interrupt.c 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612
  1. /*
  2. * interrupt.c - handling kvm guest interrupts
  3. *
  4. * Copyright IBM Corp. 2008
  5. *
  6. * This program is free software; you can redistribute it and/or modify
  7. * it under the terms of the GNU General Public License (version 2 only)
  8. * as published by the Free Software Foundation.
  9. *
  10. * Author(s): Carsten Otte <cotte@de.ibm.com>
  11. */
  12. #include <asm/lowcore.h>
  13. #include <asm/uaccess.h>
  14. #include <linux/hrtimer.h>
  15. #include <linux/interrupt.h>
  16. #include <linux/kvm_host.h>
  17. #include <linux/signal.h>
  18. #include "kvm-s390.h"
  19. #include "gaccess.h"
  20. static int psw_extint_disabled(struct kvm_vcpu *vcpu)
  21. {
  22. return !(vcpu->arch.sie_block->gpsw.mask & PSW_MASK_EXT);
  23. }
  24. static int psw_interrupts_disabled(struct kvm_vcpu *vcpu)
  25. {
  26. if ((vcpu->arch.sie_block->gpsw.mask & PSW_MASK_PER) ||
  27. (vcpu->arch.sie_block->gpsw.mask & PSW_MASK_IO) ||
  28. (vcpu->arch.sie_block->gpsw.mask & PSW_MASK_EXT))
  29. return 0;
  30. return 1;
  31. }
  32. static int __interrupt_is_deliverable(struct kvm_vcpu *vcpu,
  33. struct kvm_s390_interrupt_info *inti)
  34. {
  35. switch (inti->type) {
  36. case KVM_S390_INT_EMERGENCY:
  37. if (psw_extint_disabled(vcpu))
  38. return 0;
  39. if (vcpu->arch.sie_block->gcr[0] & 0x4000ul)
  40. return 1;
  41. return 0;
  42. case KVM_S390_INT_SERVICE:
  43. if (psw_extint_disabled(vcpu))
  44. return 0;
  45. if (vcpu->arch.sie_block->gcr[0] & 0x200ul)
  46. return 1;
  47. return 0;
  48. case KVM_S390_INT_VIRTIO:
  49. if (psw_extint_disabled(vcpu))
  50. return 0;
  51. if (vcpu->arch.sie_block->gcr[0] & 0x200ul)
  52. return 1;
  53. return 0;
  54. case KVM_S390_PROGRAM_INT:
  55. case KVM_S390_SIGP_STOP:
  56. case KVM_S390_SIGP_SET_PREFIX:
  57. case KVM_S390_RESTART:
  58. return 1;
  59. default:
  60. BUG();
  61. }
  62. return 0;
  63. }
  64. static void __set_cpu_idle(struct kvm_vcpu *vcpu)
  65. {
  66. BUG_ON(vcpu->vcpu_id > KVM_MAX_VCPUS - 1);
  67. atomic_set_mask(CPUSTAT_WAIT, &vcpu->arch.sie_block->cpuflags);
  68. set_bit(vcpu->vcpu_id, vcpu->arch.local_int.float_int->idle_mask);
  69. }
  70. static void __unset_cpu_idle(struct kvm_vcpu *vcpu)
  71. {
  72. BUG_ON(vcpu->vcpu_id > KVM_MAX_VCPUS - 1);
  73. atomic_clear_mask(CPUSTAT_WAIT, &vcpu->arch.sie_block->cpuflags);
  74. clear_bit(vcpu->vcpu_id, vcpu->arch.local_int.float_int->idle_mask);
  75. }
  76. static void __reset_intercept_indicators(struct kvm_vcpu *vcpu)
  77. {
  78. atomic_clear_mask(CPUSTAT_ECALL_PEND |
  79. CPUSTAT_IO_INT | CPUSTAT_EXT_INT | CPUSTAT_STOP_INT,
  80. &vcpu->arch.sie_block->cpuflags);
  81. vcpu->arch.sie_block->lctl = 0x0000;
  82. }
  83. static void __set_cpuflag(struct kvm_vcpu *vcpu, u32 flag)
  84. {
  85. atomic_set_mask(flag, &vcpu->arch.sie_block->cpuflags);
  86. }
  87. static void __set_intercept_indicator(struct kvm_vcpu *vcpu,
  88. struct kvm_s390_interrupt_info *inti)
  89. {
  90. switch (inti->type) {
  91. case KVM_S390_INT_EMERGENCY:
  92. case KVM_S390_INT_SERVICE:
  93. case KVM_S390_INT_VIRTIO:
