]> git.proxmox.com Git - mirror_ubuntu-zesty-kernel.git/blame - arch/arm/kvm/arm.c
ARM/KVM: save and restore generic timer registers
[mirror_ubuntu-zesty-kernel.git] / arch / arm / kvm / arm.c
CommitLineData
749cf76c
CD
1/*
2 * Copyright (C) 2012 - Virtual Open Systems and Columbia University
3 * Author: Christoffer Dall <c.dall@virtualopensystems.com>
4 *
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License, version 2, as
7 * published by the Free Software Foundation.
8 *
9 * This program is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
13 *
14 * You should have received a copy of the GNU General Public License
15 * along with this program; if not, write to the Free Software
16 * Foundation, 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
17 */
18
d157f4a5 19#include <linux/cpu.h>
749cf76c
CD
20#include <linux/errno.h>
21#include <linux/err.h>
22#include <linux/kvm_host.h>
23#include <linux/module.h>
24#include <linux/vmalloc.h>
25#include <linux/fs.h>
26#include <linux/mman.h>
27#include <linux/sched.h>
86ce8535 28#include <linux/kvm.h>
749cf76c
CD
29#include <trace/events/kvm.h>
30
31#define CREATE_TRACE_POINTS
32#include "trace.h"
33
749cf76c
CD
34#include <asm/uaccess.h>
35#include <asm/ptrace.h>
36#include <asm/mman.h>
342cd0ab 37#include <asm/tlbflush.h>
5b3e5e5b 38#include <asm/cacheflush.h>
342cd0ab
CD
39#include <asm/virt.h>
40#include <asm/kvm_arm.h>
41#include <asm/kvm_asm.h>
42#include <asm/kvm_mmu.h>
f7ed45be 43#include <asm/kvm_emulate.h>
5b3e5e5b 44#include <asm/kvm_coproc.h>
aa024c2f 45#include <asm/kvm_psci.h>
749cf76c
CD
46
47#ifdef REQUIRES_VIRT
48__asm__(".arch_extension virt");
49#endif
50
342cd0ab 51static DEFINE_PER_CPU(unsigned long, kvm_arm_hyp_stack_page);
3de50da6 52static kvm_cpu_context_t __percpu *kvm_host_cpu_state;
342cd0ab
CD
53static unsigned long hyp_default_vectors;
54
1638a12d
MZ
55/* Per-CPU variable containing the currently running vcpu. */
56static DEFINE_PER_CPU(struct kvm_vcpu *, kvm_arm_running_vcpu);
57
f7ed45be
CD
58/* The VMID used in the VTTBR */
59static atomic64_t kvm_vmid_gen = ATOMIC64_INIT(1);
60static u8 kvm_next_vmid;
61static DEFINE_SPINLOCK(kvm_vmid_lock);
342cd0ab 62
1a89dd91
MZ
63static bool vgic_present;
64
1638a12d
MZ
65static void kvm_arm_set_running_vcpu(struct kvm_vcpu *vcpu)
66{
67 BUG_ON(preemptible());
1436c1aa 68 __this_cpu_write(kvm_arm_running_vcpu, vcpu);
1638a12d
MZ
69}
70
71/**
72 * kvm_arm_get_running_vcpu - get the vcpu running on the current CPU.
73 * Must be called from non-preemptible context
74 */
75struct kvm_vcpu *kvm_arm_get_running_vcpu(void)
76{
77 BUG_ON(preemptible());
1436c1aa 78 return __this_cpu_read(kvm_arm_running_vcpu);
1638a12d
MZ
79}
80
81/**
82 * kvm_arm_get_running_vcpus - get the per-CPU array of currently running vcpus.
