Statistics
| Branch: | Revision:

root / target-s390x / kvm.c @ 0af691d7

History | View | Annotate | Download (11.6 kB)

1
/*
2
 * QEMU S390x KVM implementation
3
 *
4
 * Copyright (c) 2009 Alexander Graf <agraf@suse.de>
5
 *
6
 * This library is free software; you can redistribute it and/or
7
 * modify it under the terms of the GNU Lesser General Public
8
 * License as published by the Free Software Foundation; either
9
 * version 2 of the License, or (at your option) any later version.
10
 *
11
 * This library is distributed in the hope that it will be useful,
12
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
14
 * Lesser General Public License for more details.
15
 *
16
 * You should have received a copy of the GNU Lesser General Public
17
 * License along with this library; if not, see <http://www.gnu.org/licenses/>.
18
 */
19

    
20
#include <sys/types.h>
21
#include <sys/ioctl.h>
22
#include <sys/mman.h>
23

    
24
#include <linux/kvm.h>
25
#include <asm/ptrace.h>
26

    
27
#include "qemu-common.h"
28
#include "qemu-timer.h"
29
#include "sysemu.h"
30
#include "kvm.h"
31
#include "cpu.h"
32
#include "device_tree.h"
33

    
34
/* #define DEBUG_KVM */
35

    
36
#ifdef DEBUG_KVM
37
#define dprintf(fmt, ...) \
38
    do { fprintf(stderr, fmt, ## __VA_ARGS__); } while (0)
39
#else
40
#define dprintf(fmt, ...) \
41
    do { } while (0)
42
#endif
43

    
44
#define IPA0_DIAG                       0x8300
45
#define IPA0_SIGP                       0xae00
46
#define IPA0_PRIV                       0xb200
47

    
48
#define PRIV_SCLP_CALL                  0x20
49
#define DIAG_KVM_HYPERCALL              0x500
50
#define DIAG_KVM_BREAKPOINT             0x501
51

    
52
#define SCP_LENGTH                      0x00
53
#define SCP_FUNCTION_CODE               0x02
54
#define SCP_CONTROL_MASK                0x03
55
#define SCP_RESPONSE_CODE               0x06
56
#define SCP_MEM_CODE                    0x08
57
#define SCP_INCREMENT                   0x0a
58

    
59
#define ICPT_INSTRUCTION                0x04
60
#define ICPT_WAITPSW                    0x1c
61
#define ICPT_SOFT_INTERCEPT             0x24
62
#define ICPT_CPU_STOP                   0x28
63
#define ICPT_IO                         0x40
64

    
65
#define SIGP_RESTART                    0x06
66
#define SIGP_INITIAL_CPU_RESET          0x0b
67
#define SIGP_STORE_STATUS_ADDR          0x0e
68
#define SIGP_SET_ARCH                   0x12
69

    
70
#define SCLP_CMDW_READ_SCP_INFO         0x00020001
71
#define SCLP_CMDW_READ_SCP_INFO_FORCED  0x00120001
72

    
73
int kvm_arch_init(KVMState *s, int smp_cpus)
74
{
75
    return 0;
76
}
77

    
78
int kvm_arch_init_vcpu(CPUState *env)
79
{
80
    int ret = 0;
81

    
82
    if (kvm_vcpu_ioctl(env, KVM_S390_INITIAL_RESET, NULL) < 0) {
83
        perror("cannot init reset vcpu");
84
    }
85

    
86
    return ret;
87
}
88

    
89
void kvm_arch_reset_vcpu(CPUState *env)
90
{
91
    /* FIXME: add code to reset vcpu. */
92
}
93

    
94
int kvm_arch_put_registers(CPUState *env, int level)
95
{
96
    struct kvm_regs regs;
97
    int ret;
98
    int i;
99

    
100
    ret = kvm_vcpu_ioctl(env, KVM_GET_REGS, &regs);
101
    if (ret < 0) {
102
        return ret;
103
    }
104

    
105
    for (i = 0; i < 16; i++) {
106
        regs.gprs[i] = env->regs[i];
107
    }
108

    
109
    ret = kvm_vcpu_ioctl(env, KVM_SET_REGS, &regs);
110
    if (ret < 0) {
111
        return ret;
112
    }
113

    
114
    env->kvm_run->psw_addr = env->psw.addr;
115
    env->kvm_run->psw_mask = env->psw.mask;
116

