2017-11-24 17:00:33 +03:00
|
|
|
// SPDX-License-Identifier: GPL-2.0
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
/*
|
2012-07-20 13:15:04 +04:00
|
|
|
* handling kvm guest interrupts
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
*
|
2015-02-11 12:38:46 +03:00
|
|
|
* Copyright IBM Corp. 2008, 2015
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
*
|
|
|
|
* Author(s): Carsten Otte <cotte@de.ibm.com>
|
|
|
|
*/
|
|
|
|
|
2019-01-31 11:52:40 +03:00
|
|
|
#define KMSG_COMPONENT "kvm-s390"
|
|
|
|
#define pr_fmt(fmt) KMSG_COMPONENT ": " fmt
|
|
|
|
|
2009-05-12 19:21:49 +04:00
|
|
|
#include <linux/interrupt.h>
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
#include <linux/kvm_host.h>
|
2010-02-27 00:37:43 +03:00
|
|
|
#include <linux/hrtimer.h>
|
2013-07-15 15:36:01 +04:00
|
|
|
#include <linux/mmu_context.h>
|
2019-04-17 03:54:14 +03:00
|
|
|
#include <linux/nospec.h>
|
2008-07-25 17:51:54 +04:00
|
|
|
#include <linux/signal.h>
|
include cleanup: Update gfp.h and slab.h includes to prepare for breaking implicit slab.h inclusion from percpu.h
percpu.h is included by sched.h and module.h and thus ends up being
included when building most .c files. percpu.h includes slab.h which
in turn includes gfp.h making everything defined by the two files
universally available and complicating inclusion dependencies.
percpu.h -> slab.h dependency is about to be removed. Prepare for
this change by updating users of gfp and slab facilities include those
headers directly instead of assuming availability. As this conversion
needs to touch large number of source files, the following script is
used as the basis of conversion.
http://userweb.kernel.org/~tj/misc/slabh-sweep.py
The script does the followings.
* Scan files for gfp and slab usages and update includes such that
only the necessary includes are there. ie. if only gfp is used,
gfp.h, if slab is used, slab.h.
* When the script inserts a new include, it looks at the include
blocks and try to put the new include such that its order conforms
to its surrounding. It's put in the include block which contains
core kernel includes, in the same order that the rest are ordered -
alphabetical, Christmas tree, rev-Xmas-tree or at the end if there
doesn't seem to be any matching order.
* If the script can't find a place to put a new include (mostly
because the file doesn't have fitting include block), it prints out
an error message indicating which .h file needs to be added to the
file.
The conversion was done in the following steps.
1. The initial automatic conversion of all .c files updated slightly
over 4000 files, deleting around 700 includes and adding ~480 gfp.h
and ~3000 slab.h inclusions. The script emitted errors for ~400
files.
2. Each error was manually checked. Some didn't need the inclusion,
some needed manual addition while adding it to implementation .h or
embedding .c file was more appropriate for others. This step added
inclusions to around 150 files.
3. The script was run again and the output was compared to the edits
from #2 to make sure no file was left behind.
4. Several build tests were done and a couple of problems were fixed.
e.g. lib/decompress_*.c used malloc/free() wrappers around slab
APIs requiring slab.h to be added manually.
5. The script was run on all .h files but without automatically
editing them as sprinkling gfp.h and slab.h inclusions around .h
files could easily lead to inclusion dependency hell. Most gfp.h
inclusion directives were ignored as stuff from gfp.h was usually
wildly available and often used in preprocessor macros. Each
slab.h inclusion directive was examined and added manually as
necessary.
6. percpu.h was updated not to include slab.h.
7. Build test were done on the following configurations and failures
were fixed. CONFIG_GCOV_KERNEL was turned off for all tests (as my
distributed build env didn't work with gcov compiles) and a few
more options had to be turned off depending on archs to make things
build (like ipr on powerpc/64 which failed due to missing writeq).
* x86 and x86_64 UP and SMP allmodconfig and a custom test config.
* powerpc and powerpc64 SMP allmodconfig
* sparc and sparc64 SMP allmodconfig
* ia64 SMP allmodconfig
* s390 SMP allmodconfig
* alpha SMP allmodconfig
* um on x86_64 SMP allmodconfig
8. percpu.h modifications were reverted so that it could be applied as
a separate patch and serve as bisection point.
Given the fact that I had only a couple of failures from tests on step
6, I'm fairly confident about the coverage of this conversion patch.
If there is a breakage, it's likely to be something in one of the arch
headers which should be easily discoverable easily on most builds of
the specific arch.
Signed-off-by: Tejun Heo <tj@kernel.org>
Guess-its-ok-by: Christoph Lameter <cl@linux-foundation.org>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: Lee Schermerhorn <Lee.Schermerhorn@hp.com>
2010-03-24 11:04:11 +03:00
|
|
|
#include <linux/slab.h>
|
2014-07-29 17:11:49 +04:00
|
|
|
#include <linux/bitmap.h>
|
2015-03-16 14:17:13 +03:00
|
|
|
#include <linux/vmalloc.h>
|
2010-02-27 00:37:43 +03:00
|
|
|
#include <asm/asm-offsets.h>
|
2015-02-11 12:38:46 +03:00
|
|
|
#include <asm/dis.h>
|
2016-12-24 22:46:01 +03:00
|
|
|
#include <linux/uaccess.h>
|
2014-10-14 17:29:30 +04:00
|
|
|
#include <asm/sclp.h>
|
2013-07-03 17:18:35 +04:00
|
|
|
#include <asm/isc.h>
|
2016-03-08 13:49:57 +03:00
|
|
|
#include <asm/gmap.h>
|
2016-08-03 12:18:57 +03:00
|
|
|
#include <asm/switch_to.h>
|
2015-10-14 17:57:56 +03:00
|
|
|
#include <asm/nmi.h>
|
2019-01-31 11:52:44 +03:00
|
|
|
#include <asm/airq.h>
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
#include "kvm-s390.h"
|
|
|
|
#include "gaccess.h"
|
2012-07-23 19:20:30 +04:00
|
|
|
#include "trace-s390.h"
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
|
2014-04-16 15:57:18 +04:00
|
|
|
#define PFAULT_INIT 0x0600
|
2014-11-10 19:20:07 +03:00
|
|
|
#define PFAULT_DONE 0x0680
|
|
|
|
#define VIRTIO_PARAM 0x0d00
|
2012-12-20 18:32:08 +04:00
|
|
|
|
2019-01-31 11:52:40 +03:00
|
|
|
static struct kvm_s390_gib *gib;
|
|
|
|
|
2015-04-21 16:10:10 +03:00
|
|
|
/* handle external calls via sigp interpretation facility */
|
|
|
|
static int sca_ext_call_pending(struct kvm_vcpu *vcpu, int *src_id)
|
|
|
|
{
|
2015-04-22 18:09:44 +03:00
|
|
|
int c, scn;
|
|
|
|
|
2018-01-23 20:05:31 +03:00
|
|
|
if (!kvm_s390_test_cpuflags(vcpu, CPUSTAT_ECALL_PEND))
|
2015-09-23 10:45:50 +03:00
|
|
|
return 0;
|
|
|
|
|
2016-08-08 23:39:32 +03:00
|
|
|
BUG_ON(!kvm_s390_use_sca_entries());
|
2015-04-22 19:08:39 +03:00
|
|
|
read_lock(&vcpu->kvm->arch.sca_lock);
|
2015-04-22 18:09:44 +03:00
|
|
|
if (vcpu->kvm->arch.use_esca) {
|
|
|
|
struct esca_block *sca = vcpu->kvm->arch.sca;
|
|
|
|
union esca_sigp_ctrl sigp_ctrl =
|
|
|
|
sca->cpu[vcpu->vcpu_id].sigp_ctrl;
|
|
|
|
|
|
|
|
c = sigp_ctrl.c;
|
|
|
|
scn = sigp_ctrl.scn;
|
|
|
|
} else {
|
|
|
|
struct bsca_block *sca = vcpu->kvm->arch.sca;
|
|
|
|
union bsca_sigp_ctrl sigp_ctrl =
|
|
|
|
sca->cpu[vcpu->vcpu_id].sigp_ctrl;
|
|
|
|
|
|
|
|
c = sigp_ctrl.c;
|
|
|
|
scn = sigp_ctrl.scn;
|
|
|
|
}
|
2015-04-22 19:08:39 +03:00
|
|
|
read_unlock(&vcpu->kvm->arch.sca_lock);
|
2015-04-21 16:10:10 +03:00
|
|
|
|
|
|
|
if (src_id)
|
2015-04-22 18:09:44 +03:00
|
|
|
*src_id = scn;
|
2015-04-21 16:10:10 +03:00
|
|
|
|
2015-09-23 10:45:50 +03:00
|
|
|
return c;
|
2015-04-21 16:10:10 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
static int sca_inject_ext_call(struct kvm_vcpu *vcpu, int src_id)
|
|
|
|
{
|
2015-04-23 17:09:06 +03:00
|
|
|
int expect, rc;
|
2015-04-21 16:10:10 +03:00
|
|
|
|
2016-08-08 23:39:32 +03:00
|
|
|
BUG_ON(!kvm_s390_use_sca_entries());
|
2015-04-22 19:08:39 +03:00
|
|
|
read_lock(&vcpu->kvm->arch.sca_lock);
|
2015-04-22 18:09:44 +03:00
|
|
|
if (vcpu->kvm->arch.use_esca) {
|
|
|
|
struct esca_block *sca = vcpu->kvm->arch.sca;
|
|
|
|
union esca_sigp_ctrl *sigp_ctrl =
|
|
|
|
&(sca->cpu[vcpu->vcpu_id].sigp_ctrl);
|
|
|
|
union esca_sigp_ctrl new_val = {0}, old_val = *sigp_ctrl;
|
|
|
|
|
|
|
|
new_val.scn = src_id;
|
|
|
|
new_val.c = 1;
|
|
|
|
old_val.c = 0;
|
|
|
|
|
|
|
|
expect = old_val.value;
|
|
|
|
rc = cmpxchg(&sigp_ctrl->value, old_val.value, new_val.value);
|
|
|
|
} else {
|
|
|
|
struct bsca_block *sca = vcpu->kvm->arch.sca;
|
|
|
|
union bsca_sigp_ctrl *sigp_ctrl =
|
|
|
|
&(sca->cpu[vcpu->vcpu_id].sigp_ctrl);
|
|
|
|
union bsca_sigp_ctrl new_val = {0}, old_val = *sigp_ctrl;
|
2015-04-23 17:09:06 +03:00
|
|
|
|
2015-04-22 18:09:44 +03:00
|
|
|
new_val.scn = src_id;
|
|
|
|
new_val.c = 1;
|
|
|
|
old_val.c = 0;
|
|
|
|
|
|
|
|
expect = old_val.value;
|
|
|
|
rc = cmpxchg(&sigp_ctrl->value, old_val.value, new_val.value);
|
|
|
|
}
|
2015-04-22 19:08:39 +03:00
|
|
|
read_unlock(&vcpu->kvm->arch.sca_lock);
|
2015-04-23 17:09:06 +03:00
|
|
|
|
|
|
|
if (rc != expect) {
|
2015-04-21 16:10:10 +03:00
|
|
|
/* another external call is pending */
|
|
|
|
return -EBUSY;
|
|
|
|
}
|
2018-01-23 20:05:29 +03:00
|
|
|
kvm_s390_set_cpuflags(vcpu, CPUSTAT_ECALL_PEND);
|
2015-04-21 16:10:10 +03:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void sca_clear_ext_call(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
2015-04-22 18:09:44 +03:00
|
|
|
int rc, expect;
|
2015-04-21 16:10:10 +03:00
|
|
|
|
2016-08-08 23:39:32 +03:00
|
|
|
if (!kvm_s390_use_sca_entries())
|
|
|
|
return;
|
2018-01-23 20:05:30 +03:00
|
|
|
kvm_s390_clear_cpuflags(vcpu, CPUSTAT_ECALL_PEND);
|
2015-04-22 19:08:39 +03:00
|
|
|
read_lock(&vcpu->kvm->arch.sca_lock);
|
2015-04-22 18:09:44 +03:00
|
|
|
if (vcpu->kvm->arch.use_esca) {
|
|
|
|
struct esca_block *sca = vcpu->kvm->arch.sca;
|
|
|
|
union esca_sigp_ctrl *sigp_ctrl =
|
|
|
|
&(sca->cpu[vcpu->vcpu_id].sigp_ctrl);
|
|
|
|
union esca_sigp_ctrl old = *sigp_ctrl;
|
|
|
|
|
|
|
|
expect = old.value;
|
|
|
|
rc = cmpxchg(&sigp_ctrl->value, old.value, 0);
|
|
|
|
} else {
|
|
|
|
struct bsca_block *sca = vcpu->kvm->arch.sca;
|
|
|
|
union bsca_sigp_ctrl *sigp_ctrl =
|
|
|
|
&(sca->cpu[vcpu->vcpu_id].sigp_ctrl);
|
|
|
|
union bsca_sigp_ctrl old = *sigp_ctrl;
|
|
|
|
|
|
|
|
expect = old.value;
|
|
|
|
rc = cmpxchg(&sigp_ctrl->value, old.value, 0);
|
|
|
|
}
|
2015-04-22 19:08:39 +03:00
|
|
|
read_unlock(&vcpu->kvm->arch.sca_lock);
|
2015-04-22 18:09:44 +03:00
|
|
|
WARN_ON(rc != expect); /* cannot clear? */
|
2015-04-21 16:10:10 +03:00
|
|
|
}
|
|
|
|
|
2013-10-07 19:11:48 +04:00
|
|
|
int psw_extint_disabled(struct kvm_vcpu *vcpu)
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
{
|
|
|
|
return !(vcpu->arch.sie_block->gpsw.mask & PSW_MASK_EXT);
|
|
|
|
}
|
|
|
|
|
2012-12-20 18:32:08 +04:00
|
|
|
static int psw_ioint_disabled(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
return !(vcpu->arch.sie_block->gpsw.mask & PSW_MASK_IO);
|
|
|
|
}
|
|
|
|
|
2012-12-20 18:32:09 +04:00
|
|
|
static int psw_mchk_disabled(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
return !(vcpu->arch.sie_block->gpsw.mask & PSW_MASK_MCHECK);
|
|
|
|
}
|
|
|
|
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
static int psw_interrupts_disabled(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
2015-09-28 14:32:38 +03:00
|
|
|
return psw_extint_disabled(vcpu) &&
|
|
|
|
psw_ioint_disabled(vcpu) &&
|
|
|
|
psw_mchk_disabled(vcpu);
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
}
|
|
|
|
|
2014-03-18 13:03:26 +04:00
|
|
|
static int ckc_interrupts_enabled(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
if (psw_extint_disabled(vcpu) ||
|
2018-04-30 18:55:24 +03:00
|
|
|
!(vcpu->arch.sie_block->gcr[0] & CR0_CLOCK_COMPARATOR_SUBMASK))
|
2014-03-18 13:03:26 +04:00
|
|
|
return 0;
|
2014-03-18 13:06:14 +04:00
|
|
|
if (guestdbg_enabled(vcpu) && guestdbg_sstep_enabled(vcpu))
|
|
|
|
/* No timer interrupts when single stepping */
|
|
|
|
return 0;
|
2014-03-18 13:03:26 +04:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2014-12-01 17:55:42 +03:00
|
|
|
static int ckc_irq_pending(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
2018-02-07 14:46:42 +03:00
|
|
|
const u64 now = kvm_s390_get_tod_clock_fast(vcpu->kvm);
|
|
|
|
const u64 ckc = vcpu->arch.sie_block->ckc;
|
|
|
|
|
2018-04-30 18:55:24 +03:00
|
|
|
if (vcpu->arch.sie_block->gcr[0] & CR0_CLOCK_COMPARATOR_SIGN) {
|
2018-02-07 14:46:42 +03:00
|
|
|
if ((s64)ckc >= (s64)now)
|
|
|
|
return 0;
|
|
|
|
} else if (ckc >= now) {
|
2014-12-01 17:55:42 +03:00
|
|
|
return 0;
|
2018-02-07 14:46:42 +03:00
|
|
|
}
|
2014-12-01 17:55:42 +03:00
|
|
|
return ckc_interrupts_enabled(vcpu);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int cpu_timer_interrupts_enabled(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
return !psw_extint_disabled(vcpu) &&
|
2018-04-30 18:55:24 +03:00
|
|
|
(vcpu->arch.sie_block->gcr[0] & CR0_CPU_TIMER_SUBMASK);
|
2014-12-01 17:55:42 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
static int cpu_timer_irq_pending(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
2016-02-15 11:40:12 +03:00
|
|
|
if (!cpu_timer_interrupts_enabled(vcpu))
|
|
|
|
return 0;
|
|
|
|
return kvm_s390_get_cpu_timer(vcpu) >> 63;
|
2014-12-01 17:55:42 +03:00
|
|
|
}
|
|
|
|
|
2013-07-03 17:18:35 +04:00
|
|
|
static uint64_t isc_to_isc_bits(int isc)
|
|
|
|
{
|
2013-02-07 16:20:52 +04:00
|
|
|
return (0x80 >> isc) << 24;
|
|
|
|
}
|
|
|
|
|
2017-08-31 12:10:28 +03:00
|
|
|
static inline u32 isc_to_int_word(u8 isc)
|
|
|
|
{
|
|
|
|
return ((u32)isc << 27) | 0x80000000;
|
|
|
|
}
|
|
|
|
|
2013-07-03 17:18:35 +04:00
|
|
|
static inline u8 int_word_to_isc(u32 int_word)
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
{
|
2013-07-03 17:18:35 +04:00
|
|
|
return (int_word & 0x38000000) >> 27;
|
|
|
|
}
|
|
|
|
|
2017-06-12 13:37:57 +03:00
|
|
|
/*
|
|
|
|
* To use atomic bitmap functions, we have to provide a bitmap address
|
|
|
|
* that is u64 aligned. However, the ipm might be u32 aligned.
|
|
|
|
* Therefore, we logically start the bitmap at the very beginning of the
|
|
|
|
* struct and fixup the bit number.
|
|
|
|
*/
|
|
|
|
#define IPM_BIT_OFFSET (offsetof(struct kvm_s390_gisa, ipm) * BITS_PER_BYTE)
|
|
|
|
|
2019-01-31 11:52:42 +03:00
|
|
|
/**
|
|
|
|
* gisa_set_iam - change the GISA interruption alert mask
|
|
|
|
*
|
|
|
|
* @gisa: gisa to operate on
|
|
|
|
* @iam: new IAM value to use
|
|
|
|
*
|
|
|
|
* Change the IAM atomically with the next alert address and the IPM
|
|
|
|
* of the GISA if the GISA is not part of the GIB alert list. All three
|
|
|
|
* fields are located in the first long word of the GISA.
|
|
|
|
*
|
|
|
|
* Returns: 0 on success
|
|
|
|
* -EBUSY in case the gisa is part of the alert list
|
|
|
|
*/
|
|
|
|
static inline int gisa_set_iam(struct kvm_s390_gisa *gisa, u8 iam)
|
|
|
|
{
|
|
|
|
u64 word, _word;
|
|
|
|
|
|
|
|
do {
|
|
|
|
word = READ_ONCE(gisa->u64.word[0]);
|
|
|
|
if ((u64)gisa != word >> 32)
|
|
|
|
return -EBUSY;
|
|
|
|
_word = (word & ~0xffUL) | iam;
|
|
|
|
} while (cmpxchg(&gisa->u64.word[0], word, _word) != word);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-01-31 11:52:43 +03:00
|
|
|
/**
|
|
|
|
* gisa_clear_ipm - clear the GISA interruption pending mask
|
|
|
|
*
|
|
|
|
* @gisa: gisa to operate on
|
|
|
|
*
|
|
|
|
* Clear the IPM atomically with the next alert address and the IAM
|
|
|
|
* of the GISA unconditionally. All three fields are located in the
|
|
|
|
* first long word of the GISA.
|
|
|
|
*/
|
|
|
|
static inline void gisa_clear_ipm(struct kvm_s390_gisa *gisa)
|
|
|
|
{
|
|
|
|
u64 word, _word;
|
|
|
|
|
|
|
|
do {
|
|
|
|
word = READ_ONCE(gisa->u64.word[0]);
|
|
|
|
_word = word & ~(0xffUL << 24);
|
|
|
|
} while (cmpxchg(&gisa->u64.word[0], word, _word) != word);
|
|
|
|
}
|
|
|
|
|
2019-01-31 11:52:44 +03:00
|
|
|
/**
|
|
|
|
* gisa_get_ipm_or_restore_iam - return IPM or restore GISA IAM
|
|
|
|
*
|
|
|
|
* @gi: gisa interrupt struct to work on
|
|
|
|
*
|
|
|
|
* Atomically restores the interruption alert mask if none of the
|
|
|
|
* relevant ISCs are pending and return the IPM.
|
|
|
|
*
|
|
|
|
* Returns: the relevant pending ISCs
|
|
|
|
*/
|
|
|
|
static inline u8 gisa_get_ipm_or_restore_iam(struct kvm_s390_gisa_interrupt *gi)
|
|
|
|
{
|
|
|
|
u8 pending_mask, alert_mask;
|
|
|
|
u64 word, _word;
|
|
|
|
|
|
|
|
do {
|
|
|
|
word = READ_ONCE(gi->origin->u64.word[0]);
|
|
|
|
alert_mask = READ_ONCE(gi->alert.mask);
|
|
|
|
pending_mask = (u8)(word >> 24) & alert_mask;
|
|
|
|
if (pending_mask)
|
|
|
|
return pending_mask;
|
|
|
|
_word = (word & ~0xffUL) | alert_mask;
|
|
|
|
} while (cmpxchg(&gi->origin->u64.word[0], word, _word) != word);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline int gisa_in_alert_list(struct kvm_s390_gisa *gisa)
|
|
|
|
{
|
|
|
|
return READ_ONCE(gisa->next_alert) != (u32)(u64)gisa;
|
|
|
|
}
|
|
|
|
|
2019-01-31 11:52:37 +03:00
|
|
|
static inline void gisa_set_ipm_gisc(struct kvm_s390_gisa *gisa, u32 gisc)
|
2017-06-12 13:37:57 +03:00
|
|
|
{
|
|
|
|
set_bit_inv(IPM_BIT_OFFSET + gisc, (unsigned long *) gisa);
|
|
|
|
}
|
|
|
|
|
2019-01-31 11:52:37 +03:00
|
|
|
static inline u8 gisa_get_ipm(struct kvm_s390_gisa *gisa)
|
2017-06-12 13:37:57 +03:00
|
|
|
{
|
|
|
|
return READ_ONCE(gisa->ipm);
|
|
|
|
}
|
|
|
|
|
2019-01-31 11:52:37 +03:00
|
|
|
static inline void gisa_clear_ipm_gisc(struct kvm_s390_gisa *gisa, u32 gisc)
|
2017-06-12 13:37:57 +03:00
|
|
|
{
|
|
|
|
clear_bit_inv(IPM_BIT_OFFSET + gisc, (unsigned long *) gisa);
|
|
|
|
}
|
|
|
|
|
2019-01-31 11:52:37 +03:00
|
|
|
static inline int gisa_tac_ipm_gisc(struct kvm_s390_gisa *gisa, u32 gisc)
|
2017-06-12 13:37:57 +03:00
|
|
|
{
|
|
|
|
return test_and_clear_bit_inv(IPM_BIT_OFFSET + gisc, (unsigned long *) gisa);
|
|
|
|
}
|
|
|
|
|
2018-02-12 15:33:39 +03:00
|
|
|
static inline unsigned long pending_irqs_no_gisa(struct kvm_vcpu *vcpu)
|
2013-07-03 17:18:35 +04:00
|
|
|
{
|
2015-09-28 15:27:51 +03:00
|
|
|
return vcpu->kvm->arch.float_int.pending_irqs |
|
2018-02-12 15:33:39 +03:00
|
|
|
vcpu->arch.local_int.pending_irqs;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline unsigned long pending_irqs(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
2019-01-31 11:52:46 +03:00
|
|
|
struct kvm_s390_gisa_interrupt *gi = &vcpu->kvm->arch.gisa_int;
|
|
|
|
unsigned long pending_mask;
|
|
|
|
|
|
|
|
pending_mask = pending_irqs_no_gisa(vcpu);
|
|
|
|
if (gi->origin)
|
|
|
|
pending_mask |= gisa_get_ipm(gi->origin) << IRQ_PEND_IO_ISC_7;
|
|
|
|
return pending_mask;
|
2014-07-29 17:11:49 +04:00
|
|
|
}
|
|
|
|
|
2017-07-03 16:32:50 +03:00
|
|
|
static inline int isc_to_irq_type(unsigned long isc)
|
|
|
|
{
|
2017-06-29 19:39:27 +03:00
|
|
|
return IRQ_PEND_IO_ISC_0 - isc;
|
2017-07-03 16:32:50 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
static inline int irq_type_to_isc(unsigned long irq_type)
|
|
|
|
{
|
2017-06-29 19:39:27 +03:00
|
|
|
return IRQ_PEND_IO_ISC_0 - irq_type;
|
2017-07-03 16:32:50 +03:00
|
|
|
}
|
|
|
|
|
2013-07-03 17:18:35 +04:00
|
|
|
static unsigned long disable_iscs(struct kvm_vcpu *vcpu,
|
|
|
|
unsigned long active_mask)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = 0; i <= MAX_ISC; i++)
|
|
|
|
if (!(vcpu->arch.sie_block->gcr[6] & isc_to_isc_bits(i)))
|
2017-07-03 16:32:50 +03:00
|
|
|
active_mask &= ~(1UL << (isc_to_irq_type(i)));
|
2013-07-03 17:18:35 +04:00
|
|
|
|
|
|
|
return active_mask;
|
|
|
|
}
|
|
|
|
|
|
|
|
static unsigned long deliverable_irqs(struct kvm_vcpu *vcpu)
|
2014-07-29 17:11:49 +04:00
|
|
|
{
|
2013-07-03 17:18:35 +04:00
|
|
|
unsigned long active_mask;
|
|
|
|
|
2015-09-28 15:27:51 +03:00
|
|
|
active_mask = pending_irqs(vcpu);
|
2015-04-17 11:21:04 +03:00
|
|
|
if (!active_mask)
|
|
|
|
return 0;
|
2014-07-29 17:11:49 +04:00
|
|
|
|
|
|
|
if (psw_extint_disabled(vcpu))
|
|
|
|
active_mask &= ~IRQ_PEND_EXT_MASK;
|
2013-07-03 17:18:35 +04:00
|
|
|
if (psw_ioint_disabled(vcpu))
|
|
|
|
active_mask &= ~IRQ_PEND_IO_MASK;
|
|
|
|
else
|
|
|
|
active_mask = disable_iscs(vcpu, active_mask);
|
2018-04-30 18:55:24 +03:00
|
|
|
if (!(vcpu->arch.sie_block->gcr[0] & CR0_EXTERNAL_CALL_SUBMASK))
|
2014-07-29 17:11:49 +04:00
|
|
|
__clear_bit(IRQ_PEND_EXT_EXTERNAL, &active_mask);
|
2018-04-30 18:55:24 +03:00
|
|
|
if (!(vcpu->arch.sie_block->gcr[0] & CR0_EMERGENCY_SIGNAL_SUBMASK))
|
2014-07-29 17:11:49 +04:00
|
|
|
__clear_bit(IRQ_PEND_EXT_EMERGENCY, &active_mask);
|
2018-04-30 18:55:24 +03:00
|
|
|
if (!(vcpu->arch.sie_block->gcr[0] & CR0_CLOCK_COMPARATOR_SUBMASK))
|
2014-07-29 17:11:49 +04:00
|
|
|
__clear_bit(IRQ_PEND_EXT_CLOCK_COMP, &active_mask);
|
2018-04-30 18:55:24 +03:00
|
|
|
if (!(vcpu->arch.sie_block->gcr[0] & CR0_CPU_TIMER_SUBMASK))
|
2014-07-29 17:11:49 +04:00
|
|
|
__clear_bit(IRQ_PEND_EXT_CPU_TIMER, &active_mask);
|
2018-04-30 18:55:24 +03:00
|
|
|
if (!(vcpu->arch.sie_block->gcr[0] & CR0_SERVICE_SIGNAL_SUBMASK))
|
2013-07-03 17:18:35 +04:00
|
|
|
__clear_bit(IRQ_PEND_EXT_SERVICE, &active_mask);
|
2014-07-29 17:11:49 +04:00
|
|
|
if (psw_mchk_disabled(vcpu))
|
|
|
|
active_mask &= ~IRQ_PEND_MCHK_MASK;
|
KVM: s390: Inject machine check into the guest
If the exit flag of SIE indicates that a machine check has happened
during guest's running and needs to be injected, inject it to the guest
accordingly.