83 */
84struct kvm_vcpu __percpu **kvm_get_running_vcpus(void)
85{
86 return &kvm_arm_running_vcpu;
87}
88
749cf76c
CD
89int kvm_arch_hardware_enable(void *garbage)
90{
91 return 0;
92}
93
94int kvm_arch_vcpu_should_kick(struct kvm_vcpu *vcpu)
95{
96 return kvm_vcpu_exiting_guest_mode(vcpu) == IN_GUEST_MODE;
97}
98
99void kvm_arch_hardware_disable(void *garbage)
100{
101}
102
103int kvm_arch_hardware_setup(void)
104{
105 return 0;
106}
107
108void kvm_arch_hardware_unsetup(void)
109{
110}
111
112void kvm_arch_check_processor_compat(void *rtn)
113{
114 *(int *)rtn = 0;
115}
116
117void kvm_arch_sync_events(struct kvm *kvm)
118{
119}
120
d5d8184d
CD
121/**
122 * kvm_arch_init_vm - initializes a VM data structure
123 * @kvm: pointer to the KVM struct
124 */
749cf76c
CD
125int kvm_arch_init_vm(struct kvm *kvm, unsigned long type)
126{
d5d8184d
CD
127 int ret = 0;
128
749cf76c
CD
129 if (type)
130 return -EINVAL;
131
d5d8184d
CD
132 ret = kvm_alloc_stage2_pgd(kvm);
133 if (ret)
134 goto out_fail_alloc;
135
136 ret = create_hyp_mappings(kvm, kvm + 1);
137 if (ret)
138 goto out_free_stage2_pgd;
139
a1a64387
CD
140 kvm_timer_init(kvm);
141
d5d8184d
CD
142 /* Mark the initial VMID generation invalid */
143 kvm->arch.vmid_gen = 0;
144
145 return ret;
146out_free_stage2_pgd:
147 kvm_free_stage2_pgd(kvm);
148out_fail_alloc:
149 return ret;
749cf76c
CD
150}
151
152int kvm_arch_vcpu_fault(struct kvm_vcpu *vcpu, struct vm_fault *vmf)
153{
154 return VM_FAULT_SIGBUS;
155}
156
5587027c 157void kvm_arch_free_memslot(struct kvm *kvm, struct kvm_memory_slot *free,
749cf76c
CD
158 struct kvm_memory_slot *dont)
159{
160}
161
5587027c
AK
162int kvm_arch_create_memslot(struct kvm *kvm, struct kvm_memory_slot *slot,
163 unsigned long npages)
749cf76c
CD
164{
165 return 0;
166}
167
d5d8184d
CD
168/**
169 * kvm_arch_destroy_vm - destroy the VM data structure
170 * @kvm: pointer to the KVM struct
171 */
749cf76c
CD
172void kvm_arch_destroy_vm(struct kvm *kvm)
173{
174 int i;
175
d5d8184d
CD
176 kvm_free_stage2_pgd(kvm);
177
749cf76c
CD
178 for (i = 0; i < KVM_MAX_VCPUS; ++i) {
179 if (kvm->vcpus[i]) {
180 kvm_arch_vcpu_free(kvm->vcpus[i]);
181 kvm->vcpus[i] = NULL;
182 }
183 }
184}
185
186int kvm_dev_ioctl_check_extension(long ext)
187{
188 int r;
189 switch (ext) {
1a89dd91
MZ
190 case KVM_CAP_IRQCHIP:
191 r = vgic_present;
192 break;
749cf76c
CD
193 case KVM_CAP_USER_MEMORY:
194 case KVM_CAP_SYNC_MMU:
195 case KVM_CAP_DESTROY_MEMORY_REGION_WORKS:
196 case KVM_CAP_ONE_REG:
aa024c2f 197 case KVM_CAP_ARM_PSCI:
749cf76c
CD
198 r = 1;
199 break;
200 case KVM_CAP_COALESCED_MMIO:
201 r = KVM_COALESCED_MMIO_PAGE_OFFSET;
202 break;
3401d546
CD
203 case KVM_CAP_ARM_SET_DEVICE_ADDR:
204 r = 1;
ca46e10f 205 break;
749cf76c
CD
206 case KVM_CAP_NR_VCPUS:
207 r = num_online_cpus();
208 break;
209 case KVM_CAP_MAX_VCPUS:
210 r = KVM_MAX_VCPUS;
211 break;
212 default:
17b1e31f 213 r = kvm_arch_dev_ioctl_check_extension(ext);
749cf76c
CD
214 break;
215 }
216 return r;
217}
218
219long kvm_arch_dev_ioctl(struct file *filp,
220 unsigned int ioctl, unsigned long arg)
221{
222 return -EINVAL;
223}
224
e59dbe09
TY
225void kvm_arch_memslots_updated(struct kvm *kvm)
226{
227}
228
749cf76c
CD
229int kvm_arch_prepare_memory_region(struct kvm *kvm,
230 struct kvm_memory_slot *memslot,
749cf76c 231 struct kvm_userspace_memory_region *mem,
7b6195a9 232 enum kvm_mr_change change)
749cf76c
CD
233{
234 return 0;
235}
236
237void kvm_arch_commit_memory_region(struct kvm *kvm,
238 struct kvm_userspace_memory_region *mem,
8482644a
TY
239 const struct kvm_memory_slot *old,
240 enum kvm_mr_change change)
749cf76c
CD
241{
242}
243
244void kvm_arch_flush_shadow_all(struct kvm *kvm)
245{
246}
247
248void kvm_arch_flush_shadow_memslot(struct kvm *kvm,
249 struct kvm_memory_slot *slot)
250{
251}
252
253struct kvm_vcpu *kvm_arch_vcpu_create(struct kvm *kvm, unsigned int id)
