blob: caf024c498e065e0cfd729459d6020c54ebf60f2 [file] [log] [blame]
Andrew Scull18834872018-10-12 11:48:09 +01001/*
Andrew Walbran692b3252019-03-07 15:51:31 +00002 * Copyright 2018 The Hafnium Authors.
Andrew Scull18834872018-10-12 11:48:09 +01003 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * https://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Andrew Scull18c78fc2018-08-20 12:57:41 +010017#include "hf/api.h"
Wedson Almeida Filho3fcbcff2018-07-10 23:53:39 +010018
Andrew Walbran318f5732018-11-20 16:23:42 +000019#include "hf/arch/cpu.h"
Andrew Walbran508e63c2018-12-20 17:02:37 +000020#include "hf/arch/timer.h"
Andrew Walbran318f5732018-11-20 16:23:42 +000021
Andrew Scull877ae4b2019-07-02 12:52:33 +010022#include "hf/check.h"
Andrew Walbran318f5732018-11-20 16:23:42 +000023#include "hf/dlog.h"
Andrew Scull6386f252018-12-06 13:29:10 +000024#include "hf/mm.h"
Andrew Walbranc1ad4ce2019-05-09 11:41:39 +010025#include "hf/plat/console.h"
Jose Marinho40d55f32019-07-01 15:41:54 +010026#include "hf/spci_internal.h"
Andrew Scull6386f252018-12-06 13:29:10 +000027#include "hf/spinlock.h"
Andrew Scull877ae4b2019-07-02 12:52:33 +010028#include "hf/static_assert.h"
Andrew Scull8d9e1212019-04-05 13:52:55 +010029#include "hf/std.h"
Andrew Scull18c78fc2018-08-20 12:57:41 +010030#include "hf/vm.h"
31
Andrew Scullf35a5c92018-08-07 18:09:46 +010032#include "vmapi/hf/call.h"
Jose Marinhoa1dfeda2019-02-27 16:46:03 +000033#include "vmapi/hf/spci.h"
Wedson Almeida Filho3fcbcff2018-07-10 23:53:39 +010034
Wedson Almeida Filhoba641ef2018-12-03 04:19:44 +000035/*
36 * To eliminate the risk of deadlocks, we define a partial order for the
37 * acquisition of locks held concurrently by the same physical CPU. Our current
38 * ordering requirements are as follows:
39 *
Andrew Walbranc1ad4ce2019-05-09 11:41:39 +010040 * vm::lock -> vcpu::lock -> mm_stage1_lock -> dlog sl
Andrew Scull6386f252018-12-06 13:29:10 +000041 *
Andrew Scull4caadaf2019-07-03 13:13:47 +010042 * Locks of the same kind require the lock of lowest address to be locked first,
43 * see `sl_lock_both()`.
Wedson Almeida Filhoba641ef2018-12-03 04:19:44 +000044 */
45
Andrew Scullaa039b32018-10-04 15:02:26 +010046static_assert(HF_MAILBOX_SIZE == PAGE_SIZE,
Andrew Scull13652af2018-09-17 14:49:08 +010047 "Currently, a page is mapped for the send and receive buffers so "
48 "the maximum request is the size of a page.");
49
Wedson Almeida Filho9ed8da52018-12-17 16:09:11 +000050static struct mpool api_page_pool;
Wedson Almeida Filho22d5eaa2018-12-16 00:38:49 +000051
52/**
Wedson Almeida Filho81568c42019-01-04 13:33:02 +000053 * Initialises the API page pool by taking ownership of the contents of the
54 * given page pool.
Wedson Almeida Filho22d5eaa2018-12-16 00:38:49 +000055 */
56void api_init(struct mpool *ppool)
57{
Wedson Almeida Filho9ed8da52018-12-17 16:09:11 +000058 mpool_init_from(&api_page_pool, ppool);
Wedson Almeida Filho22d5eaa2018-12-16 00:38:49 +000059}
60
Wedson Almeida Filho3fcbcff2018-07-10 23:53:39 +010061/**
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +010062 * Switches the physical CPU back to the corresponding vcpu of the primary VM.
Andrew Scullaa039b32018-10-04 15:02:26 +010063 *
64 * This triggers the scheduling logic to run. Run in the context of secondary VM
Andrew Walbranf0c314d2019-10-02 14:24:26 +010065 * to cause SPCI_RUN to return and the primary VM to regain control of the CPU.
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +010066 */
Wedson Almeida Filho00df6c72018-10-18 11:19:24 +010067static struct vcpu *api_switch_to_primary(struct vcpu *current,
Andrew Walbran7a1ea0b2019-10-02 18:18:44 +010068 struct spci_value primary_ret,
Wedson Almeida Filhoba641ef2018-12-03 04:19:44 +000069 enum vcpu_state secondary_state)
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +010070{
Andrew Walbran42347a92019-05-09 13:59:03 +010071 struct vm *primary = vm_find(HF_PRIMARY_VM_ID);
Andrew Walbrane1310df2019-04-29 17:28:28 +010072 struct vcpu *next = vm_get_vcpu(primary, cpu_index(current->cpu));
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +010073
Andrew Walbran508e63c2018-12-20 17:02:37 +000074 /*
75 * If the secondary is blocked but has a timer running, sleep until the
76 * timer fires rather than indefinitely.
77 */
Andrew Walbran7a1ea0b2019-10-02 18:18:44 +010078 switch (primary_ret.func) {
79 case HF_SPCI_RUN_WAIT_FOR_INTERRUPT:
80 case SPCI_MSG_WAIT_32: {
81 if (arch_timer_enabled_current()) {
82 uint64_t remaining_ns =
83 arch_timer_remaining_ns_current();
84
85 if (remaining_ns == 0) {
86 /*
87 * Timer is pending, so the current vCPU should
88 * be run again right away.
89 */
90 primary_ret.func = SPCI_INTERRUPT_32;
91 /*
92 * primary_ret.arg1 should already be set to the
93 * current VM ID and vCPU ID.
94 */
95 primary_ret.arg2 = 0;
96 } else {
97 primary_ret.arg2 = remaining_ns;
98 }
99 } else {
100 primary_ret.arg2 = SPCI_SLEEP_INDEFINITE;
101 }
Andrew Scullb06d1752019-02-04 10:15:48 +0000102 break;
Andrew Walbran7a1ea0b2019-10-02 18:18:44 +0100103 }
Andrew Scullb06d1752019-02-04 10:15:48 +0000104
105 default:
106 /* Do nothing. */
107 break;
Andrew Walbran508e63c2018-12-20 17:02:37 +0000108 }
109
Wedson Almeida Filho00df6c72018-10-18 11:19:24 +0100110 /* Set the return value for the primary VM's call to HF_VCPU_RUN. */
Andrew Walbran7a1ea0b2019-10-02 18:18:44 +0100111 arch_regs_set_retval(&next->regs, primary_ret);
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +0100112
Wedson Almeida Filhoba641ef2018-12-03 04:19:44 +0000113 /* Mark the current vcpu as waiting. */
114 sl_lock(&current->lock);
115 current->state = secondary_state;
116 sl_unlock(&current->lock);
117
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +0100118 return next;
119}
120
121/**
Andrew Scull33fecd32019-01-08 14:48:27 +0000122 * Returns to the primary vm and signals that the vcpu still has work to do so.
