xref: /linux/arch/s390/include/asm/kvm_host.h (revision 7f71507851fc7764b36a3221839607d3a45c2025)
1 /* SPDX-License-Identifier: GPL-2.0 */
2 /*
3  * definition for kernel virtual machines on s390
4  *
5  * Copyright IBM Corp. 2008, 2018
6  *
7  *    Author(s): Carsten Otte <cotte@de.ibm.com>
8  */
9 
10 
11 #ifndef ASM_KVM_HOST_H
12 #define ASM_KVM_HOST_H
13 
14 #include <linux/types.h>
15 #include <linux/hrtimer.h>
16 #include <linux/interrupt.h>
17 #include <linux/kvm_types.h>
18 #include <linux/kvm.h>
19 #include <linux/seqlock.h>
20 #include <linux/module.h>
21 #include <linux/pci.h>
22 #include <linux/mmu_notifier.h>
23 #include <asm/debug.h>
24 #include <asm/cpu.h>
25 #include <asm/fpu.h>
26 #include <asm/isc.h>
27 #include <asm/guarded_storage.h>
28 
29 #define KVM_S390_BSCA_CPU_SLOTS 64
30 #define KVM_S390_ESCA_CPU_SLOTS 248
31 #define KVM_MAX_VCPUS 255
32 
33 /*
34  * These seem to be used for allocating ->chip in the routing table, which we
35  * don't use. 1 is as small as we can get to reduce the needed memory. If we
36  * need to look at ->chip later on, we'll need to revisit this.
37  */
38 #define KVM_NR_IRQCHIPS 1
39 #define KVM_IRQCHIP_NUM_PINS 1
40 #define KVM_HALT_POLL_NS_DEFAULT 50000
41 
42 /* s390-specific vcpu->requests bit members */
43 #define KVM_REQ_ENABLE_IBS	KVM_ARCH_REQ(0)
44 #define KVM_REQ_DISABLE_IBS	KVM_ARCH_REQ(1)
45 #define KVM_REQ_ICPT_OPEREXC	KVM_ARCH_REQ(2)
46 #define KVM_REQ_START_MIGRATION KVM_ARCH_REQ(3)
47 #define KVM_REQ_STOP_MIGRATION  KVM_ARCH_REQ(4)
48 #define KVM_REQ_VSIE_RESTART	KVM_ARCH_REQ(5)
49 #define KVM_REQ_REFRESH_GUEST_PREFIX	\
50 	KVM_ARCH_REQ_FLAGS(6, KVM_REQUEST_WAIT | KVM_REQUEST_NO_WAKEUP)
51 
52 #define SIGP_CTRL_C		0x80
53 #define SIGP_CTRL_SCN_MASK	0x3f
54 
55 union bsca_sigp_ctrl {
56 	__u8 value;
57 	struct {
58 		__u8 c : 1;
59 		__u8 r : 1;
60 		__u8 scn : 6;
61 	};
62 };
63 
64 union esca_sigp_ctrl {
65 	__u16 value;
66 	struct {
67 		__u8 c : 1;
68 		__u8 reserved: 7;
69 		__u8 scn;
70 	};
71 };
72 
73 struct esca_entry {
74 	union esca_sigp_ctrl sigp_ctrl;
75 	__u16   reserved1[3];
76 	__u64   sda;
77 	__u64   reserved2[6];
78 };
79 
80 struct bsca_entry {
81 	__u8	reserved0;
82 	union bsca_sigp_ctrl	sigp_ctrl;
83 	__u16	reserved[3];
84 	__u64	sda;
85 	__u64	reserved2[2];
86 };
87 
88 union ipte_control {
89 	unsigned long val;
90 	struct {
91 		unsigned long k  : 1;
92 		unsigned long kh : 31;
93 		unsigned long kg : 32;
94 	};
95 };
96 
97 /*
98  * Utility is defined as two bytes but having it four bytes wide
99  * generates more efficient code. Since the following bytes are
100  * reserved this makes no functional difference.
101  */
102 union sca_utility {
103 	__u32 val;
104 	struct {
105 		__u32 mtcr : 1;
106 		__u32	   : 31;
107 	};
108 };
109 
110 struct bsca_block {
111 	union ipte_control ipte_control;
112 	__u64	reserved[5];
113 	__u64	mcn;
114 	union sca_utility utility;
115 	__u8	reserved2[4];
116 	struct bsca_entry cpu[KVM_S390_BSCA_CPU_SLOTS];
117 };
118 
119 struct esca_block {
120 	union ipte_control ipte_control;
121 	__u64   reserved1[6];
122 	union sca_utility utility;
123 	__u8	reserved2[4];
124 	__u64   mcn[4];
125 	__u64   reserved3[20];
126 	struct esca_entry cpu[KVM_S390_ESCA_CPU_SLOTS];
127 };
128 
129 /*
130  * This struct is used to store some machine check info from lowcore
131  * for machine checks that happen while the guest is running.
132  * This info in host's lowcore might be overwritten by a second machine
133  * check from host when host is in the machine check's high-level handling.
134  * The size is 24 bytes.
