2009-12-05 14:44:24 +03:00
|
|
|
/*
|
|
|
|
* QEMU S390x KVM implementation
|
|
|
|
*
|
|
|
|
* Copyright (c) 2009 Alexander Graf <agraf@suse.de>
|
2012-11-12 05:44:10 +04:00
|
|
|
* Copyright IBM Corp. 2012
|
2009-12-05 14:44:24 +03:00
|
|
|
*
|
2019-02-06 15:41:33 +03:00
|
|
|
* This program is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
|
|
* (at your option) any later version.
|
2009-12-05 14:44:24 +03:00
|
|
|
*
|
2019-02-06 15:41:33 +03:00
|
|
|
* This program is distributed in the hope that it will be useful,
|
2009-12-05 14:44:24 +03:00
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
2019-02-06 15:41:33 +03:00
|
|
|
* General Public License for more details.
|
2009-12-05 14:44:24 +03:00
|
|
|
*
|
2019-02-06 15:41:33 +03:00
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program; if not, see <http://www.gnu.org/licenses/>.
|
2009-12-05 14:44:24 +03:00
|
|
|
*/
|
|
|
|
|
2016-01-26 21:17:00 +03:00
|
|
|
#include "qemu/osdep.h"
|
2009-12-05 14:44:24 +03:00
|
|
|
#include <sys/ioctl.h>
|
|
|
|
|
|
|
|
#include <linux/kvm.h>
|
|
|
|
#include <asm/ptrace.h>
|
|
|
|
|
2016-03-15 18:58:45 +03:00
|
|
|
#include "cpu.h"
|
2021-07-07 13:53:16 +03:00
|
|
|
#include "s390x-internal.h"
|
2017-08-18 14:43:52 +03:00
|
|
|
#include "kvm_s390x.h"
|
2019-09-24 17:47:51 +03:00
|
|
|
#include "sysemu/kvm_int.h"
|
2021-01-14 10:07:36 +03:00
|
|
|
#include "qemu/cutils.h"
|
2018-02-01 14:18:31 +03:00
|
|
|
#include "qapi/error.h"
|
2015-03-17 20:29:20 +03:00
|
|
|
#include "qemu/error-report.h"
|
2012-12-17 21:20:00 +04:00
|
|
|
#include "qemu/timer.h"
|
2018-08-02 10:02:01 +03:00
|
|
|
#include "qemu/units.h"
|
Include qemu/main-loop.h less
In my "build everything" tree, changing qemu/main-loop.h triggers a
recompile of some 5600 out of 6600 objects (not counting tests and
objects that don't depend on qemu/osdep.h). It includes block/aio.h,
which in turn includes qemu/event_notifier.h, qemu/notify.h,
qemu/processor.h, qemu/qsp.h, qemu/queue.h, qemu/thread-posix.h,
qemu/thread.h, qemu/timer.h, and a few more.
Include qemu/main-loop.h only where it's needed. Touching it now
recompiles only some 1700 objects. For block/aio.h and
qemu/event_notifier.h, these numbers drop from 5600 to 2800. For the
others, they shrink only slightly.
Signed-off-by: Markus Armbruster <armbru@redhat.com>
Message-Id: <20190812052359.30071-21-armbru@redhat.com>
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
Tested-by: Philippe Mathieu-Daudé <philmd@redhat.com>
2019-08-12 08:23:50 +03:00
|
|
|
#include "qemu/main-loop.h"
|
2018-08-02 10:02:01 +03:00
|
|
|
#include "qemu/mmap-alloc.h"
|
2018-09-27 16:02:55 +03:00
|
|
|
#include "qemu/log.h"
|
2012-12-17 21:20:04 +04:00
|
|
|
#include "sysemu/sysemu.h"
|
2017-01-24 12:18:02 +03:00
|
|
|
#include "sysemu/hw_accel.h"
|
2019-08-12 08:23:59 +03:00
|
|
|
#include "sysemu/runstate.h"
|
2012-12-17 21:20:04 +04:00
|
|
|
#include "sysemu/device_tree.h"
|
2012-09-03 15:09:10 +04:00
|
|
|
#include "exec/gdbstub.h"
|
2019-01-30 10:55:06 +03:00
|
|
|
#include "exec/ram_addr.h"
|
2014-04-03 17:54:58 +04:00
|
|
|
#include "trace.h"
|
2015-01-09 11:04:39 +03:00
|
|
|
#include "hw/s390x/s390-pci-inst.h"
|
2015-01-09 11:04:40 +03:00
|
|
|
#include "hw/s390x/s390-pci-bus.h"
|
2015-02-12 20:02:15 +03:00
|
|
|
#include "hw/s390x/ipl.h"
|
2015-03-03 20:35:27 +03:00
|
|
|
#include "hw/s390x/ebcdic.h"
|
2015-04-08 14:30:58 +03:00
|
|
|
#include "exec/memattrs.h"
|
2016-03-09 15:11:17 +03:00
|
|
|
#include "hw/s390x/s390-virtio-ccw.h"
|
2017-09-13 16:24:00 +03:00
|
|
|
#include "hw/s390x/s390-virtio-hcall.h"
|
2020-03-19 16:19:13 +03:00
|
|
|
#include "hw/s390x/pv.h"
|
2009-12-05 14:44:24 +03:00
|
|
|
|
2017-04-01 16:45:53 +03:00
|
|
|
#ifndef DEBUG_KVM
|
|
|
|
#define DEBUG_KVM 0
|
2009-12-05 14:44:24 +03:00
|
|
|
#endif
|
|
|
|
|
2017-04-01 16:45:53 +03:00
|
|
|
#define DPRINTF(fmt, ...) do { \
|
|
|
|
if (DEBUG_KVM) { \
|
|
|
|
fprintf(stderr, fmt, ## __VA_ARGS__); \
|
|
|
|
} \
|
maint: Fix macros with broken 'do/while(0); ' usage
The point of writing a macro embedded in a 'do { ... } while (0)'
loop (particularly if the macro has multiple statements or would
otherwise end with an 'if' statement) is so that the macro can be
used as a drop-in statement with the caller supplying the
trailing ';'. Although our coding style frowns on brace-less 'if':
if (cond)
statement;
else
something else;
that is the classic case where failure to use do/while(0) wrapping
would cause the 'else' to pair with any embedded 'if' in the macro
rather than the intended outer 'if'. But conversely, if the macro
includes an embedded ';', then the same brace-less coding style
would now have two statements, making the 'else' a syntax error
rather than pairing with the outer 'if'. Thus, even though our
coding style with required braces is not impacted, ending a macro
with ';' makes our code harder to port to projects that use
brace-less styles.
The change should have no semantic impact. I was not able to
fully compile-test all of the changes (as some of them are
examples of the ugly bit-rotting debug print statements that are
completely elided by default, and I didn't want to recompile
with the necessary -D witnesses - cleaning those up is left as a
bite-sized task for another day); I did, however, audit that for
all files touched, all callers of the changed macros DID supply
a trailing ';' at the callsite, and did not appear to be used
as part of a brace-less conditional.
Found mechanically via: $ git grep -B1 'while (0);' | grep -A1 \\\\
Signed-off-by: Eric Blake <eblake@redhat.com>
Acked-by: Cornelia Huck <cohuck@redhat.com>
Reviewed-by: Michael S. Tsirkin <mst@redhat.com>
Acked-by: Dr. David Alan Gilbert <dgilbert@redhat.com>
Message-Id: <20171201232433.25193-7-eblake@redhat.com>
Reviewed-by: Juan Quintela <quintela@redhat.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2017-12-02 02:24:32 +03:00
|
|
|
} while (0)
|
2017-04-01 16:45:53 +03:00
|
|
|
|
2015-03-12 15:53:50 +03:00
|
|
|
#define kvm_vm_check_mem_attr(s, attr) \
|
|
|
|
kvm_vm_check_attr(s, KVM_S390_VM_MEM_CTRL, attr)
|
|
|
|
|
2009-12-05 14:44:24 +03:00
|
|
|
#define IPA0_DIAG 0x8300
|
|
|
|
#define IPA0_SIGP 0xae00
|
2013-01-24 06:28:07 +04:00
|
|
|
#define IPA0_B2 0xb200
|
|
|
|
#define IPA0_B9 0xb900
|
|
|
|
#define IPA0_EB 0xeb00
|
2015-01-09 11:04:39 +03:00
|
|
|
#define IPA0_E3 0xe300
|
2009-12-05 14:44:24 +03:00
|
|
|
|
2014-02-11 11:41:38 +04:00
|
|
|
#define PRIV_B2_SCLP_CALL 0x20
|
|
|
|
#define PRIV_B2_CSCH 0x30
|
|
|
|
#define PRIV_B2_HSCH 0x31
|
|
|
|
#define PRIV_B2_MSCH 0x32
|
|
|
|
#define PRIV_B2_SSCH 0x33
|
|
|
|
#define PRIV_B2_STSCH 0x34
|
|
|
|
#define PRIV_B2_TSCH 0x35
|
|
|
|
#define PRIV_B2_TPI 0x36
|
|
|
|
#define PRIV_B2_SAL 0x37
|
|
|
|
#define PRIV_B2_RSCH 0x38
|
|
|
|
#define PRIV_B2_STCRW 0x39
|
|
|
|
#define PRIV_B2_STCPS 0x3a
|
|
|
|
#define PRIV_B2_RCHP 0x3b
|
|
|
|
#define PRIV_B2_SCHM 0x3c
|
|
|
|
#define PRIV_B2_CHSC 0x5f
|
|
|
|
#define PRIV_B2_SIGA 0x74
|
|
|
|
#define PRIV_B2_XSCH 0x76
|
|
|
|
|
|
|
|
#define PRIV_EB_SQBS 0x8a
|
2015-01-09 11:04:39 +03:00
|
|
|
#define PRIV_EB_PCISTB 0xd0
|
|
|
|
#define PRIV_EB_SIC 0xd1
|
2014-02-11 11:41:38 +04:00
|
|
|
|
|
|
|
#define PRIV_B9_EQBS 0x9c
|
2015-01-09 11:04:39 +03:00
|
|
|
#define PRIV_B9_CLP 0xa0
|
|
|
|
#define PRIV_B9_PCISTG 0xd0
|
|
|
|
#define PRIV_B9_PCILG 0xd2
|
|
|
|
#define PRIV_B9_RPCIT 0xd3
|
|
|
|
|
|
|
|
#define PRIV_E3_MPCIFC 0xd0
|
|
|
|
#define PRIV_E3_STPCIFC 0xd4
|
2014-02-11 11:41:38 +04:00
|
|
|
|
2015-06-11 14:55:26 +03:00
|
|
|
#define DIAG_TIMEREVENT 0x288
|
2013-06-19 19:27:15 +04:00
|
|
|
#define DIAG_IPL 0x308
|
2020-09-15 22:44:16 +03:00
|
|
|
#define DIAG_SET_CONTROL_PROGRAM_CODES 0x318
|
2009-12-05 14:44:24 +03:00
|
|
|
#define DIAG_KVM_HYPERCALL 0x500
|
|
|
|
#define DIAG_KVM_BREAKPOINT 0x501
|
|
|
|
|
|
|
|
#define ICPT_INSTRUCTION 0x04
|
2014-05-07 11:45:21 +04:00
|
|
|
#define ICPT_PROGRAM 0x08
|
2014-03-21 00:49:18 +04:00
|
|
|
#define ICPT_EXT_INT 0x14
|
2009-12-05 14:44:24 +03:00
|
|
|
#define ICPT_WAITPSW 0x1c
|
|
|
|
#define ICPT_SOFT_INTERCEPT 0x24
|
|
|
|
#define ICPT_CPU_STOP 0x28
|
2014-06-03 14:46:50 +04:00
|
|
|
#define ICPT_OPEREXC 0x2c
|
2009-12-05 14:44:24 +03:00
|
|
|
#define ICPT_IO 0x40
|
2020-03-19 16:19:11 +03:00
|
|
|
#define ICPT_PV_INSTR 0x68
|
|
|
|
#define ICPT_PV_INSTR_NOTIFICATION 0x6c
|
2009-12-05 14:44:24 +03:00
|
|
|
|
2015-03-02 19:44:24 +03:00
|
|
|
#define NR_LOCAL_IRQS 32
|
|
|
|
/*
|
|
|
|
* Needs to be big enough to contain max_cpus emergency signals
|
|
|
|
* and in addition NR_LOCAL_IRQS interrupts
|
|
|
|
*/
|
2019-05-18 23:54:24 +03:00
|
|
|
#define VCPU_IRQ_BUF_SIZE(max_cpus) (sizeof(struct kvm_s390_irq) * \
|
|
|
|
(max_cpus + NR_LOCAL_IRQS))
|
2019-09-24 17:47:51 +03:00
|
|
|
/*
|
|
|
|
* KVM does only support memory slots up to KVM_MEM_MAX_NR_PAGES pages
|
|
|
|
* as the dirty bitmap must be managed by bitops that take an int as
|
2019-09-25 10:45:50 +03:00
|
|
|
* position indicator. This would end at an unaligned address
|
|
|
|
* (0x7fffff00000). As future variants might provide larger pages
|
|
|
|
* and to make all addresses properly aligned, let us split at 4TB.
|
2019-09-24 17:47:51 +03:00
|
|
|
*/
|
2019-09-25 10:45:50 +03:00
|
|
|
#define KVM_SLOT_MAX_BYTES (4UL * TiB)
|
2015-03-02 19:44:24 +03:00
|
|
|
|
2012-09-03 15:09:10 +04:00
|
|
|
static CPUWatchpoint hw_watchpoint;
|
|
|
|
/*
|
|
|
|
* We don't use a list because this structure is also used to transmit the
|
|
|
|
* hardware breakpoints to the kernel.
|
|
|
|
*/
|
|
|
|
static struct kvm_hw_breakpoint *hw_breakpoints;
|
|
|
|
static int nb_hw_breakpoints;
|
|
|
|
|
2011-01-21 23:48:17 +03:00
|
|
|
const KVMCapabilityInfo kvm_arch_required_capabilities[] = {
|
|
|
|
KVM_CAP_LAST_INFO
|
|
|
|
};
|
|
|
|
|
2012-10-29 06:13:21 +04:00
|
|
|
static int cap_sync_regs;
|
2013-09-05 15:54:39 +04:00
|
|
|
static int cap_async_pf;
|
2015-02-06 17:54:58 +03:00
|
|
|
static int cap_mem_op;
|
target/s390x: kvm: Honor storage keys during emulation
Storage key controlled protection is currently not honored when
emulating instructions.
If available, enable key protection for the MEM_OP ioctl, thereby
enabling it for the s390_cpu_virt_mem_* functions, when using kvm.
As a result, the emulation of the following instructions honors storage
keys:
* CLP
The Synch I/O CLP command would need special handling in order
to support storage keys, but is currently not supported.
* CHSC
Performing commands asynchronously would require special
handling, but commands are currently always synchronous.
* STSI
* TSCH
Must (and does) not change channel if terminated due to
protection.
* MSCH
Suppressed on protection, works because fetching instruction.
* SSCH
Suppressed on protection, works because fetching instruction.
* STSCH
* STCRW
Suppressed on protection, this works because no partial store is
possible, because the operand cannot span multiple pages.
* PCISTB
* MPCIFC
* STPCIFC
Signed-off-by: Janis Schoetterl-Glausch <scgl@linux.ibm.com>
Message-Id: <20220506153956.2217601-3-scgl@linux.ibm.com>
Signed-off-by: Thomas Huth <thuth@redhat.com>
2022-05-06 18:39:56 +03:00
|
|
|
static int cap_mem_op_extension;
|
2014-12-18 19:38:05 +03:00
|
|
|
static int cap_s390_irq;
|
2016-03-09 15:11:17 +03:00
|
|
|
static int cap_ri;
|
2018-08-02 10:02:01 +03:00
|
|
|
static int cap_hpage_1m;
|
2020-02-14 18:16:21 +03:00
|
|
|
static int cap_vcpu_resets;
|
2020-03-19 16:19:12 +03:00
|
|
|
static int cap_protected;
|
2022-09-02 20:27:32 +03:00
|
|
|
static int cap_zpci_op;
|
2022-10-17 11:38:18 +03:00
|
|
|
static int cap_protected_dump;
|
2012-10-29 06:13:21 +04:00
|
|
|
|
target/s390x: kvm: Honor storage keys during emulation
Storage key controlled protection is currently not honored when
emulating instructions.
If available, enable key protection for the MEM_OP ioctl, thereby
enabling it for the s390_cpu_virt_mem_* functions, when using kvm.
As a result, the emulation of the following instructions honors storage
keys:
* CLP
The Synch I/O CLP command would need special handling in order
to support storage keys, but is currently not supported.
* CHSC
Performing commands asynchronously would require special
handling, but commands are currently always synchronous.
* STSI
* TSCH
Must (and does) not change channel if terminated due to
protection.
* MSCH
Suppressed on protection, works because fetching instruction.
* SSCH
Suppressed on protection, works because fetching instruction.
* STSCH
* STCRW
Suppressed on protection, this works because no partial store is
possible, because the operand cannot span multiple pages.
* PCISTB
* MPCIFC
* STPCIFC
Signed-off-by: Janis Schoetterl-Glausch <scgl@linux.ibm.com>
Message-Id: <20220506153956.2217601-3-scgl@linux.ibm.com>
Signed-off-by: Thomas Huth <thuth@redhat.com>
2022-05-06 18:39:56 +03:00
|
|
|
static bool mem_op_storage_key_support;
|
|
|
|
|
2017-05-29 15:19:02 +03:00
|
|
|
static int active_cmma;
|
|
|
|
|
2017-08-18 14:43:37 +03:00
|
|
|
static int kvm_s390_query_mem_limit(uint64_t *memory_limit)
|
2015-03-05 18:56:21 +03:00
|
|
|
{
|
|
|
|
struct kvm_device_attr attr = {
|
|
|
|
.group = KVM_S390_VM_MEM_CTRL,
|
|
|
|
.attr = KVM_S390_VM_MEM_LIMIT_SIZE,
|
|
|
|
.addr = (uint64_t) memory_limit,
|
|
|
|
};
|
|
|
|
|
2017-08-18 14:43:37 +03:00
|
|
|
return kvm_vm_ioctl(kvm_state, KVM_GET_DEVICE_ATTR, &attr);
|
2015-03-05 18:56:21 +03:00
|
|
|
}
|
|
|
|
|
2017-08-18 14:43:37 +03:00
|
|
|
int kvm_s390_set_mem_limit(uint64_t new_limit, uint64_t *hw_limit)
|
2015-03-05 18:56:21 +03:00
|
|
|
{
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
struct kvm_device_attr attr = {
|
|
|
|
.group = KVM_S390_VM_MEM_CTRL,
|
|
|
|
.attr = KVM_S390_VM_MEM_LIMIT_SIZE,
|
|
|
|
.addr = (uint64_t) &new_limit,
|
|
|
|
};
|
|
|
|
|
2017-08-18 14:43:37 +03:00
|
|
|
if (!kvm_vm_check_mem_attr(kvm_state, KVM_S390_VM_MEM_LIMIT_SIZE)) {
|
2015-03-05 18:56:21 +03:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2017-08-18 14:43:37 +03:00
|
|
|
rc = kvm_s390_query_mem_limit(hw_limit);
|
2015-03-05 18:56:21 +03:00
|
|
|
if (rc) {
|
|
|
|
return rc;
|
|
|
|
} else if (*hw_limit < new_limit) {
|
|
|
|
return -E2BIG;
|
|
|
|
}
|
|
|
|
|
2017-08-18 14:43:37 +03:00
|
|
|
return kvm_vm_ioctl(kvm_state, KVM_SET_DEVICE_ATTR, &attr);
|
2015-03-05 18:56:21 +03:00
|
|
|
}
|
|
|
|
|
2017-05-29 15:19:02 +03:00
|
|
|
int kvm_s390_cmma_active(void)
|
|
|
|
{
|
|
|
|
return active_cmma;
|
|
|
|
}
|
|
|
|
|
2016-09-05 11:52:37 +03:00
|
|
|
static bool kvm_s390_cmma_available(void)
|
|
|
|
{
|
|
|
|
static bool initialized, value;
|
|
|
|
|
|
|
|
if (!initialized) {
|
|
|
|
initialized = true;
|
|
|
|
value = kvm_vm_check_mem_attr(kvm_state, KVM_S390_VM_MEM_ENABLE_CMMA) &&
|
|
|
|
kvm_vm_check_mem_attr(kvm_state, KVM_S390_VM_MEM_CLR_CMMA);
|
|
|
|
}
|
|
|
|
return value;
|
|
|
|
}
|
|
|
|
|
2015-07-21 12:11:11 +03:00
|
|
|
void kvm_s390_cmma_reset(void)
|
2014-04-11 15:47:40 +04:00
|
|
|
{
|
|
|
|
int rc;
|
|
|
|
struct kvm_device_attr attr = {
|
|
|
|
.group = KVM_S390_VM_MEM_CTRL,
|
|
|
|
.attr = KVM_S390_VM_MEM_CLR_CMMA,
|
|
|
|
};
|
|
|
|
|
2017-05-29 15:19:02 +03:00
|
|
|
if (!kvm_s390_cmma_active()) {
|
2016-09-05 11:52:37 +03:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2015-07-21 12:11:11 +03:00
|
|
|
rc = kvm_vm_ioctl(kvm_state, KVM_SET_DEVICE_ATTR, &attr);
|
2014-04-11 15:47:40 +04:00
|
|
|
trace_kvm_clear_cmma(rc);
|
|
|
|
}
|
|
|
|
|
2016-09-05 11:52:37 +03:00
|
|
|
static void kvm_s390_enable_cmma(void)
|
2014-04-11 15:47:40 +04:00
|
|
|
{
|
|
|
|
int rc;
|
|
|
|
struct kvm_device_attr attr = {
|
|
|
|
.group = KVM_S390_VM_MEM_CTRL,
|
|
|
|
.attr = KVM_S390_VM_MEM_ENABLE_CMMA,
|
|
|
|
};
|
|
|
|
|
2018-08-02 10:02:01 +03:00
|
|
|
if (cap_hpage_1m) {
|
2017-09-11 22:52:46 +03:00
|
|
|
warn_report("CMM will not be enabled because it is not "
|
2018-08-02 10:02:01 +03:00
|
|
|
"compatible with huge memory backings.");
|
2017-05-29 15:19:02 +03:00
|
|
|
return;
|
|
|
|
}
|
2016-09-05 11:52:37 +03:00
|
|
|
rc = kvm_vm_ioctl(kvm_state, KVM_SET_DEVICE_ATTR, &attr);
|
2017-05-29 15:19:02 +03:00
|
|
|
active_cmma = !rc;
|
2014-04-11 15:47:40 +04:00
|
|
|
trace_kvm_enable_cmma(rc);
|
|
|
|
}
|
|
|
|
|
2015-03-12 15:53:51 +03:00
|
|
|
static void kvm_s390_set_attr(uint64_t attr)
|
|
|
|
{
|
|
|
|
struct kvm_device_attr attribute = {
|
|
|
|
.group = KVM_S390_VM_CRYPTO,
|
|
|
|
.attr = attr,
|
|
|
|
};
|
|
|
|
|
|
|
|
int ret = kvm_vm_ioctl(kvm_state, KVM_SET_DEVICE_ATTR, &attribute);
|
|
|
|
|
|
|
|
if (ret) {
|
|
|
|
error_report("Failed to set crypto device attribute %lu: %s",
|
|
|
|
attr, strerror(-ret));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void kvm_s390_init_aes_kw(void)
|
|
|
|
{
|
|
|
|
uint64_t attr = KVM_S390_VM_CRYPTO_DISABLE_AES_KW;
|
|
|
|
|
|
|
|
if (object_property_get_bool(OBJECT(qdev_get_machine()), "aes-key-wrap",
|
|
|
|
NULL)) {
|
|
|
|
attr = KVM_S390_VM_CRYPTO_ENABLE_AES_KW;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (kvm_vm_check_attr(kvm_state, KVM_S390_VM_CRYPTO, attr)) {
|
|
|
|
kvm_s390_set_attr(attr);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void kvm_s390_init_dea_kw(void)
|
|
|
|
{
|
|
|
|
uint64_t attr = KVM_S390_VM_CRYPTO_DISABLE_DEA_KW;
|
|
|
|
|
|
|
|
if (object_property_get_bool(OBJECT(qdev_get_machine()), "dea-key-wrap",
|
|
|
|
NULL)) {
|
|
|
|
attr = KVM_S390_VM_CRYPTO_ENABLE_DEA_KW;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (kvm_vm_check_attr(kvm_state, KVM_S390_VM_CRYPTO, attr)) {
|
|
|
|
kvm_s390_set_attr(attr);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-09-30 14:48:45 +03:00
|
|
|
void kvm_s390_crypto_reset(void)
|
2015-03-12 15:53:51 +03:00
|
|
|
{
|
2016-09-05 11:52:38 +03:00
|
|
|
if (s390_has_feat(S390_FEAT_MSA_EXT_3)) {
|
|
|
|
kvm_s390_init_aes_kw();
|
|
|
|
kvm_s390_init_dea_kw();
|
|
|
|
}
|
2015-03-12 15:53:51 +03:00
|
|
|
}
|
|
|
|
|
2019-04-17 14:31:42 +03:00
|
|
|
void kvm_s390_set_max_pagesize(uint64_t pagesize, Error **errp)
|
2018-08-02 10:02:01 +03:00
|
|
|
{
|
2019-04-17 14:31:42 +03:00
|
|
|
if (pagesize == 4 * KiB) {
|
|
|
|
return;
|
2018-08-02 10:02:01 +03:00
|
|
|
}
|
|
|
|
|
2018-09-28 12:34:35 +03:00
|
|
|
if (!hpage_1m_allowed()) {
|
2019-04-17 14:31:42 +03:00
|
|
|
error_setg(errp, "This QEMU machine does not support huge page "
|
|
|
|
"mappings");
|
|
|
|
return;
|
2018-09-28 12:34:35 +03:00
|
|
|
}
|
|
|
|
|
2019-04-17 14:31:42 +03:00
|
|
|
if (pagesize != 1 * MiB) {
|
|
|
|
error_setg(errp, "Memory backing with 2G pages was specified, "
|
|
|
|
"but KVM does not support this memory backing");
|
|
|
|
return;
|
2018-08-02 10:02:01 +03:00
|
|
|
}
|
|
|
|
|
2019-04-17 14:31:42 +03:00
|
|
|
if (kvm_vm_enable_cap(kvm_state, KVM_CAP_S390_HPAGE_1M, 0)) {
|
|
|
|
error_setg(errp, "Memory backing with 1M pages was specified, "
|
|
|
|
"but KVM does not support this memory backing");
|
|
|
|
return;
|
2018-08-02 10:02:01 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
cap_hpage_1m = 1;
|
|
|
|
}
|
|
|
|
|
2020-03-23 11:36:06 +03:00
|
|
|
int kvm_s390_get_hpage_1m(void)
|
|
|
|
{
|
|
|
|
return cap_hpage_1m;
|
|
|
|
}
|
|
|
|
|
s390x/kvm: Set default cpu model for all machine classes
We have to set the default model of all machine classes, not just for
the active one. Otherwise, "query-machines" will indicate the wrong
CPU model ("qemu-s390x-cpu" instead of "host-s390x-cpu") as
"default-cpu-type".
