Commit | Line | Data |
---|---|---|
8f2abe6a | 1 | /* |
a53c8fab | 2 | * in-kernel handling for sie intercepts |
8f2abe6a | 3 | * |
9a558ee3 | 4 | * Copyright IBM Corp. 2008, 2014 |
8f2abe6a CB |
5 | * |
6 | * This program is free software; you can redistribute it and/or modify | |
7 | * it under the terms of the GNU General Public License (version 2 only) | |
8 | * as published by the Free Software Foundation. | |
9 | * | |
10 | * Author(s): Carsten Otte <cotte@de.ibm.com> | |
11 | * Christian Borntraeger <borntraeger@de.ibm.com> | |
12 | */ | |
13 | ||
14 | #include <linux/kvm_host.h> | |
15 | #include <linux/errno.h> | |
16 | #include <linux/pagemap.h> | |
17 | ||
18 | #include <asm/kvm_host.h> | |
a86dcc24 | 19 | #include <asm/asm-offsets.h> |
f14d82e0 | 20 | #include <asm/irq.h> |
8f2abe6a CB |
21 | |
22 | #include "kvm-s390.h" | |
ba5c1e9b | 23 | #include "gaccess.h" |
5786fffa | 24 | #include "trace.h" |
ade38c31 | 25 | #include "trace-s390.h" |
ba5c1e9b | 26 | |
f379aae5 | 27 | |
77975357 | 28 | static const intercept_handler_t instruction_handlers[256] = { |
8c3f61e2 | 29 | [0x01] = kvm_s390_handle_01, |
48a3e950 | 30 | [0x82] = kvm_s390_handle_lpsw, |
e28acfea | 31 | [0x83] = kvm_s390_handle_diag, |
5288fbf0 | 32 | [0xae] = kvm_s390_handle_sigp, |
70455a36 | 33 | [0xb2] = kvm_s390_handle_b2, |
aba07508 | 34 | [0xb6] = kvm_s390_handle_stctl, |
953ed88d | 35 | [0xb7] = kvm_s390_handle_lctl, |
48a3e950 | 36 | [0xb9] = kvm_s390_handle_b9, |
bb25b9ba | 37 | [0xe5] = kvm_s390_handle_e5, |
953ed88d | 38 | [0xeb] = kvm_s390_handle_eb, |
ba5c1e9b | 39 | }; |
8f2abe6a | 40 | |
04b41acd TH |
41 | void kvm_s390_rewind_psw(struct kvm_vcpu *vcpu, int ilc) |
42 | { | |
43 | struct kvm_s390_sie_block *sie_block = vcpu->arch.sie_block; | |
44 | ||
45 | /* Use the length of the EXECUTE instruction if necessary */ | |
46 | if (sie_block->icptstatus & 1) { | |
47 | ilc = (sie_block->icptstatus >> 4) & 0x6; | |
48 | if (!ilc) | |
49 | ilc = 4; | |
50 | } | |
51 | sie_block->gpsw.addr = __rewind_psw(sie_block->gpsw, ilc); | |
52 | } | |
53 | ||
8f2abe6a CB |
54 | static int handle_noop(struct kvm_vcpu *vcpu) |
55 | { | |
56 | switch (vcpu->arch.sie_block->icptcode) { | |
0eaeafa1 CB |
57 | case 0x0: |
58 | vcpu->stat.exit_null++; | |
59 | break; | |
8f2abe6a CB |
60 | case 0x10: |
61 | vcpu->stat.exit_external_request++; | |
62 | break; | |
8f2abe6a CB |
63 | default: |
64 | break; /* nothing */ | |
65 | } | |
66 | return 0; | |
67 | } | |
68 | ||
69 | static int handle_stop(struct kvm_vcpu *vcpu) | |
70 | { | |
6cddd432 | 71 | struct kvm_s390_local_interrupt *li = &vcpu->arch.local_int; |
9ace903d | 72 | int rc = 0; |
6cddd432 | 73 | uint8_t flags, stop_pending; |
5288fbf0 | 74 | |
