xref: /qemu/target/s390x/kvm/pv.c (revision 55a494e53e1f0c73ba5cfb1b072fed9035b7961b)
1c3347ed0SJanosch Frank /*
2c3347ed0SJanosch Frank  * Protected Virtualization functions
3c3347ed0SJanosch Frank  *
4c3347ed0SJanosch Frank  * Copyright IBM Corp. 2020
5c3347ed0SJanosch Frank  * Author(s):
6c3347ed0SJanosch Frank  *  Janosch Frank <frankja@linux.ibm.com>
7c3347ed0SJanosch Frank  *
8c3347ed0SJanosch Frank  * This work is licensed under the terms of the GNU GPL, version 2 or (at
9c3347ed0SJanosch Frank  * your option) any later version. See the COPYING file in the top-level
10c3347ed0SJanosch Frank  * directory.
11c3347ed0SJanosch Frank  */
12c3347ed0SJanosch Frank #include "qemu/osdep.h"
13c3347ed0SJanosch Frank 
14c3347ed0SJanosch Frank #include <linux/kvm.h>
15c3347ed0SJanosch Frank 
1688693ab2SClaudio Imbrenda #include "qemu/units.h"
17651615d9SDavid Gibson #include "qapi/error.h"
18c3347ed0SJanosch Frank #include "qemu/error-report.h"
1932cad1ffSPhilippe Mathieu-Daudé #include "system/kvm.h"
2032cad1ffSPhilippe Mathieu-Daudé #include "system/cpus.h"
21651615d9SDavid Gibson #include "qom/object_interfaces.h"
22433442a7SPhilippe Mathieu-Daudé #include "system/confidential-guest-support.h"
23fbc1384cSChristian Borntraeger #include "hw/s390x/ipl.h"
2475d7150cSCédric Le Goater #include "hw/s390x/sclp.h"
2503d83ecfSJanosch Frank #include "target/s390x/kvm/kvm_s390x.h"
26f5f9c6eaSPhilippe Mathieu-Daudé #include "target/s390x/kvm/pv.h"
2703d83ecfSJanosch Frank 
2803d83ecfSJanosch Frank static bool info_valid;
2903d83ecfSJanosch Frank static struct kvm_s390_pv_info_vm info_vm;
3003d83ecfSJanosch Frank static struct kvm_s390_pv_info_dump info_dump;
31c3347ed0SJanosch Frank 
__s390_pv_cmd(uint32_t cmd,const char * cmdname,void * data,struct S390PVResponse * pv_resp)327af51621SThomas Huth static int __s390_pv_cmd(uint32_t cmd, const char *cmdname, void *data,
33*55a494e5SGautam Gala                          struct S390PVResponse *pv_resp)
34c3347ed0SJanosch Frank {
35c3347ed0SJanosch Frank     struct kvm_pv_cmd pv_cmd = {
36c3347ed0SJanosch Frank         .cmd = cmd,
37c3347ed0SJanosch Frank         .data = (uint64_t)data,
38c3347ed0SJanosch Frank     };
39e8d12a55SChristian Borntraeger     int rc;
40e8d12a55SChristian Borntraeger 
41e8d12a55SChristian Borntraeger     do {
42e8d12a55SChristian Borntraeger         rc = kvm_vm_ioctl(kvm_state, KVM_S390_PV_COMMAND, &pv_cmd);
43e8d12a55SChristian Borntraeger     } while (rc == -EINTR);
44c3347ed0SJanosch Frank 
45c3347ed0SJanosch Frank     if (rc) {
46c3347ed0SJanosch Frank         error_report("KVM PV command %d (%s) failed: header rc %x rrc %x "
47c3347ed0SJanosch Frank                      "IOCTL rc: %d", cmd, cmdname, pv_cmd.rc, pv_cmd.rrc,
48c3347ed0SJanosch Frank                      rc);
49c3347ed0SJanosch Frank     }
50*55a494e5SGautam Gala     if (pv_resp) {
51*55a494e5SGautam Gala         pv_resp->cmd = cmd;
52*55a494e5SGautam Gala         pv_resp->rc = pv_cmd.rc;
53*55a494e5SGautam Gala         pv_resp->rrc = pv_cmd.rrc;
547af51621SThomas Huth     }
55c3347ed0SJanosch Frank     return rc;
56c3347ed0SJanosch Frank }
57c3347ed0SJanosch Frank 
58c3347ed0SJanosch Frank /*
59c3347ed0SJanosch Frank  * This macro lets us pass the command as a string to the function so
60c3347ed0SJanosch Frank  * we can print it on an error.