  94. if (psw_extint_disabled(vcpu))
  95. __set_cpuflag(vcpu, CPUSTAT_EXT_INT);
  96. else
  97. vcpu->arch.sie_block->lctl |= LCTL_CR0;
  98. break;
  99. case KVM_S390_SIGP_STOP:
  100. __set_cpuflag(vcpu, CPUSTAT_STOP_INT);
  101. break;
  102. default:
  103. BUG();
  104. }
  105. }
  106. static void __do_deliver_interrupt(struct kvm_vcpu *vcpu,
  107. struct kvm_s390_interrupt_info *inti)
  108. {
  109. const unsigned short table[] = { 2, 4, 4, 6 };
  110. int rc, exception = 0;
  111. switch (inti->type) {
  112. case KVM_S390_INT_EMERGENCY:
  113. VCPU_EVENT(vcpu, 4, "%s", "interrupt: sigp emerg");
  114. vcpu->stat.deliver_emergency_signal++;
  115. rc = put_guest_u16(vcpu, __LC_EXT_INT_CODE, 0x1201);
  116. if (rc == -EFAULT)
  117. exception = 1;
  118. rc = copy_to_guest(vcpu, __LC_EXT_OLD_PSW,
  119. &vcpu->arch.sie_block->gpsw, sizeof(psw_t));
  120. if (rc == -EFAULT)
  121. exception = 1;
  122. rc = copy_from_guest(vcpu, &vcpu->arch.sie_block->gpsw,
  123. __LC_EXT_NEW_PSW, sizeof(psw_t));
  124. if (rc == -EFAULT)
  125. exception = 1;
  126. break;
  127. case KVM_S390_INT_SERVICE:
  128. VCPU_EVENT(vcpu, 4, "interrupt: sclp parm:%x",
  129. inti->ext.ext_params);
  130. vcpu->stat.deliver_service_signal++;
  131. rc = put_guest_u16(vcpu, __LC_EXT_INT_CODE, 0x2401);
  132. if (rc == -EFAULT)
  133. exception = 1;
  134. rc = copy_to_guest(vcpu, __LC_EXT_OLD_PSW,
  135. &vcpu->arch.sie_block->gpsw, sizeof(psw_t));
  136. if (rc == -EFAULT)
  137. exception = 1;
  138. rc = copy_from_guest(vcpu, &vcpu->arch.sie_block->gpsw,
  139. __LC_EXT_NEW_PSW, sizeof(psw_t));
  140. if (rc == -EFAULT)
  141. exception = 1;
  142. rc = put_guest_u32(vcpu, __LC_EXT_PARAMS, inti->ext.ext_params);
  143. if (rc == -EFAULT)
  144. exception = 1;
  145. break;
  146. case KVM_S390_INT_VIRTIO:
  147. VCPU_EVENT(vcpu, 4, "interrupt: virtio parm:%x,parm64:%llx",
  148. inti->ext.ext_params, inti->ext.ext_params2);
  149. vcpu->stat.deliver_virtio_interrupt++;
  150. rc = put_guest_u16(vcpu, __LC_EXT_INT_CODE, 0x2603);
  151. if (rc == -EFAULT)
  152. exception = 1;
  153. rc = put_guest_u16(vcpu, __LC_CPU_ADDRESS, 0x0d00);
  154. if (rc == -EFAULT)
  155. exception = 1;
  156. rc = copy_to_guest(vcpu, __LC_EXT_OLD_PSW,
  157. &vcpu->arch.sie_block->gpsw, sizeof(psw_t));
  158. if (rc == -EFAULT)
  159. exception = 1;
  160. rc = copy_from_guest(vcpu, &vcpu->arch.sie_block->gpsw,
  161. __LC_EXT_NEW_PSW, sizeof(psw_t));
  162. if (rc == -EFAULT)
  163. exception = 1;
  164. rc = put_guest_u32(vcpu, __LC_EXT_PARAMS, inti->ext.ext_params);
  165. if (rc == -EFAULT)
  166. exception = 1;
  167. rc = put_guest_u64(vcpu, __LC_PFAULT_INTPARM,
  168. inti->ext.ext_params2);
  169. if (rc == -EFAULT)
  170. exception = 1;
  171. break;
  172. case KVM_S390_SIGP_STOP:
  173. VCPU_EVENT(vcpu, 4, "%s", "interrupt: cpu stop");
  174. vcpu->stat.deliver_stop_signal++;
  175. __set_intercept_indicator(vcpu, inti);
  176. break;
  177. case KVM_S390_SIGP_SET_PREFIX:
  178. VCPU_EVENT(vcpu, 4, "interrupt: set prefix to %x",
  179. inti->prefix.address);
  180. vcpu->stat.deliver_prefix_signal++;
  181. vcpu->arch.sie_block->prefix = inti->prefix.address;
