]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blame - virt/kvm/irqchip.c
KVM: Use vcpu-specific gva->hva translation when querying host page size
[mirror_ubuntu-bionic-kernel.git] / virt / kvm / irqchip.c
CommitLineData
1c9f8520
AG
1/*
2 * irqchip.c: Common API for in kernel interrupt controllers
3 * Copyright (c) 2007, Intel Corporation.
4 * Copyright 2010 Red Hat, Inc. and/or its affiliates.
5 * Copyright (c) 2013, Alexander Graf <agraf@suse.de>
6 *
7 * This program is free software; you can redistribute it and/or modify it
8 * under the terms and conditions of the GNU General Public License,
9 * version 2, as published by the Free Software Foundation.
10 *
11 * This program is distributed in the hope it will be useful, but WITHOUT
12 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
13 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
14 * more details.
15 *
16 * You should have received a copy of the GNU General Public License along with
17 * this program; if not, write to the Free Software Foundation, Inc., 59 Temple
18 * Place - Suite 330, Boston, MA 02111-1307 USA.
19 *
20 * This file is derived from virt/kvm/irq_comm.c.
21 *
22 * Authors:
23 * Yaozu (Eddie) Dong <Eddie.dong@intel.com>
24 * Alexander Graf <agraf@suse.de>
25 */
26
27#include <linux/kvm_host.h>
28#include <linux/slab.h>
719d93cd 29#include <linux/srcu.h>
1c9f8520
AG
30#include <linux/export.h>
31#include <trace/events/kvm.h>
32#include "irq.h"
33
9957c86d
PM
34int kvm_irq_map_gsi(struct kvm *kvm,
35 struct kvm_kernel_irq_routing_entry *entries, int gsi)
8ba918d4 36{
9957c86d 37 struct kvm_irq_routing_table *irq_rt;
8ba918d4
PM
38 struct kvm_kernel_irq_routing_entry *e;
39 int n = 0;
40
9957c86d
PM
41 irq_rt = srcu_dereference_check(kvm->irq_routing, &kvm->irq_srcu,
42 lockdep_is_held(&kvm->irq_lock));
c622a3c2 43 if (irq_rt && gsi < irq_rt->nr_rt_entries) {
8ba918d4
PM
44 hlist_for_each_entry(e, &irq_rt->map[gsi], link) {
45 entries[n] = *e;
46 ++n;
47 }
48 }
49
50 return n;
51}
52
9957c86d 53int kvm_irq_map_chip_pin(struct kvm *kvm, unsigned irqchip, unsigned pin)
8ba918d4 54{
9957c86d
PM
55 struct kvm_irq_routing_table *irq_rt;
56
57 irq_rt = srcu_dereference(kvm->irq_routing, &kvm->irq_srcu);
8ba918d4
PM
58 return irq_rt->chip[irqchip][pin];
59}
60
1c9f8520
AG
61int kvm_send_userspace_msi(struct kvm *kvm, struct kvm_msi *msi)
62{
63 struct kvm_kernel_irq_routing_entry route;
64
ebe91525 65 if (!irqchip_in_kernel(kvm) || (msi->flags & ~KVM_MSI_VALID_DEVID))
1c9f8520
AG
66 return -EINVAL;
67
68 route.msi.address_lo = msi->address_lo;
69 route.msi.address_hi = msi->address_hi;
70 route.msi.data = msi->data;
ebe91525
EA
71 route.msi.flags = msi->flags;
72 route.msi.devid = msi->devid;
1c9f8520
AG
73
74 return kvm_set_msi(&route, kvm, KVM_USERSPACE_IRQ_SOURCE_ID, 1, false);
75}
76
77/*
78 * Return value:
79 * < 0 Interrupt was ignored (masked or not delivered for other reasons)
80 * = 0 Interrupt was coalesced (previous irq is still pending)
81 * > 0 Number of CPUs interrupt was delivered to
82 */
83int kvm_set_irq(struct kvm *kvm, int irq_source_id, u32 irq, int level,
84 bool line_status)
85{
8ba918d4
PM
86 struct kvm_kernel_irq_routing_entry irq_set[KVM_NR_IRQCHIPS];
87 int ret = -1, i, idx;
1c9f8520
AG
88
89 trace_kvm_set_irq(irq, level, irq_source_id);
90
91 /* Not possible to detect if the guest uses the PIC or the
92 * IOAPIC. So set the bit in both. The guest will ignore
93 * writes to the unused one.
94 */
719d93cd 95 idx = srcu_read_lock(&kvm->irq_srcu);
9957c86d 96 i = kvm_irq_map_gsi(kvm, irq_set, irq);
719d93cd 97 srcu_read_unlock(&kvm->irq_srcu, idx);
1c9f8520 98
ae548c5c 99 while (i--) {
1c9f8520
AG
100 int r;
101 r = irq_set[i].set(&irq_set[i], kvm, irq_source_id, level,
102 line_status);
103 if (r < 0)
104 continue;
105
106 ret = r + ((ret < 0) ? 0 : ret);
107 }
108
109 return ret;
110}
111
e73f61e4
JR
112static void free_irq_routing_table(struct kvm_irq_routing_table *rt)
113{
114 int i;
115
116 if (!rt)
117 return;
118
119 for (i = 0; i < rt->nr_rt_entries; ++i) {
120 struct kvm_kernel_irq_routing_entry *e;
121 struct hlist_node *n;
122
123 hlist_for_each_entry_safe(e, n, &rt->map[i], link) {
124 hlist_del(&e->link);
125 kfree(e);
126 }
127 }
128
129 kfree(rt);
130}
131
1c9f8520
AG
132void kvm_free_irq_routing(struct kvm *kvm)
133{
134 /* Called only during vm destruction. Nobody can use the pointer
135 at this stage */
e73f61e4
JR
136 struct kvm_irq_routing_table *rt = rcu_access_pointer(kvm->irq_routing);
137 free_irq_routing_table(rt);
1c9f8520 138}
e8cde093 139
c63cf538
RK
140static int setup_routing_entry(struct kvm *kvm,
141 struct kvm_irq_routing_table *rt,
e8cde093
AG
142 struct kvm_kernel_irq_routing_entry *e,
143 const struct kvm_irq_routing_entry *ue)
144{
e8cde093 145 struct kvm_kernel_irq_routing_entry *ei;
8c6b7828 146 int r;
61b5d013 147 u32 gsi = array_index_nospec(ue->gsi, KVM_MAX_IRQ_ROUTES);
e8cde093
AG
148
149 /*
150 * Do not allow GSI to be mapped to the same irqchip more than once.
