xref: /kvm-unit-tests/lib/s390x/sie.c (revision 4e8880d674fe57668e221d7aff3f10e4df9230e6)
1d75fac5fSJanosch Frank /* SPDX-License-Identifier: GPL-2.0-only */
2d75fac5fSJanosch Frank /*
3ab68f968SJanosch Frank  * Library for managing various aspects of guests
4d75fac5fSJanosch Frank  *
5d75fac5fSJanosch Frank  * Copyright (c) 2021 IBM Corp
6d75fac5fSJanosch Frank  *
7d75fac5fSJanosch Frank  * Authors:
8d75fac5fSJanosch Frank  *  Janosch Frank <frankja@linux.ibm.com>
9d75fac5fSJanosch Frank  */
10d75fac5fSJanosch Frank 
11d75fac5fSJanosch Frank #include <asm/barrier.h>
124e53a1d0SJanosch Frank #include <bitops.h>
13d75fac5fSJanosch Frank #include <libcflat.h>
14d75fac5fSJanosch Frank #include <sie.h>
15a58e5546SJanosch Frank #include <asm/page.h>
16a58e5546SJanosch Frank #include <libcflat.h>
17a58e5546SJanosch Frank #include <alloc_page.h>
18ae337a39SNico Boehr #include <vmalloc.h>
19ae337a39SNico Boehr #include <sclp.h>
20d75fac5fSJanosch Frank 
211e19c3edSJanosch Frank void sie_expect_validity(struct vm *vm)
22d75fac5fSJanosch Frank {
231e19c3edSJanosch Frank 	vm->validity_expected = true;
24d75fac5fSJanosch Frank }
25d75fac5fSJanosch Frank 
261e19c3edSJanosch Frank uint16_t sie_get_validity(struct vm *vm)
27d75fac5fSJanosch Frank {
28a680af75SJanosch Frank 	/*
29a680af75SJanosch Frank 	 * 0xffff will never be returned by SIE, so we can indicate a
30a680af75SJanosch Frank 	 * missing validity via this value.
31a680af75SJanosch Frank 	 */
32a680af75SJanosch Frank 	if (vm->sblk->icptcode != ICPT_VALIDITY)
33a680af75SJanosch Frank 		return 0xffff;
34a680af75SJanosch Frank 
351e19c3edSJanosch Frank 	return vm->sblk->ipb >> 16;
361e19c3edSJanosch Frank }
371e19c3edSJanosch Frank 
381e19c3edSJanosch Frank void sie_check_validity(struct vm *vm, uint16_t vir_exp)
391e19c3edSJanosch Frank {
401e19c3edSJanosch Frank 	uint16_t vir = sie_get_validity(vm);
411e19c3edSJanosch Frank 
42d75fac5fSJanosch Frank 	report(vir_exp == vir, "VALIDITY: %x", vir);
43d75fac5fSJanosch Frank }
44d75fac5fSJanosch Frank 
45d75fac5fSJanosch Frank void sie_handle_validity(struct vm *vm)
46d75fac5fSJanosch Frank {
47d75fac5fSJanosch Frank 	if (vm->sblk->icptcode != ICPT_VALIDITY)
48d75fac5fSJanosch Frank 		return;
49d75fac5fSJanosch Frank 
501e19c3edSJanosch Frank 	if (!vm->validity_expected)
511e19c3edSJanosch Frank 		report_abort("VALIDITY: %x", sie_get_validity(vm));
521e19c3edSJanosch Frank 	vm->validity_expected = false;
53d75fac5fSJanosch Frank }
54a58e5546SJanosch Frank 
55ab68f968SJanosch Frank void sie(struct vm *vm)
56ab68f968SJanosch Frank {
57*4e8880d6SNico Boehr 	uint64_t old_cr13;
58*4e8880d6SNico Boehr 
59e9a5c8b6SJanosch Frank 	if (vm->sblk->sdf == 2)
60e9a5c8b6SJanosch Frank 		memcpy(vm->sblk->pv_grregs, vm->save_area.guest.grs,
61e9a5c8b6SJanosch Frank 		       sizeof(vm->save_area.guest.grs));
62e9a5c8b6SJanosch Frank 
63ab68f968SJanosch Frank 	/* Reset icptcode so we don't trip over it below */
64ab68f968SJanosch Frank 	vm->sblk->icptcode = 0;
65ab68f968SJanosch Frank 
66*4e8880d6SNico Boehr 	/*
67*4e8880d6SNico Boehr 	 * Set up home address space to match primary space. Instead of running
68*4e8880d6SNico Boehr 	 * in home space all the time, we switch every time in sie() because:
69*4e8880d6SNico Boehr 	 * - tests that depend on running in primary space mode don't need to be
