2 * intercept.c - in-kernel handling for sie intercepts
4 * Copyright IBM Corp. 2008
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License (version 2 only)
8 * as published by the Free Software Foundation.
10 * Author(s): Carsten Otte <cotte@de.ibm.com>
11 * Christian Borntraeger <borntraeger@de.ibm.com>
14 #include <linux/kvm_host.h>
15 #include <linux/errno.h>
16 #include <linux/pagemap.h>
18 #include <asm/kvm_host.h>
23 static int handle_lctg(struct kvm_vcpu
*vcpu
)
25 int reg1
= (vcpu
->arch
.sie_block
->ipa
& 0x00f0) >> 4;
26 int reg3
= vcpu
->arch
.sie_block
->ipa
& 0x000f;
27 int base2
= vcpu
->arch
.sie_block
->ipb
>> 28;
28 int disp2
= ((vcpu
->arch
.sie_block
->ipb
& 0x0fff0000) >> 16) +
29 ((vcpu
->arch
.sie_block
->ipb
& 0xff00) << 4);
33 vcpu
->stat
.instruction_lctg
++;
34 if ((vcpu
->arch
.sie_block
->ipb
& 0xff) != 0x2f)
39 useraddr
+= vcpu
->arch
.guest_gprs
[base2
];
43 VCPU_EVENT(vcpu
, 5, "lctg r1:%x, r3:%x,b2:%x,d2:%x", reg1
, reg3
, base2
,
47 rc
= get_guest_u64(vcpu
, useraddr
,
48 &vcpu
->arch
.sie_block
->gcr
[reg
]);
50 kvm_s390_inject_program_int(vcpu
, PGM_ADDRESSING
);
61 static int handle_lctl(struct kvm_vcpu
*vcpu
)
63 int reg1
= (vcpu
->arch
.sie_block
->ipa
& 0x00f0) >> 4;
64 int reg3
= vcpu
->arch
.sie_block
->ipa
& 0x000f;
65 int base2
= vcpu
->arch
.sie_block
->ipb
>> 28;
66 int disp2
= ((vcpu
->arch
.sie_block
->ipb
& 0x0fff0000) >> 16);
71 vcpu
->stat
.instruction_lctl
++;
75 useraddr
+= vcpu
->arch
.guest_gprs
[base2
];
77 VCPU_EVENT(vcpu
, 5, "lctl r1:%x, r3:%x,b2:%x,d2:%x", reg1
, reg3
, base2
,
82 rc
= get_guest_u32(vcpu
, useraddr
, &val
);
84 kvm_s390_inject_program_int(vcpu
, PGM_ADDRESSING
);
87 vcpu
->arch
.sie_block
->gcr
[reg
] &= 0xffffffff00000000ul
;
88 vcpu
->arch
.sie_block
->gcr
[reg
] |= val
;
97 static intercept_handler_t instruction_handlers
[256] = {
98 [0xb2] = kvm_s390_handle_priv
,
100 [0xeb] = handle_lctg
,
103 static int handle_noop(struct kvm_vcpu
*vcpu
)
105 switch (vcpu
->arch
.sie_block
->icptcode
) {
107 vcpu
->stat
.exit_external_request
++;
110 vcpu
->stat
.exit_external_interrupt
++;
118 static int handle_stop(struct kvm_vcpu
*vcpu
)
120 vcpu
->stat
.exit_stop_request
++;
121 VCPU_EVENT(vcpu
, 3, "%s", "cpu stopped");
122 atomic_clear_mask(CPUSTAT_RUNNING
, &vcpu
->arch
.sie_block
->cpuflags
);
126 static int handle_validity(struct kvm_vcpu
*vcpu
)
128 int viwhy
= vcpu
->arch
.sie_block
->ipb
>> 16;
129 vcpu
->stat
.exit_validity
++;
131 fault_in_pages_writeable((char __user
*)
132 vcpu
->kvm
->arch
.guest_origin
+
133 vcpu
->arch
.sie_block
->prefix
,
137 VCPU_EVENT(vcpu
, 2, "unhandled validity intercept code %d",
142 static int handle_instruction(struct kvm_vcpu
*vcpu
)
144 intercept_handler_t handler
;
146 vcpu
->stat
.exit_instruction
++;
147 handler
= instruction_handlers
[vcpu
->arch
.sie_block
->ipa
>> 8];
149 return handler(vcpu
);
153 static int handle_prog(struct kvm_vcpu
*vcpu
)
155 vcpu
->stat
.exit_program_interruption
++;
156 return kvm_s390_inject_program_int(vcpu
, vcpu
->arch
.sie_block
->iprcc
);
159 static int handle_instruction_and_prog(struct kvm_vcpu
*vcpu
)
163 vcpu
->stat
.exit_instr_and_program
++;
164 rc
= handle_instruction(vcpu
);
165 rc2
= handle_prog(vcpu
);
168 vcpu
->arch
.sie_block
->icptcode
= 0x04;
174 static const intercept_handler_t intercept_funcs
[0x48 >> 2] = {
175 [0x00 >> 2] = handle_noop
,
176 [0x04 >> 2] = handle_instruction
,
177 [0x08 >> 2] = handle_prog
,
178 [0x0C >> 2] = handle_instruction_and_prog
,
179 [0x10 >> 2] = handle_noop
,
180 [0x14 >> 2] = handle_noop
,
181 [0x1C >> 2] = kvm_s390_handle_wait
,
182 [0x20 >> 2] = handle_validity
,
183 [0x28 >> 2] = handle_stop
,
186 int kvm_handle_sie_intercept(struct kvm_vcpu
*vcpu
)
188 intercept_handler_t func
;
189 u8 code
= vcpu
->arch
.sie_block
->icptcode
;
191 if (code
& 3 || code
> 0x48)
193 func
= intercept_funcs
[code
>> 2];