interrupt.c 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679
  1. /*
  2. * handling kvm guest interrupts
  3. *
  4. * Copyright IBM Corp. 2008
  5. *
  6. * This program is free software; you can redistribute it and/or modify
  7. * it under the terms of the GNU General Public License (version 2 only)
  8. * as published by the Free Software Foundation.
  9. *
  10. * Author(s): Carsten Otte <cotte@de.ibm.com>
  11. */
  12. #include <linux/interrupt.h>
  13. #include <linux/kvm_host.h>
  14. #include <linux/hrtimer.h>
  15. #include <linux/signal.h>
  16. #include <linux/slab.h>
  17. #include <asm/asm-offsets.h>
  18. #include <asm/uaccess.h>
  19. #include "kvm-s390.h"
  20. #include "gaccess.h"
  21. #include "trace-s390.h"
  22. static int psw_extint_disabled(struct kvm_vcpu *vcpu)
  23. {
  24. return !(vcpu->arch.sie_block->gpsw.mask & PSW_MASK_EXT);
  25. }
  26. static int psw_interrupts_disabled(struct kvm_vcpu *vcpu)
  27. {
  28. if ((vcpu->arch.sie_block->gpsw.mask & PSW_MASK_PER) ||
  29. (vcpu->arch.sie_block->gpsw.mask & PSW_MASK_IO) ||
  30. (vcpu->arch.sie_block->gpsw.mask & PSW_MASK_EXT))
  31. return 0;
  32. return 1;
  33. }
  34. static int __interrupt_is_deliverable(struct kvm_vcpu *vcpu,
  35. struct kvm_s390_interrupt_info *inti)
  36. {
  37. switch (inti->type) {
  38. case KVM_S390_INT_EXTERNAL_CALL:
  39. if (psw_extint_disabled(vcpu))
  40. return 0;
  41. if (vcpu->arch.sie_block->gcr[0] & 0x2000ul)
  42. return 1;
  43. case KVM_S390_INT_EMERGENCY:
  44. if (psw_extint_disabled(vcpu))
  45. return 0;
  46. if (vcpu->arch.sie_block->gcr[0] & 0x4000ul)
  47. return 1;
  48. return 0;
  49. case KVM_S390_INT_SERVICE:
  50. if (psw_extint_disabled(vcpu))
  51. return 0;
  52. if (vcpu->arch.sie_block->gcr[0] & 0x200ul)
  53. return 1;
  54. return 0;
  55. case KVM_S390_INT_VIRTIO:
  56. if (psw_extint_disabled(vcpu))
  57. return 0;
  58. if (vcpu->arch.sie_block->gcr[0] & 0x200ul)
  59. return 1;
  60. return 0;
  61. case KVM_S390_PROGRAM_INT:
  62. case KVM_S390_SIGP_STOP:
  63. case KVM_S390_SIGP_SET_PREFIX:
  64. case KVM_S390_RESTART:
  65. return 1;
  66. default:
  67. BUG();
  68. }
  69. return 0;
  70. }
  71. static void __set_cpu_idle(struct kvm_vcpu *vcpu)
  72. {
  73. BUG_ON(vcpu->vcpu_id > KVM_MAX_VCPUS - 1);
  74. atomic_set_mask(CPUSTAT_WAIT, &vcpu->arch.sie_block->cpuflags);
  75. set_bit(vcpu->vcpu_id, vcpu->arch.local_int.float_int->idle_mask);
  76. }
  77. static void __unset_cpu_idle(struct kvm_vcpu *vcpu)
  78. {
  79. BUG_ON(vcpu->vcpu_id > KVM_MAX_VCPUS - 1);
  80. atomic_clear_mask(CPUSTAT_WAIT, &vcpu->arch.sie_block->cpuflags);
  81. clear_bit(vcpu->vcpu_id, vcpu->arch.local_int.float_int->idle_mask);
  82. }
  83. static void __reset_intercept_indicators(struct kvm_vcpu *vcpu)
  84. {
  85. atomic_clear_mask(CPUSTAT_ECALL_PEND |
  86. CPUSTAT_IO_INT | CPUSTAT_EXT_INT | CPUSTAT_STOP_INT,
