714 #define guestdbg_hw_bp_enabled(vcpu) \
715 		(vcpu->guest_debug & KVM_GUESTDBG_USE_HW_BP)
716 #define guestdbg_exit_pending(vcpu) (guestdbg_enabled(vcpu) && \
717 		(vcpu->guest_debug & KVM_GUESTDBG_EXIT_PENDING))
718 
719 #define KVM_GUESTDBG_VALID_MASK \
720 		(KVM_GUESTDBG_ENABLE | KVM_GUESTDBG_SINGLESTEP |\
721 		KVM_GUESTDBG_USE_HW_BP | KVM_GUESTDBG_EXIT_PENDING)
722 
723 struct kvm_guestdbg_info_arch {
724 	unsigned long cr0;
725 	unsigned long cr9;
726 	unsigned long cr10;
727 	unsigned long cr11;
728 	struct kvm_hw_bp_info_arch *hw_bp_info;
729 	struct kvm_hw_wp_info_arch *hw_wp_info;
730 	int nr_hw_bp;
731 	int nr_hw_wp;
732 	unsigned long last_bp;
733 };
734 
735 struct kvm_s390_pv_vcpu {
736 	u64 handle;
737 	unsigned long stor_base;
738 };
739 
740 struct kvm_vcpu_arch {
741 	struct kvm_s390_sie_block *sie_block;
742 	/* if vsie is active, currently executed shadow sie control block */
743 	struct kvm_s390_sie_block *vsie_block;
744 	unsigned int      host_acrs[NUM_ACRS];
745 	struct gs_cb      *host_gscb;
746 	struct kvm_s390_local_interrupt local_int;
747 	struct hrtimer    ckc_timer;
748 	struct kvm_s390_pgm_info pgm;
749 	struct gmap *gmap;
750 	/* backup location for the currently enabled gmap when scheduled out */
751 	struct gmap *enabled_gmap;
752 	struct kvm_guestdbg_info_arch guestdbg;
753 	unsigned long pfault_token;
754 	unsigned long pfault_select;
755 	unsigned long pfault_compare;
756 	bool cputm_enabled;
757 	/*
758 	 * The seqcount protects updates to cputm_start and sie_block.cputm,
759 	 * this way we can have non-blocking reads with consistent values.
760 	 * Only the owning VCPU thread (vcpu->cpu) is allowed to change these
761 	 * values and to start/stop/enable/disable cpu timer accounting.
762 	 */
763 	seqcount_t cputm_seqcount;
764 	__u64 cputm_start;
765 	bool gs_enabled;
766 	bool skey_enabled;
767 	/* Indicator if the access registers have been loaded from guest */
768 	bool acrs_loaded;
769 	struct kvm_s390_pv_vcpu pv;
770 	union diag318_info diag318_info;
771 };
772 
773 struct kvm_vm_stat {
774 	struct kvm_vm_stat_generic generic;
775 	u64 inject_io;
776 	u64 inject_float_mchk;
777 	u64 inject_pfault_done;
778 	u64 inject_service_signal;
779 	u64 inject_virtio;
780 	u64 aen_forward;
781 	u64 gmap_shadow_create;
782 	u64 gmap_shadow_reuse;
783 	u64 gmap_shadow_r1_entry;
784 	u64 gmap_shadow_r2_entry;
785 	u64 gmap_shadow_r3_entry;
786 	u64 gmap_shadow_sg_entry;
787 	u64 gmap_shadow_pg_entry;
788 };
789 
790 struct kvm_arch_memory_slot {
791 };
792 
793 struct s390_map_info {
794 	struct list_head list;
795 	__u64 guest_addr;
796 	__u64 addr;
797 	struct page *page;
798 };
799 
800 struct s390_io_adapter {
801 	unsigned int id;
802 	int isc;
803 	bool maskable;
804 	bool masked;
805 	bool swap;
806 	bool suppressible;
807 };
808 
809 #define MAX_S390_IO_ADAPTERS ((MAX_ISC + 1) * 8)
810 #define MAX_S390_ADAPTER_MAPS 256
811 
812 /* maximum size of facilities and facility mask is 2k bytes */
813 #define S390_ARCH_FAC_LIST_SIZE_BYTE (1<<11)
814 #define S390_ARCH_FAC_LIST_SIZE_U64 \
815 	(S390_ARCH_FAC_LIST_SIZE_BYTE / sizeof(u64))
816 #define S390_ARCH_FAC_MASK_SIZE_BYTE S390_ARCH_FAC_LIST_SIZE_BYTE
817 #define S390_ARCH_FAC_MASK_SIZE_U64 \
818 	(S390_ARCH_FAC_MASK_SIZE_BYTE / sizeof(u64))
819 
820 struct kvm_s390_cpu_model {
821 	/* facility mask supported by kvm & hosting machine */
822 	__u64 fac_mask[S390_ARCH_FAC_MASK_SIZE_U64];
823 	struct kvm_s390_vm_cpu_subfunc subfuncs;
824 	/* facility list requested by guest (in dma page) */