70*4e8880d6SNico Boehr 	 *   touched
71*4e8880d6SNico Boehr 	 * - it avoids regressions in tests
72*4e8880d6SNico Boehr 	 * - switching every time makes it easier to extend this in the future,
73*4e8880d6SNico Boehr 	 *   for example to allow tests to run in whatever space they want
74*4e8880d6SNico Boehr 	 */
75*4e8880d6SNico Boehr 	old_cr13 = stctg(13);
76*4e8880d6SNico Boehr 	lctlg(13, stctg(1));
77*4e8880d6SNico Boehr 
78*4e8880d6SNico Boehr 	/* switch to home space so guest tables can be different from host */
79*4e8880d6SNico Boehr 	psw_mask_set_bits(PSW_MASK_HOME);
80*4e8880d6SNico Boehr 
81*4e8880d6SNico Boehr 	/* also handle all interruptions in home space while in SIE */
82*4e8880d6SNico Boehr 	irq_set_dat_mode(true, AS_HOME);
83*4e8880d6SNico Boehr 
84ab68f968SJanosch Frank 	while (vm->sblk->icptcode == 0) {
85ab68f968SJanosch Frank 		sie64a(vm->sblk, &vm->save_area);
86ab68f968SJanosch Frank 		sie_handle_validity(vm);
87ab68f968SJanosch Frank 	}
88ab68f968SJanosch Frank 	vm->save_area.guest.grs[14] = vm->sblk->gg14;
89ab68f968SJanosch Frank 	vm->save_area.guest.grs[15] = vm->sblk->gg15;
90e9a5c8b6SJanosch Frank 
91*4e8880d6SNico Boehr 	irq_set_dat_mode(true, AS_PRIM);
92*4e8880d6SNico Boehr 	psw_mask_clear_bits(PSW_MASK_HOME);
93*4e8880d6SNico Boehr 
94*4e8880d6SNico Boehr 	/* restore the old CR 13 */
95*4e8880d6SNico Boehr 	lctlg(13, old_cr13);
96*4e8880d6SNico Boehr 
97e9a5c8b6SJanosch Frank 	if (vm->sblk->sdf == 2)
98e9a5c8b6SJanosch Frank 		memcpy(vm->save_area.guest.grs, vm->sblk->pv_grregs,
99e9a5c8b6SJanosch Frank 		       sizeof(vm->save_area.guest.grs));
100ab68f968SJanosch Frank }
101ab68f968SJanosch Frank 
1026d1cb286SJanosch Frank void sie_guest_sca_create(struct vm *vm)
1036d1cb286SJanosch Frank {
1046d1cb286SJanosch Frank 	vm->sca = (struct esca_block *)alloc_page();
1056d1cb286SJanosch Frank 
1066d1cb286SJanosch Frank 	/* Let's start out with one page of ESCA for now */
1076d1cb286SJanosch Frank 	vm->sblk->scaoh = ((uint64_t)vm->sca >> 32);
1086d1cb286SJanosch Frank 	vm->sblk->scaol = (uint64_t)vm->sca & ~0x3fU;
1096d1cb286SJanosch Frank 	vm->sblk->ecb2 |= ECB2_ESCA;
1104e53a1d0SJanosch Frank 
1114e53a1d0SJanosch Frank 	/* Enable SIGP sense running interpretation */
1124e53a1d0SJanosch Frank 	vm->sblk->ecb |= ECB_SRSI;
1134e53a1d0SJanosch Frank 
1144e53a1d0SJanosch Frank 	/* We assume that cpu 0 is always part of the vm */
1154e53a1d0SJanosch Frank 	vm->sca->mcn[0] = BIT(63);
1164e53a1d0SJanosch Frank 	vm->sca->cpu[0].sda = (uint64_t)vm->sblk;
1176d1cb286SJanosch Frank }
1186d1cb286SJanosch Frank 
119a58e5546SJanosch Frank /* Initializes the struct vm members like the SIE control block. */
120a58e5546SJanosch Frank void sie_guest_create(struct vm *vm, uint64_t guest_mem, uint64_t guest_mem_len)
121a58e5546SJanosch Frank {
122a58e5546SJanosch Frank 	vm->sblk = alloc_page();
123a58e5546SJanosch Frank 	memset(vm->sblk, 0, PAGE_SIZE);
124a58e5546SJanosch Frank 	vm->sblk->cpuflags = CPUSTAT_ZARCH | CPUSTAT_RUNNING;
125a58e5546SJanosch Frank 	vm->sblk->ihcpu = 0xffff;
126a58e5546SJanosch Frank 	vm->sblk->prefix = 0;
127a58e5546SJanosch Frank 
128a58e5546SJanosch Frank 	/* Guest memory chunks are always 1MB */
129a58e5546SJanosch Frank 	assert(!(guest_mem_len & ~HPAGE_MASK));
13093f65abcSJanosch Frank 	vm->guest_mem = (uint8_t *)guest_mem;
