xref: /openbmc/qemu/hw/ppc/spapr_caps.c (revision 520e210c)
1 /*
2  * QEMU PowerPC pSeries Logical Partition capabilities handling
3  *
4  * Copyright (c) 2017 David Gibson, Red Hat Inc.
5  *
6  * Permission is hereby granted, free of charge, to any person obtaining a copy
7  * of this software and associated documentation files (the "Software"), to deal
8  * in the Software without restriction, including without limitation the rights
9  * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
10  * copies of the Software, and to permit persons to whom the Software is
11  * furnished to do so, subject to the following conditions:
12  *
13  * The above copyright notice and this permission notice shall be included in
14  * all copies or substantial portions of the Software.
15  *
16  * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
17  * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
18  * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
19  * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
20  * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
21  * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
22  * THE SOFTWARE.
23  */
24 #include "qemu/osdep.h"
25 #include "qemu/error-report.h"
26 #include "qapi/error.h"
27 #include "qapi/visitor.h"
28 #include "sysemu/hw_accel.h"
29 #include "exec/ram_addr.h"
30 #include "target/ppc/cpu.h"
31 #include "target/ppc/mmu-hash64.h"
32 #include "cpu-models.h"
33 #include "kvm_ppc.h"
34 
35 #include "hw/ppc/spapr.h"
36 
37 typedef struct sPAPRCapPossible {
38     int num;            /* size of vals array below */
39     const char *help;   /* help text for vals */
40     /*
41      * Note:
42      * - because of the way compatibility is determined vals MUST be ordered
43      *   such that later options are a superset of all preceding options.
44      * - the order of vals must be preserved, that is their index is important,
45      *   however vals may be added to the end of the list so long as the above
46      *   point is observed
47      */
48     const char *vals[];
49 } sPAPRCapPossible;
50 
51 typedef struct sPAPRCapabilityInfo {
52     const char *name;
53     const char *description;
54     int index;
55 
56     /* Getter and Setter Function Pointers */
57     ObjectPropertyAccessor *get;
58     ObjectPropertyAccessor *set;
59     const char *type;
60     /* Possible values if this is a custom string type */
61     sPAPRCapPossible *possible;
62     /* Make sure the virtual hardware can support this capability */
63     void (*apply)(sPAPRMachineState *spapr, uint8_t val, Error **errp);
64     void (*cpu_apply)(sPAPRMachineState *spapr, PowerPCCPU *cpu,
65                       uint8_t val, Error **errp);
66 } sPAPRCapabilityInfo;
67 
68 static void spapr_cap_get_bool(Object *obj, Visitor *v, const char *name,
69                                void *opaque, Error **errp)
70 {
71     sPAPRCapabilityInfo *cap = opaque;
72     sPAPRMachineState *spapr = SPAPR_MACHINE(obj);
73     bool value = spapr_get_cap(spapr, cap->index) == SPAPR_CAP_ON;
74 
75     visit_type_bool(v, name, &value, errp);
76 }
77 
78 static void spapr_cap_set_bool(Object *obj, Visitor *v, const char *name,
79                                void *opaque, Error **errp)
80 {
81     sPAPRCapabilityInfo *cap = opaque;
82     sPAPRMachineState *spapr = SPAPR_MACHINE(obj);
83     bool value;
84     Error *local_err = NULL;
85 
86     visit_type_bool(v, name, &value, &local_err);
87     if (local_err) {
88         error_propagate(errp, local_err);
89         return;
90     }
91 
