Commit | Line | Data |
---|---|---|
8f2abe6a | 1 | /* |
a53c8fab | 2 | * in-kernel handling for sie intercepts |
8f2abe6a | 3 | * |
a53c8fab | 4 | * Copyright IBM Corp. 2008, 2009 |
8f2abe6a CB |
5 | * |
6 | * This program is free software; you can redistribute it and/or modify | |
7 | * it under the terms of the GNU General Public License (version 2 only) | |
8 | * as published by the Free Software Foundation. | |
9 | * | |
10 | * Author(s): Carsten Otte <cotte@de.ibm.com> | |
11 | * Christian Borntraeger <borntraeger@de.ibm.com> | |
12 | */ | |
13 | ||
14 | #include <linux/kvm_host.h> | |
15 | #include <linux/errno.h> | |
16 | #include <linux/pagemap.h> | |
17 | ||
18 | #include <asm/kvm_host.h> | |
19 | ||
20 | #include "kvm-s390.h" | |
ba5c1e9b | 21 | #include "gaccess.h" |
5786fffa | 22 | #include "trace.h" |
ade38c31 | 23 | #include "trace-s390.h" |
ba5c1e9b | 24 | |
f5e10b09 | 25 | static int handle_lctlg(struct kvm_vcpu *vcpu) |
ba5c1e9b CO |
26 | { |
27 | int reg1 = (vcpu->arch.sie_block->ipa & 0x00f0) >> 4; | |
28 | int reg3 = vcpu->arch.sie_block->ipa & 0x000f; | |
ba5c1e9b CO |
29 | u64 useraddr; |
30 | int reg, rc; | |
31 | ||
f5e10b09 | 32 | vcpu->stat.instruction_lctlg++; |
ba5c1e9b | 33 | if ((vcpu->arch.sie_block->ipb & 0xff) != 0x2f) |
b8e660b8 | 34 | return -EOPNOTSUPP; |
ba5c1e9b | 35 | |
b1c571a5 | 36 | useraddr = kvm_s390_get_base_disp_rsy(vcpu); |
ba5c1e9b | 37 | |
5a00a5e7 CB |
38 | if (useraddr & 7) |
39 | return kvm_s390_inject_program_int(vcpu, PGM_SPECIFICATION); | |
40 | ||
ba5c1e9b CO |
41 | reg = reg1; |
42 | ||
b1c571a5 CH |
43 | VCPU_EVENT(vcpu, 5, "lctlg r1:%x, r3:%x, addr:%llx", reg1, reg3, |
44 | useraddr); | |
5786fffa | 45 | trace_kvm_s390_handle_lctl(vcpu, 1, reg1, reg3, useraddr); |
ba5c1e9b CO |
46 | |
47 | do { | |
48 | rc = get_guest_u64(vcpu, useraddr, | |
49 | &vcpu->arch.sie_block->gcr[reg]); | |
50 | if (rc == -EFAULT) { | |
51 | kvm_s390_inject_program_int(vcpu, PGM_ADDRESSING); | |
52 | break; | |
53 | } | |
54 | useraddr += 8; | |
55 | if (reg == reg3) | |
56 | break; | |
57 | reg = (reg + 1) % 16; | |
58 | } while (1); | |
59 | return 0; | |
60 | } | |
61 | ||
62 | static int handle_lctl(struct kvm_vcpu *vcpu) | |
63 | { | |
64 | int reg1 = (vcpu->arch.sie_block->ipa & 0x00f0) >> 4; | |
65 | int reg3 = vcpu->arch.sie_block->ipa & 0x000f; | |
ba5c1e9b CO |
66 | u64 useraddr; |
67 | u32 val = 0; | |
68 | int reg, rc; | |
69 | ||
70 | vcpu->stat.instruction_lctl++; | |
71 | ||
b1c571a5 | 72 | useraddr = kvm_s390_get_base_disp_rs(vcpu); |
ba5c1e9b | 73 | |
5a00a5e7 CB |
74 | if (useraddr & 3) |
75 | return kvm_s390_inject_program_int(vcpu, PGM_SPECIFICATION); | |
76 | ||
b1c571a5 CH |
77 | VCPU_EVENT(vcpu, 5, "lctl r1:%x, r3:%x, addr:%llx", reg1, reg3, |
78 | useraddr); | |
5786fffa | 79 | trace_kvm_s390_handle_lctl(vcpu, 0, reg1, reg3, useraddr); |
ba5c1e9b CO |
80 | |
81 | reg = reg1; | |
82 | do { | |
83 | rc = get_guest_u32(vcpu, useraddr, &val); | |
84 | if (rc == -EFAULT) { | |
85 | kvm_s390_inject_program_int(vcpu, PGM_ADDRESSING); | |
86 | break; | |
87 | } | |
88 | vcpu->arch.sie_block->gcr[reg] &= 0xffffffff00000000ul; | |
89 | vcpu->arch.sie_block->gcr[reg] |= val; | |
90 | useraddr += 4; | |
91 | if (reg == reg3) | |
92 | break; | |
