1 // SPDX-License-Identifier: GPL-2.0 2 /* 3 * KVM coalesced MMIO 4 * 5 * Copyright (c) 2008 Bull S.A.S. 6 * Copyright 2009 Red Hat, Inc. and/or its affiliates. 7 * 8 * Author: Laurent Vivier <Laurent.Vivier@bull.net> 9 * 10 */ 11 12 #include <kvm/iodev.h> 13 14 #include <linux/kvm_host.h> 15 #include <linux/slab.h> 16 #include <linux/kvm.h> 17 18 #include "coalesced_mmio.h" 19 20 static inline struct kvm_coalesced_mmio_dev *to_mmio(struct kvm_io_device *dev) 21 { 22 return container_of(dev, struct kvm_coalesced_mmio_dev, dev); 23 } 24 25 static int coalesced_mmio_in_range(struct kvm_coalesced_mmio_dev *dev, 26 gpa_t addr, int len) 27 { 28 /* is it in a batchable area ? 29 * (addr,len) is fully included in 30 * (zone->addr, zone->size) 31 */ 32 if (len < 0) 33 return 0; 34 if (addr + len < addr) 35 return 0; 36 if (addr < dev->zone.addr) 37 return 0; 38 if (addr + len > dev->zone.addr + dev->zone.size) 39 return 0; 40 return 1; 41 } 42 43 static int coalesced_mmio_write(struct kvm_vcpu *vcpu, 44 struct kvm_io_device *this, gpa_t addr, 45 int len, const void *val) 46 { 47 struct kvm_coalesced_mmio_dev *dev = to_mmio(this); 48 struct kvm_coalesced_mmio_ring *ring = dev->kvm->coalesced_mmio_ring; 49 __u32 insert; 50 51 if (!coalesced_mmio_in_range(dev, addr, len)) 52 return -EOPNOTSUPP; 53 54 spin_lock(&dev->kvm->ring_lock); 55 56 /* 57 * last is the index of the entry to fill. Verify userspace hasn't 58 * set last to be out of range, and that there is room in the ring. 59 * Leave one entry free in the ring so that userspace can differentiate 60 * between an empty ring and a full ring. 61 */ 62 insert = READ_ONCE(ring->last); 63 if (insert >= KVM_COALESCED_MMIO_MAX || 64 (insert + 1) % KVM_COALESCED_MMIO_MAX == READ_ONCE(ring->first)) { 65 spin_unlock(&dev->kvm->ring_lock); 66 return -EOPNOTSUPP; 67 } 68 69 /* copy data in first free entry of the ring */ 70 71 ring->coalesced_mmio[insert].phys_addr = addr; 72 ring->coalesced_mmio[insert].len = len; 73 memcpy(ring->coalesced_mmio[insert].data, val, len); 74 ring->coalesced_mmio[insert].pio = dev->zone.pio; 75 smp_wmb(); 76 ring->last = (insert + 1) % KVM_COALESCED_MMIO_MAX; 77 spin_unlock(&dev->kvm->ring_lock); 78 return 0; 79 } 80 81 static void coalesced_mmio_destructor(struct kvm_io_device *this) 82 { 83 struct kvm_coalesced_mmio_dev *dev = to_mmio(this); 84 85 list_del(&dev->list); 86 87 kfree(dev); 88 } 89 90 static const struct kvm_io_device_ops coalesced_mmio_ops = { 91 .write = coalesced_mmio_write, 92 .destructor = coalesced_mmio_destructor, 93 }; 94 95 int kvm_coalesced_mmio_init(struct kvm *kvm) 96 { 97 struct page *page; 98 99 page = alloc_page(GFP_KERNEL_ACCOUNT | __GFP_ZERO); 100 if (!page) 101 return -ENOMEM; 102 103 kvm->coalesced_mmio_ring = page_address(page); 104 105 /* 106 * We're using this spinlock to sync access to the coalesced ring. 107 * The list doesn't need its own lock since device registration and 108 * unregistration should only happen when kvm->slots_lock is held. 109 */ 110 spin_lock_init(&kvm->ring_lock); 111 INIT_LIST_HEAD(&kvm->coalesced_zones); 112 113 return 0; 114 } 115 116 void kvm_coalesced_mmio_free(struct kvm *kvm) 117 { 118 if (kvm->coalesced_mmio_ring) 119 free_page((unsigned long)kvm->coalesced_mmio_ring); 120 } 121 122 int kvm_vm_ioctl_register_coalesced_mmio(struct kvm *kvm, 123 struct kvm_coalesced_mmio_zone *zone) 124 { 125 int ret; 126 struct kvm_coalesced_mmio_dev *dev; 127 128 if (zone->pio != 1 && zone->pio != 0) 129 return -EINVAL; 130 131 dev = kzalloc_obj(struct kvm_coalesced_mmio_dev, GFP_KERNEL_ACCOUNT); 132 if (!dev) 133 return -ENOMEM; 134 135 kvm_iodevice_init(&dev->dev, &coalesced_mmio_ops); 136 dev->kvm = kvm; 137 dev->zone = *zone; 138 139 mutex_lock(&kvm->slots_lock); 140 ret = kvm_io_bus_register_dev(kvm, 141 zone->pio ? KVM_PIO_BUS : KVM_MMIO_BUS, 142 zone->addr, zone->size, &dev->dev); 143 if (ret < 0) 144 goto out_free_dev; 145 list_add_tail(&dev->list, &kvm->coalesced_zones); 146 mutex_unlock(&kvm->slots_lock); 147 148 return 0; 149 150 out_free_dev: 151 mutex_unlock(&kvm->slots_lock); 152 kfree(dev); 153 154 return ret; 155 } 156 157 int kvm_vm_ioctl_unregister_coalesced_mmio(struct kvm *kvm, 158 struct kvm_coalesced_mmio_zone *zone) 159 { 160 struct kvm_coalesced_mmio_dev *dev, *tmp; 161 int r; 162 163 if (zone->pio != 1 && zone->pio != 0) 164 return -EINVAL; 165 166 mutex_lock(&kvm->slots_lock); 167 168 list_for_each_entry_safe(dev, tmp, &kvm->coalesced_zones, list) { 169 if (zone->pio == dev->zone.pio && 170 coalesced_mmio_in_range(dev, zone->addr, zone->size)) { 171 r = kvm_io_bus_unregister_dev(kvm, 172 zone->pio ? KVM_PIO_BUS : KVM_MMIO_BUS, &dev->dev); 173 /* 174 * On failure, unregister destroys all devices on the 175 * bus, including the target device. There's no need 176 * to restart the walk as there aren't any zones left. 177 */ 178 if (r) 179 break; 180 } 181 } 182 183 mutex_unlock(&kvm->slots_lock); 184 185 /* 186 * Ignore the result of kvm_io_bus_unregister_dev(), from userspace's 187 * perspective, the coalesced MMIO is most definitely unregistered. 188 */ 189 return 0; 190 } 191