825 	__u64 *fac_list;
826 	u64 cpuid;
827 	unsigned short ibc;
828 	/* subset of available UV-features for pv-guests enabled by user space */
829 	struct kvm_s390_vm_cpu_uv_feat uv_feat_guest;
830 };
831 
832 typedef int (*crypto_hook)(struct kvm_vcpu *vcpu);
833 
834 struct kvm_s390_crypto {
835 	struct kvm_s390_crypto_cb *crycb;
836 	struct rw_semaphore pqap_hook_rwsem;
837 	crypto_hook *pqap_hook;
838 	__u32 crycbd;
839 	__u8 aes_kw;
840 	__u8 dea_kw;
841 	__u8 apie;
842 };
843 
844 #define APCB0_MASK_SIZE 1
845 struct kvm_s390_apcb0 {
846 	__u64 apm[APCB0_MASK_SIZE];		/* 0x0000 */
847 	__u64 aqm[APCB0_MASK_SIZE];		/* 0x0008 */
848 	__u64 adm[APCB0_MASK_SIZE];		/* 0x0010 */
849 	__u64 reserved18;			/* 0x0018 */
850 };
851 
852 #define APCB1_MASK_SIZE 4
853 struct kvm_s390_apcb1 {
854 	__u64 apm[APCB1_MASK_SIZE];		/* 0x0000 */
855 	__u64 aqm[APCB1_MASK_SIZE];		/* 0x0020 */
856 	__u64 adm[APCB1_MASK_SIZE];		/* 0x0040 */
857 	__u64 reserved60[4];			/* 0x0060 */
858 };
859 
860 struct kvm_s390_crypto_cb {
861 	struct kvm_s390_apcb0 apcb0;		/* 0x0000 */
862 	__u8   reserved20[0x0048 - 0x0020];	/* 0x0020 */
863 	__u8   dea_wrapping_key_mask[24];	/* 0x0048 */
864 	__u8   aes_wrapping_key_mask[32];	/* 0x0060 */
865 	struct kvm_s390_apcb1 apcb1;		/* 0x0080 */
866 };
867 
868 struct kvm_s390_gisa {
869 	union {
870 		struct { /* common to all formats */
871 			u32 next_alert;
872 			u8  ipm;
873 			u8  reserved01[2];
874 			u8  iam;
875 		};
876 		struct { /* format 0 */
877 			u32 next_alert;
878 			u8  ipm;
879 			u8  reserved01;
880 			u8  : 6;
881 			u8  g : 1;
882 			u8  c : 1;
883 			u8  iam;
884 			u8  reserved02[4];
885 			u32 airq_count;
886 		} g0;
887 		struct { /* format 1 */
888 			u32 next_alert;
889 			u8  ipm;
890 			u8  simm;
891 			u8  nimm;
892 			u8  iam;
893 			u8  aism[8];
894 			u8  : 6;
895 			u8  g : 1;
896 			u8  c : 1;
897 			u8  reserved03[11];
898 			u32 airq_count;
899 		} g1;
900 		struct {
901 			u64 word[4];
902 		} u64;
903 	};
904 };
905 
906 struct kvm_s390_gib {
907 	u32 alert_list_origin;
908 	u32 reserved01;
909 	u8:5;
910 	u8  nisc:3;
911 	u8  reserved03[3];
912 	u32 reserved04[5];
913 };
914 
915 /*
916  * sie_page2 has to be allocated as DMA because fac_list, crycb and
917  * gisa need 31bit addresses in the sie control block.
918  */
919 struct sie_page2 {
920 	__u64 fac_list[S390_ARCH_FAC_LIST_SIZE_U64];	/* 0x0000 */
921 	struct kvm_s390_crypto_cb crycb;		/* 0x0800 */
922 	struct kvm_s390_gisa gisa;			/* 0x0900 */
923 	struct kvm *kvm;				/* 0x0920 */
924 	u8 reserved928[0x1000 - 0x928];			/* 0x0928 */
925 };
926 
927 struct kvm_s390_vsie {
928 	struct mutex mutex;
929 	struct radix_tree_root addr_to_page;
930 	int page_count;
931 	int next;
932 	struct page *pages[KVM_MAX_VCPUS];
933 };
934 
935 struct kvm_s390_gisa_iam {
936 	u8 mask;
937 	spinlock_t ref_lock;
938 	u32 ref_count[MAX_ISC + 1];
939 };
940 
941 struct kvm_s390_gisa_interrupt {
942 	struct kvm_s390_gisa *origin;
943 	struct kvm_s390_gisa_iam alert;
944 	struct hrtimer timer;
945 	u64 expires;
946 	DECLARE_BITMAP(kicked_mask, KVM_MAX_VCPUS);
947 };
948 
949 struct kvm_s390_pv {
950 	u64 handle;
951 	u64 guest_len;
952 	unsigned long stor_base;
953 	void *stor_var;
954 	bool dumping;
955 	void *set_aside;
956 	struct list_head need_cleanup;
957 	struct mmu_notifier mmu_notifier;
958 };
959 
960 struct kvm_arch{
961 	void *sca;
962 	int use_esca;
963 	rwlock_t sca_lock;
964 	debug_info_t *dbf;
965 	struct kvm_s390_float_interrupt float_int;
966 	struct kvm_device *flic;
967 	struct gmap *gmap;