135  */
136 struct mcck_volatile_info {
137 	__u64 mcic;
138 	__u64 failing_storage_address;
139 	__u32 ext_damage_code;
140 	__u32 reserved;
141 };
142 
143 #define CR0_INITIAL_MASK (CR0_UNUSED_56 | CR0_INTERRUPT_KEY_SUBMASK | \
144 			  CR0_MEASUREMENT_ALERT_SUBMASK)
145 #define CR14_INITIAL_MASK (CR14_UNUSED_32 | CR14_UNUSED_33 | \
146 			   CR14_EXTERNAL_DAMAGE_SUBMASK)
147 
148 #define SIDAD_SIZE_MASK		0xff
149 #define sida_addr(sie_block) phys_to_virt((sie_block)->sidad & PAGE_MASK)
150 #define sida_size(sie_block) \
151 	((((sie_block)->sidad & SIDAD_SIZE_MASK) + 1) * PAGE_SIZE)
152 
153 #define CPUSTAT_STOPPED    0x80000000
154 #define CPUSTAT_WAIT       0x10000000
155 #define CPUSTAT_ECALL_PEND 0x08000000
156 #define CPUSTAT_STOP_INT   0x04000000
157 #define CPUSTAT_IO_INT     0x02000000
158 #define CPUSTAT_EXT_INT    0x01000000
159 #define CPUSTAT_RUNNING    0x00800000
160 #define CPUSTAT_RETAINED   0x00400000
161 #define CPUSTAT_TIMING_SUB 0x00020000
162 #define CPUSTAT_SIE_SUB    0x00010000
163 #define CPUSTAT_RRF        0x00008000
164 #define CPUSTAT_SLSV       0x00004000
165 #define CPUSTAT_SLSR       0x00002000
166 #define CPUSTAT_ZARCH      0x00000800
167 #define CPUSTAT_MCDS       0x00000100
168 #define CPUSTAT_KSS        0x00000200
169 #define CPUSTAT_SM         0x00000080
170 #define CPUSTAT_IBS        0x00000040
171 #define CPUSTAT_GED2       0x00000010
172 #define CPUSTAT_G          0x00000008
173 #define CPUSTAT_GED        0x00000004
174 #define CPUSTAT_J          0x00000002
175 #define CPUSTAT_P          0x00000001
176 
177 struct kvm_s390_sie_block {
178 	atomic_t cpuflags;		/* 0x0000 */
179 	__u32 : 1;			/* 0x0004 */
180 	__u32 prefix : 18;
181 	__u32 : 1;
182 	__u32 ibc : 12;
183 	__u8	reserved08[4];		/* 0x0008 */
184 #define PROG_IN_SIE (1<<0)
185 	__u32	prog0c;			/* 0x000c */
186 	union {
187 		__u8	reserved10[16];		/* 0x0010 */
188 		struct {
189 			__u64	pv_handle_cpu;
190 			__u64	pv_handle_config;
191 		};
192 	};
193 #define PROG_BLOCK_SIE	(1<<0)
194 #define PROG_REQUEST	(1<<1)
195 	atomic_t prog20;		/* 0x0020 */
196 	__u8	reserved24[4];		/* 0x0024 */
197 	__u64	cputm;			/* 0x0028 */
198 	__u64	ckc;			/* 0x0030 */
199 	__u64	epoch;			/* 0x0038 */
200 	__u32	svcc;			/* 0x0040 */
201 #define LCTL_CR0	0x8000
202 #define LCTL_CR6	0x0200
203 #define LCTL_CR9	0x0040
204 #define LCTL_CR10	0x0020
205 #define LCTL_CR11	0x0010
206 #define LCTL_CR14	0x0002
207 	__u16   lctl;			/* 0x0044 */
208 	__s16	icpua;			/* 0x0046 */
209 #define ICTL_OPEREXC	0x80000000
210 #define ICTL_PINT	0x20000000
211 #define ICTL_LPSW	0x00400000
212 #define ICTL_STCTL	0x00040000
213 #define ICTL_ISKE	0x00004000
214 #define ICTL_SSKE	0x00002000
215 #define ICTL_RRBE	0x00001000
216 #define ICTL_TPROT	0x00000200
217 	__u32	ictl;			/* 0x0048 */
218 #define ECA_CEI		0x80000000
219 #define ECA_IB		0x40000000
220 #define ECA_SIGPI	0x10000000
221 #define ECA_MVPGI	0x01000000
222 #define ECA_AIV		0x00200000
223 #define ECA_VX		0x00020000
224 #define ECA_PROTEXCI	0x00002000
225 #define ECA_APIE	0x00000008
226 #define ECA_SII		0x00000001
227 	__u32	eca;			/* 0x004c */
228 #define ICPT_INST	0x04
229 #define ICPT_PROGI	0x08
230 #define ICPT_INSTPROGI	0x0C
231 #define ICPT_EXTREQ	0x10
232 #define ICPT_EXTINT	0x14
233 #define ICPT_IOREQ	0x18
234 #define ICPT_WAIT	0x1c
235 #define ICPT_VALIDITY	0x20
236 #define ICPT_STOP	0x28
237 #define ICPT_OPEREXC	0x2C
238 #define ICPT_PARTEXEC	0x38
239 #define ICPT_IOINST	0x40
240 #define ICPT_KSS	0x5c
241 #define ICPT_MCHKREQ	0x60
242 #define ICPT_INT_ENABLE	0x64
243 #define ICPT_PV_INSTR	0x68
244 #define ICPT_PV_NOTIFY	0x6c
245 #define ICPT_PV_PREF	0x70
246 	__u8	icptcode;		/* 0x0050 */
247 	__u8	icptstatus;		/* 0x0051 */
248 	__u16	ihcpu;			/* 0x0052 */
249 	__u8	reserved54;		/* 0x0054 */
250 #define IICTL_CODE_NONE		 0x00
251 #define IICTL_CODE_MCHK		 0x01
252 #define IICTL_CODE_EXT		 0x02
253 #define IICTL_CODE_IO		 0x03
254 #define IICTL_CODE_RESTART	 0x04
255 #define IICTL_CODE_SPECIFICATION 0x10
256 #define IICTL_CODE_OPERAND	 0x11
