Commit | Line | Data |
---|---|---|
8f2abe6a | 1 | /* |
a53c8fab | 2 | * in-kernel handling for sie intercepts |
8f2abe6a | 3 | * |
a53c8fab | 4 | * Copyright IBM Corp. 2008, 2009 |
8f2abe6a CB |
5 | * |
6 | * This program is free software; you can redistribute it and/or modify | |
7 | * it under the terms of the GNU General Public License (version 2 only) | |
8 | * as published by the Free Software Foundation. | |
9 | * | |
10 | * Author(s): Carsten Otte <cotte@de.ibm.com> | |
11 | * Christian Borntraeger <borntraeger@de.ibm.com> | |
12 | */ | |
13 | ||
14 | #include <linux/kvm_host.h> | |
15 | #include <linux/errno.h> | |
16 | #include <linux/pagemap.h> | |
17 | ||
18 | #include <asm/kvm_host.h> | |
a86dcc24 | 19 | #include <asm/asm-offsets.h> |
8f2abe6a CB |
20 | |
21 | #include "kvm-s390.h" | |
ba5c1e9b | 22 | #include "gaccess.h" |
5786fffa | 23 | #include "trace.h" |
ade38c31 | 24 | #include "trace-s390.h" |
ba5c1e9b | 25 | |
f379aae5 | 26 | |
77975357 | 27 | static const intercept_handler_t instruction_handlers[256] = { |
8c3f61e2 | 28 | [0x01] = kvm_s390_handle_01, |
48a3e950 | 29 | [0x82] = kvm_s390_handle_lpsw, |
e28acfea | 30 | [0x83] = kvm_s390_handle_diag, |
5288fbf0 | 31 | [0xae] = kvm_s390_handle_sigp, |
70455a36 | 32 | [0xb2] = kvm_s390_handle_b2, |
aba07508 | 33 | [0xb6] = kvm_s390_handle_stctl, |
953ed88d | 34 | [0xb7] = kvm_s390_handle_lctl, |
48a3e950 | 35 | [0xb9] = kvm_s390_handle_b9, |
bb25b9ba | 36 | [0xe5] = kvm_s390_handle_e5, |
953ed88d | 37 | [0xeb] = kvm_s390_handle_eb, |
ba5c1e9b | 38 | }; |
8f2abe6a CB |
39 | |
40 | static int handle_noop(struct kvm_vcpu *vcpu) | |
41 | { | |
42 | switch (vcpu->arch.sie_block->icptcode) { | |
0eaeafa1 CB |
43 | case 0x0: |
44 | vcpu->stat.exit_null++; | |
45 | break; | |
8f2abe6a CB |
46 | case 0x10: |
47 | vcpu->stat.exit_external_request++; | |
48 | break; | |
49 | case 0x14: | |
50 | vcpu->stat.exit_external_interrupt++; | |
51 | break; | |
52 | default: | |
53 | break; /* nothing */ | |
54 | } | |
55 | return 0; | |
56 | } | |
57 | ||
58 | static int handle_stop(struct kvm_vcpu *vcpu) | |
59 | { | |
9ace903d | 60 | int rc = 0; |
5288fbf0 | 61 | |
8f2abe6a | 62 | vcpu->stat.exit_stop_request++; |
5288fbf0 | 63 | spin_lock_bh(&vcpu->arch.local_int.lock); |
5288fbf0 | 64 | |
ade38c31 CH |
65 | trace_kvm_s390_stop_request(vcpu->arch.local_int.action_bits); |
66 | ||
5288fbf0 | 67 | if (vcpu->arch.local_int.action_bits & ACTION_STOP_ON_STOP) { |
9e6dabef CH |
68 | atomic_set_mask(CPUSTAT_STOPPED, |
69 | &vcpu->arch.sie_block->cpuflags); | |
5288fbf0 CB |
70 | vcpu->arch.local_int.action_bits &= ~ACTION_STOP_ON_STOP; |
71 | VCPU_EVENT(vcpu, 3, "%s", "cpu stopped"); | |
b8e660b8 | 72 | rc = -EOPNOTSUPP; |
9ace903d CE |
73 | } |
74 | ||
9e0d5473 JF |
75 | if (vcpu->arch.local_int.action_bits & ACTION_STORE_ON_STOP) { |
76 | vcpu->arch.local_int.action_bits &= ~ACTION_STORE_ON_STOP; | |
77 | /* store status must be called unlocked. Since local_int.lock | |
78 | * only protects local_int.* and not guest memory we can give | |
79 | * up the lock here */ | |
80 | spin_unlock_bh(&vcpu->arch.local_int.lock); | |
81 | rc = kvm_s390_vcpu_store_status(vcpu, | |