8f2abe6a | 75 | vcpu->stat.exit_stop_request++; |
ade38c31 | 76 | |
9a022067 DH |
77 | /* delay the stop if any non-stop irq is pending */ |
78 | if (kvm_s390_vcpu_has_irq(vcpu, 1)) | |
79 | return 0; | |
80 | ||
6cddd432 DH |
81 | /* avoid races with the injection/SIGP STOP code */ |
82 | spin_lock(&li->lock); | |
83 | flags = li->irq.stop.flags; | |
84 | stop_pending = kvm_s390_is_stop_irq_pending(vcpu); | |
85 | spin_unlock(&li->lock); | |
32f5ff63 | 86 | |
6cddd432 DH |
87 | trace_kvm_s390_stop_request(stop_pending, flags); |
88 | if (!stop_pending) | |
32f5ff63 | 89 | return 0; |
9ace903d | 90 | |
6cddd432 | 91 | if (flags & KVM_S390_STOP_FLAG_STORE_STATUS) { |
9e0d5473 JF |
92 | rc = kvm_s390_vcpu_store_status(vcpu, |
93 | KVM_S390_STORE_STATUS_NOADDR); | |
32f5ff63 DH |
94 | if (rc) |
95 | return rc; | |
96 | } | |
97 | ||
6352e4d2 DH |
98 | if (!kvm_s390_user_cpu_state_ctrl(vcpu->kvm)) |
99 | kvm_s390_vcpu_stop(vcpu); | |
32f5ff63 | 100 | return -EOPNOTSUPP; |
8f2abe6a CB |
101 | } |
102 | ||
103 | static int handle_validity(struct kvm_vcpu *vcpu) | |
104 | { | |
105 | int viwhy = vcpu->arch.sie_block->ipb >> 16; | |
3edbcff9 | 106 | |
8f2abe6a | 107 | vcpu->stat.exit_validity++; |
5786fffa | 108 | trace_kvm_s390_intercept_validity(vcpu, viwhy); |
2c70fe44 CB |
109 | WARN_ONCE(true, "kvm: unhandled validity intercept 0x%x\n", viwhy); |
110 | return -EOPNOTSUPP; | |
8f2abe6a CB |
111 | } |
112 | ||
ba5c1e9b CO |
113 | static int handle_instruction(struct kvm_vcpu *vcpu) |
114 | { | |
115 | intercept_handler_t handler; | |
116 | ||
117 | vcpu->stat.exit_instruction++; | |
5786fffa CH |
118 | trace_kvm_s390_intercept_instruction(vcpu, |
119 | vcpu->arch.sie_block->ipa, | |
120 | vcpu->arch.sie_block->ipb); | |
ba5c1e9b CO |
121 | handler = instruction_handlers[vcpu->arch.sie_block->ipa >> 8]; |
122 | if (handler) | |
123 | return handler(vcpu); | |
b8e660b8 | 124 | return -EOPNOTSUPP; |
ba5c1e9b CO |
125 | } |
126 | ||
439716a5 DH |
127 | static void __extract_prog_irq(struct kvm_vcpu *vcpu, |
128 | struct kvm_s390_pgm_info *pgm_info) | |
129 | { | |
130 | memset(pgm_info, 0, sizeof(struct kvm_s390_pgm_info)); | |
131 | pgm_info->code = vcpu->arch.sie_block->iprcc; | |
132 | ||
133 | switch (vcpu->arch.sie_block->iprcc & ~PGM_PER) { | |
134 | case PGM_AFX_TRANSLATION: | |
135 | case PGM_ASX_TRANSLATION: | |
136 | case PGM_EX_TRANSLATION: | |
137 | case PGM_LFX_TRANSLATION: | |
138 | case PGM_LSTE_SEQUENCE: | |
139 | case PGM_LSX_TRANSLATION: | |
140 | case PGM_LX_TRANSLATION: | |
141 | case PGM_PRIMARY_AUTHORITY: | |
142 | case PGM_SECONDARY_AUTHORITY: | |
143 | case PGM_SPACE_SWITCH: | |
144 | pgm_info->trans_exc_code = vcpu->arch.sie_block->tecmc; | |
145 | break; | |
146 | case PGM_ALEN_TRANSLATION: | |
