vgic-kvm-device.c 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710
  1. // SPDX-License-Identifier: GPL-2.0-only
  2. /*
  3. * VGIC: KVM DEVICE API
  4. *
  5. * Copyright (C) 2015 ARM Ltd.
  6. * Author: Marc Zyngier <[email protected]>
  7. */
  8. #include <linux/kvm_host.h>
  9. #include <kvm/arm_vgic.h>
  10. #include <linux/uaccess.h>
  11. #include <asm/kvm_mmu.h>
  12. #include <asm/cputype.h>
  13. #include "vgic.h"
  14. /* common helpers */
  15. int vgic_check_iorange(struct kvm *kvm, phys_addr_t ioaddr,
  16. phys_addr_t addr, phys_addr_t alignment,
  17. phys_addr_t size)
  18. {
  19. if (!IS_VGIC_ADDR_UNDEF(ioaddr))
  20. return -EEXIST;
  21. if (!IS_ALIGNED(addr, alignment) || !IS_ALIGNED(size, alignment))
  22. return -EINVAL;
  23. if (addr + size < addr)
  24. return -EINVAL;
  25. if (addr & ~kvm_phys_mask(kvm) || addr + size > kvm_phys_size(kvm))
  26. return -E2BIG;
  27. return 0;
  28. }
  29. static int vgic_check_type(struct kvm *kvm, int type_needed)
  30. {
  31. if (kvm->arch.vgic.vgic_model != type_needed)
  32. return -ENODEV;
  33. else
  34. return 0;
  35. }
  36. int kvm_set_legacy_vgic_v2_addr(struct kvm *kvm, struct kvm_arm_device_addr *dev_addr)
  37. {
  38. struct vgic_dist *vgic = &kvm->arch.vgic;
  39. int r;
  40. mutex_lock(&kvm->arch.config_lock);
  41. switch (FIELD_GET(KVM_ARM_DEVICE_TYPE_MASK, dev_addr->id)) {
  42. case KVM_VGIC_V2_ADDR_TYPE_DIST:
  43. r = vgic_check_type(kvm, KVM_DEV_TYPE_ARM_VGIC_V2);
  44. if (!r)
  45. r = vgic_check_iorange(kvm, vgic->vgic_dist_base, dev_addr->addr,
  46. SZ_4K, KVM_VGIC_V2_DIST_SIZE);
  47. if (!r)
  48. vgic->vgic_dist_base = dev_addr->addr;
  49. break;
  50. case KVM_VGIC_V2_ADDR_TYPE_CPU:
  51. r = vgic_check_type(kvm, KVM_DEV_TYPE_ARM_VGIC_V2);
  52. if (!r)
  53. r = vgic_check_iorange(kvm, vgic->vgic_cpu_base, dev_addr->addr,
  54. SZ_4K, KVM_VGIC_V2_CPU_SIZE);
  55. if (!r)
  56. vgic->vgic_cpu_base = dev_addr->addr;
  57. break;
  58. default:
  59. r = -ENODEV;
  60. }
  61. mutex_unlock(&kvm->arch.config_lock);
  62. return r;
  63. }
  64. /**
  65. * kvm_vgic_addr - set or get vgic VM base addresses
  66. * @kvm: pointer to the vm struct
  67. * @attr: pointer to the attribute being retrieved/updated
  68. * @write: if true set the address in the VM address space, if false read the
  69. * address
  70. *
  71. * Set or get the vgic base addresses for the distributor and the virtual CPU
  72. * interface in the VM physical address space. These addresses are properties
  73. * of the emulated core/SoC and therefore user space initially knows this
  74. * information.
  75. * Check them for sanity (alignment, double assignment). We can't check for
  76. * overlapping regions in case of a virtual GICv3 here, since we don't know
  77. * the number of VCPUs yet, so we defer this check to map_resources().