  87. &vcpu->arch.sie_block->cpuflags);
  88. vcpu->arch.sie_block->lctl = 0x0000;
  89. }
  90. static void __set_cpuflag(struct kvm_vcpu *vcpu, u32 flag)
  91. {
  92. atomic_set_mask(flag, &vcpu->arch.sie_block->cpuflags);
  93. }
  94. static void __set_intercept_indicator(struct kvm_vcpu *vcpu,
  95. struct kvm_s390_interrupt_info *inti)
  96. {
  97. switch (inti->type) {
  98. case KVM_S390_INT_EXTERNAL_CALL:
  99. case KVM_S390_INT_EMERGENCY:
  100. case KVM_S390_INT_SERVICE:
  101. case KVM_S390_INT_VIRTIO:
  102. if (psw_extint_disabled(vcpu))
  103. __set_cpuflag(vcpu, CPUSTAT_EXT_INT);
  104. else
  105. vcpu->arch.sie_block->lctl |= LCTL_CR0;
  106. break;
  107. case KVM_S390_SIGP_STOP:
  108. __set_cpuflag(vcpu, CPUSTAT_STOP_INT);
  109. break;
  110. default:
  111. BUG();
  112. }
  113. }
  114. static void __do_deliver_interrupt(struct kvm_vcpu *vcpu,
  115. struct kvm_s390_interrupt_info *inti)
  116. {
  117. const unsigned short table[] = { 2, 4, 4, 6 };
  118. int rc, exception = 0;
  119. switch (inti->type) {
  120. case KVM_S390_INT_EMERGENCY:
  121. VCPU_EVENT(vcpu, 4, "%s", "interrupt: sigp emerg");
  122. vcpu->stat.deliver_emergency_signal++;
  123. trace_kvm_s390_deliver_interrupt(vcpu->vcpu_id, inti->type,
  124. inti->emerg.code, 0);
  125. rc = put_guest_u16(vcpu, __LC_EXT_INT_CODE, 0x1201);
  126. if (rc == -EFAULT)
  127. exception = 1;
  128. rc = put_guest_u16(vcpu, __LC_EXT_CPU_ADDR, inti->emerg.code);
  129. if (rc == -EFAULT)
  130. exception = 1;
  131. rc = copy_to_guest(vcpu, __LC_EXT_OLD_PSW,
  132. &vcpu->arch.sie_block->gpsw, sizeof(psw_t));
  133. if (rc == -EFAULT)
  134. exception = 1;
  135. rc = copy_from_guest(vcpu, &vcpu->arch.sie_block->gpsw,
  136. __LC_EXT_NEW_PSW, sizeof(psw_t));
  137. if (rc == -EFAULT)
  138. exception = 1;
  139. break;
  140. case KVM_S390_INT_EXTERNAL_CALL:
  141. VCPU_EVENT(vcpu, 4, "%s", "interrupt: sigp ext call");
  142. vcpu->stat.deliver_external_call++;
  143. trace_kvm_s390_deliver_interrupt(vcpu->vcpu_id, inti->type,
  144. inti->extcall.code, 0);
  145. rc = put_guest_u16(vcpu, __LC_EXT_INT_CODE, 0x1202);
  146. if (rc == -EFAULT)
  147. exception = 1;
  148. rc = put_guest_u16(vcpu, __LC_EXT_CPU_ADDR, inti->extcall.code);
  149. if (rc == -EFAULT)
  150. exception = 1;
  151. rc = copy_to_guest(vcpu, __LC_EXT_OLD_PSW,
  152. &vcpu->arch.sie_block->gpsw, sizeof(psw_t));
  153. if (rc == -EFAULT)
  154. exception = 1;
  155. rc = copy_from_guest(vcpu, &vcpu->arch.sie_block->gpsw,
  156. __LC_EXT_NEW_PSW, sizeof(psw_t));
  157. if (rc == -EFAULT)
  158. exception = 1;
  159. break;
  160. case KVM_S390_INT_SERVICE:
  161. VCPU_EVENT(vcpu, 4, "interrupt: sclp parm:%x",
  162. inti->ext.ext_params);
  163. vcpu->stat.deliver_service_signal++;
  164. trace_kvm_s390_deliver_interrupt(vcpu->vcpu_id, inti->type,