147 | case PGM_ALE_SEQUENCE: | |
148 | case PGM_ASTE_INSTANCE: | |
149 | case PGM_ASTE_SEQUENCE: | |
150 | case PGM_ASTE_VALIDITY: | |
151 | case PGM_EXTENDED_AUTHORITY: | |
152 | pgm_info->exc_access_id = vcpu->arch.sie_block->eai; | |
153 | break; | |
154 | case PGM_ASCE_TYPE: | |
155 | case PGM_PAGE_TRANSLATION: | |
156 | case PGM_REGION_FIRST_TRANS: | |
157 | case PGM_REGION_SECOND_TRANS: | |
158 | case PGM_REGION_THIRD_TRANS: | |
159 | case PGM_SEGMENT_TRANSLATION: | |
160 | pgm_info->trans_exc_code = vcpu->arch.sie_block->tecmc; | |
161 | pgm_info->exc_access_id = vcpu->arch.sie_block->eai; | |
162 | pgm_info->op_access_id = vcpu->arch.sie_block->oai; | |
163 | break; | |
164 | case PGM_MONITOR: | |
165 | pgm_info->mon_class_nr = vcpu->arch.sie_block->mcn; | |
166 | pgm_info->mon_code = vcpu->arch.sie_block->tecmc; | |
167 | break; | |
403c8648 | 168 | case PGM_VECTOR_PROCESSING: |
439716a5 DH |
169 | case PGM_DATA: |
170 | pgm_info->data_exc_code = vcpu->arch.sie_block->dxc; | |
171 | break; | |
172 | case PGM_PROTECTION: | |
173 | pgm_info->trans_exc_code = vcpu->arch.sie_block->tecmc; | |
174 | pgm_info->exc_access_id = vcpu->arch.sie_block->eai; | |
175 | break; | |
176 | default: | |
177 | break; | |
178 | } | |
179 | ||
180 | if (vcpu->arch.sie_block->iprcc & PGM_PER) { | |
181 | pgm_info->per_code = vcpu->arch.sie_block->perc; | |
182 | pgm_info->per_atmid = vcpu->arch.sie_block->peratmid; | |
183 | pgm_info->per_address = vcpu->arch.sie_block->peraddr; | |
184 | pgm_info->per_access_id = vcpu->arch.sie_block->peraid; | |
185 | } | |
186 | } | |
187 | ||
e325fe69 MM |
188 | /* |
189 | * restore ITDB to program-interruption TDB in guest lowcore | |
190 | * and set TX abort indication if required | |
191 | */ | |
192 | static int handle_itdb(struct kvm_vcpu *vcpu) | |
193 | { | |
194 | struct kvm_s390_itdb *itdb; | |
195 | int rc; | |
196 | ||
197 | if (!IS_TE_ENABLED(vcpu) || !IS_ITDB_VALID(vcpu)) | |
198 | return 0; | |
199 | if (current->thread.per_flags & PER_FLAG_NO_TE) | |
200 | return 0; | |
201 | itdb = (struct kvm_s390_itdb *)vcpu->arch.sie_block->itdba; | |
202 | rc = write_guest_lc(vcpu, __LC_PGM_TDB, itdb, sizeof(*itdb)); | |
203 | if (rc) | |
204 | return rc; | |
205 | memset(itdb, 0, sizeof(*itdb)); | |
206 | ||
207 | return 0; | |
208 | } | |
209 | ||
27291e21 DH |
210 | #define per_event(vcpu) (vcpu->arch.sie_block->iprcc & PGM_PER) |
211 | ||
ba5c1e9b CO |
212 | static int handle_prog(struct kvm_vcpu *vcpu) |
213 | { | |
439716a5 | 214 | struct kvm_s390_pgm_info pgm_info; |
684135e0 | 215 | psw_t psw; |
0040e7d2 HC |
216 | int rc; |
217 | ||
ba5c1e9b | 218 | vcpu->stat.exit_program_interruption++; |
7feb6bb8 | 219 | |
27291e21 DH |
220 | if (guestdbg_enabled(vcpu) && per_event(vcpu)) { |