But some machine checks, e.g. Channel Report Pending (CRW), refer to
host conditions only (the guest's channel devices are not managed by
the kernel directly) and are therefore not injected into the guest.
External Damage (ED) is also not reinjected into the guest because ETR
conditions are gone in Linux and STP conditions are not enabled in the
guest, and ED contains only these 8 ETR and STP conditions.
In general, instruction-processing damage, system recovery,
storage error, service-processor damage and channel subsystem damage
will be reinjected into the guest, and the remain (System damage,
timing-facility damage, warning, ED and CRW) will be handled on the host.
Signed-off-by: QingFeng Hao <haoqf@linux.vnet.ibm.com>
Acked-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
2017-06-07 13:03:05 +03:00
|
|
|
/*
|
|
|
|
* Check both floating and local interrupt's cr14 because
|
|
|
|
* bit IRQ_PEND_MCHK_REP could be set in both cases.
|
|
|
|
*/
|
2013-07-03 17:18:35 +04:00
|
|
|
if (!(vcpu->arch.sie_block->gcr[14] &
|
KVM: s390: Inject machine check into the guest
If the exit flag of SIE indicates that a machine check has happened
during guest's running and needs to be injected, inject it to the guest
accordingly.
But some machine checks, e.g. Channel Report Pending (CRW), refer to
host conditions only (the guest's channel devices are not managed by
the kernel directly) and are therefore not injected into the guest.
External Damage (ED) is also not reinjected into the guest because ETR
conditions are gone in Linux and STP conditions are not enabled in the
guest, and ED contains only these 8 ETR and STP conditions.
In general, instruction-processing damage, system recovery,
storage error, service-processor damage and channel subsystem damage
will be reinjected into the guest, and the remain (System damage,
timing-facility damage, warning, ED and CRW) will be handled on the host.
Signed-off-by: QingFeng Hao <haoqf@linux.vnet.ibm.com>
Acked-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
2017-06-07 13:03:05 +03:00
|
|
|
(vcpu->kvm->arch.float_int.mchk.cr14 |
|
|
|
|
vcpu->arch.local_int.irq.mchk.cr14)))
|
2013-07-03 17:18:35 +04:00
|
|
|
__clear_bit(IRQ_PEND_MCHK_REP, &active_mask);
|
2014-07-29 17:11:49 +04:00
|
|
|
|
2014-10-15 18:48:53 +04:00
|
|
|
/*
|
|
|
|
* STOP irqs will never be actively delivered. They are triggered via
|
|
|
|
* intercept requests and cleared when the stop intercept is performed.
|
|
|
|
*/
|
|
|
|
__clear_bit(IRQ_PEND_SIGP_STOP, &active_mask);
|
|
|
|
|
2014-07-29 17:11:49 +04:00
|
|
|
return active_mask;
|
|
|
|
}
|
|
|
|
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
static void __set_cpu_idle(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
2018-01-23 20:05:29 +03:00
|
|
|
kvm_s390_set_cpuflags(vcpu, CPUSTAT_WAIT);
|
2019-01-31 11:52:34 +03:00
|
|
|
set_bit(vcpu->vcpu_id, vcpu->kvm->arch.idle_mask);
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
static void __unset_cpu_idle(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
2018-01-23 20:05:30 +03:00
|
|
|
kvm_s390_clear_cpuflags(vcpu, CPUSTAT_WAIT);
|
2019-01-31 11:52:34 +03:00
|
|
|
clear_bit(vcpu->vcpu_id, vcpu->kvm->arch.idle_mask);
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
static void __reset_intercept_indicators(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
2018-01-23 20:05:30 +03:00
|
|
|
kvm_s390_clear_cpuflags(vcpu, CPUSTAT_IO_INT | CPUSTAT_EXT_INT |
|
|
|
|
CPUSTAT_STOP_INT);
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
vcpu->arch.sie_block->lctl = 0x0000;
|
2014-01-23 15:26:52 +04:00
|
|
|
vcpu->arch.sie_block->ictl &= ~(ICTL_LPSW | ICTL_STCTL | ICTL_PINT);
|
|
|
|
|
|
|
|
if (guestdbg_enabled(vcpu)) {
|
|
|
|
vcpu->arch.sie_block->lctl |= (LCTL_CR0 | LCTL_CR9 |
|
|
|
|
LCTL_CR10 | LCTL_CR11);
|
|
|
|
vcpu->arch.sie_block->ictl |= (ICTL_STCTL | ICTL_PINT);
|
|
|
|
}
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
}
|
|
|
|
|
2013-07-03 17:18:35 +04:00
|
|
|
static void set_intercept_indicators_io(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
2018-02-12 15:33:39 +03:00
|
|
|
if (!(pending_irqs_no_gisa(vcpu) & IRQ_PEND_IO_MASK))
|
2013-07-03 17:18:35 +04:00
|
|
|
return;
|
2019-01-31 11:52:32 +03:00
|
|
|
if (psw_ioint_disabled(vcpu))
|
2018-01-23 20:05:28 +03:00
|
|
|
kvm_s390_set_cpuflags(vcpu, CPUSTAT_IO_INT);
|
2013-07-03 17:18:35 +04:00
|
|
|
else
|
|
|
|
vcpu->arch.sie_block->lctl |= LCTL_CR6;
|
|
|
|
}
|
|
|
|
|
2014-07-29 17:11:49 +04:00
|
|
|
static void set_intercept_indicators_ext(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
2019-01-31 11:52:36 +03:00
|
|
|
if (!(pending_irqs_no_gisa(vcpu) & IRQ_PEND_EXT_MASK))
|
2014-07-29 17:11:49 +04:00
|
|
|
return;
|
|
|
|
if (psw_extint_disabled(vcpu))
|
2018-01-23 20:05:28 +03:00
|
|
|
kvm_s390_set_cpuflags(vcpu, CPUSTAT_EXT_INT);
|
2014-07-29 17:11:49 +04:00
|
|
|
else
|
|
|
|
vcpu->arch.sie_block->lctl |= LCTL_CR0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void set_intercept_indicators_mchk(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
2019-01-31 11:52:36 +03:00
|
|
|
if (!(pending_irqs_no_gisa(vcpu) & IRQ_PEND_MCHK_MASK))
|
2014-07-29 17:11:49 +04:00
|
|
|
return;
|
|
|
|
if (psw_mchk_disabled(vcpu))
|
|
|
|
vcpu->arch.sie_block->ictl |= ICTL_LPSW;
|
|
|
|
else
|
|
|
|
vcpu->arch.sie_block->lctl |= LCTL_CR14;
|
|
|
|
}
|
|
|
|
|
2014-10-15 18:48:53 +04:00
|
|
|
static void set_intercept_indicators_stop(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
if (kvm_s390_is_stop_irq_pending(vcpu))
|
2018-01-23 20:05:28 +03:00
|
|
|
kvm_s390_set_cpuflags(vcpu, CPUSTAT_STOP_INT);
|
2014-10-15 18:48:53 +04:00
|
|
|
}
|
|
|
|
|
2013-07-03 17:18:35 +04:00
|
|
|
/* Set interception request for non-deliverable interrupts */
|
|
|
|
static void set_intercept_indicators(struct kvm_vcpu *vcpu)
|
2014-07-29 17:11:49 +04:00
|
|
|
{
|
2013-07-03 17:18:35 +04:00
|
|
|
set_intercept_indicators_io(vcpu);
|
2014-07-29 17:11:49 +04:00
|
|
|
set_intercept_indicators_ext(vcpu);
|
|
|
|
set_intercept_indicators_mchk(vcpu);
|
2014-10-15 18:48:53 +04:00
|
|
|
set_intercept_indicators_stop(vcpu);
|
2014-07-29 17:11:49 +04:00
|
|
|
}
|
|
|
|
|
2014-07-29 15:45:21 +04:00
|
|
|
static int __must_check __deliver_cpu_timer(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
2014-07-29 17:11:49 +04:00
|
|
|
struct kvm_s390_local_interrupt *li = &vcpu->arch.local_int;
|
2014-07-29 15:45:21 +04:00
|
|
|
int rc;
|
|
|
|
|
2018-03-08 15:48:05 +03:00
|
|
|
vcpu->stat.deliver_cputm++;
|
2014-07-29 15:45:21 +04:00
|
|
|
trace_kvm_s390_deliver_interrupt(vcpu->vcpu_id, KVM_S390_INT_CPU_TIMER,
|
|
|
|
0, 0);
|
|
|
|
|
|
|
|
rc = put_guest_lc(vcpu, EXT_IRQ_CPU_TIMER,
|
|
|
|
(u16 *)__LC_EXT_INT_CODE);
|
2014-12-01 14:02:44 +03:00
|
|
|
rc |= put_guest_lc(vcpu, 0, (u16 *)__LC_EXT_CPU_ADDR);
|
2014-07-29 15:45:21 +04:00
|
|
|
rc |= write_guest_lc(vcpu, __LC_EXT_OLD_PSW,
|
|
|
|
&vcpu->arch.sie_block->gpsw, sizeof(psw_t));
|
|
|
|
rc |= read_guest_lc(vcpu, __LC_EXT_NEW_PSW,
|
|
|
|
&vcpu->arch.sie_block->gpsw, sizeof(psw_t));
|
2014-07-29 17:11:49 +04:00
|
|
|
clear_bit(IRQ_PEND_EXT_CPU_TIMER, &li->pending_irqs);
|
2014-12-01 19:05:39 +03:00
|
|
|
return rc ? -EFAULT : 0;
|
2014-07-29 15:45:21 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
static int __must_check __deliver_ckc(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
2014-07-29 17:11:49 +04:00
|
|
|
struct kvm_s390_local_interrupt *li = &vcpu->arch.local_int;
|
2014-07-29 15:45:21 +04:00
|
|
|
int rc;
|
|
|
|
|
2018-03-08 15:48:05 +03:00
|
|
|
vcpu->stat.deliver_ckc++;
|
2014-07-29 15:45:21 +04:00
|
|
|
trace_kvm_s390_deliver_interrupt(vcpu->vcpu_id, KVM_S390_INT_CLOCK_COMP,
|
|
|
|
0, 0);
|
|
|
|
|
|
|
|
rc = put_guest_lc(vcpu, EXT_IRQ_CLK_COMP,
|
|
|
|
(u16 __user *)__LC_EXT_INT_CODE);
|
2014-12-01 14:02:44 +03:00
|
|
|
rc |= put_guest_lc(vcpu, 0, (u16 *)__LC_EXT_CPU_ADDR);
|
2014-07-29 15:45:21 +04:00
|
|
|
rc |= write_guest_lc(vcpu, __LC_EXT_OLD_PSW,
|
|
|
|
&vcpu->arch.sie_block->gpsw, sizeof(psw_t));
|
|
|
|
rc |= read_guest_lc(vcpu, __LC_EXT_NEW_PSW,
|
|
|
|
&vcpu->arch.sie_block->gpsw, sizeof(psw_t));
|
2014-07-29 17:11:49 +04:00
|
|
|
clear_bit(IRQ_PEND_EXT_CLOCK_COMP, &li->pending_irqs);
|
2014-12-01 19:05:39 +03:00
|
|
|
return rc ? -EFAULT : 0;
|
2014-07-29 15:45:21 +04:00
|
|
|
}
|
|
|
|
|
2014-07-29 17:11:49 +04:00
|
|
|
static int __must_check __deliver_pfault_init(struct kvm_vcpu *vcpu)
|
2014-07-29 15:45:21 +04:00
|
|
|
{
|
2014-07-29 17:11:49 +04:00
|
|
|
struct kvm_s390_local_interrupt *li = &vcpu->arch.local_int;
|
|
|
|
struct kvm_s390_ext_info ext;
|
2014-07-29 15:45:21 +04:00
|
|
|
int rc;
|
|
|
|
|
2014-07-29 17:11:49 +04:00
|
|
|
spin_lock(&li->lock);
|
|
|
|
ext = li->irq.ext;
|
|
|
|
clear_bit(IRQ_PEND_PFAULT_INIT, &li->pending_irqs);
|
|
|
|
li->irq.ext.ext_params2 = 0;
|
|
|
|
spin_unlock(&li->lock);
|
|
|
|
|
2015-07-09 15:08:18 +03:00
|
|
|
VCPU_EVENT(vcpu, 4, "deliver: pfault init token 0x%llx",
|
|
|
|
ext.ext_params2);
|
2014-07-29 15:45:21 +04:00
|
|
|
trace_kvm_s390_deliver_interrupt(vcpu->vcpu_id,
|
|
|
|
KVM_S390_INT_PFAULT_INIT,
|
2014-07-29 17:11:49 +04:00
|
|
|
0, ext.ext_params2);
|
2014-07-29 15:45:21 +04:00
|
|
|
|
|
|
|
rc = put_guest_lc(vcpu, EXT_IRQ_CP_SERVICE, (u16 *) __LC_EXT_INT_CODE);
|
|
|
|
rc |= put_guest_lc(vcpu, PFAULT_INIT, (u16 *) __LC_EXT_CPU_ADDR);
|
|
|
|
rc |= write_guest_lc(vcpu, __LC_EXT_OLD_PSW,
|
|
|
|
&vcpu->arch.sie_block->gpsw, sizeof(psw_t));
|
|
|
|
rc |= read_guest_lc(vcpu, __LC_EXT_NEW_PSW,
|
|
|
|
&vcpu->arch.sie_block->gpsw, sizeof(psw_t));
|
2014-07-29 17:11:49 +04:00
|
|
|
rc |= put_guest_lc(vcpu, ext.ext_params2, (u64 *) __LC_EXT_PARAMS2);
|
2014-12-01 19:05:39 +03:00
|
|
|
return rc ? -EFAULT : 0;
|
2014-07-29 15:45:21 +04:00
|
|
|
}
|
|
|
|
|
2015-10-14 17:47:36 +03:00
|
|
|
static int __write_machine_check(struct kvm_vcpu *vcpu,
|
|
|
|
struct kvm_s390_mchk_info *mchk)
|
|
|
|
{
|
|
|
|
unsigned long ext_sa_addr;
|
2016-11-29 09:17:55 +03:00
|
|
|
unsigned long lc;
|
2016-08-03 12:18:57 +03:00
|
|
|
freg_t fprs[NUM_FPRS];
|
2015-10-14 17:57:56 +03:00
|
|
|
union mci mci;
|
2015-10-14 17:47:36 +03:00
|
|
|
int rc;
|
|
|
|
|
2015-10-14 17:57:56 +03:00
|
|
|
mci.val = mchk->mcic;
|
2016-11-10 16:22:02 +03:00
|
|
|
/* take care of lazy register loading */
|
2016-08-03 12:18:57 +03:00
|
|
|
save_fpu_regs();
|
|
|
|
save_access_regs(vcpu->run->s.regs.acrs);
|
2017-04-12 13:59:59 +03:00
|
|
|
if (MACHINE_HAS_GS && vcpu->arch.gs_enabled)
|
|
|
|
save_gs_cb(current->thread.gs_cb);
|
2016-08-03 12:18:57 +03:00
|
|
|
|
2015-10-14 17:47:36 +03:00
|
|
|
/* Extended save area */
|
2016-01-26 16:10:34 +03:00
|
|
|
rc = read_guest_lc(vcpu, __LC_MCESAD, &ext_sa_addr,
|
|
|
|
sizeof(unsigned long));
|
2016-11-29 09:17:55 +03:00
|
|
|
/* Only bits 0 through 63-LC are used for address formation */
|
|
|
|
lc = ext_sa_addr & MCESA_LC_MASK;
|
|
|
|
if (test_kvm_facility(vcpu->kvm, 133)) {
|
|
|
|
switch (lc) {
|
|
|
|
case 0:
|
|
|
|
case 10:
|
|
|
|
ext_sa_addr &= ~0x3ffUL;
|
|
|
|
break;
|
|
|
|
case 11:
|
|
|
|
ext_sa_addr &= ~0x7ffUL;
|
|
|
|
break;
|
|
|
|
case 12:
|
|
|
|
ext_sa_addr &= ~0xfffUL;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
ext_sa_addr = 0;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
ext_sa_addr &= ~0x3ffUL;
|
|
|
|
}
|
|
|
|
|
2015-10-14 17:57:56 +03:00
|
|
|
if (!rc && mci.vr && ext_sa_addr && test_kvm_facility(vcpu->kvm, 129)) {
|
|
|
|
if (write_guest_abs(vcpu, ext_sa_addr, vcpu->run->s.regs.vrs,
|
|
|
|
512))
|
|
|
|
mci.vr = 0;
|
|
|
|
} else {
|
|
|
|
mci.vr = 0;
|
|
|
|
}
|
2016-11-29 09:17:55 +03:00
|
|
|
if (!rc && mci.gs && ext_sa_addr && test_kvm_facility(vcpu->kvm, 133)
|
|
|
|
&& (lc == 11 || lc == 12)) {
|
|
|
|
if (write_guest_abs(vcpu, ext_sa_addr + 1024,
|
|
|
|
&vcpu->run->s.regs.gscb, 32))
|
|
|
|
mci.gs = 0;
|
|
|
|
} else {
|
|
|
|
mci.gs = 0;
|
|
|
|
}
|
2015-10-14 17:47:36 +03:00
|
|
|
|
|
|
|
/* General interruption information */
|
2016-08-03 12:18:57 +03:00
|
|
|
rc |= put_guest_lc(vcpu, 1, (u8 __user *) __LC_AR_MODE_ID);
|
2015-10-14 17:47:36 +03:00
|
|
|
rc |= write_guest_lc(vcpu, __LC_MCK_OLD_PSW,
|
|
|
|
&vcpu->arch.sie_block->gpsw, sizeof(psw_t));
|
|
|
|
rc |= read_guest_lc(vcpu, __LC_MCK_NEW_PSW,
|
|
|
|
&vcpu->arch.sie_block->gpsw, sizeof(psw_t));
|
2015-10-14 17:57:56 +03:00
|
|
|
rc |= put_guest_lc(vcpu, mci.val, (u64 __user *) __LC_MCCK_CODE);
|
2015-10-14 17:47:36 +03:00
|
|
|
|
|
|
|
/* Register-save areas */
|
2016-08-03 12:18:57 +03:00
|
|
|
if (MACHINE_HAS_VX) {
|
|
|
|
convert_vx_to_fp(fprs, (__vector128 *) vcpu->run->s.regs.vrs);
|
|
|
|
rc |= write_guest_lc(vcpu, __LC_FPREGS_SAVE_AREA, fprs, 128);
|
|
|
|
} else {
|
|
|
|
rc |= write_guest_lc(vcpu, __LC_FPREGS_SAVE_AREA,
|
|
|
|
vcpu->run->s.regs.fprs, 128);
|
|
|
|
}
|
|
|
|
rc |= write_guest_lc(vcpu, __LC_GPREGS_SAVE_AREA,
|
|
|
|
vcpu->run->s.regs.gprs, 128);
|
|
|
|
rc |= put_guest_lc(vcpu, current->thread.fpu.fpc,
|
|
|
|
(u32 __user *) __LC_FP_CREG_SAVE_AREA);
|
|
|
|
rc |= put_guest_lc(vcpu, vcpu->arch.sie_block->todpr,
|
|
|
|
(u32 __user *) __LC_TOD_PROGREG_SAVE_AREA);
|
|
|
|
rc |= put_guest_lc(vcpu, kvm_s390_get_cpu_timer(vcpu),
|
|
|
|
(u64 __user *) __LC_CPU_TIMER_SAVE_AREA);
|
|
|
|
rc |= put_guest_lc(vcpu, vcpu->arch.sie_block->ckc >> 8,
|
|
|
|
(u64 __user *) __LC_CLOCK_COMP_SAVE_AREA);
|
|
|
|
rc |= write_guest_lc(vcpu, __LC_AREGS_SAVE_AREA,
|
|
|
|
&vcpu->run->s.regs.acrs, 64);
|
|
|
|
rc |= write_guest_lc(vcpu, __LC_CREGS_SAVE_AREA,
|
|
|
|
&vcpu->arch.sie_block->gcr, 128);
|
2015-10-14 17:47:36 +03:00
|
|
|
|
|
|
|
/* Extended interruption information */
|
2016-08-03 13:25:08 +03:00
|
|
|
rc |= put_guest_lc(vcpu, mchk->ext_damage_code,
|
|
|
|
(u32 __user *) __LC_EXT_DAMAGE_CODE);
|
2015-10-14 17:47:36 +03:00
|
|
|
rc |= put_guest_lc(vcpu, mchk->failing_storage_address,
|
|
|
|
(u64 __user *) __LC_MCCK_FAIL_STOR_ADDR);
|
|
|
|
rc |= write_guest_lc(vcpu, __LC_PSW_SAVE_AREA, &mchk->fixed_logout,
|
|
|
|
sizeof(mchk->fixed_logout));
|
|
|
|
return rc ? -EFAULT : 0;
|
|
|
|
}
|
|
|
|
|
2014-07-29 17:11:49 +04:00
|
|
|
static int __must_check __deliver_machine_check(struct kvm_vcpu *vcpu)
|
2014-07-29 15:45:21 +04:00
|
|
|
{
|
2013-07-03 17:18:35 +04:00
|
|
|
struct kvm_s390_float_interrupt *fi = &vcpu->kvm->arch.float_int;
|
2014-07-29 17:11:49 +04:00
|
|
|
struct kvm_s390_local_interrupt *li = &vcpu->arch.local_int;
|
2013-07-03 17:18:35 +04:00
|
|
|
struct kvm_s390_mchk_info mchk = {};
|
|
|
|
int deliver = 0;
|
|
|
|
int rc = 0;
|
2014-07-29 15:45:21 +04:00
|
|
|
|
2013-07-03 17:18:35 +04:00
|
|
|
spin_lock(&fi->lock);
|
2014-07-29 17:11:49 +04:00
|
|
|
spin_lock(&li->lock);
|
2013-07-03 17:18:35 +04:00
|
|
|
if (test_bit(IRQ_PEND_MCHK_EX, &li->pending_irqs) ||
|
|
|
|
test_bit(IRQ_PEND_MCHK_REP, &li->pending_irqs)) {
|
|
|
|
/*
|
|
|
|
* If there was an exigent machine check pending, then any
|
|
|
|
* repressible machine checks that might have been pending
|
|
|
|
* are indicated along with it, so always clear bits for
|
|
|
|
* repressible and exigent interrupts
|
|
|
|
*/
|
|
|
|
mchk = li->irq.mchk;
|
|
|
|
clear_bit(IRQ_PEND_MCHK_EX, &li->pending_irqs);
|
|
|
|
clear_bit(IRQ_PEND_MCHK_REP, &li->pending_irqs);
|
|
|
|
memset(&li->irq.mchk, 0, sizeof(mchk));
|
|
|
|
deliver = 1;
|
|
|
|
}
|
2014-07-29 17:11:49 +04:00
|
|
|
/*
|
2013-07-03 17:18:35 +04:00
|
|
|
* We indicate floating repressible conditions along with
|
|
|
|
* other pending conditions. Channel Report Pending and Channel
|
|
|
|
* Subsystem damage are the only two and and are indicated by
|
|
|
|
* bits in mcic and masked in cr14.
