]> git.proxmox.com Git - qemu.git/blame - target-s390x/kvm.c
Restore terminal monitor attributes - addition
[qemu.git] / target-s390x / kvm.c
CommitLineData
0e60a699
AG
1/*
2 * QEMU S390x KVM implementation
3 *
4 * Copyright (c) 2009 Alexander Graf <agraf@suse.de>
5 *
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2 of the License, or (at your option) any later version.
10 *
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
15 *
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, see <http://www.gnu.org/licenses/>.
18 */
19
20#include <sys/types.h>
21#include <sys/ioctl.h>
22#include <sys/mman.h>
23
24#include <linux/kvm.h>
25#include <asm/ptrace.h>
26
27#include "qemu-common.h"
28#include "qemu-timer.h"
29#include "sysemu.h"
30#include "kvm.h"
31#include "cpu.h"
32#include "device_tree.h"
33
34/* #define DEBUG_KVM */
35
36#ifdef DEBUG_KVM
37#define dprintf(fmt, ...) \
38 do { fprintf(stderr, fmt, ## __VA_ARGS__); } while (0)
39#else
40#define dprintf(fmt, ...) \
41 do { } while (0)
42#endif
43
44#define IPA0_DIAG 0x8300
45#define IPA0_SIGP 0xae00
46#define IPA0_PRIV 0xb200
47
48#define PRIV_SCLP_CALL 0x20
49#define DIAG_KVM_HYPERCALL 0x500
50#define DIAG_KVM_BREAKPOINT 0x501
51
52#define SCP_LENGTH 0x00
53#define SCP_FUNCTION_CODE 0x02
54#define SCP_CONTROL_MASK 0x03
55#define SCP_RESPONSE_CODE 0x06
56#define SCP_MEM_CODE 0x08
57#define SCP_INCREMENT 0x0a
58
59#define ICPT_INSTRUCTION 0x04
60#define ICPT_WAITPSW 0x1c
61#define ICPT_SOFT_INTERCEPT 0x24
62#define ICPT_CPU_STOP 0x28
63#define ICPT_IO 0x40
64
65#define SIGP_RESTART 0x06
66#define SIGP_INITIAL_CPU_RESET 0x0b
67#define SIGP_STORE_STATUS_ADDR 0x0e
68#define SIGP_SET_ARCH 0x12
69
70#define SCLP_CMDW_READ_SCP_INFO 0x00020001
71#define SCLP_CMDW_READ_SCP_INFO_FORCED 0x00120001
72
73int kvm_arch_init(KVMState *s, int smp_cpus)
74{
75 return 0;
76}
77
78int kvm_arch_init_vcpu(CPUState *env)
79{
80 int ret = 0;
81
82 if (kvm_vcpu_ioctl(env, KVM_S390_INITIAL_RESET, NULL) < 0) {
83 perror("cannot init reset vcpu");
84 }
85
86 return ret;
87}
88
89void kvm_arch_reset_vcpu(CPUState *env)
90{
91 /* FIXME: add code to reset vcpu. */
92}
93
ea375f9a 94int kvm_arch_put_registers(CPUState *env, int level)
0e60a699
AG
95{
96 struct kvm_regs regs;
97 int ret;
98 int i;
99
100 ret = kvm_vcpu_ioctl(env, KVM_GET_REGS, &regs);
101 if (ret < 0) {
102 return ret;
103 }
104
105 for (i = 0; i < 16; i++) {
106 regs.gprs[i] = env->regs[i];
107 }
108
109 ret = kvm_vcpu_ioctl(env, KVM_SET_REGS, &regs);
110 if (ret < 0) {
111 return ret;
112 }
113
114 env->kvm_run->psw_addr = env->psw.addr;
115 env->kvm_run->psw_mask = env->psw.mask;
116
117 return ret;
118}
119
120int kvm_arch_get_registers(CPUState *env)
121{
122 uint32_t ret;
123 struct kvm_regs regs;
124 int i;
125