61c3347ed0SJanosch Frank  */
627af51621SThomas Huth #define s390_pv_cmd(cmd, data)  __s390_pv_cmd(cmd, #cmd, data, NULL)
63*55a494e5SGautam Gala #define s390_pv_cmd_pv_resp(cmd, data, pv_resp) \
64*55a494e5SGautam Gala                                 __s390_pv_cmd(cmd, #cmd, data, pv_resp)
65e27cbd17SGautam Gala 
s390_pv_cmd_exit(uint32_t cmd,void * data)66e27cbd17SGautam Gala static void s390_pv_cmd_exit(uint32_t cmd, void *data)
67e27cbd17SGautam Gala {
68e27cbd17SGautam Gala     if (s390_pv_cmd(cmd, data)) {
69e27cbd17SGautam Gala         exit(1);
70e27cbd17SGautam Gala     }
71c3347ed0SJanosch Frank }
72c3347ed0SJanosch Frank 
s390_pv_query_info(void)7303d83ecfSJanosch Frank int s390_pv_query_info(void)
7403d83ecfSJanosch Frank {
7503d83ecfSJanosch Frank     struct kvm_s390_pv_info info = {
7603d83ecfSJanosch Frank         .header.id = KVM_PV_INFO_VM,
7703d83ecfSJanosch Frank         .header.len_max = sizeof(info.header) + sizeof(info.vm),
7803d83ecfSJanosch Frank     };
7903d83ecfSJanosch Frank     int rc;
8003d83ecfSJanosch Frank 
8103d83ecfSJanosch Frank     /* Info API's first user is dump so they are bundled */
8203d83ecfSJanosch Frank     if (!kvm_s390_get_protected_dump()) {
8303d83ecfSJanosch Frank         return 0;
8403d83ecfSJanosch Frank     }
8503d83ecfSJanosch Frank 
8603d83ecfSJanosch Frank     rc = s390_pv_cmd(KVM_PV_INFO, &info);
8703d83ecfSJanosch Frank     if (rc) {
8803d83ecfSJanosch Frank         error_report("KVM PV INFO cmd %x failed: %s",
8903d83ecfSJanosch Frank                      info.header.id, strerror(-rc));
9003d83ecfSJanosch Frank         return rc;
9103d83ecfSJanosch Frank     }
9203d83ecfSJanosch Frank     memcpy(&info_vm, &info.vm, sizeof(info.vm));
9303d83ecfSJanosch Frank 
9403d83ecfSJanosch Frank     info.header.id = KVM_PV_INFO_DUMP;
9503d83ecfSJanosch Frank     info.header.len_max = sizeof(info.header) + sizeof(info.dump);
9603d83ecfSJanosch Frank     rc = s390_pv_cmd(KVM_PV_INFO, &info);
9703d83ecfSJanosch Frank     if (rc) {
9803d83ecfSJanosch Frank         error_report("KVM PV INFO cmd %x failed: %s",
9903d83ecfSJanosch Frank                      info.header.id, strerror(-rc));
10003d83ecfSJanosch Frank         return rc;
10103d83ecfSJanosch Frank     }
10203d83ecfSJanosch Frank 
10303d83ecfSJanosch Frank     memcpy(&info_dump, &info.dump, sizeof(info.dump));
10403d83ecfSJanosch Frank     info_valid = true;
10503d83ecfSJanosch Frank 
10603d83ecfSJanosch Frank     return rc;
10703d83ecfSJanosch Frank }
10803d83ecfSJanosch Frank 
s390_pv_vm_enable(void)109c3347ed0SJanosch Frank int s390_pv_vm_enable(void)
110c3347ed0SJanosch Frank {
111c3347ed0SJanosch Frank     return s390_pv_cmd(KVM_PV_ENABLE, NULL);
112c3347ed0SJanosch Frank }
113c3347ed0SJanosch Frank 
s390_pv_vm_disable(void)114c3347ed0SJanosch Frank void s390_pv_vm_disable(void)
115c3347ed0SJanosch Frank {
116c3347ed0SJanosch Frank      s390_pv_cmd_exit(KVM_PV_DISABLE, NULL);
117c3347ed0SJanosch Frank }
118c3347ed0SJanosch Frank 
s390_pv_do_unprot_async_fn(void * p)119c3a073c6SClaudio Imbrenda static void *s390_pv_do_unprot_async_fn(void *p)
120c3a073c6SClaudio Imbrenda {
121c3a073c6SClaudio Imbrenda      s390_pv_cmd_exit(KVM_PV_ASYNC_CLEANUP_PERFORM, NULL);
122c3a073c6SClaudio Imbrenda      return NULL;
123c3a073c6SClaudio Imbrenda }
124c3a073c6SClaudio Imbrenda 
s390_pv_vm_try_disable_async(S390CcwMachineState * ms)12588693ab2SClaudio Imbrenda bool s390_pv_vm_try_disable_async(S390CcwMachineState *ms)
126c3a073c6SClaudio Imbrenda {
127c3a073c6SClaudio Imbrenda     /*
128c3a073c6SClaudio Imbrenda      * t is only needed to create the thread; once qemu_thread_create
129c3a073c6SClaudio Imbrenda      * returns, it can safely be discarded.