|
2014-07-29 17:11:49 +04:00
|
|
|
*/
|
2013-07-03 17:18:35 +04:00
|
|
|
if (test_and_clear_bit(IRQ_PEND_MCHK_REP, &fi->pending_irqs)) {
|
|
|
|
mchk.mcic |= fi->mchk.mcic;
|
|
|
|
mchk.cr14 |= fi->mchk.cr14;
|
|
|
|
memset(&fi->mchk, 0, sizeof(mchk));
|
|
|
|
deliver = 1;
|
|
|
|
}
|
2014-07-29 17:11:49 +04:00
|
|
|
spin_unlock(&li->lock);
|
2013-07-03 17:18:35 +04:00
|
|
|
spin_unlock(&fi->lock);
|
2014-07-29 17:11:49 +04:00
|
|
|
|
2013-07-03 17:18:35 +04:00
|
|
|
if (deliver) {
|
2015-07-09 15:08:18 +03:00
|
|
|
VCPU_EVENT(vcpu, 3, "deliver: machine check mcic 0x%llx",
|
2013-07-03 17:18:35 +04:00
|
|
|
mchk.mcic);
|
|
|
|
trace_kvm_s390_deliver_interrupt(vcpu->vcpu_id,
|
|
|
|
KVM_S390_MCHK,
|
|
|
|
mchk.cr14, mchk.mcic);
|
2018-03-02 13:56:47 +03:00
|
|
|
vcpu->stat.deliver_machine_check++;
|
2015-10-14 17:47:36 +03:00
|
|
|
rc = __write_machine_check(vcpu, &mchk);
|
2013-07-03 17:18:35 +04:00
|
|
|
}
|
2015-10-14 17:47:36 +03:00
|
|
|
return rc;
|
2014-07-29 15:45:21 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
static int __must_check __deliver_restart(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
2014-07-29 17:11:49 +04:00
|
|
|
struct kvm_s390_local_interrupt *li = &vcpu->arch.local_int;
|
2014-07-29 15:45:21 +04:00
|
|
|
int rc;
|
|
|
|
|
2015-07-09 15:08:18 +03:00
|
|
|
VCPU_EVENT(vcpu, 3, "%s", "deliver: cpu restart");
|
2014-07-29 15:45:21 +04:00
|
|
|
vcpu->stat.deliver_restart_signal++;
|
|
|
|
trace_kvm_s390_deliver_interrupt(vcpu->vcpu_id, KVM_S390_RESTART, 0, 0);
|
|
|
|
|
|
|
|
rc = write_guest_lc(vcpu,
|
2015-12-31 12:29:00 +03:00
|
|
|
offsetof(struct lowcore, restart_old_psw),
|
2014-07-29 15:45:21 +04:00
|
|
|
&vcpu->arch.sie_block->gpsw, sizeof(psw_t));
|
2015-12-31 12:29:00 +03:00
|
|
|
rc |= read_guest_lc(vcpu, offsetof(struct lowcore, restart_psw),
|
2014-07-29 15:45:21 +04:00
|
|
|
&vcpu->arch.sie_block->gpsw, sizeof(psw_t));
|
2014-07-29 17:11:49 +04:00
|
|
|
clear_bit(IRQ_PEND_RESTART, &li->pending_irqs);
|
2014-12-01 19:05:39 +03:00
|
|
|
return rc ? -EFAULT : 0;
|
2014-07-29 15:45:21 +04:00
|
|
|
}
|
|
|
|
|
2014-07-29 17:11:49 +04:00
|
|
|
static int __must_check __deliver_set_prefix(struct kvm_vcpu *vcpu)
|
2014-07-29 15:45:21 +04:00
|
|
|
{
|
2014-07-29 17:11:49 +04:00
|
|
|
struct kvm_s390_local_interrupt *li = &vcpu->arch.local_int;
|
|
|
|
struct kvm_s390_prefix_info prefix;
|
|
|
|
|
|
|
|
spin_lock(&li->lock);
|
|
|
|
prefix = li->irq.prefix;
|
|
|
|
li->irq.prefix.address = 0;
|
|
|
|
clear_bit(IRQ_PEND_SET_PREFIX, &li->pending_irqs);
|
|
|
|
spin_unlock(&li->lock);
|
2014-07-29 15:45:21 +04:00
|
|
|
|
|
|
|
vcpu->stat.deliver_prefix_signal++;
|
|
|
|
trace_kvm_s390_deliver_interrupt(vcpu->vcpu_id,
|
|
|
|
KVM_S390_SIGP_SET_PREFIX,
|
2014-07-29 17:11:49 +04:00
|
|
|
prefix.address, 0);
|
2014-07-29 15:45:21 +04:00
|
|
|
|
2014-07-29 17:11:49 +04:00
|
|
|
kvm_s390_set_prefix(vcpu, prefix.address);
|
2014-07-29 15:45:21 +04:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-07-29 17:11:49 +04:00
|
|
|
static int __must_check __deliver_emergency_signal(struct kvm_vcpu *vcpu)
|
2014-07-29 15:45:21 +04:00
|
|
|
{
|
2014-07-29 17:11:49 +04:00
|
|
|
struct kvm_s390_local_interrupt *li = &vcpu->arch.local_int;
|
2014-07-29 15:45:21 +04:00
|
|
|
int rc;
|
2014-07-29 17:11:49 +04:00
|
|
|
int cpu_addr;
|
|
|
|
|
|
|
|
spin_lock(&li->lock);
|
|
|
|
cpu_addr = find_first_bit(li->sigp_emerg_pending, KVM_MAX_VCPUS);
|
|
|
|
clear_bit(cpu_addr, li->sigp_emerg_pending);
|
|
|
|
if (bitmap_empty(li->sigp_emerg_pending, KVM_MAX_VCPUS))
|
|
|
|
clear_bit(IRQ_PEND_EXT_EMERGENCY, &li->pending_irqs);
|
|
|
|
spin_unlock(&li->lock);
|
2014-07-29 15:45:21 +04:00
|
|
|
|
2015-07-09 15:08:18 +03:00
|
|
|
VCPU_EVENT(vcpu, 4, "%s", "deliver: sigp emerg");
|
2014-07-29 15:45:21 +04:00
|
|
|
vcpu->stat.deliver_emergency_signal++;
|
2014-07-29 17:11:49 +04:00
|
|
|
trace_kvm_s390_deliver_interrupt(vcpu->vcpu_id, KVM_S390_INT_EMERGENCY,
|
|
|
|
cpu_addr, 0);
|
2014-07-29 15:45:21 +04:00
|
|
|
|
|
|
|
rc = put_guest_lc(vcpu, EXT_IRQ_EMERGENCY_SIG,
|
|
|
|
(u16 *)__LC_EXT_INT_CODE);
|
2014-07-29 17:11:49 +04:00
|
|
|
rc |= put_guest_lc(vcpu, cpu_addr, (u16 *)__LC_EXT_CPU_ADDR);
|
2014-07-29 15:45:21 +04:00
|
|
|
rc |= write_guest_lc(vcpu, __LC_EXT_OLD_PSW,
|
|
|
|
&vcpu->arch.sie_block->gpsw, sizeof(psw_t));
|
|
|
|
rc |= read_guest_lc(vcpu, __LC_EXT_NEW_PSW,
|
|
|
|
&vcpu->arch.sie_block->gpsw, sizeof(psw_t));
|
2014-12-01 19:05:39 +03:00
|
|
|
return rc ? -EFAULT : 0;
|
2014-07-29 15:45:21 +04:00
|
|
|
}
|
|
|
|
|
2014-07-29 17:11:49 +04:00
|
|
|
static int __must_check __deliver_external_call(struct kvm_vcpu *vcpu)
|
2014-07-29 15:45:21 +04:00
|
|
|
{
|
2014-07-29 17:11:49 +04:00
|
|
|
struct kvm_s390_local_interrupt *li = &vcpu->arch.local_int;
|
|
|
|
struct kvm_s390_extcall_info extcall;
|
2014-07-29 15:45:21 +04:00
|
|
|
int rc;
|
|
|
|
|
2014-07-29 17:11:49 +04:00
|
|
|
spin_lock(&li->lock);
|
|
|
|
extcall = li->irq.extcall;
|
|
|
|
li->irq.extcall.code = 0;
|
|
|
|
clear_bit(IRQ_PEND_EXT_EXTERNAL, &li->pending_irqs);
|
|
|
|
spin_unlock(&li->lock);
|
|
|
|
|
2015-07-09 15:08:18 +03:00
|
|
|
VCPU_EVENT(vcpu, 4, "%s", "deliver: sigp ext call");
|
2014-07-29 15:45:21 +04:00
|
|
|
vcpu->stat.deliver_external_call++;
|
|
|
|
trace_kvm_s390_deliver_interrupt(vcpu->vcpu_id,
|
|
|
|
KVM_S390_INT_EXTERNAL_CALL,
|
2014-07-29 17:11:49 +04:00
|
|
|
extcall.code, 0);
|
2014-07-29 15:45:21 +04:00
|
|
|
|
|
|
|
rc = put_guest_lc(vcpu, EXT_IRQ_EXTERNAL_CALL,
|
|
|
|
(u16 *)__LC_EXT_INT_CODE);
|
2014-07-29 17:11:49 +04:00
|
|
|
rc |= put_guest_lc(vcpu, extcall.code, (u16 *)__LC_EXT_CPU_ADDR);
|
2014-07-29 15:45:21 +04:00
|
|
|
rc |= write_guest_lc(vcpu, __LC_EXT_OLD_PSW,
|
|
|
|
&vcpu->arch.sie_block->gpsw, sizeof(psw_t));
|
|
|
|
rc |= read_guest_lc(vcpu, __LC_EXT_NEW_PSW, &vcpu->arch.sie_block->gpsw,
|
|
|
|
sizeof(psw_t));
|
2014-12-01 19:05:39 +03:00
|
|
|
return rc ? -EFAULT : 0;
|
2014-07-29 15:45:21 +04:00
|
|
|
}
|
|
|
|
|
2014-07-29 17:11:49 +04:00
|
|
|
static int __must_check __deliver_prog(struct kvm_vcpu *vcpu)
|
2014-03-03 13:55:13 +04:00
|
|
|
{
|
2014-07-29 17:11:49 +04:00
|
|
|
struct kvm_s390_local_interrupt *li = &vcpu->arch.local_int;
|
|
|
|
struct kvm_s390_pgm_info pgm_info;
|
2015-02-05 11:06:56 +03:00
|
|
|
int rc = 0, nullifying = false;
|
2015-11-04 18:33:33 +03:00
|
|
|
u16 ilen;
|
2014-03-03 13:55:13 +04:00
|
|
|
|
2014-07-29 17:11:49 +04:00
|
|
|
spin_lock(&li->lock);
|
|
|
|
pgm_info = li->irq.pgm;
|
|
|
|
clear_bit(IRQ_PEND_PROG, &li->pending_irqs);
|
|
|
|
memset(&li->irq.pgm, 0, sizeof(pgm_info));
|
|
|
|
spin_unlock(&li->lock);
|
|
|
|
|
2015-11-04 18:33:33 +03:00
|
|
|
ilen = pgm_info.flags & KVM_S390_PGM_FLAGS_ILC_MASK;
|
2015-11-04 15:47:58 +03:00
|
|
|
VCPU_EVENT(vcpu, 3, "deliver: program irq code 0x%x, ilen:%d",
|
|
|
|
pgm_info.code, ilen);
|
2018-03-08 15:48:05 +03:00
|
|
|
vcpu->stat.deliver_program++;
|
2014-07-29 15:45:21 +04:00
|
|
|
trace_kvm_s390_deliver_interrupt(vcpu->vcpu_id, KVM_S390_PROGRAM_INT,
|
2014-07-29 17:11:49 +04:00
|
|
|
pgm_info.code, 0);
|
2014-07-29 15:45:21 +04:00
|
|
|
|
2014-07-29 17:11:49 +04:00
|
|
|
switch (pgm_info.code & ~PGM_PER) {
|
2014-03-03 13:55:13 +04:00
|
|
|
case PGM_AFX_TRANSLATION:
|
|
|
|
case PGM_ASX_TRANSLATION:
|
|
|
|
case PGM_EX_TRANSLATION:
|
|
|
|
case PGM_LFX_TRANSLATION:
|
|
|
|
case PGM_LSTE_SEQUENCE:
|
|
|
|
case PGM_LSX_TRANSLATION:
|
|
|
|
case PGM_LX_TRANSLATION:
|
|
|
|
case PGM_PRIMARY_AUTHORITY:
|
|
|
|
case PGM_SECONDARY_AUTHORITY:
|
2015-02-05 11:06:56 +03:00
|
|
|
nullifying = true;
|
|
|
|
/* fall through */
|
2014-03-03 13:55:13 +04:00
|
|
|
case PGM_SPACE_SWITCH:
|
2014-07-29 17:11:49 +04:00
|
|
|
rc = put_guest_lc(vcpu, pgm_info.trans_exc_code,
|
2014-03-03 13:55:13 +04:00
|
|
|
(u64 *)__LC_TRANS_EXC_CODE);
|
|
|
|
break;
|
|
|
|
case PGM_ALEN_TRANSLATION:
|
|
|
|
case PGM_ALE_SEQUENCE:
|
|
|
|
case PGM_ASTE_INSTANCE:
|
|
|
|
case PGM_ASTE_SEQUENCE:
|
|
|
|
case PGM_ASTE_VALIDITY:
|
|
|
|
case PGM_EXTENDED_AUTHORITY:
|
2014-07-29 17:11:49 +04:00
|
|
|
rc = put_guest_lc(vcpu, pgm_info.exc_access_id,
|
2014-03-03 13:55:13 +04:00
|
|
|
(u8 *)__LC_EXC_ACCESS_ID);
|
2015-02-05 11:06:56 +03:00
|
|
|
nullifying = true;
|
2014-03-03 13:55:13 +04:00
|
|
|
break;
|
|
|
|
case PGM_ASCE_TYPE:
|
|
|
|
case PGM_PAGE_TRANSLATION:
|
|
|
|
case PGM_REGION_FIRST_TRANS:
|
|
|
|
case PGM_REGION_SECOND_TRANS:
|
|
|
|
case PGM_REGION_THIRD_TRANS:
|
|
|
|
case PGM_SEGMENT_TRANSLATION:
|
2014-07-29 17:11:49 +04:00
|
|
|
rc = put_guest_lc(vcpu, pgm_info.trans_exc_code,
|
2014-03-03 13:55:13 +04:00
|
|
|
(u64 *)__LC_TRANS_EXC_CODE);
|
2014-07-29 17:11:49 +04:00
|
|
|
rc |= put_guest_lc(vcpu, pgm_info.exc_access_id,
|
2014-03-03 13:55:13 +04:00
|
|
|
(u8 *)__LC_EXC_ACCESS_ID);
|
2014-07-29 17:11:49 +04:00
|
|
|
rc |= put_guest_lc(vcpu, pgm_info.op_access_id,
|
2014-03-03 13:55:13 +04:00
|
|
|
(u8 *)__LC_OP_ACCESS_ID);
|
2015-02-05 11:06:56 +03:00
|
|
|
nullifying = true;
|
2014-03-03 13:55:13 +04:00
|
|
|
break;
|
|
|
|
case PGM_MONITOR:
|
2014-07-29 17:11:49 +04:00
|
|
|
rc = put_guest_lc(vcpu, pgm_info.mon_class_nr,
|
2014-10-16 16:31:53 +04:00
|
|
|
(u16 *)__LC_MON_CLASS_NR);
|
2014-07-29 17:11:49 +04:00
|
|
|
rc |= put_guest_lc(vcpu, pgm_info.mon_code,
|
2014-03-03 13:55:13 +04:00
|
|
|
(u64 *)__LC_MON_CODE);
|
|
|
|
break;
|
2015-02-02 23:01:06 +03:00
|
|
|
case PGM_VECTOR_PROCESSING:
|
2014-03-03 13:55:13 +04:00
|
|
|
case PGM_DATA:
|
2014-07-29 17:11:49 +04:00
|
|
|
rc = put_guest_lc(vcpu, pgm_info.data_exc_code,
|
2014-03-03 13:55:13 +04:00
|
|
|
(u32 *)__LC_DATA_EXC_CODE);
|
|
|
|
break;
|
|
|
|
case PGM_PROTECTION:
|
2014-07-29 17:11:49 +04:00
|
|
|
rc = put_guest_lc(vcpu, pgm_info.trans_exc_code,
|
2014-03-03 13:55:13 +04:00
|
|
|
(u64 *)__LC_TRANS_EXC_CODE);
|
2014-07-29 17:11:49 +04:00
|
|
|
rc |= put_guest_lc(vcpu, pgm_info.exc_access_id,
|
2014-03-03 13:55:13 +04:00
|
|
|
(u8 *)__LC_EXC_ACCESS_ID);
|
|
|
|
break;
|
2015-02-05 11:06:56 +03:00
|
|
|
case PGM_STACK_FULL:
|
|
|
|
case PGM_STACK_EMPTY:
|
|
|
|
case PGM_STACK_SPECIFICATION:
|
|
|
|
case PGM_STACK_TYPE:
|
|
|
|
case PGM_STACK_OPERATION:
|
|
|
|
case PGM_TRACE_TABEL:
|
|
|
|
case PGM_CRYPTO_OPERATION:
|
|
|
|
nullifying = true;
|
|
|
|
break;
|
2014-03-03 13:55:13 +04:00
|
|
|
}
|
|
|
|
|
2014-07-29 17:11:49 +04:00
|
|
|
if (pgm_info.code & PGM_PER) {
|
|
|
|
rc |= put_guest_lc(vcpu, pgm_info.per_code,
|
2014-03-03 13:55:13 +04:00
|
|
|
(u8 *) __LC_PER_CODE);
|
2014-07-29 17:11:49 +04:00
|
|
|
rc |= put_guest_lc(vcpu, pgm_info.per_atmid,
|
2014-03-03 13:55:13 +04:00
|
|
|
(u8 *)__LC_PER_ATMID);
|
2014-07-29 17:11:49 +04:00
|
|
|
rc |= put_guest_lc(vcpu, pgm_info.per_address,
|
2014-03-03 13:55:13 +04:00
|
|
|
(u64 *) __LC_PER_ADDRESS);
|
2014-07-29 17:11:49 +04:00
|
|
|
rc |= put_guest_lc(vcpu, pgm_info.per_access_id,
|
2014-03-03 13:55:13 +04:00
|
|
|
(u8 *) __LC_PER_ACCESS_ID);
|
|
|
|
}
|
|
|
|
|
2015-11-04 18:46:55 +03:00
|
|
|
if (nullifying && !(pgm_info.flags & KVM_S390_PGM_FLAGS_NO_REWIND))
|
2015-11-04 15:47:58 +03:00
|
|
|
kvm_s390_rewind_psw(vcpu, ilen);
|
2015-02-05 11:06:56 +03:00
|
|
|
|
2015-11-04 15:47:58 +03:00
|
|
|
/* bit 1+2 of the target are the ilc, so we can directly use ilen */
|
|
|
|
rc |= put_guest_lc(vcpu, ilen, (u16 *) __LC_PGM_ILC);
|
2015-03-25 15:12:32 +03:00
|
|
|
rc |= put_guest_lc(vcpu, vcpu->arch.sie_block->gbea,
|
|
|
|
(u64 *) __LC_LAST_BREAK);
|
2014-07-29 17:11:49 +04:00
|
|
|
rc |= put_guest_lc(vcpu, pgm_info.code,
|
2014-03-03 13:55:13 +04:00
|
|
|
(u16 *)__LC_PGM_INT_CODE);
|
|
|
|
rc |= write_guest_lc(vcpu, __LC_PGM_OLD_PSW,
|
|
|
|
&vcpu->arch.sie_block->gpsw, sizeof(psw_t));
|
|
|
|
rc |= read_guest_lc(vcpu, __LC_PGM_NEW_PSW,
|
|
|
|
&vcpu->arch.sie_block->gpsw, sizeof(psw_t));
|
2014-12-01 19:05:39 +03:00
|
|
|
return rc ? -EFAULT : 0;
|
2014-07-29 15:45:21 +04:00
|
|
|
}
|
|
|
|
|
2013-07-03 17:18:35 +04:00
|
|
|
static int __must_check __deliver_service(struct kvm_vcpu *vcpu)
|
2014-07-29 15:45:21 +04:00
|
|
|
{
|
2013-07-03 17:18:35 +04:00
|
|
|
struct kvm_s390_float_interrupt *fi = &vcpu->kvm->arch.float_int;
|
|
|
|
struct kvm_s390_ext_info ext;
|
|
|
|
int rc = 0;
|
|
|
|
|
|
|
|
spin_lock(&fi->lock);
|
|
|
|
if (!(test_bit(IRQ_PEND_EXT_SERVICE, &fi->pending_irqs))) {
|
|
|
|
spin_unlock(&fi->lock);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
ext = fi->srv_signal;
|
|
|
|
memset(&fi->srv_signal, 0, sizeof(ext));
|
|
|
|
clear_bit(IRQ_PEND_EXT_SERVICE, &fi->pending_irqs);
|
|
|
|
spin_unlock(&fi->lock);
|
2014-07-29 15:45:21 +04:00
|
|
|
|
2015-07-09 15:08:18 +03:00
|
|
|
VCPU_EVENT(vcpu, 4, "deliver: sclp parameter 0x%x",
|
2013-07-03 17:18:35 +04:00
|
|
|
ext.ext_params);
|
2014-07-29 15:45:21 +04:00
|
|
|
vcpu->stat.deliver_service_signal++;
|
2013-07-03 17:18:35 +04:00
|
|
|
trace_kvm_s390_deliver_interrupt(vcpu->vcpu_id, KVM_S390_INT_SERVICE,
|
|
|
|
ext.ext_params, 0);
|
2014-07-29 15:45:21 +04:00
|
|
|
|
|
|
|
rc = put_guest_lc(vcpu, EXT_IRQ_SERVICE_SIG, (u16 *)__LC_EXT_INT_CODE);
|
2014-12-01 14:02:44 +03:00
|
|
|
rc |= put_guest_lc(vcpu, 0, (u16 *)__LC_EXT_CPU_ADDR);
|
2014-07-29 15:45:21 +04:00
|
|
|
rc |= write_guest_lc(vcpu, __LC_EXT_OLD_PSW,
|
|
|
|
&vcpu->arch.sie_block->gpsw, sizeof(psw_t));
|
|
|
|
rc |= read_guest_lc(vcpu, __LC_EXT_NEW_PSW,
|
|
|
|
&vcpu->arch.sie_block->gpsw, sizeof(psw_t));
|
2013-07-03 17:18:35 +04:00
|
|
|
rc |= put_guest_lc(vcpu, ext.ext_params,
|
2014-07-29 15:45:21 +04:00
|
|
|
(u32 *)__LC_EXT_PARAMS);
|
2013-07-03 17:18:35 +04:00
|
|
|
|
2014-12-01 19:05:39 +03:00
|
|
|
return rc ? -EFAULT : 0;
|
2014-07-29 15:45:21 +04:00
|
|
|
}
|
|
|
|
|
2013-07-03 17:18:35 +04:00
|
|
|
static int __must_check __deliver_pfault_done(struct kvm_vcpu *vcpu)
|
2014-07-29 15:45:21 +04:00
|
|
|
{
|
2013-07-03 17:18:35 +04:00
|
|
|
struct kvm_s390_float_interrupt *fi = &vcpu->kvm->arch.float_int;
|
|
|
|
struct kvm_s390_interrupt_info *inti;
|
|
|
|
int rc = 0;
|
2014-07-29 15:45:21 +04:00
|
|
|
|
2013-07-03 17:18:35 +04:00
|
|
|
spin_lock(&fi->lock);
|
|
|
|
inti = list_first_entry_or_null(&fi->lists[FIRQ_LIST_PFAULT],
|
|
|
|
struct kvm_s390_interrupt_info,
|
|
|
|
list);
|
|
|
|
if (inti) {
|
|
|
|
list_del(&inti->list);
|
|
|
|
fi->counters[FIRQ_CNTR_PFAULT] -= 1;
|
|
|
|
}
|
|
|
|
if (list_empty(&fi->lists[FIRQ_LIST_PFAULT]))
|
|
|
|
clear_bit(IRQ_PEND_PFAULT_DONE, &fi->pending_irqs);
|
|
|
|
spin_unlock(&fi->lock);
|
2014-03-03 13:55:13 +04:00
|
|
|
|
2013-07-03 17:18:35 +04:00
|
|
|
if (inti) {
|
2015-07-09 15:08:18 +03:00
|
|
|
trace_kvm_s390_deliver_interrupt(vcpu->vcpu_id,
|
|
|
|
KVM_S390_INT_PFAULT_DONE, 0,
|
|
|
|
inti->ext.ext_params2);
|
|
|
|
VCPU_EVENT(vcpu, 4, "deliver: pfault done token 0x%llx",
|
|
|
|
inti->ext.ext_params2);
|
|
|
|
|
2013-07-03 17:18:35 +04:00
|
|
|
rc = put_guest_lc(vcpu, EXT_IRQ_CP_SERVICE,
|
|
|
|
(u16 *)__LC_EXT_INT_CODE);
|
|
|
|
rc |= put_guest_lc(vcpu, PFAULT_DONE,
|
|
|
|
(u16 *)__LC_EXT_CPU_ADDR);
|
|
|
|
rc |= write_guest_lc(vcpu, __LC_EXT_OLD_PSW,
|
|
|
|
&vcpu->arch.sie_block->gpsw,
|
|
|
|
sizeof(psw_t));
|
|
|
|
rc |= read_guest_lc(vcpu, __LC_EXT_NEW_PSW,
|
|
|
|
&vcpu->arch.sie_block->gpsw,
|
|
|
|
sizeof(psw_t));
|
|
|
|
rc |= put_guest_lc(vcpu, inti->ext.ext_params2,
|
|
|
|
(u64 *)__LC_EXT_PARAMS2);
|
|
|
|
kfree(inti);
|
|
|
|
}
|
2014-12-01 19:05:39 +03:00
|
|
|
return rc ? -EFAULT : 0;
|
2014-07-29 15:45:21 +04:00
|
|
|
}
|
|
|
|
|
2013-07-03 17:18:35 +04:00
|
|
|
static int __must_check __deliver_virtio(struct kvm_vcpu *vcpu)
|
2014-07-29 15:45:21 +04:00
|
|
|
{
|
2013-07-03 17:18:35 +04:00
|
|
|
struct kvm_s390_float_interrupt *fi = &vcpu->kvm->arch.float_int;
|
|
|
|
struct kvm_s390_interrupt_info *inti;
|
|
|
|
int rc = 0;
|
2014-07-29 15:45:21 +04:00
|
|
|
|
2013-07-03 17:18:35 +04:00
|
|
|
spin_lock(&fi->lock);
|
|
|
|
inti = list_first_entry_or_null(&fi->lists[FIRQ_LIST_VIRTIO],
|
|
|
|
struct kvm_s390_interrupt_info,
|
|
|
|
list);
|
|
|
|
if (inti) {
|
|
|
|
VCPU_EVENT(vcpu, 4,
|
2015-07-09 15:08:18 +03:00
|
|
|
"deliver: virtio parm: 0x%x,parm64: 0x%llx",
|
2013-07-03 17:18:35 +04:00
|
|
|
inti->ext.ext_params, inti->ext.ext_params2);
|
2018-03-08 15:48:05 +03:00
|
|
|
vcpu->stat.deliver_virtio++;
|
2013-07-03 17:18:35 +04:00
|
|
|
trace_kvm_s390_deliver_interrupt(vcpu->vcpu_id,
|
|
|
|
inti->type,
|
|
|
|
inti->ext.ext_params,
|
|
|
|
inti->ext.ext_params2);
|
|
|
|
list_del(&inti->list);
|
|
|
|
fi->counters[FIRQ_CNTR_VIRTIO] -= 1;
|
|
|
|
}
|
|
|
|
if (list_empty(&fi->lists[FIRQ_LIST_VIRTIO]))
|
|
|
|
clear_bit(IRQ_PEND_VIRTIO, &fi->pending_irqs);
|
|
|
|
spin_unlock(&fi->lock);
|
2014-07-29 15:45:21 +04:00
|
|
|
|
2013-07-03 17:18:35 +04:00
|
|
|
if (inti) {
|
|
|
|
rc = put_guest_lc(vcpu, EXT_IRQ_CP_SERVICE,
|
|
|
|
(u16 *)__LC_EXT_INT_CODE);
|
|
|
|
rc |= put_guest_lc(vcpu, VIRTIO_PARAM,
|
|
|
|
(u16 *)__LC_EXT_CPU_ADDR);
|
|
|
|
rc |= write_guest_lc(vcpu, __LC_EXT_OLD_PSW,
|
|
|
|
&vcpu->arch.sie_block->gpsw,
|
|
|
|
sizeof(psw_t));
|
|
|
|
rc |= read_guest_lc(vcpu, __LC_EXT_NEW_PSW,
|
|
|
|
&vcpu->arch.sie_block->gpsw,
|
|
|
|
sizeof(psw_t));
|
|
|
|
rc |= put_guest_lc(vcpu, inti->ext.ext_params,
|
|
|
|
(u32 *)__LC_EXT_PARAMS);
|
|
|
|
rc |= put_guest_lc(vcpu, inti->ext.ext_params2,
|
|
|
|
(u64 *)__LC_EXT_PARAMS2);
|
|
|
|
kfree(inti);
|
|
|
|
}
|
2014-12-01 19:05:39 +03:00
|
|
|
return rc ? -EFAULT : 0;
|
2014-07-29 15:45:21 +04:00
|
|
|
}
|
|
|
|
|
2017-06-12 15:15:19 +03:00
|
|
|
static int __do_deliver_io(struct kvm_vcpu *vcpu, struct kvm_s390_io_info *io)
|
|
|
|
{
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
rc = put_guest_lc(vcpu, io->subchannel_id, (u16 *)__LC_SUBCHANNEL_ID);
|
|
|
|
rc |= put_guest_lc(vcpu, io->subchannel_nr, (u16 *)__LC_SUBCHANNEL_NR);
|
|
|
|
rc |= put_guest_lc(vcpu, io->io_int_parm, (u32 *)__LC_IO_INT_PARM);
|
|
|
|
rc |= put_guest_lc(vcpu, io->io_int_word, (u32 *)__LC_IO_INT_WORD);
|
|
|
|
rc |= write_guest_lc(vcpu, __LC_IO_OLD_PSW,
|
|
|
|
&vcpu->arch.sie_block->gpsw,
|
|
|
|
sizeof(psw_t));
|
|
|
|
rc |= read_guest_lc(vcpu, __LC_IO_NEW_PSW,
|
|
|
|
&vcpu->arch.sie_block->gpsw,
|
|
|
|
sizeof(psw_t));
|
|
|
|
return rc ? -EFAULT : 0;
|
|
|
|
}
|
|
|
|
|
2014-07-29 15:45:21 +04:00
|
|
|
static int __must_check __deliver_io(struct kvm_vcpu *vcpu,
|
2013-07-03 17:18:35 +04:00
|
|
|
unsigned long irq_type)
|
2014-07-29 15:45:21 +04:00
|
|
|
{
|
2013-07-03 17:18:35 +04:00
|
|
|
struct list_head *isc_list;
|
|
|
|
struct kvm_s390_float_interrupt *fi;
|
2019-01-31 11:52:38 +03:00
|
|
|
struct kvm_s390_gisa_interrupt *gi = &vcpu->kvm->arch.gisa_int;
|
2013-07-03 17:18:35 +04:00
|
|
|
struct kvm_s390_interrupt_info *inti = NULL;
|
2017-06-12 15:15:19 +03:00
|
|
|
struct kvm_s390_io_info io;
|
|
|
|
u32 isc;
|
2013-07-03 17:18:35 +04:00
|
|
|
int rc = 0;
|
2014-07-29 15:45:21 +04:00
|
|
|
|
2013-07-03 17:18:35 +04:00
|
|
|
fi = &vcpu->kvm->arch.float_int;
|
2014-03-03 13:55:13 +04:00
|
|
|
|
2013-07-03 17:18:35 +04:00
|
|
|
spin_lock(&fi->lock);
|
2017-06-12 15:15:19 +03:00
|
|
|
isc = irq_type_to_isc(irq_type);
|
|
|
|
isc_list = &fi->lists[isc];
|
2013-07-03 17:18:35 +04:00
|
|
|
inti = list_first_entry_or_null(isc_list,
|
|
|
|
struct kvm_s390_interrupt_info,
|
|
|
|
list);
|
|
|
|
if (inti) {
|
2016-06-07 10:37:17 +03:00
|
|
|
if (inti->type & KVM_S390_INT_IO_AI_MASK)
|
|
|
|
VCPU_EVENT(vcpu, 4, "%s", "deliver: I/O (AI)");
|
|
|
|
else
|
|
|
|
VCPU_EVENT(vcpu, 4, "deliver: I/O %x ss %x schid %04x",
|
|
|
|
inti->io.subchannel_id >> 8,
|
|
|
|
inti->io.subchannel_id >> 1 & 0x3,
|
|
|
|
inti->io.subchannel_nr);
|
|
|
|
|
2018-03-08 15:48:05 +03:00
|
|
|
vcpu->stat.deliver_io++;
|
2013-07-03 17:18:35 +04:00
|
|
|
trace_kvm_s390_deliver_interrupt(vcpu->vcpu_id,
|
|
|
|
inti->type,
|
|
|
|
((__u32)inti->io.subchannel_id << 16) |
|
|
|
|
inti->io.subchannel_nr,
|
|
|
|
((__u64)inti->io.io_int_parm << 32) |
|
|
|
|
inti->io.io_int_word);
|
|
|
|
list_del(&inti->list);
|
|
|
|
fi->counters[FIRQ_CNTR_IO] -= 1;
|
|
|
|
}
|
|
|
|
if (list_empty(isc_list))
|
|
|
|
clear_bit(irq_type, &fi->pending_irqs);
|
|
|
|
spin_unlock(&fi->lock);
|
|
|
|
|
|
|
|
if (inti) {
|
2017-06-12 15:15:19 +03:00
|
|
|
rc = __do_deliver_io(vcpu, &(inti->io));
|
2013-07-03 17:18:35 +04:00
|
|
|
kfree(inti);
|
2017-06-12 15:15:19 +03:00
|
|
|
goto out;
|
2013-07-03 17:18:35 +04:00
|
|
|
}
|
2014-07-29 17:11:49 +04:00
|
|
|
|
2019-01-31 11:52:38 +03:00
|
|
|
if (gi->origin && gisa_tac_ipm_gisc(gi->origin, isc)) {
|
2017-06-12 15:15:19 +03:00
|
|
|
/*
|
|
|
|
* in case an adapter interrupt was not delivered
|
|
|
|
* in SIE context KVM will handle the delivery
|
|
|
|
*/
|
|
|
|
VCPU_EVENT(vcpu, 4, "%s isc %u", "deliver: I/O (AI/gisa)", isc);
|
|
|
|
memset(&io, 0, sizeof(io));
|
2017-08-31 12:10:28 +03:00
|
|
|
io.io_int_word = isc_to_int_word(isc);
|
2018-03-08 15:48:05 +03:00
|
|
|
vcpu->stat.deliver_io++;
|
2017-06-12 15:15:19 +03:00
|
|
|
trace_kvm_s390_deliver_interrupt(vcpu->vcpu_id,
|
|
|
|