126 ret = kvm_vcpu_ioctl(env, KVM_GET_REGS, &regs);
127 if (ret < 0) {
128 return ret;
129 }
130
131 for (i = 0; i < 16; i++) {
132 env->regs[i] = regs.gprs[i];
133 }
134
135 env->psw.addr = env->kvm_run->psw_addr;
136 env->psw.mask = env->kvm_run->psw_mask;
137
138 return 0;
139}
140
141int kvm_arch_insert_sw_breakpoint(CPUState *env, struct kvm_sw_breakpoint *bp)
142{
143 static const uint8_t diag_501[] = {0x83, 0x24, 0x05, 0x01};
144
145 if (cpu_memory_rw_debug(env, bp->pc, (uint8_t *)&bp->saved_insn, 4, 0) ||
146 cpu_memory_rw_debug(env, bp->pc, (uint8_t *)diag_501, 4, 1)) {
147 return -EINVAL;
148 }
149 return 0;
150}
151
152int kvm_arch_remove_sw_breakpoint(CPUState *env, struct kvm_sw_breakpoint *bp)
153{
154 uint8_t t[4];
155 static const uint8_t diag_501[] = {0x83, 0x24, 0x05, 0x01};
156
157 if (cpu_memory_rw_debug(env, bp->pc, t, 4, 0)) {
158 return -EINVAL;
159 } else if (memcmp(t, diag_501, 4)) {
160 return -EINVAL;
161 } else if (cpu_memory_rw_debug(env, bp->pc, (uint8_t *)&bp->saved_insn, 1, 1)) {
162 return -EINVAL;
163 }
164
165 return 0;
166}
167
168int kvm_arch_pre_run(CPUState *env, struct kvm_run *run)
169{
170 return 0;
171}
172
173int kvm_arch_post_run(CPUState *env, struct kvm_run *run)
174{
175 return 0;
176}
177
178static void kvm_s390_interrupt_internal(CPUState *env, int type, uint32_t parm,
179 uint64_t parm64, int vm)
180{
181 struct kvm_s390_interrupt kvmint;
182 int r;
183
184 if (!env->kvm_state) {
185 return;
186 }
187
188 env->halted = 0;
ee0dc6d3 189 env->exception_index = -1;
0e60a699
AG
190
191 kvmint.type = type;
192 kvmint.parm = parm;
193 kvmint.parm64 = parm64;
194
195 if (vm) {
196 r = kvm_vm_ioctl(env->kvm_state, KVM_S390_INTERRUPT, &kvmint);
197 } else {
198 r = kvm_vcpu_ioctl(env, KVM_S390_INTERRUPT, &kvmint);
199 }
200
201 if (r < 0) {
202 fprintf(stderr, "KVM failed to inject interrupt\n");
203 exit(1);
204 }
205}
206
207void kvm_s390_virtio_irq(CPUState *env, int config_change, uint64_t token)
208{
209 kvm_s390_interrupt_internal(env, KVM_S390_INT_VIRTIO, config_change,
210 token, 1);
211}
212
213static void kvm_s390_interrupt(CPUState *env, int type, uint32_t code)
214{
215 kvm_s390_interrupt_internal(env, type, code, 0, 0);
216}
217
218static void enter_pgmcheck(CPUState *env, uint16_t code)
219{
220 kvm_s390_interrupt(env, KVM_S390_PROGRAM_INT, code);
221}
222
223static void setcc(CPUState *env, uint64_t cc)
224{
225 env->kvm_run->psw_mask &= ~(3ul << 44);
226 env->kvm_run->psw_mask |= (cc & 3) << 44;
227
228 env->psw.mask &= ~(3ul << 44);
229 env->psw.mask |= (cc & 3) << 44;
230}
231
232static int sclp_service_call(CPUState *env, struct kvm_run *run, uint16_t ipbh0)
233{
234 uint32_t sccb;
235 uint64_t code;
236 int r = 0;
237
238 cpu_synchronize_state(env);
239 sccb = env->regs[ipbh0 & 0xf];