130c3a073c6SClaudio Imbrenda      */
131c3a073c6SClaudio Imbrenda     QemuThread t;
132c3a073c6SClaudio Imbrenda 
13388693ab2SClaudio Imbrenda     /*
13488693ab2SClaudio Imbrenda      * If the feature is not present or if the VM is not larger than 2 GiB,
13588693ab2SClaudio Imbrenda      * KVM_PV_ASYNC_CLEANUP_PREPARE fill fail; no point in attempting it.
13688693ab2SClaudio Imbrenda      */
137a056332eSDavid Hildenbrand     if (s390_get_memory_limit(ms) <= 2 * GiB ||
13888693ab2SClaudio Imbrenda         !kvm_check_extension(kvm_state, KVM_CAP_S390_PROTECTED_ASYNC_DISABLE)) {
139c3a073c6SClaudio Imbrenda         return false;
140c3a073c6SClaudio Imbrenda     }
141c3a073c6SClaudio Imbrenda     if (s390_pv_cmd(KVM_PV_ASYNC_CLEANUP_PREPARE, NULL) != 0) {
142c3a073c6SClaudio Imbrenda         return false;
143c3a073c6SClaudio Imbrenda     }
144c3a073c6SClaudio Imbrenda 
145c3a073c6SClaudio Imbrenda     qemu_thread_create(&t, "async_cleanup", s390_pv_do_unprot_async_fn, NULL,
146c3a073c6SClaudio Imbrenda                        QEMU_THREAD_DETACHED);
147c3a073c6SClaudio Imbrenda 
148c3a073c6SClaudio Imbrenda     return true;
149c3a073c6SClaudio Imbrenda }
150c3a073c6SClaudio Imbrenda 
1512e6a9f03SGautam Gala #define UV_RC_SSC_INVAL_HOSTKEY    0x0108
s390_pv_set_sec_parms(uint64_t origin,uint64_t length,struct S390PVResponse * pv_resp,Error ** errp)152*55a494e5SGautam Gala int s390_pv_set_sec_parms(uint64_t origin, uint64_t length,
153*55a494e5SGautam Gala                           struct S390PVResponse *pv_resp, Error **errp)
154c3347ed0SJanosch Frank {
155*55a494e5SGautam Gala     int ret;
156c3347ed0SJanosch Frank     struct kvm_s390_pv_sec_parm args = {
157c3347ed0SJanosch Frank         .origin = origin,
158c3347ed0SJanosch Frank         .length = length,
159c3347ed0SJanosch Frank     };
160c3347ed0SJanosch Frank 
161*55a494e5SGautam Gala     ret = s390_pv_cmd_pv_resp(KVM_PV_SET_SEC_PARMS, &args, pv_resp);
1627af51621SThomas Huth     if (ret) {
1637af51621SThomas Huth         error_setg(errp, "Failed to set secure execution parameters");
164*55a494e5SGautam Gala         if (pv_resp->rc == UV_RC_SSC_INVAL_HOSTKEY) {
1657af51621SThomas Huth             error_append_hint(errp, "Please check whether the image is "
1667af51621SThomas Huth                                     "correctly encrypted for this host\n");
1677af51621SThomas Huth         }
1687af51621SThomas Huth     }
1697af51621SThomas Huth 
1707af51621SThomas Huth     return ret;
171c3347ed0SJanosch Frank }
172c3347ed0SJanosch Frank 
173c3347ed0SJanosch Frank /*
174c3347ed0SJanosch Frank  * Called for each component in the SE type IPL parameter block 0.
