blob: f20dc1904813b621f5c1b16da49df768e1e98fe3 [file] [log] [blame]
Andrew Scull18834872018-10-12 11:48:09 +01001/*
Andrew Walbran692b3252019-03-07 15:51:31 +00002 * Copyright 2018 The Hafnium Authors.
Andrew Scull18834872018-10-12 11:48:09 +01003 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * https://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Andrew Scull18c78fc2018-08-20 12:57:41 +010017#include "hf/api.h"
Wedson Almeida Filho3fcbcff2018-07-10 23:53:39 +010018
Andrew Walbran318f5732018-11-20 16:23:42 +000019#include "hf/arch/cpu.h"
Andrew Walbran508e63c2018-12-20 17:02:37 +000020#include "hf/arch/timer.h"
Andrew Walbran318f5732018-11-20 16:23:42 +000021
Andrew Scull877ae4b2019-07-02 12:52:33 +010022#include "hf/check.h"
Andrew Walbran318f5732018-11-20 16:23:42 +000023#include "hf/dlog.h"
Andrew Scull6386f252018-12-06 13:29:10 +000024#include "hf/mm.h"
Andrew Walbranc1ad4ce2019-05-09 11:41:39 +010025#include "hf/plat/console.h"
Jose Marinho40d55f32019-07-01 15:41:54 +010026#include "hf/spci_internal.h"
Andrew Scull6386f252018-12-06 13:29:10 +000027#include "hf/spinlock.h"
Andrew Scull877ae4b2019-07-02 12:52:33 +010028#include "hf/static_assert.h"
Andrew Scull8d9e1212019-04-05 13:52:55 +010029#include "hf/std.h"
Andrew Scull18c78fc2018-08-20 12:57:41 +010030#include "hf/vm.h"
31
Andrew Scullf35a5c92018-08-07 18:09:46 +010032#include "vmapi/hf/call.h"
Jose Marinhoa1dfeda2019-02-27 16:46:03 +000033#include "vmapi/hf/spci.h"
Wedson Almeida Filho3fcbcff2018-07-10 23:53:39 +010034
Wedson Almeida Filhoba641ef2018-12-03 04:19:44 +000035/*
36 * To eliminate the risk of deadlocks, we define a partial order for the
37 * acquisition of locks held concurrently by the same physical CPU. Our current
38 * ordering requirements are as follows:
39 *
Andrew Walbranc1ad4ce2019-05-09 11:41:39 +010040 * vm::lock -> vcpu::lock -> mm_stage1_lock -> dlog sl
Andrew Scull6386f252018-12-06 13:29:10 +000041 *
Andrew Scull4caadaf2019-07-03 13:13:47 +010042 * Locks of the same kind require the lock of lowest address to be locked first,
43 * see `sl_lock_both()`.
Wedson Almeida Filhoba641ef2018-12-03 04:19:44 +000044 */
45
Andrew Scullaa039b32018-10-04 15:02:26 +010046static_assert(HF_MAILBOX_SIZE == PAGE_SIZE,
Andrew Scull13652af2018-09-17 14:49:08 +010047 "Currently, a page is mapped for the send and receive buffers so "
48 "the maximum request is the size of a page.");
49
Wedson Almeida Filho9ed8da52018-12-17 16:09:11 +000050static struct mpool api_page_pool;
Wedson Almeida Filho22d5eaa2018-12-16 00:38:49 +000051
52/**
Wedson Almeida Filho81568c42019-01-04 13:33:02 +000053 * Initialises the API page pool by taking ownership of the contents of the
54 * given page pool.
Wedson Almeida Filho22d5eaa2018-12-16 00:38:49 +000055 */
56void api_init(struct mpool *ppool)
57{
Wedson Almeida Filho9ed8da52018-12-17 16:09:11 +000058 mpool_init_from(&api_page_pool, ppool);
Wedson Almeida Filho22d5eaa2018-12-16 00:38:49 +000059}
60
Wedson Almeida Filho3fcbcff2018-07-10 23:53:39 +010061/**
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +010062 * Switches the physical CPU back to the corresponding vcpu of the primary VM.
Andrew Scullaa039b32018-10-04 15:02:26 +010063 *
64 * This triggers the scheduling logic to run. Run in the context of secondary VM
Andrew Walbranf0c314d2019-10-02 14:24:26 +010065 * to cause SPCI_RUN to return and the primary VM to regain control of the CPU.
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +010066 */
Wedson Almeida Filho00df6c72018-10-18 11:19:24 +010067static struct vcpu *api_switch_to_primary(struct vcpu *current,
Wedson Almeida Filhoba641ef2018-12-03 04:19:44 +000068 struct hf_vcpu_run_return primary_ret,
69 enum vcpu_state secondary_state)
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +010070{
Andrew Walbran42347a92019-05-09 13:59:03 +010071 struct vm *primary = vm_find(HF_PRIMARY_VM_ID);
Andrew Walbrane1310df2019-04-29 17:28:28 +010072 struct vcpu *next = vm_get_vcpu(primary, cpu_index(current->cpu));
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +010073
Andrew Walbran508e63c2018-12-20 17:02:37 +000074 /*
75 * If the secondary is blocked but has a timer running, sleep until the
76 * timer fires rather than indefinitely.
77 */
Andrew Scullb06d1752019-02-04 10:15:48 +000078 switch (primary_ret.code) {
79 case HF_VCPU_RUN_WAIT_FOR_INTERRUPT:
80 case HF_VCPU_RUN_WAIT_FOR_MESSAGE:
81 primary_ret.sleep.ns =
82 arch_timer_enabled_current()
83 ? arch_timer_remaining_ns_current()
84 : HF_SLEEP_INDEFINITE;
85 break;
86
87 default:
88 /* Do nothing. */
89 break;
Andrew Walbran508e63c2018-12-20 17:02:37 +000090 }
91
Wedson Almeida Filho00df6c72018-10-18 11:19:24 +010092 /* Set the return value for the primary VM's call to HF_VCPU_RUN. */
Andrew Walbranf0c314d2019-10-02 14:24:26 +010093 arch_regs_set_retval(&next->regs, hf_vcpu_run_return_encode(
94 primary_ret, current->vm->id,
95 vcpu_index(current)));
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +010096
Wedson Almeida Filhoba641ef2018-12-03 04:19:44 +000097 /* Mark the current vcpu as waiting. */
98 sl_lock(&current->lock);
99 current->state = secondary_state;
100 sl_unlock(&current->lock);
101
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +0100102 return next;
103}
104
105/**
Andrew Scull33fecd32019-01-08 14:48:27 +0000106 * Returns to the primary vm and signals that the vcpu still has work to do so.
107 */
108struct vcpu *api_preempt(struct vcpu *current)
109{
110 struct hf_vcpu_run_return ret = {
111 .code = HF_VCPU_RUN_PREEMPTED,
112 };
113
Andrew Sculld6ee1102019-04-05 22:12:42 +0100114 return api_switch_to_primary(current, ret, VCPU_STATE_READY);
Andrew Scull33fecd32019-01-08 14:48:27 +0000115}
116
117/**
Andrew Scullaa039b32018-10-04 15:02:26 +0100118 * Puts the current vcpu in wait for interrupt mode, and returns to the primary
119 * vm.
120 */
Wedson Almeida Filho00df6c72018-10-18 11:19:24 +0100121struct vcpu *api_wait_for_interrupt(struct vcpu *current)
Andrew Scullaa039b32018-10-04 15:02:26 +0100122{
Andrew Scull6d2db332018-10-10 15:28:17 +0100123 struct hf_vcpu_run_return ret = {
124 .code = HF_VCPU_RUN_WAIT_FOR_INTERRUPT,
125 };
Wedson Almeida Filho81568c42019-01-04 13:33:02 +0000126
Wedson Almeida Filhoba641ef2018-12-03 04:19:44 +0000127 return api_switch_to_primary(current, ret,
Andrew Sculld6ee1102019-04-05 22:12:42 +0100128 VCPU_STATE_BLOCKED_INTERRUPT);
Andrew Scullaa039b32018-10-04 15:02:26 +0100129}
130
131/**
Andrew Walbran33645652019-04-15 12:29:31 +0100132 * Puts the current vCPU in off mode, and returns to the primary VM.
133 */
134struct vcpu *api_vcpu_off(struct vcpu *current)
135{
136 struct hf_vcpu_run_return ret = {
137 .code = HF_VCPU_RUN_WAIT_FOR_INTERRUPT,
138 };
139
140 /*
141 * Disable the timer, so the scheduler doesn't get told to call back
142 * based on it.
143 */
144 arch_timer_disable_current();
145
146 return api_switch_to_primary(current, ret, VCPU_STATE_OFF);
147}
148
149/**
Andrew Scull66d62bf2019-02-01 13:54:10 +0000150 * Returns to the primary vm to allow this cpu to be used for other tasks as the
151 * vcpu does not have work to do at this moment. The current vcpu is marked as
Andrew Walbran16075b62019-09-03 17:11:07 +0100152 * ready to be scheduled again.
Andrew Scull66d62bf2019-02-01 13:54:10 +0000153 */
Andrew Walbran16075b62019-09-03 17:11:07 +0100154void api_yield(struct vcpu *current, struct vcpu **next)
Andrew Scull66d62bf2019-02-01 13:54:10 +0000155{
Andrew Walbran16075b62019-09-03 17:11:07 +0100156 struct hf_vcpu_run_return primary_ret = {
Andrew Scull66d62bf2019-02-01 13:54:10 +0000157 .code = HF_VCPU_RUN_YIELD,
158 };
159
160 if (current->vm->id == HF_PRIMARY_VM_ID) {
Andrew Scullb06d1752019-02-04 10:15:48 +0000161 /* Noop on the primary as it makes the scheduling decisions. */
Andrew Walbran16075b62019-09-03 17:11:07 +0100162 return;
Andrew Scull66d62bf2019-02-01 13:54:10 +0000163 }
164
Andrew Walbran16075b62019-09-03 17:11:07 +0100165 *next = api_switch_to_primary(current, primary_ret, VCPU_STATE_READY);
Andrew Scull66d62bf2019-02-01 13:54:10 +0000166}
167
168/**
Andrew Walbran33645652019-04-15 12:29:31 +0100169 * Switches to the primary so that it can switch to the target, or kick it if it
170 * is already running on a different physical CPU.
171 */
172struct vcpu *api_wake_up(struct vcpu *current, struct vcpu *target_vcpu)
173{
174 struct hf_vcpu_run_return ret = {
175 .code = HF_VCPU_RUN_WAKE_UP,
176 .wake_up.vm_id = target_vcpu->vm->id,
177 .wake_up.vcpu = vcpu_index(target_vcpu),
178 };
179 return api_switch_to_primary(current, ret, VCPU_STATE_READY);
180}
181
182/**
Andrew Scull38772ab2019-01-24 15:16:50 +0000183 * Aborts the vCPU and triggers its VM to abort fully.
Andrew Scull9726c252019-01-23 13:44:19 +0000184 */
185struct vcpu *api_abort(struct vcpu *current)
186{
187 struct hf_vcpu_run_return ret = {
188 .code = HF_VCPU_RUN_ABORTED,
189 };
190
191 dlog("Aborting VM %u vCPU %u\n", current->vm->id, vcpu_index(current));
192
193 if (current->vm->id == HF_PRIMARY_VM_ID) {
194 /* TODO: what to do when the primary aborts? */
195 for (;;) {
196 /* Do nothing. */
197 }
198 }
199
200 atomic_store_explicit(&current->vm->aborting, true,
201 memory_order_relaxed);
202
203 /* TODO: free resources once all vCPUs abort. */
204
Andrew Sculld6ee1102019-04-05 22:12:42 +0100205 return api_switch_to_primary(current, ret, VCPU_STATE_ABORTED);
Andrew Scull9726c252019-01-23 13:44:19 +0000206}
207
208/**
Andrew Scull55c4d8b2018-12-18 18:50:18 +0000209 * Returns the ID of the VM.