  165. inti->ext.ext_params, 0);
  166. rc = put_guest_u16(vcpu, __LC_EXT_INT_CODE, 0x2401);
  167. if (rc == -EFAULT)
  168. exception = 1;
  169. rc = copy_to_guest(vcpu, __LC_EXT_OLD_PSW,
  170. &vcpu->arch.sie_block->gpsw, sizeof(psw_t));
  171. if (rc == -EFAULT)
  172. exception = 1;
  173. rc = copy_from_guest(vcpu, &vcpu->arch.sie_block->gpsw,
  174. __LC_EXT_NEW_PSW, sizeof(psw_t));
  175. if (rc == -EFAULT)
  176. exception = 1;
  177. rc = put_guest_u32(vcpu, __LC_EXT_PARAMS, inti->ext.ext_params);
  178. if (rc == -EFAULT)
  179. exception = 1;
  180. break;
  181. case KVM_S390_INT_VIRTIO:
  182. VCPU_EVENT(vcpu, 4, "interrupt: virtio parm:%x,parm64:%llx",
  183. inti->ext.ext_params, inti->ext.ext_params2);
  184. vcpu->stat.deliver_virtio_interrupt++;
  185. trace_kvm_s390_deliver_interrupt(vcpu->vcpu_id, inti->type,
  186. inti->ext.ext_params,
  187. inti->ext.ext_params2);
  188. rc = put_guest_u16(vcpu, __LC_EXT_INT_CODE, 0x2603);
  189. if (rc == -EFAULT)
  190. exception = 1;
  191. rc = put_guest_u16(vcpu, __LC_EXT_CPU_ADDR, 0x0d00);
  192. if (rc == -EFAULT)
  193. exception = 1;
  194. rc = copy_to_guest(vcpu, __LC_EXT_OLD_PSW,
  195. &vcpu->arch.sie_block->gpsw, sizeof(psw_t));
  196. if (rc == -EFAULT)
  197. exception = 1;
  198. rc = copy_from_guest(vcpu, &vcpu->arch.sie_block->gpsw,
  199. __LC_EXT_NEW_PSW, sizeof(psw_t));
  200. if (rc == -EFAULT)
  201. exception = 1;
  202. rc = put_guest_u32(vcpu, __LC_EXT_PARAMS, inti->ext.ext_params);
  203. if (rc == -EFAULT)
  204. exception = 1;
  205. rc = put_guest_u64(vcpu, __LC_EXT_PARAMS2,
  206. inti->ext.ext_params2);
  207. if (rc == -EFAULT)
  208. exception = 1;
  209. break;
  210. case KVM_S390_SIGP_STOP:
  211. VCPU_EVENT(vcpu, 4, "%s", "interrupt: cpu stop");
  212. vcpu->stat.deliver_stop_signal++;
  213. trace_kvm_s390_deliver_interrupt(vcpu->vcpu_id, inti->type,
  214. 0, 0);
  215. __set_intercept_indicator(vcpu, inti);
  216. break;
  217. case KVM_S390_SIGP_SET_PREFIX:
  218. VCPU_EVENT(vcpu, 4, "interrupt: set prefix to %x",
  219. inti->prefix.address);
  220. vcpu->stat.deliver_prefix_signal++;
  221. trace_kvm_s390_deliver_interrupt(vcpu->vcpu_id, inti->type,
  222. inti->prefix.address, 0);
  223. kvm_s390_set_prefix(vcpu, inti->prefix.address);
  224. break;
  225. case KVM_S390_RESTART:
  226. VCPU_EVENT(vcpu, 4, "%s", "interrupt: cpu restart");
  227. vcpu->stat.deliver_restart_signal++;
  228. trace_kvm_s390_deliver_interrupt(vcpu->vcpu_id, inti->type,
  229. 0, 0);
  230. rc = copy_to_guest(vcpu, offsetof(struct _lowcore,
  231. restart_old_psw), &vcpu->arch.sie_block->gpsw, sizeof(psw_t));
  232. if (rc == -EFAULT)
  233. exception = 1;
  234. rc = copy_from_guest(vcpu, &vcpu->arch.sie_block->gpsw,
  235. offsetof(struct _lowcore, restart_psw), sizeof(psw_t));
  236. if (rc == -EFAULT)
  237. exception = 1;
  238. atomic_clear_mask(CPUSTAT_STOPPED, &vcpu->arch.sie_block->cpuflags);