  182. vcpu->arch.sie_block->ihcpu = 0xffff;
  183. break;
  184. case KVM_S390_RESTART:
  185. VCPU_EVENT(vcpu, 4, "%s", "interrupt: cpu restart");
  186. vcpu->stat.deliver_restart_signal++;
  187. rc = copy_to_guest(vcpu, offsetof(struct _lowcore,
  188. restart_old_psw), &vcpu->arch.sie_block->gpsw, sizeof(psw_t));
  189. if (rc == -EFAULT)
  190. exception = 1;
  191. rc = copy_from_guest(vcpu, &vcpu->arch.sie_block->gpsw,
  192. offsetof(struct _lowcore, restart_psw), sizeof(psw_t));
  193. if (rc == -EFAULT)
  194. exception = 1;
  195. break;
  196. case KVM_S390_PROGRAM_INT:
  197. VCPU_EVENT(vcpu, 4, "interrupt: pgm check code:%x, ilc:%x",
  198. inti->pgm.code,
  199. table[vcpu->arch.sie_block->ipa >> 14]);
  200. vcpu->stat.deliver_program_int++;
  201. rc = put_guest_u16(vcpu, __LC_PGM_INT_CODE, inti->pgm.code);
  202. if (rc == -EFAULT)
  203. exception = 1;
  204. rc = put_guest_u16(vcpu, __LC_PGM_ILC,
  205. table[vcpu->arch.sie_block->ipa >> 14]);
  206. if (rc == -EFAULT)
  207. exception = 1;
  208. rc = copy_to_guest(vcpu, __LC_PGM_OLD_PSW,
  209. &vcpu->arch.sie_block->gpsw, sizeof(psw_t));
  210. if (rc == -EFAULT)
  211. exception = 1;
  212. rc = copy_from_guest(vcpu, &vcpu->arch.sie_block->gpsw,
  213. __LC_PGM_NEW_PSW, sizeof(psw_t));
  214. if (rc == -EFAULT)
  215. exception = 1;
  216. break;
  217. default:
  218. BUG();
  219. }
  220. if (exception) {
  221. printk("kvm: The guest lowcore is not mapped during interrupt "
  222. "delivery, killing userspace\n");
  223. do_exit(SIGKILL);
  224. }
  225. }
  226. static int __try_deliver_ckc_interrupt(struct kvm_vcpu *vcpu)
  227. {
  228. int rc, exception = 0;
  229. if (psw_extint_disabled(vcpu))
  230. return 0;
  231. if (!(vcpu->arch.sie_block->gcr[0] & 0x800ul))
  232. return 0;
  233. rc = put_guest_u16(vcpu, __LC_EXT_INT_CODE, 0x1004);
  234. if (rc == -EFAULT)
  235. exception = 1;
  236. rc = copy_to_guest(vcpu, __LC_EXT_OLD_PSW,
  237. &vcpu->arch.sie_block->gpsw, sizeof(psw_t));
  238. if (rc == -EFAULT)
  239. exception = 1;
  240. rc = copy_from_guest(vcpu, &vcpu->arch.sie_block->gpsw,
  241. __LC_EXT_NEW_PSW, sizeof(psw_t));
  242. if (rc == -EFAULT)
  243. exception = 1;
  244. if (exception) {
  245. printk("kvm: The guest lowcore is not mapped during interrupt "
  246. "delivery, killing userspace\n");
  247. do_exit(SIGKILL);
  248. }
  249. return 1;
  250. }
  251. int kvm_cpu_has_interrupt(struct kvm_vcpu *vcpu)
  252. {
  253. struct kvm_s390_local_interrupt *li = &vcpu->arch.local_int;
  254. struct kvm_s390_float_interrupt *fi = vcpu->arch.local_int.float_int;
  255. struct kvm_s390_interrupt_info *inti;
  256. int rc = 0;
  257. if (atomic_read(&li->active)) {
  258. spin_lock_bh(&li->lock);
  259. list_for_each_entry(inti, &li->list, list)
  260. if (__interrupt_is_deliverable(vcpu, inti)) {
  261. rc = 1;
  262. break;
  263. }
  264. spin_unlock_bh(&li->lock);
  265. }
  266. if ((!rc) && atomic_read(&fi->active)) {
  267. spin_lock(&fi->lock);
  268. list_for_each_entry(inti, &fi->list, list)
  269. if (__interrupt_is_deliverable(vcpu, inti)) {
  270. rc = 1;
  271. break;
  272. }