  78. */
  79. static int kvm_vgic_addr(struct kvm *kvm, struct kvm_device_attr *attr, bool write)
  80. {
  81. u64 __user *uaddr = (u64 __user *)attr->addr;
  82. struct vgic_dist *vgic = &kvm->arch.vgic;
  83. phys_addr_t *addr_ptr, alignment, size;
  84. u64 undef_value = VGIC_ADDR_UNDEF;
  85. u64 addr;
  86. int r;
  87. /* Reading a redistributor region addr implies getting the index */
  88. if (write || attr->attr == KVM_VGIC_V3_ADDR_TYPE_REDIST_REGION)
  89. if (get_user(addr, uaddr))
  90. return -EFAULT;
  91. /*
  92. * Since we can't hold config_lock while registering the redistributor
  93. * iodevs, take the slots_lock immediately.
  94. */
  95. mutex_lock(&kvm->slots_lock);
  96. switch (attr->attr) {
  97. case KVM_VGIC_V2_ADDR_TYPE_DIST:
  98. r = vgic_check_type(kvm, KVM_DEV_TYPE_ARM_VGIC_V2);
  99. addr_ptr = &vgic->vgic_dist_base;
  100. alignment = SZ_4K;
  101. size = KVM_VGIC_V2_DIST_SIZE;
  102. break;
  103. case KVM_VGIC_V2_ADDR_TYPE_CPU:
  104. r = vgic_check_type(kvm, KVM_DEV_TYPE_ARM_VGIC_V2);
  105. addr_ptr = &vgic->vgic_cpu_base;
  106. alignment = SZ_4K;
  107. size = KVM_VGIC_V2_CPU_SIZE;
  108. break;
  109. case KVM_VGIC_V3_ADDR_TYPE_DIST:
  110. r = vgic_check_type(kvm, KVM_DEV_TYPE_ARM_VGIC_V3);
  111. addr_ptr = &vgic->vgic_dist_base;
  112. alignment = SZ_64K;
  113. size = KVM_VGIC_V3_DIST_SIZE;
  114. break;
  115. case KVM_VGIC_V3_ADDR_TYPE_REDIST: {
  116. struct vgic_redist_region *rdreg;
  117. r = vgic_check_type(kvm, KVM_DEV_TYPE_ARM_VGIC_V3);
  118. if (r)
  119. break;
  120. if (write) {
  121. r = vgic_v3_set_redist_base(kvm, 0, addr, 0);
  122. goto out;
  123. }
  124. rdreg = list_first_entry_or_null(&vgic->rd_regions,
  125. struct vgic_redist_region, list);
  126. if (!rdreg)
  127. addr_ptr = &undef_value;
  128. else
  129. addr_ptr = &rdreg->base;
  130. break;
  131. }
  132. case KVM_VGIC_V3_ADDR_TYPE_REDIST_REGION:
  133. {
  134. struct vgic_redist_region *rdreg;
  135. u8 index;
  136. r = vgic_check_type(kvm, KVM_DEV_TYPE_ARM_VGIC_V3);
  137. if (r)
  138. break;
  139. index = addr & KVM_VGIC_V3_RDIST_INDEX_MASK;
  140. if (write) {
  141. gpa_t base = addr & KVM_VGIC_V3_RDIST_BASE_MASK;
  142. u32 count = FIELD_GET(KVM_VGIC_V3_RDIST_COUNT_MASK, addr);
  143. u8 flags = FIELD_GET(KVM_VGIC_V3_RDIST_FLAGS_MASK, addr);
  144. if (!count || flags)
  145. r = -EINVAL;
  146. else
  147. r = vgic_v3_set_redist_base(kvm, index,
  148. base, count);
  149. goto out;
  150. }
  151. rdreg = vgic_v3_rdist_region_from_index(kvm, index);
  152. if (!rdreg) {
  153. r = -ENOENT;
  154. goto out;
  155. }
  156. addr = index;
  157. addr |= rdreg->base;