257 	__u8	iictl;			/* 0x0055 */
258 	__u16	ipa;			/* 0x0056 */
259 	__u32	ipb;			/* 0x0058 */
260 	__u32	scaoh;			/* 0x005c */
261 #define FPF_BPBC 	0x20
262 	__u8	fpf;			/* 0x0060 */
263 #define ECB_GS		0x40
264 #define ECB_TE		0x10
265 #define ECB_SPECI	0x08
266 #define ECB_SRSI	0x04
267 #define ECB_HOSTPROTINT	0x02
268 #define ECB_PTF		0x01
269 	__u8	ecb;			/* 0x0061 */
270 #define ECB2_CMMA	0x80
271 #define ECB2_IEP	0x20
272 #define ECB2_PFMFI	0x08
273 #define ECB2_ESCA	0x04
274 #define ECB2_ZPCI_LSI	0x02
275 	__u8    ecb2;                   /* 0x0062 */
276 #define ECB3_AISI	0x20
277 #define ECB3_AISII	0x10
278 #define ECB3_DEA 0x08
279 #define ECB3_AES 0x04
280 #define ECB3_RI  0x01
281 	__u8    ecb3;			/* 0x0063 */
282 #define ESCA_SCAOL_MASK ~0x3fU
283 	__u32	scaol;			/* 0x0064 */
284 	__u8	sdf;			/* 0x0068 */
285 	__u8    epdx;			/* 0x0069 */
286 	__u8	cpnc;			/* 0x006a */
287 	__u8	reserved6b;		/* 0x006b */
288 	__u32	todpr;			/* 0x006c */
289 #define GISA_FORMAT1 0x00000001
290 	__u32	gd;			/* 0x0070 */
291 	__u8	reserved74[12];		/* 0x0074 */
292 	__u64	mso;			/* 0x0080 */
293 	__u64	msl;			/* 0x0088 */
294 	psw_t	gpsw;			/* 0x0090 */
295 	__u64	gg14;			/* 0x00a0 */
296 	__u64	gg15;			/* 0x00a8 */
297 	__u8	reservedb0[8];		/* 0x00b0 */
298 #define HPID_KVM	0x4
299 #define HPID_VSIE	0x5
300 	__u8	hpid;			/* 0x00b8 */
301 	__u8	reservedb9[7];		/* 0x00b9 */
302 	union {
303 		struct {
304 			__u32	eiparams;	/* 0x00c0 */
305 			__u16	extcpuaddr;	/* 0x00c4 */
306 			__u16	eic;		/* 0x00c6 */
307 		};
308 		__u64	mcic;			/* 0x00c0 */
309 	} __packed;
310 	__u32	reservedc8;		/* 0x00c8 */
311 	union {
312 		struct {
313 			__u16	pgmilc;		/* 0x00cc */
314 			__u16	iprcc;		/* 0x00ce */
315 		};
316 		__u32	edc;			/* 0x00cc */
317 	} __packed;
318 	union {
319 		struct {
320 			__u32	dxc;		/* 0x00d0 */
321 			__u16	mcn;		/* 0x00d4 */
322 			__u8	perc;		/* 0x00d6 */
323 			__u8	peratmid;	/* 0x00d7 */
324 		};
325 		__u64	faddr;			/* 0x00d0 */
326 	} __packed;
327 	__u64	peraddr;		/* 0x00d8 */
328 	__u8	eai;			/* 0x00e0 */
329 	__u8	peraid;			/* 0x00e1 */
330 	__u8	oai;			/* 0x00e2 */
331 	__u8	armid;			/* 0x00e3 */
332 	__u8	reservede4[4];		/* 0x00e4 */
333 	union {
334 		__u64	tecmc;		/* 0x00e8 */
335 		struct {
336 			__u16	subchannel_id;	/* 0x00e8 */
337 			__u16	subchannel_nr;	/* 0x00ea */
338 			__u32	io_int_parm;	/* 0x00ec */
339 			__u32	io_int_word;	/* 0x00f0 */
340 		};
341 	} __packed;
342 	__u8	reservedf4[8];		/* 0x00f4 */
343 #define CRYCB_FORMAT_MASK 0x00000003
344 #define CRYCB_FORMAT0 0x00000000
345 #define CRYCB_FORMAT1 0x00000001
346 #define CRYCB_FORMAT2 0x00000003
347 	__u32	crycbd;			/* 0x00fc */
348 	__u64	gcr[16];		/* 0x0100 */
349 	union {
350 		__u64	gbea;		/* 0x0180 */
351 		__u64	sidad;
352 	};
353 	__u8    reserved188[8];		/* 0x0188 */
354 	__u64   sdnxo;			/* 0x0190 */
355 	__u8    reserved198[8];		/* 0x0198 */
356 	__u32	fac;			/* 0x01a0 */
357 	__u8	reserved1a4[20];	/* 0x01a4 */
358 	__u64	cbrlo;			/* 0x01b8 */
359 	__u8	reserved1c0[8];		/* 0x01c0 */
360 #define ECD_HOSTREGMGMT	0x20000000
361 #define ECD_MEF		0x08000000
362 #define ECD_ETOKENF	0x02000000
363 #define ECD_ECC		0x00200000
364 #define ECD_HMAC	0x00004000
365 	__u32	ecd;			/* 0x01c8 */
366 	__u8	reserved1cc[18];	/* 0x01cc */
367 	__u64	pp;			/* 0x01de */
368 	__u8	reserved1e6[2];		/* 0x01e6 */
369 	__u64	itdba;			/* 0x01e8 */
370 	__u64   riccbd;			/* 0x01f0 */
371 	__u64	gvrd;			/* 0x01f8 */
372 } __packed __aligned(512);
373 
374 struct kvm_s390_itdb {
375 	__u8	data[256];
376 };
377 
378 struct sie_page {
379 	struct kvm_s390_sie_block sie_block;
380 	struct mcck_volatile_info mcck_info;	/* 0x0200 */
381 	__u8 reserved218[360];		/* 0x0218 */
382 	__u64 pv_grregs[16];		/* 0x0380 */
383 	__u8 reserved400[512];		/* 0x0400 */
384 	struct kvm_s390_itdb itdb;	/* 0x0600 */
385 	__u8 reserved700[2304];		/* 0x0700 */
386 };
387 
388 struct kvm_vcpu_stat {
389 	struct kvm_vcpu_stat_generic generic;
390 	u64 exit_userspace;
391 	u64 exit_null;
392 	u64 exit_external_request;
393 	u64 exit_io_request;