  273. spin_unlock(&fi->lock);
  274. }
  275. if ((!rc) && (vcpu->arch.sie_block->ckc <
  276. get_clock() + vcpu->arch.sie_block->epoch)) {
  277. if ((!psw_extint_disabled(vcpu)) &&
  278. (vcpu->arch.sie_block->gcr[0] & 0x800ul))
  279. rc = 1;
  280. }
  281. return rc;
  282. }
  283. int kvm_arch_interrupt_allowed(struct kvm_vcpu *vcpu)
  284. {
  285. /* do real check here */
  286. return 1;
  287. }
  288. int kvm_cpu_has_pending_timer(struct kvm_vcpu *vcpu)
  289. {
  290. return 0;
  291. }
  292. int kvm_s390_handle_wait(struct kvm_vcpu *vcpu)
  293. {
  294. u64 now, sltime;
  295. DECLARE_WAITQUEUE(wait, current);
  296. vcpu->stat.exit_wait_state++;
  297. if (kvm_cpu_has_interrupt(vcpu))
  298. return 0;
  299. __set_cpu_idle(vcpu);
  300. spin_lock_bh(&vcpu->arch.local_int.lock);
  301. vcpu->arch.local_int.timer_due = 0;
  302. spin_unlock_bh(&vcpu->arch.local_int.lock);
  303. if (psw_interrupts_disabled(vcpu)) {
  304. VCPU_EVENT(vcpu, 3, "%s", "disabled wait");
  305. __unset_cpu_idle(vcpu);
  306. return -ENOTSUPP; /* disabled wait */
  307. }
  308. if (psw_extint_disabled(vcpu) ||
  309. (!(vcpu->arch.sie_block->gcr[0] & 0x800ul))) {
  310. VCPU_EVENT(vcpu, 3, "%s", "enabled wait w/o timer");
  311. goto no_timer;
  312. }
  313. now = get_clock() + vcpu->arch.sie_block->epoch;
  314. if (vcpu->arch.sie_block->ckc < now) {
  315. __unset_cpu_idle(vcpu);
  316. return 0;
  317. }
  318. sltime = ((vcpu->arch.sie_block->ckc - now)*125)>>9;
  319. hrtimer_start(&vcpu->arch.ckc_timer, ktime_set (0, sltime) , HRTIMER_MODE_REL);
  320. VCPU_EVENT(vcpu, 5, "enabled wait via clock comparator: %llx ns", sltime);
  321. no_timer:
  322. spin_lock(&vcpu->arch.local_int.float_int->lock);
  323. spin_lock_bh(&vcpu->arch.local_int.lock);
  324. add_wait_queue(&vcpu->arch.local_int.wq, &wait);
  325. while (list_empty(&vcpu->arch.local_int.list) &&
  326. list_empty(&vcpu->arch.local_int.float_int->list) &&
  327. (!vcpu->arch.local_int.timer_due) &&
  328. !signal_pending(current)) {
  329. set_current_state(TASK_INTERRUPTIBLE);
  330. spin_unlock_bh(&vcpu->arch.local_int.lock);
  331. spin_unlock(&vcpu->arch.local_int.float_int->lock);
  332. vcpu_put(vcpu);
  333. schedule();
  334. vcpu_load(vcpu);
  335. spin_lock(&vcpu->arch.local_int.float_int->lock);
  336. spin_lock_bh(&vcpu->arch.local_int.lock);
  337. }
  338. __unset_cpu_idle(vcpu);
  339. __set_current_state(TASK_RUNNING);
  340. remove_wait_queue(&vcpu->wq, &wait);
  341. spin_unlock_bh(&vcpu->arch.local_int.lock);
  342. spin_unlock(&vcpu->arch.local_int.float_int->lock);
  343. hrtimer_try_to_cancel(&vcpu->arch.ckc_timer);
  344. return 0;
  345. }
  346. void kvm_s390_tasklet(unsigned long parm)
  347. {
  348. struct kvm_vcpu *vcpu = (struct kvm_vcpu *) parm;
  349. spin_lock(&vcpu->arch.local_int.lock);
  350. vcpu->arch.local_int.timer_due = 1;
  351. if (waitqueue_active(&vcpu->arch.local_int.wq))
  352. wake_up_interruptible(&vcpu->arch.local_int.wq);
  353. spin_unlock(&vcpu->arch.local_int.lock);
  354. }
  355. /*
  356. * low level hrtimer wake routine. Because this runs in hardirq context
  357. * we schedule a tasklet to do the real work.