  158. addr |= (u64)rdreg->count << KVM_VGIC_V3_RDIST_COUNT_SHIFT;
  159. goto out;
  160. }
  161. default:
  162. r = -ENODEV;
  163. }
  164. if (r)
  165. goto out;
  166. mutex_lock(&kvm->arch.config_lock);
  167. if (write) {
  168. r = vgic_check_iorange(kvm, *addr_ptr, addr, alignment, size);
  169. if (!r)
  170. *addr_ptr = addr;
  171. } else {
  172. addr = *addr_ptr;
  173. }
  174. mutex_unlock(&kvm->arch.config_lock);
  175. out:
  176. mutex_unlock(&kvm->slots_lock);
  177. if (!r && !write)
  178. r = put_user(addr, uaddr);
  179. return r;
  180. }
  181. static int vgic_set_common_attr(struct kvm_device *dev,
  182. struct kvm_device_attr *attr)
  183. {
  184. int r;
  185. switch (attr->group) {
  186. case KVM_DEV_ARM_VGIC_GRP_ADDR:
  187. r = kvm_vgic_addr(dev->kvm, attr, true);
  188. return (r == -ENODEV) ? -ENXIO : r;
  189. case KVM_DEV_ARM_VGIC_GRP_NR_IRQS: {
  190. u32 __user *uaddr = (u32 __user *)(long)attr->addr;
  191. u32 val;
  192. int ret = 0;
  193. if (get_user(val, uaddr))
  194. return -EFAULT;
  195. /*
  196. * We require:
  197. * - at least 32 SPIs on top of the 16 SGIs and 16 PPIs
  198. * - at most 1024 interrupts
  199. * - a multiple of 32 interrupts
  200. */
  201. if (val < (VGIC_NR_PRIVATE_IRQS + 32) ||
  202. val > VGIC_MAX_RESERVED ||
  203. (val & 31))
  204. return -EINVAL;
  205. mutex_lock(&dev->kvm->arch.config_lock);
  206. if (vgic_ready(dev->kvm) || dev->kvm->arch.vgic.nr_spis)
  207. ret = -EBUSY;
  208. else
  209. dev->kvm->arch.vgic.nr_spis =
  210. val - VGIC_NR_PRIVATE_IRQS;
  211. mutex_unlock(&dev->kvm->arch.config_lock);
  212. return ret;
  213. }
  214. case KVM_DEV_ARM_VGIC_GRP_CTRL: {
  215. switch (attr->attr) {
  216. case KVM_DEV_ARM_VGIC_CTRL_INIT:
  217. mutex_lock(&dev->kvm->arch.config_lock);
  218. r = vgic_init(dev->kvm);
  219. mutex_unlock(&dev->kvm->arch.config_lock);
  220. return r;
  221. case KVM_DEV_ARM_VGIC_SAVE_PENDING_TABLES:
  222. /*
  223. * OK, this one isn't common at all, but we
  224. * want to handle all control group attributes
  225. * in a single place.
  226. */
  227. if (vgic_check_type(dev->kvm, KVM_DEV_TYPE_ARM_VGIC_V3))
  228. return -ENXIO;
  229. mutex_lock(&dev->kvm->lock);
  230. if (!lock_all_vcpus(dev->kvm)) {
  231. mutex_unlock(&dev->kvm->lock);
  232. return -EBUSY;
  233. }
  234. mutex_lock(&dev->kvm->arch.config_lock);
  235. r = vgic_v3_save_pending_tables(dev->kvm);
  236. mutex_unlock(&dev->kvm->arch.config_lock);
  237. unlock_all_vcpus(dev->kvm);
  238. mutex_unlock(&dev->kvm->lock);
  239. return r;
  240. }
  241. break;
  242. }
  243. }
  244. return -ENXIO;
  245. }
