uv.c 2.7 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091
  1. // SPDX-License-Identifier: GPL-2.0
  2. #include <asm/uv.h>
  3. #include <asm/boot_data.h>
  4. #include <asm/facility.h>
  5. #include <asm/sections.h>
  6. #include "boot.h"
  7. #include "uv.h"
  8. /* will be used in arch/s390/kernel/uv.c */
  9. #ifdef CONFIG_PROTECTED_VIRTUALIZATION_GUEST
  10. int __bootdata_preserved(prot_virt_guest);
  11. #endif
  12. #if IS_ENABLED(CONFIG_KVM)
  13. int __bootdata_preserved(prot_virt_host);
  14. #endif
  15. struct uv_info __bootdata_preserved(uv_info);
  16. void uv_query_info(void)
  17. {
  18. struct uv_cb_qui uvcb = {
  19. .header.cmd = UVC_CMD_QUI,
  20. .header.len = sizeof(uvcb)
  21. };
  22. if (!test_facility(158))
  23. return;
  24. /* rc==0x100 means that there is additional data we do not process */
  25. if (uv_call(0, (uint64_t)&uvcb) && uvcb.header.rc != 0x100)
  26. return;
  27. if (IS_ENABLED(CONFIG_KVM)) {
  28. memcpy(uv_info.inst_calls_list, uvcb.inst_calls_list, sizeof(uv_info.inst_calls_list));
  29. uv_info.uv_base_stor_len = uvcb.uv_base_stor_len;
  30. uv_info.guest_base_stor_len = uvcb.conf_base_phys_stor_len;
  31. uv_info.guest_virt_base_stor_len = uvcb.conf_base_virt_stor_len;
  32. uv_info.guest_virt_var_stor_len = uvcb.conf_virt_var_stor_len;
  33. uv_info.guest_cpu_stor_len = uvcb.cpu_stor_len;
  34. uv_info.max_sec_stor_addr = ALIGN(uvcb.max_guest_stor_addr, PAGE_SIZE);
  35. uv_info.max_num_sec_conf = uvcb.max_num_sec_conf;
  36. uv_info.max_guest_cpu_id = uvcb.max_guest_cpu_id;
  37. uv_info.uv_feature_indications = uvcb.uv_feature_indications;
  38. uv_info.supp_se_hdr_ver = uvcb.supp_se_hdr_versions;
  39. uv_info.supp_se_hdr_pcf = uvcb.supp_se_hdr_pcf;
  40. uv_info.conf_dump_storage_state_len = uvcb.conf_dump_storage_state_len;
  41. uv_info.conf_dump_finalize_len = uvcb.conf_dump_finalize_len;
  42. uv_info.supp_att_req_hdr_ver = uvcb.supp_att_req_hdr_ver;
  43. uv_info.supp_att_pflags = uvcb.supp_att_pflags;
  44. }
  45. #ifdef CONFIG_PROTECTED_VIRTUALIZATION_GUEST
  46. if (test_bit_inv(BIT_UVC_CMD_SET_SHARED_ACCESS, (unsigned long *)uvcb.inst_calls_list) &&
  47. test_bit_inv(BIT_UVC_CMD_REMOVE_SHARED_ACCESS, (unsigned long *)uvcb.inst_calls_list))
  48. prot_virt_guest = 1;
  49. #endif
  50. }
  51. #if IS_ENABLED(CONFIG_KVM)
  52. unsigned long adjust_to_uv_max(unsigned long limit)
  53. {
  54. if (is_prot_virt_host() && uv_info.max_sec_stor_addr)
  55. limit = min_t(unsigned long, limit, uv_info.max_sec_stor_addr);
  56. return limit;
  57. }
  58. static int is_prot_virt_host_capable(void)
  59. {
  60. /* disable if no prot_virt=1 given on command-line */
  61. if (!is_prot_virt_host())
  62. return 0;
  63. /* disable if protected guest virtualization is enabled */
  64. if (is_prot_virt_guest())
  65. return 0;
  66. /* disable if no hardware support */
  67. if (!test_facility(158))
  68. return 0;
  69. /* disable if kdump */
  70. if (oldmem_data.start)
  71. return 0;
  72. /* disable if stand-alone dump */
  73. if (ipl_block_valid && is_ipl_block_dump())
  74. return 0;
  75. return 1;
  76. }
  77. void sanitize_prot_virt_host(void)
  78. {
  79. prot_virt_host = is_prot_virt_host_capable();
  80. }
  81. #endif