KVM_S390_INT_IO(1, 0, 0, 0),
|
|
|
|
((__u32)io.subchannel_id << 16) |
|
|
|
|
io.subchannel_nr,
|
|
|
|
((__u64)io.io_int_parm << 32) |
|
|
|
|
io.io_int_word);
|
|
|
|
rc = __do_deliver_io(vcpu, &io);
|
|
|
|
}
|
|
|
|
out:
|
|
|
|
return rc;
|
2014-07-29 17:11:49 +04:00
|
|
|
}
|
|
|
|
|
2014-10-14 17:29:30 +04:00
|
|
|
/* Check whether an external call is pending (deliverable or not) */
|
|
|
|
int kvm_s390_ext_call_pending(struct kvm_vcpu *vcpu)
|
2014-02-21 11:59:59 +04:00
|
|
|
{
|
2014-10-14 17:29:30 +04:00
|
|
|
struct kvm_s390_local_interrupt *li = &vcpu->arch.local_int;
|
2014-02-21 11:59:59 +04:00
|
|
|
|
2015-05-06 14:18:59 +03:00
|
|
|
if (!sclp.has_sigpif)
|
2014-10-14 17:29:30 +04:00
|
|
|
return test_bit(IRQ_PEND_EXT_EXTERNAL, &li->pending_irqs);
|
2014-02-21 11:59:59 +04:00
|
|
|
|
2015-04-21 16:10:10 +03:00
|
|
|
return sca_ext_call_pending(vcpu, NULL);
|
2014-02-21 11:59:59 +04:00
|
|
|
}
|
|
|
|
|
2014-08-05 19:40:47 +04:00
|
|
|
int kvm_s390_vcpu_has_irq(struct kvm_vcpu *vcpu, int exclude_stop)
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
{
|
2015-05-06 14:51:29 +03:00
|
|
|
if (deliverable_irqs(vcpu))
|
|
|
|
return 1;
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
|
2015-05-06 14:51:29 +03:00
|
|
|
if (kvm_cpu_has_pending_timer(vcpu))
|
|
|
|
return 1;
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
|
2014-10-14 17:29:30 +04:00
|
|
|
/* external call pending and deliverable */
|
2015-05-06 14:51:29 +03:00
|
|
|
if (kvm_s390_ext_call_pending(vcpu) &&
|
2014-10-14 17:29:30 +04:00
|
|
|
!psw_extint_disabled(vcpu) &&
|
2018-04-30 18:55:24 +03:00
|
|
|
(vcpu->arch.sie_block->gcr[0] & CR0_EXTERNAL_CALL_SUBMASK))
|
2015-05-06 14:51:29 +03:00
|
|
|
return 1;
|
2014-02-21 11:59:59 +04:00
|
|
|
|
2015-05-06 14:51:29 +03:00
|
|
|
if (!exclude_stop && kvm_s390_is_stop_irq_pending(vcpu))
|
|
|
|
return 1;
|
|
|
|
return 0;
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
}
|
|
|
|
|
2008-04-11 21:53:26 +04:00
|
|
|
int kvm_cpu_has_pending_timer(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
2014-12-01 17:55:42 +03:00
|
|
|
return ckc_irq_pending(vcpu) || cpu_timer_irq_pending(vcpu);
|
2008-04-11 21:53:26 +04:00
|
|
|
}
|
|
|
|
|
2016-02-22 16:14:50 +03:00
|
|
|
static u64 __calculate_sltime(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
2018-02-07 14:46:42 +03:00
|
|
|
const u64 now = kvm_s390_get_tod_clock_fast(vcpu->kvm);
|
|
|
|
const u64 ckc = vcpu->arch.sie_block->ckc;
|
|
|
|
u64 cputm, sltime = 0;
|
2016-02-22 16:14:50 +03:00
|
|
|
|
|
|
|
if (ckc_interrupts_enabled(vcpu)) {
|
2018-04-30 18:55:24 +03:00
|
|
|
if (vcpu->arch.sie_block->gcr[0] & CR0_CLOCK_COMPARATOR_SIGN) {
|
2018-02-07 14:46:42 +03:00
|
|
|
if ((s64)now < (s64)ckc)
|
|
|
|
sltime = tod_to_ns((s64)ckc - (s64)now);
|
|
|
|
} else if (now < ckc) {
|
|
|
|
sltime = tod_to_ns(ckc - now);
|
|
|
|
}
|
|
|
|
/* already expired */
|
|
|
|
if (!sltime)
|
2016-02-22 16:14:50 +03:00
|
|
|
return 0;
|
|
|
|
if (cpu_timer_interrupts_enabled(vcpu)) {
|
|
|
|
cputm = kvm_s390_get_cpu_timer(vcpu);
|
|
|
|
/* already expired? */
|
|
|
|
if (cputm >> 63)
|
|
|
|
return 0;
|
|
|
|
return min(sltime, tod_to_ns(cputm));
|
|
|
|
}
|
|
|
|
} else if (cpu_timer_interrupts_enabled(vcpu)) {
|
|
|
|
sltime = kvm_s390_get_cpu_timer(vcpu);
|
|
|
|
/* already expired? */
|
|
|
|
if (sltime >> 63)
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
return sltime;
|
|
|
|
}
|
|
|
|
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
int kvm_s390_handle_wait(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
2019-01-31 11:52:44 +03:00
|
|
|
struct kvm_s390_gisa_interrupt *gi = &vcpu->kvm->arch.gisa_int;
|
2016-02-22 16:14:50 +03:00
|
|
|
u64 sltime;
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
|
|
|
|
vcpu->stat.exit_wait_state++;
|
|
|
|
|
2014-05-13 18:54:32 +04:00
|
|
|
/* fast path */
|
2015-09-23 13:25:15 +03:00
|
|
|
if (kvm_arch_vcpu_runnable(vcpu))
|
2014-05-13 18:54:32 +04:00
|
|
|
return 0;
|
2008-05-21 15:37:44 +04:00
|
|
|
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
if (psw_interrupts_disabled(vcpu)) {
|
|
|
|
VCPU_EVENT(vcpu, 3, "%s", "disabled wait");
|
2010-02-27 00:37:41 +03:00
|
|
|
return -EOPNOTSUPP; /* disabled wait */
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
}
|
|
|
|
|
2019-01-31 11:52:44 +03:00
|
|
|
if (gi->origin &&
|
|
|
|
(gisa_get_ipm_or_restore_iam(gi) &
|
|
|
|
vcpu->arch.sie_block->gcr[6] >> 24))
|
|
|
|
return 0;
|
|
|
|
|
2016-02-22 16:14:50 +03:00
|
|
|
if (!ckc_interrupts_enabled(vcpu) &&
|
|
|
|
!cpu_timer_interrupts_enabled(vcpu)) {
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
VCPU_EVENT(vcpu, 3, "%s", "enabled wait w/o timer");
|
2014-12-12 14:26:40 +03:00
|
|
|
__set_cpu_idle(vcpu);
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
goto no_timer;
|
|
|
|
}
|
|
|
|
|
2016-02-22 16:14:50 +03:00
|
|
|
sltime = __calculate_sltime(vcpu);
|
|
|
|
if (!sltime)
|
2014-12-12 14:26:40 +03:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
__set_cpu_idle(vcpu);
|
2016-12-25 14:30:41 +03:00
|
|
|
hrtimer_start(&vcpu->arch.ckc_timer, sltime, HRTIMER_MODE_REL);
|
2016-02-22 16:14:50 +03:00
|
|
|
VCPU_EVENT(vcpu, 4, "enabled wait: %llu ns", sltime);
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
no_timer:
|
2013-09-12 12:33:45 +04:00
|
|
|
srcu_read_unlock(&vcpu->kvm->srcu, vcpu->srcu_idx);
|
2014-05-13 18:54:32 +04:00
|
|
|
kvm_vcpu_block(vcpu);
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
__unset_cpu_idle(vcpu);
|
2013-09-12 12:33:45 +04:00
|
|
|
vcpu->srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
|
|
|
|
|
2014-12-11 12:18:01 +03:00
|
|
|
hrtimer_cancel(&vcpu->arch.ckc_timer);
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-05-16 13:59:46 +04:00
|
|
|
void kvm_s390_vcpu_wakeup(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
2016-05-13 13:16:35 +03:00
|
|
|
vcpu->valid_wakeup = true;
|
2019-07-18 14:39:07 +03:00
|
|
|
kvm_vcpu_wake_up(vcpu);
|
|
|
|
|
2017-09-19 13:34:06 +03:00
|
|
|
/*
|
2019-07-18 14:39:07 +03:00
|
|
|
* The VCPU might not be sleeping but rather executing VSIE. Let's
|
2016-05-27 23:03:52 +03:00
|
|
|
* kick it, so it leaves the SIE to process the request.
|
|
|
|
*/
|
|
|
|
kvm_s390_vsie_kick(vcpu);
|
2014-05-16 13:59:46 +04:00
|
|
|
}
|
|
|
|
|
2009-05-12 19:21:49 +04:00
|
|
|
enum hrtimer_restart kvm_s390_idle_wakeup(struct hrtimer *timer)
|
|
|
|
{
|
|
|
|
struct kvm_vcpu *vcpu;
|
2016-02-22 16:14:50 +03:00
|
|
|
u64 sltime;
|
2009-05-12 19:21:49 +04:00
|
|
|
|
|
|
|
vcpu = container_of(timer, struct kvm_vcpu, arch.ckc_timer);
|
2016-02-22 16:14:50 +03:00
|
|
|
sltime = __calculate_sltime(vcpu);
|
2009-05-12 19:21:49 +04:00
|
|
|
|
2014-12-11 12:18:01 +03:00
|
|
|
/*
|
|
|
|
* If the monotonic clock runs faster than the tod clock we might be
|
|
|
|
* woken up too early and have to go back to sleep to avoid deadlocks.
|
|
|
|
*/
|
2016-02-22 16:14:50 +03:00
|
|
|
if (sltime && hrtimer_forward_now(timer, ns_to_ktime(sltime)))
|
2014-12-11 12:18:01 +03:00
|
|
|
return HRTIMER_RESTART;
|
|
|
|
kvm_s390_vcpu_wakeup(vcpu);
|
2009-05-12 19:21:49 +04:00
|
|
|
return HRTIMER_NORESTART;
|
|
|
|
}
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
|
2014-02-11 16:48:07 +04:00
|
|
|
void kvm_s390_clear_local_irqs(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
struct kvm_s390_local_interrupt *li = &vcpu->arch.local_int;
|
|
|
|
|
2014-05-16 12:23:53 +04:00
|
|
|
spin_lock(&li->lock);
|
2014-07-29 17:11:49 +04:00
|
|
|
li->pending_irqs = 0;
|
|
|
|
bitmap_zero(li->sigp_emerg_pending, KVM_MAX_VCPUS);
|
|
|
|
memset(&li->irq, 0, sizeof(li->irq));
|
2014-05-16 12:23:53 +04:00
|
|
|
spin_unlock(&li->lock);
|
2014-02-21 11:59:59 +04:00
|
|
|
|
2015-04-21 16:10:10 +03:00
|
|
|
sca_clear_ext_call(vcpu);
|
2014-02-11 16:48:07 +04:00
|
|
|
}
|
|
|
|
|
2014-08-25 14:27:29 +04:00
|
|
|
int __must_check kvm_s390_deliver_pending_interrupts(struct kvm_vcpu *vcpu)
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
{
|
2008-06-27 17:05:40 +04:00
|
|
|
struct kvm_s390_local_interrupt *li = &vcpu->arch.local_int;
|
2014-04-17 12:10:30 +04:00
|
|
|
int rc = 0;
|
2014-07-29 17:11:49 +04:00
|
|
|
unsigned long irq_type;
|
2013-07-03 17:18:35 +04:00
|
|
|
unsigned long irqs;
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
|
|
|
|
__reset_intercept_indicators(vcpu);
|
|
|
|
|
2014-07-29 17:11:49 +04:00
|
|
|
/* pending ckc conditions might have been invalidated */
|
|
|
|
clear_bit(IRQ_PEND_EXT_CLOCK_COMP, &li->pending_irqs);
|
2014-12-01 17:55:42 +03:00
|
|
|
if (ckc_irq_pending(vcpu))
|
2014-07-29 17:11:49 +04:00
|
|
|
set_bit(IRQ_PEND_EXT_CLOCK_COMP, &li->pending_irqs);
|
|
|
|
|
2014-12-01 17:55:42 +03:00
|
|
|
/* pending cpu timer conditions might have been invalidated */
|
|
|
|
clear_bit(IRQ_PEND_EXT_CPU_TIMER, &li->pending_irqs);
|
|
|
|
if (cpu_timer_irq_pending(vcpu))
|
|
|
|
set_bit(IRQ_PEND_EXT_CPU_TIMER, &li->pending_irqs);
|
|
|
|
|
2015-04-17 11:21:04 +03:00
|
|
|
while ((irqs = deliverable_irqs(vcpu)) && !rc) {
|
2017-06-29 19:39:27 +03:00
|
|
|
/* bits are in the reverse order of interrupt priority */
|
|
|
|
irq_type = find_last_bit(&irqs, IRQ_PEND_COUNT);
|
2018-02-06 17:17:43 +03:00
|
|
|
switch (irq_type) {
|
|
|
|
case IRQ_PEND_IO_ISC_0:
|
|
|
|
case IRQ_PEND_IO_ISC_1:
|
|
|
|
case IRQ_PEND_IO_ISC_2:
|
|
|
|
case IRQ_PEND_IO_ISC_3:
|
|
|
|
case IRQ_PEND_IO_ISC_4:
|
|
|
|
case IRQ_PEND_IO_ISC_5:
|
|
|
|
case IRQ_PEND_IO_ISC_6:
|
|
|
|
case IRQ_PEND_IO_ISC_7:
|
2013-07-03 17:18:35 +04:00
|
|
|
rc = __deliver_io(vcpu, irq_type);
|
2018-02-06 17:17:43 +03:00
|
|
|
break;
|
|
|
|
case IRQ_PEND_MCHK_EX:
|
|
|
|
case IRQ_PEND_MCHK_REP:
|
|
|
|
rc = __deliver_machine_check(vcpu);
|
|
|
|
break;
|
|
|
|
case IRQ_PEND_PROG:
|
|
|
|
rc = __deliver_prog(vcpu);
|
|
|
|
break;
|
|
|
|
case IRQ_PEND_EXT_EMERGENCY:
|
|
|
|
rc = __deliver_emergency_signal(vcpu);
|
|
|
|
break;
|
|
|
|
case IRQ_PEND_EXT_EXTERNAL:
|
|
|
|
rc = __deliver_external_call(vcpu);
|
|
|
|
break;
|
|
|
|
case IRQ_PEND_EXT_CLOCK_COMP:
|
|
|
|
rc = __deliver_ckc(vcpu);
|
|
|
|
break;
|
|
|
|
case IRQ_PEND_EXT_CPU_TIMER:
|
|
|
|
rc = __deliver_cpu_timer(vcpu);
|
|
|
|
break;
|
|
|
|
case IRQ_PEND_RESTART:
|
|
|
|
rc = __deliver_restart(vcpu);
|
|
|
|
break;
|
|
|
|
case IRQ_PEND_SET_PREFIX:
|
|
|
|
rc = __deliver_set_prefix(vcpu);
|
|
|
|
break;
|
|
|
|
case IRQ_PEND_PFAULT_INIT:
|
|
|
|
rc = __deliver_pfault_init(vcpu);
|
|
|
|
break;
|
|
|
|
case IRQ_PEND_EXT_SERVICE:
|
|
|
|
rc = __deliver_service(vcpu);
|
|
|
|
break;
|
|
|
|
case IRQ_PEND_PFAULT_DONE:
|
|
|
|
rc = __deliver_pfault_done(vcpu);
|
|
|
|
break;
|
|
|
|
case IRQ_PEND_VIRTIO:
|
|
|
|
rc = __deliver_virtio(vcpu);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
WARN_ONCE(1, "Unknown pending irq type %ld", irq_type);
|
|
|
|
clear_bit(irq_type, &li->pending_irqs);
|
2014-07-29 17:11:49 +04:00
|
|
|
}
|
2015-04-17 11:21:04 +03:00
|
|
|
}
|
2014-07-29 17:11:49 +04:00
|
|
|
|
2013-07-03 17:18:35 +04:00
|
|
|
set_intercept_indicators(vcpu);
|
2014-04-17 12:10:30 +04:00
|
|
|
|
|
|
|
return rc;
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
}
|
|
|
|
|
2014-07-29 17:11:49 +04:00
|
|
|
static int __inject_prog(struct kvm_vcpu *vcpu, struct kvm_s390_irq *irq)
|
2014-07-28 17:37:58 +04:00
|
|
|
{
|
|
|
|
struct kvm_s390_local_interrupt *li = &vcpu->arch.local_int;
|
|
|
|
|
2018-03-08 15:48:05 +03:00
|
|
|
vcpu->stat.inject_program++;
|
2015-07-20 11:33:03 +03:00
|
|
|
VCPU_EVENT(vcpu, 3, "inject: program irq code 0x%x", irq->u.pgm.code);
|
|
|
|
trace_kvm_s390_inject_vcpu(vcpu->vcpu_id, KVM_S390_PROGRAM_INT,
|
|
|
|
irq->u.pgm.code, 0);
|
|
|
|
|
2015-11-04 18:33:33 +03:00
|
|
|
if (!(irq->u.pgm.flags & KVM_S390_PGM_FLAGS_ILC_VALID)) {
|
|
|
|
/* auto detection if no valid ILC was given */
|
|
|
|
irq->u.pgm.flags &= ~KVM_S390_PGM_FLAGS_ILC_MASK;
|
|
|
|
irq->u.pgm.flags |= kvm_s390_get_ilen(vcpu);
|
|
|
|
irq->u.pgm.flags |= KVM_S390_PGM_FLAGS_ILC_VALID;
|
|
|
|
}
|
|
|
|
|
2015-05-04 13:38:48 +03:00
|
|
|
if (irq->u.pgm.code == PGM_PER) {
|
|
|
|
li->irq.pgm.code |= PGM_PER;
|
2015-11-04 18:33:33 +03:00
|
|
|
li->irq.pgm.flags = irq->u.pgm.flags;
|
2015-05-04 13:38:48 +03:00
|
|
|
/* only modify PER related information */
|
|
|
|
li->irq.pgm.per_address = irq->u.pgm.per_address;
|
|
|
|
li->irq.pgm.per_code = irq->u.pgm.per_code;
|
|
|
|
li->irq.pgm.per_atmid = irq->u.pgm.per_atmid;
|
|
|
|
li->irq.pgm.per_access_id = irq->u.pgm.per_access_id;
|
|
|
|
} else if (!(irq->u.pgm.code & PGM_PER)) {
|
|
|
|
li->irq.pgm.code = (li->irq.pgm.code & PGM_PER) |
|
|
|
|
irq->u.pgm.code;
|
2015-11-04 18:33:33 +03:00
|
|
|
li->irq.pgm.flags = irq->u.pgm.flags;
|
2015-05-04 13:38:48 +03:00
|
|
|
/* only modify non-PER information */
|
|
|
|
li->irq.pgm.trans_exc_code = irq->u.pgm.trans_exc_code;
|
|
|
|
li->irq.pgm.mon_code = irq->u.pgm.mon_code;
|
|
|
|
li->irq.pgm.data_exc_code = irq->u.pgm.data_exc_code;
|
|
|
|
li->irq.pgm.mon_class_nr = irq->u.pgm.mon_class_nr;
|
|
|
|
li->irq.pgm.exc_access_id = irq->u.pgm.exc_access_id;
|
|
|
|
li->irq.pgm.op_access_id = irq->u.pgm.op_access_id;
|
|
|
|
} else {
|
|
|
|
li->irq.pgm = irq->u.pgm;
|
|
|
|
}
|
2014-12-01 18:43:40 +03:00
|
|
|
set_bit(IRQ_PEND_PROG, &li->pending_irqs);
|
2014-07-28 17:37:58 +04:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-07-29 17:11:49 +04:00
|
|
|
static int __inject_pfault_init(struct kvm_vcpu *vcpu, struct kvm_s390_irq *irq)
|
2014-07-28 17:37:58 +04:00
|
|
|
{
|
|
|
|
struct kvm_s390_local_interrupt *li = &vcpu->arch.local_int;
|
|
|
|
|
2018-03-08 15:48:05 +03:00
|
|
|
vcpu->stat.inject_pfault_init++;
|
2015-07-09 15:08:18 +03:00
|
|
|
VCPU_EVENT(vcpu, 4, "inject: pfault init parameter block at 0x%llx",
|
|
|
|
irq->u.ext.ext_params2);
|
2014-07-29 17:11:49 +04:00
|
|
|
trace_kvm_s390_inject_vcpu(vcpu->vcpu_id, KVM_S390_INT_PFAULT_INIT,
|
|
|
|
irq->u.ext.ext_params,
|
2015-07-20 11:33:03 +03:00
|
|
|
irq->u.ext.ext_params2);
|
2014-07-29 17:11:49 +04:00
|
|
|
|
|
|
|
li->irq.ext = irq->u.ext;
|
|
|
|
set_bit(IRQ_PEND_PFAULT_INIT, &li->pending_irqs);
|
2018-01-23 20:05:28 +03:00
|
|
|
kvm_s390_set_cpuflags(vcpu, CPUSTAT_EXT_INT);
|
2014-07-28 17:37:58 +04:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-01-15 14:40:42 +03:00
|
|
|
static int __inject_extcall(struct kvm_vcpu *vcpu, struct kvm_s390_irq *irq)
|
2014-07-28 17:37:58 +04:00
|
|
|
{
|
|
|
|
struct kvm_s390_local_interrupt *li = &vcpu->arch.local_int;
|
2014-07-29 17:11:49 +04:00
|
|
|
struct kvm_s390_extcall_info *extcall = &li->irq.extcall;
|
2014-10-14 17:29:30 +04:00
|
|
|
uint16_t src_id = irq->u.extcall.code;
|
2014-07-28 17:37:58 +04:00
|
|
|
|
2018-03-08 15:48:05 +03:00
|
|
|
vcpu->stat.inject_external_call++;
|
2015-07-09 15:08:18 +03:00
|
|
|
VCPU_EVENT(vcpu, 4, "inject: external call source-cpu:%u",
|
2014-10-14 17:29:30 +04:00
|
|
|
src_id);
|
2014-07-29 17:11:49 +04:00
|
|
|
trace_kvm_s390_inject_vcpu(vcpu->vcpu_id, KVM_S390_INT_EXTERNAL_CALL,
|
2015-07-20 11:33:03 +03:00
|
|
|
src_id, 0);
|
2014-10-14 17:29:30 +04:00
|
|
|
|
|
|
|
/* sending vcpu invalid */
|
2015-11-05 11:06:06 +03:00
|
|
|
if (kvm_get_vcpu_by_id(vcpu->kvm, src_id) == NULL)
|
2014-10-14 17:29:30 +04:00
|
|
|
return -EINVAL;
|
|
|
|
|
2015-05-06 14:18:59 +03:00
|
|
|
if (sclp.has_sigpif)
|
2015-04-21 16:10:10 +03:00
|
|
|
return sca_inject_ext_call(vcpu, src_id);
|
2014-07-29 17:11:49 +04:00
|
|
|
|
2015-04-30 14:33:59 +03:00
|
|
|
if (test_and_set_bit(IRQ_PEND_EXT_EXTERNAL, &li->pending_irqs))
|
2014-10-14 17:29:30 +04:00
|
|
|
return -EBUSY;
|
2014-07-29 17:11:49 +04:00
|
|
|
*extcall = irq->u.extcall;
|
2018-01-23 20:05:28 +03:00
|
|
|
kvm_s390_set_cpuflags(vcpu, CPUSTAT_EXT_INT);
|
2014-07-28 17:37:58 +04:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-07-29 17:11:49 +04:00
|
|
|
static int __inject_set_prefix(struct kvm_vcpu *vcpu, struct kvm_s390_irq *irq)
|
2014-07-28 17:37:58 +04:00
|
|
|
{
|
|
|
|
struct kvm_s390_local_interrupt *li = &vcpu->arch.local_int;
|
2014-07-29 17:11:49 +04:00
|
|
|
struct kvm_s390_prefix_info *prefix = &li->irq.prefix;
|
2014-07-28 17:37:58 +04:00
|
|
|
|
2018-03-08 15:48:05 +03:00
|
|
|
vcpu->stat.inject_set_prefix++;
|
2015-07-20 11:33:03 +03:00
|
|
|
VCPU_EVENT(vcpu, 3, "inject: set prefix to %x",
|
2014-12-18 17:52:21 +03:00
|
|
|
irq->u.prefix.address);
|
2014-07-29 17:11:49 +04:00
|
|
|
trace_kvm_s390_inject_vcpu(vcpu->vcpu_id, KVM_S390_SIGP_SET_PREFIX,
|
2015-07-20 11:33:03 +03:00
|
|
|
irq->u.prefix.address, 0);
|
2014-07-29 17:11:49 +04:00
|
|
|
|
2014-10-14 11:44:55 +04:00
|
|
|
if (!is_vcpu_stopped(vcpu))
|
|
|
|
return -EBUSY;
|
|
|
|
|
2014-07-29 17:11:49 +04:00
|
|
|
*prefix = irq->u.prefix;
|
|
|
|
set_bit(IRQ_PEND_SET_PREFIX, &li->pending_irqs);
|
2014-07-28 17:37:58 +04:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-10-15 18:48:53 +04:00
|
|
|
#define KVM_S390_STOP_SUPP_FLAGS (KVM_S390_STOP_FLAG_STORE_STATUS)
|
2014-07-29 17:11:49 +04:00
|
|
|
static int __inject_sigp_stop(struct kvm_vcpu *vcpu, struct kvm_s390_irq *irq)
|
2014-07-28 17:37:58 +04:00
|
|
|
{
|
|
|
|
struct kvm_s390_local_interrupt *li = &vcpu->arch.local_int;
|
2014-10-15 18:48:16 +04:00
|
|
|
struct kvm_s390_stop_info *stop = &li->irq.stop;
|
2014-10-15 18:48:53 +04:00
|
|
|
int rc = 0;
|
2014-07-28 17:37:58 +04:00
|
|
|
|
2018-03-08 15:48:05 +03:00
|
|
|
vcpu->stat.inject_stop_signal++;
|
2015-07-20 11:33:03 +03:00
|
|
|
trace_kvm_s390_inject_vcpu(vcpu->vcpu_id, KVM_S390_SIGP_STOP, 0, 0);
|
2014-07-29 17:11:49 +04:00
|
|
|
|
2014-10-15 18:48:16 +04:00
|
|
|
if (irq->u.stop.flags & ~KVM_S390_STOP_SUPP_FLAGS)
|
|
|
|
return -EINVAL;
|
|
|
|
|
2014-10-15 18:48:53 +04:00
|
|
|
if (is_vcpu_stopped(vcpu)) {
|
|
|
|
if (irq->u.stop.flags & KVM_S390_STOP_FLAG_STORE_STATUS)
|
|
|
|
rc = kvm_s390_store_status_unloaded(vcpu,
|
|
|
|
KVM_S390_STORE_STATUS_NOADDR);
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (test_and_set_bit(IRQ_PEND_SIGP_STOP, &li->pending_irqs))
|
|
|
|
return -EBUSY;
|
2014-10-15 18:48:16 +04:00
|
|
|
stop->flags = irq->u.stop.flags;
|
2018-01-23 20:05:28 +03:00
|
|
|
kvm_s390_set_cpuflags(vcpu, CPUSTAT_STOP_INT);
|
2014-07-28 17:37:58 +04:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-09-12 10:02:50 +03:00
|
|
|
static int __inject_sigp_restart(struct kvm_vcpu *vcpu)
|
2014-07-28 17:37:58 +04:00
|
|
|
{
|
|
|
|
struct kvm_s390_local_interrupt *li = &vcpu->arch.local_int;
|
|
|
|
|
2018-03-08 15:48:05 +03:00
|
|
|
vcpu->stat.inject_restart++;
|
2015-07-09 15:08:18 +03:00
|
|
|
VCPU_EVENT(vcpu, 3, "%s", "inject: restart int");
|
2015-07-20 11:33:03 +03:00
|
|
|
trace_kvm_s390_inject_vcpu(vcpu->vcpu_id, KVM_S390_RESTART, 0, 0);
|
2014-07-29 17:11:49 +04:00
|
|
|
|
|
|
|
set_bit(IRQ_PEND_RESTART, &li->pending_irqs);
|
2014-07-28 17:37:58 +04:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int __inject_sigp_emergency(struct kvm_vcpu *vcpu,
|
2014-07-29 17:11:49 +04:00
|
|
|
struct kvm_s390_irq *irq)
|
2014-07-28 17:37:58 +04:00
|
|
|
{
|
|
|
|
struct kvm_s390_local_interrupt *li = &vcpu->arch.local_int;
|
|
|
|
|
2018-03-08 15:48:05 +03:00
|
|
|
vcpu->stat.inject_emergency_signal++;
|
2015-07-09 15:08:18 +03:00
|
|
|
VCPU_EVENT(vcpu, 4, "inject: emergency from cpu %u",
|
2014-07-29 17:11:49 +04:00
|
|
|
irq->u.emerg.code);
|
|
|
|
trace_kvm_s390_inject_vcpu(vcpu->vcpu_id, KVM_S390_INT_EMERGENCY,
|
2015-07-20 11:33:03 +03:00
|
|
|
irq->u.emerg.code, 0);
|
2014-07-29 17:11:49 +04:00
|
|
|
|
2015-11-05 11:38:15 +03:00
|
|
|
/* sending vcpu invalid */
|
|
|
|
if (kvm_get_vcpu_by_id(vcpu->kvm, irq->u.emerg.code) == NULL)
|
|
|
|
return -EINVAL;
|
|
|
|
|
2014-12-18 17:48:14 +03:00
|
|
|
set_bit(irq->u.emerg.code, li->sigp_emerg_pending);
|
2014-07-29 17:11:49 +04:00
|
|
|
set_bit(IRQ_PEND_EXT_EMERGENCY, &li->pending_irqs);
|
2018-01-23 20:05:28 +03:00
|
|
|
kvm_s390_set_cpuflags(vcpu, CPUSTAT_EXT_INT);
|
2014-07-28 17:37:58 +04:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-07-29 17:11:49 +04:00
|
|
|
static int __inject_mchk(struct kvm_vcpu *vcpu, struct kvm_s390_irq *irq)
|
2014-07-28 17:37:58 +04:00
|
|
|
{
|
|
|
|
struct kvm_s390_local_interrupt *li = &vcpu->arch.local_int;
|
2014-07-29 17:11:49 +04:00
|
|
|
struct kvm_s390_mchk_info *mchk = &li->irq.mchk;
|
2014-07-28 17:37:58 +04:00
|
|
|
|
2018-03-08 15:48:05 +03:00
|
|
|
vcpu->stat.inject_mchk++;
|
2015-07-09 15:08:18 +03:00
|
|
|
VCPU_EVENT(vcpu, 3, "inject: machine check mcic 0x%llx",
|
2014-12-18 17:52:21 +03:00
|
|
|
irq->u.mchk.mcic);
|
2014-07-29 17:11:49 +04:00
|
|
|
trace_kvm_s390_inject_vcpu(vcpu->vcpu_id, KVM_S390_MCHK, 0,
|
2015-07-20 11:33:03 +03:00
|
|
|
irq->u.mchk.mcic);
|
2014-07-29 17:11:49 +04:00
|
|
|
|
|
|
|
/*
|
2014-08-13 12:09:04 +04:00
|
|
|
* Because repressible machine checks can be indicated along with
|
|
|
|
* exigent machine checks (PoP, Chapter 11, Interruption action)
|
|
|
|
* we need to combine cr14, mcic and external damage code.
