1 | // SPDX-License-Identifier: GPL-2.0 |
2 | #include <asm/uv.h> |
3 | #include <asm/boot_data.h> |
4 | #include <asm/facility.h> |
5 | #include <asm/sections.h> |
6 | |
7 | #include "boot.h" |
8 | #include "uv.h" |
9 | |
10 | /* will be used in arch/s390/kernel/uv.c */ |
11 | #ifdef CONFIG_PROTECTED_VIRTUALIZATION_GUEST |
12 | int __bootdata_preserved(prot_virt_guest); |
13 | #endif |
14 | #if IS_ENABLED(CONFIG_KVM) |
15 | int __bootdata_preserved(prot_virt_host); |
16 | #endif |
17 | struct uv_info __bootdata_preserved(uv_info); |
18 | |
19 | void uv_query_info(void) |
20 | { |
21 | struct uv_cb_qui uvcb = { |
22 | .header.cmd = UVC_CMD_QUI, |
23 | .header.len = sizeof(uvcb) |
24 | }; |
25 | |
26 | if (!test_facility(158)) |
27 | return; |
28 | |
29 | /* rc==0x100 means that there is additional data we do not process */ |
30 | if (uv_call(0, (uint64_t)&uvcb) && uvcb.header.rc != 0x100) |
31 | return; |
32 | |
33 | if (IS_ENABLED(CONFIG_KVM)) { |
34 | memcpy(uv_info.inst_calls_list, uvcb.inst_calls_list, sizeof(uv_info.inst_calls_list)); |
35 | uv_info.uv_base_stor_len = uvcb.uv_base_stor_len; |
36 | uv_info.guest_base_stor_len = uvcb.conf_base_phys_stor_len; |
37 | uv_info.guest_virt_base_stor_len = uvcb.conf_base_virt_stor_len; |
38 | uv_info.guest_virt_var_stor_len = uvcb.conf_virt_var_stor_len; |
39 | uv_info.guest_cpu_stor_len = uvcb.cpu_stor_len; |
40 | uv_info.max_sec_stor_addr = ALIGN(uvcb.max_guest_stor_addr, PAGE_SIZE); |
41 | uv_info.max_num_sec_conf = uvcb.max_num_sec_conf; |
42 | uv_info.max_guest_cpu_id = uvcb.max_guest_cpu_id; |
43 | uv_info.uv_feature_indications = uvcb.uv_feature_indications; |
44 | uv_info.supp_se_hdr_ver = uvcb.supp_se_hdr_versions; |
45 | uv_info.supp_se_hdr_pcf = uvcb.supp_se_hdr_pcf; |
46 | uv_info.conf_dump_storage_state_len = uvcb.conf_dump_storage_state_len; |
47 | uv_info.conf_dump_finalize_len = uvcb.conf_dump_finalize_len; |
48 | uv_info.supp_att_req_hdr_ver = uvcb.supp_att_req_hdr_ver; |
49 | uv_info.supp_att_pflags = uvcb.supp_att_pflags; |
50 | uv_info.supp_add_secret_req_ver = uvcb.supp_add_secret_req_ver; |
51 | uv_info.supp_add_secret_pcf = uvcb.supp_add_secret_pcf; |
52 | uv_info.supp_secret_types = uvcb.supp_secret_types; |
53 | uv_info.max_secrets = uvcb.max_secrets; |
54 | } |
55 | |
56 | #ifdef CONFIG_PROTECTED_VIRTUALIZATION_GUEST |
57 | if (test_bit_inv(BIT_UVC_CMD_SET_SHARED_ACCESS, (unsigned long *)uvcb.inst_calls_list) && |
58 | test_bit_inv(BIT_UVC_CMD_REMOVE_SHARED_ACCESS, (unsigned long *)uvcb.inst_calls_list)) |
59 | prot_virt_guest = 1; |
60 | #endif |
61 | } |
62 | |
63 | #if IS_ENABLED(CONFIG_KVM) |
64 | unsigned long adjust_to_uv_max(unsigned long limit) |
65 | { |
66 | if (is_prot_virt_host() && uv_info.max_sec_stor_addr) |
67 | limit = min_t(unsigned long, limit, uv_info.max_sec_stor_addr); |
68 | return limit; |
69 | } |
70 | |
71 | static int is_prot_virt_host_capable(void) |
72 | { |
73 | /* disable if no prot_virt=1 given on command-line */ |
74 | if (!is_prot_virt_host()) |
75 | return 0; |
76 | /* disable if protected guest virtualization is enabled */ |
77 | if (is_prot_virt_guest()) |
78 | return 0; |
79 | /* disable if no hardware support */ |
80 | if (!test_facility(158)) |
81 | return 0; |
82 | /* disable if kdump */ |
83 | if (oldmem_data.start) |
84 | return 0; |
85 | /* disable if stand-alone dump */ |
86 | if (ipl_block_valid && is_ipl_block_dump()) |
87 | return 0; |
88 | return 1; |
89 | } |
90 | |
91 | void sanitize_prot_virt_host(void) |
92 | { |
93 | prot_virt_host = is_prot_virt_host_capable(); |
94 | } |
95 | #endif |
96 | |