  239. break;
  240. case KVM_S390_PROGRAM_INT:
  241. VCPU_EVENT(vcpu, 4, "interrupt: pgm check code:%x, ilc:%x",
  242. inti->pgm.code,
  243. table[vcpu->arch.sie_block->ipa >> 14]);
  244. vcpu->stat.deliver_program_int++;
  245. trace_kvm_s390_deliver_interrupt(vcpu->vcpu_id, inti->type,
  246. inti->pgm.code, 0);
  247. rc = put_guest_u16(vcpu, __LC_PGM_INT_CODE, inti->pgm.code);
  248. if (rc == -EFAULT)
  249. exception = 1;
  250. rc = put_guest_u16(vcpu, __LC_PGM_ILC,
  251. table[vcpu->arch.sie_block->ipa >> 14]);
  252. if (rc == -EFAULT)
  253. exception = 1;
  254. rc = copy_to_guest(vcpu, __LC_PGM_OLD_PSW,
  255. &vcpu->arch.sie_block->gpsw, sizeof(psw_t));
  256. if (rc == -EFAULT)
  257. exception = 1;
  258. rc = copy_from_guest(vcpu, &vcpu->arch.sie_block->gpsw,
  259. __LC_PGM_NEW_PSW, sizeof(psw_t));
  260. if (rc == -EFAULT)
  261. exception = 1;
  262. break;
  263. default:
  264. BUG();
  265. }
  266. if (exception) {
  267. printk("kvm: The guest lowcore is not mapped during interrupt "
  268. "delivery, killing userspace\n");
  269. do_exit(SIGKILL);
  270. }
  271. }
  272. static int __try_deliver_ckc_interrupt(struct kvm_vcpu *vcpu)
  273. {
  274. int rc, exception = 0;
  275. if (psw_extint_disabled(vcpu))
  276. return 0;
  277. if (!(vcpu->arch.sie_block->gcr[0] & 0x800ul))
  278. return 0;
  279. rc = put_guest_u16(vcpu, __LC_EXT_INT_CODE, 0x1004);
  280. if (rc == -EFAULT)
  281. exception = 1;
  282. rc = copy_to_guest(vcpu, __LC_EXT_OLD_PSW,
  283. &vcpu->arch.sie_block->gpsw, sizeof(psw_t));
  284. if (rc == -EFAULT)
  285. exception = 1;
  286. rc = copy_from_guest(vcpu, &vcpu->arch.sie_block->gpsw,
  287. __LC_EXT_NEW_PSW, sizeof(psw_t));
  288. if (rc == -EFAULT)
  289. exception = 1;
  290. if (exception) {
  291. printk("kvm: The guest lowcore is not mapped during interrupt "
  292. "delivery, killing userspace\n");
  293. do_exit(SIGKILL);
  294. }
  295. return 1;
  296. }
  297. static int kvm_cpu_has_interrupt(struct kvm_vcpu *vcpu)
  298. {
  299. struct kvm_s390_local_interrupt *li = &vcpu->arch.local_int;
  300. struct kvm_s390_float_interrupt *fi = vcpu->arch.local_int.float_int;
  301. struct kvm_s390_interrupt_info *inti;
  302. int rc = 0;
  303. if (atomic_read(&li->active)) {
  304. spin_lock_bh(&li->lock);
  305. list_for_each_entry(inti, &li->list, list)
  306. if (__interrupt_is_deliverable(vcpu, inti)) {
  307. rc = 1;
  308. break;
  309. }
  310. spin_unlock_bh(&li->lock);
  311. }
  312. if ((!rc) && atomic_read(&fi->active)) {
  313. spin_lock(&fi->lock);
  314. list_for_each_entry(inti, &fi->list, list)
  315. if (__interrupt_is_deliverable(vcpu, inti)) {
  316. rc = 1;
  317. break;
  318. }
  319. spin_unlock(&fi->lock);
  320. }
  321. if ((!rc) && (vcpu->arch.sie_block->ckc <
  322. get_clock() + vcpu->arch.sie_block->epoch)) {