82 | KVM_S390_STORE_STATUS_NOADDR); | |
83 | if (rc >= 0) | |
84 | rc = -EOPNOTSUPP; | |
85 | } else | |
86 | spin_unlock_bh(&vcpu->arch.local_int.lock); | |
5288fbf0 | 87 | return rc; |
8f2abe6a CB |
88 | } |
89 | ||
90 | static int handle_validity(struct kvm_vcpu *vcpu) | |
91 | { | |
92 | int viwhy = vcpu->arch.sie_block->ipb >> 16; | |
3edbcff9 | 93 | |
8f2abe6a | 94 | vcpu->stat.exit_validity++; |
5786fffa | 95 | trace_kvm_s390_intercept_validity(vcpu, viwhy); |
2c70fe44 CB |
96 | WARN_ONCE(true, "kvm: unhandled validity intercept 0x%x\n", viwhy); |
97 | return -EOPNOTSUPP; | |
8f2abe6a CB |
98 | } |
99 | ||
ba5c1e9b CO |
100 | static int handle_instruction(struct kvm_vcpu *vcpu) |
101 | { | |
102 | intercept_handler_t handler; | |
103 | ||
104 | vcpu->stat.exit_instruction++; | |
5786fffa CH |
105 | trace_kvm_s390_intercept_instruction(vcpu, |
106 | vcpu->arch.sie_block->ipa, | |
107 | vcpu->arch.sie_block->ipb); | |
ba5c1e9b CO |
108 | handler = instruction_handlers[vcpu->arch.sie_block->ipa >> 8]; |
109 | if (handler) | |
110 | return handler(vcpu); | |
b8e660b8 | 111 | return -EOPNOTSUPP; |
ba5c1e9b CO |
112 | } |
113 | ||
439716a5 DH |
114 | static void __extract_prog_irq(struct kvm_vcpu *vcpu, |
115 | struct kvm_s390_pgm_info *pgm_info) | |
116 | { | |
117 | memset(pgm_info, 0, sizeof(struct kvm_s390_pgm_info)); | |
118 | pgm_info->code = vcpu->arch.sie_block->iprcc; | |
119 | ||
120 | switch (vcpu->arch.sie_block->iprcc & ~PGM_PER) { | |
121 | case PGM_AFX_TRANSLATION: | |
122 | case PGM_ASX_TRANSLATION: | |
123 | case PGM_EX_TRANSLATION: | |
124 | case PGM_LFX_TRANSLATION: | |
125 | case PGM_LSTE_SEQUENCE: | |
126 | case PGM_LSX_TRANSLATION: | |
127 | case PGM_LX_TRANSLATION: | |
128 | case PGM_PRIMARY_AUTHORITY: | |
129 | case PGM_SECONDARY_AUTHORITY: | |
130 | case PGM_SPACE_SWITCH: | |
131 | pgm_info->trans_exc_code = vcpu->arch.sie_block->tecmc; | |
132 | break; | |
133 | case PGM_ALEN_TRANSLATION: | |
134 | case PGM_ALE_SEQUENCE: | |
135 | case PGM_ASTE_INSTANCE: | |
136 | case PGM_ASTE_SEQUENCE: | |
137 | case PGM_ASTE_VALIDITY: | |
138 | case PGM_EXTENDED_AUTHORITY: | |
139 | pgm_info->exc_access_id = vcpu->arch.sie_block->eai; | |
140 | break; | |
141 | case PGM_ASCE_TYPE: | |
142 | case PGM_PAGE_TRANSLATION: | |
143 | case PGM_REGION_FIRST_TRANS: | |
144 | case PGM_REGION_SECOND_TRANS: | |
145 | case PGM_REGION_THIRD_TRANS: | |
146 | case PGM_SEGMENT_TRANSLATION: | |
147 | pgm_info->trans_exc_code = vcpu->arch.sie_block->tecmc; | |
148 | pgm_info->exc_access_id = vcpu->arch.sie_block->eai; | |
149 | pgm_info->op_access_id = vcpu->arch.sie_block->oai; | |
150 | break; | |
151 | case PGM_MONITOR: | |
152 | pgm_info->mon_class_nr = vcpu->arch.sie_block->mcn; | |
153 | pgm_info->mon_code = vcpu->arch.sie_block->tecmc; | |
154 | break; | |
155 | case PGM_DATA: | |
156 | pgm_info->data_exc_code = vcpu->arch.sie_block->dxc; | |
157 | break; | |
158 | case PGM_PROTECTION: | |
159 | pgm_info->trans_exc_code = vcpu->arch.sie_block->tecmc; | |
160 | pgm_info->exc_access_id = vcpu->arch.sie_block->eai; | |
161 | break; | |
162 | default: | |
163 | break; | |
164 | } | |
165 | ||
166 | if (vcpu->arch.sie_block->iprcc & PGM_PER) { | |