Doing a
{"execute":"query-machines"}
under KVM now results in
{"return": [
{
"hotpluggable-cpus": true,
"name": "s390-ccw-virtio-4.0",
"numa-mem-supported": false,
"default-cpu-type": "host-s390x-cpu",
"cpu-max": 248,
"deprecated": false},
{
"hotpluggable-cpus": true,
"name": "s390-ccw-virtio-2.7",
"numa-mem-supported": false,
"default-cpu-type": "host-s390x-cpu",
"cpu-max": 248,
"deprecated": false
} ...
Libvirt probes all machines via "-machine none,accel=kvm:tcg" and will
currently see the wrong CPU model under KVM.
Reported-by: Jiri Denemark <jdenemar@redhat.com>
Reviewed-by: Thomas Huth <thuth@redhat.com>
Fixes: b6805e127c6b ("s390x: use generic cpu_model parsing")
Cc: Igor Mammedov <imammedo@redhat.com>
Signed-off-by: David Hildenbrand <david@redhat.com>
Message-Id: <20191021100515.6978-1-david@redhat.com>
Signed-off-by: Cornelia Huck <cohuck@redhat.com>
2019-10-21 13:05:15 +03:00
|
|
|
static void ccw_machine_class_foreach(ObjectClass *oc, void *opaque)
|
2009-12-05 14:44:24 +03:00
|
|
|
{
|
s390x/kvm: Set default cpu model for all machine classes
We have to set the default model of all machine classes, not just for
the active one. Otherwise, "query-machines" will indicate the wrong
CPU model ("qemu-s390x-cpu" instead of "host-s390x-cpu") as
"default-cpu-type".
Doing a
{"execute":"query-machines"}
under KVM now results in
{"return": [
{
"hotpluggable-cpus": true,
"name": "s390-ccw-virtio-4.0",
"numa-mem-supported": false,
"default-cpu-type": "host-s390x-cpu",
"cpu-max": 248,
"deprecated": false},
{
"hotpluggable-cpus": true,
"name": "s390-ccw-virtio-2.7",
"numa-mem-supported": false,
"default-cpu-type": "host-s390x-cpu",
"cpu-max": 248,
"deprecated": false
} ...
Libvirt probes all machines via "-machine none,accel=kvm:tcg" and will
currently see the wrong CPU model under KVM.
Reported-by: Jiri Denemark <jdenemar@redhat.com>
Reviewed-by: Thomas Huth <thuth@redhat.com>
Fixes: b6805e127c6b ("s390x: use generic cpu_model parsing")
Cc: Igor Mammedov <imammedo@redhat.com>
Signed-off-by: David Hildenbrand <david@redhat.com>
Message-Id: <20191021100515.6978-1-david@redhat.com>
Signed-off-by: Cornelia Huck <cohuck@redhat.com>
2019-10-21 13:05:15 +03:00
|
|
|
MachineClass *mc = MACHINE_CLASS(oc);
|
2017-09-21 15:59:08 +03:00
|
|
|
|
|
|
|
mc->default_cpu_type = S390_CPU_TYPE_NAME("host");
|
s390x/kvm: Set default cpu model for all machine classes
We have to set the default model of all machine classes, not just for
the active one. Otherwise, "query-machines" will indicate the wrong
CPU model ("qemu-s390x-cpu" instead of "host-s390x-cpu") as
"default-cpu-type".
Doing a
{"execute":"query-machines"}
under KVM now results in
{"return": [
{
"hotpluggable-cpus": true,
"name": "s390-ccw-virtio-4.0",
"numa-mem-supported": false,
"default-cpu-type": "host-s390x-cpu",
"cpu-max": 248,
"deprecated": false},
{
"hotpluggable-cpus": true,
"name": "s390-ccw-virtio-2.7",
"numa-mem-supported": false,
"default-cpu-type": "host-s390x-cpu",
"cpu-max": 248,
"deprecated": false
} ...
Libvirt probes all machines via "-machine none,accel=kvm:tcg" and will
currently see the wrong CPU model under KVM.
Reported-by: Jiri Denemark <jdenemar@redhat.com>
Reviewed-by: Thomas Huth <thuth@redhat.com>
Fixes: b6805e127c6b ("s390x: use generic cpu_model parsing")
Cc: Igor Mammedov <imammedo@redhat.com>
Signed-off-by: David Hildenbrand <david@redhat.com>
Message-Id: <20191021100515.6978-1-david@redhat.com>
Signed-off-by: Cornelia Huck <cohuck@redhat.com>
2019-10-21 13:05:15 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
int kvm_arch_init(MachineState *ms, KVMState *s)
|
|
|
|
{
|
|
|
|
object_class_foreach(ccw_machine_class_foreach, TYPE_S390_CCW_MACHINE,
|
|
|
|
false, NULL);
|
2019-09-13 12:14:43 +03:00
|
|
|
|
|
|
|
if (!kvm_check_extension(kvm_state, KVM_CAP_DEVICE_CTRL)) {
|
|
|
|
error_report("KVM is missing capability KVM_CAP_DEVICE_CTRL - "
|
|
|
|
"please use kernel 3.15 or newer");
|
|
|
|
return -1;
|
|
|
|
}
|
2021-03-03 16:09:15 +03:00
|
|
|
if (!kvm_check_extension(s, KVM_CAP_S390_COW)) {
|
|
|
|
error_report("KVM is missing capability KVM_CAP_S390_COW - "
|
|
|
|
"unsupported environment");
|
|
|
|
return -1;
|
|
|
|
}
|
2019-09-13 12:14:43 +03:00
|
|
|
|
2012-10-29 06:13:21 +04:00
|
|
|
cap_sync_regs = kvm_check_extension(s, KVM_CAP_SYNC_REGS);
|
2013-09-05 15:54:39 +04:00
|
|
|
cap_async_pf = kvm_check_extension(s, KVM_CAP_ASYNC_PF);
|
2015-02-06 17:54:58 +03:00
|
|
|
cap_mem_op = kvm_check_extension(s, KVM_CAP_S390_MEM_OP);
|
target/s390x: kvm: Honor storage keys during emulation
Storage key controlled protection is currently not honored when
emulating instructions.
If available, enable key protection for the MEM_OP ioctl, thereby
enabling it for the s390_cpu_virt_mem_* functions, when using kvm.
As a result, the emulation of the following instructions honors storage
keys:
* CLP
The Synch I/O CLP command would need special handling in order
to support storage keys, but is currently not supported.
* CHSC
Performing commands asynchronously would require special
handling, but commands are currently always synchronous.
* STSI
* TSCH
Must (and does) not change channel if terminated due to
protection.
* MSCH
Suppressed on protection, works because fetching instruction.
* SSCH
Suppressed on protection, works because fetching instruction.
* STSCH
* STCRW
Suppressed on protection, this works because no partial store is
possible, because the operand cannot span multiple pages.
* PCISTB
* MPCIFC
* STPCIFC
Signed-off-by: Janis Schoetterl-Glausch <scgl@linux.ibm.com>
Message-Id: <20220506153956.2217601-3-scgl@linux.ibm.com>
Signed-off-by: Thomas Huth <thuth@redhat.com>
2022-05-06 18:39:56 +03:00
|
|
|
cap_mem_op_extension = kvm_check_extension(s, KVM_CAP_S390_MEM_OP_EXTENSION);
|
|
|
|
mem_op_storage_key_support = cap_mem_op_extension > 0;
|
2014-12-18 19:38:05 +03:00
|
|
|
cap_s390_irq = kvm_check_extension(s, KVM_CAP_S390_INJECT_IRQ);
|
2020-02-14 18:16:21 +03:00
|
|
|
cap_vcpu_resets = kvm_check_extension(s, KVM_CAP_S390_VCPU_RESETS);
|
2020-03-19 16:19:12 +03:00
|
|
|
cap_protected = kvm_check_extension(s, KVM_CAP_S390_PROTECTED);
|
2022-09-02 20:27:32 +03:00
|
|
|
cap_zpci_op = kvm_check_extension(s, KVM_CAP_S390_ZPCI_OP);
|
2022-10-17 11:38:18 +03:00
|
|
|
cap_protected_dump = kvm_check_extension(s, KVM_CAP_S390_PROTECTED_DUMP);
|
2014-04-11 15:47:40 +04:00
|
|
|
|
2015-02-24 16:15:31 +03:00
|
|
|
kvm_vm_enable_cap(s, KVM_CAP_S390_USER_SIGP, 0);
|
2014-10-30 16:23:06 +03:00
|
|
|
kvm_vm_enable_cap(s, KVM_CAP_S390_VECTOR_REGISTERS, 0);
|
2015-03-03 20:35:27 +03:00
|
|
|
kvm_vm_enable_cap(s, KVM_CAP_S390_USER_STSI, 0);
|
2016-03-09 15:11:17 +03:00
|
|
|
if (ri_allowed()) {
|
|
|
|
if (kvm_vm_enable_cap(s, KVM_CAP_S390_RI, 0) == 0) {
|
|
|
|
cap_ri = 1;
|
|
|
|
}
|
|
|
|
}
|
2017-10-20 17:31:38 +03:00
|
|
|
if (cpu_model_allowed()) {
|
2021-06-02 15:50:50 +03:00
|
|
|
kvm_vm_enable_cap(s, KVM_CAP_S390_GS, 0);
|
2017-02-15 06:47:49 +03:00
|
|
|
}
|
2015-02-24 16:15:31 +03:00
|
|
|
|
2017-09-21 17:08:34 +03:00
|
|
|
/*
|
|
|
|
* The migration interface for ais was introduced with kernel 4.13
|
|
|
|
* but the capability itself had been active since 4.12. As migration
|
2020-01-22 13:14:37 +03:00
|
|
|
* support is considered necessary, we only try to enable this for
|
|
|
|
* newer machine types if KVM_CAP_S390_AIS_MIGRATION is available.
|
2017-09-21 17:08:34 +03:00
|
|
|
*/
|
2020-01-22 13:14:37 +03:00
|
|
|
if (cpu_model_allowed() && kvm_kernel_irqchip_allowed() &&
|
|
|
|
kvm_check_extension(s, KVM_CAP_S390_AIS_MIGRATION)) {
|
|
|
|
kvm_vm_enable_cap(s, KVM_CAP_S390_AIS, 0);
|
|
|
|
}
|
2017-06-14 08:25:58 +03:00
|
|
|
|
2019-09-24 17:47:51 +03:00
|
|
|
kvm_set_max_memslot_size(KVM_SLOT_MAX_BYTES);
|
2009-12-05 14:44:24 +03:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-11-13 13:17:12 +03:00
|
|
|
int kvm_arch_irqchip_create(KVMState *s)
|
2016-12-22 18:41:42 +03:00
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-01-23 00:25:01 +04:00
|
|
|
unsigned long kvm_arch_vcpu_id(CPUState *cpu)
|
|
|
|
{
|
|
|
|
return cpu->cpu_index;
|
|
|
|
}
|
|
|
|
|
2014-09-30 12:57:30 +04:00
|
|
|
int kvm_arch_init_vcpu(CPUState *cs)
|
2009-12-05 14:44:24 +03:00
|
|
|
{
|
2019-05-18 23:54:24 +03:00
|
|
|
unsigned int max_cpus = MACHINE(qdev_get_machine())->smp.max_cpus;
|
2014-09-30 12:57:30 +04:00
|
|
|
S390CPU *cpu = S390_CPU(cs);
|
|
|
|
kvm_s390_set_cpu_state(cpu, cpu->env.cpu_state);
|
2019-05-18 23:54:24 +03:00
|
|
|
cpu->irqstate = g_malloc0(VCPU_IRQ_BUF_SIZE(max_cpus));
|
2013-02-05 02:53:25 +04:00
|
|
|
return 0;
|
2009-12-05 14:44:24 +03:00
|
|
|
}
|
|
|
|
|
2019-06-19 19:21:32 +03:00
|
|
|
int kvm_arch_destroy_vcpu(CPUState *cs)
|
|
|
|
{
|
|
|
|
S390CPU *cpu = S390_CPU(cs);
|
|
|
|
|
|
|
|
g_free(cpu->irqstate);
|
|
|
|
cpu->irqstate = NULL;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-02-14 18:16:21 +03:00
|
|
|
static void kvm_s390_reset_vcpu(S390CPU *cpu, unsigned long type)
|
2009-12-05 14:44:24 +03:00
|
|
|
{
|
2013-03-20 16:11:56 +04:00
|
|
|
CPUState *cs = CPU(cpu);
|
|
|
|
|
2020-02-14 18:16:21 +03:00
|
|
|
/*
|
|
|
|
* The reset call is needed here to reset in-kernel vcpu data that
|
|
|
|
* we can't access directly from QEMU (i.e. with older kernels
|
|
|
|
* which don't support sync_regs/ONE_REG). Before this ioctl
|
|
|
|
* cpu_synchronize_state() is called in common kvm code
|
|
|
|
* (kvm-all).
|
|
|
|
*/
|
|
|
|
if (kvm_vcpu_ioctl(cs, type)) {
|
|
|
|
error_report("CPU reset failed on CPU %i type %lx",
|
|
|
|
cs->cpu_index, type);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void kvm_s390_reset_vcpu_initial(S390CPU *cpu)
|
|
|
|
{
|
|
|
|
kvm_s390_reset_vcpu(cpu, KVM_S390_INITIAL_RESET);
|
|
|
|
}
|
|
|
|
|
|
|
|
void kvm_s390_reset_vcpu_clear(S390CPU *cpu)
|
|
|
|
{
|
|
|
|
if (cap_vcpu_resets) {
|
|
|
|
kvm_s390_reset_vcpu(cpu, KVM_S390_CLEAR_RESET);
|
|
|
|
} else {
|
|
|
|
kvm_s390_reset_vcpu(cpu, KVM_S390_INITIAL_RESET);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void kvm_s390_reset_vcpu_normal(S390CPU *cpu)
|
|
|
|
{
|
|
|
|
if (cap_vcpu_resets) {
|
|
|
|
kvm_s390_reset_vcpu(cpu, KVM_S390_NORMAL_RESET);
|
2013-01-07 09:27:14 +04:00
|
|
|
}
|
2009-12-05 14:44:24 +03:00
|
|
|
}
|
|
|
|
|
2014-12-03 17:38:30 +03:00
|
|
|
static int can_sync_regs(CPUState *cs, int regs)
|
|
|
|
{
|
|
|
|
return cap_sync_regs && (cs->kvm_run->kvm_valid_regs & regs) == regs;
|
|
|
|
}
|
|
|
|
|
2012-10-31 09:57:49 +04:00
|
|
|
int kvm_arch_put_registers(CPUState *cs, int level)
|
2009-12-05 14:44:24 +03:00
|
|
|
{
|
2012-10-31 09:57:49 +04:00
|
|
|
S390CPU *cpu = S390_CPU(cs);
|
|
|
|
CPUS390XState *env = &cpu->env;
|
2012-10-29 06:13:21 +04:00
|
|
|
struct kvm_sregs sregs;
|
2009-12-05 14:44:24 +03:00
|
|
|
struct kvm_regs regs;
|
2014-10-30 12:05:28 +03:00
|
|
|
struct kvm_fpu fpu = {};
|
2014-04-03 17:54:58 +04:00
|
|
|
int r;
|
2009-12-05 14:44:24 +03:00
|
|
|
int i;
|
|
|
|
|
2012-10-29 06:13:21 +04:00
|
|
|
/* always save the PSW and the GPRS*/
|
2012-12-01 09:18:14 +04:00
|
|
|
cs->kvm_run->psw_addr = env->psw.addr;
|
|
|
|
cs->kvm_run->psw_mask = env->psw.mask;
|
2009-12-05 14:44:24 +03:00
|
|
|
|
2014-12-03 17:38:30 +03:00
|
|
|
if (can_sync_regs(cs, KVM_SYNC_GPRS)) {
|
2012-10-29 06:13:21 +04:00
|
|
|
for (i = 0; i < 16; i++) {
|
2012-12-01 09:18:14 +04:00
|
|
|
cs->kvm_run->s.regs.gprs[i] = env->regs[i];
|
|
|
|
cs->kvm_run->kvm_dirty_regs |= KVM_SYNC_GPRS;
|
2012-10-29 06:13:21 +04:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
for (i = 0; i < 16; i++) {
|
|
|
|
regs.gprs[i] = env->regs[i];
|
|
|
|
}
|
2014-04-03 17:54:58 +04:00
|
|
|
r = kvm_vcpu_ioctl(cs, KVM_SET_REGS, ®s);
|
|
|
|
if (r < 0) {
|
|
|
|
return r;
|
2012-10-29 06:13:21 +04:00
|
|
|
}
|
2009-12-05 14:44:24 +03:00
|
|
|
}
|
|
|
|
|
2014-08-18 23:33:39 +04:00
|
|
|
if (can_sync_regs(cs, KVM_SYNC_VRS)) {
|
|
|
|
for (i = 0; i < 32; i++) {
|
2019-05-29 10:15:38 +03:00
|
|
|
cs->kvm_run->s.regs.vrs[i][0] = env->vregs[i][0];
|
|
|
|
cs->kvm_run->s.regs.vrs[i][1] = env->vregs[i][1];
|
2014-08-18 23:33:39 +04:00
|
|
|
}
|
|
|
|
cs->kvm_run->s.regs.fpc = env->fpc;
|
|
|
|
cs->kvm_run->kvm_dirty_regs |= KVM_SYNC_VRS;
|
2016-02-02 11:08:58 +03:00
|
|
|
} else if (can_sync_regs(cs, KVM_SYNC_FPRS)) {
|
|
|
|
for (i = 0; i < 16; i++) {
|
2019-05-29 10:15:38 +03:00
|
|
|
cs->kvm_run->s.regs.fprs[i] = *get_freg(env, i);
|
2016-02-02 11:08:58 +03:00
|
|
|
}
|
|
|
|
cs->kvm_run->s.regs.fpc = env->fpc;
|
|
|
|
cs->kvm_run->kvm_dirty_regs |= KVM_SYNC_FPRS;
|
2014-08-18 23:33:39 +04:00
|
|
|
} else {
|
|
|
|
/* Floating point */
|
|
|
|
for (i = 0; i < 16; i++) {
|
2019-05-29 10:15:38 +03:00
|
|
|
fpu.fprs[i] = *get_freg(env, i);
|
2014-08-18 23:33:39 +04:00
|
|
|
}
|
|
|
|
fpu.fpc = env->fpc;
|
2012-11-29 19:09:42 +04:00
|
|
|
|
2014-08-18 23:33:39 +04:00
|
|
|
r = kvm_vcpu_ioctl(cs, KVM_SET_FPU, &fpu);
|
|
|
|
if (r < 0) {
|
|
|
|
return r;
|
|
|
|
}
|
2012-11-29 19:09:42 +04:00
|
|
|
}
|
|
|
|
|
2013-10-01 18:28:23 +04:00
|
|
|
/* Do we need to save more than that? */
|
|
|
|
if (level == KVM_PUT_RUNTIME_STATE) {
|
|
|
|
return 0;
|
|
|
|
}
|
2013-04-25 08:25:50 +04:00
|
|
|
|
2014-12-03 17:38:31 +03:00
|
|
|
if (can_sync_regs(cs, KVM_SYNC_ARCH0)) {
|
|
|
|
cs->kvm_run->s.regs.cputm = env->cputm;
|
|
|
|
cs->kvm_run->s.regs.ckc = env->ckc;
|
|
|
|
cs->kvm_run->s.regs.todpr = env->todpr;
|
|
|
|
cs->kvm_run->s.regs.gbea = env->gbea;
|
|
|
|
cs->kvm_run->s.regs.pp = env->pp;
|
|
|
|
cs->kvm_run->kvm_dirty_regs |= KVM_SYNC_ARCH0;
|
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* These ONE_REGS are not protected by a capability. As they are only
|
|
|
|
* necessary for migration we just trace a possible error, but don't
|
|
|
|
* return with an error return code.