93 | reg = (reg + 1) % 16; | |
94 | } while (1); | |
95 | return 0; | |
96 | } | |
97 | ||
77975357 | 98 | static const intercept_handler_t instruction_handlers[256] = { |
8c3f61e2 | 99 | [0x01] = kvm_s390_handle_01, |
e28acfea | 100 | [0x83] = kvm_s390_handle_diag, |
5288fbf0 | 101 | [0xae] = kvm_s390_handle_sigp, |
70455a36 | 102 | [0xb2] = kvm_s390_handle_b2, |
ba5c1e9b | 103 | [0xb7] = handle_lctl, |
bb25b9ba | 104 | [0xe5] = kvm_s390_handle_e5, |
f5e10b09 | 105 | [0xeb] = handle_lctlg, |
ba5c1e9b | 106 | }; |
8f2abe6a CB |
107 | |
108 | static int handle_noop(struct kvm_vcpu *vcpu) | |
109 | { | |
110 | switch (vcpu->arch.sie_block->icptcode) { | |
0eaeafa1 CB |
111 | case 0x0: |
112 | vcpu->stat.exit_null++; | |
113 | break; | |
8f2abe6a CB |
114 | case 0x10: |
115 | vcpu->stat.exit_external_request++; | |
116 | break; | |
117 | case 0x14: | |
118 | vcpu->stat.exit_external_interrupt++; | |
119 | break; | |
120 | default: | |
121 | break; /* nothing */ | |
122 | } | |
123 | return 0; | |
124 | } | |
125 | ||
126 | static int handle_stop(struct kvm_vcpu *vcpu) | |
127 | { | |
9ace903d | 128 | int rc = 0; |
5288fbf0 | 129 | |
8f2abe6a | 130 | vcpu->stat.exit_stop_request++; |
5288fbf0 | 131 | spin_lock_bh(&vcpu->arch.local_int.lock); |
5288fbf0 | 132 | |
ade38c31 CH |
133 | trace_kvm_s390_stop_request(vcpu->arch.local_int.action_bits); |
134 | ||
9ace903d CE |
135 | if (vcpu->arch.local_int.action_bits & ACTION_RELOADVCPU_ON_STOP) { |
136 | vcpu->arch.local_int.action_bits &= ~ACTION_RELOADVCPU_ON_STOP; | |
137 | rc = SIE_INTERCEPT_RERUNVCPU; | |
138 | vcpu->run->exit_reason = KVM_EXIT_INTR; | |
139 | } | |
140 | ||
5288fbf0 | 141 | if (vcpu->arch.local_int.action_bits & ACTION_STOP_ON_STOP) { |
9e6dabef CH |
142 | atomic_set_mask(CPUSTAT_STOPPED, |
143 | &vcpu->arch.sie_block->cpuflags); | |
5288fbf0 CB |
144 | vcpu->arch.local_int.action_bits &= ~ACTION_STOP_ON_STOP; |
145 | VCPU_EVENT(vcpu, 3, "%s", "cpu stopped"); | |
b8e660b8 | 146 | rc = -EOPNOTSUPP; |
9ace903d CE |
147 | } |
148 | ||
9e0d5473 JF |
149 | if (vcpu->arch.local_int.action_bits & ACTION_STORE_ON_STOP) { |
150 | vcpu->arch.local_int.action_bits &= ~ACTION_STORE_ON_STOP; | |
151 | /* store status must be called unlocked. Since local_int.lock | |
152 | * only protects local_int.* and not guest memory we can give | |
153 | * up the lock here */ | |
154 | spin_unlock_bh(&vcpu->arch.local_int.lock); | |
155 | rc = kvm_s390_vcpu_store_status(vcpu, | |
156 | KVM_S390_STORE_STATUS_NOADDR); | |
157 | if (rc >= 0) | |
158 | rc = -EOPNOTSUPP; | |
159 | } else | |
160 | spin_unlock_bh(&vcpu->arch.local_int.lock); | |
5288fbf0 | 161 | return rc; |
8f2abe6a CB |
162 | } |
163 | ||
164 | static int handle_validity(struct kvm_vcpu *vcpu) | |
165 | { | |
598841ca | 166 | unsigned long vmaddr; |
8f2abe6a | 167 | int viwhy = vcpu->arch.sie_block->ipb >> 16; |
3edbcff9 CO |
168 | int rc; |
169 | ||
8f2abe6a | 170 | vcpu->stat.exit_validity++; |
5786fffa | 171 | trace_kvm_s390_intercept_validity(vcpu, viwhy); |
092670cd CO |
172 | if (viwhy == 0x37) { |
173 | vmaddr = gmap_fault(vcpu->arch.sie_block->prefix, | |
174 | vcpu->arch.gmap); | |
175 | if (IS_ERR_VALUE(vmaddr)) { | |
176 | rc = -EOPNOTSUPP; | |
177 | goto out; | |
178 | } | |