394 	u64 exit_external_interrupt;
395 	u64 exit_stop_request;
396 	u64 exit_validity;
397 	u64 exit_instruction;
398 	u64 exit_pei;
399 	u64 halt_no_poll_steal;
400 	u64 instruction_lctl;
401 	u64 instruction_lctlg;
402 	u64 instruction_stctl;
403 	u64 instruction_stctg;
404 	u64 exit_program_interruption;
405 	u64 exit_instr_and_program;
406 	u64 exit_operation_exception;
407 	u64 deliver_ckc;
408 	u64 deliver_cputm;
409 	u64 deliver_external_call;
410 	u64 deliver_emergency_signal;
411 	u64 deliver_service_signal;
412 	u64 deliver_virtio;
413 	u64 deliver_stop_signal;
414 	u64 deliver_prefix_signal;
415 	u64 deliver_restart_signal;
416 	u64 deliver_program;
417 	u64 deliver_io;
418 	u64 deliver_machine_check;
419 	u64 exit_wait_state;
420 	u64 inject_ckc;
421 	u64 inject_cputm;
422 	u64 inject_external_call;
423 	u64 inject_emergency_signal;
424 	u64 inject_mchk;
425 	u64 inject_pfault_init;
426 	u64 inject_program;
427 	u64 inject_restart;
428 	u64 inject_set_prefix;
429 	u64 inject_stop_signal;
430 	u64 instruction_epsw;
431 	u64 instruction_gs;
432 	u64 instruction_io_other;
433 	u64 instruction_lpsw;
434 	u64 instruction_lpswe;
435 	u64 instruction_lpswey;
436 	u64 instruction_pfmf;
437 	u64 instruction_ptff;
438 	u64 instruction_sck;
439 	u64 instruction_sckpf;
440 	u64 instruction_stidp;
441 	u64 instruction_spx;
442 	u64 instruction_stpx;
443 	u64 instruction_stap;
444 	u64 instruction_iske;
445 	u64 instruction_ri;
446 	u64 instruction_rrbe;
447 	u64 instruction_sske;
448 	u64 instruction_ipte_interlock;
449 	u64 instruction_stsi;
450 	u64 instruction_stfl;
451 	u64 instruction_tb;
452 	u64 instruction_tpi;
453 	u64 instruction_tprot;
454 	u64 instruction_tsch;
455 	u64 instruction_sie;
456 	u64 instruction_essa;
457 	u64 instruction_sthyi;
458 	u64 instruction_sigp_sense;
459 	u64 instruction_sigp_sense_running;
460 	u64 instruction_sigp_external_call;
461 	u64 instruction_sigp_emergency;
462 	u64 instruction_sigp_cond_emergency;
463 	u64 instruction_sigp_start;
464 	u64 instruction_sigp_stop;
465 	u64 instruction_sigp_stop_store_status;
466 	u64 instruction_sigp_store_status;
467 	u64 instruction_sigp_store_adtl_status;
468 	u64 instruction_sigp_arch;
469 	u64 instruction_sigp_prefix;
470 	u64 instruction_sigp_restart;
471 	u64 instruction_sigp_init_cpu_reset;
472 	u64 instruction_sigp_cpu_reset;
473 	u64 instruction_sigp_unknown;
474 	u64 instruction_diagnose_10;
475 	u64 instruction_diagnose_44;
476 	u64 instruction_diagnose_9c;
477 	u64 diag_9c_ignored;
478 	u64 diag_9c_forward;
479 	u64 instruction_diagnose_258;
480 	u64 instruction_diagnose_308;
481 	u64 instruction_diagnose_500;
482 	u64 instruction_diagnose_other;
483 	u64 pfault_sync;
484 };
485 
486 #define PGM_OPERATION			0x01
487 #define PGM_PRIVILEGED_OP		0x02
488 #define PGM_EXECUTE			0x03
489 #define PGM_PROTECTION			0x04
490 #define PGM_ADDRESSING			0x05
491 #define PGM_SPECIFICATION		0x06
492 #define PGM_DATA			0x07
493 #define PGM_FIXED_POINT_OVERFLOW	0x08
494 #define PGM_FIXED_POINT_DIVIDE		0x09
495 #define PGM_DECIMAL_OVERFLOW		0x0a
496 #define PGM_DECIMAL_DIVIDE		0x0b
497 #define PGM_HFP_EXPONENT_OVERFLOW	0x0c
498 #define PGM_HFP_EXPONENT_UNDERFLOW	0x0d
499 #define PGM_HFP_SIGNIFICANCE		0x0e
500 #define PGM_HFP_DIVIDE			0x0f
501 #define PGM_SEGMENT_TRANSLATION		0x10
502 #define PGM_PAGE_TRANSLATION		0x11
503 #define PGM_TRANSLATION_SPEC		0x12
504 #define PGM_SPECIAL_OPERATION		0x13
505 #define PGM_OPERAND			0x15
506 #define PGM_TRACE_TABEL			0x16
507 #define PGM_VECTOR_PROCESSING		0x1b
508 #define PGM_SPACE_SWITCH		0x1c
509 #define PGM_HFP_SQUARE_ROOT		0x1d
510 #define PGM_PC_TRANSLATION_SPEC		0x1f
511 #define PGM_AFX_TRANSLATION		0x20
512 #define PGM_ASX_TRANSLATION		0x21
513 #define PGM_LX_TRANSLATION		0x22
514 #define PGM_EX_TRANSLATION		0x23
515 #define PGM_PRIMARY_AUTHORITY		0x24
516 #define PGM_SECONDARY_AUTHORITY		0x25
517 #define PGM_LFX_TRANSLATION		0x26
518 #define PGM_LSX_TRANSLATION		0x27
519 #define PGM_ALET_SPECIFICATION		0x28
520 #define PGM_ALEN_TRANSLATION		0x29