92     spapr->cmd_line_caps[cap->index] = true;
93     spapr->eff.caps[cap->index] = value ? SPAPR_CAP_ON : SPAPR_CAP_OFF;
94 }
95 
96 
97 static void  spapr_cap_get_string(Object *obj, Visitor *v, const char *name,
98                                   void *opaque, Error **errp)
99 {
100     sPAPRCapabilityInfo *cap = opaque;
101     sPAPRMachineState *spapr = SPAPR_MACHINE(obj);
102     char *val = NULL;
103     uint8_t value = spapr_get_cap(spapr, cap->index);
104 
105     if (value >= cap->possible->num) {
106         error_setg(errp, "Invalid value (%d) for cap-%s", value, cap->name);
107         return;
108     }
109 
110     val = g_strdup(cap->possible->vals[value]);
111 
112     visit_type_str(v, name, &val, errp);
113     g_free(val);
114 }
115 
116 static void spapr_cap_set_string(Object *obj, Visitor *v, const char *name,
117                                  void *opaque, Error **errp)
118 {
119     sPAPRCapabilityInfo *cap = opaque;
120     sPAPRMachineState *spapr = SPAPR_MACHINE(obj);
121     Error *local_err = NULL;
122     uint8_t i;
123     char *val;
124 
125     visit_type_str(v, name, &val, &local_err);
126     if (local_err) {
127         error_propagate(errp, local_err);
128         return;
129     }
130 
131     if (!strcmp(val, "?")) {
132         error_setg(errp, "%s", cap->possible->help);
133         goto out;
134     }
135     for (i = 0; i < cap->possible->num; i++) {
136         if (!strcasecmp(val, cap->possible->vals[i])) {
137             spapr->cmd_line_caps[cap->index] = true;
138             spapr->eff.caps[cap->index] = i;
139             goto out;
140         }
141     }
142 
143     error_setg(errp, "Invalid capability mode \"%s\" for cap-%s", val,
144                cap->name);
145 out:
146     g_free(val);
147 }
148 
149 static void spapr_cap_get_pagesize(Object *obj, Visitor *v, const char *name,
150                                    void *opaque, Error **errp)
151 {
152     sPAPRCapabilityInfo *cap = opaque;
153     sPAPRMachineState *spapr = SPAPR_MACHINE(obj);
154     uint8_t val = spapr_get_cap(spapr, cap->index);
155     uint64_t pagesize = (1ULL << val);
156 
157     visit_type_size(v, name, &pagesize, errp);
158 }
159 
160 static void spapr_cap_set_pagesize(Object *obj, Visitor *v, const char *name,
161                                    void *opaque, Error **errp)
162 {
163     sPAPRCapabilityInfo *cap = opaque;
164     sPAPRMachineState *spapr = SPAPR_MACHINE(obj);
165     uint64_t pagesize;
166     uint8_t val;
167     Error *local_err = NULL;
168 
169     visit_type_size(v, name, &pagesize, &local_err);
170     if (local_err) {
171         error_propagate(errp, local_err);
172         return;
173     }
174 
175     if (!is_power_of_2(pagesize)) {
176         error_setg(errp, "cap-%s must be a power of 2", cap->name);
177         return;
178     }
179 
180     val = ctz64(pagesize);
181     spapr->cmd_line_caps[cap->index] = true;
182     spapr->eff.caps[cap->index] = val;
183 }
184 
185 static void cap_htm_apply(sPAPRMachineState *spapr, uint8_t val, Error **errp)
186 {
187     if (!val) {
188         /* TODO: We don't support disabling htm yet */
189         return;
190     }
191     if (tcg_enabled()) {
192         error_setg(errp,
193                    "No Transactional Memory support in TCG, try cap-htm=off");
194     } else if (kvm_enabled() && !kvmppc_has_cap_htm()) {
195         error_setg(errp,
196 "KVM implementation does not support Transactional Memory, try cap-htm=off"
197             );
198     }
199 }
200 
201 static void cap_vsx_apply(sPAPRMachineState *spapr, uint8_t val, Error **errp)