|
|
|
|
*/
|
|
|
|
kvm_set_one_reg(cs, KVM_REG_S390_CPU_TIMER, &env->cputm);
|
|
|
|
kvm_set_one_reg(cs, KVM_REG_S390_CLOCK_COMP, &env->ckc);
|
|
|
|
kvm_set_one_reg(cs, KVM_REG_S390_TODPR, &env->todpr);
|
|
|
|
kvm_set_one_reg(cs, KVM_REG_S390_GBEA, &env->gbea);
|
|
|
|
kvm_set_one_reg(cs, KVM_REG_S390_PP, &env->pp);
|
|
|
|
}
|
|
|
|
|
2016-03-09 15:11:17 +03:00
|
|
|
if (can_sync_regs(cs, KVM_SYNC_RICCB)) {
|
|
|
|
memcpy(cs->kvm_run->s.regs.riccb, env->riccb, 64);
|
|
|
|
cs->kvm_run->kvm_dirty_regs |= KVM_SYNC_RICCB;
|
|
|
|
}
|
|
|
|
|
2014-12-03 17:38:31 +03:00
|
|
|
/* pfault parameters */
|
|
|
|
if (can_sync_regs(cs, KVM_SYNC_PFAULT)) {
|
|
|
|
cs->kvm_run->s.regs.pft = env->pfault_token;
|
|
|
|
cs->kvm_run->s.regs.pfs = env->pfault_select;
|
|
|
|
cs->kvm_run->s.regs.pfc = env->pfault_compare;
|
|
|
|
cs->kvm_run->kvm_dirty_regs |= KVM_SYNC_PFAULT;
|
|
|
|
} else if (cap_async_pf) {
|
2014-04-03 17:54:58 +04:00
|
|
|
r = kvm_set_one_reg(cs, KVM_REG_S390_PFTOKEN, &env->pfault_token);
|
|
|
|
if (r < 0) {
|
|
|
|
return r;
|
2013-09-05 15:54:39 +04:00
|
|
|
}
|
2014-04-03 17:54:58 +04:00
|
|
|
r = kvm_set_one_reg(cs, KVM_REG_S390_PFCOMPARE, &env->pfault_compare);
|
|
|
|
if (r < 0) {
|
|
|
|
return r;
|
2013-09-05 15:54:39 +04:00
|
|
|
}
|
2014-04-03 17:54:58 +04:00
|
|
|
r = kvm_set_one_reg(cs, KVM_REG_S390_PFSELECT, &env->pfault_select);
|
|
|
|
if (r < 0) {
|
|
|
|
return r;
|
2013-09-05 15:54:39 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-12-03 17:38:30 +03:00
|
|
|
/* access registers and control registers*/
|
|
|
|
if (can_sync_regs(cs, KVM_SYNC_ACRS | KVM_SYNC_CRS)) {
|
2012-10-29 06:13:21 +04:00
|
|
|
for (i = 0; i < 16; i++) {
|
2012-12-01 09:18:14 +04:00
|
|
|
cs->kvm_run->s.regs.acrs[i] = env->aregs[i];
|
|
|
|
cs->kvm_run->s.regs.crs[i] = env->cregs[i];
|
2012-10-29 06:13:21 +04:00
|
|
|
}
|
2012-12-01 09:18:14 +04:00
|
|
|
cs->kvm_run->kvm_dirty_regs |= KVM_SYNC_ACRS;
|
|
|
|
cs->kvm_run->kvm_dirty_regs |= KVM_SYNC_CRS;
|
2012-10-29 06:13:21 +04:00
|
|
|
} else {
|
|
|
|
for (i = 0; i < 16; i++) {
|
|
|
|
sregs.acrs[i] = env->aregs[i];
|
|
|
|
sregs.crs[i] = env->cregs[i];
|
|
|
|
}
|
2014-04-03 17:54:58 +04:00
|
|
|
r = kvm_vcpu_ioctl(cs, KVM_SET_SREGS, &sregs);
|
|
|
|
if (r < 0) {
|
|
|
|
return r;
|
2012-10-29 06:13:21 +04:00
|
|
|
}
|
|
|
|
}
|
2009-12-05 14:44:24 +03:00
|
|
|
|
2017-02-15 06:47:49 +03:00
|
|
|
if (can_sync_regs(cs, KVM_SYNC_GSCB)) {
|
|
|
|
memcpy(cs->kvm_run->s.regs.gscb, env->gscb, 32);
|
|
|
|
cs->kvm_run->kvm_dirty_regs |= KVM_SYNC_GSCB;
|
|
|
|
}
|
|
|
|
|
2018-01-18 11:56:27 +03:00
|
|
|
if (can_sync_regs(cs, KVM_SYNC_BPBC)) {
|
|
|
|
cs->kvm_run->s.regs.bpbc = env->bpbc;
|
|
|
|
cs->kvm_run->kvm_dirty_regs |= KVM_SYNC_BPBC;
|
|
|
|
}
|
|
|
|
|
2018-07-31 12:04:48 +03:00
|
|
|
if (can_sync_regs(cs, KVM_SYNC_ETOKEN)) {
|
|
|
|
cs->kvm_run->s.regs.etoken = env->etoken;
|
|
|
|
cs->kvm_run->s.regs.etoken_extension = env->etoken_extension;
|
|
|
|
cs->kvm_run->kvm_dirty_regs |= KVM_SYNC_ETOKEN;
|
|
|
|
}
|
|
|
|
|
2020-09-15 22:44:16 +03:00
|
|
|
if (can_sync_regs(cs, KVM_SYNC_DIAG318)) {
|
|
|
|
cs->kvm_run->s.regs.diag318 = env->diag318_info;
|
|
|
|
cs->kvm_run->kvm_dirty_regs |= KVM_SYNC_DIAG318;
|
|
|
|
}
|
|
|
|
|
2012-10-29 06:13:21 +04:00
|
|
|
/* Finally the prefix */
|
2014-12-03 17:38:30 +03:00
|
|
|
if (can_sync_regs(cs, KVM_SYNC_PREFIX)) {
|
2012-12-01 09:18:14 +04:00
|
|
|
cs->kvm_run->s.regs.prefix = env->psa;
|
|
|
|
cs->kvm_run->kvm_dirty_regs |= KVM_SYNC_PREFIX;
|
2012-10-29 06:13:21 +04:00
|
|
|
} else {
|
|
|
|
/* prefix is only supported via sync regs */
|
|
|
|
}
|
|
|
|
return 0;
|
2009-12-05 14:44:24 +03:00
|
|
|
}
|
|
|
|
|
2012-10-31 09:57:49 +04:00
|
|
|
int kvm_arch_get_registers(CPUState *cs)
|
2013-04-25 08:25:50 +04:00
|
|
|
{
|
|
|
|
S390CPU *cpu = S390_CPU(cs);
|
|
|
|
CPUS390XState *env = &cpu->env;
|
2012-10-29 06:13:21 +04:00
|
|
|
struct kvm_sregs sregs;
|
2009-12-05 14:44:24 +03:00
|
|
|
struct kvm_regs regs;
|
2012-11-29 19:09:42 +04:00
|
|
|
struct kvm_fpu fpu;
|
2013-10-01 18:28:23 +04:00
|
|
|
int i, r;
|
2013-04-25 08:25:50 +04:00
|
|
|
|
2012-10-29 06:13:21 +04:00
|
|
|
/* get the PSW */
|
2012-12-01 09:18:14 +04:00
|
|
|
env->psw.addr = cs->kvm_run->psw_addr;
|
|
|
|
env->psw.mask = cs->kvm_run->psw_mask;
|
2012-10-29 06:13:21 +04:00
|
|
|
|
|
|
|
/* the GPRS */
|
2014-12-03 17:38:30 +03:00
|
|
|
if (can_sync_regs(cs, KVM_SYNC_GPRS)) {
|
2012-10-29 06:13:21 +04:00
|
|
|
for (i = 0; i < 16; i++) {
|
2012-12-01 09:18:14 +04:00
|
|
|
env->regs[i] = cs->kvm_run->s.regs.gprs[i];
|
2012-10-29 06:13:21 +04:00
|
|
|
}
|
|
|
|
} else {
|
2013-10-01 18:28:23 +04:00
|
|
|
r = kvm_vcpu_ioctl(cs, KVM_GET_REGS, ®s);
|
|
|
|
if (r < 0) {
|
|
|
|
return r;
|
2012-10-29 06:13:21 +04:00
|
|
|
}
|
|
|
|
for (i = 0; i < 16; i++) {
|
|
|
|
env->regs[i] = regs.gprs[i];
|
|
|
|
}
|
2009-12-05 14:44:24 +03:00
|
|
|
}
|
|
|
|
|
2012-10-29 06:13:21 +04:00
|
|
|
/* The ACRS and CRS */
|
2014-12-03 17:38:30 +03:00
|
|
|
if (can_sync_regs(cs, KVM_SYNC_ACRS | KVM_SYNC_CRS)) {
|
2012-10-29 06:13:21 +04:00
|
|
|
for (i = 0; i < 16; i++) {
|
2012-12-01 09:18:14 +04:00
|
|
|
env->aregs[i] = cs->kvm_run->s.regs.acrs[i];
|
|
|
|
env->cregs[i] = cs->kvm_run->s.regs.crs[i];
|
2012-10-29 06:13:21 +04:00
|
|
|
}
|
|
|
|
} else {
|
2013-10-01 18:28:23 +04:00
|
|
|
r = kvm_vcpu_ioctl(cs, KVM_GET_SREGS, &sregs);
|
|
|
|
if (r < 0) {
|
|
|
|
return r;
|
2012-10-29 06:13:21 +04:00
|
|
|
}
|
|
|
|
for (i = 0; i < 16; i++) {
|
|
|
|
env->aregs[i] = sregs.acrs[i];
|
|
|
|
env->cregs[i] = sregs.crs[i];
|
|
|
|
}
|
2009-12-05 14:44:24 +03:00
|
|
|
}
|
|
|
|
|
2014-08-18 23:33:39 +04:00
|
|
|
/* Floating point and vector registers */
|
|
|
|
if (can_sync_regs(cs, KVM_SYNC_VRS)) {
|
|
|
|
for (i = 0; i < 32; i++) {
|
2019-05-29 10:15:38 +03:00
|
|
|
env->vregs[i][0] = cs->kvm_run->s.regs.vrs[i][0];
|
|
|
|
env->vregs[i][1] = cs->kvm_run->s.regs.vrs[i][1];
|
2014-08-18 23:33:39 +04:00
|
|
|
}
|
|
|
|
env->fpc = cs->kvm_run->s.regs.fpc;
|
2016-02-02 11:08:58 +03:00
|
|
|
} else if (can_sync_regs(cs, KVM_SYNC_FPRS)) {
|
|
|
|
for (i = 0; i < 16; i++) {
|
2019-05-29 10:15:38 +03:00
|
|
|
*get_freg(env, i) = cs->kvm_run->s.regs.fprs[i];
|
2016-02-02 11:08:58 +03:00
|
|
|
}
|
|
|
|
env->fpc = cs->kvm_run->s.regs.fpc;
|
2014-08-18 23:33:39 +04:00
|
|
|
} else {
|
|
|
|
r = kvm_vcpu_ioctl(cs, KVM_GET_FPU, &fpu);
|
|
|
|
if (r < 0) {
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
for (i = 0; i < 16; i++) {
|
2019-05-29 10:15:38 +03:00
|
|
|
*get_freg(env, i) = fpu.fprs[i];
|
2014-08-18 23:33:39 +04:00
|
|
|
}
|
|
|
|
env->fpc = fpu.fpc;
|
2012-11-29 19:09:42 +04:00
|
|
|
}
|
|
|
|
|
2013-10-01 18:28:23 +04:00
|
|
|
/* The prefix */
|
2014-12-03 17:38:30 +03:00
|
|
|
if (can_sync_regs(cs, KVM_SYNC_PREFIX)) {
|
2012-12-01 09:18:14 +04:00
|
|
|
env->psa = cs->kvm_run->s.regs.prefix;
|
2012-10-29 06:13:21 +04:00
|
|
|
}
|
2009-12-05 14:44:24 +03:00
|
|
|
|
2014-12-03 17:38:31 +03:00
|
|
|
if (can_sync_regs(cs, KVM_SYNC_ARCH0)) {
|
|
|
|
env->cputm = cs->kvm_run->s.regs.cputm;
|
|
|
|
env->ckc = cs->kvm_run->s.regs.ckc;
|
|
|
|
env->todpr = cs->kvm_run->s.regs.todpr;
|
|
|
|
env->gbea = cs->kvm_run->s.regs.gbea;
|
|
|
|
env->pp = cs->kvm_run->s.regs.pp;
|
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* These ONE_REGS are not protected by a capability. As they are only
|
|
|
|
* necessary for migration we just trace a possible error, but don't
|
|
|
|
* return with an error return code.
|
|
|
|
*/
|
|
|
|
kvm_get_one_reg(cs, KVM_REG_S390_CPU_TIMER, &env->cputm);
|
|
|
|
kvm_get_one_reg(cs, KVM_REG_S390_CLOCK_COMP, &env->ckc);
|
|
|
|
kvm_get_one_reg(cs, KVM_REG_S390_TODPR, &env->todpr);
|
|
|
|
kvm_get_one_reg(cs, KVM_REG_S390_GBEA, &env->gbea);
|
|
|
|
kvm_get_one_reg(cs, KVM_REG_S390_PP, &env->pp);
|
|
|
|
}
|
|
|
|
|
2016-03-09 15:11:17 +03:00
|
|
|
if (can_sync_regs(cs, KVM_SYNC_RICCB)) {
|
|
|
|
memcpy(env->riccb, cs->kvm_run->s.regs.riccb, 64);
|
|
|
|
}
|
|
|
|
|
2017-02-15 06:47:49 +03:00
|
|
|
if (can_sync_regs(cs, KVM_SYNC_GSCB)) {
|
|
|
|
memcpy(env->gscb, cs->kvm_run->s.regs.gscb, 32);
|
|
|
|
}
|
|
|
|
|
2018-01-18 11:56:27 +03:00
|
|
|
if (can_sync_regs(cs, KVM_SYNC_BPBC)) {
|
|
|
|
env->bpbc = cs->kvm_run->s.regs.bpbc;
|
|
|
|
}
|
|
|
|
|
2018-07-31 12:04:48 +03:00
|
|
|
if (can_sync_regs(cs, KVM_SYNC_ETOKEN)) {
|
|
|
|
env->etoken = cs->kvm_run->s.regs.etoken;
|
|
|
|
env->etoken_extension = cs->kvm_run->s.regs.etoken_extension;
|
|
|
|
}
|
|
|
|
|
2014-12-03 17:38:31 +03:00
|
|
|
/* pfault parameters */
|
|
|
|
if (can_sync_regs(cs, KVM_SYNC_PFAULT)) {
|
|
|
|
env->pfault_token = cs->kvm_run->s.regs.pft;
|
|
|
|
env->pfault_select = cs->kvm_run->s.regs.pfs;
|
|
|
|
env->pfault_compare = cs->kvm_run->s.regs.pfc;
|
|
|
|
} else if (cap_async_pf) {
|
2014-04-03 17:54:58 +04:00
|
|
|
r = kvm_get_one_reg(cs, KVM_REG_S390_PFTOKEN, &env->pfault_token);
|
2013-09-05 15:54:39 +04:00
|
|
|
if (r < 0) {
|
|
|
|
return r;
|
|
|
|
}
|
2014-04-03 17:54:58 +04:00
|
|
|
r = kvm_get_one_reg(cs, KVM_REG_S390_PFCOMPARE, &env->pfault_compare);
|
2013-09-05 15:54:39 +04:00
|
|
|
if (r < 0) {
|
|
|
|
return r;
|
|
|
|
}
|
2014-04-03 17:54:58 +04:00
|
|
|
r = kvm_get_one_reg(cs, KVM_REG_S390_PFSELECT, &env->pfault_select);
|
2013-09-05 15:54:39 +04:00
|
|
|
if (r < 0) {
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-09-15 22:44:16 +03:00
|
|
|
if (can_sync_regs(cs, KVM_SYNC_DIAG318)) {
|
|
|
|
env->diag318_info = cs->kvm_run->s.regs.diag318;
|
|
|
|
}
|
|
|
|
|
2009-12-05 14:44:24 +03:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-03-09 17:56:08 +03:00
|
|
|
int kvm_s390_get_clock(uint8_t *tod_high, uint64_t *tod_low)
|
|
|
|
{
|
|
|
|
int r;
|
|
|
|
struct kvm_device_attr attr = {
|
|
|
|
.group = KVM_S390_VM_TOD,
|
|
|
|
.attr = KVM_S390_VM_TOD_LOW,
|
|
|
|
.addr = (uint64_t)tod_low,
|
|
|
|
};
|
|
|
|
|
|
|
|
r = kvm_vm_ioctl(kvm_state, KVM_GET_DEVICE_ATTR, &attr);
|
|
|
|
if (r) {
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
|
|
|
attr.attr = KVM_S390_VM_TOD_HIGH;
|
|
|
|
attr.addr = (uint64_t)tod_high;
|
|
|
|
return kvm_vm_ioctl(kvm_state, KVM_GET_DEVICE_ATTR, &attr);
|
|
|
|
}
|
|
|
|
|
2017-10-04 13:57:50 +03:00
|
|
|
int kvm_s390_get_clock_ext(uint8_t *tod_high, uint64_t *tod_low)
|
2015-03-09 17:56:08 +03:00
|
|
|
{
|
|
|
|
int r;
|
2017-10-04 13:57:50 +03:00
|
|
|
struct kvm_s390_vm_tod_clock gtod;
|
|
|
|
struct kvm_device_attr attr = {
|
|
|
|
.group = KVM_S390_VM_TOD,
|
|
|
|
.attr = KVM_S390_VM_TOD_EXT,
|
|
|
|
.addr = (uint64_t)>od,
|
|
|
|
};
|
|
|
|
|
|
|
|
r = kvm_vm_ioctl(kvm_state, KVM_GET_DEVICE_ATTR, &attr);
|
|
|
|
*tod_high = gtod.epoch_idx;
|
|
|
|
*tod_low = gtod.tod;
|
|
|
|
|
|
|
|
return r;
|
|
|
|
}
|
2015-03-09 17:56:08 +03:00
|
|
|
|
2018-06-27 16:44:03 +03:00
|
|
|
int kvm_s390_set_clock(uint8_t tod_high, uint64_t tod_low)
|
2017-10-04 13:57:50 +03:00
|
|
|
{
|
|
|
|
int r;
|
2015-03-09 17:56:08 +03:00
|
|
|
struct kvm_device_attr attr = {
|
|
|
|
.group = KVM_S390_VM_TOD,
|
|
|
|
.attr = KVM_S390_VM_TOD_LOW,
|
2018-06-27 16:44:03 +03:00
|
|
|
.addr = (uint64_t)&tod_low,
|
2015-03-09 17:56:08 +03:00
|
|
|
};
|
|
|
|
|
|
|
|
r = kvm_vm_ioctl(kvm_state, KVM_SET_DEVICE_ATTR, &attr);
|
|
|
|
if (r) {
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
|
|
|
attr.attr = KVM_S390_VM_TOD_HIGH;
|
2018-06-27 16:44:03 +03:00
|
|
|
attr.addr = (uint64_t)&tod_high;
|
2015-03-09 17:56:08 +03:00
|
|
|
return kvm_vm_ioctl(kvm_state, KVM_SET_DEVICE_ATTR, &attr);
|
|
|
|
}
|
|
|
|
|
2018-06-27 16:44:03 +03:00
|
|
|
int kvm_s390_set_clock_ext(uint8_t tod_high, uint64_t tod_low)
|
2017-10-04 13:57:50 +03:00
|
|
|
{
|
|
|
|
struct kvm_s390_vm_tod_clock gtod = {
|
2018-06-27 16:44:03 +03:00
|
|
|
.epoch_idx = tod_high,
|
|
|
|
.tod = tod_low,
|
2017-10-04 13:57:50 +03:00
|
|
|
};
|
|
|
|
struct kvm_device_attr attr = {
|
|
|
|
.group = KVM_S390_VM_TOD,
|
|
|
|
.attr = KVM_S390_VM_TOD_EXT,
|
|
|
|
.addr = (uint64_t)>od,
|
|
|
|
};
|
|
|
|
|
|
|
|
return kvm_vm_ioctl(kvm_state, KVM_SET_DEVICE_ATTR, &attr);
|
|
|
|
}
|
|
|
|
|
2015-02-06 17:54:58 +03:00
|
|
|
/**
|
|
|
|
* kvm_s390_mem_op:
|
|
|
|
* @addr: the logical start address in guest memory
|
2015-03-05 12:36:48 +03:00
|
|
|
* @ar: the access register number
|
2015-02-06 17:54:58 +03:00
|
|
|
* @hostbuf: buffer in host memory. NULL = do only checks w/o copying
|
2015-09-09 00:45:14 +03:00
|
|
|
* @len: length that should be transferred
|
2015-02-06 17:54:58 +03:00
|
|
|
* @is_write: true = write, false = read
|
2015-09-09 00:45:14 +03:00
|
|
|
* Returns: 0 on success, non-zero if an exception or error occurred
|
2015-02-06 17:54:58 +03:00
|
|
|
*
|
|
|
|
* Use KVM ioctl to read/write from/to guest memory. An access exception
|
|
|
|
* is injected into the vCPU in case of translation errors.
|
|
|
|
*/
|
2015-03-05 12:36:48 +03:00
|
|
|
int kvm_s390_mem_op(S390CPU *cpu, vaddr addr, uint8_t ar, void *hostbuf,
|
|
|
|
int len, bool is_write)
|
2015-02-06 17:54:58 +03:00
|
|
|
{
|
|
|
|
struct kvm_s390_mem_op mem_op = {
|
|
|
|
.gaddr = addr,
|
|
|
|
.flags = KVM_S390_MEMOP_F_INJECT_EXCEPTION,
|
|
|
|
.size = len,
|
|
|
|
.op = is_write ? KVM_S390_MEMOP_LOGICAL_WRITE
|
|
|
|
: KVM_S390_MEMOP_LOGICAL_READ,
|
|
|
|
.buf = (uint64_t)hostbuf,
|
2015-03-05 12:36:48 +03:00
|
|
|
.ar = ar,
|
target/s390x: kvm: Honor storage keys during emulation
Storage key controlled protection is currently not honored when
emulating instructions.
If available, enable key protection for the MEM_OP ioctl, thereby
enabling it for the s390_cpu_virt_mem_* functions, when using kvm.
As a result, the emulation of the following instructions honors storage
keys:
* CLP
The Synch I/O CLP command would need special handling in order
to support storage keys, but is currently not supported.
* CHSC
Performing commands asynchronously would require special
handling, but commands are currently always synchronous.
* STSI
* TSCH
Must (and does) not change channel if terminated due to
protection.
* MSCH
Suppressed on protection, works because fetching instruction.
* SSCH
Suppressed on protection, works because fetching instruction.
* STSCH
* STCRW
Suppressed on protection, this works because no partial store is
possible, because the operand cannot span multiple pages.
* PCISTB
* MPCIFC
* STPCIFC
Signed-off-by: Janis Schoetterl-Glausch <scgl@linux.ibm.com>
Message-Id: <20220506153956.2217601-3-scgl@linux.ibm.com>
Signed-off-by: Thomas Huth <thuth@redhat.com>
2022-05-06 18:39:56 +03:00
|
|
|
.key = (cpu->env.psw.mask & PSW_MASK_KEY) >> PSW_SHIFT_KEY,
|
2015-02-06 17:54:58 +03:00
|
|
|
};
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (!cap_mem_op) {
|
|
|
|
return -ENOSYS;
|
|
|
|
}
|
|
|
|
if (!hostbuf) {
|
|
|
|
mem_op.flags |= KVM_S390_MEMOP_F_CHECK_ONLY;
|
|
|
|
}
|
target/s390x: kvm: Honor storage keys during emulation
Storage key controlled protection is currently not honored when
emulating instructions.
If available, enable key protection for the MEM_OP ioctl, thereby
enabling it for the s390_cpu_virt_mem_* functions, when using kvm.
As a result, the emulation of the following instructions honors storage
keys:
* CLP
The Synch I/O CLP command would need special handling in order
to support storage keys, but is currently not supported.
* CHSC
Performing commands asynchronously would require special
handling, but commands are currently always synchronous.
* STSI
* TSCH
Must (and does) not change channel if terminated due to
protection.
* MSCH
Suppressed on protection, works because fetching instruction.
* SSCH
Suppressed on protection, works because fetching instruction.
* STSCH
* STCRW
Suppressed on protection, this works because no partial store is
possible, because the operand cannot span multiple pages.