175c3347ed0SJanosch Frank  */
s390_pv_unpack(uint64_t addr,uint64_t size,uint64_t tweak,struct S390PVResponse * pv_resp)176*55a494e5SGautam Gala int s390_pv_unpack(uint64_t addr, uint64_t size,
177*55a494e5SGautam Gala                    uint64_t tweak, struct S390PVResponse *pv_resp)
178c3347ed0SJanosch Frank {
179c3347ed0SJanosch Frank     struct kvm_s390_pv_unp args = {
180c3347ed0SJanosch Frank         .addr = addr,
181c3347ed0SJanosch Frank         .size = size,
182c3347ed0SJanosch Frank         .tweak = tweak,
183c3347ed0SJanosch Frank     };
184c3347ed0SJanosch Frank 
185*55a494e5SGautam Gala     return s390_pv_cmd_pv_resp(KVM_PV_UNPACK, &args, pv_resp);
186c3347ed0SJanosch Frank }
187c3347ed0SJanosch Frank 
s390_pv_prep_reset(void)1889a432597SJanosch Frank void s390_pv_prep_reset(void)
189c3347ed0SJanosch Frank {
190c3347ed0SJanosch Frank     s390_pv_cmd_exit(KVM_PV_PREP_RESET, NULL);
191c3347ed0SJanosch Frank }
192c3347ed0SJanosch Frank 
s390_pv_verify(struct S390PVResponse * pv_resp)193*55a494e5SGautam Gala int s390_pv_verify(struct S390PVResponse *pv_resp)
194c3347ed0SJanosch Frank {
195*55a494e5SGautam Gala     return s390_pv_cmd_pv_resp(KVM_PV_VERIFY, NULL, pv_resp);
196c3347ed0SJanosch Frank }
197c3347ed0SJanosch Frank 
s390_pv_unshare(void)198c3347ed0SJanosch Frank void s390_pv_unshare(void)
199c3347ed0SJanosch Frank {
200c3347ed0SJanosch Frank     s390_pv_cmd_exit(KVM_PV_UNSHARE_ALL, NULL);
201c3347ed0SJanosch Frank }
202fbc1384cSChristian Borntraeger 
s390_pv_inject_reset_error(CPUState * cs,struct S390PVResponse pv_resp)203*55a494e5SGautam Gala void s390_pv_inject_reset_error(CPUState *cs,
204*55a494e5SGautam Gala                                 struct S390PVResponse pv_resp)
205fbc1384cSChristian Borntraeger {
206fbc1384cSChristian Borntraeger     int r1 = (cs->kvm_run->s390_sieic.ipa & 0x00f0) >> 4;
207fbc1384cSChristian Borntraeger     CPUS390XState *env = &S390_CPU(cs)->env;
208fbc1384cSChristian Borntraeger 
209*55a494e5SGautam Gala     union {
210*55a494e5SGautam Gala         struct {
211*55a494e5SGautam Gala             uint16_t pv_cmd;
212*55a494e5SGautam Gala             uint16_t pv_rrc;
213*55a494e5SGautam Gala             uint16_t pv_rc;
214*55a494e5SGautam Gala             uint16_t diag_rc;
215*55a494e5SGautam Gala         };
216*55a494e5SGautam Gala         uint64_t regs;
217*55a494e5SGautam Gala     } resp = {
218*55a494e5SGautam Gala               .pv_cmd = pv_resp.cmd,
219*55a494e5SGautam Gala               .pv_rrc = pv_resp.rrc,
220*55a494e5SGautam Gala               .pv_rc = pv_resp.rc,
221*55a494e5SGautam Gala               .diag_rc = DIAG_308_RC_INVAL_FOR_PV
222*55a494e5SGautam Gala              };
223*55a494e5SGautam Gala 
224fbc1384cSChristian Borntraeger     /* Report that we are unable to enter protected mode */
225*55a494e5SGautam Gala     env->regs[r1 + 1] = resp.regs;
226fbc1384cSChristian Borntraeger }
227651615d9SDavid Gibson 