  323. if ((!psw_extint_disabled(vcpu)) &&
  324. (vcpu->arch.sie_block->gcr[0] & 0x800ul))
  325. rc = 1;
  326. }
  327. return rc;
  328. }
  329. int kvm_cpu_has_pending_timer(struct kvm_vcpu *vcpu)
  330. {
  331. return 0;
  332. }
  333. int kvm_s390_handle_wait(struct kvm_vcpu *vcpu)
  334. {
  335. u64 now, sltime;
  336. DECLARE_WAITQUEUE(wait, current);
  337. vcpu->stat.exit_wait_state++;
  338. if (kvm_cpu_has_interrupt(vcpu))
  339. return 0;
  340. __set_cpu_idle(vcpu);
  341. spin_lock_bh(&vcpu->arch.local_int.lock);
  342. vcpu->arch.local_int.timer_due = 0;
  343. spin_unlock_bh(&vcpu->arch.local_int.lock);
  344. if (psw_interrupts_disabled(vcpu)) {
  345. VCPU_EVENT(vcpu, 3, "%s", "disabled wait");
  346. __unset_cpu_idle(vcpu);
  347. return -EOPNOTSUPP; /* disabled wait */
  348. }
  349. if (psw_extint_disabled(vcpu) ||
  350. (!(vcpu->arch.sie_block->gcr[0] & 0x800ul))) {
  351. VCPU_EVENT(vcpu, 3, "%s", "enabled wait w/o timer");
  352. goto no_timer;
  353. }
  354. now = get_clock() + vcpu->arch.sie_block->epoch;
  355. if (vcpu->arch.sie_block->ckc < now) {
  356. __unset_cpu_idle(vcpu);
  357. return 0;
  358. }
  359. sltime = ((vcpu->arch.sie_block->ckc - now)*125)>>9;
  360. hrtimer_start(&vcpu->arch.ckc_timer, ktime_set (0, sltime) , HRTIMER_MODE_REL);
  361. VCPU_EVENT(vcpu, 5, "enabled wait via clock comparator: %llx ns", sltime);
  362. no_timer:
  363. spin_lock(&vcpu->arch.local_int.float_int->lock);
  364. spin_lock_bh(&vcpu->arch.local_int.lock);
  365. add_wait_queue(&vcpu->arch.local_int.wq, &wait);
  366. while (list_empty(&vcpu->arch.local_int.list) &&
  367. list_empty(&vcpu->arch.local_int.float_int->list) &&
  368. (!vcpu->arch.local_int.timer_due) &&
  369. !signal_pending(current)) {
  370. set_current_state(TASK_INTERRUPTIBLE);
  371. spin_unlock_bh(&vcpu->arch.local_int.lock);
  372. spin_unlock(&vcpu->arch.local_int.float_int->lock);
  373. schedule();
  374. spin_lock(&vcpu->arch.local_int.float_int->lock);
  375. spin_lock_bh(&vcpu->arch.local_int.lock);
  376. }
  377. __unset_cpu_idle(vcpu);
  378. __set_current_state(TASK_RUNNING);
  379. remove_wait_queue(&vcpu->arch.local_int.wq, &wait);
  380. spin_unlock_bh(&vcpu->arch.local_int.lock);
  381. spin_unlock(&vcpu->arch.local_int.float_int->lock);
  382. hrtimer_try_to_cancel(&vcpu->arch.ckc_timer);
  383. return 0;
  384. }
  385. void kvm_s390_tasklet(unsigned long parm)
  386. {
  387. struct kvm_vcpu *vcpu = (struct kvm_vcpu *) parm;
  388. spin_lock(&vcpu->arch.local_int.lock);
  389. vcpu->arch.local_int.timer_due = 1;
  390. if (waitqueue_active(&vcpu->arch.local_int.wq))
  391. wake_up_interruptible(&vcpu->arch.local_int.wq);
  392. spin_unlock(&vcpu->arch.local_int.lock);
  393. }
  394. /*
  395. * low level hrtimer wake routine. Because this runs in hardirq context
  396. * we schedule a tasklet to do the real work.