* PCISTB
* MPCIFC
* STPCIFC
Signed-off-by: Janis Schoetterl-Glausch <scgl@linux.ibm.com>
Message-Id: <20220506153956.2217601-3-scgl@linux.ibm.com>
Signed-off-by: Thomas Huth <thuth@redhat.com>
2022-05-06 18:39:56 +03:00
|
|
|
if (mem_op_storage_key_support) {
|
|
|
|
mem_op.flags |= KVM_S390_MEMOP_F_SKEY_PROTECTION;
|
|
|
|
}
|
2015-02-06 17:54:58 +03:00
|
|
|
|
|
|
|
ret = kvm_vcpu_ioctl(CPU(cpu), KVM_S390_MEM_OP, &mem_op);
|
|
|
|
if (ret < 0) {
|
2019-04-17 22:06:34 +03:00
|
|
|
warn_report("KVM_S390_MEM_OP failed: %s", strerror(-ret));
|
2015-02-06 17:54:58 +03:00
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2020-03-19 16:19:12 +03:00
|
|
|
int kvm_s390_mem_op_pv(S390CPU *cpu, uint64_t offset, void *hostbuf,
|
|
|
|
int len, bool is_write)
|
|
|
|
{
|
|
|
|
struct kvm_s390_mem_op mem_op = {
|
|
|
|
.sida_offset = offset,
|
|
|
|
.size = len,
|
|
|
|
.op = is_write ? KVM_S390_MEMOP_SIDA_WRITE
|
|
|
|
: KVM_S390_MEMOP_SIDA_READ,
|
|
|
|
.buf = (uint64_t)hostbuf,
|
|
|
|
};
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (!cap_mem_op || !cap_protected) {
|
|
|
|
return -ENOSYS;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = kvm_vcpu_ioctl(CPU(cpu), KVM_S390_MEM_OP, &mem_op);
|
|
|
|
if (ret < 0) {
|
|
|
|
error_report("KVM_S390_MEM_OP failed: %s", strerror(-ret));
|
|
|
|
abort();
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2014-06-03 14:46:50 +04:00
|
|
|
static uint8_t const *sw_bp_inst;
|
|
|
|
static uint8_t sw_bp_ilen;
|
|
|
|
|
|
|
|
static void determine_sw_breakpoint_instr(void)
|
|
|
|
{
|
|
|
|
/* DIAG 501 is used for sw breakpoints with old kernels */
|
|
|
|
static const uint8_t diag_501[] = {0x83, 0x24, 0x05, 0x01};
|
|
|
|
/* Instruction 0x0000 is used for sw breakpoints with recent kernels */
|
|
|
|
static const uint8_t instr_0x0000[] = {0x00, 0x00};
|
|
|
|
|
|
|
|
if (sw_bp_inst) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (kvm_vm_enable_cap(kvm_state, KVM_CAP_S390_USER_INSTR0, 0)) {
|
|
|
|
sw_bp_inst = diag_501;
|
|
|
|
sw_bp_ilen = sizeof(diag_501);
|
|
|
|
DPRINTF("KVM: will use 4-byte sw breakpoints.\n");
|
|
|
|
} else {
|
|
|
|
sw_bp_inst = instr_0x0000;
|
|
|
|
sw_bp_ilen = sizeof(instr_0x0000);
|
|
|
|
DPRINTF("KVM: will use 2-byte sw breakpoints.\n");
|
|
|
|
}
|
|
|
|
}
|
2014-02-25 18:58:45 +04:00
|
|
|
|
2012-10-31 09:57:49 +04:00
|
|
|
int kvm_arch_insert_sw_breakpoint(CPUState *cs, struct kvm_sw_breakpoint *bp)
|
2009-12-05 14:44:24 +03:00
|
|
|
{
|
2014-06-03 14:46:50 +04:00
|
|
|
determine_sw_breakpoint_instr();
|
2009-12-05 14:44:24 +03:00
|
|
|
|
2014-02-25 18:58:45 +04:00
|
|
|
if (cpu_memory_rw_debug(cs, bp->pc, (uint8_t *)&bp->saved_insn,
|
2014-06-03 14:46:50 +04:00
|
|
|
sw_bp_ilen, 0) ||
|
|
|
|
cpu_memory_rw_debug(cs, bp->pc, (uint8_t *)sw_bp_inst, sw_bp_ilen, 1)) {
|
2009-12-05 14:44:24 +03:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2012-10-31 09:57:49 +04:00
|
|
|
int kvm_arch_remove_sw_breakpoint(CPUState *cs, struct kvm_sw_breakpoint *bp)
|
2009-12-05 14:44:24 +03:00
|
|
|
{
|
2014-06-03 14:46:50 +04:00
|
|
|
uint8_t t[MAX_ILEN];
|
2009-12-05 14:44:24 +03:00
|
|
|
|
2014-06-03 14:46:50 +04:00
|
|
|
if (cpu_memory_rw_debug(cs, bp->pc, t, sw_bp_ilen, 0)) {
|
2009-12-05 14:44:24 +03:00
|
|
|
return -EINVAL;
|
2014-06-03 14:46:50 +04:00
|
|
|
} else if (memcmp(t, sw_bp_inst, sw_bp_ilen)) {
|
2009-12-05 14:44:24 +03:00
|
|
|
return -EINVAL;
|
2014-02-25 18:58:45 +04:00
|
|
|
} else if (cpu_memory_rw_debug(cs, bp->pc, (uint8_t *)&bp->saved_insn,
|
2014-06-03 14:46:50 +04:00
|
|
|
sw_bp_ilen, 1)) {
|
2009-12-05 14:44:24 +03:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2012-09-03 15:09:10 +04:00
|
|
|
static struct kvm_hw_breakpoint *find_hw_breakpoint(target_ulong addr,
|
|
|
|
int len, int type)
|
|
|
|
{
|
|
|
|
int n;
|
|
|
|
|
|
|
|
for (n = 0; n < nb_hw_breakpoints; n++) {
|
|
|
|
if (hw_breakpoints[n].addr == addr && hw_breakpoints[n].type == type &&
|
|
|
|
(hw_breakpoints[n].len == len || len == -1)) {
|
|
|
|
return &hw_breakpoints[n];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int insert_hw_breakpoint(target_ulong addr, int len, int type)
|
|
|
|
{
|
|
|
|
int size;
|
|
|
|
|
|
|
|
if (find_hw_breakpoint(addr, len, type)) {
|
|
|
|
return -EEXIST;
|
|
|
|
}
|
|
|
|
|
|
|
|
size = (nb_hw_breakpoints + 1) * sizeof(struct kvm_hw_breakpoint);
|
|
|
|
|
|
|
|
if (!hw_breakpoints) {
|
|
|
|
nb_hw_breakpoints = 0;
|
|
|
|
hw_breakpoints = (struct kvm_hw_breakpoint *)g_try_malloc(size);
|
|
|
|
} else {
|
|
|
|
hw_breakpoints =
|
|
|
|
(struct kvm_hw_breakpoint *)g_try_realloc(hw_breakpoints, size);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!hw_breakpoints) {
|
|
|
|
nb_hw_breakpoints = 0;
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
|
|
|
hw_breakpoints[nb_hw_breakpoints].addr = addr;
|
|
|
|
hw_breakpoints[nb_hw_breakpoints].len = len;
|
|
|
|
hw_breakpoints[nb_hw_breakpoints].type = type;
|
|
|
|
|
|
|
|
nb_hw_breakpoints++;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2012-09-03 14:45:13 +04:00
|
|
|
int kvm_arch_insert_hw_breakpoint(target_ulong addr,
|
|
|
|
target_ulong len, int type)
|
|
|
|
{
|
2012-09-03 15:09:10 +04:00
|
|
|
switch (type) {
|
|
|
|
case GDB_BREAKPOINT_HW:
|
|
|
|
type = KVM_HW_BP;
|
|
|
|
break;
|
|
|
|
case GDB_WATCHPOINT_WRITE:
|
|
|
|
if (len < 1) {
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
type = KVM_HW_WP_WRITE;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
return -ENOSYS;
|
|
|
|
}
|
|
|
|
return insert_hw_breakpoint(addr, len, type);
|
2012-09-03 14:45:13 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
int kvm_arch_remove_hw_breakpoint(target_ulong addr,
|
|
|
|
target_ulong len, int type)
|
|
|
|
{
|
2012-09-03 15:09:10 +04:00
|
|
|
int size;
|
|
|
|
struct kvm_hw_breakpoint *bp = find_hw_breakpoint(addr, len, type);
|
|
|
|
|
|
|
|
if (bp == NULL) {
|
|
|
|
return -ENOENT;
|
|
|
|
}
|
|
|
|
|
|
|
|
nb_hw_breakpoints--;
|
|
|
|
if (nb_hw_breakpoints > 0) {
|
|
|
|
/*
|
|
|
|
* In order to trim the array, move the last element to the position to
|
|
|
|
* be removed - if necessary.
|
|
|
|
*/
|
|
|
|
if (bp != &hw_breakpoints[nb_hw_breakpoints]) {
|
|
|
|
*bp = hw_breakpoints[nb_hw_breakpoints];
|
|
|
|
}
|
|
|
|
size = nb_hw_breakpoints * sizeof(struct kvm_hw_breakpoint);
|
|
|
|
hw_breakpoints =
|
|
|
|
(struct kvm_hw_breakpoint *)g_realloc(hw_breakpoints, size);
|
|
|
|
} else {
|
|
|
|
g_free(hw_breakpoints);
|
|
|
|
hw_breakpoints = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
2012-09-03 14:45:13 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
void kvm_arch_remove_all_hw_breakpoints(void)
|
|
|
|
{
|
2012-09-03 15:09:10 +04:00
|
|
|
nb_hw_breakpoints = 0;
|
|
|
|
g_free(hw_breakpoints);
|
|
|
|
hw_breakpoints = NULL;
|
2012-09-03 14:45:13 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
void kvm_arch_update_guest_debug(CPUState *cpu, struct kvm_guest_debug *dbg)
|
|
|
|
{
|
2012-09-03 15:09:10 +04:00
|
|
|
int i;
|
|
|
|
|
|
|
|
if (nb_hw_breakpoints > 0) {
|
|
|
|
dbg->arch.nr_hw_bp = nb_hw_breakpoints;
|
|
|
|
dbg->arch.hw_bp = hw_breakpoints;
|
|
|
|
|
|
|
|
for (i = 0; i < nb_hw_breakpoints; ++i) {
|
|
|
|
hw_breakpoints[i].phys_addr = s390_cpu_get_phys_addr_debug(cpu,
|
|
|
|
hw_breakpoints[i].addr);
|
|
|
|
}
|
|
|
|
dbg->control |= KVM_GUESTDBG_ENABLE | KVM_GUESTDBG_USE_HW_BP;
|
|
|
|
} else {
|
|
|
|
dbg->arch.nr_hw_bp = 0;
|
|
|
|
dbg->arch.hw_bp = NULL;
|
|
|
|
}
|
2012-09-03 14:45:13 +04:00
|
|
|
}
|
|
|
|
|
2012-10-31 09:57:49 +04:00
|
|
|
void kvm_arch_pre_run(CPUState *cpu, struct kvm_run *run)
|
2009-12-05 14:44:24 +03:00
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2015-04-08 14:30:58 +03:00
|
|
|
MemTxAttrs kvm_arch_post_run(CPUState *cs, struct kvm_run *run)
|
2009-12-05 14:44:24 +03:00
|
|
|
{
|
2015-04-08 14:30:58 +03:00
|
|
|
return MEMTXATTRS_UNSPECIFIED;
|
2009-12-05 14:44:24 +03:00
|
|
|
}
|
|
|
|
|
2012-10-31 09:57:49 +04:00
|
|
|
int kvm_arch_process_async_events(CPUState *cs)
|
2010-05-04 16:45:27 +04:00
|
|
|
{
|
2013-03-15 13:57:40 +04:00
|
|
|
return cs->halted;
|
2010-05-04 16:45:27 +04:00
|
|
|
}
|
|
|
|
|
2014-03-11 20:10:07 +04:00
|
|
|
static int s390_kvm_irq_to_interrupt(struct kvm_s390_irq *irq,
|
|
|
|
struct kvm_s390_interrupt *interrupt)
|
|
|
|
{
|
|
|
|
int r = 0;
|
|
|
|
|
|
|
|
interrupt->type = irq->type;
|
|
|
|
switch (irq->type) {
|
|
|
|
case KVM_S390_INT_VIRTIO:
|
|
|
|
interrupt->parm = irq->u.ext.ext_params;
|
|
|
|
/* fall through */
|
|
|
|
case KVM_S390_INT_PFAULT_INIT:
|
|
|
|
case KVM_S390_INT_PFAULT_DONE:
|
|
|
|
interrupt->parm64 = irq->u.ext.ext_params2;
|
|
|
|
break;
|
|
|
|
case KVM_S390_PROGRAM_INT:
|
|
|
|
interrupt->parm = irq->u.pgm.code;
|
|
|
|
break;
|
|
|
|
case KVM_S390_SIGP_SET_PREFIX:
|
|
|
|
interrupt->parm = irq->u.prefix.address;
|
|
|
|
break;
|
|
|
|
case KVM_S390_INT_SERVICE:
|
|
|
|
interrupt->parm = irq->u.ext.ext_params;
|
|
|
|
break;
|
|
|
|
case KVM_S390_MCHK:
|
|
|
|
interrupt->parm = irq->u.mchk.cr14;
|
|
|
|
interrupt->parm64 = irq->u.mchk.mcic;
|
|
|
|
break;
|
|
|
|
case KVM_S390_INT_EXTERNAL_CALL:
|
|
|
|
interrupt->parm = irq->u.extcall.code;
|
|
|
|
break;
|
|
|
|
case KVM_S390_INT_EMERGENCY:
|
|
|
|
interrupt->parm = irq->u.emerg.code;
|
|
|
|
break;
|
|
|
|
case KVM_S390_SIGP_STOP:
|
|
|
|
case KVM_S390_RESTART:
|
|
|
|
break; /* These types have no parameters */
|
|
|
|
case KVM_S390_INT_IO_MIN...KVM_S390_INT_IO_MAX:
|
|
|
|
interrupt->parm = irq->u.io.subchannel_id << 16;
|
|
|
|
interrupt->parm |= irq->u.io.subchannel_nr;
|
|
|
|
interrupt->parm64 = (uint64_t)irq->u.io.io_int_parm << 32;
|
|
|
|
interrupt->parm64 |= irq->u.io.io_int_word;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
r = -EINVAL;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
2014-12-18 19:38:05 +03:00
|
|
|
static void inject_vcpu_irq_legacy(CPUState *cs, struct kvm_s390_irq *irq)
|
2014-03-11 20:10:07 +04:00
|
|
|
{
|
|
|
|
struct kvm_s390_interrupt kvmint = {};
|
|
|
|
int r;
|
|
|
|
|
|
|
|
r = s390_kvm_irq_to_interrupt(irq, &kvmint);
|
|
|
|
if (r < 0) {
|
|
|
|
fprintf(stderr, "%s called with bogus interrupt\n", __func__);
|
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
|
|
|
|
r = kvm_vcpu_ioctl(cs, KVM_S390_INTERRUPT, &kvmint);
|
|
|
|
if (r < 0) {
|
|
|
|
fprintf(stderr, "KVM failed to inject interrupt\n");
|
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-12-18 19:38:05 +03:00
|
|
|
void kvm_s390_vcpu_interrupt(S390CPU *cpu, struct kvm_s390_irq *irq)
|
|
|
|
{
|
|
|
|
CPUState *cs = CPU(cpu);
|
|
|
|
int r;
|
|
|
|
|
|
|
|
if (cap_s390_irq) {
|
|
|
|
r = kvm_vcpu_ioctl(cs, KVM_S390_IRQ, irq);
|
|
|
|
if (!r) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
error_report("KVM failed to inject interrupt %llx", irq->type);
|
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
|
|
|
|
inject_vcpu_irq_legacy(cs, irq);
|
|
|
|
}
|
|
|
|
|
2018-01-29 15:56:10 +03:00
|
|
|
void kvm_s390_floating_interrupt_legacy(struct kvm_s390_irq *irq)
|
2014-03-11 20:10:07 +04:00
|
|
|
{
|
|
|
|
struct kvm_s390_interrupt kvmint = {};
|
|
|
|
int r;
|
|
|
|
|
|
|
|
r = s390_kvm_irq_to_interrupt(irq, &kvmint);
|
|
|
|
if (r < 0) {
|
|
|
|
fprintf(stderr, "%s called with bogus interrupt\n", __func__);
|
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
|
|
|
|
r = kvm_vm_ioctl(kvm_state, KVM_S390_INTERRUPT, &kvmint);
|
|
|
|
if (r < 0) {
|
|
|
|
fprintf(stderr, "KVM failed to inject interrupt\n");
|
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-07-24 11:52:48 +03:00
|
|
|
void kvm_s390_program_interrupt(S390CPU *cpu, uint16_t code)
|
2009-12-05 14:44:24 +03:00
|
|
|
{
|
2014-03-11 16:19:43 +04:00
|
|
|
struct kvm_s390_irq irq = {
|
|
|
|
.type = KVM_S390_PROGRAM_INT,
|
|
|
|
.u.pgm.code = code,
|
|
|
|
};
|
2018-09-27 16:02:55 +03:00
|
|
|
qemu_log_mask(CPU_LOG_INT, "program interrupt at %#" PRIx64 "\n",
|
|
|
|
cpu->env.psw.addr);
|
2014-03-11 16:19:43 +04:00
|
|
|
kvm_s390_vcpu_interrupt(cpu, &irq);
|
2009-12-05 14:44:24 +03:00
|
|
|
}
|
|
|
|
|
2015-02-12 20:09:30 +03:00
|
|
|
void kvm_s390_access_exception(S390CPU *cpu, uint16_t code, uint64_t te_code)
|
|
|
|
{
|
|
|
|
struct kvm_s390_irq irq = {
|
|
|
|
.type = KVM_S390_PROGRAM_INT,
|
|
|
|
.u.pgm.code = code,
|
|
|
|
.u.pgm.trans_exc_code = te_code,
|
|
|
|
.u.pgm.exc_access_id = te_code & 3,
|
|
|
|
};
|
|
|
|
|
|
|
|
kvm_s390_vcpu_interrupt(cpu, &irq);
|
|
|
|
}
|
|
|
|
|
2019-11-29 12:17:13 +03:00
|
|
|
static void kvm_sclp_service_call(S390CPU *cpu, struct kvm_run *run,
|
2011-04-15 19:32:47 +04:00
|
|
|
uint16_t ipbh0)
|
2009-12-05 14:44:24 +03:00
|
|
|
{
|
2012-10-31 09:06:49 +04:00
|
|
|
CPUS390XState *env = &cpu->env;
|
2014-01-13 15:19:03 +04:00
|
|
|
uint64_t sccb;
|
|
|
|
uint32_t code;
|
2019-11-29 12:17:13 +03:00
|
|
|
int r;
|
2009-12-05 14:44:24 +03:00
|
|
|
|
|
|
|
sccb = env->regs[ipbh0 & 0xf];
|
|
|
|
code = env->regs[(ipbh0 & 0xf0) >> 4];
|
|
|
|
|
2020-03-19 16:19:14 +03:00
|
|
|
switch (run->s390_sieic.icptcode) {
|
|
|
|
case ICPT_PV_INSTR_NOTIFICATION:
|
|
|
|
g_assert(s390_is_pv());
|
|
|
|
/* The notification intercepts are currently handled by KVM */
|
|
|
|
error_report("unexpected SCLP PV notification");
|
|
|
|
exit(1);
|
|
|
|
break;
|
|
|
|
case ICPT_PV_INSTR:
|
|
|
|
g_assert(s390_is_pv());
|
|
|
|
sclp_service_call_protected(env, sccb, code);
|
|
|
|
/* Setting the CC is done by the Ultravisor. */
|
|
|
|
break;
|
|
|
|
case ICPT_INSTRUCTION:
|
|
|
|
g_assert(!s390_is_pv());
|
|
|
|
r = sclp_service_call(env, sccb, code);
|
|
|
|
if (r < 0) {
|
|
|
|
kvm_s390_program_interrupt(cpu, -r);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
setcc(cpu, r);
|
2009-12-05 14:44:24 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-02-11 11:41:38 +04:00
|
|
|
static int handle_b2(S390CPU *cpu, struct kvm_run *run, uint8_t ipa1)
|
2013-01-24 06:28:07 +04:00
|
|
|
{
|
|
|
|
CPUS390XState *env = &cpu->env;
|
2014-02-11 11:41:38 +04:00
|
|
|
int rc = 0;
|
|
|
|
uint16_t ipbh0 = (run->s390_sieic.ipb & 0xffff0000) >> 16;
|
2013-04-25 08:25:51 +04:00
|
|
|
|
2013-01-24 06:28:07 +04:00
|
|
|
switch (ipa1) {
|
2014-02-11 11:41:38 +04:00
|
|
|
case PRIV_B2_XSCH:
|
2017-11-30 19:27:32 +03:00
|
|
|
ioinst_handle_xsch(cpu, env->regs[1], RA_IGNORED);
|
2013-01-24 06:28:07 +04:00
|
|
|
break;
|
2014-02-11 11:41:38 +04:00
|
|
|
case PRIV_B2_CSCH:
|
2017-11-30 19:27:32 +03:00
|
|
|
ioinst_handle_csch(cpu, env->regs[1], RA_IGNORED);
|
2013-01-24 06:28:07 +04:00
|
|
|
break;
|
2014-02-11 11:41:38 +04:00
|
|
|
case PRIV_B2_HSCH:
|
2017-11-30 19:27:32 +03:00
|
|
|
ioinst_handle_hsch(cpu, env->regs[1], RA_IGNORED);
|
2013-01-24 06:28:07 +04:00
|
|
|
break;
|
2014-02-11 11:41:38 +04:00
|
|
|
case PRIV_B2_MSCH:
|
2017-11-30 19:27:32 +03:00
|
|
|
ioinst_handle_msch(cpu, env->regs[1], run->s390_sieic.ipb, RA_IGNORED);
|
2013-01-24 06:28:07 +04:00
|
|
|
break;
|
2014-02-11 11:41:38 +04:00
|
|
|
case PRIV_B2_SSCH:
|
2017-11-30 19:27:32 +03:00
|
|
|
ioinst_handle_ssch(cpu, env->regs[1], run->s390_sieic.ipb, RA_IGNORED);
|
2013-01-24 06:28:07 +04:00
|
|
|
break;
|
2014-02-11 11:41:38 +04:00
|
|
|
case PRIV_B2_STCRW:
|
2017-11-30 19:27:32 +03:00
|
|
|
ioinst_handle_stcrw(cpu, run->s390_sieic.ipb, RA_IGNORED);
|
2013-01-24 06:28:07 +04:00
|
|
|
break;
|
2014-02-11 11:41:38 +04:00
|
|
|
case PRIV_B2_STSCH:
|
2017-11-30 19:27:32 +03:00
|
|
|
ioinst_handle_stsch(cpu, env->regs[1], run->s390_sieic.ipb, RA_IGNORED);
|
2013-01-24 06:28:07 +04:00
|
|
|
break;
|
2014-02-11 11:41:38 +04:00
|
|
|
case PRIV_B2_TSCH:
|
2013-01-24 06:28:07 +04:00
|
|
|
/* We should only get tsch via KVM_EXIT_S390_TSCH. */
|
|
|
|
fprintf(stderr, "Spurious tsch intercept\n");
|
|
|
|
break;
|
2014-02-11 11:41:38 +04:00
|
|
|
case PRIV_B2_CHSC:
|
2017-11-30 19:27:32 +03:00
|
|
|
ioinst_handle_chsc(cpu, run->s390_sieic.ipb, RA_IGNORED);
|
2013-01-24 06:28:07 +04:00
|
|
|
break;
|
2014-02-11 11:41:38 +04:00
|
|
|
case PRIV_B2_TPI:
|
2013-01-24 06:28:07 +04:00
|
|
|
/* This should have been handled by kvm already. */
|
|
|
|
fprintf(stderr, "Spurious tpi intercept\n");
|
|
|
|
break;
|
2014-02-11 11:41:38 +04:00
|
|
|
case PRIV_B2_SCHM:
|
2013-07-01 17:44:18 +04:00
|
|
|
ioinst_handle_schm(cpu, env->regs[1], env->regs[2],
|
2017-11-30 19:27:32 +03:00
|
|
|
run->s390_sieic.ipb, RA_IGNORED);
|
2013-01-24 06:28:07 +04:00
|
|
|
break;
|
2014-02-11 11:41:38 +04:00
|
|
|
case PRIV_B2_RSCH:
|
2017-11-30 19:27:32 +03:00
|
|
|
ioinst_handle_rsch(cpu, env->regs[1], RA_IGNORED);
|
2013-01-24 06:28:07 +04:00
|
|
|
break;
|
2014-02-11 11:41:38 +04:00
|
|
|
case PRIV_B2_RCHP:
|
2017-11-30 19:27:32 +03:00
|
|
|
ioinst_handle_rchp(cpu, env->regs[1], RA_IGNORED);
|
2013-01-24 06:28:07 +04:00
|
|
|
break;
|
2014-02-11 11:41:38 +04:00
|
|
|
case PRIV_B2_STCPS:
|
2013-01-24 06:28:07 +04:00
|
|
|
/* We do not provide this instruction, it is suppressed. */
|
|
|
|
break;
|
2014-02-11 11:41:38 +04:00
|
|
|
case PRIV_B2_SAL:
|
2017-11-30 19:27:32 +03:00
|
|
|