521 #define PGM_ALE_SEQUENCE		0x2a
522 #define PGM_ASTE_VALIDITY		0x2b
523 #define PGM_ASTE_SEQUENCE		0x2c
524 #define PGM_EXTENDED_AUTHORITY		0x2d
525 #define PGM_LSTE_SEQUENCE		0x2e
526 #define PGM_ASTE_INSTANCE		0x2f
527 #define PGM_STACK_FULL			0x30
528 #define PGM_STACK_EMPTY			0x31
529 #define PGM_STACK_SPECIFICATION		0x32
530 #define PGM_STACK_TYPE			0x33
531 #define PGM_STACK_OPERATION		0x34
532 #define PGM_ASCE_TYPE			0x38
533 #define PGM_REGION_FIRST_TRANS		0x39
534 #define PGM_REGION_SECOND_TRANS		0x3a
535 #define PGM_REGION_THIRD_TRANS		0x3b
536 #define PGM_SECURE_STORAGE_ACCESS	0x3d
537 #define PGM_NON_SECURE_STORAGE_ACCESS	0x3e
538 #define PGM_SECURE_STORAGE_VIOLATION	0x3f
539 #define PGM_MONITOR			0x40
540 #define PGM_PER				0x80
541 #define PGM_CRYPTO_OPERATION		0x119
542 
543 /* irq types in ascend order of priorities */
544 enum irq_types {
545 	IRQ_PEND_SET_PREFIX = 0,
546 	IRQ_PEND_RESTART,
547 	IRQ_PEND_SIGP_STOP,
548 	IRQ_PEND_IO_ISC_7,
549 	IRQ_PEND_IO_ISC_6,
550 	IRQ_PEND_IO_ISC_5,
551 	IRQ_PEND_IO_ISC_4,
552 	IRQ_PEND_IO_ISC_3,
553 	IRQ_PEND_IO_ISC_2,
554 	IRQ_PEND_IO_ISC_1,
555 	IRQ_PEND_IO_ISC_0,
556 	IRQ_PEND_VIRTIO,
557 	IRQ_PEND_PFAULT_DONE,
558 	IRQ_PEND_PFAULT_INIT,
559 	IRQ_PEND_EXT_HOST,
560 	IRQ_PEND_EXT_SERVICE,
561 	IRQ_PEND_EXT_SERVICE_EV,
562 	IRQ_PEND_EXT_TIMING,
563 	IRQ_PEND_EXT_CPU_TIMER,
564 	IRQ_PEND_EXT_CLOCK_COMP,
565 	IRQ_PEND_EXT_EXTERNAL,
566 	IRQ_PEND_EXT_EMERGENCY,
567 	IRQ_PEND_EXT_MALFUNC,
568 	IRQ_PEND_EXT_IRQ_KEY,
569 	IRQ_PEND_MCHK_REP,
570 	IRQ_PEND_PROG,
571 	IRQ_PEND_SVC,
572 	IRQ_PEND_MCHK_EX,
573 	IRQ_PEND_COUNT
574 };
575 
576 /* We have 2M for virtio device descriptor pages. Smallest amount of
577  * memory per page is 24 bytes (1 queue), so (2048*1024) / 24 = 87381
578  */
579 #define KVM_S390_MAX_VIRTIO_IRQS 87381
580 
581 /*
582  * Repressible (non-floating) machine check interrupts
583  * subclass bits in MCIC
584  */
585 #define MCHK_EXTD_BIT 58
586 #define MCHK_DEGR_BIT 56
587 #define MCHK_WARN_BIT 55
588 #define MCHK_REP_MASK ((1UL << MCHK_DEGR_BIT) | \
589 		       (1UL << MCHK_EXTD_BIT) | \
590 		       (1UL << MCHK_WARN_BIT))
591 
592 /* Exigent machine check interrupts subclass bits in MCIC */
593 #define MCHK_SD_BIT 63
594 #define MCHK_PD_BIT 62
595 #define MCHK_EX_MASK ((1UL << MCHK_SD_BIT) | (1UL << MCHK_PD_BIT))
596 
597 #define IRQ_PEND_EXT_MASK ((1UL << IRQ_PEND_EXT_IRQ_KEY)    | \
598 			   (1UL << IRQ_PEND_EXT_CLOCK_COMP) | \
599 			   (1UL << IRQ_PEND_EXT_CPU_TIMER)  | \
600 			   (1UL << IRQ_PEND_EXT_MALFUNC)    | \
601 			   (1UL << IRQ_PEND_EXT_EMERGENCY)  | \
602 			   (1UL << IRQ_PEND_EXT_EXTERNAL)   | \
603 			   (1UL << IRQ_PEND_EXT_TIMING)     | \
604 			   (1UL << IRQ_PEND_EXT_HOST)       | \
605 			   (1UL << IRQ_PEND_EXT_SERVICE)    | \
606 			   (1UL << IRQ_PEND_EXT_SERVICE_EV) | \
607 			   (1UL << IRQ_PEND_VIRTIO)         | \
608 			   (1UL << IRQ_PEND_PFAULT_INIT)    | \
609 			   (1UL << IRQ_PEND_PFAULT_DONE))
610 
611 #define IRQ_PEND_IO_MASK ((1UL << IRQ_PEND_IO_ISC_0) | \
612 			  (1UL << IRQ_PEND_IO_ISC_1) | \
613 			  (1UL << IRQ_PEND_IO_ISC_2) | \
614 			  (1UL << IRQ_PEND_IO_ISC_3) | \
615 			  (1UL << IRQ_PEND_IO_ISC_4) | \
616 			  (1UL << IRQ_PEND_IO_ISC_5) | \
617 			  (1UL << IRQ_PEND_IO_ISC_6) | \
618 			  (1UL << IRQ_PEND_IO_ISC_7))
619 
620 #define IRQ_PEND_MCHK_MASK ((1UL << IRQ_PEND_MCHK_REP) | \
621 			    (1UL << IRQ_PEND_MCHK_EX))
622 
623 #define IRQ_PEND_EXT_II_MASK ((1UL << IRQ_PEND_EXT_CPU_TIMER)  | \
624 			      (1UL << IRQ_PEND_EXT_CLOCK_COMP) | \
625 			      (1UL << IRQ_PEND_EXT_EMERGENCY)  | \
626 			      (1UL << IRQ_PEND_EXT_EXTERNAL)   | \
627 			      (1UL << IRQ_PEND_EXT_SERVICE)    | \
628 			      (1UL << IRQ_PEND_EXT_SERVICE_EV))
629 
630 struct kvm_s390_interrupt_info {
631 	struct list_head list;
632 	u64	type;
633 	union {
634 		struct kvm_s390_io_info io;
635 		struct kvm_s390_ext_info ext;
636 		struct kvm_s390_pgm_info pgm;
637 		struct kvm_s390_emerg_info emerg;
638 		struct kvm_s390_extcall_info extcall;
639 		struct kvm_s390_prefix_info prefix;