210 */
Andrew Walbrand230f662019-10-07 18:03:36 +0100211struct spci_value api_spci_id_get(const struct vcpu *current)
Andrew Scull55c4d8b2018-12-18 18:50:18 +0000212{
Andrew Walbrand230f662019-10-07 18:03:36 +0100213 return (struct spci_value){.func = SPCI_SUCCESS_32,
214 .arg2 = current->vm->id};
Andrew Scull55c4d8b2018-12-18 18:50:18 +0000215}
216
217/**
Wedson Almeida Filho3fcbcff2018-07-10 23:53:39 +0100218 * Returns the number of VMs configured to run.
219 */
Andrew Walbran52d99672019-06-25 15:51:11 +0100220spci_vm_count_t api_vm_get_count(void)
Wedson Almeida Filho3fcbcff2018-07-10 23:53:39 +0100221{
Andrew Scull19503262018-09-20 14:48:39 +0100222 return vm_get_count();
Wedson Almeida Filho3fcbcff2018-07-10 23:53:39 +0100223}
224
225/**
Andrew Walbranc6d23c42019-06-26 13:30:42 +0100226 * Returns the number of vCPUs configured in the given VM, or 0 if there is no
227 * such VM or the caller is not the primary VM.
Wedson Almeida Filho3fcbcff2018-07-10 23:53:39 +0100228 */
Andrew Walbranc6d23c42019-06-26 13:30:42 +0100229spci_vcpu_count_t api_vcpu_get_count(spci_vm_id_t vm_id,
230 const struct vcpu *current)
Wedson Almeida Filho3fcbcff2018-07-10 23:53:39 +0100231{
Andrew Scull19503262018-09-20 14:48:39 +0100232 struct vm *vm;
233
234 /* Only the primary VM needs to know about vcpus for scheduling. */
Wedson Almeida Filho00df6c72018-10-18 11:19:24 +0100235 if (current->vm->id != HF_PRIMARY_VM_ID) {
Andrew Walbranc6d23c42019-06-26 13:30:42 +0100236 return 0;
Andrew Scull7364a8e2018-07-19 15:39:29 +0100237 }
Wedson Almeida Filho3fcbcff2018-07-10 23:53:39 +0100238
Andrew Walbran42347a92019-05-09 13:59:03 +0100239 vm = vm_find(vm_id);
Andrew Scull19503262018-09-20 14:48:39 +0100240 if (vm == NULL) {
Andrew Walbranc6d23c42019-06-26 13:30:42 +0100241 return 0;
Andrew Scull19503262018-09-20 14:48:39 +0100242 }
243
244 return vm->vcpu_count;
Wedson Almeida Filho3fcbcff2018-07-10 23:53:39 +0100245}
246
247/**
Wedson Almeida Filho03306112018-11-26 00:08:03 +0000248 * This function is called by the architecture-specific context switching
249 * function to indicate that register state for the given vcpu has been saved
250 * and can therefore be used by other pcpus.
251 */
252void api_regs_state_saved(struct vcpu *vcpu)
253{
254 sl_lock(&vcpu->lock);
255 vcpu->regs_available = true;
256 sl_unlock(&vcpu->lock);
257}
258
259/**
Wedson Almeida Filhoea62e2e2019-01-09 19:14:59 +0000260 * Retrieves the next waiter and removes it from the wait list if the VM's
261 * mailbox is in a writable state.
262 */
263static struct wait_entry *api_fetch_waiter(struct vm_locked locked_vm)
264{
265 struct wait_entry *entry;
266 struct vm *vm = locked_vm.vm;
267
Andrew Sculld6ee1102019-04-05 22:12:42 +0100268 if (vm->mailbox.state != MAILBOX_STATE_EMPTY ||
Wedson Almeida Filhoea62e2e2019-01-09 19:14:59 +0000269 vm->mailbox.recv == NULL || list_empty(&vm->mailbox.waiter_list)) {
270 /* The mailbox is not writable or there are no waiters. */
271 return NULL;
272 }
273
274 /* Remove waiter from the wait list. */
275 entry = CONTAINER_OF(vm->mailbox.waiter_list.next, struct wait_entry,
276 wait_links);
277 list_remove(&entry->wait_links);
278 return entry;
279}
280
281/**
Andrew Walbran508e63c2018-12-20 17:02:37 +0000282 * Assuming that the arguments have already been checked by the caller, injects
283 * a virtual interrupt of the given ID into the given target vCPU. This doesn't
284 * cause the vCPU to actually be run immediately; it will be taken when the vCPU
285 * is next run, which is up to the scheduler.
286 *
287 * Returns:
288 * - 0 on success if no further action is needed.
289 * - 1 if it was called by the primary VM and the primary VM now needs to wake
290 * up or kick the target vCPU.
291 */
Andrew Walbranfc9d4382019-05-10 18:07:21 +0100292static int64_t internal_interrupt_inject(struct vcpu *target_vcpu,
Andrew Walbran508e63c2018-12-20 17:02:37 +0000293 uint32_t intid, struct vcpu *current,
294 struct vcpu **next)
295{
296 uint32_t intid_index = intid / INTERRUPT_REGISTER_BITS;
Andrew Walbrane52006c2019-10-22 18:01:28 +0100297 uint32_t intid_mask = 1U << (intid % INTERRUPT_REGISTER_BITS);
Andrew Walbran508e63c2018-12-20 17:02:37 +0000298 int64_t ret = 0;
299
300 sl_lock(&target_vcpu->lock);
Andrew Walbran508e63c2018-12-20 17:02:37 +0000301
302 /*
303 * We only need to change state and (maybe) trigger a virtual IRQ if it
304 * is enabled and was not previously pending. Otherwise we can skip
305 * everything except setting the pending bit.
306 *
307 * If you change this logic make sure to update the need_vm_lock logic
308 * above to match.
309 */
310 if (!(target_vcpu->interrupts.interrupt_enabled[intid_index] &
311 ~target_vcpu->interrupts.interrupt_pending[intid_index] &
312 intid_mask)) {
313 goto out;
314 }
315
316 /* Increment the count. */
317 target_vcpu->interrupts.enabled_and_pending_count++;
318
319 /*
320 * Only need to update state if there was not already an
321 * interrupt enabled and pending.
322 */
323 if (target_vcpu->interrupts.enabled_and_pending_count != 1) {
324 goto out;
325 }
326
Andrew Walbran508e63c2018-12-20 17:02:37 +0000327 if (current->vm->id == HF_PRIMARY_VM_ID) {
328 /*
329 * If the call came from the primary VM, let it know that it
330 * should run or kick the target vCPU.
331 */
332 ret = 1;
333 } else if (current != target_vcpu && next != NULL) {
Andrew Walbran33645652019-04-15 12:29:31 +0100334 *next = api_wake_up(current, target_vcpu);
Andrew Walbran508e63c2018-12-20 17:02:37 +0000335 }
336
337out:
338 /* Either way, make it pending. */
339 target_vcpu->interrupts.interrupt_pending[intid_index] |= intid_mask;
340
341 sl_unlock(&target_vcpu->lock);
Andrew Walbran508e63c2018-12-20 17:02:37 +0000342
343 return ret;
344}
345
346/**
Andrew Walbrand4d2fa12019-10-01 16:47:25 +0100347 * Constructs an SPCI_MSG_SEND value to return from a successful SPCI_MSG_POLL
348 * or SPCI_MSG_WAIT call.
349 */
350static struct spci_value spci_msg_recv_return(const struct vm *receiver)
351{
352 return (struct spci_value){
353 .func = SPCI_MSG_SEND_32,
Andrew Walbran70bc8622019-10-07 14:15:58 +0100354 .arg1 = (receiver->mailbox.recv_sender << 16) | receiver->id,
355 .arg3 = receiver->mailbox.recv_size,
356 .arg4 = receiver->mailbox.recv_attributes};
Andrew Walbrand4d2fa12019-10-01 16:47:25 +0100357}
358
359/**
Wedson Almeida Filho03306112018-11-26 00:08:03 +0000360 * Prepares the vcpu to run by updating its state and fetching whether a return
361 * value needs to be forced onto the vCPU.
362 */
Andrew Scull38772ab2019-01-24 15:16:50 +0000363static bool api_vcpu_prepare_run(const struct vcpu *current, struct vcpu *vcpu,
Andrew Walbran508e63c2018-12-20 17:02:37 +0000364 struct hf_vcpu_run_return *run_ret)
Wedson Almeida Filho03306112018-11-26 00:08:03 +0000365{
Andrew Scullb06d1752019-02-04 10:15:48 +0000366 bool need_vm_lock;
Wedson Almeida Filho03306112018-11-26 00:08:03 +0000367 bool ret;
368
Andrew Scullb06d1752019-02-04 10:15:48 +0000369 /*
Andrew Scull4caadaf2019-07-03 13:13:47 +0100370 * Wait until the registers become available. All locks must be released
371 * between iterations of this loop to avoid potential deadlocks if, on
372 * any path, a lock needs to be taken after taking the decision to
373 * switch context but before the registers have been saved.
Andrew Scullb06d1752019-02-04 10:15:48 +0000374 *
Andrew Scull4caadaf2019-07-03 13:13:47 +0100375 * The VM lock is not needed in the common case so it must only be taken
376 * when it is going to be needed. This ensures there are no inter-vCPU
377 * dependencies in the common run case meaning the sensitive context
378 * switch performance is consistent.
Andrew Scullb06d1752019-02-04 10:15:48 +0000379 */
380 for (;;) {
381 sl_lock(&vcpu->lock);
382
383 /* The VM needs to be locked to deliver mailbox messages. */
Andrew Sculld6ee1102019-04-05 22:12:42 +0100384 need_vm_lock = vcpu->state == VCPU_STATE_BLOCKED_MAILBOX;
Andrew Scullb06d1752019-02-04 10:15:48 +0000385 if (need_vm_lock) {
386 sl_unlock(&vcpu->lock);
387 sl_lock(&vcpu->vm->lock);
388 sl_lock(&vcpu->lock);
389 }
390
391 if (vcpu->regs_available) {
392 break;
393 }
394
Andrew Sculld6ee1102019-04-05 22:12:42 +0100395 if (vcpu->state == VCPU_STATE_RUNNING) {
Andrew Scullb06d1752019-02-04 10:15:48 +0000396 /*
397 * vCPU is running on another pCPU.
398 *
Andrew Walbranabf88fb2019-06-21 12:17:47 +0100399 * It's ok not to return the sleep duration here because
Andrew Scullb06d1752019-02-04 10:15:48 +0000400 * the other physical CPU that is currently running this
Andrew Walbranabf88fb2019-06-21 12:17:47 +0100401 * vCPU will return the sleep duration if needed. The
402 * default return value is
403 * HF_VCPU_RUN_WAIT_FOR_INTERRUPT, so no need to set it
404 * explicitly.