ioinst_handle_sal(cpu, env->regs[1], RA_IGNORED);
|
2013-01-24 06:28:07 +04:00
|
|
|
break;
|
2014-02-11 11:41:38 +04:00
|
|
|
case PRIV_B2_SIGA:
|
2013-06-24 17:17:34 +04:00
|
|
|
/* Not provided, set CC = 3 for subchannel not operational */
|
2013-07-01 17:44:18 +04:00
|
|
|
setcc(cpu, 3);
|
2013-01-24 06:28:07 +04:00
|
|
|
break;
|
2014-02-11 11:41:38 +04:00
|
|
|
case PRIV_B2_SCLP_CALL:
|
2019-11-29 12:17:13 +03:00
|
|
|
kvm_sclp_service_call(cpu, run, ipbh0);
|
2014-02-11 11:41:38 +04:00
|
|
|
break;
|
2013-06-24 17:17:34 +04:00
|
|
|
default:
|
2014-02-11 11:41:38 +04:00
|
|
|
rc = -1;
|
|
|
|
DPRINTF("KVM: unhandled PRIV: 0xb2%x\n", ipa1);
|
|
|
|
break;
|
2013-01-24 06:28:07 +04:00
|
|
|
}
|
|
|
|
|
2014-02-11 11:41:38 +04:00
|
|
|
return rc;
|
2013-01-24 06:28:07 +04:00
|
|
|
}
|
|
|
|
|
2015-03-05 12:36:48 +03:00
|
|
|
static uint64_t get_base_disp_rxy(S390CPU *cpu, struct kvm_run *run,
|
|
|
|
uint8_t *ar)
|
2015-01-09 11:04:39 +03:00
|
|
|
{
|
|
|
|
CPUS390XState *env = &cpu->env;
|
|
|
|
uint32_t x2 = (run->s390_sieic.ipa & 0x000f);
|
|
|
|
uint32_t base2 = run->s390_sieic.ipb >> 28;
|
|
|
|
uint32_t disp2 = ((run->s390_sieic.ipb & 0x0fff0000) >> 16) +
|
|
|
|
((run->s390_sieic.ipb & 0xff00) << 4);
|
|
|
|
|
|
|
|
if (disp2 & 0x80000) {
|
|
|
|
disp2 += 0xfff00000;
|
|
|
|
}
|
2015-03-05 12:36:48 +03:00
|
|
|
if (ar) {
|
|
|
|
*ar = base2;
|
|
|
|
}
|
2015-01-09 11:04:39 +03:00
|
|
|
|
|
|
|
return (base2 ? env->regs[base2] : 0) +
|
|
|
|
(x2 ? env->regs[x2] : 0) + (long)(int)disp2;
|
|
|
|
}
|
|
|
|
|
2015-03-05 12:36:48 +03:00
|
|
|
static uint64_t get_base_disp_rsy(S390CPU *cpu, struct kvm_run *run,
|
|
|
|
uint8_t *ar)
|
2015-01-09 11:04:39 +03:00
|
|
|
{
|
|
|
|
CPUS390XState *env = &cpu->env;
|
|
|
|
uint32_t base2 = run->s390_sieic.ipb >> 28;
|
|
|
|
uint32_t disp2 = ((run->s390_sieic.ipb & 0x0fff0000) >> 16) +
|
|
|
|
((run->s390_sieic.ipb & 0xff00) << 4);
|
|
|
|
|
|
|
|
if (disp2 & 0x80000) {
|
|
|
|
disp2 += 0xfff00000;
|
|
|
|
}
|
2015-03-05 12:36:48 +03:00
|
|
|
if (ar) {
|
|
|
|
*ar = base2;
|
|
|
|
}
|
2015-01-09 11:04:39 +03:00
|
|
|
|
|
|
|
return (base2 ? env->regs[base2] : 0) + (long)(int)disp2;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int kvm_clp_service_call(S390CPU *cpu, struct kvm_run *run)
|
|
|
|
{
|
|
|
|
uint8_t r2 = (run->s390_sieic.ipb & 0x000f0000) >> 16;
|
|
|
|
|
2017-07-06 18:48:55 +03:00
|
|
|
if (s390_has_feat(S390_FEAT_ZPCI)) {
|
2017-11-30 19:27:33 +03:00
|
|
|
return clp_service_call(cpu, r2, RA_IGNORED);
|
2017-07-06 18:48:55 +03:00
|
|
|
} else {
|
|
|
|
return -1;
|
|
|
|
}
|
2015-01-09 11:04:39 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
static int kvm_pcilg_service_call(S390CPU *cpu, struct kvm_run *run)
|
|
|
|
{
|
|
|
|
uint8_t r1 = (run->s390_sieic.ipb & 0x00f00000) >> 20;
|
|
|
|
uint8_t r2 = (run->s390_sieic.ipb & 0x000f0000) >> 16;
|
|
|
|
|
2017-07-06 18:48:55 +03:00
|
|
|
if (s390_has_feat(S390_FEAT_ZPCI)) {
|
2017-11-30 19:27:33 +03:00
|
|
|
return pcilg_service_call(cpu, r1, r2, RA_IGNORED);
|
2017-07-06 18:48:55 +03:00
|
|
|
} else {
|
|
|
|
return -1;
|
|
|
|
}
|
2015-01-09 11:04:39 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
static int kvm_pcistg_service_call(S390CPU *cpu, struct kvm_run *run)
|
|
|
|
{
|
|
|
|
uint8_t r1 = (run->s390_sieic.ipb & 0x00f00000) >> 20;
|
|
|
|
uint8_t r2 = (run->s390_sieic.ipb & 0x000f0000) >> 16;
|
|
|
|
|
2017-07-06 18:48:55 +03:00
|
|
|
if (s390_has_feat(S390_FEAT_ZPCI)) {
|
2017-11-30 19:27:33 +03:00
|
|
|
return pcistg_service_call(cpu, r1, r2, RA_IGNORED);
|
2017-07-06 18:48:55 +03:00
|
|
|
} else {
|
|
|
|
return -1;
|
|
|
|
}
|
2015-01-09 11:04:39 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
static int kvm_stpcifc_service_call(S390CPU *cpu, struct kvm_run *run)
|
|
|
|
{
|
|
|
|
uint8_t r1 = (run->s390_sieic.ipa & 0x00f0) >> 4;
|
|
|
|
uint64_t fiba;
|
2015-03-05 12:36:48 +03:00
|
|
|
uint8_t ar;
|
2015-01-09 11:04:39 +03:00
|
|
|
|
2017-07-06 18:48:55 +03:00
|
|
|
if (s390_has_feat(S390_FEAT_ZPCI)) {
|
|
|
|
fiba = get_base_disp_rxy(cpu, run, &ar);
|
2015-01-09 11:04:39 +03:00
|
|
|
|
2017-11-30 19:27:33 +03:00
|
|
|
return stpcifc_service_call(cpu, r1, fiba, ar, RA_IGNORED);
|
2017-07-06 18:48:55 +03:00
|
|
|
} else {
|
|
|
|
return -1;
|
|
|
|
}
|
2015-01-09 11:04:39 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
static int kvm_sic_service_call(S390CPU *cpu, struct kvm_run *run)
|
|
|
|
{
|
2017-02-17 10:40:41 +03:00
|
|
|
CPUS390XState *env = &cpu->env;
|
|
|
|
uint8_t r1 = (run->s390_sieic.ipa & 0x00f0) >> 4;
|
|
|
|
uint8_t r3 = run->s390_sieic.ipa & 0x000f;
|
|
|
|
uint8_t isc;
|
|
|
|
uint16_t mode;
|
|
|
|
int r;
|
|
|
|
|
|
|
|
mode = env->regs[r1] & 0xffff;
|
|
|
|
isc = (env->regs[r3] >> 27) & 0x7;
|
|
|
|
r = css_do_sic(env, isc, mode);
|
|
|
|
if (r) {
|
2017-07-24 11:52:48 +03:00
|
|
|
kvm_s390_program_interrupt(cpu, -r);
|
2017-02-17 10:40:41 +03:00
|
|
|
}
|
|
|
|
|
2015-01-09 11:04:39 +03:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int kvm_rpcit_service_call(S390CPU *cpu, struct kvm_run *run)
|
|
|
|
{
|
|
|
|
uint8_t r1 = (run->s390_sieic.ipb & 0x00f00000) >> 20;
|
|
|
|
uint8_t r2 = (run->s390_sieic.ipb & 0x000f0000) >> 16;
|
|
|
|
|
2017-07-06 18:48:55 +03:00
|
|
|
if (s390_has_feat(S390_FEAT_ZPCI)) {
|
2017-11-30 19:27:33 +03:00
|
|
|
return rpcit_service_call(cpu, r1, r2, RA_IGNORED);
|
2017-07-06 18:48:55 +03:00
|
|
|
} else {
|
|
|
|
return -1;
|
|
|
|
}
|
2015-01-09 11:04:39 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
static int kvm_pcistb_service_call(S390CPU *cpu, struct kvm_run *run)
|
|
|
|
{
|
|
|
|
uint8_t r1 = (run->s390_sieic.ipa & 0x00f0) >> 4;
|
|
|
|
uint8_t r3 = run->s390_sieic.ipa & 0x000f;
|
|
|
|
uint64_t gaddr;
|
2015-03-05 12:36:48 +03:00
|
|
|
uint8_t ar;
|
2015-01-09 11:04:39 +03:00
|
|
|
|
2017-07-06 18:48:55 +03:00
|
|
|
if (s390_has_feat(S390_FEAT_ZPCI)) {
|
|
|
|
gaddr = get_base_disp_rsy(cpu, run, &ar);
|
2015-01-09 11:04:39 +03:00
|
|
|
|
2017-11-30 19:27:33 +03:00
|
|
|
return pcistb_service_call(cpu, r1, r3, gaddr, ar, RA_IGNORED);
|
2017-07-06 18:48:55 +03:00
|
|
|
} else {
|
|
|
|
return -1;
|
|
|
|
}
|
2015-01-09 11:04:39 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
static int kvm_mpcifc_service_call(S390CPU *cpu, struct kvm_run *run)
|
|
|
|
{
|
|
|
|
uint8_t r1 = (run->s390_sieic.ipa & 0x00f0) >> 4;
|
|
|
|
uint64_t fiba;
|
2015-03-05 12:36:48 +03:00
|
|
|
uint8_t ar;
|
2015-01-09 11:04:39 +03:00
|
|
|
|
2017-07-06 18:48:55 +03:00
|
|
|
if (s390_has_feat(S390_FEAT_ZPCI)) {
|
|
|
|
fiba = get_base_disp_rxy(cpu, run, &ar);
|
2015-01-09 11:04:39 +03:00
|
|
|
|
2017-11-30 19:27:33 +03:00
|
|
|
return mpcifc_service_call(cpu, r1, fiba, ar, RA_IGNORED);
|
2017-07-06 18:48:55 +03:00
|
|
|
} else {
|
|
|
|
return -1;
|
|
|
|
}
|
2015-01-09 11:04:39 +03:00
|
|
|
}
|
|
|
|
|
2014-02-11 11:41:38 +04:00
|
|
|
static int handle_b9(S390CPU *cpu, struct kvm_run *run, uint8_t ipa1)
|
2009-12-05 14:44:24 +03:00
|
|
|
{
|
|
|
|
int r = 0;
|
|
|
|
|
|
|
|
switch (ipa1) {
|
2015-01-09 11:04:39 +03:00
|
|
|
case PRIV_B9_CLP:
|
|
|
|
r = kvm_clp_service_call(cpu, run);
|
|
|
|
break;
|
|
|
|
case PRIV_B9_PCISTG:
|
|
|
|
r = kvm_pcistg_service_call(cpu, run);
|
|
|
|
break;
|
|
|
|
case PRIV_B9_PCILG:
|
|
|
|
r = kvm_pcilg_service_call(cpu, run);
|
|
|
|
break;
|
|
|
|
case PRIV_B9_RPCIT:
|
|
|
|
r = kvm_rpcit_service_call(cpu, run);
|
|
|
|
break;
|
2014-02-11 11:41:38 +04:00
|
|
|
case PRIV_B9_EQBS:
|
|
|
|
/* just inject exception */
|
|
|
|
r = -1;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
r = -1;
|
|
|
|
DPRINTF("KVM: unhandled PRIV: 0xb9%x\n", ipa1);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
2014-10-18 08:24:12 +04:00
|
|
|
static int handle_eb(S390CPU *cpu, struct kvm_run *run, uint8_t ipbl)
|
2014-02-11 11:41:38 +04:00
|
|
|
{
|
|
|
|
int r = 0;
|
|
|
|
|
2014-10-18 08:24:12 +04:00
|
|
|
switch (ipbl) {
|
2015-01-09 11:04:39 +03:00
|
|
|
case PRIV_EB_PCISTB:
|
|
|
|
r = kvm_pcistb_service_call(cpu, run);
|
|
|
|
break;
|
|
|
|
case PRIV_EB_SIC:
|
|
|
|
r = kvm_sic_service_call(cpu, run);
|
|
|
|
break;
|
2014-02-11 11:41:38 +04:00
|
|
|
case PRIV_EB_SQBS:
|
|
|
|
/* just inject exception */
|
|
|
|
r = -1;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
r = -1;
|
2014-10-18 08:24:12 +04:00
|
|
|
DPRINTF("KVM: unhandled PRIV: 0xeb%x\n", ipbl);
|
2014-02-11 11:41:38 +04:00
|
|
|
break;
|
2009-12-05 14:44:24 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
2015-01-09 11:04:39 +03:00
|
|
|
static int handle_e3(S390CPU *cpu, struct kvm_run *run, uint8_t ipbl)
|
|
|
|
{
|
|
|
|
int r = 0;
|
|
|
|
|
|
|
|
switch (ipbl) {
|
|
|
|
case PRIV_E3_MPCIFC:
|
|
|
|
r = kvm_mpcifc_service_call(cpu, run);
|
|
|
|
break;
|
|
|
|
case PRIV_E3_STPCIFC:
|
|
|
|
r = kvm_stpcifc_service_call(cpu, run);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
r = -1;
|
|
|
|
DPRINTF("KVM: unhandled PRIV: 0xe3%x\n", ipbl);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
2013-06-21 19:17:00 +04:00
|
|
|
static int handle_hypercall(S390CPU *cpu, struct kvm_run *run)
|
2009-12-05 14:44:24 +03:00
|
|
|
{
|
2013-06-21 19:17:00 +04:00
|
|
|
CPUS390XState *env = &cpu->env;
|
2014-01-14 16:32:23 +04:00
|
|
|
int ret;
|
2013-04-25 08:25:51 +04:00
|
|
|
|
2014-01-14 16:32:23 +04:00
|
|
|
ret = s390_virtio_hypercall(env);
|
|
|
|
if (ret == -EINVAL) {
|
2017-07-24 11:52:48 +03:00
|
|
|
kvm_s390_program_interrupt(cpu, PGM_SPECIFICATION);
|
2014-01-14 16:32:23 +04:00
|
|
|
return 0;
|
|
|
|
}
|
2009-12-05 14:44:24 +03:00
|
|
|
|
2014-01-14 16:32:23 +04:00
|
|
|
return ret;
|
2009-12-05 14:44:24 +03:00
|
|
|
}
|
|
|
|
|
2015-06-11 14:55:26 +03:00
|
|
|
static void kvm_handle_diag_288(S390CPU *cpu, struct kvm_run *run)
|
|
|
|
{
|
|
|
|
uint64_t r1, r3;
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
r1 = (run->s390_sieic.ipa & 0x00f0) >> 4;
|
|
|
|
r3 = run->s390_sieic.ipa & 0x000f;
|
|
|
|
rc = handle_diag_288(&cpu->env, r1, r3);
|
|
|
|
if (rc) {
|
2017-07-24 11:52:48 +03:00
|
|
|
kvm_s390_program_interrupt(cpu, PGM_SPECIFICATION);
|
2015-06-11 14:55:26 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-06-19 19:27:15 +04:00
|
|
|
static void kvm_handle_diag_308(S390CPU *cpu, struct kvm_run *run)
|
|
|
|
{
|
|
|
|
uint64_t r1, r3;
|
|
|
|
|
2014-12-08 16:19:13 +03:00
|
|
|
r1 = (run->s390_sieic.ipa & 0x00f0) >> 4;
|
2013-06-19 19:27:15 +04:00
|
|
|
r3 = run->s390_sieic.ipa & 0x000f;
|
2017-11-30 19:27:34 +03:00
|
|
|
handle_diag_308(&cpu->env, r1, r3, RA_IGNORED);
|
2013-06-19 19:27:15 +04:00
|
|
|
}
|
|
|
|
|
2014-02-25 18:53:00 +04:00
|
|
|
static int handle_sw_breakpoint(S390CPU *cpu, struct kvm_run *run)
|
|
|
|
{
|
|
|
|
CPUS390XState *env = &cpu->env;
|
|
|
|
unsigned long pc;
|
|
|
|
|
2014-06-03 14:46:50 +04:00
|
|
|
pc = env->psw.addr - sw_bp_ilen;
|
2014-02-25 18:53:00 +04:00
|
|
|
if (kvm_find_sw_breakpoint(CPU(cpu), pc)) {
|
|
|
|
env->psw.addr = pc;
|
|
|
|
return EXCP_DEBUG;
|
|
|
|
}
|
|
|
|
|
|
|
|
return -ENOENT;
|
|
|
|
}
|
|
|
|
|
2020-11-14 01:10:22 +03:00
|
|
|
void kvm_s390_set_diag318(CPUState *cs, uint64_t diag318_info)
|
|
|
|
{
|
|
|
|
CPUS390XState *env = &S390_CPU(cs)->env;
|
|
|
|
|
|
|
|
/* Feat bit is set only if KVM supports sync for diag318 */
|
|
|
|
if (s390_has_feat(S390_FEAT_DIAG_318)) {
|
|
|
|
env->diag318_info = diag318_info;
|
|
|
|
cs->kvm_run->s.regs.diag318 = diag318_info;
|
|
|
|
cs->kvm_run->kvm_dirty_regs |= KVM_SYNC_DIAG318;
|
2021-11-17 18:23:03 +03:00
|
|
|
/*
|
|
|
|
* diag 318 info is zeroed during a clear reset and
|
|
|
|
* diag 308 IPL subcodes.
|
|
|
|
*/
|
2020-11-14 01:10:22 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-09-15 22:44:16 +03:00
|
|
|
static void handle_diag_318(S390CPU *cpu, struct kvm_run *run)
|
|
|
|
{
|
|
|
|
uint64_t reg = (run->s390_sieic.ipa & 0x00f0) >> 4;
|
|
|
|
uint64_t diag318_info = run->s.regs.gprs[reg];
|
2020-11-14 01:10:22 +03:00
|
|
|
CPUState *t;
|
2020-09-15 22:44:16 +03:00
|
|
|
|
|
|
|
/*
|
|
|
|
* DIAG 318 can only be enabled with KVM support. As such, let's
|
|
|
|
* ensure a guest cannot execute this instruction erroneously.
|
|
|
|
*/
|
|
|
|
if (!s390_has_feat(S390_FEAT_DIAG_318)) {
|
|
|
|
kvm_s390_program_interrupt(cpu, PGM_SPECIFICATION);
|
2020-11-14 01:10:22 +03:00
|
|
|
return;
|
2020-09-15 22:44:16 +03:00
|
|
|
}
|
|
|
|
|
2020-11-14 01:10:22 +03:00
|
|
|
CPU_FOREACH(t) {
|
|
|
|
run_on_cpu(t, s390_do_cpu_set_diag318,
|
|
|
|
RUN_ON_CPU_HOST_ULONG(diag318_info));
|
2020-09-15 22:44:16 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-12-17 21:27:33 +04:00
|
|
|
#define DIAG_KVM_CODE_MASK 0x000000000000ffff
|
|
|
|
|
|
|
|
static int handle_diag(S390CPU *cpu, struct kvm_run *run, uint32_t ipb)
|
2009-12-05 14:44:24 +03:00
|
|
|
{
|
|
|
|
int r = 0;
|
2013-12-17 21:27:33 +04:00
|
|
|
uint16_t func_code;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* For any diagnose call we support, bits 48-63 of the resulting
|
|
|
|
* address specify the function code; the remainder is ignored.
|
|
|
|
*/
|
2015-03-05 12:36:48 +03:00
|
|
|
func_code = decode_basedisp_rs(&cpu->env, ipb, NULL) & DIAG_KVM_CODE_MASK;
|
2013-12-17 21:27:33 +04:00
|
|
|
switch (func_code) {
|
2015-06-11 14:55:26 +03:00
|
|
|
case DIAG_TIMEREVENT:
|
|
|
|
kvm_handle_diag_288(cpu, run);
|
|
|
|
break;
|
2013-06-19 19:27:15 +04:00
|
|
|
case DIAG_IPL:
|
|
|
|
kvm_handle_diag_308(cpu, run);
|
|
|
|
break;
|
2020-09-15 22:44:16 +03:00
|
|
|
case DIAG_SET_CONTROL_PROGRAM_CODES:
|
|
|
|
handle_diag_318(cpu, run);
|
|
|
|
break;
|
2013-08-30 13:06:56 +04:00
|
|
|
case DIAG_KVM_HYPERCALL:
|
|
|
|
r = handle_hypercall(cpu, run);
|
|
|
|
break;
|
|
|
|
case DIAG_KVM_BREAKPOINT:
|
2014-02-25 18:53:00 +04:00
|
|
|
r = handle_sw_breakpoint(cpu, run);
|
2013-08-30 13:06:56 +04:00
|
|
|
break;
|
|
|
|
default:
|
2013-12-17 21:27:33 +04:00
|
|
|
DPRINTF("KVM: unknown DIAG: 0x%x\n", func_code);
|
2017-07-24 11:52:48 +03:00
|
|
|
kvm_s390_program_interrupt(cpu, PGM_SPECIFICATION);
|
2013-08-30 13:06:56 +04:00
|
|
|
break;
|
2009-12-05 14:44:24 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
2017-09-28 23:36:54 +03:00
|
|
|
static int kvm_s390_handle_sigp(S390CPU *cpu, uint8_t ipa1, uint32_t ipb)
|
2009-12-05 14:44:24 +03:00
|
|
|
{
|
2012-12-01 09:18:14 +04:00
|
|
|
CPUS390XState *env = &cpu->env;
|
2015-02-24 16:15:23 +03:00
|
|
|
const uint8_t r1 = ipa1 >> 4;
|
|
|
|
const uint8_t r3 = ipa1 & 0x0f;
|
|
|
|
int ret;
|
|
|
|
uint8_t order;
|
2009-12-05 14:44:24 +03:00
|
|
|
|
|
|
|
/* get order code */
|
2017-09-28 23:36:54 +03:00
|
|
|
order = decode_basedisp_rs(env, ipb, NULL) & SIGP_ORDER_MASK;
|
2009-12-05 14:44:24 +03:00
|
|
|
|
2017-09-28 23:36:54 +03:00
|
|
|
ret = handle_sigp(env, order, r1, r3);
|
|
|
|
setcc(cpu, ret);
|
|
|
|
return 0;
|
2009-12-05 14:44:24 +03:00
|
|
|
}
|
|
|
|
|
2014-02-25 18:53:00 +04:00
|
|
|
static int handle_instruction(S390CPU *cpu, struct kvm_run *run)
|
2009-12-05 14:44:24 +03:00
|
|
|
{
|
|
|
|
unsigned int ipa0 = (run->s390_sieic.ipa & 0xff00);
|
|
|
|
uint8_t ipa1 = run->s390_sieic.ipa & 0x00ff;
|
2009-12-17 15:56:47 +03:00
|
|
|
int r = -1;
|
2009-12-05 14:44:24 +03:00
|
|
|
|
2013-07-29 16:16:37 +04:00
|
|
|
DPRINTF("handle_instruction 0x%x 0x%x\n",
|
|
|
|
run->s390_sieic.ipa, run->s390_sieic.ipb);
|
2009-12-05 14:44:24 +03:00
|
|
|
switch (ipa0) {
|
2013-01-24 06:28:07 +04:00
|
|
|
case IPA0_B2:
|
2014-02-11 11:41:38 +04:00
|
|
|
r = handle_b2(cpu, run, ipa1);
|
|
|
|
break;
|
2013-01-24 06:28:07 +04:00
|
|
|
case IPA0_B9:
|
2014-02-11 11:41:38 +04:00
|
|
|
r = handle_b9(cpu, run, ipa1);
|
|
|
|
break;
|
2013-01-24 06:28:07 +04:00
|
|
|
case IPA0_EB:
|
2014-10-18 08:24:12 +04:00
|
|
|
r = handle_eb(cpu, run, run->s390_sieic.ipb & 0xff);
|
2013-01-24 06:28:07 +04:00
|
|
|
break;
|
2015-01-09 11:04:39 +03:00
|
|
|
case IPA0_E3:
|
|
|
|
r = handle_e3(cpu, run, run->s390_sieic.ipb & 0xff);
|
|
|
|
break;
|
2013-01-24 06:28:07 +04:00
|
|
|
case IPA0_DIAG:
|
2013-12-17 21:27:33 +04:00
|
|
|
r = handle_diag(cpu, run, run->s390_sieic.ipb);
|
2013-01-24 06:28:07 +04:00
|
|
|
break;
|
|
|
|
case IPA0_SIGP:
|
2017-09-28 23:36:54 +03:00
|
|
|
r = kvm_s390_handle_sigp(cpu, ipa1, run->s390_sieic.ipb);
|
2013-01-24 06:28:07 +04:00
|
|
|
break;
|
2009-12-05 14:44:24 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
if (r < 0) {
|
2014-02-25 18:53:00 +04:00
|
|
|
r = 0;
|
2017-07-24 11:52:48 +03:00
|
|
|
kvm_s390_program_interrupt(cpu, PGM_OPERATION);
|
2009-12-05 14:44:24 +03:00
|
|
|
}
|
2014-02-25 18:53:00 +04:00
|
|
|
|
|
|
|
return r;
|
2009-12-05 14:44:24 +03:00
|
|
|
}
|
|
|
|
|
s390x/cpu: expose the guest crash information
This patch is the s390 implementation of guest crash information,
similar to commit d187e08dc4 ("i386/cpu: add crash-information QOM
property") and the related commits. We will detect several crash
reasons, with the "disabled wait" being the most important one, since
this is used by all s390 guests as a "panic like" notification.