254{
255 int err;
256 struct kvm_vcpu *vcpu;
257
258 vcpu = kmem_cache_zalloc(kvm_vcpu_cache, GFP_KERNEL);
259 if (!vcpu) {
260 err = -ENOMEM;
261 goto out;
262 }
263
264 err = kvm_vcpu_init(vcpu, kvm, id);
265 if (err)
266 goto free_vcpu;
267
d5d8184d
CD
268 err = create_hyp_mappings(vcpu, vcpu + 1);
269 if (err)
270 goto vcpu_uninit;
271
749cf76c 272 return vcpu;
d5d8184d
CD
273vcpu_uninit:
274 kvm_vcpu_uninit(vcpu);
749cf76c
CD
275free_vcpu:
276 kmem_cache_free(kvm_vcpu_cache, vcpu);
277out:
278 return ERR_PTR(err);
279}
280
281int kvm_arch_vcpu_postcreate(struct kvm_vcpu *vcpu)
282{
283 return 0;
284}
285
286void kvm_arch_vcpu_free(struct kvm_vcpu *vcpu)
287{
d5d8184d 288 kvm_mmu_free_memory_caches(vcpu);
967f8427 289 kvm_timer_vcpu_terminate(vcpu);
d5d8184d 290 kmem_cache_free(kvm_vcpu_cache, vcpu);
749cf76c
CD
291}
292
293void kvm_arch_vcpu_destroy(struct kvm_vcpu *vcpu)
294{
295 kvm_arch_vcpu_free(vcpu);
296}
297
298int kvm_cpu_has_pending_timer(struct kvm_vcpu *vcpu)
299{
300 return 0;
301}
302
749cf76c
CD
303int kvm_arch_vcpu_init(struct kvm_vcpu *vcpu)
304{
1a89dd91
MZ
305 int ret;
306
f7ed45be
CD
307 /* Force users to call KVM_ARM_VCPU_INIT */
308 vcpu->arch.target = -1;
1a89dd91
MZ
309
310 /* Set up VGIC */
311 ret = kvm_vgic_vcpu_init(vcpu);
312 if (ret)
313 return ret;
314
967f8427
MZ
315 /* Set up the timer */
316 kvm_timer_vcpu_init(vcpu);
317
749cf76c
CD
318 return 0;
319}
320
321void kvm_arch_vcpu_uninit(struct kvm_vcpu *vcpu)
322{
323}
324
325void kvm_arch_vcpu_load(struct kvm_vcpu *vcpu, int cpu)
326{
86ce8535 327 vcpu->cpu = cpu;
3de50da6 328 vcpu->arch.host_cpu_context = this_cpu_ptr(kvm_host_cpu_state);
5b3e5e5b
CD
329
330 /*
331 * Check whether this vcpu requires the cache to be flushed on
332 * this physical CPU. This is a consequence of doing dcache
333 * operations by set/way on this vcpu. We do it here to be in
334 * a non-preemptible section.
335 */
336 if (cpumask_test_and_clear_cpu(cpu, &vcpu->arch.require_dcache_flush))
337 flush_cache_all(); /* We'd really want v7_flush_dcache_all() */
1638a12d
MZ
338
339 kvm_arm_set_running_vcpu(vcpu);
749cf76c
CD
340}
341
342void kvm_arch_vcpu_put(struct kvm_vcpu *vcpu)
343{
1638a12d 344 kvm_arm_set_running_vcpu(NULL);
749cf76c
CD
345}
346
347int kvm_arch_vcpu_ioctl_set_guest_debug(struct kvm_vcpu *vcpu,
348 struct kvm_guest_debug *dbg)
349{
350 return -EINVAL;
351}
352
353
354int kvm_arch_vcpu_ioctl_get_mpstate(struct kvm_vcpu *vcpu,
355 struct kvm_mp_state *mp_state)
356{
357 return -EINVAL;
358}
359
360int kvm_arch_vcpu_ioctl_set_mpstate(struct kvm_vcpu *vcpu,
361 struct kvm_mp_state *mp_state)
362{
363 return -EINVAL;
364}
365
5b3e5e5b
CD
366/**
367 * kvm_arch_vcpu_runnable - determine if the vcpu can be scheduled
368 * @v: The VCPU pointer
369 *
370 * If the guest CPU is not waiting for interrupts or an interrupt line is
371 * asserted, the CPU is by definition runnable.
372 */
749cf76c
CD
373int kvm_arch_vcpu_runnable(struct kvm_vcpu *v)
374{
1a89dd91 375 return !!v->arch.irq_lines || kvm_vgic_vcpu_pending_irq(v);
749cf76c
CD
376}
377
f7ed45be
CD
378/* Just ensure a guest exit from a particular CPU */
379static void exit_vm_noop(void *info)
380{
381}
382
383void force_vm_exit(const cpumask_t *mask)
384{
385 smp_call_function_many(mask, exit_vm_noop, NULL, true);
386}
387
388/**
389 * need_new_vmid_gen - check that the VMID is still valid
390 * @kvm: The VM's VMID to checkt
391 *
392 * return true if there is a new generation of VMIDs being used
393 *
394 * The hardware supports only 256 values with the value zero reserved for the
395 * host, so we check if an assigned value belongs to a previous generation,
396 * which which requires us to assign a new value. If we're the first to use a
397 * VMID for the new generation, we must flush necessary caches and TLBs on all
398 * CPUs.