kvm_s390_pv_dmp_get_size_cpu(void)22803d83ecfSJanosch Frank uint64_t kvm_s390_pv_dmp_get_size_cpu(void)
22903d83ecfSJanosch Frank {
23003d83ecfSJanosch Frank     return info_dump.dump_cpu_buffer_len;
23103d83ecfSJanosch Frank }
23203d83ecfSJanosch Frank 
kvm_s390_pv_dmp_get_size_completion_data(void)23303d83ecfSJanosch Frank uint64_t kvm_s390_pv_dmp_get_size_completion_data(void)
23403d83ecfSJanosch Frank {
23503d83ecfSJanosch Frank     return info_dump.dump_config_finalize_len;
23603d83ecfSJanosch Frank }
23703d83ecfSJanosch Frank 
kvm_s390_pv_dmp_get_size_mem_state(void)23803d83ecfSJanosch Frank uint64_t kvm_s390_pv_dmp_get_size_mem_state(void)
23903d83ecfSJanosch Frank {
24003d83ecfSJanosch Frank     return info_dump.dump_config_mem_buffer_per_1m;
24103d83ecfSJanosch Frank }
24203d83ecfSJanosch Frank 
kvm_s390_pv_info_basic_valid(void)24303d83ecfSJanosch Frank bool kvm_s390_pv_info_basic_valid(void)
24403d83ecfSJanosch Frank {
24503d83ecfSJanosch Frank     return info_valid;
24603d83ecfSJanosch Frank }
24703d83ecfSJanosch Frank 
s390_pv_dump_cmd(uint64_t subcmd,uint64_t uaddr,uint64_t gaddr,uint64_t len)248753ca06fSJanosch Frank static int s390_pv_dump_cmd(uint64_t subcmd, uint64_t uaddr, uint64_t gaddr,
249753ca06fSJanosch Frank                             uint64_t len)
250753ca06fSJanosch Frank {
251753ca06fSJanosch Frank     struct kvm_s390_pv_dmp dmp = {
252753ca06fSJanosch Frank         .subcmd = subcmd,
253753ca06fSJanosch Frank         .buff_addr = uaddr,
254753ca06fSJanosch Frank         .buff_len = len,
255753ca06fSJanosch Frank         .gaddr = gaddr,
256753ca06fSJanosch Frank     };
257753ca06fSJanosch Frank     int ret;
258753ca06fSJanosch Frank 
259753ca06fSJanosch Frank     ret = s390_pv_cmd(KVM_PV_DUMP, (void *)&dmp);
260753ca06fSJanosch Frank     if (ret) {
261753ca06fSJanosch Frank         error_report("KVM DUMP command %ld failed", subcmd);
262753ca06fSJanosch Frank     }
263753ca06fSJanosch Frank     return ret;
264753ca06fSJanosch Frank }
265753ca06fSJanosch Frank 
kvm_s390_dump_cpu(S390CPU * cpu,void * buff)266753ca06fSJanosch Frank int kvm_s390_dump_cpu(S390CPU *cpu, void *buff)
267753ca06fSJanosch Frank {
268753ca06fSJanosch Frank     struct kvm_s390_pv_dmp dmp = {
269753ca06fSJanosch Frank         .subcmd = KVM_PV_DUMP_CPU,
270753ca06fSJanosch Frank         .buff_addr = (uint64_t)buff,
271753ca06fSJanosch Frank         .gaddr = 0,
272753ca06fSJanosch Frank         .buff_len = info_dump.dump_cpu_buffer_len,
273753ca06fSJanosch Frank     };
274753ca06fSJanosch Frank     struct kvm_pv_cmd pv = {
275753ca06fSJanosch Frank         .cmd = KVM_PV_DUMP,
276753ca06fSJanosch Frank         .data = (uint64_t)&dmp,
277753ca06fSJanosch Frank     };
278753ca06fSJanosch Frank 
279753ca06fSJanosch Frank     return kvm_vcpu_ioctl(CPU(cpu), KVM_S390_PV_CPU_COMMAND, &pv);
280753ca06fSJanosch Frank }
281753ca06fSJanosch Frank 
kvm_s390_dump_init(void)282753ca06fSJanosch Frank int kvm_s390_dump_init(void)