202 {
203     PowerPCCPU *cpu = POWERPC_CPU(first_cpu);
204     CPUPPCState *env = &cpu->env;
205 
206     if (!val) {
207         /* TODO: We don't support disabling vsx yet */
208         return;
209     }
210     /* Allowable CPUs in spapr_cpu_core.c should already have gotten
211      * rid of anything that doesn't do VMX */
212     g_assert(env->insns_flags & PPC_ALTIVEC);
213     if (!(env->insns_flags2 & PPC2_VSX)) {
214         error_setg(errp, "VSX support not available, try cap-vsx=off");
215     }
216 }
217 
218 static void cap_dfp_apply(sPAPRMachineState *spapr, uint8_t val, Error **errp)
219 {
220     PowerPCCPU *cpu = POWERPC_CPU(first_cpu);
221     CPUPPCState *env = &cpu->env;
222 
223     if (!val) {
224         /* TODO: We don't support disabling dfp yet */
225         return;
226     }
227     if (!(env->insns_flags2 & PPC2_DFP)) {
228         error_setg(errp, "DFP support not available, try cap-dfp=off");
229     }
230 }
231 
232 sPAPRCapPossible cap_cfpc_possible = {
233     .num = 3,
234     .vals = {"broken", "workaround", "fixed"},
235     .help = "broken - no protection, workaround - workaround available,"
236             " fixed - fixed in hardware",
237 };
238 
239 static void cap_safe_cache_apply(sPAPRMachineState *spapr, uint8_t val,
240                                  Error **errp)
241 {
242     uint8_t kvm_val =  kvmppc_get_cap_safe_cache();
243 
244     if (tcg_enabled() && val) {
245         /* TODO - for now only allow broken for TCG */
246         error_setg(errp,
247 "Requested safe cache capability level not supported by tcg, try a different value for cap-cfpc");
248     } else if (kvm_enabled() && (val > kvm_val)) {
249         error_setg(errp,
250 "Requested safe cache capability level not supported by kvm, try cap-cfpc=%s",
251                    cap_cfpc_possible.vals[kvm_val]);
252     }
253 }
254 
255 sPAPRCapPossible cap_sbbc_possible = {
256     .num = 3,
257     .vals = {"broken", "workaround", "fixed"},
258     .help = "broken - no protection, workaround - workaround available,"
259             " fixed - fixed in hardware",
260 };
261 
262 static void cap_safe_bounds_check_apply(sPAPRMachineState *spapr, uint8_t val,
263                                         Error **errp)
264 {
265     uint8_t kvm_val =  kvmppc_get_cap_safe_bounds_check();
266 
267     if (tcg_enabled() && val) {
268         /* TODO - for now only allow broken for TCG */
269         error_setg(errp,
270 "Requested safe bounds check capability level not supported by tcg, try a different value for cap-sbbc");
271     } else if (kvm_enabled() && (val > kvm_val)) {
272         error_setg(errp,
273 "Requested safe bounds check capability level not supported by kvm, try cap-sbbc=%s",
274                    cap_sbbc_possible.vals[kvm_val]);
275     }
276 }
277 
278 sPAPRCapPossible cap_ibs_possible = {
279     .num = 4,
280     /* Note workaround only maintained for compatibility */
281     .vals = {"broken", "workaround", "fixed-ibs", "fixed-ccd"},
282     .help = "broken - no protection, fixed-ibs - indirect branch serialisation,"
283             " fixed-ccd - cache count disabled",
284 };
285 
286 static void cap_safe_indirect_branch_apply(sPAPRMachineState *spapr,
287                                            uint8_t val, Error **errp)
288 {
289     uint8_t kvm_val = kvmppc_get_cap_safe_indirect_branch();
290 
291     if (val == SPAPR_CAP_WORKAROUND) { /* Can only be Broken or Fixed */
292         error_setg(errp,
293 "Requested safe indirect branch capability level \"workaround\" not valid, try cap-ibs=%s",