399 */
400static bool need_new_vmid_gen(struct kvm *kvm)
401{
402 return unlikely(kvm->arch.vmid_gen != atomic64_read(&kvm_vmid_gen));
403}
404
405/**
406 * update_vttbr - Update the VTTBR with a valid VMID before the guest runs
407 * @kvm The guest that we are about to run
408 *
409 * Called from kvm_arch_vcpu_ioctl_run before entering the guest to ensure the
410 * VM has a valid VMID, otherwise assigns a new one and flushes corresponding
411 * caches and TLBs.
412 */
413static void update_vttbr(struct kvm *kvm)
414{
415 phys_addr_t pgd_phys;
416 u64 vmid;
417
418 if (!need_new_vmid_gen(kvm))
419 return;
420
421 spin_lock(&kvm_vmid_lock);
422
423 /*
424 * We need to re-check the vmid_gen here to ensure that if another vcpu
425 * already allocated a valid vmid for this vm, then this vcpu should
426 * use the same vmid.
427 */
428 if (!need_new_vmid_gen(kvm)) {
429 spin_unlock(&kvm_vmid_lock);
430 return;
431 }
432
433 /* First user of a new VMID generation? */
434 if (unlikely(kvm_next_vmid == 0)) {
435 atomic64_inc(&kvm_vmid_gen);
436 kvm_next_vmid = 1;
437
438 /*
439 * On SMP we know no other CPUs can use this CPU's or each
440 * other's VMID after force_vm_exit returns since the
441 * kvm_vmid_lock blocks them from reentry to the guest.
442 */
443 force_vm_exit(cpu_all_mask);
444 /*
445 * Now broadcast TLB + ICACHE invalidation over the inner
446 * shareable domain to make sure all data structures are
447 * clean.
448 */
449 kvm_call_hyp(__kvm_flush_vm_context);
450 }
451
452 kvm->arch.vmid_gen = atomic64_read(&kvm_vmid_gen);
453 kvm->arch.vmid = kvm_next_vmid;
454 kvm_next_vmid++;
455
456 /* update vttbr to be used with the new vmid */
457 pgd_phys = virt_to_phys(kvm->arch.pgd);
458 vmid = ((u64)(kvm->arch.vmid) << VTTBR_VMID_SHIFT) & VTTBR_VMID_MASK;
459 kvm->arch.vttbr = pgd_phys & VTTBR_BADDR_MASK;
460 kvm->arch.vttbr |= vmid;
461
462 spin_unlock(&kvm_vmid_lock);
463}
464
f7ed45be
CD
465static int kvm_vcpu_first_run_init(struct kvm_vcpu *vcpu)
466{
467 if (likely(vcpu->arch.has_run_once))
468 return 0;
469
470 vcpu->arch.has_run_once = true;
aa024c2f 471
01ac5e34
MZ
472 /*
473 * Initialize the VGIC before running a vcpu the first time on
474 * this VM.
475 */
476 if (irqchip_in_kernel(vcpu->kvm) &&
477 unlikely(!vgic_initialized(vcpu->kvm))) {
478 int ret = kvm_vgic_init(vcpu->kvm);
479 if (ret)
480 return ret;
481 }
482
aa024c2f
MZ
483 /*
484 * Handle the "start in power-off" case by calling into the
485 * PSCI code.
486 */
487 if (test_and_clear_bit(KVM_ARM_VCPU_POWER_OFF, vcpu->arch.features)) {
488 *vcpu_reg(vcpu, 0) = KVM_PSCI_FN_CPU_OFF;
489 kvm_psci_call(vcpu);
490 }
491
f7ed45be
CD
492 return 0;
493}
494
aa024c2f
MZ
495static void vcpu_pause(struct kvm_vcpu *vcpu)
496{
497 wait_queue_head_t *wq = kvm_arch_vcpu_wq(vcpu);
498
499 wait_event_interruptible(*wq, !vcpu->arch.pause);
500}
501
e8180dca
AP
502static int kvm_vcpu_initialized(struct kvm_vcpu *vcpu)
503{
504 return vcpu->arch.target >= 0;
505}
506
f7ed45be
CD
507/**
508 * kvm_arch_vcpu_ioctl_run - the main VCPU run function to execute guest code
509 * @vcpu: The VCPU pointer
510 * @run: The kvm_run structure pointer used for userspace state exchange
511 *
512 * This function is called through the VCPU_RUN ioctl called from user space. It
513 * will execute VM code in a loop until the time slice for the process is used
514 * or some emulation is needed from user space in which case the function will
515 * return with return value 0 and with the kvm_run structure filled in with the
516 * required data for the requested emulation.