  246. static int vgic_get_common_attr(struct kvm_device *dev,
  247. struct kvm_device_attr *attr)
  248. {
  249. int r = -ENXIO;
  250. switch (attr->group) {
  251. case KVM_DEV_ARM_VGIC_GRP_ADDR:
  252. r = kvm_vgic_addr(dev->kvm, attr, false);
  253. return (r == -ENODEV) ? -ENXIO : r;
  254. case KVM_DEV_ARM_VGIC_GRP_NR_IRQS: {
  255. u32 __user *uaddr = (u32 __user *)(long)attr->addr;
  256. r = put_user(dev->kvm->arch.vgic.nr_spis +
  257. VGIC_NR_PRIVATE_IRQS, uaddr);
  258. break;
  259. }
  260. }
  261. return r;
  262. }
  263. static int vgic_create(struct kvm_device *dev, u32 type)
  264. {
  265. return kvm_vgic_create(dev->kvm, type);
  266. }
  267. static void vgic_destroy(struct kvm_device *dev)
  268. {
  269. kfree(dev);
  270. }
  271. int kvm_register_vgic_device(unsigned long type)
  272. {
  273. int ret = -ENODEV;
  274. switch (type) {
  275. case KVM_DEV_TYPE_ARM_VGIC_V2:
  276. ret = kvm_register_device_ops(&kvm_arm_vgic_v2_ops,
  277. KVM_DEV_TYPE_ARM_VGIC_V2);
  278. break;
  279. case KVM_DEV_TYPE_ARM_VGIC_V3:
  280. ret = kvm_register_device_ops(&kvm_arm_vgic_v3_ops,
  281. KVM_DEV_TYPE_ARM_VGIC_V3);
  282. if (ret)
  283. break;
  284. ret = kvm_vgic_register_its_device();
  285. break;
  286. }
  287. return ret;
  288. }
  289. int vgic_v2_parse_attr(struct kvm_device *dev, struct kvm_device_attr *attr,
  290. struct vgic_reg_attr *reg_attr)
  291. {
  292. int cpuid;
  293. cpuid = (attr->attr & KVM_DEV_ARM_VGIC_CPUID_MASK) >>
  294. KVM_DEV_ARM_VGIC_CPUID_SHIFT;
  295. if (cpuid >= atomic_read(&dev->kvm->online_vcpus))
  296. return -EINVAL;
  297. reg_attr->vcpu = kvm_get_vcpu(dev->kvm, cpuid);
  298. reg_attr->addr = attr->attr & KVM_DEV_ARM_VGIC_OFFSET_MASK;
  299. return 0;
  300. }
  301. /* unlocks vcpus from @vcpu_lock_idx and smaller */
  302. static void unlock_vcpus(struct kvm *kvm, int vcpu_lock_idx)
  303. {
  304. struct kvm_vcpu *tmp_vcpu;
  305. for (; vcpu_lock_idx >= 0; vcpu_lock_idx--) {
  306. tmp_vcpu = kvm_get_vcpu(kvm, vcpu_lock_idx);
  307. mutex_unlock(&tmp_vcpu->mutex);
  308. }
  309. }
  310. void unlock_all_vcpus(struct kvm *kvm)
  311. {
  312. unlock_vcpus(kvm, atomic_read(&kvm->online_vcpus) - 1);
  313. }
  314. /* Returns true if all vcpus were locked, false otherwise */
  315. bool lock_all_vcpus(struct kvm *kvm)
  316. {
  317. struct kvm_vcpu *tmp_vcpu;
  318. unsigned long c;
  319. /*
  320. * Any time a vcpu is run, vcpu_load is called which tries to grab the
  321. * vcpu->mutex. By grabbing the vcpu->mutex of all VCPUs we ensure
  322. * that no other VCPUs are run and fiddle with the vgic state while we
  323. * access it.