294                    cap_ibs_possible.vals[kvm_val]);
295     } else if (tcg_enabled() && val) {
296         /* TODO - for now only allow broken for TCG */
297         error_setg(errp,
298 "Requested safe indirect branch capability level not supported by tcg, try a different value for cap-ibs");
299     } else if (kvm_enabled() && val && (val != kvm_val)) {
300         error_setg(errp,
301 "Requested safe indirect branch capability level not supported by kvm, try cap-ibs=%s",
302                    cap_ibs_possible.vals[kvm_val]);
303     }
304 }
305 
306 #define VALUE_DESC_TRISTATE     " (broken, workaround, fixed)"
307 
308 void spapr_check_pagesize(sPAPRMachineState *spapr, hwaddr pagesize,
309                           Error **errp)
310 {
311     hwaddr maxpagesize = (1ULL << spapr->eff.caps[SPAPR_CAP_HPT_MAXPAGESIZE]);
312 
313     if (!kvmppc_hpt_needs_host_contiguous_pages()) {
314         return;
315     }
316 
317     if (maxpagesize > pagesize) {
318         error_setg(errp,
319                    "Can't support %"HWADDR_PRIu" kiB guest pages with %"
320                    HWADDR_PRIu" kiB host pages with this KVM implementation",
321                    maxpagesize >> 10, pagesize >> 10);
322     }
323 }
324 
325 static void cap_hpt_maxpagesize_apply(sPAPRMachineState *spapr,
326                                       uint8_t val, Error **errp)
327 {
328     if (val < 12) {
329         error_setg(errp, "Require at least 4kiB hpt-max-page-size");
330         return;
331     } else if (val < 16) {
332         warn_report("Many guests require at least 64kiB hpt-max-page-size");
333     }
334 
335     spapr_check_pagesize(spapr, qemu_getrampagesize(), errp);
336 }
337 
338 static bool spapr_pagesize_cb(void *opaque, uint32_t seg_pshift,
339                               uint32_t pshift)
340 {
341     unsigned maxshift = *((unsigned *)opaque);
342 
343     assert(pshift >= seg_pshift);
344 
345     /* Don't allow the guest to use pages bigger than the configured
346      * maximum size */
347     if (pshift > maxshift) {
348         return false;
349     }
350 
351     /* For whatever reason, KVM doesn't allow multiple pagesizes
352      * within a segment, *except* for the case of 16M pages in a 4k or
353      * 64k segment.  Always exclude other cases, so that TCG and KVM
354      * guests see a consistent environment */
355     if ((pshift != seg_pshift) && (pshift != 24)) {
356         return false;
357     }
358 
359     return true;
360 }
361 
362 static void cap_hpt_maxpagesize_cpu_apply(sPAPRMachineState *spapr,
363                                           PowerPCCPU *cpu,
364                                           uint8_t val, Error **errp)
365 {
366     unsigned maxshift = val;
367 
368     ppc_hash64_filter_pagesizes(cpu, spapr_pagesize_cb, &maxshift);
369 }
370 
371 static void cap_nested_kvm_hv_apply(sPAPRMachineState *spapr,
372                                     uint8_t val, Error **errp)
373 {
374     if (!val) {
375         /* capability disabled by default */
376         return;
377     }
378 
379     if (tcg_enabled()) {
380         error_setg(errp,
381                    "No Nested KVM-HV support in tcg, try cap-nested-hv=off");
382     } else if (kvm_enabled()) {
383         if (!kvmppc_has_cap_nested_kvm_hv()) {
384             error_setg(errp,
385 "KVM implementation does not support Nested KVM-HV, try cap-nested-hv=off");
386         } else if (kvmppc_set_cap_nested_kvm_hv(val) < 0) {
387                 error_setg(errp,