640 		struct kvm_s390_stop_info stop;
641 		struct kvm_s390_mchk_info mchk;
642 	};
643 };
644 
645 struct kvm_s390_irq_payload {
646 	struct kvm_s390_io_info io;
647 	struct kvm_s390_ext_info ext;
648 	struct kvm_s390_pgm_info pgm;
649 	struct kvm_s390_emerg_info emerg;
650 	struct kvm_s390_extcall_info extcall;
651 	struct kvm_s390_prefix_info prefix;
652 	struct kvm_s390_stop_info stop;
653 	struct kvm_s390_mchk_info mchk;
654 };
655 
656 struct kvm_s390_local_interrupt {
657 	spinlock_t lock;
658 	DECLARE_BITMAP(sigp_emerg_pending, KVM_MAX_VCPUS);
659 	struct kvm_s390_irq_payload irq;
660 	unsigned long pending_irqs;
661 };
662 
663 #define FIRQ_LIST_IO_ISC_0 0
664 #define FIRQ_LIST_IO_ISC_1 1
665 #define FIRQ_LIST_IO_ISC_2 2
666 #define FIRQ_LIST_IO_ISC_3 3
667 #define FIRQ_LIST_IO_ISC_4 4
668 #define FIRQ_LIST_IO_ISC_5 5
669 #define FIRQ_LIST_IO_ISC_6 6
670 #define FIRQ_LIST_IO_ISC_7 7
671 #define FIRQ_LIST_PFAULT   8
672 #define FIRQ_LIST_VIRTIO   9
673 #define FIRQ_LIST_COUNT   10
674 #define FIRQ_CNTR_IO       0
675 #define FIRQ_CNTR_SERVICE  1
676 #define FIRQ_CNTR_VIRTIO   2
677 #define FIRQ_CNTR_PFAULT   3
678 #define FIRQ_MAX_COUNT     4
679 
680 /* mask the AIS mode for a given ISC */
681 #define AIS_MODE_MASK(isc) (0x80 >> isc)
682 
683 #define KVM_S390_AIS_MODE_ALL    0
684 #define KVM_S390_AIS_MODE_SINGLE 1
685 
686 struct kvm_s390_float_interrupt {
687 	unsigned long pending_irqs;
688 	unsigned long masked_irqs;
689 	spinlock_t lock;
690 	struct list_head lists[FIRQ_LIST_COUNT];
691 	int counters[FIRQ_MAX_COUNT];
692 	struct kvm_s390_mchk_info mchk;
693 	struct kvm_s390_ext_info srv_signal;
694 	int next_rr_cpu;
695 	struct mutex ais_lock;
696 	u8 simm;
697 	u8 nimm;
698 };
699 
700 struct kvm_hw_wp_info_arch {
701 	unsigned long addr;
702 	unsigned long phys_addr;
703 	int len;
704 	char *old_data;
705 };
706 
707 struct kvm_hw_bp_info_arch {
708 	unsigned long addr;
709 	int len;
710 };
711 
712 /*
713  * Only the upper 16 bits of kvm_guest_debug->control are arch specific.
714  * Further KVM_GUESTDBG flags which an be used from userspace can be found in
715  * arch/s390/include/uapi/asm/kvm.h
716  */
717 #define KVM_GUESTDBG_EXIT_PENDING 0x10000000
718 
719 #define guestdbg_enabled(vcpu) \
720 		(vcpu->guest_debug & KVM_GUESTDBG_ENABLE)
721 #define guestdbg_sstep_enabled(vcpu) \
722 		(vcpu->guest_debug & KVM_GUESTDBG_SINGLESTEP)
723 #define guestdbg_hw_bp_enabled(vcpu) \
724 		(vcpu->guest_debug & KVM_GUESTDBG_USE_HW_BP)
725 #define guestdbg_exit_pending(vcpu) (guestdbg_enabled(vcpu) && \
726 		(vcpu->guest_debug & KVM_GUESTDBG_EXIT_PENDING))
727 
728 #define KVM_GUESTDBG_VALID_MASK \
729 		(KVM_GUESTDBG_ENABLE | KVM_GUESTDBG_SINGLESTEP |\
730 		KVM_GUESTDBG_USE_HW_BP | KVM_GUESTDBG_EXIT_PENDING)
731 
732 struct kvm_guestdbg_info_arch {
733 	unsigned long cr0;
734 	unsigned long cr9;
735 	unsigned long cr10;
736 	unsigned long cr11;
737 	struct kvm_hw_bp_info_arch *hw_bp_info;
738 	struct kvm_hw_wp_info_arch *hw_wp_info;
739 	int nr_hw_bp;
740 	int nr_hw_wp;
741 	unsigned long last_bp;
742 };
743 
744 struct kvm_s390_pv_vcpu {
745 	u64 handle;
746 	unsigned long stor_base;
747 };
748 
749 struct kvm_vcpu_arch {
750 	struct kvm_s390_sie_block *sie_block;
751 	/* if vsie is active, currently executed shadow sie control block */
752 	struct kvm_s390_sie_block *vsie_block;
753 	unsigned int      host_acrs[NUM_ACRS];
754 	struct gs_cb      *host_gscb;
755 	struct kvm_s390_local_interrupt local_int;
756 	struct hrtimer    ckc_timer;
757 	struct kvm_s390_pgm_info pgm;
758 	struct gmap *gmap;
759 	struct kvm_guestdbg_info_arch guestdbg;
760 	unsigned long pfault_token;
761 	unsigned long pfault_select;
762 	unsigned long pfault_compare;
763 	bool cputm_enabled;
764 	/*
765 	 * The seqcount protects updates to cputm_start and sie_block.cputm,
766 	 * this way we can have non-blocking reads with consistent values.
767 	 * Only the owning VCPU thread (vcpu->cpu) is allowed to change these
768 	 * values and to start/stop/enable/disable cpu timer accounting.