221 | kvm_s390_handle_per_event(vcpu); | |
222 | /* the interrupt might have been filtered out completely */ | |
223 | if (vcpu->arch.sie_block->iprcc == 0) | |
224 | return 0; | |
225 | } | |
226 | ||
e325fe69 | 227 | trace_kvm_s390_intercept_prog(vcpu, vcpu->arch.sie_block->iprcc); |
684135e0 TH |
228 | if (vcpu->arch.sie_block->iprcc == PGM_SPECIFICATION) { |
229 | rc = read_guest_lc(vcpu, __LC_PGM_NEW_PSW, &psw, sizeof(psw_t)); | |
230 | if (rc) | |
231 | return rc; | |
232 | /* Avoid endless loops of specification exceptions */ | |
233 | if (!is_valid_psw(&psw)) | |
234 | return -EOPNOTSUPP; | |
235 | } | |
e325fe69 | 236 | rc = handle_itdb(vcpu); |
0040e7d2 HC |
237 | if (rc) |
238 | return rc; | |
439716a5 | 239 | |
e325fe69 | 240 | __extract_prog_irq(vcpu, &pgm_info); |
439716a5 | 241 | return kvm_s390_inject_prog_irq(vcpu, &pgm_info); |
ba5c1e9b CO |
242 | } |
243 | ||
f14d82e0 TH |
244 | /** |
245 | * handle_external_interrupt - used for external interruption interceptions | |
246 | * | |
247 | * This interception only occurs if the CPUSTAT_EXT_INT bit was set, or if | |
248 | * the new PSW does not have external interrupts disabled. In the first case, | |
249 | * we've got to deliver the interrupt manually, and in the second case, we | |
250 | * drop to userspace to handle the situation there. | |
251 | */ | |
252 | static int handle_external_interrupt(struct kvm_vcpu *vcpu) | |
253 | { | |
254 | u16 eic = vcpu->arch.sie_block->eic; | |
383d0b05 | 255 | struct kvm_s390_irq irq; |
f14d82e0 TH |
256 | psw_t newpsw; |
257 | int rc; | |
258 | ||
259 | vcpu->stat.exit_external_interrupt++; | |
260 | ||
261 | rc = read_guest_lc(vcpu, __LC_EXT_NEW_PSW, &newpsw, sizeof(psw_t)); | |
262 | if (rc) | |
263 | return rc; | |
264 | /* We can not handle clock comparator or timer interrupt with bad PSW */ | |
265 | if ((eic == EXT_IRQ_CLK_COMP || eic == EXT_IRQ_CPU_TIMER) && | |
266 | (newpsw.mask & PSW_MASK_EXT)) | |
267 | return -EOPNOTSUPP; | |
268 | ||
269 | switch (eic) { | |
270 | case EXT_IRQ_CLK_COMP: | |
271 | irq.type = KVM_S390_INT_CLOCK_COMP; | |
272 | break; | |
273 | case EXT_IRQ_CPU_TIMER: | |
274 | irq.type = KVM_S390_INT_CPU_TIMER; | |
275 | break; | |
276 | case EXT_IRQ_EXTERNAL_CALL: | |
277 | irq.type = KVM_S390_INT_EXTERNAL_CALL; | |
383d0b05 | 278 | irq.u.extcall.code = vcpu->arch.sie_block->extcpuaddr; |
ea5f4969 DH |
279 | rc = kvm_s390_inject_vcpu(vcpu, &irq); |
280 | /* ignore if another external call is already pending */ | |
281 | if (rc == -EBUSY) | |
282 | return 0; | |
283 | return rc; | |
f14d82e0 TH |
284 | default: |
285 | return -EOPNOTSUPP; | |
286 | } | |
287 | ||
288 | return kvm_s390_inject_vcpu(vcpu, &irq); | |
289 | } | |
290 | ||