388 "Error enabling cap-nested-hv with KVM, try cap-nested-hv=off");
389         }
390     }
391 }
392 
393 sPAPRCapabilityInfo capability_table[SPAPR_CAP_NUM] = {
394     [SPAPR_CAP_HTM] = {
395         .name = "htm",
396         .description = "Allow Hardware Transactional Memory (HTM)",
397         .index = SPAPR_CAP_HTM,
398         .get = spapr_cap_get_bool,
399         .set = spapr_cap_set_bool,
400         .type = "bool",
401         .apply = cap_htm_apply,
402     },
403     [SPAPR_CAP_VSX] = {
404         .name = "vsx",
405         .description = "Allow Vector Scalar Extensions (VSX)",
406         .index = SPAPR_CAP_VSX,
407         .get = spapr_cap_get_bool,
408         .set = spapr_cap_set_bool,
409         .type = "bool",
410         .apply = cap_vsx_apply,
411     },
412     [SPAPR_CAP_DFP] = {
413         .name = "dfp",
414         .description = "Allow Decimal Floating Point (DFP)",
415         .index = SPAPR_CAP_DFP,
416         .get = spapr_cap_get_bool,
417         .set = spapr_cap_set_bool,
418         .type = "bool",
419         .apply = cap_dfp_apply,
420     },
421     [SPAPR_CAP_CFPC] = {
422         .name = "cfpc",
423         .description = "Cache Flush on Privilege Change" VALUE_DESC_TRISTATE,
424         .index = SPAPR_CAP_CFPC,
425         .get = spapr_cap_get_string,
426         .set = spapr_cap_set_string,
427         .type = "string",
428         .possible = &cap_cfpc_possible,
429         .apply = cap_safe_cache_apply,
430     },
431     [SPAPR_CAP_SBBC] = {
432         .name = "sbbc",
433         .description = "Speculation Barrier Bounds Checking" VALUE_DESC_TRISTATE,
434         .index = SPAPR_CAP_SBBC,
435         .get = spapr_cap_get_string,
436         .set = spapr_cap_set_string,
437         .type = "string",
438         .possible = &cap_sbbc_possible,
439         .apply = cap_safe_bounds_check_apply,
440     },
441     [SPAPR_CAP_IBS] = {
442         .name = "ibs",
443         .description =
444             "Indirect Branch Speculation (broken, fixed-ibs, fixed-ccd)",
445         .index = SPAPR_CAP_IBS,
446         .get = spapr_cap_get_string,
447         .set = spapr_cap_set_string,
448         .type = "string",
449         .possible = &cap_ibs_possible,
450         .apply = cap_safe_indirect_branch_apply,
451     },
452     [SPAPR_CAP_HPT_MAXPAGESIZE] = {
453         .name = "hpt-max-page-size",
454         .description = "Maximum page size for Hash Page Table guests",
455         .index = SPAPR_CAP_HPT_MAXPAGESIZE,
456         .get = spapr_cap_get_pagesize,
457         .set = spapr_cap_set_pagesize,
458         .type = "int",
459         .apply = cap_hpt_maxpagesize_apply,
460         .cpu_apply = cap_hpt_maxpagesize_cpu_apply,
461     },
462     [SPAPR_CAP_NESTED_KVM_HV] = {
463         .name = "nested-hv",
464         .description = "Allow Nested KVM-HV",
465         .index = SPAPR_CAP_NESTED_KVM_HV,
466         .get = spapr_cap_get_bool,
467         .set = spapr_cap_set_bool,
468         .type = "bool",
469         .apply = cap_nested_kvm_hv_apply,
470     },
471 };
472 
473 static sPAPRCapabilities default_caps_with_cpu(sPAPRMachineState *spapr,
474                                                const char *cputype)
475 {
476     sPAPRMachineClass *smc = SPAPR_MACHINE_GET_CLASS(spapr);
477     sPAPRCapabilities caps;
478 
479     caps = smc->default_caps;
480 
481     if (!ppc_type_check_compat(cputype, CPU_POWERPC_LOGICAL_2_07,
482                                0, spapr->max_compat_pvr)) {
483         caps.caps[SPAPR_CAP_HTM] = SPAPR_CAP_OFF;
484         caps.caps[SPAPR_CAP_CFPC] = SPAPR_CAP_BROKEN;
