kvm: enable smp > 1
[qemu-kvm/stefanha.git] / target-s390x / kvm.c
bloba2c00acf0fca5fd53df88f1464d21dd0afa07ee0
1 /*
2 * QEMU S390x KVM implementation
4 * Copyright (c) 2009 Alexander Graf <agraf@suse.de>
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2 of the License, or (at your option) any later version.
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, see <http://www.gnu.org/licenses/>.
20 #include <sys/types.h>
21 #include <sys/ioctl.h>
22 #include <sys/mman.h>
24 #include <linux/kvm.h>
25 #include <asm/ptrace.h>
27 #include "qemu-common.h"
28 #include "qemu-timer.h"
29 #include "sysemu.h"
30 #include "kvm.h"
31 #include "cpu.h"
32 #include "device_tree.h"
34 /* #define DEBUG_KVM */
36 #ifdef DEBUG_KVM
37 #define dprintf(fmt, ...) \
38 do { fprintf(stderr, fmt, ## __VA_ARGS__); } while (0)
39 #else
40 #define dprintf(fmt, ...) \
41 do { } while (0)
42 #endif
44 #define IPA0_DIAG 0x8300
45 #define IPA0_SIGP 0xae00
46 #define IPA0_PRIV 0xb200
48 #define PRIV_SCLP_CALL 0x20
49 #define DIAG_KVM_HYPERCALL 0x500
50 #define DIAG_KVM_BREAKPOINT 0x501
52 #define SCP_LENGTH 0x00
53 #define SCP_FUNCTION_CODE 0x02
54 #define SCP_CONTROL_MASK 0x03
55 #define SCP_RESPONSE_CODE 0x06
56 #define SCP_MEM_CODE 0x08
57 #define SCP_INCREMENT 0x0a
59 #define ICPT_INSTRUCTION 0x04
60 #define ICPT_WAITPSW 0x1c
61 #define ICPT_SOFT_INTERCEPT 0x24
62 #define ICPT_CPU_STOP 0x28
63 #define ICPT_IO 0x40
65 #define SIGP_RESTART 0x06
66 #define SIGP_INITIAL_CPU_RESET 0x0b
67 #define SIGP_STORE_STATUS_ADDR 0x0e
68 #define SIGP_SET_ARCH 0x12
70 #define SCLP_CMDW_READ_SCP_INFO 0x00020001
71 #define SCLP_CMDW_READ_SCP_INFO_FORCED 0x00120001
73 int kvm_arch_init(KVMState *s, int smp_cpus)
75 return 0;
78 int kvm_arch_init_vcpu(CPUState *env)
80 int ret = 0;
82 if (kvm_vcpu_ioctl(env, KVM_S390_INITIAL_RESET, NULL) < 0) {
83 perror("cannot init reset vcpu");
86 return ret;
89 void kvm_arch_reset_vcpu(CPUState *env)
91 /* FIXME: add code to reset vcpu. */
94 int kvm_arch_put_registers(CPUState *env, int level)
96 struct kvm_regs regs;
97 int ret;
98 int i;
100 ret = kvm_vcpu_ioctl(env, KVM_GET_REGS, &regs);
101 if (ret < 0) {
102 return ret;
105 for (i = 0; i < 16; i++) {
106 regs.gprs[i] = env->regs[i];
109 ret = kvm_vcpu_ioctl(env, KVM_SET_REGS, &regs);
110 if (ret < 0) {
111 return ret;
114 env->kvm_run->psw_addr = env->psw.addr;
115 env->kvm_run->psw_mask = env->psw.mask;
117 return ret;
120 int kvm_arch_get_registers(CPUState *env)
122 uint32_t ret;
123 struct kvm_regs regs;
124 int i;
126 ret = kvm_vcpu_ioctl(env, KVM_GET_REGS, &regs);
127 if (ret < 0) {
128 return ret;
131 for (i = 0; i < 16; i++) {
132 env->regs[i] = regs.gprs[i];
135 env->psw.addr = env->kvm_run->psw_addr;
136 env->psw.mask = env->kvm_run->psw_mask;
138 return 0;
141 int kvm_arch_insert_sw_breakpoint(CPUState *env, struct kvm_sw_breakpoint *bp)
143 static const uint8_t diag_501[] = {0x83, 0x24, 0x05, 0x01};
145 if (cpu_memory_rw_debug(env, bp->pc, (uint8_t *)&bp->saved_insn, 4, 0) ||
146 cpu_memory_rw_debug(env, bp->pc, (uint8_t *)diag_501, 4, 1)) {
147 return -EINVAL;
149 return 0;
152 int kvm_arch_remove_sw_breakpoint(CPUState *env, struct kvm_sw_breakpoint *bp)
154 uint8_t t[4];
155 static const uint8_t diag_501[] = {0x83, 0x24, 0x05, 0x01};
157 if (cpu_memory_rw_debug(env, bp->pc, t, 4, 0)) {
158 return -EINVAL;
159 } else if (memcmp(t, diag_501, 4)) {
160 return -EINVAL;
