interrupt.c 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611
  1. /*
  2. * interrupt.c - handling kvm guest interrupts
  3. *
  4. * Copyright IBM Corp. 2008
  5. *
  6. * This program is free software; you can redistribute it and/or modify
  7. * it under the terms of the GNU General Public License (version 2 only)
  8. * as published by the Free Software Foundation.
  9. *
  10. * Author(s): Carsten Otte <cotte@de.ibm.com>
  11. */
  12. #include <linux/interrupt.h>
  13. #include <linux/kvm_host.h>
  14. #include <linux/hrtimer.h>
  15. #include <linux/signal.h>
  16. #include <linux/slab.h>
  17. #include <asm/asm-offsets.h>
  18. #include <asm/uaccess.h>
  19. #include "kvm-s390.h"
  20. #include "gaccess.h"
  21. static int psw_extint_disabled(struct kvm_vcpu *vcpu)
  22. {
  23. return !(vcpu->arch.sie_block->gpsw.mask & PSW_MASK_EXT);
  24. }
  25. static int psw_interrupts_disabled(struct kvm_vcpu *vcpu)
  26. {
  27. if ((vcpu->arch.sie_block->gpsw.mask & PSW_MASK_PER) ||
  28. (vcpu->arch.sie_block->gpsw.mask & PSW_MASK_IO) ||
  29. (vcpu->arch.sie_block->gpsw.mask & PSW_MASK_EXT))
  30. return 0;
  31. return 1;
  32. }
  33. static int __interrupt_is_deliverable(struct kvm_vcpu *vcpu,
  34. struct kvm_s390_interrupt_info *inti)
  35. {
  36. switch (inti->type) {
  37. case KVM_S390_INT_EMERGENCY:
  38. if (psw_extint_disabled(vcpu))
  39. return 0;
  40. if (vcpu->arch.sie_block->gcr[0] & 0x4000ul)
  41. return 1;
  42. return 0;
  43. case KVM_S390_INT_SERVICE:
  44. if (psw_extint_disabled(vcpu))
  45. return 0;
  46. if (vcpu->arch.sie_block->gcr[0] & 0x200ul)
  47. return 1;
  48. return 0;
  49. case KVM_S390_INT_VIRTIO:
  50. if (psw_extint_disabled(vcpu))
  51. return 0;
  52. if (vcpu->arch.sie_block->gcr[0] & 0x200ul)
  53. return 1;
  54. return 0;
  55. case KVM_S390_PROGRAM_INT:
  56. case KVM_S390_SIGP_STOP:
  57. case KVM_S390_SIGP_SET_PREFIX:
  58. case KVM_S390_RESTART:
  59. return 1;
  60. default:
  61. BUG();
  62. }
  63. return 0;
  64. }
  65. static void __set_cpu_idle(struct kvm_vcpu *vcpu)
  66. {
  67. BUG_ON(vcpu->vcpu_id > KVM_MAX_VCPUS - 1);
  68. atomic_set_mask(CPUSTAT_WAIT, &vcpu->arch.sie_block->cpuflags);
  69. set_bit(vcpu->vcpu_id, vcpu->arch.local_int.float_int->idle_mask);
  70. }
  71. static void __unset_cpu_idle(struct kvm_vcpu *vcpu)
  72. {
  73. BUG_ON(vcpu->vcpu_id > KVM_MAX_VCPUS - 1);
  74. atomic_clear_mask(CPUSTAT_WAIT, &vcpu->arch.sie_block->cpuflags);
  75. clear_bit(vcpu->vcpu_id, vcpu->arch.local_int.float_int->idle_mask);
  76. }
  77. static void __reset_intercept_indicators(struct kvm_vcpu *vcpu)
  78. {
  79. atomic_clear_mask(CPUSTAT_ECALL_PEND |
  80. CPUSTAT_IO_INT | CPUSTAT_EXT_INT | CPUSTAT_STOP_INT,
  81. &vcpu->arch.sie_block->cpuflags);
  82. vcpu->arch.sie_block->lctl = 0x0000;
  83. }
  84. static void __set_cpuflag(struct kvm_vcpu *vcpu, u32 flag)
  85. {
  86. atomic_set_mask(flag, &vcpu->arch.sie_block->cpuflags);
  87. }
  88. static void __set_intercept_indicator(struct kvm_vcpu *vcpu,
  89. struct kvm_s390_interrupt_info *inti)
  90. {
  91. switch (inti->type) {
  92. case KVM_S390_INT_EMERGENCY:
  93. case KVM_S390_INT_SERVICE:
  94. case KVM_S390_INT_VIRTIO:
  95. if (psw_extint_disabled(vcpu))
  96. __set_cpuflag(vcpu, CPUSTAT_EXT_INT);
  97. else
  98. vcpu->arch.sie_block->lctl |= LCTL_CR0;
  99. break;
  100. case KVM_S390_SIGP_STOP:
  101. __set_cpuflag(vcpu, CPUSTAT_STOP_INT);
  102. break;
  103. default:
  104. BUG();
  105. }
  106. }
  107. static void __do_deliver_interrupt(struct kvm_vcpu *vcpu,
  108. struct kvm_s390_interrupt_info *inti)
  109. {
  110. const unsigned short table[] = { 2, 4, 4, 6 };
  111. int rc, exception = 0;
  112. switch (inti->type) {
  113. case KVM_S390_INT_EMERGENCY:
  114. VCPU_EVENT(vcpu, 4, "%s", "interrupt: sigp emerg");
  115. vcpu->stat.deliver_emergency_signal++;
  116. rc = put_guest_u16(vcpu, __LC_EXT_INT_CODE, 0x1201);
  117. if (rc == -EFAULT)
  118. exception = 1;
  119. rc = put_guest_u16(vcpu, __LC_CPU_ADDRESS, inti->emerg.code);
  120. if (rc == -EFAULT)
  121. exception = 1;
  122. rc = copy_to_guest(vcpu, __LC_EXT_OLD_PSW,
  123. &vcpu->arch.sie_block->gpsw, sizeof(psw_t));
  124. if (rc == -EFAULT)
  125. exception = 1;
  126. rc = copy_from_guest(vcpu, &vcpu->arch.sie_block->gpsw,
  127. __LC_EXT_NEW_PSW, sizeof(psw_t));
  128. if (rc == -EFAULT)
  129. exception = 1;
  130. break;
  131. case KVM_S390_INT_SERVICE:
  132. VCPU_EVENT(vcpu, 4, "interrupt: sclp parm:%x",
  133. inti->ext.ext_params);
  134. vcpu->stat.deliver_service_signal++;
  135. rc = put_guest_u16(vcpu, __LC_EXT_INT_CODE, 0x2401);
  136. if (rc == -EFAULT)
  137. exception = 1;
  138. rc = copy_to_guest(vcpu, __LC_EXT_OLD_PSW,
  139. &vcpu->arch.sie_block->gpsw, sizeof(psw_t));
  140. if (rc == -EFAULT)
  141. exception = 1;
  142. rc = copy_from_guest(vcpu, &vcpu->arch.sie_block->gpsw,
  143. __LC_EXT_NEW_PSW, sizeof(psw_t));
  144. if (rc == -EFAULT)
  145. exception = 1;
  146. rc = put_guest_u32(vcpu, __LC_EXT_PARAMS, inti->ext.ext_params);
  147. if (rc == -EFAULT)
  148. exception = 1;
  149. break;
  150. case KVM_S390_INT_VIRTIO:
  151. VCPU_EVENT(vcpu, 4, "interrupt: virtio parm:%x,parm64:%llx",
  152. inti->ext.ext_params, inti->ext.ext_params2);
  153. vcpu->stat.deliver_virtio_interrupt++;
  154. rc = put_guest_u16(vcpu, __LC_EXT_INT_CODE, 0x2603);
  155. if (rc == -EFAULT)
  156. exception = 1;
  157. rc = put_guest_u16(vcpu, __LC_CPU_ADDRESS, 0x0d00);
  158. if (rc == -EFAULT)
  159. exception = 1;
  160. rc = copy_to_guest(vcpu, __LC_EXT_OLD_PSW,
  161. &vcpu->arch.sie_block->gpsw, sizeof(psw_t));
  162. if (rc == -EFAULT)
  163. exception = 1;
  164. rc = copy_from_guest(vcpu, &vcpu->arch.sie_block->gpsw,
  165. __LC_EXT_NEW_PSW, sizeof(psw_t));
  166. if (rc == -EFAULT)
  167. exception = 1;
  168. rc = put_guest_u32(vcpu, __LC_EXT_PARAMS, inti->ext.ext_params);
  169. if (rc == -EFAULT)
  170. exception = 1;
  171. rc = put_guest_u64(vcpu, __LC_EXT_PARAMS2,
  172. inti->ext.ext_params2);
  173. if (rc == -EFAULT)
  174. exception = 1;
  175. break;
  176. case KVM_S390_SIGP_STOP:
  177. VCPU_EVENT(vcpu, 4, "%s", "interrupt: cpu stop");
  178. vcpu->stat.deliver_stop_signal++;
  179. __set_intercept_indicator(vcpu, inti);
  180. break;
  181. case KVM_S390_SIGP_SET_PREFIX:
  182. VCPU_EVENT(vcpu, 4, "interrupt: set prefix to %x",