Demonstrate these ways with examples as follows.
1. crash-information QOM property;
Run qemu with -qmp unix:qmp-sock,server, then use utility "qmp-shell"
to execute "qom-get" command, and might get the result like,
(QEMU) (QEMU) qom-get path=/machine/unattached/device[0] \
property=crash-information
{"return": {"core": 0, "reason": "disabled-wait", "psw-mask": 562956395872256, \
"type": "s390", "psw-addr": 1102832}}
2. GUEST_PANICKED event reporting;
Run qemu with a socket option, and telnet or nc to that,
-chardev socket,id=qmp,port=4444,host=localhost,server \
-mon chardev=qmp,mode=control,pretty=on \
Negotiating the mode by { "execute": "qmp_capabilities" }, and the crash
information will be reported on a guest crash event like,
{
"timestamp": {
"seconds": 1518004739,
"microseconds": 552563
},
"event": "GUEST_PANICKED",
"data": {
"action": "pause",
"info": {
"core": 0,
"psw-addr": 1102832,
"reason": "disabled-wait",
"psw-mask": 562956395872256,
"type": "s390"
}
}
}
3. log;
Run qemu with the parameters: -D <logfile> -d guest_errors, to
specify the logfile and log item. The results might be,
Guest crashed on cpu 0: disabled-wait
PSW: 0x0002000180000000 0x000000000010d3f0
Co-authored-by: Jing Liu <liujbjl@linux.vnet.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Message-Id: <20180209122543.25755-1-borntraeger@de.ibm.com>
Reviewed-by: Eric Blake <eblake@redhat.com>
[CH: tweaked qapi comment]
Signed-off-by: Cornelia Huck <cohuck@redhat.com>
2018-02-09 15:25:43 +03:00
|
|
|
static void unmanageable_intercept(S390CPU *cpu, S390CrashReason reason,
|
|
|
|
int pswoffset)
|
2014-03-21 00:49:18 +04:00
|
|
|
{
|
|
|
|
CPUState *cs = CPU(cpu);
|
|
|
|
|
2014-09-30 12:57:29 +04:00
|
|
|
s390_cpu_halt(cpu);
|
s390x/cpu: expose the guest crash information
This patch is the s390 implementation of guest crash information,
similar to commit d187e08dc4 ("i386/cpu: add crash-information QOM
property") and the related commits. We will detect several crash
reasons, with the "disabled wait" being the most important one, since
this is used by all s390 guests as a "panic like" notification.
Demonstrate these ways with examples as follows.
1. crash-information QOM property;
Run qemu with -qmp unix:qmp-sock,server, then use utility "qmp-shell"
to execute "qom-get" command, and might get the result like,
(QEMU) (QEMU) qom-get path=/machine/unattached/device[0] \
property=crash-information
{"return": {"core": 0, "reason": "disabled-wait", "psw-mask": 562956395872256, \
"type": "s390", "psw-addr": 1102832}}
2. GUEST_PANICKED event reporting;
Run qemu with a socket option, and telnet or nc to that,
-chardev socket,id=qmp,port=4444,host=localhost,server \
-mon chardev=qmp,mode=control,pretty=on \
Negotiating the mode by { "execute": "qmp_capabilities" }, and the crash
information will be reported on a guest crash event like,
{
"timestamp": {
"seconds": 1518004739,
"microseconds": 552563
},
"event": "GUEST_PANICKED",
"data": {
"action": "pause",
"info": {
"core": 0,
"psw-addr": 1102832,
"reason": "disabled-wait",
"psw-mask": 562956395872256,
"type": "s390"
}
}
}
3. log;
Run qemu with the parameters: -D <logfile> -d guest_errors, to
specify the logfile and log item. The results might be,
Guest crashed on cpu 0: disabled-wait
PSW: 0x0002000180000000 0x000000000010d3f0
Co-authored-by: Jing Liu <liujbjl@linux.vnet.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Message-Id: <20180209122543.25755-1-borntraeger@de.ibm.com>
Reviewed-by: Eric Blake <eblake@redhat.com>
[CH: tweaked qapi comment]
Signed-off-by: Cornelia Huck <cohuck@redhat.com>
2018-02-09 15:25:43 +03:00
|
|
|
cpu->env.crash_reason = reason;
|
|
|
|
qemu_system_guest_panicked(cpu_get_crash_info(cs));
|
2014-03-21 00:49:18 +04:00
|
|
|
}
|
|
|
|
|
2017-01-26 22:23:30 +03:00
|
|
|
/* try to detect pgm check loops */
|
|
|
|
static int handle_oper_loop(S390CPU *cpu, struct kvm_run *run)
|
|
|
|
{
|
|
|
|
CPUState *cs = CPU(cpu);
|
|
|
|
PSW oldpsw, newpsw;
|
|
|
|
|
|
|
|
newpsw.mask = ldq_phys(cs->as, cpu->env.psa +
|
|
|
|
offsetof(LowCore, program_new_psw));
|
|
|
|
newpsw.addr = ldq_phys(cs->as, cpu->env.psa +
|
|
|
|
offsetof(LowCore, program_new_psw) + 8);
|
|
|
|
oldpsw.mask = run->psw_mask;
|
|
|
|
oldpsw.addr = run->psw_addr;
|
|
|
|
/*
|
|
|
|
* Avoid endless loops of operation exceptions, if the pgm new
|
|
|
|
* PSW will cause a new operation exception.
|
|
|
|
* The heuristic checks if the pgm new psw is within 6 bytes before
|
|
|
|
* the faulting psw address (with same DAT, AS settings) and the
|
|
|
|
* new psw is not a wait psw and the fault was not triggered by
|
|
|
|
* problem state. In that case go into crashed state.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (oldpsw.addr - newpsw.addr <= 6 &&
|
|
|
|
!(newpsw.mask & PSW_MASK_WAIT) &&
|
|
|
|
!(oldpsw.mask & PSW_MASK_PSTATE) &&
|
|
|
|
(newpsw.mask & PSW_MASK_ASC) == (oldpsw.mask & PSW_MASK_ASC) &&
|
|
|
|
(newpsw.mask & PSW_MASK_DAT) == (oldpsw.mask & PSW_MASK_DAT)) {
|
s390x/cpu: expose the guest crash information
This patch is the s390 implementation of guest crash information,
similar to commit d187e08dc4 ("i386/cpu: add crash-information QOM
property") and the related commits. We will detect several crash
reasons, with the "disabled wait" being the most important one, since
this is used by all s390 guests as a "panic like" notification.
Demonstrate these ways with examples as follows.
1. crash-information QOM property;
Run qemu with -qmp unix:qmp-sock,server, then use utility "qmp-shell"
to execute "qom-get" command, and might get the result like,
(QEMU) (QEMU) qom-get path=/machine/unattached/device[0] \
property=crash-information
{"return": {"core": 0, "reason": "disabled-wait", "psw-mask": 562956395872256, \
"type": "s390", "psw-addr": 1102832}}
2. GUEST_PANICKED event reporting;
Run qemu with a socket option, and telnet or nc to that,
-chardev socket,id=qmp,port=4444,host=localhost,server \
-mon chardev=qmp,mode=control,pretty=on \
Negotiating the mode by { "execute": "qmp_capabilities" }, and the crash
information will be reported on a guest crash event like,
{
"timestamp": {
"seconds": 1518004739,
"microseconds": 552563
},
"event": "GUEST_PANICKED",
"data": {
"action": "pause",
"info": {
"core": 0,
"psw-addr": 1102832,
"reason": "disabled-wait",
"psw-mask": 562956395872256,
"type": "s390"
}
}
}
3. log;
Run qemu with the parameters: -D <logfile> -d guest_errors, to
specify the logfile and log item. The results might be,
Guest crashed on cpu 0: disabled-wait
PSW: 0x0002000180000000 0x000000000010d3f0
Co-authored-by: Jing Liu <liujbjl@linux.vnet.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Message-Id: <20180209122543.25755-1-borntraeger@de.ibm.com>
Reviewed-by: Eric Blake <eblake@redhat.com>
[CH: tweaked qapi comment]
Signed-off-by: Cornelia Huck <cohuck@redhat.com>
2018-02-09 15:25:43 +03:00
|
|
|
unmanageable_intercept(cpu, S390_CRASH_REASON_OPINT_LOOP,
|
2017-01-26 22:23:30 +03:00
|
|
|
offsetof(LowCore, program_new_psw));
|
|
|
|
return EXCP_HALTED;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2012-10-31 09:06:49 +04:00
|
|
|
static int handle_intercept(S390CPU *cpu)
|
2009-12-05 14:44:24 +03:00
|
|
|
{
|
2012-12-01 09:18:14 +04:00
|
|
|
CPUState *cs = CPU(cpu);
|
|
|
|
struct kvm_run *run = cs->kvm_run;
|
2009-12-05 14:44:24 +03:00
|
|
|
int icpt_code = run->s390_sieic.icptcode;
|
|
|
|
int r = 0;
|
|
|
|
|
2021-03-03 21:22:02 +03:00
|
|
|
DPRINTF("intercept: 0x%x (at 0x%lx)\n", icpt_code, (long)run->psw_addr);
|
2009-12-05 14:44:24 +03:00
|
|
|
switch (icpt_code) {
|
|
|
|
case ICPT_INSTRUCTION:
|
2020-03-19 16:19:11 +03:00
|
|
|
case ICPT_PV_INSTR:
|
|
|
|
case ICPT_PV_INSTR_NOTIFICATION:
|
2014-02-25 18:53:00 +04:00
|
|
|
r = handle_instruction(cpu, run);
|
2009-12-05 14:44:24 +03:00
|
|
|
break;
|
2014-05-07 11:45:21 +04:00
|
|
|
case ICPT_PROGRAM:
|
s390x/cpu: expose the guest crash information
This patch is the s390 implementation of guest crash information,
similar to commit d187e08dc4 ("i386/cpu: add crash-information QOM
property") and the related commits. We will detect several crash
reasons, with the "disabled wait" being the most important one, since
this is used by all s390 guests as a "panic like" notification.
Demonstrate these ways with examples as follows.
1. crash-information QOM property;
Run qemu with -qmp unix:qmp-sock,server, then use utility "qmp-shell"
to execute "qom-get" command, and might get the result like,
(QEMU) (QEMU) qom-get path=/machine/unattached/device[0] \
property=crash-information
{"return": {"core": 0, "reason": "disabled-wait", "psw-mask": 562956395872256, \
"type": "s390", "psw-addr": 1102832}}
2. GUEST_PANICKED event reporting;
Run qemu with a socket option, and telnet or nc to that,
-chardev socket,id=qmp,port=4444,host=localhost,server \
-mon chardev=qmp,mode=control,pretty=on \
Negotiating the mode by { "execute": "qmp_capabilities" }, and the crash
information will be reported on a guest crash event like,
{
"timestamp": {
"seconds": 1518004739,
"microseconds": 552563
},
"event": "GUEST_PANICKED",
"data": {
"action": "pause",
"info": {
"core": 0,
"psw-addr": 1102832,
"reason": "disabled-wait",
"psw-mask": 562956395872256,
"type": "s390"
}
}
}
3. log;
Run qemu with the parameters: -D <logfile> -d guest_errors, to
specify the logfile and log item. The results might be,
Guest crashed on cpu 0: disabled-wait
PSW: 0x0002000180000000 0x000000000010d3f0
Co-authored-by: Jing Liu <liujbjl@linux.vnet.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Message-Id: <20180209122543.25755-1-borntraeger@de.ibm.com>
Reviewed-by: Eric Blake <eblake@redhat.com>
[CH: tweaked qapi comment]
Signed-off-by: Cornelia Huck <cohuck@redhat.com>
2018-02-09 15:25:43 +03:00
|
|
|
unmanageable_intercept(cpu, S390_CRASH_REASON_PGMINT_LOOP,
|
2014-05-07 11:45:21 +04:00
|
|
|
offsetof(LowCore, program_new_psw));
|
|
|
|
r = EXCP_HALTED;
|
|
|
|
break;
|
2014-03-21 00:49:18 +04:00
|
|
|
case ICPT_EXT_INT:
|
s390x/cpu: expose the guest crash information
This patch is the s390 implementation of guest crash information,
similar to commit d187e08dc4 ("i386/cpu: add crash-information QOM
property") and the related commits. We will detect several crash
reasons, with the "disabled wait" being the most important one, since
this is used by all s390 guests as a "panic like" notification.
Demonstrate these ways with examples as follows.
1. crash-information QOM property;
Run qemu with -qmp unix:qmp-sock,server, then use utility "qmp-shell"
to execute "qom-get" command, and might get the result like,
(QEMU) (QEMU) qom-get path=/machine/unattached/device[0] \
property=crash-information
{"return": {"core": 0, "reason": "disabled-wait", "psw-mask": 562956395872256, \
"type": "s390", "psw-addr": 1102832}}
2. GUEST_PANICKED event reporting;
Run qemu with a socket option, and telnet or nc to that,
-chardev socket,id=qmp,port=4444,host=localhost,server \
-mon chardev=qmp,mode=control,pretty=on \
Negotiating the mode by { "execute": "qmp_capabilities" }, and the crash
information will be reported on a guest crash event like,
{
"timestamp": {
"seconds": 1518004739,
"microseconds": 552563
},
"event": "GUEST_PANICKED",
"data": {
"action": "pause",
"info": {
"core": 0,
"psw-addr": 1102832,
"reason": "disabled-wait",
"psw-mask": 562956395872256,
"type": "s390"
}
}
}
3. log;
Run qemu with the parameters: -D <logfile> -d guest_errors, to
specify the logfile and log item. The results might be,
Guest crashed on cpu 0: disabled-wait
PSW: 0x0002000180000000 0x000000000010d3f0
Co-authored-by: Jing Liu <liujbjl@linux.vnet.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Message-Id: <20180209122543.25755-1-borntraeger@de.ibm.com>
Reviewed-by: Eric Blake <eblake@redhat.com>
[CH: tweaked qapi comment]
Signed-off-by: Cornelia Huck <cohuck@redhat.com>
2018-02-09 15:25:43 +03:00
|
|
|
unmanageable_intercept(cpu, S390_CRASH_REASON_EXTINT_LOOP,
|
2014-03-21 00:49:18 +04:00
|
|
|
offsetof(LowCore, external_new_psw));
|
|
|
|
r = EXCP_HALTED;
|
|
|
|
break;
|
2009-12-05 14:44:24 +03:00
|
|
|
case ICPT_WAITPSW:
|
2013-04-26 07:24:47 +04:00
|
|
|
/* disabled wait, since enabled wait is handled in kernel */
|
2017-09-28 23:36:46 +03:00
|
|
|
s390_handle_wait(cpu);
|
2012-04-23 03:52:25 +04:00
|
|
|
r = EXCP_HALTED;
|
|
|
|
break;
|
2011-10-04 09:20:59 +04:00
|
|
|
case ICPT_CPU_STOP:
|
2017-09-28 23:36:56 +03:00
|
|
|
do_stop_interrupt(&cpu->env);
|
2011-10-04 09:20:59 +04:00
|
|
|
r = EXCP_HALTED;
|
2009-12-05 14:44:24 +03:00
|
|
|
break;
|
2014-06-03 14:46:50 +04:00
|
|
|
case ICPT_OPEREXC:
|
2017-01-26 22:23:30 +03:00
|
|
|
/* check for break points */
|
2014-06-03 14:46:50 +04:00
|
|
|
r = handle_sw_breakpoint(cpu, run);
|
|
|
|
if (r == -ENOENT) {
|
2017-01-26 22:23:30 +03:00
|
|
|
/* Then check for potential pgm check loops */
|
|
|
|
r = handle_oper_loop(cpu, run);
|
|
|
|
if (r == 0) {
|
2017-07-24 11:52:48 +03:00
|
|
|
kvm_s390_program_interrupt(cpu, PGM_OPERATION);
|
2017-01-26 22:23:30 +03:00
|
|
|
}
|
2014-06-03 14:46:50 +04:00
|
|
|
}
|
|
|
|
break;
|
2009-12-05 14:44:24 +03:00
|
|
|
case ICPT_SOFT_INTERCEPT:
|
|
|
|
fprintf(stderr, "KVM unimplemented icpt SOFT\n");
|
|
|
|
exit(1);
|
|
|
|
break;
|
|
|
|
case ICPT_IO:
|
|
|
|
fprintf(stderr, "KVM unimplemented icpt IO\n");
|
|
|
|
exit(1);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
fprintf(stderr, "Unknown intercept code: %d\n", icpt_code);
|
|
|
|
exit(1);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
2013-01-24 06:28:07 +04:00
|
|
|
static int handle_tsch(S390CPU *cpu)
|
|
|
|
{
|
|
|
|
CPUState *cs = CPU(cpu);
|
|
|
|
struct kvm_run *run = cs->kvm_run;
|
|
|
|
int ret;
|
|
|
|
|
2017-11-30 19:27:32 +03:00
|
|
|
ret = ioinst_handle_tsch(cpu, cpu->env.regs[1], run->s390_tsch.ipb,
|
|
|
|
RA_IGNORED);
|
2015-02-12 20:09:36 +03:00
|
|
|
if (ret < 0) {
|
2013-01-24 06:28:07 +04:00
|
|
|
/*
|
|
|
|
* Failure.
|
|
|
|
* If an I/O interrupt had been dequeued, we have to reinject it.
|
|
|
|
*/
|
|
|
|
if (run->s390_tsch.dequeued) {
|
2018-01-29 15:56:10 +03:00
|
|
|
s390_io_interrupt(run->s390_tsch.subchannel_id,
|
|
|
|
run->s390_tsch.subchannel_nr,
|
|
|
|
run->s390_tsch.io_int_parm,
|
|
|
|
run->s390_tsch.io_int_word);
|
2013-01-24 06:28:07 +04:00
|
|
|
}
|
|
|
|
ret = 0;
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2015-03-05 12:36:48 +03:00
|
|
|
static void insert_stsi_3_2_2(S390CPU *cpu, __u64 addr, uint8_t ar)
|
2015-03-03 20:35:27 +03:00
|
|
|
{
|
2020-03-31 14:01:23 +03:00
|
|
|
const MachineState *ms = MACHINE(qdev_get_machine());
|
|
|
|
uint16_t conf_cpus = 0, reserved_cpus = 0;
|
2018-01-29 15:56:17 +03:00
|
|
|
SysIB_322 sysib;
|
2020-03-31 14:01:23 +03:00
|
|
|
int del, i;
|
2015-03-03 20:35:27 +03:00
|
|
|
|
2020-03-19 16:19:13 +03:00
|
|
|
if (s390_is_pv()) {
|
|
|
|
s390_cpu_pv_mem_read(cpu, 0, &sysib, sizeof(sysib));
|
|
|
|
} else if (s390_cpu_virt_mem_read(cpu, addr, ar, &sysib, sizeof(sysib))) {
|
2015-03-03 20:35:27 +03:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
/* Shift the stack of Extended Names to prepare for our own data */
|
|
|
|
memmove(&sysib.ext_names[1], &sysib.ext_names[0],
|
|
|
|
sizeof(sysib.ext_names[0]) * (sysib.count - 1));
|
|
|
|
/* First virt level, that doesn't provide Ext Names delimits stack. It is
|
|
|
|
* assumed it's not capable of managing Extended Names for lower levels.
|
|
|
|
*/
|
|
|
|
for (del = 1; del < sysib.count; del++) {
|
|
|
|
if (!sysib.vm[del].ext_name_encoding || !sysib.ext_names[del][0]) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (del < sysib.count) {
|
|
|
|
memset(sysib.ext_names[del], 0,
|
|
|
|
sizeof(sysib.ext_names[0]) * (sysib.count - del));
|
|
|
|
}
|
2020-03-31 14:01:23 +03:00
|
|
|
|
|
|
|
/* count the cpus and split them into configured and reserved ones */
|
|
|
|
for (i = 0; i < ms->possible_cpus->len; i++) {
|
|
|
|
if (ms->possible_cpus->cpus[i].cpu) {
|
|
|
|
conf_cpus++;
|
|
|
|
} else {
|
|
|
|
reserved_cpus++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
sysib.vm[0].total_cpus = conf_cpus + reserved_cpus;
|
|
|
|
sysib.vm[0].conf_cpus = conf_cpus;
|
|
|
|
sysib.vm[0].reserved_cpus = reserved_cpus;
|
|
|
|
|
2015-03-03 20:35:27 +03:00
|
|
|
/* Insert short machine name in EBCDIC, padded with blanks */
|
|
|
|
if (qemu_name) {
|
|
|
|
memset(sysib.vm[0].name, 0x40, sizeof(sysib.vm[0].name));
|
|
|
|
ebcdic_put(sysib.vm[0].name, qemu_name, MIN(sizeof(sysib.vm[0].name),
|
|
|
|
strlen(qemu_name)));
|
|
|
|
}
|
|
|
|
sysib.vm[0].ext_name_encoding = 2; /* 2 = UTF-8 */
|
|
|
|
/* If hypervisor specifies zero Extended Name in STSI322 SYSIB, it's
|
|
|
|
* considered by s390 as not capable of providing any Extended Name.
|
|
|
|
* Therefore if no name was specified on qemu invocation, we go with the
|
|
|
|
* same "KVMguest" default, which KVM has filled into short name field.