283753ca06fSJanosch Frank {
284753ca06fSJanosch Frank     return s390_pv_dump_cmd(KVM_PV_DUMP_INIT, 0, 0, 0);
285753ca06fSJanosch Frank }
286753ca06fSJanosch Frank 
kvm_s390_dump_mem_state(uint64_t gaddr,size_t len,void * dest)287753ca06fSJanosch Frank int kvm_s390_dump_mem_state(uint64_t gaddr, size_t len, void *dest)
288753ca06fSJanosch Frank {
289753ca06fSJanosch Frank     return s390_pv_dump_cmd(KVM_PV_DUMP_CONFIG_STOR_STATE, (uint64_t)dest,
290753ca06fSJanosch Frank                             gaddr, len);
291753ca06fSJanosch Frank }
292753ca06fSJanosch Frank 
kvm_s390_dump_completion_data(void * buff)293753ca06fSJanosch Frank int kvm_s390_dump_completion_data(void *buff)
294753ca06fSJanosch Frank {
295753ca06fSJanosch Frank     return s390_pv_dump_cmd(KVM_PV_DUMP_COMPLETE, (uint64_t)buff, 0,
296753ca06fSJanosch Frank                             info_dump.dump_config_finalize_len);
297753ca06fSJanosch Frank }
298753ca06fSJanosch Frank 
299651615d9SDavid Gibson #define TYPE_S390_PV_GUEST "s390-pv-guest"
300651615d9SDavid Gibson OBJECT_DECLARE_SIMPLE_TYPE(S390PVGuest, S390_PV_GUEST)
301651615d9SDavid Gibson 
302651615d9SDavid Gibson /**
303651615d9SDavid Gibson  * S390PVGuest:
304651615d9SDavid Gibson  *
305651615d9SDavid Gibson  * The S390PVGuest object is basically a dummy used to tell the
306651615d9SDavid Gibson  * confidential guest support system to use s390's PV mechanism.
307651615d9SDavid Gibson  *
308651615d9SDavid Gibson  * # $QEMU \
309651615d9SDavid Gibson  *         -object s390-pv-guest,id=pv0 \
310651615d9SDavid Gibson  *         -machine ...,confidential-guest-support=pv0
311651615d9SDavid Gibson  */
312651615d9SDavid Gibson struct S390PVGuest {
313651615d9SDavid Gibson     ConfidentialGuestSupport parent_obj;
314651615d9SDavid Gibson };
315651615d9SDavid Gibson 
316651615d9SDavid Gibson typedef struct S390PVGuestClass S390PVGuestClass;
317651615d9SDavid Gibson 
318651615d9SDavid Gibson struct S390PVGuestClass {
319651615d9SDavid Gibson     ConfidentialGuestSupportClass parent_class;
320651615d9SDavid Gibson };
321651615d9SDavid Gibson 
32275d7150cSCédric Le Goater /*
32375d7150cSCédric Le Goater  * If protected virtualization is enabled, the amount of data that the
32475d7150cSCédric Le Goater  * Read SCP Info Service Call can use is limited to one page. The
32575d7150cSCédric Le Goater  * available space also depends on the Extended-Length SCCB (ELS)
32675d7150cSCédric Le Goater  * feature which can take more buffer space to store feature
32775d7150cSCédric Le Goater  * information. This impacts the maximum number of CPUs supported in
32875d7150cSCédric Le Goater  * the machine.
32975d7150cSCédric Le Goater  */
s390_pv_get_max_cpus(void)33075d7150cSCédric Le Goater static uint32_t s390_pv_get_max_cpus(void)
33175d7150cSCédric Le Goater {
33275d7150cSCédric Le Goater     int offset_cpu = s390_has_feat(S390_FEAT_EXTENDED_LENGTH_SCCB) ?