517 */
749cf76c
CD
518int kvm_arch_vcpu_ioctl_run(struct kvm_vcpu *vcpu, struct kvm_run *run)
519{
f7ed45be
CD
520 int ret;
521 sigset_t sigsaved;
522
e8180dca 523 if (unlikely(!kvm_vcpu_initialized(vcpu)))
f7ed45be
CD
524 return -ENOEXEC;
525
526 ret = kvm_vcpu_first_run_init(vcpu);
527 if (ret)
528 return ret;
529
45e96ea6
CD
530 if (run->exit_reason == KVM_EXIT_MMIO) {
531 ret = kvm_handle_mmio_return(vcpu, vcpu->run);
532 if (ret)
533 return ret;
534 }
535
f7ed45be
CD
536 if (vcpu->sigset_active)
537 sigprocmask(SIG_SETMASK, &vcpu->sigset, &sigsaved);
538
539 ret = 1;
540 run->exit_reason = KVM_EXIT_UNKNOWN;
541 while (ret > 0) {
542 /*
543 * Check conditions before entering the guest
544 */
545 cond_resched();
546
547 update_vttbr(vcpu->kvm);
548
aa024c2f
MZ
549 if (vcpu->arch.pause)
550 vcpu_pause(vcpu);
551
1a89dd91 552 kvm_vgic_flush_hwstate(vcpu);
c7e3ba64 553 kvm_timer_flush_hwstate(vcpu);
1a89dd91 554
f7ed45be
CD
555 local_irq_disable();
556
557 /*
558 * Re-check atomic conditions
559 */
560 if (signal_pending(current)) {
561 ret = -EINTR;
562 run->exit_reason = KVM_EXIT_INTR;
563 }
564
565 if (ret <= 0 || need_new_vmid_gen(vcpu->kvm)) {
566 local_irq_enable();
c7e3ba64 567 kvm_timer_sync_hwstate(vcpu);
1a89dd91 568 kvm_vgic_sync_hwstate(vcpu);
f7ed45be
CD
569 continue;
570 }
571
572 /**************************************************************
573 * Enter the guest
574 */
575 trace_kvm_entry(*vcpu_pc(vcpu));
576 kvm_guest_enter();
577 vcpu->mode = IN_GUEST_MODE;
578
579 ret = kvm_call_hyp(__kvm_vcpu_run, vcpu);
580
581 vcpu->mode = OUTSIDE_GUEST_MODE;
5b3e5e5b 582 vcpu->arch.last_pcpu = smp_processor_id();
f7ed45be
CD
583 kvm_guest_exit();
584 trace_kvm_exit(*vcpu_pc(vcpu));
585 /*
586 * We may have taken a host interrupt in HYP mode (ie
587 * while executing the guest). This interrupt is still
588 * pending, as we haven't serviced it yet!
589 *
590 * We're now back in SVC mode, with interrupts
591 * disabled. Enabling the interrupts now will have
592 * the effect of taking the interrupt again, in SVC
593 * mode this time.
594 */
595 local_irq_enable();
596
597 /*
598 * Back from guest
599 *************************************************************/
600
c7e3ba64 601 kvm_timer_sync_hwstate(vcpu);
1a89dd91
MZ
602 kvm_vgic_sync_hwstate(vcpu);
603
f7ed45be
CD
604 ret = handle_exit(vcpu, run, ret);
605 }
606
607 if (vcpu->sigset_active)
608 sigprocmask(SIG_SETMASK, &sigsaved, NULL);
609 return ret;
749cf76c
CD
610}
611
86ce8535
CD
612static int vcpu_interrupt_line(struct kvm_vcpu *vcpu, int number, bool level)
613{
614 int bit_index;
615 bool set;
616 unsigned long *ptr;
617
618 if (number == KVM_ARM_IRQ_CPU_IRQ)
619 bit_index = __ffs(HCR_VI);
620 else /* KVM_ARM_IRQ_CPU_FIQ */
621 bit_index = __ffs(HCR_VF);
622
623 ptr = (unsigned long *)&vcpu->arch.irq_lines;
624 if (level)
625 set = test_and_set_bit(bit_index, ptr);
626 else
627 set = test_and_clear_bit(bit_index, ptr);
628
629 /*
630 * If we didn't change anything, no need to wake up or kick other CPUs
631 */
632 if (set == level)
633 return 0;
634
635 /*
636 * The vcpu irq_lines field was updated, wake up sleeping VCPUs and
637 * trigger a world-switch round on the running physical CPU to set the
638 * virtual IRQ/FIQ fields in the HCR appropriately.