|
|
|
|
*/
|
2021-01-14 10:07:36 +03:00
|
|
|
strpadcpy((char *)sysib.ext_names[0],
|
|
|
|
sizeof(sysib.ext_names[0]),
|
|
|
|
qemu_name ?: "KVMguest", '\0');
|
|
|
|
|
2015-03-03 20:35:27 +03:00
|
|
|
/* Insert UUID */
|
2016-09-27 11:08:50 +03:00
|
|
|
memcpy(sysib.vm[0].uuid, &qemu_uuid, sizeof(sysib.vm[0].uuid));
|
2015-03-03 20:35:27 +03:00
|
|
|
|
2020-03-19 16:19:13 +03:00
|
|
|
if (s390_is_pv()) {
|
|
|
|
s390_cpu_pv_mem_write(cpu, 0, &sysib, sizeof(sysib));
|
|
|
|
} else {
|
|
|
|
s390_cpu_virt_mem_write(cpu, addr, ar, &sysib, sizeof(sysib));
|
|
|
|
}
|
2015-03-03 20:35:27 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
static int handle_stsi(S390CPU *cpu)
|
|
|
|
{
|
|
|
|
CPUState *cs = CPU(cpu);
|
|
|
|
struct kvm_run *run = cs->kvm_run;
|
|
|
|
|
|
|
|
switch (run->s390_stsi.fc) {
|
|
|
|
case 3:
|
|
|
|
if (run->s390_stsi.sel1 != 2 || run->s390_stsi.sel2 != 2) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
/* Only sysib 3.2.2 needs post-handling for now. */
|
2015-03-05 12:36:48 +03:00
|
|
|
insert_stsi_3_2_2(cpu, run->s390_stsi.addr, run->s390_stsi.ar);
|
2015-03-03 20:35:27 +03:00
|
|
|
return 0;
|
|
|
|
default:
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-09-03 14:45:13 +04:00
|
|
|
static int kvm_arch_handle_debug_exit(S390CPU *cpu)
|
|
|
|
{
|
2012-09-03 15:09:10 +04:00
|
|
|
CPUState *cs = CPU(cpu);
|
|
|
|
struct kvm_run *run = cs->kvm_run;
|
|
|
|
|
|
|
|
int ret = 0;
|
|
|
|
struct kvm_debug_exit_arch *arch_info = &run->debug.arch;
|
|
|
|
|
|
|
|
switch (arch_info->type) {
|
|
|
|
case KVM_HW_WP_WRITE:
|
|
|
|
if (find_hw_breakpoint(arch_info->addr, -1, arch_info->type)) {
|
|
|
|
cs->watchpoint_hit = &hw_watchpoint;
|
|
|
|
hw_watchpoint.vaddr = arch_info->addr;
|
|
|
|
hw_watchpoint.flags = BP_MEM_WRITE;
|
|
|
|
ret = EXCP_DEBUG;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case KVM_HW_BP:
|
|
|
|
if (find_hw_breakpoint(arch_info->addr, -1, arch_info->type)) {
|
|
|
|
ret = EXCP_DEBUG;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case KVM_SINGLESTEP:
|
|
|
|
if (cs->singlestep_enabled) {
|
|
|
|
ret = EXCP_DEBUG;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
ret = -ENOSYS;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
2012-09-03 14:45:13 +04:00
|
|
|
}
|
|
|
|
|
2012-10-31 09:57:49 +04:00
|
|
|
int kvm_arch_handle_exit(CPUState *cs, struct kvm_run *run)
|
2009-12-05 14:44:24 +03:00
|
|
|
{
|
2012-10-31 09:57:49 +04:00
|
|
|
S390CPU *cpu = S390_CPU(cs);
|
2009-12-05 14:44:24 +03:00
|
|
|
int ret = 0;
|
|
|
|
|
2015-06-18 19:47:23 +03:00
|
|
|
qemu_mutex_lock_iothread();
|
|
|
|
|
2018-04-12 12:35:21 +03:00
|
|
|
kvm_cpu_synchronize_state(cs);
|
2018-04-06 12:35:52 +03:00
|
|
|
|
2009-12-05 14:44:24 +03:00
|
|
|
switch (run->exit_reason) {
|
|
|
|
case KVM_EXIT_S390_SIEIC:
|
2012-10-31 09:06:49 +04:00
|
|
|
ret = handle_intercept(cpu);
|
2009-12-05 14:44:24 +03:00
|
|
|
break;
|
|
|
|
case KVM_EXIT_S390_RESET:
|
2018-04-24 13:18:59 +03:00
|
|
|
s390_ipl_reset_request(cs, S390_RESET_REIPL);
|
2009-12-05 14:44:24 +03:00
|
|
|
break;
|
2013-01-24 06:28:07 +04:00
|
|
|
case KVM_EXIT_S390_TSCH:
|
|
|
|
ret = handle_tsch(cpu);
|
|
|
|
break;
|
2015-03-03 20:35:27 +03:00
|
|
|
case KVM_EXIT_S390_STSI:
|
|
|
|
ret = handle_stsi(cpu);
|
|
|
|
break;
|
2012-09-03 14:45:13 +04:00
|
|
|
case KVM_EXIT_DEBUG:
|
|
|
|
ret = kvm_arch_handle_debug_exit(cpu);
|
|
|
|
break;
|
2009-12-05 14:44:24 +03:00
|
|
|
default:
|
|
|
|
fprintf(stderr, "Unknown KVM exit: %d\n", run->exit_reason);
|
|
|
|
break;
|
|
|
|
}
|
2015-06-18 19:47:23 +03:00
|
|
|
qemu_mutex_unlock_iothread();
|
2009-12-05 14:44:24 +03:00
|
|
|
|
2011-03-15 14:26:28 +03:00
|
|
|
if (ret == 0) {
|
|
|
|
ret = EXCP_INTERRUPT;
|
|
|
|
}
|
2009-12-05 14:44:24 +03:00
|
|
|
return ret;
|
|
|
|
}
|
2010-05-10 12:21:34 +04:00
|
|
|
|
2012-10-31 09:57:49 +04:00
|
|
|
bool kvm_arch_stop_on_emulation_error(CPUState *cpu)
|
2010-05-10 12:21:34 +04:00
|
|
|
{
|
|
|
|
return true;
|
|
|
|
}
|
2011-02-02 00:15:51 +03:00
|
|
|
|
2013-01-24 06:28:07 +04:00
|
|
|
void kvm_s390_enable_css_support(S390CPU *cpu)
|
|
|
|
{
|
|
|
|
int r;
|
|
|
|
|
|
|
|
/* Activate host kernel channel subsystem support. */
|
2014-04-09 19:23:34 +04:00
|
|
|
r = kvm_vcpu_enable_cap(CPU(cpu), KVM_CAP_S390_CSS_SUPPORT, 0);
|
2013-01-24 06:28:07 +04:00
|
|
|
assert(r == 0);
|
|
|
|
}
|
2013-06-12 11:26:53 +04:00
|
|
|
|
|
|
|
void kvm_arch_init_irq_routing(KVMState *s)
|
|
|
|
{
|
2013-07-15 19:45:03 +04:00
|
|
|
/*
|
|
|
|
* Note that while irqchip capabilities generally imply that cpustates
|
|
|
|
* are handled in-kernel, it is not true for s390 (yet); therefore, we
|
|
|
|
* have to override the common code kvm_halt_in_kernel_allowed setting.
|
|
|
|
*/
|
|
|
|
if (kvm_check_extension(s, KVM_CAP_IRQ_ROUTING)) {
|
|
|
|
kvm_gsi_routing_allowed = true;
|
|
|
|
kvm_halt_in_kernel_allowed = false;
|
|
|
|
}
|
2013-06-12 11:26:53 +04:00
|
|
|
}
|
2013-02-15 13:18:43 +04:00
|
|
|
|
2013-06-28 11:28:06 +04:00
|
|
|
int kvm_s390_assign_subch_ioeventfd(EventNotifier *notifier, uint32_t sch,
|
|
|
|
int vq, bool assign)
|
2013-02-15 13:18:43 +04:00
|
|
|
{
|
|
|
|
struct kvm_ioeventfd kick = {
|
|
|
|
.flags = KVM_IOEVENTFD_FLAG_VIRTIO_CCW_NOTIFY |
|
|
|
|
KVM_IOEVENTFD_FLAG_DATAMATCH,
|
2013-06-28 11:28:06 +04:00
|
|
|
.fd = event_notifier_get_fd(notifier),
|
2013-02-15 13:18:43 +04:00
|
|
|
.datamatch = vq,
|
|
|
|
.addr = sch,
|
|
|
|
.len = 8,
|
|
|
|
};
|
2019-02-12 17:50:00 +03:00
|
|
|
trace_kvm_assign_subch_ioeventfd(kick.fd, kick.addr, assign,
|
|
|
|
kick.datamatch);
|
2013-02-15 13:18:43 +04:00
|
|
|
if (!kvm_check_extension(kvm_state, KVM_CAP_IOEVENTFD)) {
|
|
|
|
return -ENOSYS;
|
|
|
|
}
|
|
|
|
if (!assign) {
|
|
|
|
kick.flags |= KVM_IOEVENTFD_FLAG_DEASSIGN;
|
|
|
|
}
|
|
|
|
return kvm_vm_ioctl(kvm_state, KVM_IOEVENTFD, &kick);
|
|
|
|
}
|
2014-08-28 19:25:35 +04:00
|
|
|
|
2022-10-17 11:38:18 +03:00
|
|
|
int kvm_s390_get_protected_dump(void)
|
|
|
|
{
|
|
|
|
return cap_protected_dump;
|
|
|
|
}
|
|
|
|
|
2016-03-09 15:11:17 +03:00
|
|
|
int kvm_s390_get_ri(void)
|
|
|
|
{
|
|
|
|
return cap_ri;
|
|
|
|
}
|
|
|
|
|
2014-09-30 12:57:30 +04:00
|
|
|
int kvm_s390_set_cpu_state(S390CPU *cpu, uint8_t cpu_state)
|
|
|
|
{
|
|
|
|
struct kvm_mp_state mp_state = {};
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
/* the kvm part might not have been initialized yet */
|
|
|
|
if (CPU(cpu)->kvm_state == NULL) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
switch (cpu_state) {
|
qmp: expose s390-specific CPU info
Presently s390x is the only architecture not exposing specific
CPU information via QMP query-cpus. Upstream discussion has shown
that it could make sense to report the architecture specific CPU
state, e.g. to detect that a CPU has been stopped.
With this change the output of query-cpus will look like this on
s390:
[
{"arch": "s390", "current": true,
"props": {"core-id": 0}, "cpu-state": "operating", "CPU": 0,
"qom_path": "/machine/unattached/device[0]",
"halted": false, "thread_id": 63115},
{"arch": "s390", "current": false,
"props": {"core-id": 1}, "cpu-state": "stopped", "CPU": 1,
"qom_path": "/machine/unattached/device[1]",
"halted": true, "thread_id": 63116}
]
This change doesn't add the s390-specific data to HMP 'info cpus'.
A follow-on patch will remove all architecture specific information
from there.
Signed-off-by: Viktor Mihajlovski <mihajlov@linux.vnet.ibm.com>
Reviewed-by: David Hildenbrand <david@redhat.com>
Reviewed-by: Christian Borntraeger <borntraeger@de.ibm.com>
Reviewed-by: Eric Blake <eblake@redhat.com>
Message-Id: <1518797321-28356-2-git-send-email-mihajlov@linux.vnet.ibm.com>
Reviewed-by: Cornelia Huck <cohuck@redhat.com>
Signed-off-by: Cornelia Huck <cohuck@redhat.com>
2018-02-16 19:08:37 +03:00
|
|
|
case S390_CPU_STATE_STOPPED:
|
2014-09-30 12:57:30 +04:00
|
|
|
mp_state.mp_state = KVM_MP_STATE_STOPPED;
|
|
|
|
break;
|
qmp: expose s390-specific CPU info
Presently s390x is the only architecture not exposing specific
CPU information via QMP query-cpus. Upstream discussion has shown
that it could make sense to report the architecture specific CPU
state, e.g. to detect that a CPU has been stopped.
With this change the output of query-cpus will look like this on
s390:
[
{"arch": "s390", "current": true,
"props": {"core-id": 0}, "cpu-state": "operating", "CPU": 0,
"qom_path": "/machine/unattached/device[0]",
"halted": false, "thread_id": 63115},
{"arch": "s390", "current": false,
"props": {"core-id": 1}, "cpu-state": "stopped", "CPU": 1,
"qom_path": "/machine/unattached/device[1]",
"halted": true, "thread_id": 63116}
]
This change doesn't add the s390-specific data to HMP 'info cpus'.
A follow-on patch will remove all architecture specific information
from there.
Signed-off-by: Viktor Mihajlovski <mihajlov@linux.vnet.ibm.com>
Reviewed-by: David Hildenbrand <david@redhat.com>
Reviewed-by: Christian Borntraeger <borntraeger@de.ibm.com>
Reviewed-by: Eric Blake <eblake@redhat.com>
Message-Id: <1518797321-28356-2-git-send-email-mihajlov@linux.vnet.ibm.com>
Reviewed-by: Cornelia Huck <cohuck@redhat.com>
Signed-off-by: Cornelia Huck <cohuck@redhat.com>
2018-02-16 19:08:37 +03:00
|
|
|
case S390_CPU_STATE_CHECK_STOP:
|
2014-09-30 12:57:30 +04:00
|
|
|
mp_state.mp_state = KVM_MP_STATE_CHECK_STOP;
|
|
|
|
break;
|
qmp: expose s390-specific CPU info
Presently s390x is the only architecture not exposing specific
CPU information via QMP query-cpus. Upstream discussion has shown
that it could make sense to report the architecture specific CPU
state, e.g. to detect that a CPU has been stopped.
With this change the output of query-cpus will look like this on
s390:
[
{"arch": "s390", "current": true,
"props": {"core-id": 0}, "cpu-state": "operating", "CPU": 0,
"qom_path": "/machine/unattached/device[0]",
"halted": false, "thread_id": 63115},
{"arch": "s390", "current": false,
"props": {"core-id": 1}, "cpu-state": "stopped", "CPU": 1,
"qom_path": "/machine/unattached/device[1]",
"halted": true, "thread_id": 63116}
]
This change doesn't add the s390-specific data to HMP 'info cpus'.
A follow-on patch will remove all architecture specific information
from there.
Signed-off-by: Viktor Mihajlovski <mihajlov@linux.vnet.ibm.com>
Reviewed-by: David Hildenbrand <david@redhat.com>
Reviewed-by: Christian Borntraeger <borntraeger@de.ibm.com>
Reviewed-by: Eric Blake <eblake@redhat.com>
Message-Id: <1518797321-28356-2-git-send-email-mihajlov@linux.vnet.ibm.com>
Reviewed-by: Cornelia Huck <cohuck@redhat.com>
Signed-off-by: Cornelia Huck <cohuck@redhat.com>
2018-02-16 19:08:37 +03:00
|
|
|
case S390_CPU_STATE_OPERATING:
|
2014-09-30 12:57:30 +04:00
|
|
|
mp_state.mp_state = KVM_MP_STATE_OPERATING;
|
|
|
|
break;
|
qmp: expose s390-specific CPU info
Presently s390x is the only architecture not exposing specific
CPU information via QMP query-cpus. Upstream discussion has shown
that it could make sense to report the architecture specific CPU
state, e.g. to detect that a CPU has been stopped.
With this change the output of query-cpus will look like this on
s390:
[
{"arch": "s390", "current": true,
"props": {"core-id": 0}, "cpu-state": "operating", "CPU": 0,
"qom_path": "/machine/unattached/device[0]",
"halted": false, "thread_id": 63115},
{"arch": "s390", "current": false,
"props": {"core-id": 1}, "cpu-state": "stopped", "CPU": 1,
"qom_path": "/machine/unattached/device[1]",
"halted": true, "thread_id": 63116}
]
This change doesn't add the s390-specific data to HMP 'info cpus'.
A follow-on patch will remove all architecture specific information
from there.
Signed-off-by: Viktor Mihajlovski <mihajlov@linux.vnet.ibm.com>
Reviewed-by: David Hildenbrand <david@redhat.com>
Reviewed-by: Christian Borntraeger <borntraeger@de.ibm.com>
Reviewed-by: Eric Blake <eblake@redhat.com>
Message-Id: <1518797321-28356-2-git-send-email-mihajlov@linux.vnet.ibm.com>
Reviewed-by: Cornelia Huck <cohuck@redhat.com>
Signed-off-by: Cornelia Huck <cohuck@redhat.com>
2018-02-16 19:08:37 +03:00
|
|
|
case S390_CPU_STATE_LOAD:
|
2014-09-30 12:57:30 +04:00
|
|
|
mp_state.mp_state = KVM_MP_STATE_LOAD;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
error_report("Requested CPU state is not a valid S390 CPU state: %u",
|
|
|
|
cpu_state);
|
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = kvm_vcpu_ioctl(CPU(cpu), KVM_SET_MP_STATE, &mp_state);
|
|
|
|
if (ret) {
|
|
|
|
trace_kvm_failed_cpu_state_set(CPU(cpu)->cpu_index, cpu_state,
|
|
|
|
strerror(-ret));
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
2015-01-09 11:04:40 +03:00
|
|
|
|
2015-03-02 19:44:24 +03:00
|
|
|
void kvm_s390_vcpu_interrupt_pre_save(S390CPU *cpu)
|
|
|
|
{
|
2019-05-18 23:54:24 +03:00
|
|
|
unsigned int max_cpus = MACHINE(qdev_get_machine())->smp.max_cpus;
|
2017-11-22 17:26:26 +03:00
|
|
|
struct kvm_s390_irq_state irq_state = {
|
|
|
|
.buf = (uint64_t) cpu->irqstate,
|
2019-05-18 23:54:24 +03:00
|
|
|
.len = VCPU_IRQ_BUF_SIZE(max_cpus),
|
2017-11-22 17:26:26 +03:00
|
|
|
};
|
2015-03-02 19:44:24 +03:00
|
|
|
CPUState *cs = CPU(cpu);
|
|
|
|
int32_t bytes;
|
|
|
|
|
|
|
|
if (!kvm_check_extension(kvm_state, KVM_CAP_S390_IRQ_STATE)) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
bytes = kvm_vcpu_ioctl(cs, KVM_S390_GET_IRQ_STATE, &irq_state);
|
|
|
|
if (bytes < 0) {
|
|
|
|
cpu->irqstate_saved_size = 0;
|
|
|
|
error_report("Migration of interrupt state failed");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
cpu->irqstate_saved_size = bytes;
|
|
|
|
}
|
|
|
|
|
|
|
|
int kvm_s390_vcpu_interrupt_post_load(S390CPU *cpu)
|
|
|
|
{
|
|
|
|
CPUState *cs = CPU(cpu);
|
2017-11-22 17:26:26 +03:00
|
|
|
struct kvm_s390_irq_state irq_state = {
|
|
|
|
.buf = (uint64_t) cpu->irqstate,
|
|
|
|
.len = cpu->irqstate_saved_size,
|
|
|
|
};
|
2015-03-02 19:44:24 +03:00
|
|
|
int r;
|
|
|
|
|
2015-06-02 19:51:00 +03:00
|
|
|
if (cpu->irqstate_saved_size == 0) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-03-02 19:44:24 +03:00
|
|
|
if (!kvm_check_extension(kvm_state, KVM_CAP_S390_IRQ_STATE)) {
|
|
|
|
return -ENOSYS;
|
|
|
|
}
|
|
|
|
|
|
|
|
r = kvm_vcpu_ioctl(cs, KVM_S390_SET_IRQ_STATE, &irq_state);
|
|
|
|
if (r) {
|
|
|
|
error_report("Setting interrupt state failed %d", r);
|
|
|
|
}
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
2015-01-09 11:04:40 +03:00
|
|
|
int kvm_arch_fixup_msi_route(struct kvm_irq_routing_entry *route,
|
2015-10-15 16:44:52 +03:00
|
|
|
uint64_t address, uint32_t data, PCIDevice *dev)
|
2015-01-09 11:04:40 +03:00
|
|
|
{
|
|
|
|
S390PCIBusDevice *pbdev;
|
|
|
|
uint32_t vec = data & ZPCI_MSI_VEC_MASK;
|
|
|
|
|
2017-09-05 13:12:58 +03:00
|
|
|
if (!dev) {
|
|
|
|
DPRINTF("add_msi_route no pci device\n");
|
|
|
|
return -ENODEV;
|
|
|
|
}
|
|
|
|
|
|
|
|
pbdev = s390_pci_find_dev_by_target(s390_get_phb(), DEVICE(dev)->id);
|
2015-01-09 11:04:40 +03:00
|
|
|
if (!pbdev) {
|
2017-09-05 13:12:58 +03:00
|
|
|
DPRINTF("add_msi_route no zpci device\n");
|
2015-01-09 11:04:40 +03:00
|
|
|
return -ENODEV;
|
|
|
|
}
|
|
|
|
|
|
|
|
route->type = KVM_IRQ_ROUTING_S390_ADAPTER;
|
|
|
|
route->flags = 0;
|
|
|
|
route->u.adapter.summary_addr = pbdev->routes.adapter.summary_addr;
|
|
|
|
route->u.adapter.ind_addr = pbdev->routes.adapter.ind_addr;
|
|
|
|
route->u.adapter.summary_offset = pbdev->routes.adapter.summary_offset;
|
2017-09-05 13:12:59 +03:00
|
|
|
route->u.adapter.ind_offset = pbdev->routes.adapter.ind_offset + vec;
|
2015-01-09 11:04:40 +03:00
|
|
|
route->u.adapter.adapter_id = pbdev->routes.adapter.adapter_id;
|
|
|
|
return 0;
|
|
|
|
}
|
2015-06-02 16:56:23 +03:00
|
|
|
|
2016-07-14 08:56:31 +03:00
|
|
|
int kvm_arch_add_msi_route_post(struct kvm_irq_routing_entry *route,
|
|
|
|
int vector, PCIDevice *dev)
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int kvm_arch_release_virq_post(int virq)
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-06-02 16:56:23 +03:00
|
|
|
int kvm_arch_msi_data_to_gsi(uint32_t data)
|
|
|
|
{
|
|
|
|
abort();
|
|
|
|
}
|
2016-09-05 11:52:35 +03:00
|
|
|
|
|
|
|
static int query_cpu_subfunc(S390FeatBitmap features)
|
|
|
|
{
|
2020-04-29 10:42:01 +03:00
|
|
|
struct kvm_s390_vm_cpu_subfunc prop = {};
|
2016-09-05 11:52:35 +03:00
|
|
|
struct kvm_device_attr attr = {
|
|
|
|
.group = KVM_S390_VM_CPU_MODEL,
|
|
|
|
.attr = KVM_S390_VM_CPU_MACHINE_SUBFUNC,
|
|
|
|
.addr = (uint64_t) &prop,
|
|
|
|
};
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
rc = kvm_vm_ioctl(kvm_state, KVM_GET_DEVICE_ATTR, &attr);
|
|
|
|
if (rc) {
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* We're going to add all subfunctions now, if the corresponding feature
|
|
|
|
* is available that unlocks the query functions.