  358. */
  359. enum hrtimer_restart kvm_s390_idle_wakeup(struct hrtimer *timer)
  360. {
  361. struct kvm_vcpu *vcpu;
  362. vcpu = container_of(timer, struct kvm_vcpu, arch.ckc_timer);
  363. tasklet_schedule(&vcpu->arch.tasklet);
  364. return HRTIMER_NORESTART;
  365. }
  366. void kvm_s390_deliver_pending_interrupts(struct kvm_vcpu *vcpu)
  367. {
  368. struct kvm_s390_local_interrupt *li = &vcpu->arch.local_int;
  369. struct kvm_s390_float_interrupt *fi = vcpu->arch.local_int.float_int;
  370. struct kvm_s390_interrupt_info *n, *inti = NULL;
  371. int deliver;
  372. __reset_intercept_indicators(vcpu);
  373. if (atomic_read(&li->active)) {
  374. do {
  375. deliver = 0;
  376. spin_lock_bh(&li->lock);
  377. list_for_each_entry_safe(inti, n, &li->list, list) {
  378. if (__interrupt_is_deliverable(vcpu, inti)) {
  379. list_del(&inti->list);
  380. deliver = 1;
  381. break;
  382. }
  383. __set_intercept_indicator(vcpu, inti);
  384. }
  385. if (list_empty(&li->list))
  386. atomic_set(&li->active, 0);
  387. spin_unlock_bh(&li->lock);
  388. if (deliver) {
  389. __do_deliver_interrupt(vcpu, inti);
  390. kfree(inti);
  391. }
  392. } while (deliver);
  393. }
  394. if ((vcpu->arch.sie_block->ckc <
  395. get_clock() + vcpu->arch.sie_block->epoch))
  396. __try_deliver_ckc_interrupt(vcpu);
  397. if (atomic_read(&fi->active)) {
  398. do {
  399. deliver = 0;
  400. spin_lock(&fi->lock);
  401. list_for_each_entry_safe(inti, n, &fi->list, list) {
  402. if (__interrupt_is_deliverable(vcpu, inti)) {
  403. list_del(&inti->list);
  404. deliver = 1;
  405. break;
  406. }
  407. __set_intercept_indicator(vcpu, inti);
  408. }
  409. if (list_empty(&fi->list))
  410. atomic_set(&fi->active, 0);
  411. spin_unlock(&fi->lock);
  412. if (deliver) {
  413. __do_deliver_interrupt(vcpu, inti);
  414. kfree(inti);
  415. }
  416. } while (deliver);
  417. }
  418. }
  419. int kvm_s390_inject_program_int(struct kvm_vcpu *vcpu, u16 code)
  420. {
  421. struct kvm_s390_local_interrupt *li = &vcpu->arch.local_int;
  422. struct kvm_s390_interrupt_info *inti;
  423. inti = kzalloc(sizeof(*inti), GFP_KERNEL);
  424. if (!inti)
  425. return -ENOMEM;
  426. inti->type = KVM_S390_PROGRAM_INT;;
  427. inti->pgm.code = code;
  428. VCPU_EVENT(vcpu, 3, "inject: program check %d (from kernel)", code);
  429. spin_lock_bh(&li->lock);
  430. list_add(&inti->list, &li->list);
  431. atomic_set(&li->active, 1);
  432. BUG_ON(waitqueue_active(&li->wq));
  433. spin_unlock_bh(&li->lock);
  434. return 0;
  435. }
  436. int kvm_s390_inject_vm(struct kvm *kvm,
  437. struct kvm_s390_interrupt *s390int)
  438. {
  439. struct kvm_s390_local_interrupt *li;
  440. struct kvm_s390_float_interrupt *fi;
  441. struct kvm_s390_interrupt_info *inti;
  442. int sigcpu;
  443. inti = kzalloc(sizeof(*inti), GFP_KERNEL);
  444. if (!inti)
  445. return -ENOMEM;
  446. switch (s390int->type) {
  447. case KVM_S390_INT_VIRTIO:
  448. VM_EVENT(kvm, 5, "inject: virtio parm:%x,parm64:%llx",
  449. s390int->parm, s390int->parm64);