|
|
|
|
* Failing storage address and the logout area should not be or'ed
|
|
|
|
* together, we just indicate the last occurrence of the corresponding
|
|
|
|
* machine check
|
2014-07-29 17:11:49 +04:00
|
|
|
*/
|
2014-08-13 12:09:04 +04:00
|
|
|
mchk->cr14 |= irq->u.mchk.cr14;
|
2014-07-29 17:11:49 +04:00
|
|
|
mchk->mcic |= irq->u.mchk.mcic;
|
2014-08-13 12:09:04 +04:00
|
|
|
mchk->ext_damage_code |= irq->u.mchk.ext_damage_code;
|
|
|
|
mchk->failing_storage_address = irq->u.mchk.failing_storage_address;
|
|
|
|
memcpy(&mchk->fixed_logout, &irq->u.mchk.fixed_logout,
|
|
|
|
sizeof(mchk->fixed_logout));
|
2014-07-29 17:11:49 +04:00
|
|
|
if (mchk->mcic & MCHK_EX_MASK)
|
|
|
|
set_bit(IRQ_PEND_MCHK_EX, &li->pending_irqs);
|
|
|
|
else if (mchk->mcic & MCHK_REP_MASK)
|
|
|
|
set_bit(IRQ_PEND_MCHK_REP, &li->pending_irqs);
|
2014-07-28 17:37:58 +04:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-07-29 17:11:49 +04:00
|
|
|
static int __inject_ckc(struct kvm_vcpu *vcpu)
|
2014-07-28 17:37:58 +04:00
|
|
|
{
|
|
|
|
struct kvm_s390_local_interrupt *li = &vcpu->arch.local_int;
|
|
|
|
|
2018-03-08 15:48:05 +03:00
|
|
|
vcpu->stat.inject_ckc++;
|
2015-07-09 15:08:18 +03:00
|
|
|
VCPU_EVENT(vcpu, 3, "%s", "inject: clock comparator external");
|
2014-07-29 17:11:49 +04:00
|
|
|
trace_kvm_s390_inject_vcpu(vcpu->vcpu_id, KVM_S390_INT_CLOCK_COMP,
|
2015-07-20 11:33:03 +03:00
|
|
|
0, 0);
|
2014-07-29 17:11:49 +04:00
|
|
|
|
|
|
|
set_bit(IRQ_PEND_EXT_CLOCK_COMP, &li->pending_irqs);
|
2018-01-23 20:05:28 +03:00
|
|
|
kvm_s390_set_cpuflags(vcpu, CPUSTAT_EXT_INT);
|
2014-07-28 17:37:58 +04:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-07-29 17:11:49 +04:00
|
|
|
static int __inject_cpu_timer(struct kvm_vcpu *vcpu)
|
2014-07-28 17:37:58 +04:00
|
|
|
{
|
|
|
|
struct kvm_s390_local_interrupt *li = &vcpu->arch.local_int;
|
|
|
|
|
2018-03-08 15:48:05 +03:00
|
|
|
vcpu->stat.inject_cputm++;
|
2015-07-09 15:08:18 +03:00
|
|
|
VCPU_EVENT(vcpu, 3, "%s", "inject: cpu timer external");
|
2014-07-29 17:11:49 +04:00
|
|
|
trace_kvm_s390_inject_vcpu(vcpu->vcpu_id, KVM_S390_INT_CPU_TIMER,
|
2015-07-20 11:33:03 +03:00
|
|
|
0, 0);
|
2014-07-29 17:11:49 +04:00
|
|
|
|
|
|
|
set_bit(IRQ_PEND_EXT_CPU_TIMER, &li->pending_irqs);
|
2018-01-23 20:05:28 +03:00
|
|
|
kvm_s390_set_cpuflags(vcpu, CPUSTAT_EXT_INT);
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-07-03 17:18:35 +04:00
|
|
|
static struct kvm_s390_interrupt_info *get_io_int(struct kvm *kvm,
|
|
|
|
int isc, u32 schid)
|
|
|
|
{
|
|
|
|
struct kvm_s390_float_interrupt *fi = &kvm->arch.float_int;
|
|
|
|
struct list_head *isc_list = &fi->lists[FIRQ_LIST_IO_ISC_0 + isc];
|
|
|
|
struct kvm_s390_interrupt_info *iter;
|
|
|
|
u16 id = (schid & 0xffff0000U) >> 16;
|
|
|
|
u16 nr = schid & 0x0000ffffU;
|
|
|
|
|
|
|
|
spin_lock(&fi->lock);
|
|
|
|
list_for_each_entry(iter, isc_list, list) {
|
|
|
|
if (schid && (id != iter->io.subchannel_id ||
|
|
|
|
nr != iter->io.subchannel_nr))
|
|
|
|
continue;
|
|
|
|
/* found an appropriate entry */
|
|
|
|
list_del_init(&iter->list);
|
|
|
|
fi->counters[FIRQ_CNTR_IO] -= 1;
|
|
|
|
if (list_empty(isc_list))
|
2017-07-03 16:32:50 +03:00
|
|
|
clear_bit(isc_to_irq_type(isc), &fi->pending_irqs);
|
2013-07-03 17:18:35 +04:00
|
|
|
spin_unlock(&fi->lock);
|
|
|
|
return iter;
|
|
|
|
}
|
|
|
|
spin_unlock(&fi->lock);
|
|
|
|
return NULL;
|
|
|
|
}
|
2014-07-29 17:11:49 +04:00
|
|
|
|
2017-07-07 16:27:31 +03:00
|
|
|
static struct kvm_s390_interrupt_info *get_top_io_int(struct kvm *kvm,
|
|
|
|
u64 isc_mask, u32 schid)
|
|
|
|
{
|
|
|
|
struct kvm_s390_interrupt_info *inti = NULL;
|
|
|
|
int isc;
|
|
|
|
|
|
|
|
for (isc = 0; isc <= MAX_ISC && !inti; isc++) {
|
|
|
|
if (isc_mask & isc_to_isc_bits(isc))
|
|
|
|
inti = get_io_int(kvm, isc, schid);
|
|
|
|
}
|
|
|
|
return inti;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int get_top_gisa_isc(struct kvm *kvm, u64 isc_mask, u32 schid)
|
|
|
|
{
|
2019-01-31 11:52:38 +03:00
|
|
|
struct kvm_s390_gisa_interrupt *gi = &kvm->arch.gisa_int;
|
2017-07-07 16:27:31 +03:00
|
|
|
unsigned long active_mask;
|
|
|
|
int isc;
|
|
|
|
|
|
|
|
if (schid)
|
|
|
|
goto out;
|
2019-01-31 11:52:38 +03:00
|
|
|
if (!gi->origin)
|
2017-07-07 16:27:31 +03:00
|
|
|
goto out;
|
|
|
|
|
2019-01-31 11:52:38 +03:00
|
|
|
active_mask = (isc_mask & gisa_get_ipm(gi->origin) << 24) << 32;
|
2017-07-07 16:27:31 +03:00
|
|
|
while (active_mask) {
|
|
|
|
isc = __fls(active_mask) ^ (BITS_PER_LONG - 1);
|
2019-01-31 11:52:38 +03:00
|
|
|
if (gisa_tac_ipm_gisc(gi->origin, isc))
|
2017-07-07 16:27:31 +03:00
|
|
|
return isc;
|
|
|
|
clear_bit_inv(isc, &active_mask);
|
|
|
|
}
|
|
|
|
out:
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
2013-07-03 17:18:35 +04:00
|
|
|
/*
|
|
|
|
* Dequeue and return an I/O interrupt matching any of the interruption
|
|
|
|
* subclasses as designated by the isc mask in cr6 and the schid (if != 0).
|
2017-07-07 16:27:31 +03:00
|
|
|
* Take into account the interrupts pending in the interrupt list and in GISA.
|
|
|
|
*
|
|
|
|
* Note that for a guest that does not enable I/O interrupts
|
|
|
|
* but relies on TPI, a flood of classic interrupts may starve
|
|
|
|
* out adapter interrupts on the same isc. Linux does not do
|
|
|
|
* that, and it is possible to work around the issue by configuring
|
|
|
|
* different iscs for classic and adapter interrupts in the guest,
|
|
|
|
* but we may want to revisit this in the future.
|
2013-07-03 17:18:35 +04:00
|
|
|
*/
|
2012-12-20 18:32:12 +04:00
|
|
|
struct kvm_s390_interrupt_info *kvm_s390_get_io_int(struct kvm *kvm,
|
2013-07-03 17:18:35 +04:00
|
|
|
u64 isc_mask, u32 schid)
|
|
|
|
{
|
2019-01-31 11:52:38 +03:00
|
|
|
struct kvm_s390_gisa_interrupt *gi = &kvm->arch.gisa_int;
|
2017-07-07 16:27:31 +03:00
|
|
|
struct kvm_s390_interrupt_info *inti, *tmp_inti;
|
2013-07-03 17:18:35 +04:00
|
|
|
int isc;
|
|
|
|
|
2017-07-07 16:27:31 +03:00
|
|
|
inti = get_top_io_int(kvm, isc_mask, schid);
|
|
|
|
|
|
|
|
isc = get_top_gisa_isc(kvm, isc_mask, schid);
|
|
|
|
if (isc < 0)
|
|
|
|
/* no AI in GISA */
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
if (!inti)
|
|
|
|
/* AI in GISA but no classical IO int */
|
|
|
|
goto gisa_out;
|
|
|
|
|
|
|
|
/* both types of interrupts present */
|
|
|
|
if (int_word_to_isc(inti->io.io_int_word) <= isc) {
|
|
|
|
/* classical IO int with higher priority */
|
2019-01-31 11:52:38 +03:00
|
|
|
gisa_set_ipm_gisc(gi->origin, isc);
|
2017-07-07 16:27:31 +03:00
|
|
|
goto out;
|
2013-07-03 17:18:35 +04:00
|
|
|
}
|
2017-07-07 16:27:31 +03:00
|
|
|
gisa_out:
|
|
|
|
tmp_inti = kzalloc(sizeof(*inti), GFP_KERNEL);
|
|
|
|
if (tmp_inti) {
|
|
|
|
tmp_inti->type = KVM_S390_INT_IO(1, 0, 0, 0);
|
|
|
|
tmp_inti->io.io_int_word = isc_to_int_word(isc);
|
|
|
|
if (inti)
|
|
|
|
kvm_s390_reinject_io_int(kvm, inti);
|
|
|
|
inti = tmp_inti;
|
|
|
|
} else
|
2019-01-31 11:52:38 +03:00
|
|
|
gisa_set_ipm_gisc(gi->origin, isc);
|
2017-07-07 16:27:31 +03:00
|
|
|
out:
|
2013-07-03 17:18:35 +04:00
|
|
|
return inti;
|
|
|
|
}
|
|
|
|
|
|
|
|
#define SCCB_MASK 0xFFFFFFF8
|
|
|
|
#define SCCB_EVENT_PENDING 0x3
|
|
|
|
|
|
|
|
static int __inject_service(struct kvm *kvm,
|
|
|
|
struct kvm_s390_interrupt_info *inti)
|
|
|
|
{
|
|
|
|
struct kvm_s390_float_interrupt *fi = &kvm->arch.float_int;
|
|
|
|
|
2018-03-08 15:48:05 +03:00
|
|
|
kvm->stat.inject_service_signal++;
|
2013-07-03 17:18:35 +04:00
|
|
|
spin_lock(&fi->lock);
|
|
|
|
fi->srv_signal.ext_params |= inti->ext.ext_params & SCCB_EVENT_PENDING;
|
|
|
|
/*
|
|
|
|
* Early versions of the QEMU s390 bios will inject several
|
|
|
|
* service interrupts after another without handling a
|
|
|
|
* condition code indicating busy.
|
|
|
|
* We will silently ignore those superfluous sccb values.
|
|
|
|
* A future version of QEMU will take care of serialization
|
|
|
|
* of servc requests
|
|
|
|
*/
|
|
|
|
if (fi->srv_signal.ext_params & SCCB_MASK)
|
|
|
|
goto out;
|
|
|
|
fi->srv_signal.ext_params |= inti->ext.ext_params & SCCB_MASK;
|
|
|
|
set_bit(IRQ_PEND_EXT_SERVICE, &fi->pending_irqs);
|
|
|
|
out:
|
|
|
|
spin_unlock(&fi->lock);
|
|
|
|
kfree(inti);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int __inject_virtio(struct kvm *kvm,
|
|
|
|
struct kvm_s390_interrupt_info *inti)
|
|
|
|
{
|
|
|
|
struct kvm_s390_float_interrupt *fi = &kvm->arch.float_int;
|
|
|
|
|
2018-03-08 15:48:05 +03:00
|
|
|
kvm->stat.inject_virtio++;
|
2013-07-03 17:18:35 +04:00
|
|
|
spin_lock(&fi->lock);
|
|
|
|
if (fi->counters[FIRQ_CNTR_VIRTIO] >= KVM_S390_MAX_VIRTIO_IRQS) {
|
|
|
|
spin_unlock(&fi->lock);
|
|
|
|
return -EBUSY;
|
|
|
|
}
|
|
|
|
fi->counters[FIRQ_CNTR_VIRTIO] += 1;
|
|
|
|
list_add_tail(&inti->list, &fi->lists[FIRQ_LIST_VIRTIO]);
|
|
|
|
set_bit(IRQ_PEND_VIRTIO, &fi->pending_irqs);
|
|
|
|
spin_unlock(&fi->lock);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int __inject_pfault_done(struct kvm *kvm,
|
|
|
|
struct kvm_s390_interrupt_info *inti)
|
|
|
|
{
|
|
|
|
struct kvm_s390_float_interrupt *fi = &kvm->arch.float_int;
|
|
|
|
|
2018-03-08 15:48:05 +03:00
|
|
|
kvm->stat.inject_pfault_done++;
|
2013-07-03 17:18:35 +04:00
|
|
|
spin_lock(&fi->lock);
|
|
|
|
if (fi->counters[FIRQ_CNTR_PFAULT] >=
|
|
|
|
(ASYNC_PF_PER_VCPU * KVM_MAX_VCPUS)) {
|
|
|
|
spin_unlock(&fi->lock);
|
|
|
|
return -EBUSY;
|
|
|
|
}
|
|
|
|
fi->counters[FIRQ_CNTR_PFAULT] += 1;
|
|
|
|
list_add_tail(&inti->list, &fi->lists[FIRQ_LIST_PFAULT]);
|
|
|
|
set_bit(IRQ_PEND_PFAULT_DONE, &fi->pending_irqs);
|
|
|
|
spin_unlock(&fi->lock);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
#define CR_PENDING_SUBCLASS 28
|
|
|
|
static int __inject_float_mchk(struct kvm *kvm,
|
|
|
|
struct kvm_s390_interrupt_info *inti)
|
|
|
|
{
|
|
|
|
struct kvm_s390_float_interrupt *fi = &kvm->arch.float_int;
|
|
|
|
|
2018-03-08 15:48:05 +03:00
|
|
|
kvm->stat.inject_float_mchk++;
|
2013-07-03 17:18:35 +04:00
|
|
|
spin_lock(&fi->lock);
|
|
|
|
fi->mchk.cr14 |= inti->mchk.cr14 & (1UL << CR_PENDING_SUBCLASS);
|
|
|
|
fi->mchk.mcic |= inti->mchk.mcic;
|
|
|
|
set_bit(IRQ_PEND_MCHK_REP, &fi->pending_irqs);
|
|
|
|
spin_unlock(&fi->lock);
|
|
|
|
kfree(inti);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int __inject_io(struct kvm *kvm, struct kvm_s390_interrupt_info *inti)
|
2012-12-20 18:32:12 +04:00
|
|
|
{
|
2019-01-31 11:52:38 +03:00
|
|
|
struct kvm_s390_gisa_interrupt *gi = &kvm->arch.gisa_int;
|
2012-12-20 18:32:12 +04:00
|
|
|
struct kvm_s390_float_interrupt *fi;
|
2013-07-03 17:18:35 +04:00
|
|
|
struct list_head *list;
|
|
|
|
int isc;
|
2012-12-20 18:32:12 +04:00
|
|
|
|
2018-03-08 15:48:05 +03:00
|
|
|
kvm->stat.inject_io++;
|
2017-06-12 15:15:19 +03:00
|
|
|
isc = int_word_to_isc(inti->io.io_int_word);
|
|
|
|
|
2019-01-31 11:52:38 +03:00
|
|
|
if (gi->origin && inti->type & KVM_S390_INT_IO_AI_MASK) {
|
2017-06-12 15:15:19 +03:00
|
|
|
VM_EVENT(kvm, 4, "%s isc %1u", "inject: I/O (AI/gisa)", isc);
|
2019-01-31 11:52:38 +03:00
|
|
|
gisa_set_ipm_gisc(gi->origin, isc);
|
2017-06-12 15:15:19 +03:00
|
|
|
kfree(inti);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2012-12-20 18:32:12 +04:00
|
|
|
fi = &kvm->arch.float_int;
|
|
|
|
spin_lock(&fi->lock);
|
2013-07-03 17:18:35 +04:00
|
|
|
if (fi->counters[FIRQ_CNTR_IO] >= KVM_S390_MAX_FLOAT_IRQS) {
|
|
|
|
spin_unlock(&fi->lock);
|
|
|
|
return -EBUSY;
|
2014-01-30 11:40:23 +04:00
|
|
|
}
|
2013-07-03 17:18:35 +04:00
|
|
|
fi->counters[FIRQ_CNTR_IO] += 1;
|
|
|
|
|
2016-06-07 10:37:17 +03:00
|
|
|
if (inti->type & KVM_S390_INT_IO_AI_MASK)
|
|
|
|
VM_EVENT(kvm, 4, "%s", "inject: I/O (AI)");
|
|
|
|
else
|
|
|
|
VM_EVENT(kvm, 4, "inject: I/O %x ss %x schid %04x",
|
|
|
|
inti->io.subchannel_id >> 8,
|
|
|
|
inti->io.subchannel_id >> 1 & 0x3,
|
|
|
|
inti->io.subchannel_nr);
|
2013-07-03 17:18:35 +04:00
|
|
|
list = &fi->lists[FIRQ_LIST_IO_ISC_0 + isc];
|
|
|
|
list_add_tail(&inti->list, list);
|
2017-07-03 16:32:50 +03:00
|
|
|
set_bit(isc_to_irq_type(isc), &fi->pending_irqs);
|
2012-12-20 18:32:12 +04:00
|
|
|
spin_unlock(&fi->lock);
|
2013-07-03 17:18:35 +04:00
|
|
|
return 0;
|
2012-12-20 18:32:12 +04:00
|
|
|
}
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
|
2015-01-14 16:08:38 +03:00
|
|
|
/*
|
|
|
|
* Find a destination VCPU for a floating irq and kick it.