123 */
124struct vcpu *api_preempt(struct vcpu *current)
125{
Andrew Walbran7a1ea0b2019-10-02 18:18:44 +0100126 struct spci_value ret = {
127 .func = SPCI_INTERRUPT_32,
Andrew Walbran4db5f3a2019-11-04 11:42:42 +0000128 .arg1 = spci_vm_vcpu(current->vm->id, vcpu_index(current)),
Andrew Scull33fecd32019-01-08 14:48:27 +0000129 };
130
Andrew Sculld6ee1102019-04-05 22:12:42 +0100131 return api_switch_to_primary(current, ret, VCPU_STATE_READY);
Andrew Scull33fecd32019-01-08 14:48:27 +0000132}
133
134/**
Andrew Scullaa039b32018-10-04 15:02:26 +0100135 * Puts the current vcpu in wait for interrupt mode, and returns to the primary
136 * vm.
137 */
Wedson Almeida Filho00df6c72018-10-18 11:19:24 +0100138struct vcpu *api_wait_for_interrupt(struct vcpu *current)
Andrew Scullaa039b32018-10-04 15:02:26 +0100139{
Andrew Walbran7a1ea0b2019-10-02 18:18:44 +0100140 struct spci_value ret = {
141 .func = HF_SPCI_RUN_WAIT_FOR_INTERRUPT,
Andrew Walbran4db5f3a2019-11-04 11:42:42 +0000142 .arg1 = spci_vm_vcpu(current->vm->id, vcpu_index(current)),
Andrew Scull6d2db332018-10-10 15:28:17 +0100143 };
Wedson Almeida Filho81568c42019-01-04 13:33:02 +0000144
Wedson Almeida Filhoba641ef2018-12-03 04:19:44 +0000145 return api_switch_to_primary(current, ret,
Andrew Sculld6ee1102019-04-05 22:12:42 +0100146 VCPU_STATE_BLOCKED_INTERRUPT);
Andrew Scullaa039b32018-10-04 15:02:26 +0100147}
148
149/**
Andrew Walbran33645652019-04-15 12:29:31 +0100150 * Puts the current vCPU in off mode, and returns to the primary VM.
151 */
152struct vcpu *api_vcpu_off(struct vcpu *current)
153{
Andrew Walbran7a1ea0b2019-10-02 18:18:44 +0100154 struct spci_value ret = {
155 .func = HF_SPCI_RUN_WAIT_FOR_INTERRUPT,
Andrew Walbran4db5f3a2019-11-04 11:42:42 +0000156 .arg1 = spci_vm_vcpu(current->vm->id, vcpu_index(current)),
Andrew Walbran33645652019-04-15 12:29:31 +0100157 };
158
159 /*
160 * Disable the timer, so the scheduler doesn't get told to call back
161 * based on it.
162 */
163 arch_timer_disable_current();
164
165 return api_switch_to_primary(current, ret, VCPU_STATE_OFF);
166}
167
168/**
Andrew Scull66d62bf2019-02-01 13:54:10 +0000169 * Returns to the primary vm to allow this cpu to be used for other tasks as the
170 * vcpu does not have work to do at this moment. The current vcpu is marked as
Andrew Walbran16075b62019-09-03 17:11:07 +0100171 * ready to be scheduled again.
Andrew Scull66d62bf2019-02-01 13:54:10 +0000172 */
Andrew Walbran16075b62019-09-03 17:11:07 +0100173void api_yield(struct vcpu *current, struct vcpu **next)
Andrew Scull66d62bf2019-02-01 13:54:10 +0000174{
Andrew Walbran7a1ea0b2019-10-02 18:18:44 +0100175 struct spci_value primary_ret = {
176 .func = SPCI_YIELD_32,
Andrew Walbran4db5f3a2019-11-04 11:42:42 +0000177 .arg1 = spci_vm_vcpu(current->vm->id, vcpu_index(current)),
Andrew Scull66d62bf2019-02-01 13:54:10 +0000178 };
179
180 if (current->vm->id == HF_PRIMARY_VM_ID) {
Andrew Scullb06d1752019-02-04 10:15:48 +0000181 /* Noop on the primary as it makes the scheduling decisions. */
Andrew Walbran16075b62019-09-03 17:11:07 +0100182 return;
Andrew Scull66d62bf2019-02-01 13:54:10 +0000183 }
184
Andrew Walbran16075b62019-09-03 17:11:07 +0100185 *next = api_switch_to_primary(current, primary_ret, VCPU_STATE_READY);
Andrew Scull66d62bf2019-02-01 13:54:10 +0000186}
187
188/**
Andrew Walbran33645652019-04-15 12:29:31 +0100189 * Switches to the primary so that it can switch to the target, or kick it if it
190 * is already running on a different physical CPU.
191 */
192struct vcpu *api_wake_up(struct vcpu *current, struct vcpu *target_vcpu)
193{
Andrew Walbran7a1ea0b2019-10-02 18:18:44 +0100194 struct spci_value ret = {
195 .func = HF_SPCI_RUN_WAKE_UP,
Andrew Walbran4db5f3a2019-11-04 11:42:42 +0000196 .arg1 = spci_vm_vcpu(target_vcpu->vm->id,
197 vcpu_index(target_vcpu)),
Andrew Walbran33645652019-04-15 12:29:31 +0100198 };
199 return api_switch_to_primary(current, ret, VCPU_STATE_READY);
200}
201
202/**
Andrew Scull38772ab2019-01-24 15:16:50 +0000203 * Aborts the vCPU and triggers its VM to abort fully.
Andrew Scull9726c252019-01-23 13:44:19 +0000204 */
205struct vcpu *api_abort(struct vcpu *current)
206{
Andrew Walbran7a1ea0b2019-10-02 18:18:44 +0100207 struct spci_value ret = spci_error(SPCI_ABORTED);
Andrew Scull9726c252019-01-23 13:44:19 +0000208
209 dlog("Aborting VM %u vCPU %u\n", current->vm->id, vcpu_index(current));
210
211 if (current->vm->id == HF_PRIMARY_VM_ID) {
212 /* TODO: what to do when the primary aborts? */
213 for (;;) {
214 /* Do nothing. */
215 }
216 }
217
218 atomic_store_explicit(&current->vm->aborting, true,
219 memory_order_relaxed);
220
221 /* TODO: free resources once all vCPUs abort. */
222
Andrew Sculld6ee1102019-04-05 22:12:42 +0100223 return api_switch_to_primary(current, ret, VCPU_STATE_ABORTED);
Andrew Scull9726c252019-01-23 13:44:19 +0000224}
225
226/**
Andrew Scull55c4d8b2018-12-18 18:50:18 +0000227 * Returns the ID of the VM.
228 */
Andrew Walbrand230f662019-10-07 18:03:36 +0100229struct spci_value api_spci_id_get(const struct vcpu *current)
Andrew Scull55c4d8b2018-12-18 18:50:18 +0000230{
Andrew Walbrand230f662019-10-07 18:03:36 +0100231 return (struct spci_value){.func = SPCI_SUCCESS_32,
232 .arg2 = current->vm->id};
Andrew Scull55c4d8b2018-12-18 18:50:18 +0000233}
234
235/**
Wedson Almeida Filho3fcbcff2018-07-10 23:53:39 +0100236 * Returns the number of VMs configured to run.
237 */
Andrew Walbran52d99672019-06-25 15:51:11 +0100238spci_vm_count_t api_vm_get_count(void)
Wedson Almeida Filho3fcbcff2018-07-10 23:53:39 +0100239{
Andrew Scull19503262018-09-20 14:48:39 +0100240 return vm_get_count();
Wedson Almeida Filho3fcbcff2018-07-10 23:53:39 +0100241}
242
243/**
Andrew Walbranc6d23c42019-06-26 13:30:42 +0100244 * Returns the number of vCPUs configured in the given VM, or 0 if there is no
245 * such VM or the caller is not the primary VM.