240 code = env->regs[(ipbh0 & 0xf0) >> 4];
241
242 dprintf("sclp(0x%x, 0x%lx)\n", sccb, code);
243
244 if (sccb & ~0x7ffffff8ul) {
245 fprintf(stderr, "KVM: invalid sccb address 0x%x\n", sccb);
246 r = -1;
247 goto out;
248 }
249
250 switch(code) {
251 case SCLP_CMDW_READ_SCP_INFO:
252 case SCLP_CMDW_READ_SCP_INFO_FORCED:
253 stw_phys(sccb + SCP_MEM_CODE, ram_size >> 20);
254 stb_phys(sccb + SCP_INCREMENT, 1);
255 stw_phys(sccb + SCP_RESPONSE_CODE, 0x10);
256 setcc(env, 0);
257
258 kvm_s390_interrupt_internal(env, KVM_S390_INT_SERVICE,
259 sccb & ~3, 0, 1);
260 break;
261 default:
262 dprintf("KVM: invalid sclp call 0x%x / 0x%lx\n", sccb, code);
263 r = -1;
264 break;
265 }
266
267out:
268 if (r < 0) {
269 setcc(env, 3);
270 }
271 return 0;
272}
273
274static int handle_priv(CPUState *env, struct kvm_run *run, uint8_t ipa1)
275{
276 int r = 0;
277 uint16_t ipbh0 = (run->s390_sieic.ipb & 0xffff0000) >> 16;
278
279 dprintf("KVM: PRIV: %d\n", ipa1);
280 switch (ipa1) {
281 case PRIV_SCLP_CALL:
282 r = sclp_service_call(env, run, ipbh0);
283 break;
284 default:
285 dprintf("KVM: unknown PRIV: 0x%x\n", ipa1);
286 r = -1;
287 break;
288 }
289
290 return r;
291}
292
293static int handle_hypercall(CPUState *env, struct kvm_run *run)
294{
295 int r;
296
297 cpu_synchronize_state(env);
298 r = s390_virtio_hypercall(env);
0e60a699
AG
299
300 return r;
301}
302
303static int handle_diag(CPUState *env, struct kvm_run *run, int ipb_code)
304{
305 int r = 0;
306
307 switch (ipb_code) {
308 case DIAG_KVM_HYPERCALL:
309 r = handle_hypercall(env, run);
310 break;
311 case DIAG_KVM_BREAKPOINT:
312 sleep(10);
313 break;
314 default:
315 dprintf("KVM: unknown DIAG: 0x%x\n", ipb_code);
316 r = -1;
317 break;
318 }
319
320 return r;
321}
322
323static int s390_cpu_restart(CPUState *env)
324{
325 kvm_s390_interrupt(env, KVM_S390_RESTART, 0);
326 env->halted = 0;
ee0dc6d3 327 env->exception_index = -1;
0e60a699
AG
328 qemu_cpu_kick(env);
329 dprintf("DONE: SIGP cpu restart: %p\n", env);
330 return 0;
331}
332
333static int s390_store_status(CPUState *env, uint32_t parameter)
334{
335 /* XXX */
336 fprintf(stderr, "XXX SIGP store status\n");
337 return -1;
338}
339
340static int s390_cpu_initial_reset(CPUState *env)
341{
342 /* XXX */
343 fprintf(stderr, "XXX SIGP init\n");
344 return -1;
345}
346
347static int handle_sigp(CPUState *env, struct kvm_run *run, uint8_t ipa1)
348{
349 uint8_t order_code;
350 uint32_t parameter;
351 uint16_t cpu_addr;
352 uint8_t t;
353 int r = -1;
354 CPUState *target_env;
355
356 cpu_synchronize_state(env);
357
358 /* get order code */
359 order_code = run->s390_sieic.ipb >> 28;
360 if (order_code > 0) {
361 order_code = env->regs[order_code];
362 }
363 order_code += (run->s390_sieic.ipb & 0x0fff0000) >> 16;