Andrew Scullb06d1752019-02-04 10:15:48 +0000405 */
406 ret = false;
407 goto out;
408 }
409
410 sl_unlock(&vcpu->lock);
411 if (need_vm_lock) {
412 sl_unlock(&vcpu->vm->lock);
413 }
414 }
Andrew Scull9726c252019-01-23 13:44:19 +0000415
416 if (atomic_load_explicit(&vcpu->vm->aborting, memory_order_relaxed)) {
Andrew Sculld6ee1102019-04-05 22:12:42 +0100417 if (vcpu->state != VCPU_STATE_ABORTED) {
Andrew Scull82331282019-01-25 10:29:34 +0000418 dlog("Aborting VM %u vCPU %u\n", vcpu->vm->id,
419 vcpu_index(vcpu));
Andrew Sculld6ee1102019-04-05 22:12:42 +0100420 vcpu->state = VCPU_STATE_ABORTED;
Andrew Scull9726c252019-01-23 13:44:19 +0000421 }
422 ret = false;
423 goto out;
424 }
425
Andrew Walbran508e63c2018-12-20 17:02:37 +0000426 switch (vcpu->state) {
Andrew Sculld6ee1102019-04-05 22:12:42 +0100427 case VCPU_STATE_RUNNING:
428 case VCPU_STATE_OFF:
429 case VCPU_STATE_ABORTED:
Wedson Almeida Filho03306112018-11-26 00:08:03 +0000430 ret = false;
431 goto out;
Andrew Scullb06d1752019-02-04 10:15:48 +0000432
Andrew Sculld6ee1102019-04-05 22:12:42 +0100433 case VCPU_STATE_BLOCKED_MAILBOX:
Andrew Scullb06d1752019-02-04 10:15:48 +0000434 /*
435 * A pending message allows the vCPU to run so the message can
436 * be delivered directly.
437 */
Andrew Sculld6ee1102019-04-05 22:12:42 +0100438 if (vcpu->vm->mailbox.state == MAILBOX_STATE_RECEIVED) {
Andrew Walbrand4d2fa12019-10-01 16:47:25 +0100439 arch_regs_set_retval(&vcpu->regs,
440 spci_msg_recv_return(vcpu->vm));
Andrew Sculld6ee1102019-04-05 22:12:42 +0100441 vcpu->vm->mailbox.state = MAILBOX_STATE_READ;
Andrew Scullb06d1752019-02-04 10:15:48 +0000442 break;
443 }
444 /* Fall through. */
Andrew Sculld6ee1102019-04-05 22:12:42 +0100445 case VCPU_STATE_BLOCKED_INTERRUPT:
Andrew Scullb06d1752019-02-04 10:15:48 +0000446 /* Allow virtual interrupts to be delivered. */
447 if (vcpu->interrupts.enabled_and_pending_count > 0) {
448 break;
449 }
450
451 /* The timer expired so allow the interrupt to be delivered. */
Andrew Walbran508e63c2018-12-20 17:02:37 +0000452 if (arch_timer_pending(&vcpu->regs)) {
453 break;
454 }
455
456 /*
457 * The vCPU is not ready to run, return the appropriate code to
458 * the primary which called vcpu_run.
459 */
460 if (arch_timer_enabled(&vcpu->regs)) {
Andrew Scullb06d1752019-02-04 10:15:48 +0000461 run_ret->code =
Andrew Sculld6ee1102019-04-05 22:12:42 +0100462 vcpu->state == VCPU_STATE_BLOCKED_MAILBOX
Andrew Scullb06d1752019-02-04 10:15:48 +0000463 ? HF_VCPU_RUN_WAIT_FOR_MESSAGE
464 : HF_VCPU_RUN_WAIT_FOR_INTERRUPT;
Andrew Walbran508e63c2018-12-20 17:02:37 +0000465 run_ret->sleep.ns =
466 arch_timer_remaining_ns(&vcpu->regs);
467 }
468
469 ret = false;
470 goto out;
Andrew Scullb06d1752019-02-04 10:15:48 +0000471
Andrew Sculld6ee1102019-04-05 22:12:42 +0100472 case VCPU_STATE_READY:
Andrew Walbran508e63c2018-12-20 17:02:37 +0000473 break;
Wedson Almeida Filho03306112018-11-26 00:08:03 +0000474 }
475
Andrew Scullb06d1752019-02-04 10:15:48 +0000476 /* It has been decided that the vCPU should be run. */
Wedson Almeida Filho03306112018-11-26 00:08:03 +0000477 vcpu->cpu = current->cpu;
Andrew Sculld6ee1102019-04-05 22:12:42 +0100478 vcpu->state = VCPU_STATE_RUNNING;
Wedson Almeida Filho03306112018-11-26 00:08:03 +0000479
Wedson Almeida Filho03306112018-11-26 00:08:03 +0000480 /*
Wedson Almeida Filho03306112018-11-26 00:08:03 +0000481 * Mark the registers as unavailable now that we're about to reflect
482 * them onto the real registers. This will also prevent another physical
483 * CPU from trying to read these registers.
484 */
485 vcpu->regs_available = false;
486
487 ret = true;
488
489out:
490 sl_unlock(&vcpu->lock);
Andrew Scullb06d1752019-02-04 10:15:48 +0000491 if (need_vm_lock) {
492 sl_unlock(&vcpu->vm->lock);
493 }
494
Wedson Almeida Filho03306112018-11-26 00:08:03 +0000495 return ret;
496}
497
498/**
Wedson Almeida Filho3fcbcff2018-07-10 23:53:39 +0100499 * Runs the given vcpu of the given vm.
500 */
Andrew Walbranb037d5b2019-06-25 17:19:41 +0100501struct hf_vcpu_run_return api_vcpu_run(spci_vm_id_t vm_id,
502 spci_vcpu_index_t vcpu_idx,
Andrew Scull38772ab2019-01-24 15:16:50 +0000503 const struct vcpu *current,
504 struct vcpu **next)
Wedson Almeida Filho3fcbcff2018-07-10 23:53:39 +0100505{
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +0100506 struct vm *vm;
Wedson Almeida Filho3fcbcff2018-07-10 23:53:39 +0100507 struct vcpu *vcpu;
Andrew Scull6d2db332018-10-10 15:28:17 +0100508 struct hf_vcpu_run_return ret = {
509 .code = HF_VCPU_RUN_WAIT_FOR_INTERRUPT,
Andrew Scullb06d1752019-02-04 10:15:48 +0000510 .sleep.ns = HF_SLEEP_INDEFINITE,
Andrew Scull6d2db332018-10-10 15:28:17 +0100511 };
Wedson Almeida Filho3fcbcff2018-07-10 23:53:39 +0100512
513 /* Only the primary VM can switch vcpus. */
Wedson Almeida Filho00df6c72018-10-18 11:19:24 +0100514 if (current->vm->id != HF_PRIMARY_VM_ID) {
Andrew Scull6d2db332018-10-10 15:28:17 +0100515 goto out;
Andrew Scull7364a8e2018-07-19 15:39:29 +0100516 }
Wedson Almeida Filho3fcbcff2018-07-10 23:53:39 +0100517
Andrew Scull19503262018-09-20 14:48:39 +0100518 /* Only secondary VM vcpus can be run. */
519 if (vm_id == HF_PRIMARY_VM_ID) {
Andrew Scull6d2db332018-10-10 15:28:17 +0100520 goto out;
Andrew Scull7364a8e2018-07-19 15:39:29 +0100521 }
Wedson Almeida Filho3fcbcff2018-07-10 23:53:39 +0100522
Andrew Scull19503262018-09-20 14:48:39 +0100523 /* The requested VM must exist. */
Andrew Walbran42347a92019-05-09 13:59:03 +0100524 vm = vm_find(vm_id);
Andrew Scull19503262018-09-20 14:48:39 +0100525 if (vm == NULL) {
Andrew Scull6d2db332018-10-10 15:28:17 +0100526 goto out;
Andrew Scull19503262018-09-20 14:48:39 +0100527 }
528
529 /* The requested vcpu must exist. */
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +0100530 if (vcpu_idx >= vm->vcpu_count) {
Andrew Scull6d2db332018-10-10 15:28:17 +0100531 goto out;
Andrew Scull7364a8e2018-07-19 15:39:29 +0100532 }
Wedson Almeida Filho3fcbcff2018-07-10 23:53:39 +0100533
Wedson Almeida Filho03306112018-11-26 00:08:03 +0000534 /* Update state if allowed. */
Andrew Walbrane1310df2019-04-29 17:28:28 +0100535 vcpu = vm_get_vcpu(vm, vcpu_idx);
Andrew Scullb06d1752019-02-04 10:15:48 +0000536 if (!api_vcpu_prepare_run(current, vcpu, &ret)) {
Wedson Almeida Filho03306112018-11-26 00:08:03 +0000537 goto out;
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +0100538 }
Wedson Almeida Filho03306112018-11-26 00:08:03 +0000539
Andrew Walbran508e63c2018-12-20 17:02:37 +0000540 /*
541 * Inject timer interrupt if timer has expired. It's safe to access
542 * vcpu->regs here because api_vcpu_prepare_run already made sure that
543 * regs_available was true (and then set it to false) before returning
544 * true.
545 */
546 if (arch_timer_pending(&vcpu->regs)) {
547 /* Make virtual timer interrupt pending. */
Andrew Walbranfc9d4382019-05-10 18:07:21 +0100548 internal_interrupt_inject(vcpu, HF_VIRTUAL_TIMER_INTID, vcpu,
549 NULL);
Andrew Walbran508e63c2018-12-20 17:02:37 +0000550
551 /*
552 * Set the mask bit so the hardware interrupt doesn't fire
553 * again. Ideally we wouldn't do this because it affects what
554 * the secondary vCPU sees, but if we don't then we end up with
555 * a loop of the interrupt firing each time we try to return to
556 * the secondary vCPU.
557 */
558 arch_timer_mask(&vcpu->regs);
559 }
560
Andrew Scull33fecd32019-01-08 14:48:27 +0000561 /* Switch to the vcpu. */
Wedson Almeida Filho03306112018-11-26 00:08:03 +0000562 *next = vcpu;
Wedson Almeida Filho03306112018-11-26 00:08:03 +0000563
Andrew Scull33fecd32019-01-08 14:48:27 +0000564 /*
565 * Set a placeholder return code to the scheduler. This will be
566 * overwritten when the switch back to the primary occurs.
567 */
568 ret.code = HF_VCPU_RUN_PREEMPTED;
569
Andrew Scull6d2db332018-10-10 15:28:17 +0100570out:
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +0100571 return ret;
Wedson Almeida Filho3fcbcff2018-07-10 23:53:39 +0100572}
573
574/**
Andrew Scull81e85092018-12-12 12:56:20 +0000575 * Check that the mode indicates memory that is valid, owned and exclusive.
576 */
Andrew Walbran1281ed42019-10-22 17:23:40 +0100577static bool api_mode_valid_owned_and_exclusive(uint32_t mode)
Andrew Scull81e85092018-12-12 12:56:20 +0000578{
Andrew Scullb5f49e02019-10-02 13:20:47 +0100579 return (mode & (MM_MODE_D | MM_MODE_INVALID | MM_MODE_UNOWNED |
580 MM_MODE_SHARED)) == 0;
Andrew Scull81e85092018-12-12 12:56:20 +0000581}
582
583/**
Wedson Almeida Filhoea62e2e2019-01-09 19:14:59 +0000584 * Determines the value to be returned by api_vm_configure and api_mailbox_clear
585 * after they've succeeded. If a secondary VM is running and there are waiters,
586 * it also switches back to the primary VM for it to wake waiters up.
587 */
588static int64_t api_waiter_result(struct vm_locked locked_vm,
589 struct vcpu *current, struct vcpu **next)
590{
591 struct vm *vm = locked_vm.vm;
592 struct hf_vcpu_run_return ret = {
593 .code = HF_VCPU_RUN_NOTIFY_WAITERS,
594 };
595
596 if (list_empty(&vm->mailbox.waiter_list)) {
597 /* No waiters, nothing else to do. */
598 return 0;
599 }
600
601 if (vm->id == HF_PRIMARY_VM_ID) {
602 /* The caller is the primary VM. Tell it to wake up waiters. */
603 return 1;
604 }
605
606 /*
607 * Switch back to the primary VM, informing it that there are waiters
608 * that need to be notified.