Wedson Almeida Filho3fcbcff2018-07-10 23:53:39 +0100246 */
Andrew Walbranc6d23c42019-06-26 13:30:42 +0100247spci_vcpu_count_t api_vcpu_get_count(spci_vm_id_t vm_id,
248 const struct vcpu *current)
Wedson Almeida Filho3fcbcff2018-07-10 23:53:39 +0100249{
Andrew Scull19503262018-09-20 14:48:39 +0100250 struct vm *vm;
251
252 /* Only the primary VM needs to know about vcpus for scheduling. */
Wedson Almeida Filho00df6c72018-10-18 11:19:24 +0100253 if (current->vm->id != HF_PRIMARY_VM_ID) {
Andrew Walbranc6d23c42019-06-26 13:30:42 +0100254 return 0;
Andrew Scull7364a8e2018-07-19 15:39:29 +0100255 }
Wedson Almeida Filho3fcbcff2018-07-10 23:53:39 +0100256
Andrew Walbran42347a92019-05-09 13:59:03 +0100257 vm = vm_find(vm_id);
Andrew Scull19503262018-09-20 14:48:39 +0100258 if (vm == NULL) {
Andrew Walbranc6d23c42019-06-26 13:30:42 +0100259 return 0;
Andrew Scull19503262018-09-20 14:48:39 +0100260 }
261
262 return vm->vcpu_count;
Wedson Almeida Filho3fcbcff2018-07-10 23:53:39 +0100263}
264
265/**
Wedson Almeida Filho03306112018-11-26 00:08:03 +0000266 * This function is called by the architecture-specific context switching
267 * function to indicate that register state for the given vcpu has been saved
268 * and can therefore be used by other pcpus.
269 */
270void api_regs_state_saved(struct vcpu *vcpu)
271{
272 sl_lock(&vcpu->lock);
273 vcpu->regs_available = true;
274 sl_unlock(&vcpu->lock);
275}
276
277/**
Wedson Almeida Filhoea62e2e2019-01-09 19:14:59 +0000278 * Retrieves the next waiter and removes it from the wait list if the VM's
279 * mailbox is in a writable state.
280 */
281static struct wait_entry *api_fetch_waiter(struct vm_locked locked_vm)
282{
283 struct wait_entry *entry;
284 struct vm *vm = locked_vm.vm;
285
Andrew Sculld6ee1102019-04-05 22:12:42 +0100286 if (vm->mailbox.state != MAILBOX_STATE_EMPTY ||
Wedson Almeida Filhoea62e2e2019-01-09 19:14:59 +0000287 vm->mailbox.recv == NULL || list_empty(&vm->mailbox.waiter_list)) {
288 /* The mailbox is not writable or there are no waiters. */
289 return NULL;
290 }
291
292 /* Remove waiter from the wait list. */
293 entry = CONTAINER_OF(vm->mailbox.waiter_list.next, struct wait_entry,
294 wait_links);
295 list_remove(&entry->wait_links);
296 return entry;
297}
298
299/**
Andrew Walbran508e63c2018-12-20 17:02:37 +0000300 * Assuming that the arguments have already been checked by the caller, injects
301 * a virtual interrupt of the given ID into the given target vCPU. This doesn't
302 * cause the vCPU to actually be run immediately; it will be taken when the vCPU
303 * is next run, which is up to the scheduler.
304 *
305 * Returns:
306 * - 0 on success if no further action is needed.
307 * - 1 if it was called by the primary VM and the primary VM now needs to wake
308 * up or kick the target vCPU.
309 */
Andrew Walbranfc9d4382019-05-10 18:07:21 +0100310static int64_t internal_interrupt_inject(struct vcpu *target_vcpu,
Andrew Walbran508e63c2018-12-20 17:02:37 +0000311 uint32_t intid, struct vcpu *current,
312 struct vcpu **next)
313{
314 uint32_t intid_index = intid / INTERRUPT_REGISTER_BITS;
Andrew Walbrane52006c2019-10-22 18:01:28 +0100315 uint32_t intid_mask = 1U << (intid % INTERRUPT_REGISTER_BITS);
Andrew Walbran508e63c2018-12-20 17:02:37 +0000316 int64_t ret = 0;
317
318 sl_lock(&target_vcpu->lock);
Andrew Walbran508e63c2018-12-20 17:02:37 +0000319
320 /*
321 * We only need to change state and (maybe) trigger a virtual IRQ if it
322 * is enabled and was not previously pending. Otherwise we can skip
323 * everything except setting the pending bit.
324 *
325 * If you change this logic make sure to update the need_vm_lock logic
326 * above to match.
327 */
328 if (!(target_vcpu->interrupts.interrupt_enabled[intid_index] &
329 ~target_vcpu->interrupts.interrupt_pending[intid_index] &
330 intid_mask)) {
331 goto out;
332 }
333
334 /* Increment the count. */
335 target_vcpu->interrupts.enabled_and_pending_count++;
336
337 /*
338 * Only need to update state if there was not already an
339 * interrupt enabled and pending.
340 */
341 if (target_vcpu->interrupts.enabled_and_pending_count != 1) {
342 goto out;
343 }
344
Andrew Walbran508e63c2018-12-20 17:02:37 +0000345 if (current->vm->id == HF_PRIMARY_VM_ID) {
346 /*
347 * If the call came from the primary VM, let it know that it
348 * should run or kick the target vCPU.
349 */
350 ret = 1;
351 } else if (current != target_vcpu && next != NULL) {
Andrew Walbran33645652019-04-15 12:29:31 +0100352 *next = api_wake_up(current, target_vcpu);
Andrew Walbran508e63c2018-12-20 17:02:37 +0000353 }
354
355out:
356 /* Either way, make it pending. */
357 target_vcpu->interrupts.interrupt_pending[intid_index] |= intid_mask;
358
359 sl_unlock(&target_vcpu->lock);
Andrew Walbran508e63c2018-12-20 17:02:37 +0000360
361 return ret;
362}
363
364/**
Andrew Walbrand4d2fa12019-10-01 16:47:25 +0100365 * Constructs an SPCI_MSG_SEND value to return from a successful SPCI_MSG_POLL
366 * or SPCI_MSG_WAIT call.
367 */
368static struct spci_value spci_msg_recv_return(const struct vm *receiver)
369{
370 return (struct spci_value){
371 .func = SPCI_MSG_SEND_32,
Andrew Walbran70bc8622019-10-07 14:15:58 +0100372 .arg1 = (receiver->mailbox.recv_sender << 16) | receiver->id,
373 .arg3 = receiver->mailbox.recv_size,
374 .arg4 = receiver->mailbox.recv_attributes};
Andrew Walbrand4d2fa12019-10-01 16:47:25 +0100375}
376
377/**
Wedson Almeida Filho03306112018-11-26 00:08:03 +0000378 * Prepares the vcpu to run by updating its state and fetching whether a return
379 * value needs to be forced onto the vCPU.
380 */
Andrew Scull38772ab2019-01-24 15:16:50 +0000381static bool api_vcpu_prepare_run(const struct vcpu *current, struct vcpu *vcpu,
Andrew Walbran7a1ea0b2019-10-02 18:18:44 +0100382 struct spci_value *run_ret)
Wedson Almeida Filho03306112018-11-26 00:08:03 +0000383{
Andrew Scullb06d1752019-02-04 10:15:48 +0000384 bool need_vm_lock;
Wedson Almeida Filho03306112018-11-26 00:08:03 +0000385 bool ret;
386
Andrew Scullb06d1752019-02-04 10:15:48 +0000387 /*
Andrew Scull4caadaf2019-07-03 13:13:47 +0100388 * Wait until the registers become available. All locks must be released
389 * between iterations of this loop to avoid potential deadlocks if, on
390 * any path, a lock needs to be taken after taking the decision to
391 * switch context but before the registers have been saved.