  324. */
  325. kvm_for_each_vcpu(c, tmp_vcpu, kvm) {
  326. if (!mutex_trylock(&tmp_vcpu->mutex)) {
  327. unlock_vcpus(kvm, c - 1);
  328. return false;
  329. }
  330. }
  331. return true;
  332. }
  333. /**
  334. * vgic_v2_attr_regs_access - allows user space to access VGIC v2 state
  335. *
  336. * @dev: kvm device handle
  337. * @attr: kvm device attribute
  338. * @is_write: true if userspace is writing a register
  339. */
  340. static int vgic_v2_attr_regs_access(struct kvm_device *dev,
  341. struct kvm_device_attr *attr,
  342. bool is_write)
  343. {
  344. u32 __user *uaddr = (u32 __user *)(unsigned long)attr->addr;
  345. struct vgic_reg_attr reg_attr;
  346. gpa_t addr;
  347. struct kvm_vcpu *vcpu;
  348. int ret;
  349. u32 val;
  350. ret = vgic_v2_parse_attr(dev, attr, &reg_attr);
  351. if (ret)
  352. return ret;
  353. vcpu = reg_attr.vcpu;
  354. addr = reg_attr.addr;
  355. if (is_write)
  356. if (get_user(val, uaddr))
  357. return -EFAULT;
  358. mutex_lock(&dev->kvm->lock);
  359. if (!lock_all_vcpus(dev->kvm)) {
  360. mutex_unlock(&dev->kvm->lock);
  361. return -EBUSY;
  362. }
  363. mutex_lock(&dev->kvm->arch.config_lock);
  364. ret = vgic_init(dev->kvm);
  365. if (ret)
  366. goto out;
  367. switch (attr->group) {
  368. case KVM_DEV_ARM_VGIC_GRP_CPU_REGS:
  369. ret = vgic_v2_cpuif_uaccess(vcpu, is_write, addr, &val);
  370. break;
  371. case KVM_DEV_ARM_VGIC_GRP_DIST_REGS:
  372. ret = vgic_v2_dist_uaccess(vcpu, is_write, addr, &val);
  373. break;
  374. default:
  375. ret = -EINVAL;
  376. break;
  377. }
  378. out:
  379. mutex_unlock(&dev->kvm->arch.config_lock);
  380. unlock_all_vcpus(dev->kvm);
  381. mutex_unlock(&dev->kvm->lock);
  382. if (!ret && !is_write)
  383. ret = put_user(val, uaddr);
  384. return ret;
  385. }
  386. static int vgic_v2_set_attr(struct kvm_device *dev,
  387. struct kvm_device_attr *attr)
  388. {
  389. switch (attr->group) {
  390. case KVM_DEV_ARM_VGIC_GRP_DIST_REGS:
  391. case KVM_DEV_ARM_VGIC_GRP_CPU_REGS:
  392. return vgic_v2_attr_regs_access(dev, attr, true);
  393. default:
  394. return vgic_set_common_attr(dev, attr);
  395. }
  396. }
  397. static int vgic_v2_get_attr(struct kvm_device *dev,
  398. struct kvm_device_attr *attr)
  399. {
  400. switch (attr->group) {
  401. case KVM_DEV_ARM_VGIC_GRP_DIST_REGS:
  402. case KVM_DEV_ARM_VGIC_GRP_CPU_REGS:
  403. return vgic_v2_attr_regs_access(dev, attr, false);
  404. default:
  405. return vgic_get_common_attr(dev, attr);
  406. }
  407. }
  408. static int vgic_v2_has_attr(struct kvm_device *dev,
  409. struct kvm_device_attr *attr)
  410. {
  411. switch (attr->group) {
  412. case KVM_DEV_ARM_VGIC_GRP_ADDR:
  413. switch (attr->attr) {
  414. case KVM_VGIC_V2_ADDR_TYPE_DIST:
  415. case KVM_VGIC_V2_ADDR_TYPE_CPU:
  416. return 0;
  417. }
  418. break;
  419. case KVM_DEV_ARM_VGIC_GRP_DIST_REGS:
  420. case KVM_DEV_ARM_VGIC_GRP_CPU_REGS:
  421. return vgic_v2_has_attr_regs(dev, attr);
  422. case KVM_DEV_ARM_VGIC_GRP_NR_IRQS:
  423. return 0;
  424. case KVM_DEV_ARM_VGIC_GRP_CTRL:
  425. switch (attr->attr) {
  426. case KVM_DEV_ARM_VGIC_CTRL_INIT:
  427. return 0;
  428. }
  429. }
  430. return -ENXIO;
  431. }
  432. struct kvm_device_ops kvm_arm_vgic_v2_ops = {
  433. .name = "kvm-arm-vgic-v2",
  434. .create = vgic_create,
  435. .destroy = vgic_destroy,
  436. .set_attr = vgic_v2_set_attr,
  437. .get_attr = vgic_v2_get_attr,
  438. .has_attr = vgic_v2_has_attr,
  439. };
  440. int vgic_v3_parse_attr(struct kvm_device *dev, struct kvm_device_attr *attr,
  441. struct vgic_reg_attr *reg_attr)
  442. {
  443. unsigned long vgic_mpidr, mpidr_reg;
  444. /*
  445. * For KVM_DEV_ARM_VGIC_GRP_DIST_REGS group,
  446. * attr might not hold MPIDR. Hence assume vcpu0.