167 | pgm_info->per_code = vcpu->arch.sie_block->perc; | |
168 | pgm_info->per_atmid = vcpu->arch.sie_block->peratmid; | |
169 | pgm_info->per_address = vcpu->arch.sie_block->peraddr; | |
170 | pgm_info->per_access_id = vcpu->arch.sie_block->peraid; | |
171 | } | |
172 | } | |
173 | ||
27291e21 DH |
174 | #define per_event(vcpu) (vcpu->arch.sie_block->iprcc & PGM_PER) |
175 | ||
ba5c1e9b CO |
176 | static int handle_prog(struct kvm_vcpu *vcpu) |
177 | { | |
439716a5 | 178 | struct kvm_s390_pgm_info pgm_info; |
0040e7d2 HC |
179 | struct kvm_s390_itdb *itdb; |
180 | int rc; | |
181 | ||
ba5c1e9b | 182 | vcpu->stat.exit_program_interruption++; |
7feb6bb8 | 183 | |
27291e21 DH |
184 | if (guestdbg_enabled(vcpu) && per_event(vcpu)) { |
185 | kvm_s390_handle_per_event(vcpu); | |
186 | /* the interrupt might have been filtered out completely */ | |
187 | if (vcpu->arch.sie_block->iprcc == 0) | |
188 | return 0; | |
189 | } | |
190 | ||
7feb6bb8 | 191 | /* Restore ITDB to Program-Interruption TDB in guest memory */ |
0040e7d2 HC |
192 | if (!IS_TE_ENABLED(vcpu) || !IS_ITDB_VALID(vcpu)) |
193 | goto skip_itdb; | |
194 | if (current->thread.per_flags & PER_FLAG_NO_TE) | |
195 | goto skip_itdb; | |
196 | itdb = (struct kvm_s390_itdb *)vcpu->arch.sie_block->itdba; | |
a86dcc24 | 197 | rc = write_guest_lc(vcpu, __LC_PGM_TDB, itdb, sizeof(*itdb)); |
0040e7d2 HC |
198 | if (rc) |
199 | return rc; | |
200 | memset(itdb, 0, sizeof(*itdb)); | |
201 | skip_itdb: | |
5786fffa | 202 | trace_kvm_s390_intercept_prog(vcpu, vcpu->arch.sie_block->iprcc); |
439716a5 DH |
203 | __extract_prog_irq(vcpu, &pgm_info); |
204 | ||
205 | return kvm_s390_inject_prog_irq(vcpu, &pgm_info); | |
ba5c1e9b CO |
206 | } |
207 | ||
208 | static int handle_instruction_and_prog(struct kvm_vcpu *vcpu) | |
209 | { | |
210 | int rc, rc2; | |
211 | ||
212 | vcpu->stat.exit_instr_and_program++; | |
213 | rc = handle_instruction(vcpu); | |
214 | rc2 = handle_prog(vcpu); | |
215 | ||
b8e660b8 | 216 | if (rc == -EOPNOTSUPP) |
ba5c1e9b CO |
217 | vcpu->arch.sie_block->icptcode = 0x04; |
218 | if (rc) | |
219 | return rc; | |
220 | return rc2; | |
221 | } | |
222 | ||
062d5e9b | 223 | static const intercept_handler_t intercept_funcs[] = { |
8f2abe6a | 224 | [0x00 >> 2] = handle_noop, |
ba5c1e9b CO |
225 | [0x04 >> 2] = handle_instruction, |
226 | [0x08 >> 2] = handle_prog, | |
227 | [0x0C >> 2] = handle_instruction_and_prog, | |
8f2abe6a CB |
228 | [0x10 >> 2] = handle_noop, |
229 | [0x14 >> 2] = handle_noop, | |
fa6b7fe9 | 230 | [0x18 >> 2] = handle_noop, |
ba5c1e9b | 231 | [0x1C >> 2] = kvm_s390_handle_wait, |
8f2abe6a CB |
232 | [0x20 >> 2] = handle_validity, |
233 | [0x28 >> 2] = handle_stop, | |
234 | }; | |
235 | ||
236 | int kvm_handle_sie_intercept(struct kvm_vcpu *vcpu) | |
237 | { | |
238 | intercept_handler_t func; | |
239 | u8 code = vcpu->arch.sie_block->icptcode; | |
240 | ||
062d5e9b | 241 | if (code & 3 || (code >> 2) >= ARRAY_SIZE(intercept_funcs)) |
b8e660b8 | 242 | return -EOPNOTSUPP; |
8f2abe6a CB |
243 | func = intercept_funcs[code >> 2]; |
244 | if (func) | |
245 | return func(vcpu); | |
b8e660b8 | 246 | return -EOPNOTSUPP; |
8f2abe6a | 247 | } |