Andrew Scullb06d1752019-02-04 10:15:48 +0000392 *
Andrew Scull4caadaf2019-07-03 13:13:47 +0100393 * The VM lock is not needed in the common case so it must only be taken
394 * when it is going to be needed. This ensures there are no inter-vCPU
395 * dependencies in the common run case meaning the sensitive context
396 * switch performance is consistent.
Andrew Scullb06d1752019-02-04 10:15:48 +0000397 */
398 for (;;) {
399 sl_lock(&vcpu->lock);
400
401 /* The VM needs to be locked to deliver mailbox messages. */
Andrew Sculld6ee1102019-04-05 22:12:42 +0100402 need_vm_lock = vcpu->state == VCPU_STATE_BLOCKED_MAILBOX;
Andrew Scullb06d1752019-02-04 10:15:48 +0000403 if (need_vm_lock) {
404 sl_unlock(&vcpu->lock);
405 sl_lock(&vcpu->vm->lock);
406 sl_lock(&vcpu->lock);
407 }
408
409 if (vcpu->regs_available) {
410 break;
411 }
412
Andrew Sculld6ee1102019-04-05 22:12:42 +0100413 if (vcpu->state == VCPU_STATE_RUNNING) {
Andrew Scullb06d1752019-02-04 10:15:48 +0000414 /*
415 * vCPU is running on another pCPU.
416 *
Andrew Walbran7a1ea0b2019-10-02 18:18:44 +0100417 * It's okay not to return the sleep duration here
418 * because the other physical CPU that is currently
419 * running this vCPU will return the sleep duration if
420 * needed.
Andrew Scullb06d1752019-02-04 10:15:48 +0000421 */
Andrew Walbran7a1ea0b2019-10-02 18:18:44 +0100422 *run_ret = spci_error(SPCI_BUSY);
Andrew Scullb06d1752019-02-04 10:15:48 +0000423 ret = false;
424 goto out;
425 }
426
427 sl_unlock(&vcpu->lock);
428 if (need_vm_lock) {
429 sl_unlock(&vcpu->vm->lock);
430 }
431 }
Andrew Scull9726c252019-01-23 13:44:19 +0000432
433 if (atomic_load_explicit(&vcpu->vm->aborting, memory_order_relaxed)) {
Andrew Sculld6ee1102019-04-05 22:12:42 +0100434 if (vcpu->state != VCPU_STATE_ABORTED) {
Andrew Scull82331282019-01-25 10:29:34 +0000435 dlog("Aborting VM %u vCPU %u\n", vcpu->vm->id,
436 vcpu_index(vcpu));
Andrew Sculld6ee1102019-04-05 22:12:42 +0100437 vcpu->state = VCPU_STATE_ABORTED;
Andrew Scull9726c252019-01-23 13:44:19 +0000438 }
439 ret = false;
440 goto out;
441 }
442
Andrew Walbran508e63c2018-12-20 17:02:37 +0000443 switch (vcpu->state) {
Andrew Sculld6ee1102019-04-05 22:12:42 +0100444 case VCPU_STATE_RUNNING:
445 case VCPU_STATE_OFF:
446 case VCPU_STATE_ABORTED:
Wedson Almeida Filho03306112018-11-26 00:08:03 +0000447 ret = false;
448 goto out;
Andrew Scullb06d1752019-02-04 10:15:48 +0000449
Andrew Sculld6ee1102019-04-05 22:12:42 +0100450 case VCPU_STATE_BLOCKED_MAILBOX:
Andrew Scullb06d1752019-02-04 10:15:48 +0000451 /*
452 * A pending message allows the vCPU to run so the message can
453 * be delivered directly.
454 */
Andrew Sculld6ee1102019-04-05 22:12:42 +0100455 if (vcpu->vm->mailbox.state == MAILBOX_STATE_RECEIVED) {
Andrew Walbrand4d2fa12019-10-01 16:47:25 +0100456 arch_regs_set_retval(&vcpu->regs,
457 spci_msg_recv_return(vcpu->vm));
Andrew Sculld6ee1102019-04-05 22:12:42 +0100458 vcpu->vm->mailbox.state = MAILBOX_STATE_READ;
Andrew Scullb06d1752019-02-04 10:15:48 +0000459 break;
460 }
461 /* Fall through. */
Andrew Sculld6ee1102019-04-05 22:12:42 +0100462 case VCPU_STATE_BLOCKED_INTERRUPT:
Andrew Scullb06d1752019-02-04 10:15:48 +0000463 /* Allow virtual interrupts to be delivered. */
464 if (vcpu->interrupts.enabled_and_pending_count > 0) {
465 break;
466 }
467
Andrew Walbran508e63c2018-12-20 17:02:37 +0000468 if (arch_timer_enabled(&vcpu->regs)) {
Andrew Walbran2fc856a2019-11-04 15:17:24 +0000469 uint64_t timer_remaining_ns =
470 arch_timer_remaining_ns(&vcpu->regs);
471
472 /*
473 * The timer expired so allow the interrupt to be
474 * delivered.
475 */
476 if (timer_remaining_ns == 0) {
477 break;
478 }
479
480 /*
481 * The vCPU is not ready to run, return the appropriate
482 * code to the primary which called vcpu_run.
483 */
Andrew Walbran7a1ea0b2019-10-02 18:18:44 +0100484 run_ret->func =
Andrew Sculld6ee1102019-04-05 22:12:42 +0100485 vcpu->state == VCPU_STATE_BLOCKED_MAILBOX
Andrew Walbran7a1ea0b2019-10-02 18:18:44 +0100486 ? SPCI_MSG_WAIT_32
487 : HF_SPCI_RUN_WAIT_FOR_INTERRUPT;
Andrew Walbran4db5f3a2019-11-04 11:42:42 +0000488 run_ret->arg1 =
489 spci_vm_vcpu(vcpu->vm->id, vcpu_index(vcpu));
Andrew Walbran2fc856a2019-11-04 15:17:24 +0000490 run_ret->arg2 = timer_remaining_ns;
Andrew Walbran508e63c2018-12-20 17:02:37 +0000491 }
492
493 ret = false;
494 goto out;
Andrew Scullb06d1752019-02-04 10:15:48 +0000495
Andrew Sculld6ee1102019-04-05 22:12:42 +0100496 case VCPU_STATE_READY:
Andrew Walbran508e63c2018-12-20 17:02:37 +0000497 break;
Wedson Almeida Filho03306112018-11-26 00:08:03 +0000498 }
499
Andrew Scullb06d1752019-02-04 10:15:48 +0000500 /* It has been decided that the vCPU should be run. */
Wedson Almeida Filho03306112018-11-26 00:08:03 +0000501 vcpu->cpu = current->cpu;
Andrew Sculld6ee1102019-04-05 22:12:42 +0100502 vcpu->state = VCPU_STATE_RUNNING;
Wedson Almeida Filho03306112018-11-26 00:08:03 +0000503
Wedson Almeida Filho03306112018-11-26 00:08:03 +0000504 /*
Wedson Almeida Filho03306112018-11-26 00:08:03 +0000505 * Mark the registers as unavailable now that we're about to reflect
506 * them onto the real registers. This will also prevent another physical
507 * CPU from trying to read these registers.