485     }
486 
487     if (!ppc_type_check_compat(cputype, CPU_POWERPC_LOGICAL_2_06_PLUS,
488                                0, spapr->max_compat_pvr)) {
489         caps.caps[SPAPR_CAP_SBBC] = SPAPR_CAP_BROKEN;
490     }
491 
492     if (!ppc_type_check_compat(cputype, CPU_POWERPC_LOGICAL_2_06,
493                                0, spapr->max_compat_pvr)) {
494         caps.caps[SPAPR_CAP_VSX] = SPAPR_CAP_OFF;
495         caps.caps[SPAPR_CAP_DFP] = SPAPR_CAP_OFF;
496         caps.caps[SPAPR_CAP_IBS] = SPAPR_CAP_BROKEN;
497     }
498 
499     /* This is for pseries-2.12 and older */
500     if (smc->default_caps.caps[SPAPR_CAP_HPT_MAXPAGESIZE] == 0) {
501         uint8_t mps;
502 
503         if (kvmppc_hpt_needs_host_contiguous_pages()) {
504             mps = ctz64(qemu_getrampagesize());
505         } else {
506             mps = 34; /* allow everything up to 16GiB, i.e. everything */
507         }
508 
509         caps.caps[SPAPR_CAP_HPT_MAXPAGESIZE] = mps;
510     }
511 
512     return caps;
513 }
514 
515 int spapr_caps_pre_load(void *opaque)
516 {
517     sPAPRMachineState *spapr = opaque;
518 
519     /* Set to default so we can tell if this came in with the migration */
520     spapr->mig = spapr->def;
521     return 0;
522 }
523 
524 int spapr_caps_pre_save(void *opaque)
525 {
526     sPAPRMachineState *spapr = opaque;
527 
528     spapr->mig = spapr->eff;
529     return 0;
530 }
531 
532 /* This has to be called from the top-level spapr post_load, not the
533  * caps specific one.  Otherwise it wouldn't be called when the source
534  * caps are all defaults, which could still conflict with overridden
535  * caps on the destination */
536 int spapr_caps_post_migration(sPAPRMachineState *spapr)
537 {
538     int i;
539     bool ok = true;
540     sPAPRCapabilities dstcaps = spapr->eff;
541     sPAPRCapabilities srccaps;
542 
543     srccaps = default_caps_with_cpu(spapr, MACHINE(spapr)->cpu_type);
544     for (i = 0; i < SPAPR_CAP_NUM; i++) {
545         /* If not default value then assume came in with the migration */
546         if (spapr->mig.caps[i] != spapr->def.caps[i]) {
547             srccaps.caps[i] = spapr->mig.caps[i];
548         }
549     }
550 
551     for (i = 0; i < SPAPR_CAP_NUM; i++) {
552         sPAPRCapabilityInfo *info = &capability_table[i];
553 
554         if (srccaps.caps[i] > dstcaps.caps[i]) {
555             error_report("cap-%s higher level (%d) in incoming stream than on destination (%d)",
556                          info->name, srccaps.caps[i], dstcaps.caps[i]);
557             ok = false;
558         }
559 
560         if (srccaps.caps[i] < dstcaps.caps[i]) {
561             warn_report("cap-%s lower level (%d) in incoming stream than on destination (%d)",
562                          info->name, srccaps.caps[i], dstcaps.caps[i]);
563         }
564     }
565 
566     return ok ? 0 : -EINVAL;
567 }
568 
569 /* Used to generate the migration field and needed function for a spapr cap */
570 #define SPAPR_CAP_MIG_STATE(sname, cap)                 \
571 static bool spapr_cap_##sname##_needed(void *opaque)    \
572 {                                                       \
573     sPAPRMachineState *spapr = opaque;                  \
574                                                         \
575     return spapr->cmd_line_caps[cap] &&                 \
576            (spapr->eff.caps[cap] !=                     \
577             spapr->def.caps[cap]);                      \
578 }                                                       \
579                                                         \