    
117
    return ret;
118
}
119

    
120
int kvm_arch_get_registers(CPUState *env)
121
{
122
    uint32_t ret;
123
    struct kvm_regs regs;
124
    int i;
125

    
126
    ret = kvm_vcpu_ioctl(env, KVM_GET_REGS, &regs);
127
    if (ret < 0) {
128
        return ret;
129
    }
130

    
131
    for (i = 0; i < 16; i++) {
132
        env->regs[i] = regs.gprs[i];
133
    }
134

    
135
    env->psw.addr = env->kvm_run->psw_addr;
136
    env->psw.mask = env->kvm_run->psw_mask;
137

    
138
    return 0;
139
}
140

    
141
int kvm_arch_insert_sw_breakpoint(CPUState *env, struct kvm_sw_breakpoint *bp)
142
{
143
    static const uint8_t diag_501[] = {0x83, 0x24, 0x05, 0x01};
144

    
145
    if (cpu_memory_rw_debug(env, bp->pc, (uint8_t *)&bp->saved_insn, 4, 0) ||
146
        cpu_memory_rw_debug(env, bp->pc, (uint8_t *)diag_501, 4, 1)) {
147
        return -EINVAL;
148
    }
149
    return 0;
150
}
151

    
152
int kvm_arch_remove_sw_breakpoint(CPUState *env, struct kvm_sw_breakpoint *bp)
153
{
154
    uint8_t t[4];
155
    static const uint8_t diag_501[] = {0x83, 0x24, 0x05, 0x01};
156

    
157
    if (cpu_memory_rw_debug(env, bp->pc, t, 4, 0)) {
158
        return -EINVAL;
159
    } else if (memcmp(t, diag_501, 4)) {
160
        return -EINVAL;
161
    } else if (cpu_memory_rw_debug(env, bp->pc, (uint8_t *)&bp->saved_insn, 1, 1)) {
162
        return -EINVAL;
163
    }
164

    
165
    return 0;
166
}
167

    
168
int kvm_arch_pre_run(CPUState *env, struct kvm_run *run)
169
{
170
    return 0;
171
}
172

    
173
int kvm_arch_post_run(CPUState *env, struct kvm_run *run)
174
{
175
    return 0;
176
}
177

    
178
int kvm_arch_process_irqchip_events(CPUState *env)
179
{
180
    return 0;
181
}
182

    
183
static void kvm_s390_interrupt_internal(CPUState *env, int type, uint32_t parm,
184
                                        uint64_t parm64, int vm)
185
{
186
    struct kvm_s390_interrupt kvmint;
187
    int r;
188

    
189
    if (!env->kvm_state) {
190
        return;
191
    }
192

    
193
    env->halted = 0;
194
    env->exception_index = -1;
195

    
196
    kvmint.type = type;
197
    kvmint.parm = parm;
198
    kvmint.parm64 = parm64;
199

    
200
    if (vm) {
201
        r = kvm_vm_ioctl(env->kvm_state, KVM_S390_INTERRUPT, &kvmint);
202
    } else {
203
        r = kvm_vcpu_ioctl(env, KVM_S390_INTERRUPT, &kvmint);
204
    }
205

    
206
    if (r < 0) {
207
        fprintf(stderr, "KVM failed to inject interrupt\n");
208
        exit(1);
209
    }
210
}
211

    
212
void kvm_s390_virtio_irq(CPUState *env, int config_change, uint64_t token)
213
{
214
    kvm_s390_interrupt_internal(env, KVM_S390_INT_VIRTIO, config_change,
215
                                token, 1);
216
}
217

    
218
static void kvm_s390_interrupt(CPUState *env, int type, uint32_t code)
219
{
220
    kvm_s390_interrupt_internal(env, type, code, 0, 0);
221
}
222

    
223
static void enter_pgmcheck(CPUState *env, uint16_t code)
224
{
225
    kvm_s390_interrupt(env, KVM_S390_PROGRAM_INT, code);
226
}
227

    
228
static void setcc(CPUState *env, uint64_t cc)
229
{
230
    env->kvm_run->psw_mask &= ~(3ul << 44);
231
    env->kvm_run->psw_mask |= (cc & 3) << 44;
232

    
233
    env->psw.mask &= ~(3ul << 44);
234
    env->psw.mask |= (cc & 3) << 44;
235
}
236