508 */
509 vcpu->regs_available = false;
510
511 ret = true;
512
513out:
514 sl_unlock(&vcpu->lock);
Andrew Scullb06d1752019-02-04 10:15:48 +0000515 if (need_vm_lock) {
516 sl_unlock(&vcpu->vm->lock);
517 }
518
Wedson Almeida Filho03306112018-11-26 00:08:03 +0000519 return ret;
520}
521
Andrew Walbran7a1ea0b2019-10-02 18:18:44 +0100522struct spci_value api_spci_run(spci_vm_id_t vm_id, spci_vcpu_index_t vcpu_idx,
523 const struct vcpu *current, struct vcpu **next)
Wedson Almeida Filho3fcbcff2018-07-10 23:53:39 +0100524{
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +0100525 struct vm *vm;
Wedson Almeida Filho3fcbcff2018-07-10 23:53:39 +0100526 struct vcpu *vcpu;
Andrew Walbran7a1ea0b2019-10-02 18:18:44 +0100527 struct spci_value ret = spci_error(SPCI_INVALID_PARAMETERS);
Wedson Almeida Filho3fcbcff2018-07-10 23:53:39 +0100528
529 /* Only the primary VM can switch vcpus. */
Wedson Almeida Filho00df6c72018-10-18 11:19:24 +0100530 if (current->vm->id != HF_PRIMARY_VM_ID) {
Andrew Walbran7a1ea0b2019-10-02 18:18:44 +0100531 ret.arg2 = SPCI_DENIED;
Andrew Scull6d2db332018-10-10 15:28:17 +0100532 goto out;
Andrew Scull7364a8e2018-07-19 15:39:29 +0100533 }
Wedson Almeida Filho3fcbcff2018-07-10 23:53:39 +0100534
Andrew Scull19503262018-09-20 14:48:39 +0100535 /* Only secondary VM vcpus can be run. */
536 if (vm_id == HF_PRIMARY_VM_ID) {
Andrew Scull6d2db332018-10-10 15:28:17 +0100537 goto out;
Andrew Scull7364a8e2018-07-19 15:39:29 +0100538 }
Wedson Almeida Filho3fcbcff2018-07-10 23:53:39 +0100539
Andrew Scull19503262018-09-20 14:48:39 +0100540 /* The requested VM must exist. */
Andrew Walbran42347a92019-05-09 13:59:03 +0100541 vm = vm_find(vm_id);
Andrew Scull19503262018-09-20 14:48:39 +0100542 if (vm == NULL) {
Andrew Scull6d2db332018-10-10 15:28:17 +0100543 goto out;
Andrew Scull19503262018-09-20 14:48:39 +0100544 }
545
546 /* The requested vcpu must exist. */
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +0100547 if (vcpu_idx >= vm->vcpu_count) {
Andrew Scull6d2db332018-10-10 15:28:17 +0100548 goto out;
Andrew Scull7364a8e2018-07-19 15:39:29 +0100549 }
Wedson Almeida Filho3fcbcff2018-07-10 23:53:39 +0100550
Wedson Almeida Filho03306112018-11-26 00:08:03 +0000551 /* Update state if allowed. */
Andrew Walbrane1310df2019-04-29 17:28:28 +0100552 vcpu = vm_get_vcpu(vm, vcpu_idx);
Andrew Scullb06d1752019-02-04 10:15:48 +0000553 if (!api_vcpu_prepare_run(current, vcpu, &ret)) {
Wedson Almeida Filho03306112018-11-26 00:08:03 +0000554 goto out;
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +0100555 }
Wedson Almeida Filho03306112018-11-26 00:08:03 +0000556
Andrew Walbran508e63c2018-12-20 17:02:37 +0000557 /*
558 * Inject timer interrupt if timer has expired. It's safe to access
559 * vcpu->regs here because api_vcpu_prepare_run already made sure that
560 * regs_available was true (and then set it to false) before returning
561 * true.
562 */
563 if (arch_timer_pending(&vcpu->regs)) {
564 /* Make virtual timer interrupt pending. */
Andrew Walbranfc9d4382019-05-10 18:07:21 +0100565 internal_interrupt_inject(vcpu, HF_VIRTUAL_TIMER_INTID, vcpu,
566 NULL);
Andrew Walbran508e63c2018-12-20 17:02:37 +0000567
568 /*
569 * Set the mask bit so the hardware interrupt doesn't fire
570 * again. Ideally we wouldn't do this because it affects what
571 * the secondary vCPU sees, but if we don't then we end up with
572 * a loop of the interrupt firing each time we try to return to
573 * the secondary vCPU.
574 */
575 arch_timer_mask(&vcpu->regs);
576 }
577
Andrew Scull33fecd32019-01-08 14:48:27 +0000578 /* Switch to the vcpu. */
Wedson Almeida Filho03306112018-11-26 00:08:03 +0000579 *next = vcpu;
Wedson Almeida Filho03306112018-11-26 00:08:03 +0000580
Andrew Scull33fecd32019-01-08 14:48:27 +0000581 /*
582 * Set a placeholder return code to the scheduler. This will be
583 * overwritten when the switch back to the primary occurs.
584 */
Andrew Walbran7a1ea0b2019-10-02 18:18:44 +0100585 ret.func = SPCI_INTERRUPT_32;
Andrew Walbran4db5f3a2019-11-04 11:42:42 +0000586 ret.arg1 = spci_vm_vcpu(vm_id, vcpu_idx);
Andrew Walbran7a1ea0b2019-10-02 18:18:44 +0100587 ret.arg2 = 0;
Andrew Scull33fecd32019-01-08 14:48:27 +0000588
Andrew Scull6d2db332018-10-10 15:28:17 +0100589out:
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +0100590 return ret;
Wedson Almeida Filho3fcbcff2018-07-10 23:53:39 +0100591}
592
593/**
Andrew Scull81e85092018-12-12 12:56:20 +0000594 * Check that the mode indicates memory that is valid, owned and exclusive.
595 */
Andrew Walbran1281ed42019-10-22 17:23:40 +0100596static bool api_mode_valid_owned_and_exclusive(uint32_t mode)
Andrew Scull81e85092018-12-12 12:56:20 +0000597{
Andrew Scullb5f49e02019-10-02 13:20:47 +0100598 return (mode & (MM_MODE_D | MM_MODE_INVALID | MM_MODE_UNOWNED |
599 MM_MODE_SHARED)) == 0;
Andrew Scull81e85092018-12-12 12:56:20 +0000600}
601
602/**
Andrew Walbran8a0f5ca2019-11-05 13:12:23 +0000603 * Determines the value to be returned by api_vm_configure and spci_rx_release
Wedson Almeida Filhoea62e2e2019-01-09 19:14:59 +0000604 * after they've succeeded. If a secondary VM is running and there are waiters,
605 * it also switches back to the primary VM for it to wake waiters up.