609 */
Andrew Sculld6ee1102019-04-05 22:12:42 +0100610 *next = api_switch_to_primary(current, ret, VCPU_STATE_READY);
Wedson Almeida Filhoea62e2e2019-01-09 19:14:59 +0000611
612 return 0;
613}
614
615/**
Andrew Sculle1322792019-07-01 17:46:10 +0100616 * Configures the hypervisor's stage-1 view of the send and receive pages. The
617 * stage-1 page tables must be locked so memory cannot be taken by another core
618 * which could result in this transaction being unable to roll back in the case
619 * of an error.
620 */
621static bool api_vm_configure_stage1(struct vm_locked vm_locked,
622 paddr_t pa_send_begin, paddr_t pa_send_end,
623 paddr_t pa_recv_begin, paddr_t pa_recv_end,
624 struct mpool *local_page_pool)
625{
626 bool ret;
627 struct mm_stage1_locked mm_stage1_locked = mm_lock_stage1();
628
629 /* Map the send page as read-only in the hypervisor address space. */
630 vm_locked.vm->mailbox.send =
631 mm_identity_map(mm_stage1_locked, pa_send_begin, pa_send_end,
632 MM_MODE_R, local_page_pool);
633 if (!vm_locked.vm->mailbox.send) {
634 /* TODO: partial defrag of failed range. */
635 /* Recover any memory consumed in failed mapping. */
636 mm_defrag(mm_stage1_locked, local_page_pool);
637 goto fail;
638 }
639
640 /*
641 * Map the receive page as writable in the hypervisor address space. On
642 * failure, unmap the send page before returning.
643 */
644 vm_locked.vm->mailbox.recv =
645 mm_identity_map(mm_stage1_locked, pa_recv_begin, pa_recv_end,
646 MM_MODE_W, local_page_pool);
647 if (!vm_locked.vm->mailbox.recv) {
648 /* TODO: partial defrag of failed range. */
649 /* Recover any memory consumed in failed mapping. */
650 mm_defrag(mm_stage1_locked, local_page_pool);
651 goto fail_undo_send;
652 }
653
654 ret = true;
655 goto out;
656
657 /*
658 * The following mappings will not require more memory than is available
659 * in the local pool.
660 */
661fail_undo_send:
662 vm_locked.vm->mailbox.send = NULL;
Andrew Scull7e8de322019-07-02 13:00:56 +0100663 CHECK(mm_unmap(mm_stage1_locked, pa_send_begin, pa_send_end,
664 local_page_pool));
Andrew Sculle1322792019-07-01 17:46:10 +0100665
666fail:
667 ret = false;
668
669out:
670 mm_unlock_stage1(&mm_stage1_locked);
671
672 return ret;
673}
674
675/**
676 * Configures the send and receive pages in the VM stage-2 and hypervisor
677 * stage-1 page tables. Locking of the page tables combined with a local memory
678 * pool ensures there will always be enough memory to recover from any errors
679 * that arise.
680 */
681static bool api_vm_configure_pages(struct vm_locked vm_locked,
682 paddr_t pa_send_begin, paddr_t pa_send_end,
Andrew Walbran1281ed42019-10-22 17:23:40 +0100683 uint32_t orig_send_mode,
684 paddr_t pa_recv_begin, paddr_t pa_recv_end,
685 uint32_t orig_recv_mode)
Andrew Sculle1322792019-07-01 17:46:10 +0100686{
687 bool ret;
688 struct mpool local_page_pool;
689
690 /*
691 * Create a local pool so any freed memory can't be used by another
692 * thread. This is to ensure the original mapping can be restored if any
693 * stage of the process fails.
694 */
695 mpool_init_with_fallback(&local_page_pool, &api_page_pool);
696
697 /* Take memory ownership away from the VM and mark as shared. */
698 if (!mm_vm_identity_map(
699 &vm_locked.vm->ptable, pa_send_begin, pa_send_end,
700 MM_MODE_UNOWNED | MM_MODE_SHARED | MM_MODE_R | MM_MODE_W,
701 NULL, &local_page_pool)) {
702 goto fail;
703 }
704
705 if (!mm_vm_identity_map(&vm_locked.vm->ptable, pa_recv_begin,
706 pa_recv_end,
707 MM_MODE_UNOWNED | MM_MODE_SHARED | MM_MODE_R,
708 NULL, &local_page_pool)) {
709 /* TODO: partial defrag of failed range. */
710 /* Recover any memory consumed in failed mapping. */
711 mm_vm_defrag(&vm_locked.vm->ptable, &local_page_pool);
712 goto fail_undo_send;
713 }
714
715 if (!api_vm_configure_stage1(vm_locked, pa_send_begin, pa_send_end,
716 pa_recv_begin, pa_recv_end,
717 &local_page_pool)) {
718 goto fail_undo_send_and_recv;
719 }
720
721 ret = true;
722 goto out;
723
724 /*
725 * The following mappings will not require more memory than is available
726 * in the local pool.
727 */
728fail_undo_send_and_recv:
Andrew Scull7e8de322019-07-02 13:00:56 +0100729 CHECK(mm_vm_identity_map(&vm_locked.vm->ptable, pa_recv_begin,
730 pa_recv_end, orig_recv_mode, NULL,
731 &local_page_pool));
Andrew Sculle1322792019-07-01 17:46:10 +0100732
733fail_undo_send:
Andrew Scull7e8de322019-07-02 13:00:56 +0100734 CHECK(mm_vm_identity_map(&vm_locked.vm->ptable, pa_send_begin,
735 pa_send_end, orig_send_mode, NULL,
736 &local_page_pool));
Andrew Sculle1322792019-07-01 17:46:10 +0100737
738fail:
739 ret = false;
740
741out:
742 mpool_fini(&local_page_pool);
743
744 return ret;
745}
746
747/**
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +0100748 * Configures the VM to send/receive data through the specified pages. The pages
749 * must not be shared.
Wedson Almeida Filhoea62e2e2019-01-09 19:14:59 +0000750 *
751 * Returns:
752 * - -1 on failure.
753 * - 0 on success if no further action is needed.
754 * - 1 if it was called by the primary VM and the primary VM now needs to wake
755 * up or kick waiters. Waiters should be retrieved by calling
756 * hf_mailbox_waiter_get.
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +0100757 */
Wedson Almeida Filhoea62e2e2019-01-09 19:14:59 +0000758int64_t api_vm_configure(ipaddr_t send, ipaddr_t recv, struct vcpu *current,
759 struct vcpu **next)
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +0100760{
Wedson Almeida Filho00df6c72018-10-18 11:19:24 +0100761 struct vm *vm = current->vm;
Andrew Sculle1322792019-07-01 17:46:10 +0100762 struct vm_locked vm_locked;
Andrew Scull80871322018-08-06 12:04:09 +0100763 paddr_t pa_send_begin;
764 paddr_t pa_send_end;
765 paddr_t pa_recv_begin;
766 paddr_t pa_recv_end;
Andrew Walbran1281ed42019-10-22 17:23:40 +0100767 uint32_t orig_send_mode;
768 uint32_t orig_recv_mode;
Andrew Scullc0e569a2018-10-02 18:05:21 +0100769 int64_t ret;
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +0100770
771 /* Fail if addresses are not page-aligned. */
Alfredo Mazzinghieb1997c2019-02-07 18:00:01 +0000772 if (!is_aligned(ipa_addr(send), PAGE_SIZE) ||
773 !is_aligned(ipa_addr(recv), PAGE_SIZE)) {
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +0100774 return -1;
775 }
776
Andrew Scullc2eb6a32018-12-13 16:54:24 +0000777 /* Convert to physical addresses. */
778 pa_send_begin = pa_from_ipa(send);
779 pa_send_end = pa_add(pa_send_begin, PAGE_SIZE);
780
781 pa_recv_begin = pa_from_ipa(recv);
782 pa_recv_end = pa_add(pa_recv_begin, PAGE_SIZE);
783
Andrew Scullc9ccb3f2018-08-13 15:27:12 +0100784 /* Fail if the same page is used for the send and receive pages. */
785 if (pa_addr(pa_send_begin) == pa_addr(pa_recv_begin)) {
Andrew Scull220e6212018-12-21 18:09:00 +0000786 return -1;
787 }
788
Andrew Scull3c0a90a2019-07-01 11:55:53 +0100789 /*
790 * The hypervisor's memory map must be locked for the duration of this
791 * operation to ensure there will be sufficient memory to recover from
792 * any failures.
793 *
794 * TODO: the scope of the can be reduced but will require restructuring
795 * to keep a single unlock point.
796 */
Andrew Sculle1322792019-07-01 17:46:10 +0100797 vm_locked = vm_lock(vm);
Andrew Scull220e6212018-12-21 18:09:00 +0000798
799 /* We only allow these to be setup once. */
800 if (vm->mailbox.send || vm->mailbox.recv) {
801 goto fail;
802 }
803
804 /*
805 * Ensure the pages are valid, owned and exclusive to the VM and that
806 * the VM has the required access to the memory.
807 */
808 if (!mm_vm_get_mode(&vm->ptable, send, ipa_add(send, PAGE_SIZE),
809 &orig_send_mode) ||
810 !api_mode_valid_owned_and_exclusive(orig_send_mode) ||
811 (orig_send_mode & MM_MODE_R) == 0 ||
812 (orig_send_mode & MM_MODE_W) == 0) {
813 goto fail;
814 }
815
816 if (!mm_vm_get_mode(&vm->ptable, recv, ipa_add(recv, PAGE_SIZE),
817 &orig_recv_mode) ||
818 !api_mode_valid_owned_and_exclusive(orig_recv_mode) ||
819 (orig_recv_mode & MM_MODE_R) == 0) {
820 goto fail;
821 }
822
Andrew Sculle1322792019-07-01 17:46:10 +0100823 if (!api_vm_configure_pages(vm_locked, pa_send_begin, pa_send_end,
824 orig_send_mode, pa_recv_begin, pa_recv_end,
825 orig_recv_mode)) {
826 goto fail;
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +0100827 }
828
Wedson Almeida Filhoea62e2e2019-01-09 19:14:59 +0000829 /* Tell caller about waiters, if any. */
Andrew Sculle1322792019-07-01 17:46:10 +0100830 ret = api_waiter_result(vm_locked, current, next);
Andrew Scull220e6212018-12-21 18:09:00 +0000831 goto exit;
832
Andrew Scull220e6212018-12-21 18:09:00 +0000833fail:
834 ret = -1;
835
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +0100836exit:
Andrew Sculle1322792019-07-01 17:46:10 +0100837 vm_unlock(&vm_locked);
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +0100838
839 return ret;
840}
841
842/**
Andrew Walbrane0f575f2019-10-16 16:00:12 +0100843 * Checks whether the given `to` VM's mailbox is currently busy, and optionally
844 * registers the `from` VM to be notified when it becomes available.
845 */
846static bool msg_receiver_busy(struct vm_locked to, struct vm_locked from,
847 bool notify)
848{
849 if (to.vm->mailbox.state != MAILBOX_STATE_EMPTY ||
850 to.vm->mailbox.recv == NULL) {
851 /*
852 * Fail if the receiver isn't currently ready to receive data,
853 * setting up for notification if requested.
854 */
855 if (notify) {
856 struct wait_entry *entry =
857 &from.vm->wait_entries[to.vm->id];
858
859 /* Append waiter only if it's not there yet. */
860 if (list_empty(&entry->wait_links)) {
861 list_append(&to.vm->mailbox.waiter_list,
862 &entry->wait_links);
863 }
864 }
865
866 return true;
867 }
868
869 return false;
870}
871
872/**
873 * Notifies the `to` VM about the message currently in its mailbox, possibly
874 * with the help of the primary VM.