33375d7150cSCédric Le Goater         offsetof(ReadInfo, entries) : SCLP_READ_SCP_INFO_FIXED_CPU_OFFSET;
33475d7150cSCédric Le Goater 
33575d7150cSCédric Le Goater     return (TARGET_PAGE_SIZE - offset_cpu) / sizeof(CPUEntry);
33675d7150cSCédric Le Goater }
33775d7150cSCédric Le Goater 
s390_pv_check_cpus(Error ** errp)33875d7150cSCédric Le Goater static bool s390_pv_check_cpus(Error **errp)
33975d7150cSCédric Le Goater {
34075d7150cSCédric Le Goater     MachineState *ms = MACHINE(qdev_get_machine());
34175d7150cSCédric Le Goater     uint32_t pv_max_cpus = s390_pv_get_max_cpus();
34275d7150cSCédric Le Goater 
34375d7150cSCédric Le Goater     if (ms->smp.max_cpus > pv_max_cpus) {
34475d7150cSCédric Le Goater         error_setg(errp, "Protected VMs support a maximum of %d CPUs",
34575d7150cSCédric Le Goater                    pv_max_cpus);
34675d7150cSCédric Le Goater         return false;
34775d7150cSCédric Le Goater     }
34875d7150cSCédric Le Goater 
34975d7150cSCédric Le Goater     return true;
35075d7150cSCédric Le Goater }
35175d7150cSCédric Le Goater 
s390_pv_guest_check(ConfidentialGuestSupport * cgs,Error ** errp)35275d7150cSCédric Le Goater static bool s390_pv_guest_check(ConfidentialGuestSupport *cgs, Error **errp)
35375d7150cSCédric Le Goater {
35475d7150cSCédric Le Goater     return s390_pv_check_cpus(errp);
35575d7150cSCédric Le Goater }
35675d7150cSCédric Le Goater 
s390_pv_kvm_init(ConfidentialGuestSupport * cgs,Error ** errp)357a14a2b01SXiaoyao Li static int s390_pv_kvm_init(ConfidentialGuestSupport *cgs, Error **errp)
358651615d9SDavid Gibson {
359651615d9SDavid Gibson     if (!object_dynamic_cast(OBJECT(cgs), TYPE_S390_PV_GUEST)) {
360651615d9SDavid Gibson         return 0;
361651615d9SDavid Gibson     }
362651615d9SDavid Gibson 
363a14a2b01SXiaoyao Li     if (!kvm_enabled()) {
364a14a2b01SXiaoyao Li         error_setg(errp, "Protected Virtualization requires KVM");
365a14a2b01SXiaoyao Li         return -1;
366a14a2b01SXiaoyao Li     }
367a14a2b01SXiaoyao Li 
368651615d9SDavid Gibson     if (!s390_has_feat(S390_FEAT_UNPACK)) {
369651615d9SDavid Gibson         error_setg(errp,
370651615d9SDavid Gibson                    "CPU model does not support Protected Virtualization");
371651615d9SDavid Gibson         return -1;
372651615d9SDavid Gibson     }
373651615d9SDavid Gibson 
37475d7150cSCédric Le Goater     if (!s390_pv_guest_check(cgs, errp)) {
37575d7150cSCédric Le Goater         return -1;
37675d7150cSCédric Le Goater     }
37775d7150cSCédric Le Goater 
378651615d9SDavid Gibson     cgs->ready = true;
379651615d9SDavid Gibson 
380651615d9SDavid Gibson     return 0;
381651615d9SDavid Gibson }
382651615d9SDavid Gibson 
383651615d9SDavid Gibson OBJECT_DEFINE_TYPE_WITH_INTERFACES(S390PVGuest,
384651615d9SDavid Gibson                                    s390_pv_guest,
385651615d9SDavid Gibson                                    S390_PV_GUEST,
386651615d9SDavid Gibson                                    CONFIDENTIAL_GUEST_SUPPORT,
387651615d9SDavid Gibson                                    { TYPE_USER_CREATABLE },
388651615d9SDavid Gibson                                    { NULL })
389651615d9SDavid Gibson 
s390_pv_guest_class_init(ObjectClass * oc,const void * data)39012d1a768SPhilippe Mathieu-Daudé static void s390_pv_guest_class_init(ObjectClass *oc, const void *data)
391651615d9SDavid Gibson {
392a14a2b01SXiaoyao Li     ConfidentialGuestSupportClass *klass = CONFIDENTIAL_GUEST_SUPPORT_CLASS(oc);
393a14a2b01SXiaoyao Li 
394a14a2b01SXiaoyao Li     klass->kvm_init = s390_pv_kvm_init;
395651615d9SDavid Gibson }
396651615d9SDavid Gibson 
s390_pv_guest_init(Object * obj)397651615d9SDavid Gibson static void s390_pv_guest_init(Object *obj)
398651615d9SDavid Gibson {
399651615d9SDavid Gibson }
400651615d9SDavid Gibson 
s390_pv_guest_finalize(Object * obj)401651615d9SDavid Gibson static void s390_pv_guest_finalize(Object *obj)
402651615d9SDavid Gibson {
403651615d9SDavid Gibson }
404