606 */
Andrew Walbranbfffb0f2019-11-05 14:02:34 +0000607static struct spci_value api_waiter_result(struct vm_locked locked_vm,
608 struct vcpu *current,
609 struct vcpu **next)
Wedson Almeida Filhoea62e2e2019-01-09 19:14:59 +0000610{
611 struct vm *vm = locked_vm.vm;
Wedson Almeida Filhoea62e2e2019-01-09 19:14:59 +0000612
613 if (list_empty(&vm->mailbox.waiter_list)) {
614 /* No waiters, nothing else to do. */
Andrew Walbranbfffb0f2019-11-05 14:02:34 +0000615 return (struct spci_value){.func = SPCI_SUCCESS_32};
Wedson Almeida Filhoea62e2e2019-01-09 19:14:59 +0000616 }
617
618 if (vm->id == HF_PRIMARY_VM_ID) {
619 /* The caller is the primary VM. Tell it to wake up waiters. */
Andrew Walbranbfffb0f2019-11-05 14:02:34 +0000620 return (struct spci_value){.func = SPCI_RX_RELEASE_32};
Wedson Almeida Filhoea62e2e2019-01-09 19:14:59 +0000621 }
622
623 /*
624 * Switch back to the primary VM, informing it that there are waiters
625 * that need to be notified.
626 */
Andrew Walbranbfffb0f2019-11-05 14:02:34 +0000627 *next = api_switch_to_primary(
628 current, (struct spci_value){.func = SPCI_RX_RELEASE_32},
629 VCPU_STATE_READY);
Wedson Almeida Filhoea62e2e2019-01-09 19:14:59 +0000630
Andrew Walbranbfffb0f2019-11-05 14:02:34 +0000631 return (struct spci_value){.func = SPCI_SUCCESS_32};
Wedson Almeida Filhoea62e2e2019-01-09 19:14:59 +0000632}
633
634/**
Andrew Sculle1322792019-07-01 17:46:10 +0100635 * Configures the hypervisor's stage-1 view of the send and receive pages. The
636 * stage-1 page tables must be locked so memory cannot be taken by another core
637 * which could result in this transaction being unable to roll back in the case
638 * of an error.
639 */
640static bool api_vm_configure_stage1(struct vm_locked vm_locked,
641 paddr_t pa_send_begin, paddr_t pa_send_end,
642 paddr_t pa_recv_begin, paddr_t pa_recv_end,
643 struct mpool *local_page_pool)
644{
645 bool ret;
646 struct mm_stage1_locked mm_stage1_locked = mm_lock_stage1();
647
648 /* Map the send page as read-only in the hypervisor address space. */
649 vm_locked.vm->mailbox.send =
650 mm_identity_map(mm_stage1_locked, pa_send_begin, pa_send_end,
651 MM_MODE_R, local_page_pool);
652 if (!vm_locked.vm->mailbox.send) {
653 /* TODO: partial defrag of failed range. */
654 /* Recover any memory consumed in failed mapping. */
655 mm_defrag(mm_stage1_locked, local_page_pool);
656 goto fail;
657 }
658
659 /*
660 * Map the receive page as writable in the hypervisor address space. On
661 * failure, unmap the send page before returning.
662 */
663 vm_locked.vm->mailbox.recv =
664 mm_identity_map(mm_stage1_locked, pa_recv_begin, pa_recv_end,
665 MM_MODE_W, local_page_pool);
666 if (!vm_locked.vm->mailbox.recv) {
667 /* TODO: partial defrag of failed range. */
668 /* Recover any memory consumed in failed mapping. */
669 mm_defrag(mm_stage1_locked, local_page_pool);
670 goto fail_undo_send;
671 }
672
673 ret = true;
674 goto out;
675
676 /*
677 * The following mappings will not require more memory than is available
678 * in the local pool.
679 */
680fail_undo_send:
681 vm_locked.vm->mailbox.send = NULL;
Andrew Scull7e8de322019-07-02 13:00:56 +0100682 CHECK(mm_unmap(mm_stage1_locked, pa_send_begin, pa_send_end,
683 local_page_pool));
Andrew Sculle1322792019-07-01 17:46:10 +0100684
685fail:
686 ret = false;
687
688out:
689 mm_unlock_stage1(&mm_stage1_locked);
690
691 return ret;
692}
693
694/**
695 * Configures the send and receive pages in the VM stage-2 and hypervisor
696 * stage-1 page tables. Locking of the page tables combined with a local memory
697 * pool ensures there will always be enough memory to recover from any errors
698 * that arise.
699 */
700static bool api_vm_configure_pages(struct vm_locked vm_locked,
701 paddr_t pa_send_begin, paddr_t pa_send_end,
Andrew Walbran1281ed42019-10-22 17:23:40 +0100702 uint32_t orig_send_mode,
703 paddr_t pa_recv_begin, paddr_t pa_recv_end,
704 uint32_t orig_recv_mode)
Andrew Sculle1322792019-07-01 17:46:10 +0100705{
706 bool ret;
707 struct mpool local_page_pool;
708
709 /*
710 * Create a local pool so any freed memory can't be used by another
711 * thread. This is to ensure the original mapping can be restored if any
712 * stage of the process fails.
713 */
714 mpool_init_with_fallback(&local_page_pool, &api_page_pool);
715
716 /* Take memory ownership away from the VM and mark as shared. */
717 if (!mm_vm_identity_map(
718 &vm_locked.vm->ptable, pa_send_begin, pa_send_end,
719 MM_MODE_UNOWNED | MM_MODE_SHARED | MM_MODE_R | MM_MODE_W,
720 NULL, &local_page_pool)) {
721 goto fail;
722 }
723
724 if (!mm_vm_identity_map(&vm_locked.vm->ptable, pa_recv_begin,
725 pa_recv_end,
726 MM_MODE_UNOWNED | MM_MODE_SHARED | MM_MODE_R,
727 NULL, &local_page_pool)) {
728 /* TODO: partial defrag of failed range. */
729 /* Recover any memory consumed in failed mapping. */
730 mm_vm_defrag(&vm_locked.vm->ptable, &local_page_pool);
731 goto fail_undo_send;
732 }
733
734 if (!api_vm_configure_stage1(vm_locked, pa_send_begin, pa_send_end,
735 pa_recv_begin, pa_recv_end,
736 &local_page_pool)) {
737 goto fail_undo_send_and_recv;
738 }
739
740 ret = true;
741 goto out;
742
743 /*
744 * The following mappings will not require more memory than is available
745 * in the local pool.
746 */
747fail_undo_send_and_recv:
Andrew Scull7e8de322019-07-02 13:00:56 +0100748 CHECK(mm_vm_identity_map(&vm_locked.vm->ptable, pa_recv_begin,
749 pa_recv_end, orig_recv_mode, NULL,
750 &local_page_pool));
Andrew Sculle1322792019-07-01 17:46:10 +0100751
752fail_undo_send:
Andrew Scull7e8de322019-07-02 13:00:56 +0100753 CHECK(mm_vm_identity_map(&vm_locked.vm->ptable, pa_send_begin,
754 pa_send_end, orig_send_mode, NULL,
755 &local_page_pool));
Andrew Sculle1322792019-07-01 17:46:10 +0100756
757fail:
758 ret = false;
759
760out:
761 mpool_fini(&local_page_pool);
762
763 return ret;
764}
765
766/**
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +0100767 * Configures the VM to send/receive data through the specified pages. The pages
768 * must not be shared.
Wedson Almeida Filhoea62e2e2019-01-09 19:14:59 +0000769 *
770 * Returns:
Andrew Walbranbfffb0f2019-11-05 14:02:34 +0000771 * - SPCI_ERROR SPCI_INVALID_PARAMETERS if the given addresses are not properly
772 * aligned or are the same.
773 * - SPCI_ERROR SPCI_NO_MEMORY if the hypervisor was unable to map the buffers
774 * due to insuffient page table memory.
775 * - SPCI_ERROR SPCI_DENIED if the pages are already mapped or are not owned by
776 * the caller.
777 * - SPCI_SUCCESS on success if no further action is needed.
778 * - SPCI_RX_RELEASE if it was called by the primary VM and the primary VM now
779 * needs to wake up or kick waiters.