f33143d8 151 * Allow only one to one mapping between GSI and non-irqchip routing.
e8cde093 152 */
61b5d013 153 hlist_for_each_entry(ei, &rt->map[gsi], link)
f33143d8
AS
154 if (ei->type != KVM_IRQ_ROUTING_IRQCHIP ||
155 ue->type != KVM_IRQ_ROUTING_IRQCHIP ||
e8cde093 156 ue->u.irqchip.irqchip == ei->irqchip.irqchip)
8c6b7828 157 return -EINVAL;
e8cde093 158
61b5d013 159 e->gsi = gsi;
e8cde093 160 e->type = ue->type;
c63cf538 161 r = kvm_set_routing_entry(kvm, e, ue);
e8cde093 162 if (r)
8c6b7828 163 return r;
8ba918d4
PM
164 if (e->type == KVM_IRQ_ROUTING_IRQCHIP)
165 rt->chip[e->irqchip.irqchip][e->irqchip.pin] = e->gsi;
e8cde093
AG
166
167 hlist_add_head(&e->link, &rt->map[e->gsi]);
8c6b7828
DH
168
169 return 0;
e8cde093
AG
170}
171
abdb080f
AS
172void __attribute__((weak)) kvm_arch_irq_routing_update(struct kvm *kvm)
173{
174}
175
5c0aea0e
DH
176bool __weak kvm_arch_can_set_irq_routing(struct kvm *kvm)
177{
178 return true;
179}
180
e8cde093
AG
181int kvm_set_irq_routing(struct kvm *kvm,
182 const struct kvm_irq_routing_entry *ue,
183 unsigned nr,
184 unsigned flags)
185{
186 struct kvm_irq_routing_table *new, *old;
995a0ee9 187 struct kvm_kernel_irq_routing_entry *e;
e8cde093
AG
188 u32 i, j, nr_rt_entries = 0;
189 int r;
190
191 for (i = 0; i < nr; ++i) {
192 if (ue[i].gsi >= KVM_MAX_IRQ_ROUTES)
193 return -EINVAL;
194 nr_rt_entries = max(nr_rt_entries, ue[i].gsi);
195 }
196
197 nr_rt_entries += 1;
198
e73f61e4 199 new = kzalloc(sizeof(*new) + (nr_rt_entries * sizeof(struct hlist_head)),
e8cde093
AG
200 GFP_KERNEL);
201
202 if (!new)
203 return -ENOMEM;
204
e8cde093
AG
205 new->nr_rt_entries = nr_rt_entries;
206 for (i = 0; i < KVM_NR_IRQCHIPS; i++)
207 for (j = 0; j < KVM_IRQCHIP_NUM_PINS; j++)
208 new->chip[i][j] = -1;
209
210 for (i = 0; i < nr; ++i) {
e73f61e4
JR
211 r = -ENOMEM;
212 e = kzalloc(sizeof(*e), GFP_KERNEL);
213 if (!e)
214 goto out;
215
e8cde093 216 r = -EINVAL;
995a0ee9
EA
217 switch (ue->type) {
218 case KVM_IRQ_ROUTING_MSI:
219 if (ue->flags & ~KVM_MSI_VALID_DEVID)
220 goto free_entry;
221 break;
222 default:
223 if (ue->flags)
224 goto free_entry;
225 break;
ba60c41a 226 }
c63cf538 227 r = setup_routing_entry(kvm, new, e, ue);
995a0ee9
EA
228 if (r)
229 goto free_entry;
e8cde093
AG
230 ++ue;
231 }
232
233 mutex_lock(&kvm->irq_lock);
5535f800 234 old = rcu_dereference_protected(kvm->irq_routing, 1);
9957c86d
PM
235 rcu_assign_pointer(kvm->irq_routing, new);
236 kvm_irq_routing_update(kvm);
abdb080f 237 kvm_arch_irq_routing_update(kvm);
e8cde093
AG
238 mutex_unlock(&kvm->irq_lock);
239
abdb080f 240 kvm_arch_post_irq_routing_update(kvm);
b053b2ae 241
719d93cd 242 synchronize_srcu_expedited(&kvm->irq_srcu);
e8cde093
AG
243
244 new = old;
245 r = 0;
995a0ee9 246 goto out;
e8cde093 247
995a0ee9
EA
248free_entry:
249 kfree(e);
e8cde093 250out:
e73f61e4
JR
251 free_irq_routing_table(new);
252
e8cde093
AG
253 return r;
254}