|
|
|
|
*/
|
|
|
|
static void __floating_irq_kick(struct kvm *kvm, u64 type)
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
{
|
2015-01-14 16:08:38 +03:00
|
|
|
struct kvm_vcpu *dst_vcpu;
|
|
|
|
int sigcpu, online_vcpus, nr_tries = 0;
|
|
|
|
|
|
|
|
online_vcpus = atomic_read(&kvm->online_vcpus);
|
|
|
|
if (!online_vcpus)
|
|
|
|
return;
|
|
|
|
|
|
|
|
/* find idle VCPUs first, then round robin */
|
2019-01-31 11:52:34 +03:00
|
|
|
sigcpu = find_first_bit(kvm->arch.idle_mask, online_vcpus);
|
2015-01-14 16:08:38 +03:00
|
|
|
if (sigcpu == online_vcpus) {
|
|
|
|
do {
|
2019-01-31 11:52:34 +03:00
|
|
|
sigcpu = kvm->arch.float_int.next_rr_cpu++;
|
|
|
|
kvm->arch.float_int.next_rr_cpu %= online_vcpus;
|
2015-01-14 16:08:38 +03:00
|
|
|
/* avoid endless loops if all vcpus are stopped */
|
|
|
|
if (nr_tries++ >= online_vcpus)
|
|
|
|
return;
|
|
|
|
} while (is_vcpu_stopped(kvm_get_vcpu(kvm, sigcpu)));
|
|
|
|
}
|
|
|
|
dst_vcpu = kvm_get_vcpu(kvm, sigcpu);
|
|
|
|
|
|
|
|
/* make the VCPU drop out of the SIE, or wake it up if sleeping */
|
|
|
|
switch (type) {
|
|
|
|
case KVM_S390_MCHK:
|
2018-01-23 20:05:28 +03:00
|
|
|
kvm_s390_set_cpuflags(dst_vcpu, CPUSTAT_STOP_INT);
|
2015-01-14 16:08:38 +03:00
|
|
|
break;
|
|
|
|
case KVM_S390_INT_IO_MIN...KVM_S390_INT_IO_MAX:
|
2019-01-31 11:52:38 +03:00
|
|
|
if (!(type & KVM_S390_INT_IO_AI_MASK &&
|
|
|
|
kvm->arch.gisa_int.origin))
|
2018-01-29 14:22:45 +03:00
|
|
|
kvm_s390_set_cpuflags(dst_vcpu, CPUSTAT_IO_INT);
|
2015-01-14 16:08:38 +03:00
|
|
|
break;
|
|
|
|
default:
|
2018-01-23 20:05:28 +03:00
|
|
|
kvm_s390_set_cpuflags(dst_vcpu, CPUSTAT_EXT_INT);
|
2015-01-14 16:08:38 +03:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
kvm_s390_vcpu_wakeup(dst_vcpu);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int __inject_vm(struct kvm *kvm, struct kvm_s390_interrupt_info *inti)
|
|
|
|
{
|
2013-07-03 17:18:35 +04:00
|
|
|
u64 type = READ_ONCE(inti->type);
|
|
|
|
int rc;
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
|
2013-07-03 17:18:35 +04:00
|
|
|
switch (type) {
|
|
|
|
case KVM_S390_MCHK:
|
|
|
|
rc = __inject_float_mchk(kvm, inti);
|
|
|
|
break;
|
|
|
|
case KVM_S390_INT_VIRTIO:
|
|
|
|
rc = __inject_virtio(kvm, inti);
|
|
|
|
break;
|
|
|
|
case KVM_S390_INT_SERVICE:
|
|
|
|
rc = __inject_service(kvm, inti);
|
|
|
|
break;
|
|
|
|
case KVM_S390_INT_PFAULT_DONE:
|
|
|
|
rc = __inject_pfault_done(kvm, inti);
|
|
|
|
break;
|
|
|
|
case KVM_S390_INT_IO_MIN...KVM_S390_INT_IO_MAX:
|
|
|
|
rc = __inject_io(kvm, inti);
|
|
|
|
break;
|
|
|
|
default:
|
2014-01-30 11:40:23 +04:00
|
|
|
rc = -EINVAL;
|
2013-10-07 18:13:45 +04:00
|
|
|
}
|
2013-07-03 17:18:35 +04:00
|
|
|
if (rc)
|
|
|
|
return rc;
|
|
|
|
|
2015-01-14 16:08:38 +03:00
|
|
|
__floating_irq_kick(kvm, type);
|
2013-07-03 17:18:35 +04:00
|
|
|
return 0;
|
2013-10-07 18:13:45 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
int kvm_s390_inject_vm(struct kvm *kvm,
|
|
|
|
struct kvm_s390_interrupt *s390int)
|
|
|
|
{
|
|
|
|
struct kvm_s390_interrupt_info *inti;
|
2015-01-16 14:58:09 +03:00
|
|
|
int rc;
|
2013-10-07 18:13:45 +04:00
|
|
|
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
inti = kzalloc(sizeof(*inti), GFP_KERNEL);
|
|
|
|
if (!inti)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2013-10-07 18:13:45 +04:00
|
|
|
inti->type = s390int->type;
|
|
|
|
switch (inti->type) {
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
case KVM_S390_INT_VIRTIO:
|
2009-01-09 14:14:56 +03:00
|
|
|
VM_EVENT(kvm, 5, "inject: virtio parm:%x,parm64:%llx",
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
s390int->parm, s390int->parm64);
|
|
|
|
inti->ext.ext_params = s390int->parm;
|
|
|
|
inti->ext.ext_params2 = s390int->parm64;
|
|
|
|
break;
|
|
|
|
case KVM_S390_INT_SERVICE:
|
2015-07-09 15:08:18 +03:00
|
|
|
VM_EVENT(kvm, 4, "inject: sclp parm:%x", s390int->parm);
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
inti->ext.ext_params = s390int->parm;
|
|
|
|
break;
|
2013-10-07 19:11:48 +04:00
|
|
|
case KVM_S390_INT_PFAULT_DONE:
|
|
|
|
inti->ext.ext_params2 = s390int->parm64;
|
|
|
|
break;
|
2012-12-20 18:32:09 +04:00
|
|
|
case KVM_S390_MCHK:
|
2015-07-09 15:08:18 +03:00
|
|
|
VM_EVENT(kvm, 3, "inject: machine check mcic 0x%llx",
|
2012-12-20 18:32:09 +04:00
|
|
|
s390int->parm64);
|
|
|
|
inti->mchk.cr14 = s390int->parm; /* upper bits are not used */
|
|
|
|
inti->mchk.mcic = s390int->parm64;
|
|
|
|
break;
|
2012-12-20 18:32:08 +04:00
|
|
|
case KVM_S390_INT_IO_MIN...KVM_S390_INT_IO_MAX:
|
|
|
|
inti->io.subchannel_id = s390int->parm >> 16;
|
|
|
|
inti->io.subchannel_nr = s390int->parm & 0x0000ffffu;
|
|
|
|
inti->io.io_int_parm = s390int->parm64 >> 32;
|
|
|
|
inti->io.io_int_word = s390int->parm64 & 0x00000000ffffffffull;
|
|
|
|
break;
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
default:
|
|
|
|
kfree(inti);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
2012-07-23 19:20:30 +04:00
|
|
|
trace_kvm_s390_inject_vm(s390int->type, s390int->parm, s390int->parm64,
|
|
|
|
2);
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
|
2015-01-16 14:58:09 +03:00
|
|
|
rc = __inject_vm(kvm, inti);
|
|
|
|
if (rc)
|
|
|
|
kfree(inti);
|
|
|
|
return rc;
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
}
|
|
|
|
|
2015-02-04 17:59:11 +03:00
|
|
|
int kvm_s390_reinject_io_int(struct kvm *kvm,
|
2014-01-08 21:07:54 +04:00
|
|
|
struct kvm_s390_interrupt_info *inti)
|
|
|
|
{
|
2015-02-04 17:59:11 +03:00
|
|
|
return __inject_vm(kvm, inti);
|
2014-01-08 21:07:54 +04:00
|
|
|
}
|
|
|
|
|
2014-07-29 17:11:49 +04:00
|
|
|
int s390int_to_s390irq(struct kvm_s390_interrupt *s390int,
|
|
|
|
struct kvm_s390_irq *irq)
|
|
|
|
{
|
|
|
|
irq->type = s390int->type;
|
|
|
|
switch (irq->type) {
|
|
|
|
case KVM_S390_PROGRAM_INT:
|
|
|
|
if (s390int->parm & 0xffff0000)
|
|
|
|
return -EINVAL;
|
|
|
|
irq->u.pgm.code = s390int->parm;
|
|
|
|
break;
|
|
|
|
case KVM_S390_SIGP_SET_PREFIX:
|
|
|
|
irq->u.prefix.address = s390int->parm;
|
|
|
|
break;
|
2014-10-15 18:48:16 +04:00
|
|
|
case KVM_S390_SIGP_STOP:
|
|
|
|
irq->u.stop.flags = s390int->parm;
|
|
|
|
break;
|
2014-07-29 17:11:49 +04:00
|
|
|
case KVM_S390_INT_EXTERNAL_CALL:
|
2015-01-15 16:40:34 +03:00
|
|
|
if (s390int->parm & 0xffff0000)
|
2014-07-29 17:11:49 +04:00
|
|
|
return -EINVAL;
|
|
|
|
irq->u.extcall.code = s390int->parm;
|
|
|
|
break;
|
|
|
|
case KVM_S390_INT_EMERGENCY:
|
2015-01-15 16:40:34 +03:00
|
|
|
if (s390int->parm & 0xffff0000)
|
2014-07-29 17:11:49 +04:00
|
|
|
return -EINVAL;
|
|
|
|
irq->u.emerg.code = s390int->parm;
|
|
|
|
break;
|
|
|
|
case KVM_S390_MCHK:
|
|
|
|
irq->u.mchk.mcic = s390int->parm64;
|
|
|
|
break;
|
KVM: s390: Do not leak kernel stack data in the KVM_S390_INTERRUPT ioctl
When the userspace program runs the KVM_S390_INTERRUPT ioctl to inject
an interrupt, we convert them from the legacy struct kvm_s390_interrupt
to the new struct kvm_s390_irq via the s390int_to_s390irq() function.
However, this function does not take care of all types of interrupts
that we can inject into the guest later (see do_inject_vcpu()). Since we
do not clear out the s390irq values before calling s390int_to_s390irq(),
there is a chance that we copy random data from the kernel stack which
could be leaked to the userspace later.
Specifically, the problem exists with the KVM_S390_INT_PFAULT_INIT
interrupt: s390int_to_s390irq() does not handle it, and the function
__inject_pfault_init() later copies irq->u.ext which contains the
random kernel stack data. This data can then be leaked either to
the guest memory in __deliver_pfault_init(), or the userspace might
retrieve it directly with the KVM_S390_GET_IRQ_STATE ioctl.
Fix it by handling that interrupt type in s390int_to_s390irq(), too,
and by making sure that the s390irq struct is properly pre-initialized.
And while we're at it, make sure that s390int_to_s390irq() now
directly returns -EINVAL for unknown interrupt types, so that we
immediately get a proper error code in case we add more interrupt
types to do_inject_vcpu() without updating s390int_to_s390irq()
sometime in the future.
Cc: stable@vger.kernel.org
Reviewed-by: David Hildenbrand <david@redhat.com>
Reviewed-by: Christian Borntraeger <borntraeger@de.ibm.com>
Reviewed-by: Janosch Frank <frankja@linux.ibm.com>
Signed-off-by: Thomas Huth <thuth@redhat.com>
Link: https://lore.kernel.org/kvm/20190912115438.25761-1-thuth@redhat.com
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
2019-09-12 14:54:38 +03:00
|
|
|
case KVM_S390_INT_PFAULT_INIT:
|
|
|
|
irq->u.ext.ext_params = s390int->parm;
|
|
|
|
irq->u.ext.ext_params2 = s390int->parm64;
|
|
|
|
break;
|
|
|
|
case KVM_S390_RESTART:
|
|
|
|
case KVM_S390_INT_CLOCK_COMP:
|
|
|
|
case KVM_S390_INT_CPU_TIMER:
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
return -EINVAL;
|
2014-07-29 17:11:49 +04:00
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-10-15 18:48:53 +04:00
|
|
|
int kvm_s390_is_stop_irq_pending(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
struct kvm_s390_local_interrupt *li = &vcpu->arch.local_int;
|
|
|
|
|
|
|
|
return test_bit(IRQ_PEND_SIGP_STOP, &li->pending_irqs);
|
|
|
|
}
|
|
|
|
|
|
|
|
void kvm_s390_clear_stop_irq(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
struct kvm_s390_local_interrupt *li = &vcpu->arch.local_int;
|
|
|
|
|
|
|
|
spin_lock(&li->lock);
|
|
|
|
li->irq.stop.flags = 0;
|
|
|
|
clear_bit(IRQ_PEND_SIGP_STOP, &li->pending_irqs);
|
|
|
|
spin_unlock(&li->lock);
|
|
|
|
}
|
|
|
|
|
2015-03-19 17:12:12 +03:00
|
|
|
static int do_inject_vcpu(struct kvm_vcpu *vcpu, struct kvm_s390_irq *irq)
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
{
|
2014-07-28 17:37:58 +04:00
|
|
|
int rc;
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
|
2014-07-29 17:11:49 +04:00
|
|
|
switch (irq->type) {
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
case KVM_S390_PROGRAM_INT:
|
2014-07-29 17:11:49 +04:00
|
|
|
rc = __inject_prog(vcpu, irq);
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
break;
|
2009-01-22 12:29:08 +03:00
|
|
|
case KVM_S390_SIGP_SET_PREFIX:
|
2014-07-29 17:11:49 +04:00
|
|
|
rc = __inject_set_prefix(vcpu, irq);
|
2009-01-22 12:29:08 +03:00
|
|
|
break;
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
case KVM_S390_SIGP_STOP:
|
2014-07-29 17:11:49 +04:00
|
|
|
rc = __inject_sigp_stop(vcpu, irq);
|
2014-07-28 17:37:58 +04:00
|
|
|
break;
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
case KVM_S390_RESTART:
|
2019-09-12 10:02:50 +03:00
|
|
|
rc = __inject_sigp_restart(vcpu);
|
2014-07-28 17:37:58 +04:00
|
|
|
break;
|
2014-03-26 19:11:54 +04:00
|
|
|
case KVM_S390_INT_CLOCK_COMP:
|
2014-07-29 17:11:49 +04:00
|
|
|
rc = __inject_ckc(vcpu);
|
2014-07-28 17:37:58 +04:00
|
|
|
break;
|
2014-03-26 19:11:54 +04:00
|
|
|
case KVM_S390_INT_CPU_TIMER:
|
2014-07-29 17:11:49 +04:00
|
|
|
rc = __inject_cpu_timer(vcpu);
|
2012-10-02 18:25:36 +04:00
|
|
|
break;
|
2011-10-18 14:27:15 +04:00
|
|
|
case KVM_S390_INT_EXTERNAL_CALL:
|
2014-07-29 17:11:49 +04:00
|
|
|
rc = __inject_extcall(vcpu, irq);
|
2012-10-02 18:25:36 +04:00
|
|
|
break;
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
case KVM_S390_INT_EMERGENCY:
|
2014-07-29 17:11:49 +04:00
|
|
|
rc = __inject_sigp_emergency(vcpu, irq);
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
break;
|
2012-12-20 18:32:09 +04:00
|
|
|
case KVM_S390_MCHK:
|
2014-07-29 17:11:49 +04:00
|
|
|
rc = __inject_mchk(vcpu, irq);
|
2012-12-20 18:32:09 +04:00
|
|
|
break;
|
2013-10-07 19:11:48 +04:00
|
|
|
case KVM_S390_INT_PFAULT_INIT:
|
2014-07-29 17:11:49 +04:00
|
|
|
rc = __inject_pfault_init(vcpu, irq);
|
2013-10-07 19:11:48 +04:00
|
|
|
break;
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
case KVM_S390_INT_VIRTIO:
|
|
|
|
case KVM_S390_INT_SERVICE:
|
2012-12-20 18:32:08 +04:00
|
|
|
case KVM_S390_INT_IO_MIN...KVM_S390_INT_IO_MAX:
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
default:
|
2014-07-28 17:37:58 +04:00
|
|
|
rc = -EINVAL;
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
}
|
2015-03-19 17:12:12 +03:00
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
int kvm_s390_inject_vcpu(struct kvm_vcpu *vcpu, struct kvm_s390_irq *irq)
|
|
|
|
{
|
|
|
|
struct kvm_s390_local_interrupt *li = &vcpu->arch.local_int;
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
spin_lock(&li->lock);
|
|
|
|
rc = do_inject_vcpu(vcpu, irq);
|
2014-05-16 12:23:53 +04:00
|
|
|
spin_unlock(&li->lock);
|
2014-07-28 17:37:58 +04:00
|
|
|
if (!rc)
|
|
|
|
kvm_s390_vcpu_wakeup(vcpu);
|
|
|
|
return rc;
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-25 20:47:26 +03:00
|
|
|
}
|
2013-10-07 18:13:45 +04:00
|
|
|
|
2013-07-03 17:18:35 +04:00
|
|
|
static inline void clear_irq_list(struct list_head *_list)
|
2013-10-07 18:13:45 +04:00
|
|
|
{
|
2013-07-03 17:18:35 +04:00
|
|
|
struct kvm_s390_interrupt_info *inti, *n;
|
2013-10-07 18:13:45 +04:00
|
|
|
|
2013-07-03 17:18:35 +04:00
|
|
|
list_for_each_entry_safe(inti, n, _list, list) {
|
2013-10-07 18:13:45 +04:00
|
|
|
list_del(&inti->list);
|
|
|
|
kfree(inti);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-03-16 14:17:13 +03:00
|
|
|
static void inti_to_irq(struct kvm_s390_interrupt_info *inti,
|
|
|
|
struct kvm_s390_irq *irq)
|
2013-10-07 18:13:45 +04:00
|
|
|
{
|
2015-03-16 14:17:13 +03:00
|
|
|
irq->type = inti->type;
|
2013-10-07 18:13:45 +04:00
|
|
|
switch (inti->type) {
|
2013-10-07 19:11:48 +04:00
|
|
|
case KVM_S390_INT_PFAULT_INIT:
|
|
|
|
case KVM_S390_INT_PFAULT_DONE:
|
2013-10-07 18:13:45 +04:00
|
|
|
case KVM_S390_INT_VIRTIO:
|
2015-03-16 14:17:13 +03:00
|
|
|
irq->u.ext = inti->ext;
|
2013-10-07 18:13:45 +04:00
|
|
|
break;
|
|
|
|
case KVM_S390_INT_IO_MIN...KVM_S390_INT_IO_MAX:
|
2015-03-16 14:17:13 +03:00
|
|
|
irq->u.io = inti->io;
|
2013-10-07 18:13:45 +04:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-07-03 17:18:35 +04:00
|
|
|
void kvm_s390_clear_float_irqs(struct kvm *kvm)
|
|
|
|
{
|
|
|
|
struct kvm_s390_float_interrupt *fi = &kvm->arch.float_int;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
spin_lock(&fi->lock);
|
2015-06-22 14:20:12 +03:00
|
|
|
fi->pending_irqs = 0;
|
|
|
|
memset(&fi->srv_signal, 0, sizeof(fi->srv_signal));
|
|
|
|
memset(&fi->mchk, 0, sizeof(fi->mchk));
|
2013-07-03 17:18:35 +04:00
|
|
|
for (i = 0; i < FIRQ_LIST_COUNT; i++)
|
|
|
|
clear_irq_list(&fi->lists[i]);
|
|
|
|
for (i = 0; i < FIRQ_MAX_COUNT; i++)
|
|
|
|
fi->counters[i] = 0;
|
|
|
|
spin_unlock(&fi->lock);
|
2017-06-14 14:21:32 +03:00
|
|
|
kvm_s390_gisa_clear(kvm);
|
2013-07-03 17:18:35 +04:00
|
|
|
};
|
|
|
|
|
2015-03-16 14:17:13 +03:00
|
|
|
static int get_all_floating_irqs(struct kvm *kvm, u8 __user *usrbuf, u64 len)
|
2013-10-07 18:13:45 +04:00
|
|
|
{
|
2019-01-31 11:52:38 +03:00
|
|
|
struct kvm_s390_gisa_interrupt *gi = &kvm->arch.gisa_int;
|
2013-10-07 18:13:45 +04:00
|
|
|
struct kvm_s390_interrupt_info *inti;
|
|
|
|
struct kvm_s390_float_interrupt *fi;
|
2015-03-16 14:17:13 +03:00
|
|
|
struct kvm_s390_irq *buf;
|
2013-07-03 17:18:35 +04:00
|
|
|
struct kvm_s390_irq *irq;
|
2015-03-16 14:17:13 +03:00
|
|
|
int max_irqs;
|
2013-10-07 18:13:45 +04:00
|
|
|
int ret = 0;
|
|
|
|
int n = 0;
|
2013-07-03 17:18:35 +04:00
|
|
|
int i;
|
2013-10-07 18:13:45 +04:00
|
|
|
|
2015-03-16 14:17:13 +03:00
|
|
|
if (len > KVM_S390_FLIC_MAX_BUFFER || len == 0)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* We are already using -ENOMEM to signal
|
|
|
|
* userspace it may retry with a bigger buffer,
|
|
|
|
* so we need to use something else for this case
|
|
|
|
*/
|
|
|
|
buf = vzalloc(len);
|
|
|
|
if (!buf)
|
|
|
|
return -ENOBUFS;
|
|
|
|
|
|
|
|
max_irqs = len / sizeof(struct kvm_s390_irq);
|
|
|
|
|
2019-01-31 11:52:38 +03:00
|
|
|
if (gi->origin && gisa_get_ipm(gi->origin)) {
|
2017-06-14 14:21:32 +03:00
|
|
|
for (i = 0; i <= MAX_ISC; i++) {
|
|
|
|
if (n == max_irqs) {
|
|
|
|
/* signal userspace to try again */
|
|
|
|
ret = -ENOMEM;
|
|
|
|
goto out_nolock;
|
|
|
|
}
|
2019-01-31 11:52:38 +03:00
|
|
|
if (gisa_tac_ipm_gisc(gi->origin, i)) {
|
2017-06-14 14:21:32 +03:00
|
|
|
irq = (struct kvm_s390_irq *) &buf[n];
|
|
|
|
irq->type = KVM_S390_INT_IO(1, 0, 0, 0);
|
|
|
|
irq->u.io.io_int_word = isc_to_int_word(i);
|
|
|
|
n++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2013-10-07 18:13:45 +04:00
|
|
|
fi = &kvm->arch.float_int;
|
|
|
|
spin_lock(&fi->lock);
|
2013-07-03 17:18:35 +04:00
|
|
|
for (i = 0; i < FIRQ_LIST_COUNT; i++) {
|
|
|
|
list_for_each_entry(inti, &fi->lists[i], list) {
|
|
|
|
if (n == max_irqs) {
|
|
|
|
/* signal userspace to try again */
|
|
|
|
ret = -ENOMEM;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
inti_to_irq(inti, &buf[n]);
|
|
|
|
n++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (test_bit(IRQ_PEND_EXT_SERVICE, &fi->pending_irqs)) {
|
2015-03-16 14:17:13 +03:00
|
|
|
if (n == max_irqs) {
|
2013-10-07 18:13:45 +04:00
|
|
|
/* signal userspace to try again */
|
|
|
|
ret = -ENOMEM;
|
2013-07-03 17:18:35 +04:00
|
|
|
goto out;
|
2013-10-07 18:13:45 +04:00
|
|
|
}
|
2013-07-03 17:18:35 +04:00
|
|
|
irq = (struct kvm_s390_irq *) &buf[n];
|
|
|
|
irq->type = KVM_S390_INT_SERVICE;
|
|
|
|
irq->u.ext = fi->srv_signal;
|
2013-10-07 18:13:45 +04:00
|
|
|
n++;
|
|
|
|
}
|
2013-07-03 17:18:35 +04:00
|
|
|
if (test_bit(IRQ_PEND_MCHK_REP, &fi->pending_irqs)) {
|
|
|
|
if (n == max_irqs) {
|
|
|
|
/* signal userspace to try again */
|
|
|
|
ret = -ENOMEM;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
irq = (struct kvm_s390_irq *) &buf[n];
|
|
|
|
irq->type = KVM_S390_MCHK;
|
|
|
|
irq->u.mchk = fi->mchk;
|
|
|
|
n++;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
2013-10-07 18:13:45 +04:00
|
|
|
spin_unlock(&fi->lock);
|
2017-06-14 14:21:32 +03:00
|
|
|
out_nolock:
|
2015-03-16 14:17:13 +03:00
|
|
|
if (!ret && n > 0) {
|
|
|
|
if (copy_to_user(usrbuf, buf, sizeof(struct kvm_s390_irq) * n))
|
|
|
|
ret = -EFAULT;
|
|
|
|
}
|
|
|
|
vfree(buf);
|
2013-10-07 18:13:45 +04:00
|
|
|
|
|
|
|
return ret < 0 ? ret : n;
|
|
|
|
}
|
|
|
|
|
2017-06-07 11:09:52 +03:00
|
|
|
static int flic_ais_mode_get_all(struct kvm *kvm, struct kvm_device_attr *attr)
|
|
|
|
{
|
|
|
|
struct kvm_s390_float_interrupt *fi = &kvm->arch.float_int;
|
|
|
|
struct kvm_s390_ais_all ais;
|
|
|
|
|
|
|
|
if (attr->attr < sizeof(ais))
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
if (!test_kvm_facility(kvm, 72))
|
2019-12-05 15:40:43 +03:00
|
|
|
return -EOPNOTSUPP;
|
2017-06-07 11:09:52 +03:00
|
|
|
|
|
|
|
mutex_lock(&fi->ais_lock);
|
|
|
|
ais.simm = fi->simm;
|
|
|
|
ais.nimm = fi->nimm;
|
|
|
|
mutex_unlock(&fi->ais_lock);
|
|
|
|
|
|
|
|
if (copy_to_user((void __user *)attr->addr, &ais, sizeof(ais)))
|
|
|
|
return -EFAULT;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-10-07 18:13:45 +04:00
|
|
|
static int flic_get_attr(struct kvm_device *dev, struct kvm_device_attr *attr)
|
|
|
|
{
|
|
|
|
int r;
|
|
|
|
|
|
|
|
switch (attr->group) {
|
|
|
|
case KVM_DEV_FLIC_GET_ALL_IRQS:
|
2015-03-16 14:17:13 +03:00
|
|
|
r = get_all_floating_irqs(dev->kvm, (u8 __user *) attr->addr,
|
2013-10-07 18:13:45 +04:00
|
|
|
attr->attr);
|
|
|
|
break;
|
2017-06-07 11:09:52 +03:00
|
|
|
case KVM_DEV_FLIC_AISM_ALL:
|
|
|
|
r = flic_ais_mode_get_all(dev->kvm, attr);
|
|
|
|
break;
|
2013-10-07 18:13:45 +04:00
|
|
|
default:
|
|
|
|
r = -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline int copy_irq_from_user(struct kvm_s390_interrupt_info *inti,
|
|
|
|
u64 addr)
|
|
|
|
{
|
|
|
|
struct kvm_s390_irq __user *uptr = (struct kvm_s390_irq __user *) addr;
|
|
|
|
void *target = NULL;
|
|
|
|
void __user *source;
|
|
|
|
u64 size;
|
|
|
|
|
|
|
|
if (get_user(inti->type, (u64 __user *)addr))
|
|
|
|
return -EFAULT;
|
|
|
|
|
|
|
|
switch (inti->type) {
|
2013-10-07 19:11:48 +04:00
|
|
|
case KVM_S390_INT_PFAULT_INIT:
|
|
|
|
case KVM_S390_INT_PFAULT_DONE:
|
2013-10-07 18:13:45 +04:00
|
|
|
case KVM_S390_INT_VIRTIO:
|
|
|
|
case KVM_S390_INT_SERVICE:
|
|
|
|
target = (void *) &inti->ext;
|
|
|
|
source = &uptr->u.ext;
|
|
|
|
size = sizeof(inti->ext);
|
|
|
|
break;
|
|
|
|
case KVM_S390_INT_IO_MIN...KVM_S390_INT_IO_MAX:
|
|
|
|
target = (void *) &inti->io;
|
|
|
|
source = &uptr->u.io;
|
|
|
|
size = sizeof(inti->io);
|
|
|
|
break;
|
|
|
|
case KVM_S390_MCHK:
|
|
|
|
target = (void *) &inti->mchk;
|
|
|
|
source = &uptr->u.mchk;
|
|
|
|
size = sizeof(inti->mchk);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (copy_from_user(target, source, size))
|
|
|
|
return -EFAULT;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int enqueue_floating_irq(struct kvm_device *dev,
|
|
|
|
struct kvm_device_attr *attr)
|
|
|
|
{
|
|
|
|
struct kvm_s390_interrupt_info *inti = NULL;
|
|
|
|
int r = 0;
|
|
|
|
int len = attr->attr;
|
|
|
|
|
|
|
|
if (len % sizeof(struct kvm_s390_irq) != 0)
|
|
|
|
return -EINVAL;
|
|
|
|
else if (len > KVM_S390_FLIC_MAX_BUFFER)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
while (len >= sizeof(struct kvm_s390_irq)) {
|
|
|
|
inti = kzalloc(sizeof(*inti), GFP_KERNEL);
|
|
|
|
if (!inti)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
r = copy_irq_from_user(inti, attr->addr);
|
|
|
|
if (r) {
|
|