580 const VMStateDescription vmstate_spapr_cap_##sname = {  \
581     .name = "spapr/cap/" #sname,                        \
582     .version_id = 1,                                    \
583     .minimum_version_id = 1,                            \
584     .needed = spapr_cap_##sname##_needed,               \
585     .fields = (VMStateField[]) {                        \
586         VMSTATE_UINT8(mig.caps[cap],                    \
587                       sPAPRMachineState),               \
588         VMSTATE_END_OF_LIST()                           \
589     },                                                  \
590 }
591 
592 SPAPR_CAP_MIG_STATE(htm, SPAPR_CAP_HTM);
593 SPAPR_CAP_MIG_STATE(vsx, SPAPR_CAP_VSX);
594 SPAPR_CAP_MIG_STATE(dfp, SPAPR_CAP_DFP);
595 SPAPR_CAP_MIG_STATE(cfpc, SPAPR_CAP_CFPC);
596 SPAPR_CAP_MIG_STATE(sbbc, SPAPR_CAP_SBBC);
597 SPAPR_CAP_MIG_STATE(ibs, SPAPR_CAP_IBS);
598 SPAPR_CAP_MIG_STATE(nested_kvm_hv, SPAPR_CAP_NESTED_KVM_HV);
599 
600 void spapr_caps_init(sPAPRMachineState *spapr)
601 {
602     sPAPRCapabilities default_caps;
603     int i;
604 
605     /* Compute the actual set of caps we should run with */
606     default_caps = default_caps_with_cpu(spapr, MACHINE(spapr)->cpu_type);
607 
608     for (i = 0; i < SPAPR_CAP_NUM; i++) {
609         /* Store the defaults */
610         spapr->def.caps[i] = default_caps.caps[i];
611         /* If not set on the command line then apply the default value */
612         if (!spapr->cmd_line_caps[i]) {
613             spapr->eff.caps[i] = default_caps.caps[i];
614         }
615     }
616 }
617 
618 void spapr_caps_apply(sPAPRMachineState *spapr)
619 {
620     int i;
621 
622     for (i = 0; i < SPAPR_CAP_NUM; i++) {
623         sPAPRCapabilityInfo *info = &capability_table[i];
624 
625         /*
626          * If the apply function can't set the desired level and thinks it's
627          * fatal, it should cause that.
628          */
629         info->apply(spapr, spapr->eff.caps[i], &error_fatal);
630     }
631 }
632 
633 void spapr_caps_cpu_apply(sPAPRMachineState *spapr, PowerPCCPU *cpu)
634 {
635     int i;
636 
637     for (i = 0; i < SPAPR_CAP_NUM; i++) {
638         sPAPRCapabilityInfo *info = &capability_table[i];
639 
640         /*
641          * If the apply function can't set the desired level and thinks it's
642          * fatal, it should cause that.
643          */
644         if (info->cpu_apply) {
645             info->cpu_apply(spapr, cpu, spapr->eff.caps[i], &error_fatal);
646         }
647     }
648 }
649 
650 void spapr_caps_add_properties(sPAPRMachineClass *smc, Error **errp)
651 {
652     Error *local_err = NULL;
653     ObjectClass *klass = OBJECT_CLASS(smc);
654     int i;
655 
656     for (i = 0; i < ARRAY_SIZE(capability_table); i++) {
657         sPAPRCapabilityInfo *cap = &capability_table[i];
658         const char *name = g_strdup_printf("cap-%s", cap->name);
659         char *desc;
660 
661         object_class_property_add(klass, name, cap->type,
662                                   cap->get, cap->set,
663                                   NULL, cap, &local_err);
664         if (local_err) {
665             error_propagate(errp, local_err);
666             return;
667         }
668 
669         desc = g_strdup_printf("%s", cap->description);
670         object_class_property_set_description(klass, name, desc, &local_err);
671         g_free(desc);
672         if (local_err) {
673             error_propagate(errp, local_err);
674             return;
675         }
676     }
677 }
678