  447. */
  448. if (attr->group != KVM_DEV_ARM_VGIC_GRP_DIST_REGS) {
  449. vgic_mpidr = (attr->attr & KVM_DEV_ARM_VGIC_V3_MPIDR_MASK) >>
  450. KVM_DEV_ARM_VGIC_V3_MPIDR_SHIFT;
  451. mpidr_reg = VGIC_TO_MPIDR(vgic_mpidr);
  452. reg_attr->vcpu = kvm_mpidr_to_vcpu(dev->kvm, mpidr_reg);
  453. } else {
  454. reg_attr->vcpu = kvm_get_vcpu(dev->kvm, 0);
  455. }
  456. if (!reg_attr->vcpu)
  457. return -EINVAL;
  458. reg_attr->addr = attr->attr & KVM_DEV_ARM_VGIC_OFFSET_MASK;
  459. return 0;
  460. }
  461. /*
  462. * vgic_v3_attr_regs_access - allows user space to access VGIC v3 state
  463. *
  464. * @dev: kvm device handle
  465. * @attr: kvm device attribute
  466. * @is_write: true if userspace is writing a register
  467. */
  468. static int vgic_v3_attr_regs_access(struct kvm_device *dev,
  469. struct kvm_device_attr *attr,
  470. bool is_write)
  471. {
  472. struct vgic_reg_attr reg_attr;
  473. gpa_t addr;
  474. struct kvm_vcpu *vcpu;
  475. bool uaccess;
  476. u32 val;
  477. int ret;
  478. ret = vgic_v3_parse_attr(dev, attr, &reg_attr);
  479. if (ret)
  480. return ret;
  481. vcpu = reg_attr.vcpu;
  482. addr = reg_attr.addr;
  483. switch (attr->group) {
  484. case KVM_DEV_ARM_VGIC_GRP_CPU_SYSREGS:
  485. /* Sysregs uaccess is performed by the sysreg handling code */
  486. uaccess = false;
  487. break;
  488. default:
  489. uaccess = true;
  490. }
  491. if (uaccess && is_write) {
  492. u32 __user *uaddr = (u32 __user *)(unsigned long)attr->addr;
  493. if (get_user(val, uaddr))
  494. return -EFAULT;
  495. }
  496. mutex_lock(&dev->kvm->lock);
  497. if (!lock_all_vcpus(dev->kvm)) {
  498. mutex_unlock(&dev->kvm->lock);
  499. return -EBUSY;
  500. }
  501. mutex_lock(&dev->kvm->arch.config_lock);
  502. if (unlikely(!vgic_initialized(dev->kvm))) {
  503. ret = -EBUSY;
  504. goto out;
  505. }
  506. switch (attr->group) {
  507. case KVM_DEV_ARM_VGIC_GRP_DIST_REGS:
  508. ret = vgic_v3_dist_uaccess(vcpu, is_write, addr, &val);
  509. break;
  510. case KVM_DEV_ARM_VGIC_GRP_REDIST_REGS:
  511. ret = vgic_v3_redist_uaccess(vcpu, is_write, addr, &val);
  512. break;
  513. case KVM_DEV_ARM_VGIC_GRP_CPU_SYSREGS:
  514. ret = vgic_v3_cpu_sysregs_uaccess(vcpu, attr, is_write);
  515. break;
  516. case KVM_DEV_ARM_VGIC_GRP_LEVEL_INFO: {
  517. unsigned int info, intid;
  518. info = (attr->attr & KVM_DEV_ARM_VGIC_LINE_LEVEL_INFO_MASK) >>
  519. KVM_DEV_ARM_VGIC_LINE_LEVEL_INFO_SHIFT;
  520. if (info == VGIC_LEVEL_INFO_LINE_LEVEL) {
  521. intid = attr->attr &
  522. KVM_DEV_ARM_VGIC_LINE_LEVEL_INTID_MASK;
  523. ret = vgic_v3_line_level_info_uaccess(vcpu, is_write,
  524. intid, &val);
  525. } else {
  526. ret = -EINVAL;