968 	unsigned long mem_limit;
969 	int css_support;
970 	int use_irqchip;
971 	int use_cmma;
972 	int use_pfmfi;
973 	int use_skf;
974 	int use_zpci_interp;
975 	int user_cpu_state_ctrl;
976 	int user_sigp;
977 	int user_stsi;
978 	int user_instr0;
979 	struct s390_io_adapter *adapters[MAX_S390_IO_ADAPTERS];
980 	wait_queue_head_t ipte_wq;
981 	int ipte_lock_count;
982 	struct mutex ipte_mutex;
983 	spinlock_t start_stop_lock;
984 	struct sie_page2 *sie_page2;
985 	struct kvm_s390_cpu_model model;
986 	struct kvm_s390_crypto crypto;
987 	struct kvm_s390_vsie vsie;
988 	u8 epdx;
989 	u64 epoch;
990 	int migration_mode;
991 	atomic64_t cmma_dirty_pages;
992 	/* subset of available cpu features enabled by user space */
993 	DECLARE_BITMAP(cpu_feat, KVM_S390_VM_CPU_FEAT_NR_BITS);
994 	/* indexed by vcpu_idx */
995 	DECLARE_BITMAP(idle_mask, KVM_MAX_VCPUS);
996 	struct kvm_s390_gisa_interrupt gisa_int;
997 	struct kvm_s390_pv pv;
998 	struct list_head kzdev_list;
999 	spinlock_t kzdev_list_lock;
1000 };
1001 
1002 #define KVM_HVA_ERR_BAD		(-1UL)
1003 #define KVM_HVA_ERR_RO_BAD	(-2UL)
1004 
1005 static inline bool kvm_is_error_hva(unsigned long addr)
1006 {
1007 	return IS_ERR_VALUE(addr);
1008 }
1009 
1010 #define ASYNC_PF_PER_VCPU	64
1011 struct kvm_arch_async_pf {
1012 	unsigned long pfault_token;
1013 };
1014 
1015 bool kvm_arch_can_dequeue_async_page_present(struct kvm_vcpu *vcpu);
1016 
1017 void kvm_arch_async_page_ready(struct kvm_vcpu *vcpu,
1018 			       struct kvm_async_pf *work);
1019 
1020 bool kvm_arch_async_page_not_present(struct kvm_vcpu *vcpu,
1021 				     struct kvm_async_pf *work);
1022 
1023 void kvm_arch_async_page_present(struct kvm_vcpu *vcpu,
1024 				 struct kvm_async_pf *work);
1025 
1026 static inline void kvm_arch_async_page_present_queued(struct kvm_vcpu *vcpu) {}
1027 
1028 void kvm_arch_crypto_clear_masks(struct kvm *kvm);
1029 void kvm_arch_crypto_set_masks(struct kvm *kvm, unsigned long *apm,
1030 			       unsigned long *aqm, unsigned long *adm);
1031 
1032 int __sie64a(phys_addr_t sie_block_phys, struct kvm_s390_sie_block *sie_block, u64 *rsa);
1033 
1034 static inline int sie64a(struct kvm_s390_sie_block *sie_block, u64 *rsa)
1035 {
1036 	return __sie64a(virt_to_phys(sie_block), sie_block, rsa);
1037 }
1038 
1039 extern char sie_exit;
1040 
1041 bool kvm_s390_pv_is_protected(struct kvm *kvm);
1042 bool kvm_s390_pv_cpu_is_protected(struct kvm_vcpu *vcpu);
1043 
1044 extern int kvm_s390_gisc_register(struct kvm *kvm, u32 gisc);
1045 extern int kvm_s390_gisc_unregister(struct kvm *kvm, u32 gisc);
1046 
1047 static inline void kvm_arch_sync_events(struct kvm *kvm) {}
1048 static inline void kvm_arch_sched_in(struct kvm_vcpu *vcpu, int cpu) {}
1049 static inline void kvm_arch_free_memslot(struct kvm *kvm,
1050 					 struct kvm_memory_slot *slot) {}
1051 static inline void kvm_arch_memslots_updated(struct kvm *kvm, u64 gen) {}
1052 static inline void kvm_arch_flush_shadow_all(struct kvm *kvm) {}
1053 static inline void kvm_arch_flush_shadow_memslot(struct kvm *kvm,
1054 		struct kvm_memory_slot *slot) {}
1055 static inline void kvm_arch_vcpu_blocking(struct kvm_vcpu *vcpu) {}
1056 static inline void kvm_arch_vcpu_unblocking(struct kvm_vcpu *vcpu) {}
1057 
1058 #define __KVM_HAVE_ARCH_VM_FREE
1059 void kvm_arch_free_vm(struct kvm *kvm);
1060 
1061 struct zpci_kvm_hook {
1062 	int (*kvm_register)(void *opaque, struct kvm *kvm);
1063 	void (*kvm_unregister)(void *opaque);
1064 };
1065 
1066 extern struct zpci_kvm_hook zpci_kvm_hook;
1067 
1068 #endif
1069