|
|
|
|
*/
|
|
|
|
s390_add_from_feat_block(features, S390_FEAT_TYPE_PLO, prop.plo);
|
|
|
|
if (test_bit(S390_FEAT_TOD_CLOCK_STEERING, features)) {
|
|
|
|
s390_add_from_feat_block(features, S390_FEAT_TYPE_PTFF, prop.ptff);
|
|
|
|
}
|
|
|
|
if (test_bit(S390_FEAT_MSA, features)) {
|
|
|
|
s390_add_from_feat_block(features, S390_FEAT_TYPE_KMAC, prop.kmac);
|
|
|
|
s390_add_from_feat_block(features, S390_FEAT_TYPE_KMC, prop.kmc);
|
|
|
|
s390_add_from_feat_block(features, S390_FEAT_TYPE_KM, prop.km);
|
|
|
|
s390_add_from_feat_block(features, S390_FEAT_TYPE_KIMD, prop.kimd);
|
|
|
|
s390_add_from_feat_block(features, S390_FEAT_TYPE_KLMD, prop.klmd);
|
|
|
|
}
|
|
|
|
if (test_bit(S390_FEAT_MSA_EXT_3, features)) {
|
|
|
|
s390_add_from_feat_block(features, S390_FEAT_TYPE_PCKMO, prop.pckmo);
|
|
|
|
}
|
|
|
|
if (test_bit(S390_FEAT_MSA_EXT_4, features)) {
|
|
|
|
s390_add_from_feat_block(features, S390_FEAT_TYPE_KMCTR, prop.kmctr);
|
|
|
|
s390_add_from_feat_block(features, S390_FEAT_TYPE_KMF, prop.kmf);
|
|
|
|
s390_add_from_feat_block(features, S390_FEAT_TYPE_KMO, prop.kmo);
|
|
|
|
s390_add_from_feat_block(features, S390_FEAT_TYPE_PCC, prop.pcc);
|
|
|
|
}
|
|
|
|
if (test_bit(S390_FEAT_MSA_EXT_5, features)) {
|
|
|
|
s390_add_from_feat_block(features, S390_FEAT_TYPE_PPNO, prop.ppno);
|
|
|
|
}
|
2017-04-13 17:28:41 +03:00
|
|
|
if (test_bit(S390_FEAT_MSA_EXT_8, features)) {
|
|
|
|
s390_add_from_feat_block(features, S390_FEAT_TYPE_KMA, prop.kma);
|
|
|
|
}
|
2019-04-29 12:02:45 +03:00
|
|
|
if (test_bit(S390_FEAT_MSA_EXT_9, features)) {
|
|
|
|
s390_add_from_feat_block(features, S390_FEAT_TYPE_KDSA, prop.kdsa);
|
|
|
|
}
|
2019-04-29 12:02:47 +03:00
|
|
|
if (test_bit(S390_FEAT_ESORT_BASE, features)) {
|
|
|
|
s390_add_from_feat_block(features, S390_FEAT_TYPE_SORTL, prop.sortl);
|
|
|
|
}
|
2019-04-29 12:02:48 +03:00
|
|
|
if (test_bit(S390_FEAT_DEFLATE_BASE, features)) {
|
|
|
|
s390_add_from_feat_block(features, S390_FEAT_TYPE_DFLTCC, prop.dfltcc);
|
|
|
|
}
|
2016-09-05 11:52:35 +03:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int configure_cpu_subfunc(const S390FeatBitmap features)
|
|
|
|
{
|
|
|
|
struct kvm_s390_vm_cpu_subfunc prop = {};
|
|
|
|
struct kvm_device_attr attr = {
|
|
|
|
.group = KVM_S390_VM_CPU_MODEL,
|
|
|
|
.attr = KVM_S390_VM_CPU_PROCESSOR_SUBFUNC,
|
|
|
|
.addr = (uint64_t) &prop,
|
|
|
|
};
|
|
|
|
|
|
|
|
if (!kvm_vm_check_attr(kvm_state, KVM_S390_VM_CPU_MODEL,
|
|
|
|
KVM_S390_VM_CPU_PROCESSOR_SUBFUNC)) {
|
|
|
|
/* hardware support might be missing, IBC will handle most of this */
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
s390_fill_feat_block(features, S390_FEAT_TYPE_PLO, prop.plo);
|
|
|
|
if (test_bit(S390_FEAT_TOD_CLOCK_STEERING, features)) {
|
|
|
|
s390_fill_feat_block(features, S390_FEAT_TYPE_PTFF, prop.ptff);
|
|
|
|
}
|
|
|
|
if (test_bit(S390_FEAT_MSA, features)) {
|
|
|
|
s390_fill_feat_block(features, S390_FEAT_TYPE_KMAC, prop.kmac);
|
|
|
|
s390_fill_feat_block(features, S390_FEAT_TYPE_KMC, prop.kmc);
|
|
|
|
s390_fill_feat_block(features, S390_FEAT_TYPE_KM, prop.km);
|
|
|
|
s390_fill_feat_block(features, S390_FEAT_TYPE_KIMD, prop.kimd);
|
|
|
|
s390_fill_feat_block(features, S390_FEAT_TYPE_KLMD, prop.klmd);
|
|
|
|
}
|
|
|
|
if (test_bit(S390_FEAT_MSA_EXT_3, features)) {
|
|
|
|
s390_fill_feat_block(features, S390_FEAT_TYPE_PCKMO, prop.pckmo);
|
|
|
|
}
|
|
|
|
if (test_bit(S390_FEAT_MSA_EXT_4, features)) {
|
|
|
|
s390_fill_feat_block(features, S390_FEAT_TYPE_KMCTR, prop.kmctr);
|
|
|
|
s390_fill_feat_block(features, S390_FEAT_TYPE_KMF, prop.kmf);
|
|
|
|
s390_fill_feat_block(features, S390_FEAT_TYPE_KMO, prop.kmo);
|
|
|
|
s390_fill_feat_block(features, S390_FEAT_TYPE_PCC, prop.pcc);
|
|
|
|
}
|
|
|
|
if (test_bit(S390_FEAT_MSA_EXT_5, features)) {
|
|
|
|
s390_fill_feat_block(features, S390_FEAT_TYPE_PPNO, prop.ppno);
|
|
|
|
}
|
2017-04-13 17:28:41 +03:00
|
|
|
if (test_bit(S390_FEAT_MSA_EXT_8, features)) {
|
|
|
|
s390_fill_feat_block(features, S390_FEAT_TYPE_KMA, prop.kma);
|
|
|
|
}
|
2019-04-29 12:02:45 +03:00
|
|
|
if (test_bit(S390_FEAT_MSA_EXT_9, features)) {
|
|
|
|
s390_fill_feat_block(features, S390_FEAT_TYPE_KDSA, prop.kdsa);
|
|
|
|
}
|
2019-04-29 12:02:47 +03:00
|
|
|
if (test_bit(S390_FEAT_ESORT_BASE, features)) {
|
|
|
|
s390_fill_feat_block(features, S390_FEAT_TYPE_SORTL, prop.sortl);
|
|
|
|
}
|
2019-04-29 12:02:48 +03:00
|
|
|
if (test_bit(S390_FEAT_DEFLATE_BASE, features)) {
|
|
|
|
s390_fill_feat_block(features, S390_FEAT_TYPE_DFLTCC, prop.dfltcc);
|
|
|
|
}
|
2016-09-05 11:52:35 +03:00
|
|
|
return kvm_vm_ioctl(kvm_state, KVM_SET_DEVICE_ATTR, &attr);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int kvm_to_feat[][2] = {
|
|
|
|
{ KVM_S390_VM_CPU_FEAT_ESOP, S390_FEAT_ESOP },
|
|
|
|
{ KVM_S390_VM_CPU_FEAT_SIEF2, S390_FEAT_SIE_F2 },
|
|
|
|
{ KVM_S390_VM_CPU_FEAT_64BSCAO , S390_FEAT_SIE_64BSCAO },
|
|
|
|
{ KVM_S390_VM_CPU_FEAT_SIIF, S390_FEAT_SIE_SIIF },
|
|
|
|
{ KVM_S390_VM_CPU_FEAT_GPERE, S390_FEAT_SIE_GPERE },
|
|
|
|
{ KVM_S390_VM_CPU_FEAT_GSLS, S390_FEAT_SIE_GSLS },
|
|
|
|
{ KVM_S390_VM_CPU_FEAT_IB, S390_FEAT_SIE_IB },
|
|
|
|
{ KVM_S390_VM_CPU_FEAT_CEI, S390_FEAT_SIE_CEI },
|
|
|
|
{ KVM_S390_VM_CPU_FEAT_IBS, S390_FEAT_SIE_IBS },
|
|
|
|
{ KVM_S390_VM_CPU_FEAT_SKEY, S390_FEAT_SIE_SKEY },
|
|
|
|
{ KVM_S390_VM_CPU_FEAT_CMMA, S390_FEAT_SIE_CMMA },
|
|
|
|
{ KVM_S390_VM_CPU_FEAT_PFMFI, S390_FEAT_SIE_PFMFI},
|
|
|
|
{ KVM_S390_VM_CPU_FEAT_SIGPIF, S390_FEAT_SIE_SIGPIF},
|
2017-05-03 23:54:50 +03:00
|
|
|
{ KVM_S390_VM_CPU_FEAT_KSS, S390_FEAT_SIE_KSS},
|
2016-09-05 11:52:35 +03:00
|
|
|
};
|
|
|
|
|
|
|
|
static int query_cpu_feat(S390FeatBitmap features)
|
|
|
|
{
|
2020-04-29 10:42:01 +03:00
|
|
|
struct kvm_s390_vm_cpu_feat prop = {};
|
2016-09-05 11:52:35 +03:00
|
|
|
struct kvm_device_attr attr = {
|
|
|
|
.group = KVM_S390_VM_CPU_MODEL,
|
|
|
|
.attr = KVM_S390_VM_CPU_MACHINE_FEAT,
|
|
|
|
.addr = (uint64_t) &prop,
|
|
|
|
};
|
|
|
|
int rc;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
rc = kvm_vm_ioctl(kvm_state, KVM_GET_DEVICE_ATTR, &attr);
|
|
|
|
if (rc) {
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (i = 0; i < ARRAY_SIZE(kvm_to_feat); i++) {
|
2017-07-20 15:37:19 +03:00
|
|
|
if (test_be_bit(kvm_to_feat[i][0], (uint8_t *) prop.feat)) {
|
2016-09-05 11:52:35 +03:00
|
|
|
set_bit(kvm_to_feat[i][1], features);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int configure_cpu_feat(const S390FeatBitmap features)
|
|
|
|
{
|
|
|
|
struct kvm_s390_vm_cpu_feat prop = {};
|
|
|
|
struct kvm_device_attr attr = {
|
|
|
|
.group = KVM_S390_VM_CPU_MODEL,
|
|
|
|
.attr = KVM_S390_VM_CPU_PROCESSOR_FEAT,
|
|
|
|
.addr = (uint64_t) &prop,
|
|
|
|
};
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = 0; i < ARRAY_SIZE(kvm_to_feat); i++) {
|
|
|
|
if (test_bit(kvm_to_feat[i][1], features)) {
|
2017-07-20 15:37:19 +03:00
|
|
|
set_be_bit(kvm_to_feat[i][0], (uint8_t *) prop.feat);
|
2016-09-05 11:52:35 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return kvm_vm_ioctl(kvm_state, KVM_SET_DEVICE_ATTR, &attr);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool kvm_s390_cpu_models_supported(void)
|
|
|
|
{
|
2016-09-07 13:50:40 +03:00
|
|
|
if (!cpu_model_allowed()) {
|
2016-09-05 11:52:36 +03:00
|
|
|
/* compatibility machines interfere with the cpu model */
|
|
|
|
return false;
|
|
|
|
}
|
2016-09-05 11:52:35 +03:00
|
|
|
return kvm_vm_check_attr(kvm_state, KVM_S390_VM_CPU_MODEL,
|
|
|
|
KVM_S390_VM_CPU_MACHINE) &&
|
|
|
|
kvm_vm_check_attr(kvm_state, KVM_S390_VM_CPU_MODEL,
|
|
|
|
KVM_S390_VM_CPU_PROCESSOR) &&
|
|
|
|
kvm_vm_check_attr(kvm_state, KVM_S390_VM_CPU_MODEL,
|
|
|
|
KVM_S390_VM_CPU_MACHINE_FEAT) &&
|
|
|
|
kvm_vm_check_attr(kvm_state, KVM_S390_VM_CPU_MODEL,
|
|
|
|
KVM_S390_VM_CPU_PROCESSOR_FEAT) &&
|
|
|
|
kvm_vm_check_attr(kvm_state, KVM_S390_VM_CPU_MODEL,
|
|
|
|
KVM_S390_VM_CPU_MACHINE_SUBFUNC);
|
|
|
|
}
|
|
|
|
|
|
|
|
void kvm_s390_get_host_cpu_model(S390CPUModel *model, Error **errp)
|
|
|
|
{
|
|
|
|
struct kvm_s390_vm_cpu_machine prop = {};
|
|
|
|
struct kvm_device_attr attr = {
|
|
|
|
.group = KVM_S390_VM_CPU_MODEL,
|
|
|
|
.attr = KVM_S390_VM_CPU_MACHINE,
|
|
|
|
.addr = (uint64_t) &prop,
|
|
|
|
};
|
|
|
|
uint16_t unblocked_ibc = 0, cpu_type = 0;
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
memset(model, 0, sizeof(*model));
|
|
|
|
|
|
|
|
if (!kvm_s390_cpu_models_supported()) {
|
|
|
|
error_setg(errp, "KVM doesn't support CPU models");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* query the basic cpu model properties */
|
|
|
|
rc = kvm_vm_ioctl(kvm_state, KVM_GET_DEVICE_ATTR, &attr);
|
|
|
|
if (rc) {
|
|
|
|
error_setg(errp, "KVM: Error querying host CPU model: %d", rc);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
cpu_type = cpuid_type(prop.cpuid);
|
|
|
|
if (has_ibc(prop.ibc)) {
|
|
|
|
model->lowest_ibc = lowest_ibc(prop.ibc);
|
|
|
|
unblocked_ibc = unblocked_ibc(prop.ibc);
|
|
|
|
}
|
|
|
|
model->cpu_id = cpuid_id(prop.cpuid);
|
2017-05-31 22:34:33 +03:00
|
|
|
model->cpu_id_format = cpuid_format(prop.cpuid);
|
2016-09-05 11:52:35 +03:00
|
|
|
model->cpu_ver = 0xff;
|
|
|
|
|
|
|
|
/* get supported cpu features indicated via STFL(E) */
|
|
|
|
s390_add_from_feat_block(model->features, S390_FEAT_TYPE_STFL,
|
|
|
|
(uint8_t *) prop.fac_mask);
|
|
|
|
/* dat-enhancement facility 2 has no bit but was introduced with stfle */
|
|
|
|
if (test_bit(S390_FEAT_STFLE, model->features)) {
|
|
|
|
set_bit(S390_FEAT_DAT_ENH_2, model->features);
|
|
|
|
}
|
|
|
|
/* get supported cpu features indicated e.g. via SCLP */
|
|
|
|
rc = query_cpu_feat(model->features);
|
|
|
|
if (rc) {
|
|
|
|
error_setg(errp, "KVM: Error querying CPU features: %d", rc);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
/* get supported cpu subfunctions indicated via query / test bit */
|
|
|
|
rc = query_cpu_subfunc(model->features);
|
|
|
|
if (rc) {
|
|
|
|
error_setg(errp, "KVM: Error querying CPU subfunctions: %d", rc);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2018-02-05 13:29:35 +03:00
|
|
|
/* PTFF subfunctions might be indicated although kernel support missing */
|
|
|
|
if (!test_bit(S390_FEAT_MULTIPLE_EPOCH, model->features)) {
|
|
|
|
clear_bit(S390_FEAT_PTFF_QSIE, model->features);
|
|
|
|
clear_bit(S390_FEAT_PTFF_QTOUE, model->features);
|
|
|
|
clear_bit(S390_FEAT_PTFF_STOE, model->features);
|
|
|
|
clear_bit(S390_FEAT_PTFF_STOUE, model->features);
|
|
|
|
}
|
|
|
|
|
2016-09-05 11:52:37 +03:00
|
|
|
/* with cpu model support, CMM is only indicated if really available */
|
|
|
|
if (kvm_s390_cmma_available()) {
|
|
|
|
set_bit(S390_FEAT_CMM, model->features);
|
2017-04-13 17:28:41 +03:00
|
|
|
} else {
|
|
|
|
/* no cmm -> no cmm nt */
|
|
|
|
clear_bit(S390_FEAT_CMM_NT, model->features);
|
2016-09-05 11:52:37 +03:00
|
|
|
}
|
|
|
|
|
2018-01-18 11:56:27 +03:00
|
|
|
/* bpb needs kernel support for migration, VSIE and reset */
|
|
|
|
if (!kvm_check_extension(kvm_state, KVM_CAP_S390_BPB)) {
|
|
|
|
clear_bit(S390_FEAT_BPB, model->features);
|
|
|
|
}
|
|
|
|
|
2020-03-19 16:19:21 +03:00
|
|
|
/*
|
|
|
|
* If we have support for protected virtualization, indicate
|
|
|
|
* the protected virtualization IPL unpack facility.
|
|
|
|
*/
|
|
|
|
if (cap_protected) {
|
|
|
|
set_bit(S390_FEAT_UNPACK, model->features);
|
|
|
|
}
|
|
|
|
|
2017-07-20 15:37:20 +03:00
|
|
|
/* We emulate a zPCI bus and AEN, therefore we don't need HW support */
|
2019-02-11 14:32:55 +03:00
|
|
|
set_bit(S390_FEAT_ZPCI, model->features);
|
2017-06-14 08:25:58 +03:00
|
|
|
set_bit(S390_FEAT_ADAPTER_EVENT_NOTIFICATION, model->features);
|
|
|
|
|
2016-09-05 11:52:35 +03:00
|
|
|
if (s390_known_cpu_type(cpu_type)) {
|
|
|
|
/* we want the exact model, even if some features are missing */
|
|
|
|
model->def = s390_find_cpu_def(cpu_type, ibc_gen(unblocked_ibc),
|
|
|
|
ibc_ec_ga(unblocked_ibc), NULL);
|
|
|
|
} else {
|
|
|
|
/* model unknown, e.g. too new - search using features */
|
|
|
|
model->def = s390_find_cpu_def(0, ibc_gen(unblocked_ibc),
|
|
|
|
ibc_ec_ga(unblocked_ibc),
|
|
|
|
model->features);
|
|
|
|
}
|
|
|
|
if (!model->def) {
|
|
|
|
error_setg(errp, "KVM: host CPU model could not be identified");
|
|
|
|
return;
|
|
|
|
}
|
2018-10-10 20:03:05 +03:00
|
|
|
/* for now, we can only provide the AP feature with HW support */
|
|
|
|
if (kvm_vm_check_attr(kvm_state, KVM_S390_VM_CRYPTO,
|
|
|
|
KVM_S390_VM_CRYPTO_ENABLE_APIE)) {
|
|
|
|
set_bit(S390_FEAT_AP, model->features);
|
|
|
|
}
|
s390/sclp: add extended-length sccb support for kvm guest
As more features and facilities are added to the Read SCP Info (RSCPI)
response, more space is required to store them. The space used to store
these new features intrudes on the space originally used to store CPU
entries. This means as more features and facilities are added to the
RSCPI response, less space can be used to store CPU entries.
With the Extended-Length SCCB (ELS) facility, a KVM guest can execute
the RSCPI command and determine if the SCCB is large enough to store a
complete reponse. If it is not large enough, then the required length
will be set in the SCCB header.
The caller of the SCLP command is responsible for creating a
large-enough SCCB to store a complete response. Proper checking should
be in place, and the caller should execute the command once-more with
the large-enough SCCB.
This facility also enables an extended SCCB for the Read CPU Info
(RCPUI) command.
When this facility is enabled, the boundary violation response cannot
be a result from the RSCPI, RSCPI Forced, or RCPUI commands.
In order to tolerate kernels that do not yet have full support for this
feature, a "fixed" offset to the start of the CPU Entries within the
Read SCP Info struct is set to allow for the original 248 max entries
when this feature is disabled.
Additionally, this is introduced as a CPU feature to protect the guest
from migrating to a machine that does not support storing an extended
SCCB. This could otherwise hinder the VM from being able to read all
available CPU entries after migration (such as during re-ipl).
Signed-off-by: Collin Walling <walling@linux.ibm.com>
Reviewed-by: Thomas Huth <thuth@redhat.com>
Acked-by: Cornelia Huck <cohuck@redhat.com>
Reviewed-by: Claudio Imbrenda <imbrenda@linux.ibm.com>
Message-Id: <20200915194416.107460-7-walling@linux.ibm.com>
Signed-off-by: Cornelia Huck <cohuck@redhat.com>
2020-09-15 22:44:14 +03:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Extended-Length SCCB is handled entirely within QEMU.
|
|
|
|
* For PV guests this is completely fenced by the Ultravisor, as Service
|
|
|
|
* Call error checking and STFLE interpretation are handled via SIE.
|
|
|
|
*/
|
|
|
|
set_bit(S390_FEAT_EXTENDED_LENGTH_SCCB, model->features);
|
|
|
|
|
2020-10-22 13:31:35 +03:00
|
|
|
if (kvm_check_extension(kvm_state, KVM_CAP_S390_DIAG318)) {
|
2020-09-15 22:44:16 +03:00
|
|
|
set_bit(S390_FEAT_DIAG_318, model->features);
|
|
|
|
}
|
|
|
|
|
2016-09-05 11:52:35 +03:00
|
|
|
/* strip of features that are not part of the maximum model */
|
|
|
|
bitmap_and(model->features, model->features, model->def->full_feat,
|
|
|
|
S390_FEAT_MAX);
|
|
|
|
}
|
|
|
|
|
2018-10-10 20:03:05 +03:00
|
|
|
static void kvm_s390_configure_apie(bool interpret)
|
|
|
|
{
|
|
|
|
uint64_t attr = interpret ? KVM_S390_VM_CRYPTO_ENABLE_APIE :
|
|
|
|
KVM_S390_VM_CRYPTO_DISABLE_APIE;
|
|
|
|
|
|
|
|
if (kvm_vm_check_attr(kvm_state, KVM_S390_VM_CRYPTO, attr)) {
|
|
|
|
kvm_s390_set_attr(attr);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-09-05 11:52:35 +03:00
|
|
|
void kvm_s390_apply_cpu_model(const S390CPUModel *model, Error **errp)
|
|
|
|
{
|
|
|
|
struct kvm_s390_vm_cpu_processor prop = {
|
|
|
|
.fac_list = { 0 },
|
|
|
|
};
|
|
|
|
struct kvm_device_attr attr = {
|
|
|
|
.group = KVM_S390_VM_CPU_MODEL,
|
|
|
|
.attr = KVM_S390_VM_CPU_PROCESSOR,
|
|
|
|
.addr = (uint64_t) &prop,
|
|
|
|
};
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
if (!model) {
|
2016-09-05 11:52:37 +03:00
|
|
|
/* compatibility handling if cpu models are disabled */
|
2017-05-29 15:19:02 +03:00
|
|
|
if (kvm_s390_cmma_available()) {
|
2016-09-05 11:52:37 +03:00
|
|
|
kvm_s390_enable_cmma();
|
|
|
|
}
|
2016-09-05 11:52:35 +03:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (!kvm_s390_cpu_models_supported()) {
|
|
|
|
error_setg(errp, "KVM doesn't support CPU models");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
prop.cpuid = s390_cpuid_from_cpu_model(model);
|
|
|
|
prop.ibc = s390_ibc_from_cpu_model(model);
|
|
|
|
/* configure cpu features indicated via STFL(e) */
|
|
|
|
s390_fill_feat_block(model->features, S390_FEAT_TYPE_STFL,
|
|
|
|
(uint8_t *) prop.fac_list);
|
|
|
|
rc = kvm_vm_ioctl(kvm_state, KVM_SET_DEVICE_ATTR, &attr);
|
|
|
|
if (rc) {
|
|
|
|
error_setg(errp, "KVM: Error configuring the CPU model: %d", rc);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
/* configure cpu features indicated e.g. via SCLP */
|
|
|
|
rc = configure_cpu_feat(model->features);
|
|
|
|
if (rc) {
|
|
|
|
error_setg(errp, "KVM: Error configuring CPU features: %d", rc);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
/* configure cpu subfunctions indicated via query / test bit */
|
|
|
|
rc = configure_cpu_subfunc(model->features);
|
|
|
|
if (rc) {
|
|
|
|
error_setg(errp, "KVM: Error configuring CPU subfunctions: %d", rc);
|
|
|
|
return;
|
|
|
|
}
|
2017-05-29 15:19:02 +03:00
|
|
|
/* enable CMM via CMMA */
|
2016-09-05 11:52:37 +03:00
|
|
|
if (test_bit(S390_FEAT_CMM, model->features)) {
|
2017-05-29 15:19:02 +03:00
|
|
|
kvm_s390_enable_cmma();
|
2016-09-05 11:52:37 +03:00
|
|
|
}
|
2018-10-10 20:03:05 +03:00
|
|
|
|
|
|
|
if (test_bit(S390_FEAT_AP, model->features)) {
|
|
|
|
kvm_s390_configure_apie(true);
|
|
|
|
}
|
2016-09-05 11:52:35 +03:00
|
|
|
}
|
2017-09-28 23:36:50 +03:00
|
|
|
|
|
|
|
void kvm_s390_restart_interrupt(S390CPU *cpu)
|
|
|
|
{
|
|
|
|
struct kvm_s390_irq irq = {
|
|
|
|
.type = KVM_S390_RESTART,
|
|
|
|
};
|
|
|
|
|
|
|
|
kvm_s390_vcpu_interrupt(cpu, &irq);
|
|
|
|
}
|
|
|
|
|
|
|
|
void kvm_s390_stop_interrupt(S390CPU *cpu)
|
|
|
|
{
|
|
|
|
struct kvm_s390_irq irq = {
|
|
|
|
.type = KVM_S390_SIGP_STOP,
|
|
|
|
};
|
|
|
|
|
|
|
|
kvm_s390_vcpu_interrupt(cpu, &irq);
|
|
|
|
}
|
2021-01-26 20:36:47 +03:00
|
|
|
|
|
|
|
bool kvm_arch_cpu_check_are_resettable(void)
|
|
|
|
{
|
|
|
|
return true;
|
|
|
|
}
|
2022-09-02 20:27:32 +03:00
|
|
|
|
|
|
|
int kvm_s390_get_zpci_op(void)
|
|
|
|
{
|
|
|
|
return cap_zpci_op;
|
|
|
|
}
|
2022-09-29 10:20:12 +03:00
|
|
|
|
|
|
|
void kvm_arch_accel_class_init(ObjectClass *oc)
|
|
|
|
{
|
|
|
|
}
|