769 	 */
770 	seqcount_t cputm_seqcount;
771 	__u64 cputm_start;
772 	bool gs_enabled;
773 	bool skey_enabled;
774 	/* Indicator if the access registers have been loaded from guest */
775 	bool acrs_loaded;
776 	struct kvm_s390_pv_vcpu pv;
777 	union diag318_info diag318_info;
778 };
779 
780 struct kvm_vm_stat {
781 	struct kvm_vm_stat_generic generic;
782 	u64 inject_io;
783 	u64 inject_float_mchk;
784 	u64 inject_pfault_done;
785 	u64 inject_service_signal;
786 	u64 inject_virtio;
787 	u64 aen_forward;
788 	u64 gmap_shadow_create;
789 	u64 gmap_shadow_reuse;
790 	u64 gmap_shadow_r1_entry;
791 	u64 gmap_shadow_r2_entry;
792 	u64 gmap_shadow_r3_entry;
793 	u64 gmap_shadow_sg_entry;
794 	u64 gmap_shadow_pg_entry;
795 };
796 
797 struct kvm_arch_memory_slot {
798 };
799 
800 struct s390_map_info {
801 	struct list_head list;
802 	__u64 guest_addr;
803 	__u64 addr;
804 	struct page *page;
805 };
806 
807 struct s390_io_adapter {
808 	unsigned int id;
809 	int isc;
810 	bool maskable;
811 	bool masked;
812 	bool swap;
813 	bool suppressible;
814 };
815 
816 #define MAX_S390_IO_ADAPTERS ((MAX_ISC + 1) * 8)
817 #define MAX_S390_ADAPTER_MAPS 256
818 
819 /* maximum size of facilities and facility mask is 2k bytes */
820 #define S390_ARCH_FAC_LIST_SIZE_BYTE (1<<11)
821 #define S390_ARCH_FAC_LIST_SIZE_U64 \
822 	(S390_ARCH_FAC_LIST_SIZE_BYTE / sizeof(u64))
823 #define S390_ARCH_FAC_MASK_SIZE_BYTE S390_ARCH_FAC_LIST_SIZE_BYTE
824 #define S390_ARCH_FAC_MASK_SIZE_U64 \
825 	(S390_ARCH_FAC_MASK_SIZE_BYTE / sizeof(u64))
826 
827 struct kvm_s390_cpu_model {
828 	/* facility mask supported by kvm & hosting machine */
829 	__u64 fac_mask[S390_ARCH_FAC_MASK_SIZE_U64];
830 	struct kvm_s390_vm_cpu_subfunc subfuncs;
831 	/* facility list requested by guest (in dma page) */
832 	__u64 *fac_list;
833 	u64 cpuid;
834 	unsigned short ibc;
835 	/* subset of available UV-features for pv-guests enabled by user space */
836 	struct kvm_s390_vm_cpu_uv_feat uv_feat_guest;
837 };
838 
839 typedef int (*crypto_hook)(struct kvm_vcpu *vcpu);
840 
841 struct kvm_s390_crypto {
842 	struct kvm_s390_crypto_cb *crycb;
843 	struct rw_semaphore pqap_hook_rwsem;
844 	crypto_hook *pqap_hook;
845 	__u32 crycbd;
846 	__u8 aes_kw;
847 	__u8 dea_kw;
848 	__u8 apie;
849 };
850 
851 #define APCB0_MASK_SIZE 1
852 struct kvm_s390_apcb0 {
853 	__u64 apm[APCB0_MASK_SIZE];		/* 0x0000 */
854 	__u64 aqm[APCB0_MASK_SIZE];		/* 0x0008 */
855 	__u64 adm[APCB0_MASK_SIZE];		/* 0x0010 */
856 	__u64 reserved18;			/* 0x0018 */
857 };
858 
859 #define APCB1_MASK_SIZE 4
860 struct kvm_s390_apcb1 {
861 	__u64 apm[APCB1_MASK_SIZE];		/* 0x0000 */
862 	__u64 aqm[APCB1_MASK_SIZE];		/* 0x0020 */
863 	__u64 adm[APCB1_MASK_SIZE];		/* 0x0040 */
864 	__u64 reserved60[4];			/* 0x0060 */
865 };
866 
867 struct kvm_s390_crypto_cb {
868 	struct kvm_s390_apcb0 apcb0;		/* 0x0000 */
869 	__u8   reserved20[0x0048 - 0x0020];	/* 0x0020 */
870 	__u8   dea_wrapping_key_mask[24];	/* 0x0048 */
871 	__u8   aes_wrapping_key_mask[32];	/* 0x0060 */
872 	struct kvm_s390_apcb1 apcb1;		/* 0x0080 */
873 };
874 
875 struct kvm_s390_gisa {
876 	union {
877 		struct { /* common to all formats */
878 			u32 next_alert;
879 			u8  ipm;
880 			u8  reserved01[2];
881 			u8  iam;
882 		};
883 		struct { /* format 0 */
884 			u32 next_alert;
885 			u8  ipm;
886 			u8  reserved01;
887 			u8  : 6;
888 			u8  g : 1;
889 			u8  c : 1;
890 			u8  iam;
891 			u8  reserved02[4];
892 			u32 airq_count;
893 		} g0;
894 		struct { /* format 1 */
895 			u32 next_alert;
896 			u8  ipm;
897 			u8  simm;
898 			u8  nimm;
899 			u8  iam;
900 			u8  aism[8];
901 			u8  : 6;
902 			u8  g : 1;
903 			u8  c : 1;
904 			u8  reserved03[11];
905 			u32 airq_count;
906 		} g1;
907 		struct {
908 			u64 word[4];
909 		} u64;
910 	};
911 };
912 
913 struct kvm_s390_gib {
914 	u32 alert_list_origin;
915 	u32 reserved01;
916 	u8:5;
917 	u8  nisc:3;
918 	u8  reserved03[3];
919 	u32 reserved04[5];
920 };
921 
922 /*
923  * sie_page2 has to be allocated as DMA because fac_list, crycb and
924  * gisa need 31bit addresses in the sie control block.