875 */
876static void deliver_msg(struct vm_locked to, struct vm_locked from,
877 uint32_t size, struct vcpu *current, struct vcpu **next)
878{
879 struct hf_vcpu_run_return primary_ret = {
880 .code = HF_VCPU_RUN_MESSAGE,
881 };
882
883 primary_ret.message.vm_id = to.vm->id;
884
885 /* Messages for the primary VM are delivered directly. */
886 if (to.vm->id == HF_PRIMARY_VM_ID) {
887 /*
888 * Only tell the primary VM the size if the message is for it,
889 * to avoid leaking data about messages for other VMs.
890 */
891 primary_ret.message.size = size;
892
893 to.vm->mailbox.state = MAILBOX_STATE_READ;
894 *next = api_switch_to_primary(current, primary_ret,
895 VCPU_STATE_READY);
896 return;
897 }
898
899 to.vm->mailbox.state = MAILBOX_STATE_RECEIVED;
900
901 /* Return to the primary VM directly or with a switch. */
902 if (from.vm->id != HF_PRIMARY_VM_ID) {
903 *next = api_switch_to_primary(current, primary_ret,
904 VCPU_STATE_READY);
905 }
906}
907
908/**
Andrew Scullaa039b32018-10-04 15:02:26 +0100909 * Copies data from the sender's send buffer to the recipient's receive buffer
910 * and notifies the recipient.
Wedson Almeida Filho17c997f2019-01-09 18:50:09 +0000911 *
912 * If the recipient's receive buffer is busy, it can optionally register the
913 * caller to be notified when the recipient's receive buffer becomes available.
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +0100914 */
Andrew Walbran70bc8622019-10-07 14:15:58 +0100915struct spci_value api_spci_msg_send(spci_vm_id_t sender_vm_id,
916 spci_vm_id_t receiver_vm_id, uint32_t size,
917 uint32_t attributes, struct vcpu *current,
918 struct vcpu **next)
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +0100919{
Wedson Almeida Filho00df6c72018-10-18 11:19:24 +0100920 struct vm *from = current->vm;
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +0100921 struct vm *to;
Jose Marinho75509b42019-04-09 09:34:59 +0100922
Andrew Walbranf6595962019-10-15 16:47:56 +0100923 struct two_vm_locked vm_to_from_lock;
Jose Marinho75509b42019-04-09 09:34:59 +0100924
Andrew Walbran70bc8622019-10-07 14:15:58 +0100925 const void *from_msg;
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +0100926
Andrew Walbran70bc8622019-10-07 14:15:58 +0100927 struct spci_value ret;
Jose Marinhoa1dfeda2019-02-27 16:46:03 +0000928 bool notify = (attributes & SPCI_MSG_SEND_NOTIFY_MASK) ==
929 SPCI_MSG_SEND_NOTIFY;
Andrew Scull19503262018-09-20 14:48:39 +0100930
Andrew Walbran70bc8622019-10-07 14:15:58 +0100931 /* Ensure sender VM ID corresponds to the current VM. */
932 if (sender_vm_id != from->id) {
933 return spci_error(SPCI_INVALID_PARAMETERS);
934 }
935
936 /* Disallow reflexive requests as this suggests an error in the VM. */
937 if (receiver_vm_id == from->id) {
938 return spci_error(SPCI_INVALID_PARAMETERS);
939 }
940
941 /* Limit the size of transfer. */
942 if (size > SPCI_MSG_PAYLOAD_MAX) {
943 return spci_error(SPCI_INVALID_PARAMETERS);
944 }
945
Jose Marinhoa1dfeda2019-02-27 16:46:03 +0000946 /*
Andrew Walbran70bc8622019-10-07 14:15:58 +0100947 * Check that the sender has configured its send buffer. If the tx
948 * mailbox at from_msg is configured (i.e. from_msg != NULL) then it can
949 * be safely accessed after releasing the lock since the tx mailbox
950 * address can only be configured once.
Jose Marinhoa1dfeda2019-02-27 16:46:03 +0000951 */
952 sl_lock(&from->lock);
953 from_msg = from->mailbox.send;
954 sl_unlock(&from->lock);
955
956 if (from_msg == NULL) {
Andrew Walbran70bc8622019-10-07 14:15:58 +0100957 return spci_error(SPCI_INVALID_PARAMETERS);
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +0100958 }
959
Andrew Walbran70bc8622019-10-07 14:15:58 +0100960 /* Ensure the receiver VM exists. */
961 to = vm_find(receiver_vm_id);
Jose Marinhoa1dfeda2019-02-27 16:46:03 +0000962 if (to == NULL) {
Andrew Walbran70bc8622019-10-07 14:15:58 +0100963 return spci_error(SPCI_INVALID_PARAMETERS);
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +0100964 }
965
Jose Marinho75509b42019-04-09 09:34:59 +0100966 /*
Andrew Walbran70bc8622019-10-07 14:15:58 +0100967 * Hafnium needs to hold the lock on <to> before the mailbox state is
Jose Marinho75509b42019-04-09 09:34:59 +0100968 * checked. The lock on <to> must be held until the information is
969 * copied to <to> Rx buffer. Since in
970 * spci_msg_handle_architected_message we may call api_spci_share_memory
971 * which must hold the <from> lock, we must hold the <from> lock at this
972 * point to prevent a deadlock scenario.
973 */
Andrew Walbranf6595962019-10-15 16:47:56 +0100974 vm_to_from_lock = vm_lock_both(to, from);
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +0100975
Andrew Walbrane0f575f2019-10-16 16:00:12 +0100976 if (msg_receiver_busy(vm_to_from_lock.vm1, vm_to_from_lock.vm2,
977 notify)) {
Andrew Walbran70bc8622019-10-07 14:15:58 +0100978 ret = spci_error(SPCI_BUSY);
Andrew Scullaa039b32018-10-04 15:02:26 +0100979 goto out;
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +0100980 }
981
Andrew Walbran70bc8622019-10-07 14:15:58 +0100982 /* Handle legacy memory sharing messages. */
983 if ((attributes & SPCI_MSG_SEND_LEGACY_MEMORY_MASK) ==
984 SPCI_MSG_SEND_LEGACY_MEMORY) {
Jose Marinho75509b42019-04-09 09:34:59 +0100985 /*
986 * Buffer holding the internal copy of the shared memory
987 * regions.
988 */
Andrew Walbran70bc8622019-10-07 14:15:58 +0100989 struct spci_architected_message_header
990 *architected_message_replica =
991 (struct spci_architected_message_header *)
992 cpu_get_buffer(current->cpu->id);
Jose Marinho20713fa2019-08-07 15:42:07 +0100993 uint32_t message_buffer_size =
994 cpu_get_buffer_size(current->cpu->id);
Jose Marinho75509b42019-04-09 09:34:59 +0100995
996 struct spci_architected_message_header *architected_header =
Andrew Walbran70bc8622019-10-07 14:15:58 +0100997 (struct spci_architected_message_header *)from_msg;
Jose Marinho75509b42019-04-09 09:34:59 +0100998
Andrew Walbran70bc8622019-10-07 14:15:58 +0100999 if (size > message_buffer_size) {
1000 ret = spci_error(SPCI_INVALID_PARAMETERS);
Jose Marinho75509b42019-04-09 09:34:59 +01001001 goto out;
1002 }
1003
Andrew Walbran70bc8622019-10-07 14:15:58 +01001004 if (size < sizeof(struct spci_architected_message_header)) {
1005 ret = spci_error(SPCI_INVALID_PARAMETERS);
Jose Marinho75509b42019-04-09 09:34:59 +01001006 goto out;
1007 }
1008
Andrew Walbran70bc8622019-10-07 14:15:58 +01001009 /* Copy the architected message into the internal buffer. */
1010 memcpy_s(architected_message_replica, message_buffer_size,
1011 architected_header, size);
Jose Marinho75509b42019-04-09 09:34:59 +01001012
1013 /*
Andrew Walbran70bc8622019-10-07 14:15:58 +01001014 * Note that architected_message_replica is passed as the third
1015 * parameter to spci_msg_handle_architected_message. The
1016 * execution flow commencing at
1017 * spci_msg_handle_architected_message will make several
1018 * accesses to fields in architected_message_replica. The memory
1019 * area architected_message_replica must be exclusively owned by
1020 * Hafnium so that TOCTOU issues do not arise.
Jose Marinho75509b42019-04-09 09:34:59 +01001021 */
1022 ret = spci_msg_handle_architected_message(
Andrew Walbranf6595962019-10-15 16:47:56 +01001023 vm_to_from_lock.vm1, vm_to_from_lock.vm2,
Andrew Walbran70bc8622019-10-07 14:15:58 +01001024 architected_message_replica, size);
Jose Marinho75509b42019-04-09 09:34:59 +01001025
Andrew Walbran70bc8622019-10-07 14:15:58 +01001026 if (ret.func != SPCI_SUCCESS_32) {
Jose Marinho75509b42019-04-09 09:34:59 +01001027 goto out;
1028 }
1029 } else {
1030 /* Copy data. */
Andrew Walbran70bc8622019-10-07 14:15:58 +01001031 memcpy_s(to->mailbox.recv, SPCI_MSG_PAYLOAD_MAX, from_msg,
1032 size);
1033 to->mailbox.recv_size = size;
1034 to->mailbox.recv_sender = sender_vm_id;
1035 to->mailbox.recv_attributes = 0;
1036 ret = (struct spci_value){.func = SPCI_SUCCESS_32};
Jose Marinho75509b42019-04-09 09:34:59 +01001037 }
1038
Andrew Walbrane0f575f2019-10-16 16:00:12 +01001039 deliver_msg(vm_to_from_lock.vm1, vm_to_from_lock.vm2, size, current,
1040 next);
Andrew Scullaa039b32018-10-04 15:02:26 +01001041
1042out:
Andrew Walbranf6595962019-10-15 16:47:56 +01001043 vm_unlock(&vm_to_from_lock.vm1);
1044 vm_unlock(&vm_to_from_lock.vm2);
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +01001045
Wedson Almeida Filho80eb4a32018-11-30 17:11:15 +00001046 return ret;
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +01001047}
1048
1049/**
Andrew Scullec52ddf2019-08-20 10:41:01 +01001050 * Checks whether the vCPU's attempt to block for a message has already been
1051 * interrupted or whether it is allowed to block.
1052 */
1053bool api_spci_msg_recv_block_interrupted(struct vcpu *current)
1054{
1055 bool interrupted;
1056
1057 sl_lock(&current->lock);
1058
1059 /*
1060 * Don't block if there are enabled and pending interrupts, to match
1061 * behaviour of wait_for_interrupt.
1062 */
1063 interrupted = (current->interrupts.enabled_and_pending_count > 0);
1064
1065 sl_unlock(&current->lock);
1066
1067 return interrupted;
1068}
1069
1070/**
Andrew Scullaa039b32018-10-04 15:02:26 +01001071 * Receives a message from the mailbox. If one isn't available, this function
1072 * can optionally block the caller until one becomes available.
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +01001073 *
Andrew Scullaa039b32018-10-04 15:02:26 +01001074 * No new messages can be received until the mailbox has been cleared.
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +01001075 */
Andrew Walbrand4d2fa12019-10-01 16:47:25 +01001076struct spci_value api_spci_msg_recv(bool block, struct vcpu *current,
1077 struct vcpu **next)
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +01001078{
Wedson Almeida Filho00df6c72018-10-18 11:19:24 +01001079 struct vm *vm = current->vm;
Andrew Walbrand4d2fa12019-10-01 16:47:25 +01001080 struct spci_value return_code;
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +01001081
Andrew Scullaa039b32018-10-04 15:02:26 +01001082 /*
1083 * The primary VM will receive messages as a status code from running
1084 * vcpus and must not call this function.