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +0100780 */
Andrew Walbranbfffb0f2019-11-05 14:02:34 +0000781struct spci_value api_spci_rxtx_map(ipaddr_t send, ipaddr_t recv,
782 uint32_t page_count, struct vcpu *current,
783 struct vcpu **next)
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +0100784{
Wedson Almeida Filho00df6c72018-10-18 11:19:24 +0100785 struct vm *vm = current->vm;
Andrew Sculle1322792019-07-01 17:46:10 +0100786 struct vm_locked vm_locked;
Andrew Scull80871322018-08-06 12:04:09 +0100787 paddr_t pa_send_begin;
788 paddr_t pa_send_end;
789 paddr_t pa_recv_begin;
790 paddr_t pa_recv_end;
Andrew Walbran1281ed42019-10-22 17:23:40 +0100791 uint32_t orig_send_mode;
792 uint32_t orig_recv_mode;
Andrew Walbranbfffb0f2019-11-05 14:02:34 +0000793 struct spci_value ret;
794
795 /* Hafnium only supports a fixed size of RX/TX buffers. */
796 if (page_count != HF_MAILBOX_SIZE / SPCI_PAGE_SIZE) {
797 return spci_error(SPCI_INVALID_PARAMETERS);
798 }
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +0100799
800 /* Fail if addresses are not page-aligned. */
Alfredo Mazzinghieb1997c2019-02-07 18:00:01 +0000801 if (!is_aligned(ipa_addr(send), PAGE_SIZE) ||
802 !is_aligned(ipa_addr(recv), PAGE_SIZE)) {
Andrew Walbranbfffb0f2019-11-05 14:02:34 +0000803 return spci_error(SPCI_INVALID_PARAMETERS);
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +0100804 }
805
Andrew Scullc2eb6a32018-12-13 16:54:24 +0000806 /* Convert to physical addresses. */
807 pa_send_begin = pa_from_ipa(send);
Andrew Walbranbfffb0f2019-11-05 14:02:34 +0000808 pa_send_end = pa_add(pa_send_begin, HF_MAILBOX_SIZE);
Andrew Scullc2eb6a32018-12-13 16:54:24 +0000809
810 pa_recv_begin = pa_from_ipa(recv);
Andrew Walbranbfffb0f2019-11-05 14:02:34 +0000811 pa_recv_end = pa_add(pa_recv_begin, HF_MAILBOX_SIZE);
Andrew Scullc2eb6a32018-12-13 16:54:24 +0000812
Andrew Scullc9ccb3f2018-08-13 15:27:12 +0100813 /* Fail if the same page is used for the send and receive pages. */
814 if (pa_addr(pa_send_begin) == pa_addr(pa_recv_begin)) {
Andrew Walbranbfffb0f2019-11-05 14:02:34 +0000815 return spci_error(SPCI_INVALID_PARAMETERS);
Andrew Scull220e6212018-12-21 18:09:00 +0000816 }
817
Andrew Scull3c0a90a2019-07-01 11:55:53 +0100818 /*
819 * The hypervisor's memory map must be locked for the duration of this
820 * operation to ensure there will be sufficient memory to recover from
821 * any failures.
822 *
823 * TODO: the scope of the can be reduced but will require restructuring
824 * to keep a single unlock point.
825 */
Andrew Sculle1322792019-07-01 17:46:10 +0100826 vm_locked = vm_lock(vm);
Andrew Scull220e6212018-12-21 18:09:00 +0000827
828 /* We only allow these to be setup once. */
829 if (vm->mailbox.send || vm->mailbox.recv) {
Andrew Walbranbfffb0f2019-11-05 14:02:34 +0000830 ret = spci_error(SPCI_DENIED);
831 goto exit;
Andrew Scull220e6212018-12-21 18:09:00 +0000832 }
833
834 /*
835 * Ensure the pages are valid, owned and exclusive to the VM and that
836 * the VM has the required access to the memory.
837 */
838 if (!mm_vm_get_mode(&vm->ptable, send, ipa_add(send, PAGE_SIZE),
839 &orig_send_mode) ||
840 !api_mode_valid_owned_and_exclusive(orig_send_mode) ||
841 (orig_send_mode & MM_MODE_R) == 0 ||
842 (orig_send_mode & MM_MODE_W) == 0) {
Andrew Walbranbfffb0f2019-11-05 14:02:34 +0000843 ret = spci_error(SPCI_DENIED);
844 goto exit;
Andrew Scull220e6212018-12-21 18:09:00 +0000845 }
846
847 if (!mm_vm_get_mode(&vm->ptable, recv, ipa_add(recv, PAGE_SIZE),
848 &orig_recv_mode) ||
849 !api_mode_valid_owned_and_exclusive(orig_recv_mode) ||
850 (orig_recv_mode & MM_MODE_R) == 0) {
Andrew Walbranbfffb0f2019-11-05 14:02:34 +0000851 ret = spci_error(SPCI_DENIED);
852 goto exit;
Andrew Scull220e6212018-12-21 18:09:00 +0000853 }
854
Andrew Sculle1322792019-07-01 17:46:10 +0100855 if (!api_vm_configure_pages(vm_locked, pa_send_begin, pa_send_end,
856 orig_send_mode, pa_recv_begin, pa_recv_end,
857 orig_recv_mode)) {
Andrew Walbranbfffb0f2019-11-05 14:02:34 +0000858 ret = spci_error(SPCI_NO_MEMORY);
859 goto exit;
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +0100860 }
861
Wedson Almeida Filhoea62e2e2019-01-09 19:14:59 +0000862 /* Tell caller about waiters, if any. */
Andrew Sculle1322792019-07-01 17:46:10 +0100863 ret = api_waiter_result(vm_locked, current, next);
Andrew Scull220e6212018-12-21 18:09:00 +0000864
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +0100865exit:
Andrew Sculle1322792019-07-01 17:46:10 +0100866 vm_unlock(&vm_locked);
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +0100867
868 return ret;
869}
870
871/**
Andrew Walbrane0f575f2019-10-16 16:00:12 +0100872 * Checks whether the given `to` VM's mailbox is currently busy, and optionally
873 * registers the `from` VM to be notified when it becomes available.
874 */
875static bool msg_receiver_busy(struct vm_locked to, struct vm_locked from,
876 bool notify)
877{
878 if (to.vm->mailbox.state != MAILBOX_STATE_EMPTY ||
879 to.vm->mailbox.recv == NULL) {
880 /*
881 * Fail if the receiver isn't currently ready to receive data,
882 * setting up for notification if requested.
883 */
884 if (notify) {
885 struct wait_entry *entry =
886 &from.vm->wait_entries[to.vm->id];
887
888 /* Append waiter only if it's not there yet. */
889 if (list_empty(&entry->wait_links)) {
890 list_append(&to.vm->mailbox.waiter_list,
891 &entry->wait_links);
892 }
893 }
894
895 return true;
896 }
897
898 return false;
899}
900
901/**
902 * Notifies the `to` VM about the message currently in its mailbox, possibly
903 * with the help of the primary VM.
904 */
905static void deliver_msg(struct vm_locked to, struct vm_locked from,
906 uint32_t size, struct vcpu *current, struct vcpu **next)
907{
Andrew Walbran7a1ea0b2019-10-02 18:18:44 +0100908 struct spci_value primary_ret = {
909 .func = SPCI_MSG_SEND_32,
910 .arg1 = ((uint32_t)from.vm->id << 16) | to.vm->id,
Andrew Walbrane0f575f2019-10-16 16:00:12 +0100911 };
912
Andrew Walbrane0f575f2019-10-16 16:00:12 +0100913 /* Messages for the primary VM are delivered directly. */
914 if (to.vm->id == HF_PRIMARY_VM_ID) {
915 /*
916 * Only tell the primary VM the size if the message is for it,
917 * to avoid leaking data about messages for other VMs.