  397. */
  398. enum hrtimer_restart kvm_s390_idle_wakeup(struct hrtimer *timer)
  399. {
  400. struct kvm_vcpu *vcpu;
  401. vcpu = container_of(timer, struct kvm_vcpu, arch.ckc_timer);
  402. tasklet_schedule(&vcpu->arch.tasklet);
  403. return HRTIMER_NORESTART;
  404. }
  405. void kvm_s390_deliver_pending_interrupts(struct kvm_vcpu *vcpu)
  406. {
  407. struct kvm_s390_local_interrupt *li = &vcpu->arch.local_int;
  408. struct kvm_s390_float_interrupt *fi = vcpu->arch.local_int.float_int;
  409. struct kvm_s390_interrupt_info *n, *inti = NULL;
  410. int deliver;
  411. __reset_intercept_indicators(vcpu);
  412. if (atomic_read(&li->active)) {
  413. do {
  414. deliver = 0;
  415. spin_lock_bh(&li->lock);
  416. list_for_each_entry_safe(inti, n, &li->list, list) {
  417. if (__interrupt_is_deliverable(vcpu, inti)) {
  418. list_del(&inti->list);
  419. deliver = 1;
  420. break;
  421. }
  422. __set_intercept_indicator(vcpu, inti);
  423. }
  424. if (list_empty(&li->list))
  425. atomic_set(&li->active, 0);
  426. spin_unlock_bh(&li->lock);
  427. if (deliver) {
  428. __do_deliver_interrupt(vcpu, inti);
  429. kfree(inti);
  430. }
  431. } while (deliver);
  432. }
  433. if ((vcpu->arch.sie_block->ckc <
  434. get_clock() + vcpu->arch.sie_block->epoch))
  435. __try_deliver_ckc_interrupt(vcpu);
  436. if (atomic_read(&fi->active)) {
  437. do {
  438. deliver = 0;
  439. spin_lock(&fi->lock);
  440. list_for_each_entry_safe(inti, n, &fi->list, list) {
  441. if (__interrupt_is_deliverable(vcpu, inti)) {
  442. list_del(&inti->list);
  443. deliver = 1;
  444. break;
  445. }
  446. __set_intercept_indicator(vcpu, inti);
  447. }
  448. if (list_empty(&fi->list))
  449. atomic_set(&fi->active, 0);
  450. spin_unlock(&fi->lock);
  451. if (deliver) {
  452. __do_deliver_interrupt(vcpu, inti);
  453. kfree(inti);
  454. }
  455. } while (deliver);
  456. }
  457. }
  458. int kvm_s390_inject_program_int(struct kvm_vcpu *vcpu, u16 code)
  459. {
  460. struct kvm_s390_local_interrupt *li = &vcpu->arch.local_int;
  461. struct kvm_s390_interrupt_info *inti;
  462. inti = kzalloc(sizeof(*inti), GFP_KERNEL);
  463. if (!inti)
  464. return -ENOMEM;
  465. inti->type = KVM_S390_PROGRAM_INT;
  466. inti->pgm.code = code;
  467. VCPU_EVENT(vcpu, 3, "inject: program check %d (from kernel)", code);
  468. trace_kvm_s390_inject_vcpu(vcpu->vcpu_id, inti->type, code, 0, 1);
  469. spin_lock_bh(&li->lock);
  470. list_add(&inti->list, &li->list);
  471. atomic_set(&li->active, 1);
  472. BUG_ON(waitqueue_active(&li->wq));
  473. spin_unlock_bh(&li->lock);
  474. return 0;
  475. }
  476. int kvm_s390_inject_vm(struct kvm *kvm,
  477. struct kvm_s390_interrupt *s390int)
  478. {
  479. struct kvm_s390_local_interrupt *li;
  480. struct kvm_s390_float_interrupt *fi;
  481. struct kvm_s390_interrupt_info *inti;
  482. int sigcpu;
  483. inti = kzalloc(sizeof(*inti), GFP_KERNEL);
  484. if (!inti)
  485. return -ENOMEM;
  486. switch (s390int->type) {
  487. case KVM_S390_INT_VIRTIO:
  488. VM_EVENT(kvm, 5, "inject: virtio parm:%x,parm64:%llx",
  489. s390int->parm, s390int->parm64);
  490. inti->type = s390int->type;
  491. inti->ext.ext_params = s390int->parm;
  492. inti->ext.ext_params2 = s390int->parm64;
  493. break;
  494. case KVM_S390_INT_SERVICE:
  495. VM_EVENT(kvm, 5, "inject: sclp parm:%x", s390int->parm);
  496. inti->type = s390int->type;
  497. inti->ext.ext_params = s390int->parm;
  498. break;
  499. case KVM_S390_PROGRAM_INT:
  500. case KVM_S390_SIGP_STOP:
  501. case KVM_S390_INT_EXTERNAL_CALL:
  502. case KVM_S390_INT_EMERGENCY:
  503. default:
  504. kfree(inti);
  505. return -EINVAL;
  506. }
  507. trace_kvm_s390_inject_vm(s390int->type, s390int->parm, s390int->parm64,
  508. 2);
  509. mutex_lock(&kvm->lock);
  510. fi = &kvm->arch.float_int;
  511. spin_lock(&fi->lock);
  512. list_add_tail(&inti->list, &fi->list);
  513. atomic_set(&fi->active, 1);
  514. sigcpu = find_first_bit(fi->idle_mask, KVM_MAX_VCPUS);
  515. if (sigcpu == KVM_MAX_VCPUS) {
  516. do {
  517. sigcpu = fi->next_rr_cpu++;
  518. if (sigcpu == KVM_MAX_VCPUS)
  519. sigcpu = fi->next_rr_cpu = 0;
  520. } while (fi->local_int[sigcpu] == NULL);
  521. }
  522. li = fi->local_int[sigcpu];
  523. spin_lock_bh(&li->lock);
  524. atomic_set_mask(CPUSTAT_EXT_INT, li->cpuflags);
  525. if (waitqueue_active(&li->wq))
  526. wake_up_interruptible(&li->wq);
  527. spin_unlock_bh(&li->lock);
  528. spin_unlock(&fi->lock);
  529. mutex_unlock(&kvm->lock);
  530. return 0;
  531. }
  532. int kvm_s390_inject_vcpu(struct kvm_vcpu *vcpu,
  533. struct kvm_s390_interrupt *s390int)
  534. {
  535. struct kvm_s390_local_interrupt *li;
  536. struct kvm_s390_interrupt_info *inti;
  537. inti = kzalloc(sizeof(*inti), GFP_KERNEL);
  538. if (!inti)
  539. return -ENOMEM;
  540. switch (s390int->type) {
  541. case KVM_S390_PROGRAM_INT:
  542. if (s390int->parm & 0xffff0000) {
  543. kfree(inti);
  544. return -EINVAL;
  545. }
  546. inti->type = s390int->type;
  547. inti->pgm.code = s390int->parm;
  548. VCPU_EVENT(vcpu, 3, "inject: program check %d (from user)",
  549. s390int->parm);
  550. break;
  551. case KVM_S390_SIGP_SET_PREFIX:
  552. inti->prefix.address = s390int->parm;
  553. inti->type = s390int->type;
  554. VCPU_EVENT(vcpu, 3, "inject: set prefix to %x (from user)",
  555. s390int->parm);
  556. break;
  557. case KVM_S390_SIGP_STOP:
  558. case KVM_S390_RESTART:
  559. VCPU_EVENT(vcpu, 3, "inject: type %x", s390int->type);
  560. inti->type = s390int->type;
  561. break;
  562. case KVM_S390_INT_EXTERNAL_CALL:
  563. if (s390int->parm & 0xffff0000) {
  564. kfree(inti);
  565. return -EINVAL;
  566. }
  567. VCPU_EVENT(vcpu, 3, "inject: external call source-cpu:%u",
  568. s390int->parm);
  569. inti->type = s390int->type;
  570. inti->extcall.code = s390int->parm;
  571. break;
  572. case KVM_S390_INT_EMERGENCY:
  573. if (s390int->parm & 0xffff0000) {
  574. kfree(inti);
  575. return -EINVAL;
  576. }
  577. VCPU_EVENT(vcpu, 3, "inject: emergency %u\n", s390int->parm);
  578. inti->type = s390int->type;
  579. inti->emerg.code = s390int->parm;
  580. break;
  581. case KVM_S390_INT_VIRTIO:
  582. case KVM_S390_INT_SERVICE:
  583. default:
  584. kfree(inti);
  585. return -EINVAL;
  586. }
  587. trace_kvm_s390_inject_vcpu(vcpu->vcpu_id, s390int->type, s390int->parm,
  588. s390int->parm64, 2);
  589. mutex_lock(&vcpu->kvm->lock);
  590. li = &vcpu->arch.local_int;
  591. spin_lock_bh(&li->lock);
  592. if (inti->type == KVM_S390_PROGRAM_INT)
  593. list_add(&inti->list, &li->list);
  594. else
  595. list_add_tail(&inti->list, &li->list);
  596. atomic_set(&li->active, 1);
  597. if (inti->type == KVM_S390_SIGP_STOP)
  598. li->action_bits |= ACTION_STOP_ON_STOP;
  599. atomic_set_mask(CPUSTAT_EXT_INT, li->cpuflags);
  600. if (waitqueue_active(&li->wq))
  601. wake_up_interruptible(&vcpu->arch.local_int.wq);
  602. spin_unlock_bh(&li->lock);
  603. mutex_unlock(&vcpu->kvm->lock);
  604. return 0;
  605. }