1085 */
Andrew Scull19503262018-09-20 14:48:39 +01001086 if (vm->id == HF_PRIMARY_VM_ID) {
Andrew Walbrand4d2fa12019-10-01 16:47:25 +01001087 return spci_error(SPCI_NOT_SUPPORTED);
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +01001088 }
1089
1090 sl_lock(&vm->lock);
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +01001091
Andrew Scullaa039b32018-10-04 15:02:26 +01001092 /* Return pending messages without blocking. */
Andrew Sculld6ee1102019-04-05 22:12:42 +01001093 if (vm->mailbox.state == MAILBOX_STATE_RECEIVED) {
1094 vm->mailbox.state = MAILBOX_STATE_READ;
Andrew Walbrand4d2fa12019-10-01 16:47:25 +01001095 return_code = spci_msg_recv_return(vm);
Jose Marinho3e2442f2019-03-12 13:30:37 +00001096 goto out;
1097 }
1098
1099 /* No pending message so fail if not allowed to block. */
1100 if (!block) {
Andrew Walbrand4d2fa12019-10-01 16:47:25 +01001101 return_code = spci_error(SPCI_RETRY);
Andrew Scullaa039b32018-10-04 15:02:26 +01001102 goto out;
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +01001103 }
Andrew Scullaa039b32018-10-04 15:02:26 +01001104
Andrew Walbran9311c9a2019-03-12 16:59:04 +00001105 /*
Jose Marinho3e2442f2019-03-12 13:30:37 +00001106 * From this point onward this call can only be interrupted or a message
1107 * received. If a message is received the return value will be set at
1108 * that time to SPCI_SUCCESS.
Andrew Walbran9311c9a2019-03-12 16:59:04 +00001109 */
Andrew Walbrand4d2fa12019-10-01 16:47:25 +01001110 return_code = spci_error(SPCI_INTERRUPTED);
Andrew Scullec52ddf2019-08-20 10:41:01 +01001111 if (api_spci_msg_recv_block_interrupted(current)) {
Andrew Scullaa039b32018-10-04 15:02:26 +01001112 goto out;
1113 }
1114
Andrew Scullaa039b32018-10-04 15:02:26 +01001115 /* Switch back to primary vm to block. */
Andrew Walbranb4816552018-12-05 17:35:42 +00001116 {
1117 struct hf_vcpu_run_return run_return = {
Andrew Scullb06d1752019-02-04 10:15:48 +00001118 .code = HF_VCPU_RUN_WAIT_FOR_MESSAGE,
Andrew Walbranb4816552018-12-05 17:35:42 +00001119 };
Wedson Almeida Filho81568c42019-01-04 13:33:02 +00001120
Andrew Walbranb4816552018-12-05 17:35:42 +00001121 *next = api_switch_to_primary(current, run_return,
Andrew Sculld6ee1102019-04-05 22:12:42 +01001122 VCPU_STATE_BLOCKED_MAILBOX);
Andrew Walbranb4816552018-12-05 17:35:42 +00001123 }
Andrew Scullaa039b32018-10-04 15:02:26 +01001124out:
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +01001125 sl_unlock(&vm->lock);
1126
Jose Marinho3e2442f2019-03-12 13:30:37 +00001127 return return_code;
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +01001128}
1129
1130/**
Wedson Almeida Filhoea62e2e2019-01-09 19:14:59 +00001131 * Retrieves the next VM whose mailbox became writable. For a VM to be notified
1132 * by this function, the caller must have called api_mailbox_send before with
1133 * the notify argument set to true, and this call must have failed because the
1134 * mailbox was not available.
1135 *
1136 * It should be called repeatedly to retrieve a list of VMs.
1137 *
1138 * Returns -1 if no VM became writable, or the id of the VM whose mailbox
1139 * became writable.
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +01001140 */
Wedson Almeida Filhoea62e2e2019-01-09 19:14:59 +00001141int64_t api_mailbox_writable_get(const struct vcpu *current)
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +01001142{
Wedson Almeida Filho00df6c72018-10-18 11:19:24 +01001143 struct vm *vm = current->vm;
Wedson Almeida Filhoea62e2e2019-01-09 19:14:59 +00001144 struct wait_entry *entry;
Andrew Scullc0e569a2018-10-02 18:05:21 +01001145 int64_t ret;
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +01001146
1147 sl_lock(&vm->lock);
Wedson Almeida Filhoea62e2e2019-01-09 19:14:59 +00001148 if (list_empty(&vm->mailbox.ready_list)) {
1149 ret = -1;
1150 goto exit;
1151 }
1152
1153 entry = CONTAINER_OF(vm->mailbox.ready_list.next, struct wait_entry,
1154 ready_links);
1155 list_remove(&entry->ready_links);
Wedson Almeida Filhob790f652019-01-22 23:41:56 +00001156 ret = entry - vm->wait_entries;
Wedson Almeida Filhoea62e2e2019-01-09 19:14:59 +00001157
1158exit:
1159 sl_unlock(&vm->lock);
1160 return ret;
1161}
1162
1163/**
1164 * Retrieves the next VM waiting to be notified that the mailbox of the
1165 * specified VM became writable. Only primary VMs are allowed to call this.
1166 *
Wedson Almeida Filhob790f652019-01-22 23:41:56 +00001167 * Returns -1 on failure or if there are no waiters; the VM id of the next
1168 * waiter otherwise.
Wedson Almeida Filhoea62e2e2019-01-09 19:14:59 +00001169 */
Andrew Walbran42347a92019-05-09 13:59:03 +01001170int64_t api_mailbox_waiter_get(spci_vm_id_t vm_id, const struct vcpu *current)
Wedson Almeida Filhoea62e2e2019-01-09 19:14:59 +00001171{
1172 struct vm *vm;
1173 struct vm_locked locked;
1174 struct wait_entry *entry;
1175 struct vm *waiting_vm;
1176
1177 /* Only primary VMs are allowed to call this function. */
1178 if (current->vm->id != HF_PRIMARY_VM_ID) {
1179 return -1;
1180 }
1181
Andrew Walbran42347a92019-05-09 13:59:03 +01001182 vm = vm_find(vm_id);
Wedson Almeida Filhoea62e2e2019-01-09 19:14:59 +00001183 if (vm == NULL) {
1184 return -1;
1185 }
1186
1187 /* Check if there are outstanding notifications from given vm. */
Andrew Walbran7e932bd2019-04-29 16:47:06 +01001188 locked = vm_lock(vm);
Wedson Almeida Filhoea62e2e2019-01-09 19:14:59 +00001189 entry = api_fetch_waiter(locked);
1190 vm_unlock(&locked);
1191
1192 if (entry == NULL) {
1193 return -1;
1194 }
1195
1196 /* Enqueue notification to waiting VM. */
1197 waiting_vm = entry->waiting_vm;
1198
1199 sl_lock(&waiting_vm->lock);
1200 if (list_empty(&entry->ready_links)) {
1201 list_append(&waiting_vm->mailbox.ready_list,
1202 &entry->ready_links);
1203 }
1204 sl_unlock(&waiting_vm->lock);
1205
1206 return waiting_vm->id;
1207}
1208
1209/**
1210 * Clears the caller's mailbox so that a new message can be received. The caller
1211 * must have copied out all data they wish to preserve as new messages will
1212 * overwrite the old and will arrive asynchronously.
1213 *
1214 * Returns:
Andrew Scullaa7db8e2019-02-01 14:12:19 +00001215 * - -1 on failure, if the mailbox hasn't been read.
Wedson Almeida Filhoea62e2e2019-01-09 19:14:59 +00001216 * - 0 on success if no further action is needed.
1217 * - 1 if it was called by the primary VM and the primary VM now needs to wake
1218 * up or kick waiters. Waiters should be retrieved by calling
1219 * hf_mailbox_waiter_get.
1220 */
1221int64_t api_mailbox_clear(struct vcpu *current, struct vcpu **next)
1222{
1223 struct vm *vm = current->vm;
1224 struct vm_locked locked;
1225 int64_t ret;
1226
Andrew Walbran7e932bd2019-04-29 16:47:06 +01001227 locked = vm_lock(vm);
Andrew Scullaa7db8e2019-02-01 14:12:19 +00001228 switch (vm->mailbox.state) {
Andrew Sculld6ee1102019-04-05 22:12:42 +01001229 case MAILBOX_STATE_EMPTY:
Andrew Scullaa7db8e2019-02-01 14:12:19 +00001230 ret = 0;
1231 break;
1232
Andrew Sculld6ee1102019-04-05 22:12:42 +01001233 case MAILBOX_STATE_RECEIVED:
Andrew Scullaa7db8e2019-02-01 14:12:19 +00001234 ret = -1;
1235 break;
1236
Andrew Sculld6ee1102019-04-05 22:12:42 +01001237 case MAILBOX_STATE_READ:
Wedson Almeida Filhoea62e2e2019-01-09 19:14:59 +00001238 ret = api_waiter_result(locked, current, next);
Andrew Sculld6ee1102019-04-05 22:12:42 +01001239 vm->mailbox.state = MAILBOX_STATE_EMPTY;
Andrew Scullaa7db8e2019-02-01 14:12:19 +00001240 break;
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +01001241 }
Wedson Almeida Filhoea62e2e2019-01-09 19:14:59 +00001242 vm_unlock(&locked);
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +01001243
1244 return ret;
Wedson Almeida Filho3fcbcff2018-07-10 23:53:39 +01001245}
Andrew Walbran318f5732018-11-20 16:23:42 +00001246
1247/**
1248 * Enables or disables a given interrupt ID for the calling vCPU.
1249 *
1250 * Returns 0 on success, or -1 if the intid is invalid.
1251 */
Wedson Almeida Filhoc559d132019-01-09 19:33:40 +00001252int64_t api_interrupt_enable(uint32_t intid, bool enable, struct vcpu *current)
Andrew Walbran318f5732018-11-20 16:23:42 +00001253{
1254 uint32_t intid_index = intid / INTERRUPT_REGISTER_BITS;
Andrew Walbrane52006c2019-10-22 18:01:28 +01001255 uint32_t intid_mask = 1U << (intid % INTERRUPT_REGISTER_BITS);
Wedson Almeida Filho81568c42019-01-04 13:33:02 +00001256
Andrew Walbran318f5732018-11-20 16:23:42 +00001257 if (intid >= HF_NUM_INTIDS) {
1258 return -1;
1259 }
1260
1261 sl_lock(&current->lock);
1262 if (enable) {
Andrew Walbran3d84a262018-12-13 14:41:19 +00001263 /*
1264 * If it is pending and was not enabled before, increment the
1265 * count.
1266 */
1267 if (current->interrupts.interrupt_pending[intid_index] &
1268 ~current->interrupts.interrupt_enabled[intid_index] &
1269 intid_mask) {
1270 current->interrupts.enabled_and_pending_count++;
1271 }
Andrew Walbran318f5732018-11-20 16:23:42 +00001272 current->interrupts.interrupt_enabled[intid_index] |=
1273 intid_mask;
Andrew Walbran318f5732018-11-20 16:23:42 +00001274 } else {
Andrew Walbran3d84a262018-12-13 14:41:19 +00001275 /*
1276 * If it is pending and was enabled before, decrement the count.
1277 */
1278 if (current->interrupts.interrupt_pending[intid_index] &
1279 current->interrupts.interrupt_enabled[intid_index] &
1280 intid_mask) {
1281 current->interrupts.enabled_and_pending_count--;
1282 }
Andrew Walbran318f5732018-11-20 16:23:42 +00001283 current->interrupts.interrupt_enabled[intid_index] &=
1284 ~intid_mask;
1285 }
1286
1287 sl_unlock(&current->lock);
1288 return 0;
1289}
1290
1291/**
1292 * Returns the ID of the next pending interrupt for the calling vCPU, and
1293 * acknowledges it (i.e. marks it as no longer pending). Returns
1294 * HF_INVALID_INTID if there are no pending interrupts.