179 | rc = fault_in_pages_writeable((char __user *) vmaddr, | |
180 | PAGE_SIZE); | |
598841ca | 181 | if (rc) { |
3edbcff9 | 182 | /* user will receive sigsegv, exit to user */ |
b8e660b8 | 183 | rc = -EOPNOTSUPP; |
598841ca CO |
184 | goto out; |
185 | } | |
092670cd | 186 | vmaddr = gmap_fault(vcpu->arch.sie_block->prefix + PAGE_SIZE, |
598841ca CO |
187 | vcpu->arch.gmap); |
188 | if (IS_ERR_VALUE(vmaddr)) { | |
189 | rc = -EOPNOTSUPP; | |
190 | goto out; | |
191 | } | |
092670cd CO |
192 | rc = fault_in_pages_writeable((char __user *) vmaddr, |
193 | PAGE_SIZE); | |
194 | if (rc) { | |
195 | /* user will receive sigsegv, exit to user */ | |
598841ca CO |
196 | rc = -EOPNOTSUPP; |
197 | goto out; | |
198 | } | |
3edbcff9 | 199 | } else |
b8e660b8 | 200 | rc = -EOPNOTSUPP; |
3edbcff9 | 201 | |
598841ca | 202 | out: |
3edbcff9 CO |
203 | if (rc) |
204 | VCPU_EVENT(vcpu, 2, "unhandled validity intercept code %d", | |
205 | viwhy); | |
206 | return rc; | |
8f2abe6a CB |
207 | } |
208 | ||
ba5c1e9b CO |
209 | static int handle_instruction(struct kvm_vcpu *vcpu) |
210 | { | |
211 | intercept_handler_t handler; | |
212 | ||
213 | vcpu->stat.exit_instruction++; | |
5786fffa CH |
214 | trace_kvm_s390_intercept_instruction(vcpu, |
215 | vcpu->arch.sie_block->ipa, | |
216 | vcpu->arch.sie_block->ipb); | |
ba5c1e9b CO |
217 | handler = instruction_handlers[vcpu->arch.sie_block->ipa >> 8]; |
218 | if (handler) | |
219 | return handler(vcpu); | |
b8e660b8 | 220 | return -EOPNOTSUPP; |
ba5c1e9b CO |
221 | } |
222 | ||
223 | static int handle_prog(struct kvm_vcpu *vcpu) | |
224 | { | |
225 | vcpu->stat.exit_program_interruption++; | |
5786fffa | 226 | trace_kvm_s390_intercept_prog(vcpu, vcpu->arch.sie_block->iprcc); |
ba5c1e9b CO |
227 | return kvm_s390_inject_program_int(vcpu, vcpu->arch.sie_block->iprcc); |
228 | } | |
229 | ||
230 | static int handle_instruction_and_prog(struct kvm_vcpu *vcpu) | |
231 | { | |
232 | int rc, rc2; | |
233 | ||
234 | vcpu->stat.exit_instr_and_program++; | |
235 | rc = handle_instruction(vcpu); | |
236 | rc2 = handle_prog(vcpu); | |
237 | ||
b8e660b8 | 238 | if (rc == -EOPNOTSUPP) |
ba5c1e9b CO |
239 | vcpu->arch.sie_block->icptcode = 0x04; |
240 | if (rc) | |
241 | return rc; | |
242 | return rc2; | |
243 | } | |
244 | ||
062d5e9b | 245 | static const intercept_handler_t intercept_funcs[] = { |
8f2abe6a | 246 | [0x00 >> 2] = handle_noop, |
ba5c1e9b CO |
247 | [0x04 >> 2] = handle_instruction, |
248 | [0x08 >> 2] = handle_prog, | |
249 | [0x0C >> 2] = handle_instruction_and_prog, | |
8f2abe6a CB |
250 | [0x10 >> 2] = handle_noop, |
251 | [0x14 >> 2] = handle_noop, | |
ba5c1e9b | 252 | [0x1C >> 2] = kvm_s390_handle_wait, |
8f2abe6a CB |
253 | [0x20 >> 2] = handle_validity, |
254 | [0x28 >> 2] = handle_stop, | |
255 | }; | |
256 | ||
257 | int kvm_handle_sie_intercept(struct kvm_vcpu *vcpu) | |
258 | { | |
259 | intercept_handler_t func; | |
260 | u8 code = vcpu->arch.sie_block->icptcode; | |
261 | ||
062d5e9b | 262 | if (code & 3 || (code >> 2) >= ARRAY_SIZE(intercept_funcs)) |
b8e660b8 | 263 | return -EOPNOTSUPP; |
8f2abe6a CB |
264 | func = intercept_funcs[code >> 2]; |
265 | if (func) | |
266 | return func(vcpu); | |
b8e660b8 | 267 | return -EOPNOTSUPP; |
8f2abe6a | 268 | } |