925  */
926 struct sie_page2 {
927 	__u64 fac_list[S390_ARCH_FAC_LIST_SIZE_U64];	/* 0x0000 */
928 	struct kvm_s390_crypto_cb crycb;		/* 0x0800 */
929 	struct kvm_s390_gisa gisa;			/* 0x0900 */
930 	struct kvm *kvm;				/* 0x0920 */
931 	u8 reserved928[0x1000 - 0x928];			/* 0x0928 */
932 };
933 
934 struct kvm_s390_vsie {
935 	struct mutex mutex;
936 	struct radix_tree_root addr_to_page;
937 	int page_count;
938 	int next;
939 	struct page *pages[KVM_MAX_VCPUS];
940 };
941 
942 struct kvm_s390_gisa_iam {
943 	u8 mask;
944 	spinlock_t ref_lock;
945 	u32 ref_count[MAX_ISC + 1];
946 };
947 
948 struct kvm_s390_gisa_interrupt {
949 	struct kvm_s390_gisa *origin;
950 	struct kvm_s390_gisa_iam alert;
951 	struct hrtimer timer;
952 	u64 expires;
953 	DECLARE_BITMAP(kicked_mask, KVM_MAX_VCPUS);
954 };
955 
956 struct kvm_s390_pv {
957 	u64 handle;
958 	u64 guest_len;
959 	unsigned long stor_base;
960 	void *stor_var;
961 	bool dumping;
962 	void *set_aside;
963 	struct list_head need_cleanup;
964 	struct mmu_notifier mmu_notifier;
965 };
966 
967 struct kvm_arch{
968 	void *sca;
969 	int use_esca;
970 	rwlock_t sca_lock;
971 	debug_info_t *dbf;
972 	struct kvm_s390_float_interrupt float_int;
973 	struct kvm_device *flic;
974 	struct gmap *gmap;
975 	unsigned long mem_limit;
976 	int css_support;
977 	int use_irqchip;
978 	int use_cmma;
979 	int use_pfmfi;
980 	int use_skf;
981 	int use_zpci_interp;
982 	int user_cpu_state_ctrl;
983 	int user_sigp;
984 	int user_stsi;
985 	int user_instr0;
986 	struct s390_io_adapter *adapters[MAX_S390_IO_ADAPTERS];
987 	wait_queue_head_t ipte_wq;
988 	int ipte_lock_count;
989 	struct mutex ipte_mutex;
990 	spinlock_t start_stop_lock;
991 	struct sie_page2 *sie_page2;
992 	struct kvm_s390_cpu_model model;
993 	struct kvm_s390_crypto crypto;
994 	struct kvm_s390_vsie vsie;
995 	u8 epdx;
996 	u64 epoch;
997 	int migration_mode;
998 	atomic64_t cmma_dirty_pages;
999 	/* subset of available cpu features enabled by user space */
1000 	DECLARE_BITMAP(cpu_feat, KVM_S390_VM_CPU_FEAT_NR_BITS);
1001 	/* indexed by vcpu_idx */
1002 	DECLARE_BITMAP(idle_mask, KVM_MAX_VCPUS);
1003 	struct kvm_s390_gisa_interrupt gisa_int;
1004 	struct kvm_s390_pv pv;
1005 	struct list_head kzdev_list;
1006 	spinlock_t kzdev_list_lock;
1007 };
1008 
1009 #define KVM_HVA_ERR_BAD		(-1UL)
1010 #define KVM_HVA_ERR_RO_BAD	(-2UL)
1011 
1012 static inline bool kvm_is_error_hva(unsigned long addr)
1013 {
1014 	return IS_ERR_VALUE(addr);
1015 }
1016 
1017 #define ASYNC_PF_PER_VCPU	64
1018 struct kvm_arch_async_pf {
1019 	unsigned long pfault_token;
1020 };
1021 
1022 bool kvm_arch_can_dequeue_async_page_present(struct kvm_vcpu *vcpu);
1023 
1024 void kvm_arch_async_page_ready(struct kvm_vcpu *vcpu,
1025 			       struct kvm_async_pf *work);
1026 
1027 bool kvm_arch_async_page_not_present(struct kvm_vcpu *vcpu,
1028 				     struct kvm_async_pf *work);
1029 
1030 void kvm_arch_async_page_present(struct kvm_vcpu *vcpu,
1031 				 struct kvm_async_pf *work);
1032 
1033 static inline void kvm_arch_async_page_present_queued(struct kvm_vcpu *vcpu) {}
1034 
1035 void kvm_arch_crypto_clear_masks(struct kvm *kvm);
1036 void kvm_arch_crypto_set_masks(struct kvm *kvm, unsigned long *apm,
1037 			       unsigned long *aqm, unsigned long *adm);
1038 
1039 int __sie64a(phys_addr_t sie_block_phys, struct kvm_s390_sie_block *sie_block, u64 *rsa,
1040 	     unsigned long gasce);
1041 
1042 static inline int sie64a(struct kvm_s390_sie_block *sie_block, u64 *rsa, unsigned long gasce)
1043 {
1044 	return __sie64a(virt_to_phys(sie_block), sie_block, rsa, gasce);
1045 }
1046 
1047 extern char sie_exit;
1048 
1049 bool kvm_s390_pv_is_protected(struct kvm *kvm);
1050 bool kvm_s390_pv_cpu_is_protected(struct kvm_vcpu *vcpu);
1051 
1052 extern int kvm_s390_gisc_register(struct kvm *kvm, u32 gisc);
1053 extern int kvm_s390_gisc_unregister(struct kvm *kvm, u32 gisc);
1054 
1055 static inline void kvm_arch_sync_events(struct kvm *kvm) {}
1056 static inline void kvm_arch_free_memslot(struct kvm *kvm,
1057 					 struct kvm_memory_slot *slot) {}
1058 static inline void kvm_arch_memslots_updated(struct kvm *kvm, u64 gen) {}
1059 static inline void kvm_arch_flush_shadow_all(struct kvm *kvm) {}
1060 static inline void kvm_arch_flush_shadow_memslot(struct kvm *kvm,
1061 		struct kvm_memory_slot *slot) {}
1062 static inline void kvm_arch_vcpu_blocking(struct kvm_vcpu *vcpu) {}
1063 static inline void kvm_arch_vcpu_unblocking(struct kvm_vcpu *vcpu) {}
1064 
1065 #define __KVM_HAVE_ARCH_VM_FREE
1066 void kvm_arch_free_vm(struct kvm *kvm);
1067 
1068 struct zpci_kvm_hook {
1069 	int (*kvm_register)(void *opaque, struct kvm *kvm);
1070 	void (*kvm_unregister)(void *opaque);
1071 };
1072 
1073 extern struct zpci_kvm_hook zpci_kvm_hook;
1074 
1075 #endif
1076