1295 */
Wedson Almeida Filhoc559d132019-01-09 19:33:40 +00001296uint32_t api_interrupt_get(struct vcpu *current)
Andrew Walbran318f5732018-11-20 16:23:42 +00001297{
1298 uint8_t i;
1299 uint32_t first_interrupt = HF_INVALID_INTID;
Andrew Walbran318f5732018-11-20 16:23:42 +00001300
1301 /*
1302 * Find the first enabled and pending interrupt ID, return it, and
1303 * deactivate it.
1304 */
1305 sl_lock(&current->lock);
1306 for (i = 0; i < HF_NUM_INTIDS / INTERRUPT_REGISTER_BITS; ++i) {
1307 uint32_t enabled_and_pending =
1308 current->interrupts.interrupt_enabled[i] &
1309 current->interrupts.interrupt_pending[i];
Wedson Almeida Filho81568c42019-01-04 13:33:02 +00001310
Andrew Walbran318f5732018-11-20 16:23:42 +00001311 if (enabled_and_pending != 0) {
Andrew Walbran3d84a262018-12-13 14:41:19 +00001312 uint8_t bit_index = ctz(enabled_and_pending);
1313 /*
1314 * Mark it as no longer pending and decrement the count.
1315 */
1316 current->interrupts.interrupt_pending[i] &=
Andrew Walbrane52006c2019-10-22 18:01:28 +01001317 ~(1U << bit_index);
Andrew Walbran3d84a262018-12-13 14:41:19 +00001318 current->interrupts.enabled_and_pending_count--;
1319 first_interrupt =
1320 i * INTERRUPT_REGISTER_BITS + bit_index;
Andrew Walbran318f5732018-11-20 16:23:42 +00001321 break;
1322 }
1323 }
Andrew Walbran318f5732018-11-20 16:23:42 +00001324
1325 sl_unlock(&current->lock);
1326 return first_interrupt;
1327}
1328
1329/**
Andrew Walbran4cf217a2018-12-14 15:24:50 +00001330 * Returns whether the current vCPU is allowed to inject an interrupt into the
Andrew Walbran318f5732018-11-20 16:23:42 +00001331 * given VM and vCPU.
1332 */
1333static inline bool is_injection_allowed(uint32_t target_vm_id,
1334 struct vcpu *current)
1335{
1336 uint32_t current_vm_id = current->vm->id;
Wedson Almeida Filho81568c42019-01-04 13:33:02 +00001337
Andrew Walbran318f5732018-11-20 16:23:42 +00001338 /*
1339 * The primary VM is allowed to inject interrupts into any VM. Secondary
1340 * VMs are only allowed to inject interrupts into their own vCPUs.
1341 */
1342 return current_vm_id == HF_PRIMARY_VM_ID ||
1343 current_vm_id == target_vm_id;
1344}
1345
1346/**
1347 * Injects a virtual interrupt of the given ID into the given target vCPU.
1348 * This doesn't cause the vCPU to actually be run immediately; it will be taken
1349 * when the vCPU is next run, which is up to the scheduler.
1350 *
Andrew Walbran3d84a262018-12-13 14:41:19 +00001351 * Returns:
1352 * - -1 on failure because the target VM or vCPU doesn't exist, the interrupt
1353 * ID is invalid, or the current VM is not allowed to inject interrupts to
1354 * the target VM.
1355 * - 0 on success if no further action is needed.
1356 * - 1 if it was called by the primary VM and the primary VM now needs to wake
1357 * up or kick the target vCPU.
Andrew Walbran318f5732018-11-20 16:23:42 +00001358 */
Andrew Walbran42347a92019-05-09 13:59:03 +01001359int64_t api_interrupt_inject(spci_vm_id_t target_vm_id,
Andrew Walbranb037d5b2019-06-25 17:19:41 +01001360 spci_vcpu_index_t target_vcpu_idx, uint32_t intid,
Andrew Walbran42347a92019-05-09 13:59:03 +01001361 struct vcpu *current, struct vcpu **next)
Andrew Walbran318f5732018-11-20 16:23:42 +00001362{
Andrew Walbran318f5732018-11-20 16:23:42 +00001363 struct vcpu *target_vcpu;
Andrew Walbran42347a92019-05-09 13:59:03 +01001364 struct vm *target_vm = vm_find(target_vm_id);
Andrew Walbran318f5732018-11-20 16:23:42 +00001365
1366 if (intid >= HF_NUM_INTIDS) {
1367 return -1;
1368 }
Wedson Almeida Filho81568c42019-01-04 13:33:02 +00001369
Andrew Walbran318f5732018-11-20 16:23:42 +00001370 if (target_vm == NULL) {
1371 return -1;
1372 }
Wedson Almeida Filho81568c42019-01-04 13:33:02 +00001373
Andrew Walbran318f5732018-11-20 16:23:42 +00001374 if (target_vcpu_idx >= target_vm->vcpu_count) {
1375 /* The requested vcpu must exist. */
1376 return -1;
1377 }
Wedson Almeida Filho81568c42019-01-04 13:33:02 +00001378
Andrew Walbran318f5732018-11-20 16:23:42 +00001379 if (!is_injection_allowed(target_vm_id, current)) {
1380 return -1;
1381 }
Wedson Almeida Filho81568c42019-01-04 13:33:02 +00001382
Andrew Walbrane1310df2019-04-29 17:28:28 +01001383 target_vcpu = vm_get_vcpu(target_vm, target_vcpu_idx);
Andrew Walbran318f5732018-11-20 16:23:42 +00001384
1385 dlog("Injecting IRQ %d for VM %d VCPU %d from VM %d VCPU %d\n", intid,
1386 target_vm_id, target_vcpu_idx, current->vm->id, current->cpu->id);
Andrew Walbranfc9d4382019-05-10 18:07:21 +01001387 return internal_interrupt_inject(target_vcpu, intid, current, next);
Andrew Walbran318f5732018-11-20 16:23:42 +00001388}
Andrew Scull6386f252018-12-06 13:29:10 +00001389
1390/**
1391 * Clears a region of physical memory by overwriting it with zeros. The data is
1392 * flushed from the cache so the memory has been cleared across the system.
1393 */
1394static bool api_clear_memory(paddr_t begin, paddr_t end, struct mpool *ppool)
1395{
1396 /*
1397 * TODO: change this to a cpu local single page window rather than a
1398 * global mapping of the whole range. Such an approach will limit
1399 * the changes to stage-1 tables and will allow only local
1400 * invalidation.
1401 */
Andrew Scull3c0a90a2019-07-01 11:55:53 +01001402 bool ret;
1403 struct mm_stage1_locked stage1_locked = mm_lock_stage1();
1404 void *ptr =
1405 mm_identity_map(stage1_locked, begin, end, MM_MODE_W, ppool);
Andrew Walbran2cb43392019-04-17 12:52:45 +01001406 size_t size = pa_difference(begin, end);
Andrew Scull6386f252018-12-06 13:29:10 +00001407
1408 if (!ptr) {
1409 /* TODO: partial defrag of failed range. */
1410 /* Recover any memory consumed in failed mapping. */
Andrew Scull3c0a90a2019-07-01 11:55:53 +01001411 mm_defrag(stage1_locked, ppool);
1412 goto fail;
Andrew Scull6386f252018-12-06 13:29:10 +00001413 }
1414
Andrew Scull2b5fbad2019-04-05 13:55:56 +01001415 memset_s(ptr, size, 0, size);
Andrew Scullc059fbe2019-09-12 12:58:40 +01001416 arch_mm_flush_dcache(ptr, size);
Andrew Scull3c0a90a2019-07-01 11:55:53 +01001417 mm_unmap(stage1_locked, begin, end, ppool);
Andrew Scull6386f252018-12-06 13:29:10 +00001418
Andrew Scull3c0a90a2019-07-01 11:55:53 +01001419 ret = true;
1420 goto out;
1421
1422fail:
1423 ret = false;
1424
1425out:
1426 mm_unlock_stage1(&stage1_locked);
1427
1428 return ret;
Andrew Scull6386f252018-12-06 13:29:10 +00001429}
1430
Andrew Walbrane0f575f2019-10-16 16:00:12 +01001431/** TODO: Move function to spci_architected_message.c. */
Jose Marinho75509b42019-04-09 09:34:59 +01001432/**
1433 * Shares memory from the calling VM with another. The memory can be shared in
1434 * different modes.
1435 *
1436 * This function requires the calling context to hold the <to> and <from> locks.
1437 *
1438 * Returns:
1439 * In case of error one of the following values is returned:
1440 * 1) SPCI_INVALID_PARAMETERS - The endpoint provided parameters were
1441 * erroneous;
Andrew Walbran379aa722019-10-07 14:16:34 +01001442 * 2) SPCI_NO_MEMORY - Hafnium did not have sufficient memory to complete
Jose Marinho75509b42019-04-09 09:34:59 +01001443 * the request.
1444 * Success is indicated by SPCI_SUCCESS.
1445 */
Andrew Walbran70bc8622019-10-07 14:15:58 +01001446struct spci_value api_spci_share_memory(
1447 struct vm_locked to_locked, struct vm_locked from_locked,
1448 struct spci_memory_region *memory_region, uint32_t memory_to_attributes,
1449 enum spci_memory_share share)
Jose Marinho75509b42019-04-09 09:34:59 +01001450{
1451 struct vm *to = to_locked.vm;
1452 struct vm *from = from_locked.vm;
Andrew Walbran1281ed42019-10-22 17:23:40 +01001453 uint32_t orig_from_mode;
1454 uint32_t from_mode;
1455 uint32_t to_mode;
Jose Marinho75509b42019-04-09 09:34:59 +01001456 struct mpool local_page_pool;
Andrew Walbran70bc8622019-10-07 14:15:58 +01001457 struct spci_value ret;
Jose Marinho75509b42019-04-09 09:34:59 +01001458 paddr_t pa_begin;
1459 paddr_t pa_end;
1460 ipaddr_t begin;
1461 ipaddr_t end;
Andrew Walbranf5972182019-10-15 15:41:26 +01001462 struct spci_memory_region_constituent *constituents =
1463 spci_memory_region_get_constituents(memory_region);
Jose Marinho75509b42019-04-09 09:34:59 +01001464
1465 size_t size;
1466
1467 /* Disallow reflexive shares as this suggests an error in the VM. */
1468 if (to == from) {
Andrew Walbran70bc8622019-10-07 14:15:58 +01001469 return spci_error(SPCI_INVALID_PARAMETERS);
Jose Marinho75509b42019-04-09 09:34:59 +01001470 }
1471
1472 /*
1473 * Create a local pool so any freed memory can't be used by another
1474 * thread. This is to ensure the original mapping can be restored if any
1475 * stage of the process fails.
1476 */
1477 mpool_init_with_fallback(&local_page_pool, &api_page_pool);
1478
1479 /* Obtain the single contiguous set of pages from the memory_region. */
1480 /* TODO: Add support for multiple constituent regions. */
Andrew Walbranf5972182019-10-15 15:41:26 +01001481 size = constituents[0].page_count * PAGE_SIZE;
1482 begin = ipa_init(constituents[0].address);
Jose Marinho75509b42019-04-09 09:34:59 +01001483 end = ipa_add(begin, size);
1484
1485 /*
1486 * Check if the state transition is lawful for both VMs involved
1487 * in the memory exchange, ensure that all constituents of a memory
1488 * region being shared are at the same state.
1489 */
1490 if (!spci_msg_check_transition(to, from, share, &orig_from_mode, begin,
1491 end, memory_to_attributes, &from_mode,
1492 &to_mode)) {
Andrew Walbran70bc8622019-10-07 14:15:58 +01001493 return spci_error(SPCI_INVALID_PARAMETERS);
Jose Marinho75509b42019-04-09 09:34:59 +01001494 }
1495
1496 pa_begin = pa_from_ipa(begin);
1497 pa_end = pa_from_ipa(end);
1498
1499 /*
1500 * First update the mapping for the sender so there is not overlap with
1501 * the recipient.