  183. inti->prefix.address);
  184. vcpu->stat.deliver_prefix_signal++;
  185. vcpu->arch.sie_block->prefix = inti->prefix.address;
  186. vcpu->arch.sie_block->ihcpu = 0xffff;
  187. break;
  188. case KVM_S390_RESTART:
  189. VCPU_EVENT(vcpu, 4, "%s", "interrupt: cpu restart");
  190. vcpu->stat.deliver_restart_signal++;
  191. rc = copy_to_guest(vcpu, offsetof(struct _lowcore,
  192. restart_old_psw), &vcpu->arch.sie_block->gpsw, sizeof(psw_t));
  193. if (rc == -EFAULT)
  194. exception = 1;
  195. rc = copy_from_guest(vcpu, &vcpu->arch.sie_block->gpsw,
  196. offsetof(struct _lowcore, restart_psw), sizeof(psw_t));
  197. if (rc == -EFAULT)
  198. exception = 1;
  199. break;
  200. case KVM_S390_PROGRAM_INT:
  201. VCPU_EVENT(vcpu, 4, "interrupt: pgm check code:%x, ilc:%x",
  202. inti->pgm.code,
  203. table[vcpu->arch.sie_block->ipa >> 14]);
  204. vcpu->stat.deliver_program_int++;
  205. rc = put_guest_u16(vcpu, __LC_PGM_INT_CODE, inti->pgm.code);
  206. if (rc == -EFAULT)
  207. exception = 1;
  208. rc = put_guest_u16(vcpu, __LC_PGM_ILC,
  209. table[vcpu->arch.sie_block->ipa >> 14]);
  210. if (rc == -EFAULT)
  211. exception = 1;
  212. rc = copy_to_guest(vcpu, __LC_PGM_OLD_PSW,
  213. &vcpu->arch.sie_block->gpsw, sizeof(psw_t));
  214. if (rc == -EFAULT)
  215. exception = 1;
  216. rc = copy_from_guest(vcpu, &vcpu->arch.sie_block->gpsw,
  217. __LC_PGM_NEW_PSW, sizeof(psw_t));
  218. if (rc == -EFAULT)
  219. exception = 1;
  220. break;
  221. default:
  222. BUG();
  223. }
  224. if (exception) {
  225. printk("kvm: The guest lowcore is not mapped during interrupt "
  226. "delivery, killing userspace\n");
  227. do_exit(SIGKILL);
  228. }
  229. }
  230. static int __try_deliver_ckc_interrupt(struct kvm_vcpu *vcpu)
  231. {
  232. int rc, exception = 0;
  233. if (psw_extint_disabled(vcpu))
  234. return 0;
  235. if (!(vcpu->arch.sie_block->gcr[0] & 0x800ul))
  236. return 0;
  237. rc = put_guest_u16(vcpu, __LC_EXT_INT_CODE, 0x1004);
  238. if (rc == -EFAULT)
  239. exception = 1;
  240. rc = copy_to_guest(vcpu, __LC_EXT_OLD_PSW,
  241. &vcpu->arch.sie_block->gpsw, sizeof(psw_t));
  242. if (rc == -EFAULT)
  243. exception = 1;
  244. rc = copy_from_guest(vcpu, &vcpu->arch.sie_block->gpsw,
  245. __LC_EXT_NEW_PSW, sizeof(psw_t));
  246. if (rc == -EFAULT)
  247. exception = 1;
  248. if (exception) {
  249. printk("kvm: The guest lowcore is not mapped during interrupt "
  250. "delivery, killing userspace\n");
  251. do_exit(SIGKILL);
  252. }
  253. return 1;
  254. }
  255. static int kvm_cpu_has_interrupt(struct kvm_vcpu *vcpu)
  256. {
  257. struct kvm_s390_local_interrupt *li = &vcpu->arch.local_int;
  258. struct kvm_s390_float_interrupt *fi = vcpu->arch.local_int.float_int;
  259. struct kvm_s390_interrupt_info *inti;
  260. int rc = 0;
  261. if (atomic_read(&li->active)) {
  262. spin_lock_bh(&li->lock);
  263. list_for_each_entry(inti, &li->list, list)
  264. if (__interrupt_is_deliverable(vcpu, inti)) {
  265. rc = 1;
  266. break;
  267. }
  268. spin_unlock_bh(&li->lock);
  269. }
  270. if ((!rc) && atomic_read(&fi->active)) {
  271. spin_lock(&fi->lock);
  272. list_for_each_entry(inti, &fi->list, list)