    
237
static int sclp_service_call(CPUState *env, struct kvm_run *run, uint16_t ipbh0)
238
{
239
    uint32_t sccb;
240
    uint64_t code;
241
    int r = 0;
242

    
243
    cpu_synchronize_state(env);
244
    sccb = env->regs[ipbh0 & 0xf];
245
    code = env->regs[(ipbh0 & 0xf0) >> 4];
246

    
247
    dprintf("sclp(0x%x, 0x%lx)\n", sccb, code);
248

    
249
    if (sccb & ~0x7ffffff8ul) {
250
        fprintf(stderr, "KVM: invalid sccb address 0x%x\n", sccb);
251
        r = -1;
252
        goto out;
253
    }
254

    
255
    switch(code) {
256
        case SCLP_CMDW_READ_SCP_INFO:
257
        case SCLP_CMDW_READ_SCP_INFO_FORCED:
258
            stw_phys(sccb + SCP_MEM_CODE, ram_size >> 20);
259
            stb_phys(sccb + SCP_INCREMENT, 1);
260
            stw_phys(sccb + SCP_RESPONSE_CODE, 0x10);
261
            setcc(env, 0);
262

    
263
            kvm_s390_interrupt_internal(env, KVM_S390_INT_SERVICE,
264
                                        sccb & ~3, 0, 1);
265
            break;
266
        default:
267
            dprintf("KVM: invalid sclp call 0x%x / 0x%lx\n", sccb, code);
268
            r = -1;
269
            break;
270
    }
271

    
272
out:
273
    if (r < 0) {
274
        setcc(env, 3);
275
    }
276
    return 0;
277
}
278

    
279
static int handle_priv(CPUState *env, struct kvm_run *run, uint8_t ipa1)
280
{
281
    int r = 0;
282
    uint16_t ipbh0 = (run->s390_sieic.ipb & 0xffff0000) >> 16;
283

    
284
    dprintf("KVM: PRIV: %d\n", ipa1);
285
    switch (ipa1) {
286
        case PRIV_SCLP_CALL:
287
            r = sclp_service_call(env, run, ipbh0);
288
            break;
289
        default:
290
            dprintf("KVM: unknown PRIV: 0x%x\n", ipa1);
291
            r = -1;
292
            break;
293
    }
294

    
295
    return r;
296
}
297

    
298
static int handle_hypercall(CPUState *env, struct kvm_run *run)
299
{
300
    int r;
301

    
302
    cpu_synchronize_state(env);
303
    r = s390_virtio_hypercall(env);
304

    
305
    return r;
306
}
307

    
308
static int handle_diag(CPUState *env, struct kvm_run *run, int ipb_code)
309
{
310
    int r = 0;
311

    
312
    switch (ipb_code) {
313
        case DIAG_KVM_HYPERCALL:
314
            r = handle_hypercall(env, run);
315
            break;
316
        case DIAG_KVM_BREAKPOINT:
317
            sleep(10);
318
            break;
319
        default:
320
            dprintf("KVM: unknown DIAG: 0x%x\n", ipb_code);
321
            r = -1;
322
            break;
323
    }
324

    
325
    return r;
326
}
327

    
328
static int s390_cpu_restart(CPUState *env)
329
{
330
    kvm_s390_interrupt(env, KVM_S390_RESTART, 0);
331
    env->halted = 0;
332
    env->exception_index = -1;
333
    qemu_cpu_kick(env);
334
    dprintf("DONE: SIGP cpu restart: %p\n", env);
335
    return 0;
336
}
337

    
338
static int s390_store_status(CPUState *env, uint32_t parameter)
339
{
340
    /* XXX */
341
    fprintf(stderr, "XXX SIGP store status\n");
342
    return -1;
343
}
344

    
345
static int s390_cpu_initial_reset(CPUState *env)
346
{
347
    /* XXX */
348
    fprintf(stderr, "XXX SIGP init\n");
349
    return -1;
350
}
351

    
352
static int handle_sigp(CPUState *env, struct kvm_run *run, uint8_t ipa1)
353
{
354
    uint8_t order_code;
355
    uint32_t parameter;
356
    uint16_t cpu_addr;
357
    uint8_t t;
358
    int r = -1;
359
    CPUState *target_env;
360