  527. }
  528. break;
  529. }
  530. default:
  531. ret = -EINVAL;
  532. break;
  533. }
  534. out:
  535. mutex_unlock(&dev->kvm->arch.config_lock);
  536. unlock_all_vcpus(dev->kvm);
  537. mutex_unlock(&dev->kvm->lock);
  538. if (!ret && uaccess && !is_write) {
  539. u32 __user *uaddr = (u32 __user *)(unsigned long)attr->addr;
  540. ret = put_user(val, uaddr);
  541. }
  542. return ret;
  543. }
  544. static int vgic_v3_set_attr(struct kvm_device *dev,
  545. struct kvm_device_attr *attr)
  546. {
  547. switch (attr->group) {
  548. case KVM_DEV_ARM_VGIC_GRP_DIST_REGS:
  549. case KVM_DEV_ARM_VGIC_GRP_REDIST_REGS:
  550. case KVM_DEV_ARM_VGIC_GRP_CPU_SYSREGS:
  551. case KVM_DEV_ARM_VGIC_GRP_LEVEL_INFO:
  552. return vgic_v3_attr_regs_access(dev, attr, true);
  553. default:
  554. return vgic_set_common_attr(dev, attr);
  555. }
  556. }
  557. static int vgic_v3_get_attr(struct kvm_device *dev,
  558. struct kvm_device_attr *attr)
  559. {
  560. switch (attr->group) {
  561. case KVM_DEV_ARM_VGIC_GRP_DIST_REGS:
  562. case KVM_DEV_ARM_VGIC_GRP_REDIST_REGS:
  563. case KVM_DEV_ARM_VGIC_GRP_CPU_SYSREGS:
  564. case KVM_DEV_ARM_VGIC_GRP_LEVEL_INFO:
  565. return vgic_v3_attr_regs_access(dev, attr, false);
  566. default:
  567. return vgic_get_common_attr(dev, attr);
  568. }
  569. }
  570. static int vgic_v3_has_attr(struct kvm_device *dev,
  571. struct kvm_device_attr *attr)
  572. {
  573. switch (attr->group) {
  574. case KVM_DEV_ARM_VGIC_GRP_ADDR:
  575. switch (attr->attr) {
  576. case KVM_VGIC_V3_ADDR_TYPE_DIST:
  577. case KVM_VGIC_V3_ADDR_TYPE_REDIST:
  578. case KVM_VGIC_V3_ADDR_TYPE_REDIST_REGION:
  579. return 0;
  580. }
  581. break;
  582. case KVM_DEV_ARM_VGIC_GRP_DIST_REGS:
  583. case KVM_DEV_ARM_VGIC_GRP_REDIST_REGS:
  584. case KVM_DEV_ARM_VGIC_GRP_CPU_SYSREGS:
  585. return vgic_v3_has_attr_regs(dev, attr);
  586. case KVM_DEV_ARM_VGIC_GRP_NR_IRQS:
  587. return 0;
  588. case KVM_DEV_ARM_VGIC_GRP_LEVEL_INFO: {
  589. if (((attr->attr & KVM_DEV_ARM_VGIC_LINE_LEVEL_INFO_MASK) >>
  590. KVM_DEV_ARM_VGIC_LINE_LEVEL_INFO_SHIFT) ==
  591. VGIC_LEVEL_INFO_LINE_LEVEL)
  592. return 0;
  593. break;
  594. }
  595. case KVM_DEV_ARM_VGIC_GRP_CTRL:
  596. switch (attr->attr) {
  597. case KVM_DEV_ARM_VGIC_CTRL_INIT:
  598. return 0;
  599. case KVM_DEV_ARM_VGIC_SAVE_PENDING_TABLES:
  600. return 0;
  601. }
  602. }
  603. return -ENXIO;
  604. }
  605. struct kvm_device_ops kvm_arm_vgic_v3_ops = {
  606. .name = "kvm-arm-vgic-v3",
  607. .create = vgic_create,
  608. .destroy = vgic_destroy,
  609. .set_attr = vgic_v3_set_attr,
  610. .get_attr = vgic_v3_get_attr,
  611. .has_attr = vgic_v3_has_attr,
  612. };