  273. if (__interrupt_is_deliverable(vcpu, inti)) {
  274. rc = 1;
  275. break;
  276. }
  277. spin_unlock(&fi->lock);
  278. }
  279. if ((!rc) && (vcpu->arch.sie_block->ckc <
  280. get_clock() + vcpu->arch.sie_block->epoch)) {
  281. if ((!psw_extint_disabled(vcpu)) &&
  282. (vcpu->arch.sie_block->gcr[0] & 0x800ul))
  283. rc = 1;
  284. }
  285. return rc;
  286. }
  287. int kvm_cpu_has_pending_timer(struct kvm_vcpu *vcpu)
  288. {
  289. return 0;
  290. }
  291. int kvm_s390_handle_wait(struct kvm_vcpu *vcpu)
  292. {
  293. u64 now, sltime;
  294. DECLARE_WAITQUEUE(wait, current);
  295. vcpu->stat.exit_wait_state++;
  296. if (kvm_cpu_has_interrupt(vcpu))
  297. return 0;
  298. __set_cpu_idle(vcpu);
  299. spin_lock_bh(&vcpu->arch.local_int.lock);
  300. vcpu->arch.local_int.timer_due = 0;
  301. spin_unlock_bh(&vcpu->arch.local_int.lock);
  302. if (psw_interrupts_disabled(vcpu)) {
  303. VCPU_EVENT(vcpu, 3, "%s", "disabled wait");
  304. __unset_cpu_idle(vcpu);
  305. return -EOPNOTSUPP; /* disabled wait */
  306. }
  307. if (psw_extint_disabled(vcpu) ||
  308. (!(vcpu->arch.sie_block->gcr[0] & 0x800ul))) {
  309. VCPU_EVENT(vcpu, 3, "%s", "enabled wait w/o timer");
  310. goto no_timer;
  311. }
  312. now = get_clock() + vcpu->arch.sie_block->epoch;
  313. if (vcpu->arch.sie_block->ckc < now) {
  314. __unset_cpu_idle(vcpu);
  315. return 0;
  316. }
  317. sltime = ((vcpu->arch.sie_block->ckc - now)*125)>>9;
  318. hrtimer_start(&vcpu->arch.ckc_timer, ktime_set (0, sltime) , HRTIMER_MODE_REL);
  319. VCPU_EVENT(vcpu, 5, "enabled wait via clock comparator: %llx ns", sltime);
  320. no_timer:
  321. spin_lock(&vcpu->arch.local_int.float_int->lock);
  322. spin_lock_bh(&vcpu->arch.local_int.lock);
  323. add_wait_queue(&vcpu->arch.local_int.wq, &wait);
  324. while (list_empty(&vcpu->arch.local_int.list) &&
  325. list_empty(&vcpu->arch.local_int.float_int->list) &&
  326. (!vcpu->arch.local_int.timer_due) &&
  327. !signal_pending(current)) {
  328. set_current_state(TASK_INTERRUPTIBLE);
  329. spin_unlock_bh(&vcpu->arch.local_int.lock);
  330. spin_unlock(&vcpu->arch.local_int.float_int->lock);
  331. vcpu_put(vcpu);
  332. schedule();
  333. vcpu_load(vcpu);
  334. spin_lock(&vcpu->arch.local_int.float_int->lock);
  335. spin_lock_bh(&vcpu->arch.local_int.lock);
  336. }
  337. __unset_cpu_idle(vcpu);
  338. __set_current_state(TASK_RUNNING);
  339. remove_wait_queue(&vcpu->arch.local_int.wq, &wait);
  340. spin_unlock_bh(&vcpu->arch.local_int.lock);
  341. spin_unlock(&vcpu->arch.local_int.float_int->lock);
  342. hrtimer_try_to_cancel(&vcpu->arch.ckc_timer);
  343. return 0;
  344. }
  345. void kvm_s390_tasklet(unsigned long parm)
  346. {
  347. struct kvm_vcpu *vcpu = (struct kvm_vcpu *) parm;
  348. spin_lock(&vcpu->arch.local_int.lock);
  349. vcpu->arch.local_int.timer_due = 1;
  350. if (waitqueue_active(&vcpu->arch.local_int.wq))
  351. wake_up_interruptible(&vcpu->arch.local_int.wq);
  352. spin_unlock(&vcpu->arch.local_int.lock);
  353. }
  354. /*
  355. * low level hrtimer wake routine. Because this runs in hardirq context
  356. * we schedule a tasklet to do the real work.