    
361
    cpu_synchronize_state(env);
362

    
363
    /* get order code */
364
    order_code = run->s390_sieic.ipb >> 28;
365
    if (order_code > 0) {
366
        order_code = env->regs[order_code];
367
    }
368
    order_code += (run->s390_sieic.ipb & 0x0fff0000) >> 16;
369

    
370
    /* get parameters */
371
    t = (ipa1 & 0xf0) >> 4;
372
    if (!(t % 2)) {
373
        t++;
374
    }
375

    
376
    parameter = env->regs[t] & 0x7ffffe00;
377
    cpu_addr = env->regs[ipa1 & 0x0f];
378

    
379
    target_env = s390_cpu_addr2state(cpu_addr);
380
    if (!target_env) {
381
        goto out;
382
    }
383

    
384
    switch (order_code) {
385
        case SIGP_RESTART:
386
            r = s390_cpu_restart(target_env);
387
            break;
388
        case SIGP_STORE_STATUS_ADDR:
389
            r = s390_store_status(target_env, parameter);
390
            break;
391
        case SIGP_SET_ARCH:
392
            /* make the caller panic */
393
            return -1;
394
        case SIGP_INITIAL_CPU_RESET:
395
            r = s390_cpu_initial_reset(target_env);
396
            break;
397
        default:
398
            fprintf(stderr, "KVM: unknown SIGP: 0x%x\n", ipa1);
399
            break;
400
    }
401

    
402
out:
403
    setcc(env, r ? 3 : 0);
404
    return 0;
405
}
406

    
407
static int handle_instruction(CPUState *env, struct kvm_run *run)
408
{
409
    unsigned int ipa0 = (run->s390_sieic.ipa & 0xff00);
410
    uint8_t ipa1 = run->s390_sieic.ipa & 0x00ff;
411
    int ipb_code = (run->s390_sieic.ipb & 0x0fff0000) >> 16;
412
    int r = -1;
413

    
414
    dprintf("handle_instruction 0x%x 0x%x\n", run->s390_sieic.ipa, run->s390_sieic.ipb);
415
    switch (ipa0) {
416
        case IPA0_PRIV:
417
            r = handle_priv(env, run, ipa1);
418
            break;
419
        case IPA0_DIAG:
420
            r = handle_diag(env, run, ipb_code);
421
            break;
422
        case IPA0_SIGP:
423
            r = handle_sigp(env, run, ipa1);
424
            break;
425
    }
426

    
427
    if (r < 0) {
428
        enter_pgmcheck(env, 0x0001);
429
    }
430
    return r;
431
}
432

    
433
static int handle_intercept(CPUState *env)
434
{
435
    struct kvm_run *run = env->kvm_run;
436
    int icpt_code = run->s390_sieic.icptcode;
437
    int r = 0;
438

    
439
    dprintf("intercept: 0x%x (at 0x%lx)\n", icpt_code, env->kvm_run->psw_addr);
440
    switch (icpt_code) {
441
        case ICPT_INSTRUCTION:
442
            r = handle_instruction(env, run);
443
            break;
444
        case ICPT_WAITPSW:
445
            /* XXX What to do on system shutdown? */
446
            env->halted = 1;
447
            env->exception_index = EXCP_HLT;
448
            break;
449
        case ICPT_SOFT_INTERCEPT:
450
            fprintf(stderr, "KVM unimplemented icpt SOFT\n");
451
            exit(1);
452
            break;
453
        case ICPT_CPU_STOP:
454
            qemu_system_shutdown_request();
455
            break;
456
        case ICPT_IO:
457
            fprintf(stderr, "KVM unimplemented icpt IO\n");
458
            exit(1);
459
            break;
460
        default:
461
            fprintf(stderr, "Unknown intercept code: %d\n", icpt_code);
462
            exit(1);
463
            break;
464
    }
465

    
466
    return r;
467
}
468

    
469
int kvm_arch_handle_exit(CPUState *env, struct kvm_run *run)
470
{
471
    int ret = 0;
472

    
473
    switch (run->exit_reason) {
474
        case KVM_EXIT_S390_SIEIC:
475
            ret = handle_intercept(env);
476
            break;
477
        case KVM_EXIT_S390_RESET:
478
            fprintf(stderr, "RESET not implemented\n");
479
            exit(1);
480
            break;
481
        default:
482
            fprintf(stderr, "Unknown KVM exit: %d\n", run->exit_reason);
483
            break;
484
    }
485

    
486
    return ret;
487
}