9a558ee3 TH |
291 | /** |
292 | * Handle MOVE PAGE partial execution interception. | |
293 | * | |
294 | * This interception can only happen for guests with DAT disabled and | |
295 | * addresses that are currently not mapped in the host. Thus we try to | |
296 | * set up the mappings for the corresponding user pages here (or throw | |
297 | * addressing exceptions in case of illegal guest addresses). | |
298 | */ | |
299 | static int handle_mvpg_pei(struct kvm_vcpu *vcpu) | |
300 | { | |
f22166dc | 301 | unsigned long srcaddr, dstaddr; |
9a558ee3 TH |
302 | int reg1, reg2, rc; |
303 | ||
304 | kvm_s390_get_regs_rre(vcpu, ®1, ®2); | |
9a558ee3 TH |
305 | |
306 | /* Make sure that the source is paged-in */ | |
3cfad023 | 307 | rc = guest_translate_address(vcpu, vcpu->run->s.regs.gprs[reg2], |
8ae04b8f | 308 | reg2, &srcaddr, 0); |
3cfad023 TH |
309 | if (rc) |
310 | return kvm_s390_inject_prog_cond(vcpu, rc); | |
f22166dc TH |
311 | rc = kvm_arch_fault_in_page(vcpu, srcaddr, 0); |
312 | if (rc != 0) | |
9a558ee3 TH |
313 | return rc; |
314 | ||
315 | /* Make sure that the destination is paged-in */ | |
3cfad023 | 316 | rc = guest_translate_address(vcpu, vcpu->run->s.regs.gprs[reg1], |
8ae04b8f | 317 | reg1, &dstaddr, 1); |
3cfad023 TH |
318 | if (rc) |
319 | return kvm_s390_inject_prog_cond(vcpu, rc); | |
f22166dc TH |
320 | rc = kvm_arch_fault_in_page(vcpu, dstaddr, 1); |
321 | if (rc != 0) | |
9a558ee3 TH |
322 | return rc; |
323 | ||
04b41acd | 324 | kvm_s390_rewind_psw(vcpu, 4); |
9a558ee3 TH |
325 | |
326 | return 0; | |
327 | } | |
328 | ||
329 | static int handle_partial_execution(struct kvm_vcpu *vcpu) | |
330 | { | |
331 | if (vcpu->arch.sie_block->ipa == 0xb254) /* MVPG */ | |
332 | return handle_mvpg_pei(vcpu); | |
4953919f DH |
333 | if (vcpu->arch.sie_block->ipa >> 8 == 0xae) /* SIGP */ |
334 | return kvm_s390_handle_sigp_pei(vcpu); | |
9a558ee3 TH |
335 | |
336 | return -EOPNOTSUPP; | |
337 | } | |
338 | ||
8f2abe6a CB |
339 | int kvm_handle_sie_intercept(struct kvm_vcpu *vcpu) |
340 | { | |
46b708ea CB |
341 | switch (vcpu->arch.sie_block->icptcode) { |
342 | case 0x00: | |
343 | case 0x10: | |
344 | case 0x18: | |
345 | return handle_noop(vcpu); | |
346 | case 0x04: | |
347 | return handle_instruction(vcpu); | |
348 | case 0x08: | |
349 | return handle_prog(vcpu); | |
350 | case 0x14: | |
351 | return handle_external_interrupt(vcpu); | |
352 | case 0x1c: | |
353 | return kvm_s390_handle_wait(vcpu); | |
354 | case 0x20: | |
355 | return handle_validity(vcpu); | |
356 | case 0x28: | |
357 | return handle_stop(vcpu); | |
358 | case 0x38: | |
359 | return handle_partial_execution(vcpu); | |
360 | default: | |
b8e660b8 | 361 | return -EOPNOTSUPP; |
46b708ea | 362 | } |
8f2abe6a | 363 | } |