|
|
kfree(inti);
|
|
|
|
return r;
|
|
|
|
}
|
2014-01-30 11:40:23 +04:00
|
|
|
r = __inject_vm(dev->kvm, inti);
|
|
|
|
if (r) {
|
|
|
|
kfree(inti);
|
|
|
|
return r;
|
|
|
|
}
|
2013-10-07 18:13:45 +04:00
|
|
|
len -= sizeof(struct kvm_s390_irq);
|
|
|
|
attr->addr += sizeof(struct kvm_s390_irq);
|
|
|
|
}
|
|
|
|
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
2013-07-15 15:36:01 +04:00
|
|
|
static struct s390_io_adapter *get_io_adapter(struct kvm *kvm, unsigned int id)
|
|
|
|
{
|
|
|
|
if (id >= MAX_S390_IO_ADAPTERS)
|
|
|
|
return NULL;
|
2019-04-17 03:54:14 +03:00
|
|
|
id = array_index_nospec(id, MAX_S390_IO_ADAPTERS);
|
2013-07-15 15:36:01 +04:00
|
|
|
return kvm->arch.adapters[id];
|
|
|
|
}
|
|
|
|
|
|
|
|
static int register_io_adapter(struct kvm_device *dev,
|
|
|
|
struct kvm_device_attr *attr)
|
|
|
|
{
|
|
|
|
struct s390_io_adapter *adapter;
|
|
|
|
struct kvm_s390_io_adapter adapter_info;
|
|
|
|
|
|
|
|
if (copy_from_user(&adapter_info,
|
|
|
|
(void __user *)attr->addr, sizeof(adapter_info)))
|
|
|
|
return -EFAULT;
|
|
|
|
|
2019-04-17 03:54:14 +03:00
|
|
|
if (adapter_info.id >= MAX_S390_IO_ADAPTERS)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
adapter_info.id = array_index_nospec(adapter_info.id,
|
|
|
|
MAX_S390_IO_ADAPTERS);
|
|
|
|
|
|
|
|
if (dev->kvm->arch.adapters[adapter_info.id] != NULL)
|
2013-07-15 15:36:01 +04:00
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
adapter = kzalloc(sizeof(*adapter), GFP_KERNEL);
|
|
|
|
if (!adapter)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
INIT_LIST_HEAD(&adapter->maps);
|
|
|
|
init_rwsem(&adapter->maps_lock);
|
|
|
|
atomic_set(&adapter->nr_maps, 0);
|
|
|
|
adapter->id = adapter_info.id;
|
|
|
|
adapter->isc = adapter_info.isc;
|
|
|
|
adapter->maskable = adapter_info.maskable;
|
|
|
|
adapter->masked = false;
|
|
|
|
adapter->swap = adapter_info.swap;
|
2017-01-19 19:02:26 +03:00
|
|
|
adapter->suppressible = (adapter_info.flags) &
|
|
|
|
KVM_S390_ADAPTER_SUPPRESSIBLE;
|
2013-07-15 15:36:01 +04:00
|
|
|
dev->kvm->arch.adapters[adapter->id] = adapter;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int kvm_s390_mask_adapter(struct kvm *kvm, unsigned int id, bool masked)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
struct s390_io_adapter *adapter = get_io_adapter(kvm, id);
|
|
|
|
|
|
|
|
if (!adapter || !adapter->maskable)
|
|
|
|
return -EINVAL;
|
|
|
|
ret = adapter->masked;
|
|
|
|
adapter->masked = masked;
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int kvm_s390_adapter_map(struct kvm *kvm, unsigned int id, __u64 addr)
|
|
|
|
{
|
|
|
|
struct s390_io_adapter *adapter = get_io_adapter(kvm, id);
|
|
|
|
struct s390_map_info *map;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (!adapter || !addr)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
map = kzalloc(sizeof(*map), GFP_KERNEL);
|
|
|
|
if (!map) {
|
|
|
|
ret = -ENOMEM;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
INIT_LIST_HEAD(&map->list);
|
|
|
|
map->guest_addr = addr;
|
2014-04-29 11:34:41 +04:00
|
|
|
map->addr = gmap_translate(kvm->arch.gmap, addr);
|
2013-07-15 15:36:01 +04:00
|
|
|
if (map->addr == -EFAULT) {
|
|
|
|
ret = -EFAULT;
|
|
|
|
goto out;
|
|
|
|
}
|
2019-05-14 03:17:11 +03:00
|
|
|
ret = get_user_pages_fast(map->addr, 1, FOLL_WRITE, &map->page);
|
2013-07-15 15:36:01 +04:00
|
|
|
if (ret < 0)
|
|
|
|
goto out;
|
|
|
|
BUG_ON(ret != 1);
|
|
|
|
down_write(&adapter->maps_lock);
|
|
|
|
if (atomic_inc_return(&adapter->nr_maps) < MAX_S390_ADAPTER_MAPS) {
|
|
|
|
list_add_tail(&map->list, &adapter->maps);
|
|
|
|
ret = 0;
|
|
|
|
} else {
|
|
|
|
put_page(map->page);
|
|
|
|
ret = -EINVAL;
|
|
|
|
}
|
|
|
|
up_write(&adapter->maps_lock);
|
|
|
|
out:
|
|
|
|
if (ret)
|
|
|
|
kfree(map);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int kvm_s390_adapter_unmap(struct kvm *kvm, unsigned int id, __u64 addr)
|
|
|
|
{
|
|
|
|
struct s390_io_adapter *adapter = get_io_adapter(kvm, id);
|
|
|
|
struct s390_map_info *map, *tmp;
|
|
|
|
int found = 0;
|
|
|
|
|
|
|
|
if (!adapter || !addr)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
down_write(&adapter->maps_lock);
|
|
|
|
list_for_each_entry_safe(map, tmp, &adapter->maps, list) {
|
|
|
|
if (map->guest_addr == addr) {
|
|
|
|
found = 1;
|
|
|
|
atomic_dec(&adapter->nr_maps);
|
|
|
|
list_del(&map->list);
|
|
|
|
put_page(map->page);
|
|
|
|
kfree(map);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
up_write(&adapter->maps_lock);
|
|
|
|
|
|
|
|
return found ? 0 : -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
void kvm_s390_destroy_adapters(struct kvm *kvm)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
struct s390_map_info *map, *tmp;
|
|
|
|
|
|
|
|
for (i = 0; i < MAX_S390_IO_ADAPTERS; i++) {
|
|
|
|
if (!kvm->arch.adapters[i])
|
|
|
|
continue;
|
|
|
|
list_for_each_entry_safe(map, tmp,
|
|
|
|
&kvm->arch.adapters[i]->maps, list) {
|
|
|
|
list_del(&map->list);
|
|
|
|
put_page(map->page);
|
|
|
|
kfree(map);
|
|
|
|
}
|
|
|
|
kfree(kvm->arch.adapters[i]);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static int modify_io_adapter(struct kvm_device *dev,
|
|
|
|
struct kvm_device_attr *attr)
|
|
|
|
{
|
|
|
|
struct kvm_s390_io_adapter_req req;
|
|
|
|
struct s390_io_adapter *adapter;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (copy_from_user(&req, (void __user *)attr->addr, sizeof(req)))
|
|
|
|
return -EFAULT;
|
|
|
|
|
|
|
|
adapter = get_io_adapter(dev->kvm, req.id);
|
|
|
|
if (!adapter)
|
|
|
|
return -EINVAL;
|
|
|
|
switch (req.type) {
|
|
|
|
case KVM_S390_IO_ADAPTER_MASK:
|
|
|
|
ret = kvm_s390_mask_adapter(dev->kvm, req.id, req.mask);
|
|
|
|
if (ret > 0)
|
|
|
|
ret = 0;
|
|
|
|
break;
|
|
|
|
case KVM_S390_IO_ADAPTER_MAP:
|
|
|
|
ret = kvm_s390_adapter_map(dev->kvm, req.id, req.addr);
|
|
|
|
break;
|
|
|
|
case KVM_S390_IO_ADAPTER_UNMAP:
|
|
|
|
ret = kvm_s390_adapter_unmap(dev->kvm, req.id, req.addr);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
ret = -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2016-01-25 21:10:40 +03:00
|
|
|
static int clear_io_irq(struct kvm *kvm, struct kvm_device_attr *attr)
|
|
|
|
|
|
|
|
{
|
|
|
|
const u64 isc_mask = 0xffUL << 24; /* all iscs set */
|
|
|
|
u32 schid;
|
|
|
|
|
|
|
|
if (attr->flags)
|
|
|
|
return -EINVAL;
|
|
|
|
if (attr->attr != sizeof(schid))
|
|
|
|
return -EINVAL;
|
|
|
|
if (copy_from_user(&schid, (void __user *) attr->addr, sizeof(schid)))
|
|
|
|
return -EFAULT;
|
2017-07-06 15:22:20 +03:00
|
|
|
if (!schid)
|
|
|
|
return -EINVAL;
|
2016-01-25 21:10:40 +03:00
|
|
|
kfree(kvm_s390_get_io_int(kvm, isc_mask, schid));
|
|
|
|
/*
|
|
|
|
* If userspace is conforming to the architecture, we can have at most
|
|
|
|
* one pending I/O interrupt per subchannel, so this is effectively a
|
|
|
|
* clear all.
|
|
|
|
*/
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2017-02-17 12:06:26 +03:00
|
|
|
static int modify_ais_mode(struct kvm *kvm, struct kvm_device_attr *attr)
|
|
|
|
{
|
|
|
|
struct kvm_s390_float_interrupt *fi = &kvm->arch.float_int;
|
|
|
|
struct kvm_s390_ais_req req;
|
|
|
|
int ret = 0;
|
|
|
|
|
2017-05-31 11:18:55 +03:00
|
|
|
if (!test_kvm_facility(kvm, 72))
|
2019-12-05 15:40:43 +03:00
|
|
|
return -EOPNOTSUPP;
|
2017-02-17 12:06:26 +03:00
|
|
|
|
|
|
|
if (copy_from_user(&req, (void __user *)attr->addr, sizeof(req)))
|
|
|
|
return -EFAULT;
|
|
|
|
|
|
|
|
if (req.isc > MAX_ISC)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
trace_kvm_s390_modify_ais_mode(req.isc,
|
|
|
|
(fi->simm & AIS_MODE_MASK(req.isc)) ?
|
|
|
|
(fi->nimm & AIS_MODE_MASK(req.isc)) ?
|
|
|
|
2 : KVM_S390_AIS_MODE_SINGLE :
|
|
|
|
KVM_S390_AIS_MODE_ALL, req.mode);
|
|
|
|
|
|
|
|
mutex_lock(&fi->ais_lock);
|
|
|
|
switch (req.mode) {
|
|
|
|
case KVM_S390_AIS_MODE_ALL:
|
|
|
|
fi->simm &= ~AIS_MODE_MASK(req.isc);
|
|
|
|
fi->nimm &= ~AIS_MODE_MASK(req.isc);
|
|
|
|
break;
|
|
|
|
case KVM_S390_AIS_MODE_SINGLE:
|
|
|
|
fi->simm |= AIS_MODE_MASK(req.isc);
|
|
|
|
fi->nimm &= ~AIS_MODE_MASK(req.isc);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
ret = -EINVAL;
|
|
|
|
}
|
|
|
|
mutex_unlock(&fi->ais_lock);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2017-02-20 05:15:01 +03:00
|
|
|
static int kvm_s390_inject_airq(struct kvm *kvm,
|
|
|
|
struct s390_io_adapter *adapter)
|
|
|
|
{
|
|
|
|
struct kvm_s390_float_interrupt *fi = &kvm->arch.float_int;
|
|
|
|
struct kvm_s390_interrupt s390int = {
|
|
|
|
.type = KVM_S390_INT_IO(1, 0, 0, 0),
|
|
|
|
.parm = 0,
|
2017-08-31 12:10:28 +03:00
|
|
|
.parm64 = isc_to_int_word(adapter->isc),
|
2017-02-20 05:15:01 +03:00
|
|
|
};
|
|
|
|
int ret = 0;
|
|
|
|
|
2017-05-31 11:18:55 +03:00
|
|
|
if (!test_kvm_facility(kvm, 72) || !adapter->suppressible)
|
2017-02-20 05:15:01 +03:00
|
|
|
return kvm_s390_inject_vm(kvm, &s390int);
|
|
|
|
|
|
|
|
mutex_lock(&fi->ais_lock);
|
|
|
|
if (fi->nimm & AIS_MODE_MASK(adapter->isc)) {
|
|
|
|
trace_kvm_s390_airq_suppressed(adapter->id, adapter->isc);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = kvm_s390_inject_vm(kvm, &s390int);
|
|
|
|
if (!ret && (fi->simm & AIS_MODE_MASK(adapter->isc))) {
|
|
|
|
fi->nimm |= AIS_MODE_MASK(adapter->isc);
|
|
|
|
trace_kvm_s390_modify_ais_mode(adapter->isc,
|
|
|
|
KVM_S390_AIS_MODE_SINGLE, 2);
|
|
|
|
}
|
|
|
|
out:
|
|
|
|
mutex_unlock(&fi->ais_lock);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int flic_inject_airq(struct kvm *kvm, struct kvm_device_attr *attr)
|
|
|
|
{
|
|
|
|
unsigned int id = attr->attr;
|
|
|
|
struct s390_io_adapter *adapter = get_io_adapter(kvm, id);
|
|
|
|
|
|
|
|
if (!adapter)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
return kvm_s390_inject_airq(kvm, adapter);
|
|
|
|
}
|
|
|
|
|
2017-06-07 11:09:52 +03:00
|
|
|
static int flic_ais_mode_set_all(struct kvm *kvm, struct kvm_device_attr *attr)
|
|
|
|
{
|
|
|
|
struct kvm_s390_float_interrupt *fi = &kvm->arch.float_int;
|
|
|
|
struct kvm_s390_ais_all ais;
|
|
|
|
|
|
|
|
if (!test_kvm_facility(kvm, 72))
|
2019-12-05 15:40:43 +03:00
|
|
|
return -EOPNOTSUPP;
|
2017-06-07 11:09:52 +03:00
|
|
|
|
|
|
|
if (copy_from_user(&ais, (void __user *)attr->addr, sizeof(ais)))
|
|
|
|
return -EFAULT;
|
|
|
|
|
|
|
|
mutex_lock(&fi->ais_lock);
|
|
|
|
fi->simm = ais.simm;
|
|
|
|
fi->nimm = ais.nimm;
|
|
|
|
mutex_unlock(&fi->ais_lock);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-10-07 18:13:45 +04:00
|
|
|
static int flic_set_attr(struct kvm_device *dev, struct kvm_device_attr *attr)
|
|
|
|
{
|
|
|
|
int r = 0;
|
2013-10-07 19:11:48 +04:00
|
|
|
unsigned int i;
|
|
|
|
struct kvm_vcpu *vcpu;
|
2013-10-07 18:13:45 +04:00
|
|
|
|
|
|
|
switch (attr->group) {
|
|
|
|
case KVM_DEV_FLIC_ENQUEUE:
|
|
|
|
r = enqueue_floating_irq(dev, attr);
|
|
|
|
break;
|
|
|
|
case KVM_DEV_FLIC_CLEAR_IRQS:
|
2014-03-25 20:09:08 +04:00
|
|
|
kvm_s390_clear_float_irqs(dev->kvm);
|
2013-10-07 18:13:45 +04:00
|
|
|
break;
|
2013-10-07 19:11:48 +04:00
|
|
|
case KVM_DEV_FLIC_APF_ENABLE:
|
|
|
|
dev->kvm->arch.gmap->pfault_enabled = 1;
|
|
|
|
break;
|
|
|
|
case KVM_DEV_FLIC_APF_DISABLE_WAIT:
|
|
|
|
dev->kvm->arch.gmap->pfault_enabled = 0;
|
|
|
|
/*
|
|
|
|
* Make sure no async faults are in transition when
|
|
|
|
* clearing the queues. So we don't need to worry
|
|
|
|
* about late coming workers.
|
|
|
|
*/
|
|
|
|
synchronize_srcu(&dev->kvm->srcu);
|
|
|
|
kvm_for_each_vcpu(i, vcpu, dev->kvm)
|
|
|
|
kvm_clear_async_pf_completion_queue(vcpu);
|
|
|
|
break;
|
2013-07-15 15:36:01 +04:00
|
|
|
case KVM_DEV_FLIC_ADAPTER_REGISTER:
|
|
|
|
r = register_io_adapter(dev, attr);
|
|
|
|
break;
|
|
|
|
case KVM_DEV_FLIC_ADAPTER_MODIFY:
|
|
|
|
r = modify_io_adapter(dev, attr);
|
|
|
|
break;
|
2016-01-25 21:10:40 +03:00
|
|
|
case KVM_DEV_FLIC_CLEAR_IO_IRQ:
|
|
|
|
r = clear_io_irq(dev->kvm, attr);
|
|
|
|
break;
|
2017-02-17 12:06:26 +03:00
|
|
|
case KVM_DEV_FLIC_AISM:
|
|
|
|
r = modify_ais_mode(dev->kvm, attr);
|
|
|
|
break;
|
2017-02-20 05:15:01 +03:00
|
|
|
case KVM_DEV_FLIC_AIRQ_INJECT:
|
|
|
|
r = flic_inject_airq(dev->kvm, attr);
|
|
|
|
break;
|
2017-06-07 11:09:52 +03:00
|
|
|
case KVM_DEV_FLIC_AISM_ALL:
|
|
|
|
r = flic_ais_mode_set_all(dev->kvm, attr);
|
|
|
|
break;
|
2013-10-07 18:13:45 +04:00
|
|
|
default:
|
|
|
|
r = -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
2016-02-25 14:44:17 +03:00
|
|
|
static int flic_has_attr(struct kvm_device *dev,
|
|
|
|
struct kvm_device_attr *attr)
|
|
|
|
{
|
|
|
|
switch (attr->group) {
|
|
|
|
case KVM_DEV_FLIC_GET_ALL_IRQS:
|
|
|
|
case KVM_DEV_FLIC_ENQUEUE:
|
|
|
|
case KVM_DEV_FLIC_CLEAR_IRQS:
|
|
|
|
case KVM_DEV_FLIC_APF_ENABLE:
|
|
|
|
case KVM_DEV_FLIC_APF_DISABLE_WAIT:
|
|
|
|
case KVM_DEV_FLIC_ADAPTER_REGISTER:
|
|
|
|
case KVM_DEV_FLIC_ADAPTER_MODIFY:
|
2016-01-25 21:10:40 +03:00
|
|
|
case KVM_DEV_FLIC_CLEAR_IO_IRQ:
|
2017-02-17 12:06:26 +03:00
|
|
|
case KVM_DEV_FLIC_AISM:
|
2017-02-20 05:15:01 +03:00
|
|
|
case KVM_DEV_FLIC_AIRQ_INJECT:
|
2017-06-07 11:09:52 +03:00
|
|
|
case KVM_DEV_FLIC_AISM_ALL:
|
2016-02-25 14:44:17 +03:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
return -ENXIO;
|
|
|
|
}
|
|
|
|
|
2013-10-07 18:13:45 +04:00
|
|
|
static int flic_create(struct kvm_device *dev, u32 type)
|
|
|
|
{
|
|
|
|
if (!dev)
|
|
|
|
return -EINVAL;
|
|
|
|
if (dev->kvm->arch.flic)
|
|
|
|
return -EINVAL;
|
|
|
|
dev->kvm->arch.flic = dev;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void flic_destroy(struct kvm_device *dev)
|
|
|
|
{
|
|
|
|
dev->kvm->arch.flic = NULL;
|
|
|
|
kfree(dev);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* s390 floating irq controller (flic) */
|
|
|
|
struct kvm_device_ops kvm_flic_ops = {
|
|
|
|
.name = "kvm-flic",
|
|
|
|
.get_attr = flic_get_attr,
|
|
|
|
.set_attr = flic_set_attr,
|
2016-02-25 14:44:17 +03:00
|
|
|
.has_attr = flic_has_attr,
|
2013-10-07 18:13:45 +04:00
|
|
|
.create = flic_create,
|
|
|
|
.destroy = flic_destroy,
|
|
|
|
};
|
2013-07-15 15:36:01 +04:00
|
|
|
|
|
|
|
static unsigned long get_ind_bit(__u64 addr, unsigned long bit_nr, bool swap)
|
|
|
|
{
|
|
|
|
unsigned long bit;
|
|
|
|
|
|
|
|
bit = bit_nr + (addr % PAGE_SIZE) * 8;
|
|
|
|
|
|
|
|
return swap ? (bit ^ (BITS_PER_LONG - 1)) : bit;
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct s390_map_info *get_map_info(struct s390_io_adapter *adapter,
|
|
|
|
u64 addr)
|
|
|
|
{
|
|
|
|
struct s390_map_info *map;
|
|
|
|
|
|
|
|
if (!adapter)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
list_for_each_entry(map, &adapter->maps, list) {
|
|
|
|
if (map->guest_addr == addr)
|
|
|
|
return map;
|
|
|
|
}
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int adapter_indicators_set(struct kvm *kvm,
|
|
|
|
struct s390_io_adapter *adapter,
|
|
|
|
struct kvm_s390_adapter_int *adapter_int)
|
|
|
|
{
|
|
|
|
unsigned long bit;
|
|
|
|
int summary_set, idx;
|
|
|
|
struct s390_map_info *info;
|
|
|
|
void *map;
|
|
|
|
|
|
|
|
info = get_map_info(adapter, adapter_int->ind_addr);
|
|
|
|
if (!info)
|
|
|
|
return -1;
|
|
|
|
map = page_address(info->page);
|
|
|
|
bit = get_ind_bit(info->addr, adapter_int->ind_offset, adapter->swap);
|
|
|
|
set_bit(bit, map);
|
|
|
|
idx = srcu_read_lock(&kvm->srcu);
|
|
|
|
mark_page_dirty(kvm, info->guest_addr >> PAGE_SHIFT);
|
|
|
|
set_page_dirty_lock(info->page);
|
|
|
|
info = get_map_info(adapter, adapter_int->summary_addr);
|
|
|
|
if (!info) {
|
|
|
|
srcu_read_unlock(&kvm->srcu, idx);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
map = page_address(info->page);
|
|
|
|
bit = get_ind_bit(info->addr, adapter_int->summary_offset,
|
|
|
|
adapter->swap);
|
|
|
|
summary_set = test_and_set_bit(bit, map);
|
|
|
|
mark_page_dirty(kvm, info->guest_addr >> PAGE_SHIFT);
|
|
|
|
set_page_dirty_lock(info->page);
|
|
|
|
srcu_read_unlock(&kvm->srcu, idx);
|
|
|
|
return summary_set ? 0 : 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* < 0 - not injected due to error
|
|
|
|
* = 0 - coalesced, summary indicator already active
|
|
|
|
* > 0 - injected interrupt
|
|
|
|
*/
|
|
|
|
static int set_adapter_int(struct kvm_kernel_irq_routing_entry *e,
|
|
|
|
struct kvm *kvm, int irq_source_id, int level,
|
|
|
|
bool line_status)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
struct s390_io_adapter *adapter;
|
|
|
|
|
|
|
|
/* We're only interested in the 0->1 transition. */
|
|
|
|
if (!level)
|
|
|
|
return 0;
|
|
|
|
adapter = get_io_adapter(kvm, e->adapter.adapter_id);
|
|
|
|
if (!adapter)
|
|
|
|
return -1;
|
|
|
|
down_read(&adapter->maps_lock);
|
|
|
|
ret = adapter_indicators_set(kvm, adapter, &e->adapter);
|
|
|
|
up_read(&adapter->maps_lock);
|
|
|
|
if ((ret > 0) && !adapter->masked) {
|
2017-02-20 05:15:01 +03:00
|
|
|
ret = kvm_s390_inject_airq(kvm, adapter);
|
2013-07-15 15:36:01 +04:00
|
|
|
if (ret == 0)
|
|
|
|
ret = 1;
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
KVM: s390: Inject machine check into the guest
If the exit flag of SIE indicates that a machine check has happened
during guest's running and needs to be injected, inject it to the guest
accordingly.
But some machine checks, e.g. Channel Report Pending (CRW), refer to
host conditions only (the guest's channel devices are not managed by
the kernel directly) and are therefore not injected into the guest.
External Damage (ED) is also not reinjected into the guest because ETR
conditions are gone in Linux and STP conditions are not enabled in the
guest, and ED contains only these 8 ETR and STP conditions.
In general, instruction-processing damage, system recovery,
storage error, service-processor damage and channel subsystem damage
will be reinjected into the guest, and the remain (System damage,
timing-facility damage, warning, ED and CRW) will be handled on the host.
Signed-off-by: QingFeng Hao <haoqf@linux.vnet.ibm.com>
Acked-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
2017-06-07 13:03:05 +03:00
|
|
|
/*
|
|
|
|
* Inject the machine check to the guest.
|
|
|
|
*/
|
|
|
|
void kvm_s390_reinject_machine_check(struct kvm_vcpu *vcpu,
|
|
|
|
struct mcck_volatile_info *mcck_info)
|
|
|
|
{
|
|
|
|
struct kvm_s390_interrupt_info inti;
|
|
|
|
struct kvm_s390_irq irq;
|
|
|
|
struct kvm_s390_mchk_info *mchk;
|
|
|
|
union mci mci;
|
|
|
|
__u64 cr14 = 0; /* upper bits are not used */
|
2017-08-30 19:06:01 +03:00
|
|
|
int rc;
|
KVM: s390: Inject machine check into the guest
If the exit flag of SIE indicates that a machine check has happened
during guest's running and needs to be injected, inject it to the guest
accordingly.
But some machine checks, e.g. Channel Report Pending (CRW), refer to
host conditions only (the guest's channel devices are not managed by
the kernel directly) and are therefore not injected into the guest.
External Damage (ED) is also not reinjected into the guest because ETR
conditions are gone in Linux and STP conditions are not enabled in the
guest, and ED contains only these 8 ETR and STP conditions.
In general, instruction-processing damage, system recovery,
storage error, service-processor damage and channel subsystem damage
will be reinjected into the guest, and the remain (System damage,
timing-facility damage, warning, ED and CRW) will be handled on the host.
Signed-off-by: QingFeng Hao <haoqf@linux.vnet.ibm.com>
Acked-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
2017-06-07 13:03:05 +03:00
|
|
|
|
|
|
|
mci.val = mcck_info->mcic;
|
|
|
|
if (mci.sr)
|
2017-10-12 14:24:46 +03:00
|
|
|
cr14 |= CR14_RECOVERY_SUBMASK;
|
KVM: s390: Inject machine check into the guest
If the exit flag of SIE indicates that a machine check has happened
during guest's running and needs to be injected, inject it to the guest
accordingly.
But some machine checks, e.g. Channel Report Pending (CRW), refer to
host conditions only (the guest's channel devices are not managed by
the kernel directly) and are therefore not injected into the guest.
External Damage (ED) is also not reinjected into the guest because ETR
conditions are gone in Linux and STP conditions are not enabled in the
guest, and ED contains only these 8 ETR and STP conditions.
In general, instruction-processing damage, system recovery,
storage error, service-processor damage and channel subsystem damage
will be reinjected into the guest, and the remain (System damage,
timing-facility damage, warning, ED and CRW) will be handled on the host.
Signed-off-by: QingFeng Hao <haoqf@linux.vnet.ibm.com>
Acked-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
2017-06-07 13:03:05 +03:00
|
|
|
if (mci.dg)
|
2017-10-12 14:24:46 +03:00
|
|
|
cr14 |= CR14_DEGRADATION_SUBMASK;
|
KVM: s390: Inject machine check into the guest
If the exit flag of SIE indicates that a machine check has happened
during guest's running and needs to be injected, inject it to the guest
accordingly.
But some machine checks, e.g. Channel Report Pending (CRW), refer to
host conditions only (the guest's channel devices are not managed by
the kernel directly) and are therefore not injected into the guest.
External Damage (ED) is also not reinjected into the guest because ETR
conditions are gone in Linux and STP conditions are not enabled in the
guest, and ED contains only these 8 ETR and STP conditions.