  357. */
  358. enum hrtimer_restart kvm_s390_idle_wakeup(struct hrtimer *timer)
  359. {
  360. struct kvm_vcpu *vcpu;
  361. vcpu = container_of(timer, struct kvm_vcpu, arch.ckc_timer);
  362. tasklet_schedule(&vcpu->arch.tasklet);
  363. return HRTIMER_NORESTART;
  364. }
  365. void kvm_s390_deliver_pending_interrupts(struct kvm_vcpu *vcpu)
  366. {
  367. struct kvm_s390_local_interrupt *li = &vcpu->arch.local_int;
  368. struct kvm_s390_float_interrupt *fi = vcpu->arch.local_int.float_int;
  369. struct kvm_s390_interrupt_info *n, *inti = NULL;
  370. int deliver;
  371. __reset_intercept_indicators(vcpu);
  372. if (atomic_read(&li->active)) {
  373. do {
  374. deliver = 0;
  375. spin_lock_bh(&li->lock);
  376. list_for_each_entry_safe(inti, n, &li->list, list) {
  377. if (__interrupt_is_deliverable(vcpu, inti)) {
  378. list_del(&inti->list);
  379. deliver = 1;
  380. break;
  381. }
  382. __set_intercept_indicator(vcpu, inti);
  383. }
  384. if (list_empty(&li->list))
  385. atomic_set(&li->active, 0);
  386. spin_unlock_bh(&li->lock);
  387. if (deliver) {
  388. __do_deliver_interrupt(vcpu, inti);
  389. kfree(inti);
  390. }
  391. } while (deliver);
  392. }
  393. if ((vcpu->arch.sie_block->ckc <
  394. get_clock() + vcpu->arch.sie_block->epoch))
  395. __try_deliver_ckc_interrupt(vcpu);
  396. if (atomic_read(&fi->active)) {
  397. do {
  398. deliver = 0;
  399. spin_lock(&fi->lock);
  400. list_for_each_entry_safe(inti, n, &fi->list, list) {
  401. if (__interrupt_is_deliverable(vcpu, inti)) {
  402. list_del(&inti->list);
  403. deliver = 1;
  404. break;
  405. }
  406. __set_intercept_indicator(vcpu, inti);
  407. }
  408. if (list_empty(&fi->list))
  409. atomic_set(&fi->active, 0);
  410. spin_unlock(&fi->lock);
  411. if (deliver) {
  412. __do_deliver_interrupt(vcpu, inti);
  413. kfree(inti);
  414. }
  415. } while (deliver);
  416. }
  417. }
  418. int kvm_s390_inject_program_int(struct kvm_vcpu *vcpu, u16 code)
  419. {
  420. struct kvm_s390_local_interrupt *li = &vcpu->arch.local_int;
  421. struct kvm_s390_interrupt_info *inti;
  422. inti = kzalloc(sizeof(*inti), GFP_KERNEL);
  423. if (!inti)
  424. return -ENOMEM;
  425. inti->type = KVM_S390_PROGRAM_INT;
  426. inti->pgm.code = code;
  427. VCPU_EVENT(vcpu, 3, "inject: program check %d (from kernel)", code);
  428. spin_lock_bh(&li->lock);
  429. list_add(&inti->list, &li->list);
  430. atomic_set(&li->active, 1);
  431. BUG_ON(waitqueue_active(&li->wq));
  432. spin_unlock_bh(&li->lock);
  433. return 0;
  434. }
  435. int kvm_s390_inject_vm(struct kvm *kvm,
  436. struct kvm_s390_interrupt *s390int)
  437. {
  438. struct kvm_s390_local_interrupt *li;
  439. struct kvm_s390_float_interrupt *fi;
  440. struct kvm_s390_interrupt_info *inti;
  441. int sigcpu;
  442. inti = kzalloc(sizeof(*inti), GFP_KERNEL);
  443. if (!inti)
  444. return -ENOMEM;
  445. switch (s390int->type) {
  446. case KVM_S390_INT_VIRTIO:
  447. VM_EVENT(kvm, 5, "inject: virtio parm:%x,parm64:%llx",
  448. s390int->parm, s390int->parm64);