1319e3cff66SJanosch Frank 	/* For non-PV guests we re-use the host's ASCE for ease of use */
1329e3cff66SJanosch Frank 	vm->save_area.guest.asce = stctg(1);
133a58e5546SJanosch Frank 	/* Currently MSO/MSL is the easiest option */
134a58e5546SJanosch Frank 	vm->sblk->mso = (uint64_t)guest_mem;
135a58e5546SJanosch Frank 	vm->sblk->msl = (uint64_t)guest_mem + ((guest_mem_len - 1) & HPAGE_MASK);
136a58e5546SJanosch Frank 
137a58e5546SJanosch Frank 	/* CRYCB needs to be in the first 2GB */
138a58e5546SJanosch Frank 	vm->crycb = alloc_pages_flags(0, AREA_DMA31);
139a58e5546SJanosch Frank 	vm->sblk->crycbd = (uint32_t)(uintptr_t)vm->crycb;
140a58e5546SJanosch Frank }
141a58e5546SJanosch Frank 
142ae337a39SNico Boehr /**
143ae337a39SNico Boehr  * sie_guest_alloc() - Allocate memory for a guest and map it in virtual address
144ae337a39SNico Boehr  * space such that it is properly aligned.
145ae337a39SNico Boehr  * @guest_size: the desired size of the guest in bytes.
146ae337a39SNico Boehr  */
147ae337a39SNico Boehr uint8_t *sie_guest_alloc(uint64_t guest_size)
148ae337a39SNico Boehr {
149ae337a39SNico Boehr 	static unsigned long guest_counter = 1;
150ae337a39SNico Boehr 	u8 *guest_phys, *guest_virt;
151ae337a39SNico Boehr 	unsigned long i;
152ae337a39SNico Boehr 	pgd_t *root;
153ae337a39SNico Boehr 
154ae337a39SNico Boehr 	setup_vm();
155ae337a39SNico Boehr 	root = (pgd_t *)(stctg(1) & PAGE_MASK);
156ae337a39SNico Boehr 
157ae337a39SNico Boehr 	/*
158ae337a39SNico Boehr 	 * Start of guest memory in host virtual space needs to be aligned to
159ae337a39SNico Boehr 	 * 2GB for some environments. It also can't be at 2GB since the memory
160ae337a39SNico Boehr 	 * allocator stores its page_states metadata there.
161ae337a39SNico Boehr 	 * Thus we use the next multiple of 4GB after the end of physical
162ae337a39SNico Boehr 	 * mapping. This also leaves space after end of physical memory so the
163ae337a39SNico Boehr 	 * page immediately after physical memory is guaranteed not to be
164ae337a39SNico Boehr 	 * present.
165ae337a39SNico Boehr 	 */
166ae337a39SNico Boehr 	guest_virt = (uint8_t *)ALIGN(get_ram_size() + guest_counter * 4UL * SZ_1G, SZ_2G);
167ae337a39SNico Boehr 	guest_counter++;
168ae337a39SNico Boehr 
169ae337a39SNico Boehr 	guest_phys = alloc_pages(get_order(guest_size) - 12);
170ae337a39SNico Boehr 	/*
171ae337a39SNico Boehr 	 * Establish a new mapping of the guest memory so it can be 2GB aligned
172ae337a39SNico Boehr 	 * without actually requiring 2GB physical memory.
173ae337a39SNico Boehr 	 */
174ae337a39SNico Boehr 	for (i = 0; i < guest_size; i += PAGE_SIZE) {
175ae337a39SNico Boehr 		install_page(root, __pa(guest_phys + i), guest_virt + i);
176ae337a39SNico Boehr 	}
177ae337a39SNico Boehr 	memset(guest_virt, 0, guest_size);
178ae337a39SNico Boehr 
179ae337a39SNico Boehr 	return guest_virt;
180ae337a39SNico Boehr }
181ae337a39SNico Boehr 
182a58e5546SJanosch Frank /* Frees the memory that was gathered on initialization */
183a58e5546SJanosch Frank void sie_guest_destroy(struct vm *vm)
184a58e5546SJanosch Frank {
185a58e5546SJanosch Frank 	free_page(vm->crycb);
186a58e5546SJanosch Frank 	free_page(vm->sblk);
1876d1cb286SJanosch Frank 	if (vm->sblk->ecb2 & ECB2_ESCA)
1886d1cb286SJanosch Frank 		free_page(vm->sca);
189a58e5546SJanosch Frank }
190