1502 */
1503 if (!mm_vm_identity_map(&from->ptable, pa_begin, pa_end, from_mode,
1504 NULL, &local_page_pool)) {
Andrew Walbran70bc8622019-10-07 14:15:58 +01001505 ret = spci_error(SPCI_NO_MEMORY);
Jose Marinho75509b42019-04-09 09:34:59 +01001506 goto out;
1507 }
1508
1509 /* Complete the transfer by mapping the memory into the recipient. */
1510 if (!mm_vm_identity_map(&to->ptable, pa_begin, pa_end, to_mode, NULL,
1511 &local_page_pool)) {
1512 /* TODO: partial defrag of failed range. */
1513 /* Recover any memory consumed in failed mapping. */
1514 mm_vm_defrag(&from->ptable, &local_page_pool);
1515
Andrew Walbran70bc8622019-10-07 14:15:58 +01001516 ret = spci_error(SPCI_NO_MEMORY);
Jose Marinho75509b42019-04-09 09:34:59 +01001517
1518 CHECK(mm_vm_identity_map(&from->ptable, pa_begin, pa_end,
1519 orig_from_mode, NULL,
1520 &local_page_pool));
1521
1522 goto out;
1523 }
1524
Andrew Walbran70bc8622019-10-07 14:15:58 +01001525 ret = (struct spci_value){.func = SPCI_SUCCESS_32};
Jose Marinho75509b42019-04-09 09:34:59 +01001526
1527out:
Jose Marinho75509b42019-04-09 09:34:59 +01001528 mpool_fini(&local_page_pool);
1529
1530 return ret;
1531}
1532
Andrew Scull6386f252018-12-06 13:29:10 +00001533/**
1534 * Shares memory from the calling VM with another. The memory can be shared in
1535 * different modes.
1536 *
1537 * TODO: the interface for sharing memory will need to be enhanced to allow
1538 * sharing with different modes e.g. read-only, informing the recipient
1539 * of the memory they have been given, opting to not wipe the memory and
1540 * possibly allowing multiple blocks to be transferred. What this will
1541 * look like is TBD.
1542 */
Andrew Walbran42347a92019-05-09 13:59:03 +01001543int64_t api_share_memory(spci_vm_id_t vm_id, ipaddr_t addr, size_t size,
Andrew Scull6386f252018-12-06 13:29:10 +00001544 enum hf_share share, struct vcpu *current)
1545{
1546 struct vm *from = current->vm;
1547 struct vm *to;
Andrew Walbran1281ed42019-10-22 17:23:40 +01001548 uint32_t orig_from_mode;
1549 uint32_t from_mode;
1550 uint32_t to_mode;
Andrew Scull6386f252018-12-06 13:29:10 +00001551 ipaddr_t begin;
1552 ipaddr_t end;
1553 paddr_t pa_begin;
1554 paddr_t pa_end;
1555 struct mpool local_page_pool;
1556 int64_t ret;
1557
1558 /* Disallow reflexive shares as this suggests an error in the VM. */
1559 if (vm_id == from->id) {
1560 return -1;
1561 }
1562
1563 /* Ensure the target VM exists. */
Andrew Walbran42347a92019-05-09 13:59:03 +01001564 to = vm_find(vm_id);
Andrew Scull6386f252018-12-06 13:29:10 +00001565 if (to == NULL) {
1566 return -1;
1567 }
1568
1569 begin = addr;
1570 end = ipa_add(addr, size);
1571
1572 /* Fail if addresses are not page-aligned. */
Alfredo Mazzinghieb1997c2019-02-07 18:00:01 +00001573 if (!is_aligned(ipa_addr(begin), PAGE_SIZE) ||
1574 !is_aligned(ipa_addr(end), PAGE_SIZE)) {
Andrew Scull6386f252018-12-06 13:29:10 +00001575 return -1;
1576 }
1577
1578 /* Convert the sharing request to memory management modes. */
1579 switch (share) {
1580 case HF_MEMORY_GIVE:
1581 from_mode = MM_MODE_INVALID | MM_MODE_UNOWNED;
1582 to_mode = MM_MODE_R | MM_MODE_W | MM_MODE_X;
1583 break;
1584
1585 case HF_MEMORY_LEND:
1586 from_mode = MM_MODE_INVALID;
1587 to_mode = MM_MODE_R | MM_MODE_W | MM_MODE_X | MM_MODE_UNOWNED;
1588 break;
1589
1590 case HF_MEMORY_SHARE:
1591 from_mode = MM_MODE_R | MM_MODE_W | MM_MODE_X | MM_MODE_SHARED;
1592 to_mode = MM_MODE_R | MM_MODE_W | MM_MODE_X | MM_MODE_UNOWNED |
1593 MM_MODE_SHARED;
1594 break;
1595
1596 default:
1597 /* The input is untrusted so might not be a valid value. */
1598 return -1;
1599 }
1600
1601 /*
1602 * Create a local pool so any freed memory can't be used by another
1603 * thread. This is to ensure the original mapping can be restored if any
1604 * stage of the process fails.
1605 */
1606 mpool_init_with_fallback(&local_page_pool, &api_page_pool);
1607
1608 sl_lock_both(&from->lock, &to->lock);
1609
1610 /*
1611 * Ensure that the memory range is mapped with the same mode so that
1612 * changes can be reverted if the process fails.
1613 */
1614 if (!mm_vm_get_mode(&from->ptable, begin, end, &orig_from_mode)) {
1615 goto fail;
1616 }
1617
Andrew Scullb5f49e02019-10-02 13:20:47 +01001618 /* Ensure the address range is normal memory and not a device. */
1619 if (orig_from_mode & MM_MODE_D) {
1620 goto fail;
1621 }
1622
Andrew Scull6386f252018-12-06 13:29:10 +00001623 /*
1624 * Ensure the memory range is valid for the sender. If it isn't, the
1625 * sender has either shared it with another VM already or has no claim
1626 * to the memory.
1627 */
1628 if (orig_from_mode & MM_MODE_INVALID) {
1629 goto fail;
1630 }
1631
1632 /*
1633 * The sender must own the memory and have exclusive access to it in
1634 * order to share it. Alternatively, it is giving memory back to the
1635 * owning VM.
1636 */
1637 if (orig_from_mode & MM_MODE_UNOWNED) {
Andrew Walbran1281ed42019-10-22 17:23:40 +01001638 uint32_t orig_to_mode;
Andrew Scull6386f252018-12-06 13:29:10 +00001639
1640 if (share != HF_MEMORY_GIVE ||
1641 !mm_vm_get_mode(&to->ptable, begin, end, &orig_to_mode) ||
1642 orig_to_mode & MM_MODE_UNOWNED) {
1643 goto fail;
1644 }
1645 } else if (orig_from_mode & MM_MODE_SHARED) {
1646 goto fail;
1647 }
1648
1649 pa_begin = pa_from_ipa(begin);
1650 pa_end = pa_from_ipa(end);
1651
1652 /*
1653 * First update the mapping for the sender so there is not overlap with
1654 * the recipient.
1655 */
1656 if (!mm_vm_identity_map(&from->ptable, pa_begin, pa_end, from_mode,
1657 NULL, &local_page_pool)) {
1658 goto fail;
1659 }
1660
1661 /* Clear the memory so no VM or device can see the previous contents. */
1662 if (!api_clear_memory(pa_begin, pa_end, &local_page_pool)) {
1663 goto fail_return_to_sender;
1664 }
1665
1666 /* Complete the transfer by mapping the memory into the recipient. */
1667 if (!mm_vm_identity_map(&to->ptable, pa_begin, pa_end, to_mode, NULL,
1668 &local_page_pool)) {
1669 /* TODO: partial defrag of failed range. */
1670 /* Recover any memory consumed in failed mapping. */
1671 mm_vm_defrag(&from->ptable, &local_page_pool);
1672 goto fail_return_to_sender;
1673 }
1674
1675 ret = 0;
1676 goto out;
1677
1678fail_return_to_sender:
Andrew Scull7e8de322019-07-02 13:00:56 +01001679 CHECK(mm_vm_identity_map(&from->ptable, pa_begin, pa_end,
1680 orig_from_mode, NULL, &local_page_pool));
Andrew Scull6386f252018-12-06 13:29:10 +00001681
1682fail:
1683 ret = -1;
1684
1685out:
1686 sl_unlock(&from->lock);
1687 sl_unlock(&to->lock);
1688
1689 mpool_fini(&local_page_pool);
1690
1691 return ret;
1692}
Jose Marinhofc0b2b62019-06-06 11:18:45 +01001693
1694/** Returns the version of the implemented SPCI specification. */
Andrew Walbran7f920af2019-09-03 17:09:30 +01001695struct spci_value api_spci_version(void)
Jose Marinhofc0b2b62019-06-06 11:18:45 +01001696{
1697 /*
1698 * Ensure that both major and minor revision representation occupies at
1699 * most 15 bits.
1700 */
1701 static_assert(0x8000 > SPCI_VERSION_MAJOR,
1702 "Major revision representation take more than 15 bits.");
1703 static_assert(0x10000 > SPCI_VERSION_MINOR,
1704 "Minor revision representation take more than 16 bits.");
1705
Andrew Walbran7f920af2019-09-03 17:09:30 +01001706 struct spci_value ret = {
1707 .func = SPCI_SUCCESS_32,
Andrew Walbran455c53a2019-10-10 13:56:19 +01001708 .arg2 = (SPCI_VERSION_MAJOR << SPCI_VERSION_MAJOR_OFFSET) |
Andrew Walbran7f920af2019-09-03 17:09:30 +01001709 SPCI_VERSION_MINOR};
1710 return ret;
Jose Marinhofc0b2b62019-06-06 11:18:45 +01001711}
Andrew Walbranc1ad4ce2019-05-09 11:41:39 +01001712
1713int64_t api_debug_log(char c, struct vcpu *current)
1714{
Andrew Sculld54e1be2019-08-20 11:09:42 +01001715 bool flush;
Andrew Walbranc1ad4ce2019-05-09 11:41:39 +01001716 struct vm *vm = current->vm;
1717 struct vm_locked vm_locked = vm_lock(vm);
1718
Andrew Sculld54e1be2019-08-20 11:09:42 +01001719 if (c == '\n' || c == '\0') {
1720 flush = true;
1721 } else {
1722 vm->log_buffer[vm->log_buffer_length++] = c;
1723 flush = (vm->log_buffer_length == sizeof(vm->log_buffer));
1724 }
1725
1726 if (flush) {
Andrew Walbran7f904bf2019-07-12 16:38:38 +01001727 dlog_flush_vm_buffer(vm->id, vm->log_buffer,
1728 vm->log_buffer_length);
1729 vm->log_buffer_length = 0;
Andrew Walbranc1ad4ce2019-05-09 11:41:39 +01001730 }
1731
1732 vm_unlock(&vm_locked);
1733
1734 return 0;
1735}
Jose Marinhoc0f4ff22019-10-09 10:37:42 +01001736
1737/**
1738 * Discovery function returning information about the implementation of optional
1739 * SPCI interfaces.
1740 */
1741struct spci_value api_spci_features(uint32_t function_id)
1742{
1743 switch (function_id) {
1744 case SPCI_ERROR_32:
1745 case SPCI_SUCCESS_32:
1746 case SPCI_ID_GET_32:
1747 case SPCI_YIELD_32:
1748 case SPCI_VERSION_32:
1749 case SPCI_FEATURES_32:
1750 case SPCI_MSG_SEND_32:
1751 case SPCI_MSG_POLL_32:
1752 case SPCI_MSG_WAIT_32:
1753 return (struct spci_value){.func = SPCI_SUCCESS_32};
1754 default:
1755 return spci_error(SPCI_NOT_SUPPORTED);
1756 }
1757}