  450. inti->type = s390int->type;
  451. inti->ext.ext_params = s390int->parm;
  452. inti->ext.ext_params2 = s390int->parm64;
  453. break;
  454. case KVM_S390_INT_SERVICE:
  455. VM_EVENT(kvm, 5, "inject: sclp parm:%x", s390int->parm);
  456. inti->type = s390int->type;
  457. inti->ext.ext_params = s390int->parm;
  458. break;
  459. case KVM_S390_PROGRAM_INT:
  460. case KVM_S390_SIGP_STOP:
  461. case KVM_S390_INT_EMERGENCY:
  462. default:
  463. kfree(inti);
  464. return -EINVAL;
  465. }
  466. mutex_lock(&kvm->lock);
  467. fi = &kvm->arch.float_int;
  468. spin_lock(&fi->lock);
  469. list_add_tail(&inti->list, &fi->list);
  470. atomic_set(&fi->active, 1);
  471. sigcpu = find_first_bit(fi->idle_mask, KVM_MAX_VCPUS);
  472. if (sigcpu == KVM_MAX_VCPUS) {
  473. do {
  474. sigcpu = fi->next_rr_cpu++;
  475. if (sigcpu == KVM_MAX_VCPUS)
  476. sigcpu = fi->next_rr_cpu = 0;
  477. } while (fi->local_int[sigcpu] == NULL);
  478. }
  479. li = fi->local_int[sigcpu];
  480. spin_lock_bh(&li->lock);
  481. atomic_set_mask(CPUSTAT_EXT_INT, li->cpuflags);
  482. if (waitqueue_active(&li->wq))
  483. wake_up_interruptible(&li->wq);
  484. spin_unlock_bh(&li->lock);
  485. spin_unlock(&fi->lock);
  486. mutex_unlock(&kvm->lock);
  487. return 0;
  488. }
  489. int kvm_s390_inject_vcpu(struct kvm_vcpu *vcpu,
  490. struct kvm_s390_interrupt *s390int)
  491. {
  492. struct kvm_s390_local_interrupt *li;
  493. struct kvm_s390_interrupt_info *inti;
  494. inti = kzalloc(sizeof(*inti), GFP_KERNEL);
  495. if (!inti)
  496. return -ENOMEM;
  497. switch (s390int->type) {
  498. case KVM_S390_PROGRAM_INT:
  499. if (s390int->parm & 0xffff0000) {
  500. kfree(inti);
  501. return -EINVAL;
  502. }
  503. inti->type = s390int->type;
  504. inti->pgm.code = s390int->parm;
  505. VCPU_EVENT(vcpu, 3, "inject: program check %d (from user)",
  506. s390int->parm);
  507. break;
  508. case KVM_S390_SIGP_SET_PREFIX:
  509. inti->prefix.address = s390int->parm;
  510. inti->type = s390int->type;
  511. VCPU_EVENT(vcpu, 3, "inject: set prefix to %x (from user)",
  512. s390int->parm);
  513. break;
  514. case KVM_S390_SIGP_STOP:
  515. case KVM_S390_RESTART:
  516. case KVM_S390_INT_EMERGENCY:
  517. VCPU_EVENT(vcpu, 3, "inject: type %x", s390int->type);
  518. inti->type = s390int->type;
  519. break;
  520. case KVM_S390_INT_VIRTIO:
  521. case KVM_S390_INT_SERVICE:
  522. default:
  523. kfree(inti);
  524. return -EINVAL;
  525. }
  526. mutex_lock(&vcpu->kvm->lock);
  527. li = &vcpu->arch.local_int;
  528. spin_lock_bh(&li->lock);
  529. if (inti->type == KVM_S390_PROGRAM_INT)
  530. list_add(&inti->list, &li->list);
  531. else
  532. list_add_tail(&inti->list, &li->list);
  533. atomic_set(&li->active, 1);
  534. if (inti->type == KVM_S390_SIGP_STOP)
  535. li->action_bits |= ACTION_STOP_ON_STOP;
  536. atomic_set_mask(CPUSTAT_EXT_INT, li->cpuflags);
  537. if (waitqueue_active(&li->wq))
  538. wake_up_interruptible(&vcpu->arch.local_int.wq);
  539. spin_unlock_bh(&li->lock);
  540. mutex_unlock(&vcpu->kvm->lock);
  541. return 0;
  542. }