639 */
640 kvm_vcpu_kick(vcpu);
641
642 return 0;
643}
644
79558f11
AG
645int kvm_vm_ioctl_irq_line(struct kvm *kvm, struct kvm_irq_level *irq_level,
646 bool line_status)
86ce8535
CD
647{
648 u32 irq = irq_level->irq;
649 unsigned int irq_type, vcpu_idx, irq_num;
650 int nrcpus = atomic_read(&kvm->online_vcpus);
651 struct kvm_vcpu *vcpu = NULL;
652 bool level = irq_level->level;
653
654 irq_type = (irq >> KVM_ARM_IRQ_TYPE_SHIFT) & KVM_ARM_IRQ_TYPE_MASK;
655 vcpu_idx = (irq >> KVM_ARM_IRQ_VCPU_SHIFT) & KVM_ARM_IRQ_VCPU_MASK;
656 irq_num = (irq >> KVM_ARM_IRQ_NUM_SHIFT) & KVM_ARM_IRQ_NUM_MASK;
657
658 trace_kvm_irq_line(irq_type, vcpu_idx, irq_num, irq_level->level);
659
5863c2ce
MZ
660 switch (irq_type) {
661 case KVM_ARM_IRQ_TYPE_CPU:
662 if (irqchip_in_kernel(kvm))
663 return -ENXIO;
86ce8535 664
5863c2ce
MZ
665 if (vcpu_idx >= nrcpus)
666 return -EINVAL;
86ce8535 667
5863c2ce
MZ
668 vcpu = kvm_get_vcpu(kvm, vcpu_idx);
669 if (!vcpu)
670 return -EINVAL;
86ce8535 671
5863c2ce
MZ
672 if (irq_num > KVM_ARM_IRQ_CPU_FIQ)
673 return -EINVAL;
674
675 return vcpu_interrupt_line(vcpu, irq_num, level);
676 case KVM_ARM_IRQ_TYPE_PPI:
677 if (!irqchip_in_kernel(kvm))
678 return -ENXIO;
679
680 if (vcpu_idx >= nrcpus)
681 return -EINVAL;
682
683 vcpu = kvm_get_vcpu(kvm, vcpu_idx);
684 if (!vcpu)
685 return -EINVAL;
686
687 if (irq_num < VGIC_NR_SGIS || irq_num >= VGIC_NR_PRIVATE_IRQS)
688 return -EINVAL;
86ce8535 689
5863c2ce
MZ
690 return kvm_vgic_inject_irq(kvm, vcpu->vcpu_id, irq_num, level);
691 case KVM_ARM_IRQ_TYPE_SPI:
692 if (!irqchip_in_kernel(kvm))
693 return -ENXIO;
694
695 if (irq_num < VGIC_NR_PRIVATE_IRQS ||
696 irq_num > KVM_ARM_IRQ_GIC_MAX)
697 return -EINVAL;
698
699 return kvm_vgic_inject_irq(kvm, 0, irq_num, level);
700 }
701
702 return -EINVAL;
86ce8535
CD
703}
704
749cf76c
CD
705long kvm_arch_vcpu_ioctl(struct file *filp,
706 unsigned int ioctl, unsigned long arg)
707{
708 struct kvm_vcpu *vcpu = filp->private_data;
709 void __user *argp = (void __user *)arg;
710
711 switch (ioctl) {
712 case KVM_ARM_VCPU_INIT: {
713 struct kvm_vcpu_init init;
714
715 if (copy_from_user(&init, argp, sizeof(init)))
716 return -EFAULT;
717
718 return kvm_vcpu_set_target(vcpu, &init);
719
720 }
721 case KVM_SET_ONE_REG:
722 case KVM_GET_ONE_REG: {
723 struct kvm_one_reg reg;
e8180dca
AP
724
725 if (unlikely(!kvm_vcpu_initialized(vcpu)))
726 return -ENOEXEC;
727
749cf76c
CD
728 if (copy_from_user(&reg, argp, sizeof(reg)))
729 return -EFAULT;
730 if (ioctl == KVM_SET_ONE_REG)
731 return kvm_arm_set_reg(vcpu, &reg);
732 else
733 return kvm_arm_get_reg(vcpu, &reg);
734 }
735 case KVM_GET_REG_LIST: {
736 struct kvm_reg_list __user *user_list = argp;
737 struct kvm_reg_list reg_list;
738 unsigned n;
739
e8180dca
AP
740 if (unlikely(!kvm_vcpu_initialized(vcpu)))
741 return -ENOEXEC;
742
749cf76c
CD
743 if (copy_from_user(&reg_list, user_list, sizeof(reg_list)))
744 return -EFAULT;
745 n = reg_list.n;
746 reg_list.n = kvm_arm_num_regs(vcpu);
747 if (copy_to_user(user_list, &reg_list, sizeof(reg_list)))
748 return -EFAULT;
749 if (n < reg_list.n)
750 return -E2BIG;
751 return kvm_arm_copy_reg_indices(vcpu, user_list->reg);
752 }
753 default:
754 return -EINVAL;
755 }
756}
757
758int kvm_vm_ioctl_get_dirty_log(struct kvm *kvm, struct kvm_dirty_log *log)
759{
760 return -EINVAL;
761}
762
3401d546
CD
763static int kvm_vm_ioctl_set_device_addr(struct kvm *kvm,
764 struct kvm_arm_device_addr *dev_addr)
765{
330690cd
CD
766 unsigned long dev_id, type;
767
768 dev_id = (dev_addr->id & KVM_ARM_DEVICE_ID_MASK) >>
769 KVM_ARM_DEVICE_ID_SHIFT;
770 type = (dev_addr->id & KVM_ARM_DEVICE_TYPE_MASK) >>
771 KVM_ARM_DEVICE_TYPE_SHIFT;
772
773 switch (dev_id) {
774 case KVM_ARM_DEVICE_VGIC_V2:
775 if (!vgic_present)
776 return -ENXIO;
777 return kvm_vgic_set_addr(kvm, type, dev_addr->addr);
778 default:
779 return -ENODEV;
780 }
3401d546
CD
781}
782
749cf76c
CD
783long kvm_arch_vm_ioctl(struct file *filp,
784 unsigned int ioctl, unsigned long arg)
785{
3401d546
CD
786 struct kvm *kvm = filp->private_data;
787 void __user *argp = (void __user *)arg;
788
789 switch (ioctl) {
5863c2ce
MZ
790 case KVM_CREATE_IRQCHIP: {
791 if (vgic_present)
792 return kvm_vgic_create(kvm);
793 else
794 return -ENXIO;
795 }
3401d546
CD
796 case KVM_ARM_SET_DEVICE_ADDR: {
797 struct kvm_arm_device_addr dev_addr;
798
799 if (copy_from_user(&dev_addr, argp, sizeof(dev_addr)))
800 return -EFAULT;
801 return kvm_vm_ioctl_set_device_addr(kvm, &dev_addr);
802 }
42c4e0c7
AP
803 case KVM_ARM_PREFERRED_TARGET: {
804 int err;
805 struct kvm_vcpu_init init;
806
807 err = kvm_vcpu_preferred_target(&init);
808 if (err)
809 return err;
810
811 if (copy_to_user(argp, &init, sizeof(init)))
812 return -EFAULT;
813
814 return 0;
815 }
3401d546
CD
816 default:
817 return -EINVAL;
818 }
749cf76c
CD
819}
820
d157f4a5 821static void cpu_init_hyp_mode(void *dummy)
342cd0ab 822{
dac288f7
MZ
823 phys_addr_t boot_pgd_ptr;
824 phys_addr_t pgd_ptr;
342cd0ab
CD
825 unsigned long hyp_stack_ptr;
826 unsigned long stack_page;
827 unsigned long vector_ptr;
828
829 /* Switch from the HYP stub to our own HYP init vector */
5a677ce0 830 __hyp_set_vectors(kvm_get_idmap_vector());
342cd0ab 831
dac288f7
MZ
832 boot_pgd_ptr = kvm_mmu_get_boot_httbr();
833 pgd_ptr = kvm_mmu_get_httbr();
1436c1aa 834 stack_page = __this_cpu_read(kvm_arm_hyp_stack_page);
342cd0ab
CD
835 hyp_stack_ptr = stack_page + PAGE_SIZE;
836 vector_ptr = (unsigned long)__kvm_hyp_vector;
837
5a677ce0 838 __cpu_init_hyp_mode(boot_pgd_ptr, pgd_ptr, hyp_stack_ptr, vector_ptr);
342cd0ab
CD
839}
840
d157f4a5
MZ
841static int hyp_init_cpu_notify(struct notifier_block *self,
842 unsigned long action, void *cpu)
843{
844 switch (action) {
845 case CPU_STARTING:
846 case CPU_STARTING_FROZEN:
847 cpu_init_hyp_mode(NULL);
848 break;
849 }
850
851 return NOTIFY_OK;
342cd0ab
CD
852}
853
d157f4a5
MZ
854static struct notifier_block hyp_init_cpu_nb = {
855 .notifier_call = hyp_init_cpu_notify,
856};
857
342cd0ab
CD
858/**
859 * Inits Hyp-mode on all online CPUs
860 */
861static int init_hyp_mode(void)
862{
342cd0ab
CD
863 int cpu;
864 int err = 0;
865
866 /*
867 * Allocate Hyp PGD and setup Hyp identity mapping
868 */
869 err = kvm_mmu_init();
870 if (err)
871 goto out_err;
872
873 /*
874 * It is probably enough to obtain the default on one
875 * CPU. It's unlikely to be different on the others.