364
365 /* get parameters */
366 t = (ipa1 & 0xf0) >> 4;
367 if (!(t % 2)) {
368 t++;
369 }
370
371 parameter = env->regs[t] & 0x7ffffe00;
372 cpu_addr = env->regs[ipa1 & 0x0f];
373
374 target_env = s390_cpu_addr2state(cpu_addr);
375 if (!target_env) {
376 goto out;
377 }
378
379 switch (order_code) {
380 case SIGP_RESTART:
381 r = s390_cpu_restart(target_env);
382 break;
383 case SIGP_STORE_STATUS_ADDR:
384 r = s390_store_status(target_env, parameter);
385 break;
386 case SIGP_SET_ARCH:
387 /* make the caller panic */
388 return -1;
389 case SIGP_INITIAL_CPU_RESET:
390 r = s390_cpu_initial_reset(target_env);
391 break;
392 default:
393 fprintf(stderr, "KVM: unknown SIGP: 0x%x\n", ipa1);
394 break;
395 }
396
397out:
398 setcc(env, r ? 3 : 0);
399 return 0;
400}
401
402static int handle_instruction(CPUState *env, struct kvm_run *run)
403{
404 unsigned int ipa0 = (run->s390_sieic.ipa & 0xff00);
405 uint8_t ipa1 = run->s390_sieic.ipa & 0x00ff;
406 int ipb_code = (run->s390_sieic.ipb & 0x0fff0000) >> 16;
d7963c43 407 int r = -1;
0e60a699
AG
408
409 dprintf("handle_instruction 0x%x 0x%x\n", run->s390_sieic.ipa, run->s390_sieic.ipb);
410 switch (ipa0) {
411 case IPA0_PRIV:
412 r = handle_priv(env, run, ipa1);
413 break;
414 case IPA0_DIAG:
415 r = handle_diag(env, run, ipb_code);
416 break;
417 case IPA0_SIGP:
418 r = handle_sigp(env, run, ipa1);
419 break;
420 }
421
422 if (r < 0) {
423 enter_pgmcheck(env, 0x0001);
424 }
425 return r;
426}
427
428static int handle_intercept(CPUState *env)
429{
430 struct kvm_run *run = env->kvm_run;
431 int icpt_code = run->s390_sieic.icptcode;
432 int r = 0;
433
434 dprintf("intercept: 0x%x (at 0x%lx)\n", icpt_code, env->kvm_run->psw_addr);
435 switch (icpt_code) {
436 case ICPT_INSTRUCTION:
437 r = handle_instruction(env, run);
438 break;
439 case ICPT_WAITPSW:
440 /* XXX What to do on system shutdown? */
441 env->halted = 1;
442 env->exception_index = EXCP_HLT;
443 break;
444 case ICPT_SOFT_INTERCEPT:
445 fprintf(stderr, "KVM unimplemented icpt SOFT\n");
446 exit(1);
447 break;
448 case ICPT_CPU_STOP:
449 qemu_system_shutdown_request();
450 break;
451 case ICPT_IO:
452 fprintf(stderr, "KVM unimplemented icpt IO\n");
453 exit(1);
454 break;
455 default:
456 fprintf(stderr, "Unknown intercept code: %d\n", icpt_code);
457 exit(1);
458 break;
459 }
460
461 return r;
462}
463
464int kvm_arch_handle_exit(CPUState *env, struct kvm_run *run)
465{
466 int ret = 0;
467
468 switch (run->exit_reason) {
469 case KVM_EXIT_S390_SIEIC:
470 ret = handle_intercept(env);
471 break;
472 case KVM_EXIT_S390_RESET:
473 fprintf(stderr, "RESET not implemented\n");
474 exit(1);
475 break;
476 default:
477 fprintf(stderr, "Unknown KVM exit: %d\n", run->exit_reason);
478 break;
479 }
480
481 return ret;
482}