In general, instruction-processing damage, system recovery,
storage error, service-processor damage and channel subsystem damage
will be reinjected into the guest, and the remain (System damage,
timing-facility damage, warning, ED and CRW) will be handled on the host.
Signed-off-by: QingFeng Hao <haoqf@linux.vnet.ibm.com>
Acked-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
2017-06-07 13:03:05 +03:00
|
|
|
if (mci.w)
|
2017-10-12 14:24:46 +03:00
|
|
|
cr14 |= CR14_WARNING_SUBMASK;
|
KVM: s390: Inject machine check into the guest
If the exit flag of SIE indicates that a machine check has happened
during guest's running and needs to be injected, inject it to the guest
accordingly.
But some machine checks, e.g. Channel Report Pending (CRW), refer to
host conditions only (the guest's channel devices are not managed by
the kernel directly) and are therefore not injected into the guest.
External Damage (ED) is also not reinjected into the guest because ETR
conditions are gone in Linux and STP conditions are not enabled in the
guest, and ED contains only these 8 ETR and STP conditions.
In general, instruction-processing damage, system recovery,
storage error, service-processor damage and channel subsystem damage
will be reinjected into the guest, and the remain (System damage,
timing-facility damage, warning, ED and CRW) will be handled on the host.
Signed-off-by: QingFeng Hao <haoqf@linux.vnet.ibm.com>
Acked-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
2017-06-07 13:03:05 +03:00
|
|
|
|
|
|
|
mchk = mci.ck ? &inti.mchk : &irq.u.mchk;
|
|
|
|
mchk->cr14 = cr14;
|
|
|
|
mchk->mcic = mcck_info->mcic;
|
|
|
|
mchk->ext_damage_code = mcck_info->ext_damage_code;
|
|
|
|
mchk->failing_storage_address = mcck_info->failing_storage_address;
|
|
|
|
if (mci.ck) {
|
|
|
|
/* Inject the floating machine check */
|
|
|
|
inti.type = KVM_S390_MCHK;
|
2017-08-30 19:06:01 +03:00
|
|
|
rc = __inject_vm(vcpu->kvm, &inti);
|
KVM: s390: Inject machine check into the guest
If the exit flag of SIE indicates that a machine check has happened
during guest's running and needs to be injected, inject it to the guest
accordingly.
But some machine checks, e.g. Channel Report Pending (CRW), refer to
host conditions only (the guest's channel devices are not managed by
the kernel directly) and are therefore not injected into the guest.
External Damage (ED) is also not reinjected into the guest because ETR
conditions are gone in Linux and STP conditions are not enabled in the
guest, and ED contains only these 8 ETR and STP conditions.
In general, instruction-processing damage, system recovery,
storage error, service-processor damage and channel subsystem damage
will be reinjected into the guest, and the remain (System damage,
timing-facility damage, warning, ED and CRW) will be handled on the host.
Signed-off-by: QingFeng Hao <haoqf@linux.vnet.ibm.com>
Acked-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
2017-06-07 13:03:05 +03:00
|
|
|
} else {
|
|
|
|
/* Inject the machine check to specified vcpu */
|
|
|
|
irq.type = KVM_S390_MCHK;
|
2017-08-30 19:06:01 +03:00
|
|
|
rc = kvm_s390_inject_vcpu(vcpu, &irq);
|
KVM: s390: Inject machine check into the guest
If the exit flag of SIE indicates that a machine check has happened
during guest's running and needs to be injected, inject it to the guest
accordingly.
But some machine checks, e.g. Channel Report Pending (CRW), refer to
host conditions only (the guest's channel devices are not managed by
the kernel directly) and are therefore not injected into the guest.
External Damage (ED) is also not reinjected into the guest because ETR
conditions are gone in Linux and STP conditions are not enabled in the
guest, and ED contains only these 8 ETR and STP conditions.
In general, instruction-processing damage, system recovery,
storage error, service-processor damage and channel subsystem damage
will be reinjected into the guest, and the remain (System damage,
timing-facility damage, warning, ED and CRW) will be handled on the host.
Signed-off-by: QingFeng Hao <haoqf@linux.vnet.ibm.com>
Acked-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
2017-06-07 13:03:05 +03:00
|
|
|
}
|
2017-08-30 19:06:01 +03:00
|
|
|
WARN_ON_ONCE(rc);
|
KVM: s390: Inject machine check into the guest
If the exit flag of SIE indicates that a machine check has happened
during guest's running and needs to be injected, inject it to the guest
accordingly.
But some machine checks, e.g. Channel Report Pending (CRW), refer to
host conditions only (the guest's channel devices are not managed by
the kernel directly) and are therefore not injected into the guest.
External Damage (ED) is also not reinjected into the guest because ETR
conditions are gone in Linux and STP conditions are not enabled in the
guest, and ED contains only these 8 ETR and STP conditions.
In general, instruction-processing damage, system recovery,
storage error, service-processor damage and channel subsystem damage
will be reinjected into the guest, and the remain (System damage,
timing-facility damage, warning, ED and CRW) will be handled on the host.
Signed-off-by: QingFeng Hao <haoqf@linux.vnet.ibm.com>
Acked-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
2017-06-07 13:03:05 +03:00
|
|
|
}
|
|
|
|
|
2016-07-12 23:09:26 +03:00
|
|
|
int kvm_set_routing_entry(struct kvm *kvm,
|
|
|
|
struct kvm_kernel_irq_routing_entry *e,
|
2013-07-15 15:36:01 +04:00
|
|
|
const struct kvm_irq_routing_entry *ue)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
switch (ue->type) {
|
|
|
|
case KVM_IRQ_ROUTING_S390_ADAPTER:
|
|
|
|
e->set = set_adapter_int;
|
|
|
|
e->adapter.summary_addr = ue->u.adapter.summary_addr;
|
|
|
|
e->adapter.ind_addr = ue->u.adapter.ind_addr;
|
|
|
|
e->adapter.summary_offset = ue->u.adapter.summary_offset;
|
|
|
|
e->adapter.ind_offset = ue->u.adapter.ind_offset;
|
|
|
|
e->adapter.adapter_id = ue->u.adapter.adapter_id;
|
|
|
|
ret = 0;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
ret = -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
int kvm_set_msi(struct kvm_kernel_irq_routing_entry *e, struct kvm *kvm,
|
|
|
|
int irq_source_id, int level, bool line_status)
|
|
|
|
{
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
2014-11-24 19:13:46 +03:00
|
|
|
|
|
|
|
int kvm_s390_set_irq_state(struct kvm_vcpu *vcpu, void __user *irqstate, int len)
|
|
|
|
{
|
|
|
|
struct kvm_s390_local_interrupt *li = &vcpu->arch.local_int;
|
|
|
|
struct kvm_s390_irq *buf;
|
|
|
|
int r = 0;
|
|
|
|
int n;
|
|
|
|
|
|
|
|
buf = vmalloc(len);
|
|
|
|
if (!buf)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
if (copy_from_user((void *) buf, irqstate, len)) {
|
|
|
|
r = -EFAULT;
|
|
|
|
goto out_free;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Don't allow setting the interrupt state
|
|
|
|
* when there are already interrupts pending
|
|
|
|
*/
|
|
|
|
spin_lock(&li->lock);
|
|
|
|
if (li->pending_irqs) {
|
|
|
|
r = -EBUSY;
|
|
|
|
goto out_unlock;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (n = 0; n < len / sizeof(*buf); n++) {
|
|
|
|
r = do_inject_vcpu(vcpu, &buf[n]);
|
|
|
|
if (r)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
out_unlock:
|
|
|
|
spin_unlock(&li->lock);
|
|
|
|
out_free:
|
|
|
|
vfree(buf);
|
|
|
|
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void store_local_irq(struct kvm_s390_local_interrupt *li,
|
|
|
|
struct kvm_s390_irq *irq,
|
|
|
|
unsigned long irq_type)
|
|
|
|
{
|
|
|
|
switch (irq_type) {
|
|
|
|
case IRQ_PEND_MCHK_EX:
|
|
|
|
case IRQ_PEND_MCHK_REP:
|
|
|
|
irq->type = KVM_S390_MCHK;
|
|
|
|
irq->u.mchk = li->irq.mchk;
|
|
|
|
break;
|
|
|
|
case IRQ_PEND_PROG:
|
|
|
|
irq->type = KVM_S390_PROGRAM_INT;
|
|
|
|
irq->u.pgm = li->irq.pgm;
|
|
|
|
break;
|
|
|
|
case IRQ_PEND_PFAULT_INIT:
|
|
|
|
irq->type = KVM_S390_INT_PFAULT_INIT;
|
|
|
|
irq->u.ext = li->irq.ext;
|
|
|
|
break;
|
|
|
|
case IRQ_PEND_EXT_EXTERNAL:
|
|
|
|
irq->type = KVM_S390_INT_EXTERNAL_CALL;
|
|
|
|
irq->u.extcall = li->irq.extcall;
|
|
|
|
break;
|
|
|
|
case IRQ_PEND_EXT_CLOCK_COMP:
|
|
|
|
irq->type = KVM_S390_INT_CLOCK_COMP;
|
|
|
|
break;
|
|
|
|
case IRQ_PEND_EXT_CPU_TIMER:
|
|
|
|
irq->type = KVM_S390_INT_CPU_TIMER;
|
|
|
|
break;
|
|
|
|
case IRQ_PEND_SIGP_STOP:
|
|
|
|
irq->type = KVM_S390_SIGP_STOP;
|
|
|
|
irq->u.stop = li->irq.stop;
|
|
|
|
break;
|
|
|
|
case IRQ_PEND_RESTART:
|
|
|
|
irq->type = KVM_S390_RESTART;
|
|
|
|
break;
|
|
|
|
case IRQ_PEND_SET_PREFIX:
|
|
|
|
irq->type = KVM_S390_SIGP_SET_PREFIX;
|
|
|
|
irq->u.prefix = li->irq.prefix;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
int kvm_s390_get_irq_state(struct kvm_vcpu *vcpu, __u8 __user *buf, int len)
|
|
|
|
{
|
2015-04-21 16:10:10 +03:00
|
|
|
int scn;
|
2019-01-31 11:52:33 +03:00
|
|
|
DECLARE_BITMAP(sigp_emerg_pending, KVM_MAX_VCPUS);
|
2014-11-24 19:13:46 +03:00
|
|
|
struct kvm_s390_local_interrupt *li = &vcpu->arch.local_int;
|
|
|
|
unsigned long pending_irqs;
|
|
|
|
struct kvm_s390_irq irq;
|
|
|
|
unsigned long irq_type;
|
|
|
|
int cpuaddr;
|
|
|
|
int n = 0;
|
|
|
|
|
|
|
|
spin_lock(&li->lock);
|
|
|
|
pending_irqs = li->pending_irqs;
|
|
|
|
memcpy(&sigp_emerg_pending, &li->sigp_emerg_pending,
|
|
|
|
sizeof(sigp_emerg_pending));
|
|
|
|
spin_unlock(&li->lock);
|
|
|
|
|
|
|
|
for_each_set_bit(irq_type, &pending_irqs, IRQ_PEND_COUNT) {
|
|
|
|
memset(&irq, 0, sizeof(irq));
|
|
|
|
if (irq_type == IRQ_PEND_EXT_EMERGENCY)
|
|
|
|
continue;
|
|
|
|
if (n + sizeof(irq) > len)
|
|
|
|
return -ENOBUFS;
|
|
|
|
store_local_irq(&vcpu->arch.local_int, &irq, irq_type);
|
|
|
|
if (copy_to_user(&buf[n], &irq, sizeof(irq)))
|
|
|
|
return -EFAULT;
|
|
|
|
n += sizeof(irq);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (test_bit(IRQ_PEND_EXT_EMERGENCY, &pending_irqs)) {
|
|
|
|
for_each_set_bit(cpuaddr, sigp_emerg_pending, KVM_MAX_VCPUS) {
|
|
|
|
memset(&irq, 0, sizeof(irq));
|
|
|
|
if (n + sizeof(irq) > len)
|
|
|
|
return -ENOBUFS;
|
|
|
|
irq.type = KVM_S390_INT_EMERGENCY;
|
|
|
|
irq.u.emerg.code = cpuaddr;
|
|
|
|
if (copy_to_user(&buf[n], &irq, sizeof(irq)))
|
|
|
|
return -EFAULT;
|
|
|
|
n += sizeof(irq);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-04-21 16:10:10 +03:00
|
|
|
if (sca_ext_call_pending(vcpu, &scn)) {
|
2014-11-24 19:13:46 +03:00
|
|
|
if (n + sizeof(irq) > len)
|
|
|
|
return -ENOBUFS;
|
|
|
|
memset(&irq, 0, sizeof(irq));
|
|
|
|
irq.type = KVM_S390_INT_EXTERNAL_CALL;
|
2015-04-21 16:10:10 +03:00
|
|
|
irq.u.extcall.code = scn;
|
2014-11-24 19:13:46 +03:00
|
|
|
if (copy_to_user(&buf[n], &irq, sizeof(irq)))
|
|
|
|
return -EFAULT;
|
|
|
|
n += sizeof(irq);
|
|
|
|
}
|
|
|
|
|
|
|
|
return n;
|
|
|
|
}
|
2017-06-12 15:15:19 +03:00
|
|
|
|
2019-01-31 11:52:44 +03:00
|
|
|
static void __airqs_kick_single_vcpu(struct kvm *kvm, u8 deliverable_mask)
|
|
|
|
{
|
|
|
|
int vcpu_id, online_vcpus = atomic_read(&kvm->online_vcpus);
|
|
|
|
struct kvm_s390_gisa_interrupt *gi = &kvm->arch.gisa_int;
|
|
|
|
struct kvm_vcpu *vcpu;
|
|
|
|
|
|
|
|
for_each_set_bit(vcpu_id, kvm->arch.idle_mask, online_vcpus) {
|
|
|
|
vcpu = kvm_get_vcpu(kvm, vcpu_id);
|
|
|
|
if (psw_ioint_disabled(vcpu))
|
|
|
|
continue;
|
|
|
|
deliverable_mask &= (u8)(vcpu->arch.sie_block->gcr[6] >> 24);
|
|
|
|
if (deliverable_mask) {
|
|
|
|
/* lately kicked but not yet running */
|
|
|
|
if (test_and_set_bit(vcpu_id, gi->kicked_mask))
|
|
|
|
return;
|
|
|
|
kvm_s390_vcpu_wakeup(vcpu);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static enum hrtimer_restart gisa_vcpu_kicker(struct hrtimer *timer)
|
|
|
|
{
|
|
|
|
struct kvm_s390_gisa_interrupt *gi =
|
|
|
|
container_of(timer, struct kvm_s390_gisa_interrupt, timer);
|
|
|
|
struct kvm *kvm =
|
|
|
|
container_of(gi->origin, struct sie_page2, gisa)->kvm;
|
|
|
|
u8 pending_mask;
|
|
|
|
|
|
|
|
pending_mask = gisa_get_ipm_or_restore_iam(gi);
|
|
|
|
if (pending_mask) {
|
|
|
|
__airqs_kick_single_vcpu(kvm, pending_mask);
|
|
|
|
hrtimer_forward_now(timer, ns_to_ktime(gi->expires));
|
|
|
|
return HRTIMER_RESTART;
|
|
|
|
};
|
|
|
|
|
|
|
|
return HRTIMER_NORESTART;
|
|
|
|
}
|
|
|
|
|
|
|
|
#define NULL_GISA_ADDR 0x00000000UL
|
|
|
|
#define NONE_GISA_ADDR 0x00000001UL
|
|
|
|
#define GISA_ADDR_MASK 0xfffff000UL
|
|
|
|
|
|
|
|
static void process_gib_alert_list(void)
|
|
|
|
{
|
|
|
|
struct kvm_s390_gisa_interrupt *gi;
|
|
|
|
struct kvm_s390_gisa *gisa;
|
|
|
|
struct kvm *kvm;
|
|
|
|
u32 final, origin = 0UL;
|
|
|
|
|
|
|
|
do {
|
|
|
|
/*
|
|
|
|
* If the NONE_GISA_ADDR is still stored in the alert list
|
|
|
|
* origin, we will leave the outer loop. No further GISA has
|
|
|
|
* been added to the alert list by millicode while processing
|
|
|
|
* the current alert list.
|
|
|
|
*/
|
|
|
|
final = (origin & NONE_GISA_ADDR);
|
|
|
|
/*
|
|
|
|
* Cut off the alert list and store the NONE_GISA_ADDR in the
|
|
|
|
* alert list origin to avoid further GAL interruptions.
|
|
|
|
* A new alert list can be build up by millicode in parallel
|
|
|
|
* for guests not in the yet cut-off alert list. When in the
|
|
|
|
* final loop, store the NULL_GISA_ADDR instead. This will re-
|
|
|
|
* enable GAL interruptions on the host again.
|
|
|
|
*/
|
|
|
|
origin = xchg(&gib->alert_list_origin,
|
|
|
|
(!final) ? NONE_GISA_ADDR : NULL_GISA_ADDR);
|
|
|
|
/*
|
|
|
|
* Loop through the just cut-off alert list and start the
|
|
|
|
* gisa timers to kick idle vcpus to consume the pending
|
|
|
|
* interruptions asap.
|
|
|
|
*/
|
|
|
|
while (origin & GISA_ADDR_MASK) {
|
|
|
|
gisa = (struct kvm_s390_gisa *)(u64)origin;
|
|
|
|
origin = gisa->next_alert;
|
|
|
|
gisa->next_alert = (u32)(u64)gisa;
|
|
|
|
kvm = container_of(gisa, struct sie_page2, gisa)->kvm;
|
|
|
|
gi = &kvm->arch.gisa_int;
|
|
|
|
if (hrtimer_active(&gi->timer))
|
|
|
|
hrtimer_cancel(&gi->timer);
|
|
|
|
hrtimer_start(&gi->timer, 0, HRTIMER_MODE_REL);
|
|
|
|
}
|
|
|
|
} while (!final);
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2017-06-12 15:15:19 +03:00
|
|
|
void kvm_s390_gisa_clear(struct kvm *kvm)
|
|
|
|
{
|
2019-01-31 11:52:38 +03:00
|
|
|
struct kvm_s390_gisa_interrupt *gi = &kvm->arch.gisa_int;
|
|
|
|
|
|
|
|
if (!gi->origin)
|
2019-01-31 11:52:35 +03:00
|
|
|
return;
|
2019-01-31 11:52:43 +03:00
|
|
|
gisa_clear_ipm(gi->origin);
|
2019-01-31 11:52:38 +03:00
|
|
|
VM_EVENT(kvm, 3, "gisa 0x%pK cleared", gi->origin);
|
2017-06-12 15:15:19 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
void kvm_s390_gisa_init(struct kvm *kvm)
|
|
|
|
{
|
2019-01-31 11:52:38 +03:00
|
|
|
struct kvm_s390_gisa_interrupt *gi = &kvm->arch.gisa_int;
|
|
|
|
|
2019-01-31 11:52:35 +03:00
|
|
|
if (!css_general_characteristics.aiv)
|
|
|
|
return;
|
2019-01-31 11:52:38 +03:00
|
|
|
gi->origin = &kvm->arch.sie_page2->gisa;
|
2019-01-31 11:52:42 +03:00
|
|
|
gi->alert.mask = 0;
|
|
|
|
spin_lock_init(&gi->alert.ref_lock);
|
2019-01-31 11:52:44 +03:00
|
|
|
gi->expires = 50 * 1000; /* 50 usec */
|
|
|
|
hrtimer_init(&gi->timer, CLOCK_MONOTONIC, HRTIMER_MODE_REL);
|
|
|
|
gi->timer.function = gisa_vcpu_kicker;
|
2019-01-31 11:52:43 +03:00
|
|
|
memset(gi->origin, 0, sizeof(struct kvm_s390_gisa));
|
|
|
|
gi->origin->next_alert = (u32)(u64)gi->origin;
|
2019-01-31 11:52:38 +03:00
|
|
|
VM_EVENT(kvm, 3, "gisa 0x%pK initialized", gi->origin);
|
2017-06-12 15:15:19 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
void kvm_s390_gisa_destroy(struct kvm *kvm)
|
|
|
|
{
|
2019-01-31 11:52:44 +03:00
|
|
|
struct kvm_s390_gisa_interrupt *gi = &kvm->arch.gisa_int;
|
|
|
|
|
|
|
|
if (!gi->origin)
|
|
|
|
return;
|
|
|
|
if (gi->alert.mask)
|
|
|
|
KVM_EVENT(3, "vm 0x%pK has unexpected iam 0x%02x",
|
|
|
|
kvm, gi->alert.mask);
|
|
|
|
while (gisa_in_alert_list(gi->origin))
|
|
|
|
cpu_relax();
|
|
|
|
hrtimer_cancel(&gi->timer);
|
|
|
|
gi->origin = NULL;
|
2017-06-12 15:15:19 +03:00
|
|
|
}
|
2019-01-31 11:52:40 +03:00
|
|
|
|
2019-01-31 11:52:42 +03:00
|
|
|
/**
|
|
|
|
* kvm_s390_gisc_register - register a guest ISC
|
|
|
|
*
|
|
|
|
* @kvm: the kernel vm to work with
|
|
|
|
* @gisc: the guest interruption sub class to register
|
|
|
|
*
|
|
|
|
* The function extends the vm specific alert mask to use.
|
|
|
|
* The effective IAM mask in the GISA is updated as well
|
|
|
|
* in case the GISA is not part of the GIB alert list.
|
|
|
|
* It will be updated latest when the IAM gets restored
|
|
|
|
* by gisa_get_ipm_or_restore_iam().
|
|
|
|
*
|
|
|
|
* Returns: the nonspecific ISC (NISC) the gib alert mechanism
|
|
|
|
* has registered with the channel subsystem.
|
|
|
|
* -ENODEV in case the vm uses no GISA
|
|
|
|
* -ERANGE in case the guest ISC is invalid
|
|
|
|
*/
|
|
|
|
int kvm_s390_gisc_register(struct kvm *kvm, u32 gisc)
|
|
|
|
{
|
|
|
|
struct kvm_s390_gisa_interrupt *gi = &kvm->arch.gisa_int;
|
|
|
|
|
|
|
|
if (!gi->origin)
|
|
|
|
return -ENODEV;
|
|
|
|
if (gisc > MAX_ISC)
|
|
|
|
return -ERANGE;
|
|
|
|
|
|
|
|
spin_lock(&gi->alert.ref_lock);
|
|
|
|
gi->alert.ref_count[gisc]++;
|
|
|
|
if (gi->alert.ref_count[gisc] == 1) {
|
|
|
|
gi->alert.mask |= 0x80 >> gisc;
|
|
|
|
gisa_set_iam(gi->origin, gi->alert.mask);
|
|
|
|
}
|
|
|
|
spin_unlock(&gi->alert.ref_lock);
|
|
|
|
|
|
|
|
return gib->nisc;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(kvm_s390_gisc_register);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* kvm_s390_gisc_unregister - unregister a guest ISC
|
|
|
|
*
|
|
|
|
* @kvm: the kernel vm to work with
|
|
|
|
* @gisc: the guest interruption sub class to register
|
|
|
|
*
|
|
|
|
* The function reduces the vm specific alert mask to use.
|
|
|
|
* The effective IAM mask in the GISA is updated as well
|
|
|
|
* in case the GISA is not part of the GIB alert list.
|
|
|
|
* It will be updated latest when the IAM gets restored
|
|
|
|
* by gisa_get_ipm_or_restore_iam().
|
|
|
|
*
|
|
|
|
* Returns: the nonspecific ISC (NISC) the gib alert mechanism
|
|
|
|
* has registered with the channel subsystem.
|
|
|
|
* -ENODEV in case the vm uses no GISA
|
|
|
|
* -ERANGE in case the guest ISC is invalid
|
|
|
|
* -EINVAL in case the guest ISC is not registered
|
|
|
|
*/
|
|
|
|
int kvm_s390_gisc_unregister(struct kvm *kvm, u32 gisc)
|
|
|
|
{
|
|
|
|
struct kvm_s390_gisa_interrupt *gi = &kvm->arch.gisa_int;
|
|
|
|
int rc = 0;
|
|
|
|
|
|
|
|
if (!gi->origin)
|
|
|
|
return -ENODEV;
|
|
|
|
if (gisc > MAX_ISC)
|
|
|
|
return -ERANGE;
|
|
|
|
|
|
|
|
spin_lock(&gi->alert.ref_lock);
|
|
|
|
if (gi->alert.ref_count[gisc] == 0) {
|
|
|
|
rc = -EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
gi->alert.ref_count[gisc]--;
|
|
|
|
if (gi->alert.ref_count[gisc] == 0) {
|
|
|
|
gi->alert.mask &= ~(0x80 >> gisc);
|
|
|
|
gisa_set_iam(gi->origin, gi->alert.mask);
|
|
|
|
}
|
|
|
|
out:
|
|
|
|
spin_unlock(&gi->alert.ref_lock);
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(kvm_s390_gisc_unregister);
|
|
|
|
|
2018-10-28 13:51:56 +03:00
|
|
|
static void gib_alert_irq_handler(struct airq_struct *airq, bool floating)
|
2019-01-31 11:52:44 +03:00
|
|
|
{
|
|
|
|
inc_irq_stat(IRQIO_GAL);
|
|
|
|
process_gib_alert_list();
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct airq_struct gib_alert_irq = {
|
|
|
|
.handler = gib_alert_irq_handler,
|
|
|
|
.lsi_ptr = &gib_alert_irq.lsi_mask,
|
|
|
|
};
|
|
|
|
|
2019-01-31 11:52:40 +03:00
|
|
|
void kvm_s390_gib_destroy(void)
|
|
|
|
{
|
|
|
|
if (!gib)
|
|
|
|
return;
|
|
|
|
chsc_sgib(0);
|
2019-01-31 11:52:44 +03:00
|
|
|
unregister_adapter_interrupt(&gib_alert_irq);
|
2019-01-31 11:52:40 +03:00
|
|
|
free_page((unsigned long)gib);
|
|
|
|
gib = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
int kvm_s390_gib_init(u8 nisc)
|
|
|
|
{
|
|
|
|
int rc = 0;
|
|
|
|
|
|
|
|
if (!css_general_characteristics.aiv) {
|
|
|
|
KVM_EVENT(3, "%s", "gib not initialized, no AIV facility");
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
gib = (struct kvm_s390_gib *)get_zeroed_page(GFP_KERNEL | GFP_DMA);
|
|
|
|
if (!gib) {
|
|
|
|
rc = -ENOMEM;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2019-01-31 11:52:44 +03:00
|
|
|
gib_alert_irq.isc = nisc;
|
|
|
|
if (register_adapter_interrupt(&gib_alert_irq)) {
|
|
|
|
pr_err("Registering the GIB alert interruption handler failed\n");
|
|
|
|
rc = -EIO;
|
|
|
|
goto out_free_gib;
|
|
|
|
}
|
|
|
|
|
2019-01-31 11:52:40 +03:00
|
|
|
gib->nisc = nisc;
|
|
|
|
if (chsc_sgib((u32)(u64)gib)) {
|
|
|
|
pr_err("Associating the GIB with the AIV facility failed\n");
|
|
|
|
free_page((unsigned long)gib);
|
|
|
|
gib = NULL;
|
|
|
|
rc = -EIO;
|
2019-01-31 11:52:44 +03:00
|
|
|
goto out_unreg_gal;
|
2019-01-31 11:52:40 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
KVM_EVENT(3, "gib 0x%pK (nisc=%d) initialized", gib, gib->nisc);
|
2019-01-31 11:52:44 +03:00
|
|
|
goto out;
|
|
|
|
|
|
|
|
out_unreg_gal:
|
|
|
|
unregister_adapter_interrupt(&gib_alert_irq);
|
|
|
|
out_free_gib:
|
|
|
|
free_page((unsigned long)gib);
|
|
|
|
gib = NULL;
|
2019-01-31 11:52:40 +03:00
|
|
|
out:
|
|
|
|
return rc;
|
|
|
|
}
|