161 } else if (cpu_memory_rw_debug(env, bp->pc, (uint8_t *)&bp->saved_insn, 1, 1)) {
162 return -EINVAL;
165 return 0;
168 int kvm_arch_pre_run(CPUState *env, struct kvm_run *run)
170 return 0;
173 int kvm_arch_post_run(CPUState *env, struct kvm_run *run)
175 return 0;
178 int kvm_arch_process_irqchip_events(CPUState *env)
180 return 0;
183 static void kvm_s390_interrupt_internal(CPUState *env, int type, uint32_t parm,
184 uint64_t parm64, int vm)
186 struct kvm_s390_interrupt kvmint;
187 int r;
189 if (!env->kvm_state) {
190 return;
193 env->halted = 0;
194 env->exception_index = -1;
196 kvmint.type = type;
197 kvmint.parm = parm;
198 kvmint.parm64 = parm64;
200 if (vm) {
201 r = kvm_vm_ioctl(env->kvm_state, KVM_S390_INTERRUPT, &kvmint);
202 } else {
203 r = kvm_vcpu_ioctl(env, KVM_S390_INTERRUPT, &kvmint);
206 if (r < 0) {
207 fprintf(stderr, "KVM failed to inject interrupt\n");
208 exit(1);
212 void kvm_s390_virtio_irq(CPUState *env, int config_change, uint64_t token)
214 kvm_s390_interrupt_internal(env, KVM_S390_INT_VIRTIO, config_change,
215 token, 1);
218 static void kvm_s390_interrupt(CPUState *env, int type, uint32_t code)
220 kvm_s390_interrupt_internal(env, type, code, 0, 0);
223 static void enter_pgmcheck(CPUState *env, uint16_t code)
225 kvm_s390_interrupt(env, KVM_S390_PROGRAM_INT, code);
228 static void setcc(CPUState *env, uint64_t cc)
230 env->kvm_run->psw_mask &= ~(3ul << 44);
231 env->kvm_run->psw_mask |= (cc & 3) << 44;
233 env->psw.mask &= ~(3ul << 44);
234 env->psw.mask |= (cc & 3) << 44;
237 static int sclp_service_call(CPUState *env, struct kvm_run *run, uint16_t ipbh0)
239 uint32_t sccb;
240 uint64_t code;
241 int r = 0;
243 cpu_synchronize_state(env);
244 sccb = env->regs[ipbh0 & 0xf];
245 code = env->regs[(ipbh0 & 0xf0) >> 4];
247 dprintf("sclp(0x%x, 0x%lx)\n", sccb, code);
249 if (sccb & ~0x7ffffff8ul) {
250 fprintf(stderr, "KVM: invalid sccb address 0x%x\n", sccb);
251 r = -1;
252 goto out;
255 switch(code) {
256 case SCLP_CMDW_READ_SCP_INFO:
257 case SCLP_CMDW_READ_SCP_INFO_FORCED:
258 stw_phys(sccb + SCP_MEM_CODE, ram_size >> 20);
259 stb_phys(sccb + SCP_INCREMENT, 1);
260 stw_phys(sccb + SCP_RESPONSE_CODE, 0x10);
261 setcc(env, 0);
263 kvm_s390_interrupt_internal(env, KVM_S390_INT_SERVICE,
264 sccb & ~3, 0, 1);
265 break;
266 default:
267 dprintf("KVM: invalid sclp call 0x%x / 0x%lx\n", sccb, code);
268 r = -1;
269 break;
272 out:
273 if (r < 0) {
274 setcc(env, 3);
276 return 0;
279 static int handle_priv(CPUState *env, struct kvm_run *run, uint8_t ipa1)
281 int r = 0;
282 uint16_t ipbh0 = (run->s390_sieic.ipb & 0xffff0000) >> 16;
284 dprintf("KVM: PRIV: %d\n", ipa1);
285 switch (ipa1) {
286 case PRIV_SCLP_CALL:
287 r = sclp_service_call(env, run, ipbh0);
288 break;
289 default:
290 dprintf("KVM: unknown PRIV: 0x%x\n", ipa1);
291 r = -1;
292 break;
295 return r;
298 static int handle_hypercall(CPUState *env, struct kvm_run *run)
300 int r;
302 cpu_synchronize_state(env);
303 r = s390_virtio_hypercall(env);
305 return r;
308 static int handle_diag(CPUState *env, struct kvm_run *run, int ipb_code)
310 int r = 0;
312 switch (ipb_code) {
313 case DIAG_KVM_HYPERCALL:
314 r = handle_hypercall(env, run);
315 break;
316 case DIAG_KVM_BREAKPOINT:
317 sleep(10);
318 break;
319 default:
320 dprintf("KVM: unknown DIAG: 0x%x\n", ipb_code);
321 r = -1;
322 break;
325 return r;
328 static int s390_cpu_restart(CPUState *env)
330 kvm_s390_interrupt(env, KVM_S390_RESTART, 0);
331 env->halted = 0;