  449. inti->type = s390int->type;
  450. inti->ext.ext_params = s390int->parm;
  451. inti->ext.ext_params2 = s390int->parm64;
  452. break;
  453. case KVM_S390_INT_SERVICE:
  454. VM_EVENT(kvm, 5, "inject: sclp parm:%x", s390int->parm);
  455. inti->type = s390int->type;
  456. inti->ext.ext_params = s390int->parm;
  457. break;
  458. case KVM_S390_PROGRAM_INT:
  459. case KVM_S390_SIGP_STOP:
  460. case KVM_S390_INT_EMERGENCY:
  461. default:
  462. kfree(inti);
  463. return -EINVAL;
  464. }
  465. mutex_lock(&kvm->lock);
  466. fi = &kvm->arch.float_int;
  467. spin_lock(&fi->lock);
  468. list_add_tail(&inti->list, &fi->list);
  469. atomic_set(&fi->active, 1);
  470. sigcpu = find_first_bit(fi->idle_mask, KVM_MAX_VCPUS);
  471. if (sigcpu == KVM_MAX_VCPUS) {
  472. do {
  473. sigcpu = fi->next_rr_cpu++;
  474. if (sigcpu == KVM_MAX_VCPUS)
  475. sigcpu = fi->next_rr_cpu = 0;
  476. } while (fi->local_int[sigcpu] == NULL);
  477. }
  478. li = fi->local_int[sigcpu];
  479. spin_lock_bh(&li->lock);
  480. atomic_set_mask(CPUSTAT_EXT_INT, li->cpuflags);
  481. if (waitqueue_active(&li->wq))
  482. wake_up_interruptible(&li->wq);
  483. spin_unlock_bh(&li->lock);
  484. spin_unlock(&fi->lock);
  485. mutex_unlock(&kvm->lock);
  486. return 0;
  487. }
  488. int kvm_s390_inject_vcpu(struct kvm_vcpu *vcpu,
  489. struct kvm_s390_interrupt *s390int)
  490. {
  491. struct kvm_s390_local_interrupt *li;
  492. struct kvm_s390_interrupt_info *inti;
  493. inti = kzalloc(sizeof(*inti), GFP_KERNEL);
  494. if (!inti)
  495. return -ENOMEM;
  496. switch (s390int->type) {
  497. case KVM_S390_PROGRAM_INT:
  498. if (s390int->parm & 0xffff0000) {
  499. kfree(inti);
  500. return -EINVAL;
  501. }
  502. inti->type = s390int->type;
  503. inti->pgm.code = s390int->parm;
  504. VCPU_EVENT(vcpu, 3, "inject: program check %d (from user)",
  505. s390int->parm);
  506. break;
  507. case KVM_S390_SIGP_SET_PREFIX:
  508. inti->prefix.address = s390int->parm;
  509. inti->type = s390int->type;
  510. VCPU_EVENT(vcpu, 3, "inject: set prefix to %x (from user)",
  511. s390int->parm);
  512. break;
  513. case KVM_S390_SIGP_STOP:
  514. case KVM_S390_RESTART:
  515. case KVM_S390_INT_EMERGENCY:
  516. VCPU_EVENT(vcpu, 3, "inject: type %x", s390int->type);
  517. inti->type = s390int->type;
  518. break;
  519. case KVM_S390_INT_VIRTIO:
  520. case KVM_S390_INT_SERVICE:
  521. default:
  522. kfree(inti);
  523. return -EINVAL;
  524. }
  525. mutex_lock(&vcpu->kvm->lock);
  526. li = &vcpu->arch.local_int;
  527. spin_lock_bh(&li->lock);
  528. if (inti->type == KVM_S390_PROGRAM_INT)
  529. list_add(&inti->list, &li->list);
  530. else
  531. list_add_tail(&inti->list, &li->list);
  532. atomic_set(&li->active, 1);
  533. if (inti->type == KVM_S390_SIGP_STOP)
  534. li->action_bits |= ACTION_STOP_ON_STOP;
  535. atomic_set_mask(CPUSTAT_EXT_INT, li->cpuflags);
  536. if (waitqueue_active(&li->wq))
  537. wake_up_interruptible(&vcpu->arch.local_int.wq);
  538. spin_unlock_bh(&li->lock);
  539. mutex_unlock(&vcpu->kvm->lock);
  540. return 0;
  541. }