876 */
877 hyp_default_vectors = __hyp_get_vectors();
878
879 /*
880 * Allocate stack pages for Hypervisor-mode
881 */
882 for_each_possible_cpu(cpu) {
883 unsigned long stack_page;
884
885 stack_page = __get_free_page(GFP_KERNEL);
886 if (!stack_page) {
887 err = -ENOMEM;
888 goto out_free_stack_pages;
889 }
890
891 per_cpu(kvm_arm_hyp_stack_page, cpu) = stack_page;
892 }
893
342cd0ab
CD
894 /*
895 * Map the Hyp-code called directly from the host
896 */
897 err = create_hyp_mappings(__kvm_hyp_code_start, __kvm_hyp_code_end);
898 if (err) {
899 kvm_err("Cannot map world-switch code\n");
900 goto out_free_mappings;
901 }
902
903 /*
904 * Map the Hyp stack pages
905 */
906 for_each_possible_cpu(cpu) {
907 char *stack_page = (char *)per_cpu(kvm_arm_hyp_stack_page, cpu);
908 err = create_hyp_mappings(stack_page, stack_page + PAGE_SIZE);
909
910 if (err) {
911 kvm_err("Cannot map hyp stack\n");
912 goto out_free_mappings;
913 }
914 }
915
916 /*
3de50da6 917 * Map the host CPU structures
342cd0ab 918 */
3de50da6
MZ
919 kvm_host_cpu_state = alloc_percpu(kvm_cpu_context_t);
920 if (!kvm_host_cpu_state) {
342cd0ab 921 err = -ENOMEM;
3de50da6 922 kvm_err("Cannot allocate host CPU state\n");
342cd0ab
CD
923 goto out_free_mappings;
924 }
925
926 for_each_possible_cpu(cpu) {
3de50da6 927 kvm_cpu_context_t *cpu_ctxt;
342cd0ab 928
3de50da6
MZ
929 cpu_ctxt = per_cpu_ptr(kvm_host_cpu_state, cpu);
930 err = create_hyp_mappings(cpu_ctxt, cpu_ctxt + 1);
342cd0ab
CD
931
932 if (err) {
3de50da6
MZ
933 kvm_err("Cannot map host CPU state: %d\n", err);
934 goto out_free_context;
342cd0ab
CD
935 }
936 }
937
d157f4a5
MZ
938 /*
939 * Execute the init code on each CPU.
940 */
941 on_each_cpu(cpu_init_hyp_mode, NULL, 1);
942
1a89dd91
MZ
943 /*
944 * Init HYP view of VGIC
945 */
946 err = kvm_vgic_hyp_init();
947 if (err)
3de50da6 948 goto out_free_context;
1a89dd91 949
01ac5e34
MZ
950#ifdef CONFIG_KVM_ARM_VGIC
951 vgic_present = true;
952#endif
953
967f8427
MZ
954 /*
955 * Init HYP architected timer support
956 */
957 err = kvm_timer_hyp_init();
958 if (err)
959 goto out_free_mappings;
960
d157f4a5
MZ
961#ifndef CONFIG_HOTPLUG_CPU
962 free_boot_hyp_pgd();
963#endif
964
210552c1
MZ
965 kvm_perf_init();
966
342cd0ab 967 kvm_info("Hyp mode initialized successfully\n");
210552c1 968
342cd0ab 969 return 0;
3de50da6
MZ
970out_free_context:
971 free_percpu(kvm_host_cpu_state);
342cd0ab 972out_free_mappings:
4f728276 973 free_hyp_pgds();
342cd0ab
CD
974out_free_stack_pages:
975 for_each_possible_cpu(cpu)
976 free_page(per_cpu(kvm_arm_hyp_stack_page, cpu));
977out_err:
978 kvm_err("error initializing Hyp mode: %d\n", err);
979 return err;
980}
981
d4e071ce
AP
982static void check_kvm_target_cpu(void *ret)
983{
984 *(int *)ret = kvm_target_cpu();
985}
986
342cd0ab
CD
987/**
988 * Initialize Hyp-mode and memory mappings on all CPUs.
989 */
749cf76c
CD
990int kvm_arch_init(void *opaque)
991{
342cd0ab 992 int err;
d4e071ce 993 int ret, cpu;
342cd0ab
CD
994
995 if (!is_hyp_mode_available()) {
996 kvm_err("HYP mode not available\n");
997 return -ENODEV;
998 }
999
d4e071ce
AP
1000 for_each_online_cpu(cpu) {
1001 smp_call_function_single(cpu, check_kvm_target_cpu, &ret, 1);
1002 if (ret < 0) {
1003 kvm_err("Error, CPU %d not supported!\n", cpu);
1004 return -ENODEV;
1005 }
342cd0ab
CD
1006 }
1007
1008 err = init_hyp_mode();
1009 if (err)
1010 goto out_err;
1011
d157f4a5
MZ
1012 err = register_cpu_notifier(&hyp_init_cpu_nb);
1013 if (err) {
1014 kvm_err("Cannot register HYP init CPU notifier (%d)\n", err);
1015 goto out_err;
1016 }
1017
5b3e5e5b 1018 kvm_coproc_table_init();
749cf76c 1019 return 0;
342cd0ab
CD
1020out_err:
1021 return err;
749cf76c
CD
1022}
1023
1024/* NOP: Compiling as a module not supported */
1025void kvm_arch_exit(void)
1026{
210552c1 1027 kvm_perf_teardown();
749cf76c
CD
1028}
1029
1030static int arm_init(void)
1031{
1032 int rc = kvm_init(NULL, sizeof(struct kvm_vcpu), 0, THIS_MODULE);
1033 return rc;
1034}
1035
1036module_init(arm_init);