332 env->exception_index = -1;
333 qemu_cpu_kick(env);
334 dprintf("DONE: SIGP cpu restart: %p\n", env);
335 return 0;
338 static int s390_store_status(CPUState *env, uint32_t parameter)
340 /* XXX */
341 fprintf(stderr, "XXX SIGP store status\n");
342 return -1;
345 static int s390_cpu_initial_reset(CPUState *env)
347 /* XXX */
348 fprintf(stderr, "XXX SIGP init\n");
349 return -1;
352 static int handle_sigp(CPUState *env, struct kvm_run *run, uint8_t ipa1)
354 uint8_t order_code;
355 uint32_t parameter;
356 uint16_t cpu_addr;
357 uint8_t t;
358 int r = -1;
359 CPUState *target_env;
361 cpu_synchronize_state(env);
363 /* get order code */
364 order_code = run->s390_sieic.ipb >> 28;
365 if (order_code > 0) {
366 order_code = env->regs[order_code];
368 order_code += (run->s390_sieic.ipb & 0x0fff0000) >> 16;
370 /* get parameters */
371 t = (ipa1 & 0xf0) >> 4;
372 if (!(t % 2)) {
373 t++;
376 parameter = env->regs[t] & 0x7ffffe00;
377 cpu_addr = env->regs[ipa1 & 0x0f];
379 target_env = s390_cpu_addr2state(cpu_addr);
380 if (!target_env) {
381 goto out;
384 switch (order_code) {
385 case SIGP_RESTART:
386 r = s390_cpu_restart(target_env);
387 break;
388 case SIGP_STORE_STATUS_ADDR:
389 r = s390_store_status(target_env, parameter);
390 break;
391 case SIGP_SET_ARCH:
392 /* make the caller panic */
393 return -1;
394 case SIGP_INITIAL_CPU_RESET:
395 r = s390_cpu_initial_reset(target_env);
396 break;
397 default:
398 fprintf(stderr, "KVM: unknown SIGP: 0x%x\n", ipa1);
399 break;
402 out:
403 setcc(env, r ? 3 : 0);
404 return 0;
407 static int handle_instruction(CPUState *env, struct kvm_run *run)
409 unsigned int ipa0 = (run->s390_sieic.ipa & 0xff00);
410 uint8_t ipa1 = run->s390_sieic.ipa & 0x00ff;
411 int ipb_code = (run->s390_sieic.ipb & 0x0fff0000) >> 16;
412 int r = -1;
414 dprintf("handle_instruction 0x%x 0x%x\n", run->s390_sieic.ipa, run->s390_sieic.ipb);
415 switch (ipa0) {
416 case IPA0_PRIV:
417 r = handle_priv(env, run, ipa1);
418 break;
419 case IPA0_DIAG:
420 r = handle_diag(env, run, ipb_code);
421 break;
422 case IPA0_SIGP:
423 r = handle_sigp(env, run, ipa1);
424 break;
427 if (r < 0) {
428 enter_pgmcheck(env, 0x0001);
430 return r;
433 static int handle_intercept(CPUState *env)
435 struct kvm_run *run = env->kvm_run;
436 int icpt_code = run->s390_sieic.icptcode;
437 int r = 0;
439 dprintf("intercept: 0x%x (at 0x%lx)\n", icpt_code, env->kvm_run->psw_addr);
440 switch (icpt_code) {
441 case ICPT_INSTRUCTION:
442 r = handle_instruction(env, run);
443 break;
444 case ICPT_WAITPSW:
445 /* XXX What to do on system shutdown? */
446 env->halted = 1;
447 env->exception_index = EXCP_HLT;
448 break;
449 case ICPT_SOFT_INTERCEPT:
450 fprintf(stderr, "KVM unimplemented icpt SOFT\n");
451 exit(1);
452 break;
453 case ICPT_CPU_STOP:
454 qemu_system_shutdown_request();
455 break;
456 case ICPT_IO:
457 fprintf(stderr, "KVM unimplemented icpt IO\n");
458 exit(1);
459 break;
460 default:
461 fprintf(stderr, "Unknown intercept code: %d\n", icpt_code);
462 exit(1);
463 break;
466 return r;
469 int kvm_arch_handle_exit(CPUState *env, struct kvm_run *run)
471 int ret = 0;
473 switch (run->exit_reason) {
474 case KVM_EXIT_S390_SIEIC:
475 ret = handle_intercept(env);
476 break;
477 case KVM_EXIT_S390_RESET:
478 fprintf(stderr, "RESET not implemented\n");
479 exit(1);
480 break;
481 default:
482 fprintf(stderr, "Unknown KVM exit: %d\n", run->exit_reason);
483 break;
486 return ret;