918 */
Andrew Walbran7a1ea0b2019-10-02 18:18:44 +0100919 primary_ret.arg3 = size;
Andrew Walbrane0f575f2019-10-16 16:00:12 +0100920
921 to.vm->mailbox.state = MAILBOX_STATE_READ;
922 *next = api_switch_to_primary(current, primary_ret,
923 VCPU_STATE_READY);
924 return;
925 }
926
927 to.vm->mailbox.state = MAILBOX_STATE_RECEIVED;
928
929 /* Return to the primary VM directly or with a switch. */
930 if (from.vm->id != HF_PRIMARY_VM_ID) {
931 *next = api_switch_to_primary(current, primary_ret,
932 VCPU_STATE_READY);
933 }
934}
935
936/**
Andrew Scullaa039b32018-10-04 15:02:26 +0100937 * Copies data from the sender's send buffer to the recipient's receive buffer
938 * and notifies the recipient.
Wedson Almeida Filho17c997f2019-01-09 18:50:09 +0000939 *
940 * If the recipient's receive buffer is busy, it can optionally register the
941 * caller to be notified when the recipient's receive buffer becomes available.
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +0100942 */
Andrew Walbran70bc8622019-10-07 14:15:58 +0100943struct spci_value api_spci_msg_send(spci_vm_id_t sender_vm_id,
944 spci_vm_id_t receiver_vm_id, uint32_t size,
945 uint32_t attributes, struct vcpu *current,
946 struct vcpu **next)
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +0100947{
Wedson Almeida Filho00df6c72018-10-18 11:19:24 +0100948 struct vm *from = current->vm;
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +0100949 struct vm *to;
Jose Marinho75509b42019-04-09 09:34:59 +0100950
Andrew Walbranf6595962019-10-15 16:47:56 +0100951 struct two_vm_locked vm_to_from_lock;
Jose Marinho75509b42019-04-09 09:34:59 +0100952
Andrew Walbran70bc8622019-10-07 14:15:58 +0100953 const void *from_msg;
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +0100954
Andrew Walbran70bc8622019-10-07 14:15:58 +0100955 struct spci_value ret;
Jose Marinhoa1dfeda2019-02-27 16:46:03 +0000956 bool notify = (attributes & SPCI_MSG_SEND_NOTIFY_MASK) ==
957 SPCI_MSG_SEND_NOTIFY;
Andrew Scull19503262018-09-20 14:48:39 +0100958
Andrew Walbran70bc8622019-10-07 14:15:58 +0100959 /* Ensure sender VM ID corresponds to the current VM. */
960 if (sender_vm_id != from->id) {
961 return spci_error(SPCI_INVALID_PARAMETERS);
962 }
963
964 /* Disallow reflexive requests as this suggests an error in the VM. */
965 if (receiver_vm_id == from->id) {
966 return spci_error(SPCI_INVALID_PARAMETERS);
967 }
968
969 /* Limit the size of transfer. */
970 if (size > SPCI_MSG_PAYLOAD_MAX) {
971 return spci_error(SPCI_INVALID_PARAMETERS);
972 }
973
Jose Marinhoa1dfeda2019-02-27 16:46:03 +0000974 /*
Andrew Walbran70bc8622019-10-07 14:15:58 +0100975 * Check that the sender has configured its send buffer. If the tx
976 * mailbox at from_msg is configured (i.e. from_msg != NULL) then it can
977 * be safely accessed after releasing the lock since the tx mailbox
978 * address can only be configured once.
Jose Marinhoa1dfeda2019-02-27 16:46:03 +0000979 */
980 sl_lock(&from->lock);
981 from_msg = from->mailbox.send;
982 sl_unlock(&from->lock);
983
984 if (from_msg == NULL) {
Andrew Walbran70bc8622019-10-07 14:15:58 +0100985 return spci_error(SPCI_INVALID_PARAMETERS);
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +0100986 }
987
Andrew Walbran70bc8622019-10-07 14:15:58 +0100988 /* Ensure the receiver VM exists. */
989 to = vm_find(receiver_vm_id);
Jose Marinhoa1dfeda2019-02-27 16:46:03 +0000990 if (to == NULL) {
Andrew Walbran70bc8622019-10-07 14:15:58 +0100991 return spci_error(SPCI_INVALID_PARAMETERS);
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +0100992 }
993
Jose Marinho75509b42019-04-09 09:34:59 +0100994 /*
Andrew Walbran70bc8622019-10-07 14:15:58 +0100995 * Hafnium needs to hold the lock on <to> before the mailbox state is
Jose Marinho75509b42019-04-09 09:34:59 +0100996 * checked. The lock on <to> must be held until the information is
997 * copied to <to> Rx buffer. Since in
998 * spci_msg_handle_architected_message we may call api_spci_share_memory
999 * which must hold the <from> lock, we must hold the <from> lock at this
1000 * point to prevent a deadlock scenario.
1001 */
Andrew Walbranf6595962019-10-15 16:47:56 +01001002 vm_to_from_lock = vm_lock_both(to, from);
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +01001003
Andrew Walbrane0f575f2019-10-16 16:00:12 +01001004 if (msg_receiver_busy(vm_to_from_lock.vm1, vm_to_from_lock.vm2,
1005 notify)) {
Andrew Walbran70bc8622019-10-07 14:15:58 +01001006 ret = spci_error(SPCI_BUSY);
Andrew Scullaa039b32018-10-04 15:02:26 +01001007 goto out;
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +01001008 }
1009
Andrew Walbran70bc8622019-10-07 14:15:58 +01001010 /* Handle legacy memory sharing messages. */
1011 if ((attributes & SPCI_MSG_SEND_LEGACY_MEMORY_MASK) ==
1012 SPCI_MSG_SEND_LEGACY_MEMORY) {
Jose Marinho75509b42019-04-09 09:34:59 +01001013 /*
1014 * Buffer holding the internal copy of the shared memory
1015 * regions.
1016 */
Andrew Walbran70bc8622019-10-07 14:15:58 +01001017 struct spci_architected_message_header
1018 *architected_message_replica =
1019 (struct spci_architected_message_header *)
1020 cpu_get_buffer(current->cpu->id);
Jose Marinho20713fa2019-08-07 15:42:07 +01001021 uint32_t message_buffer_size =
1022 cpu_get_buffer_size(current->cpu->id);
Jose Marinho75509b42019-04-09 09:34:59 +01001023
1024 struct spci_architected_message_header *architected_header =
Andrew Walbran70bc8622019-10-07 14:15:58 +01001025 (struct spci_architected_message_header *)from_msg;
Jose Marinho75509b42019-04-09 09:34:59 +01001026
Andrew Walbran70bc8622019-10-07 14:15:58 +01001027 if (size > message_buffer_size) {
1028 ret = spci_error(SPCI_INVALID_PARAMETERS);
Jose Marinho75509b42019-04-09 09:34:59 +01001029 goto out;
1030 }
1031
Andrew Walbran70bc8622019-10-07 14:15:58 +01001032 if (size < sizeof(struct spci_architected_message_header)) {
1033 ret = spci_error(SPCI_INVALID_PARAMETERS);
Jose Marinho75509b42019-04-09 09:34:59 +01001034 goto out;
1035 }
1036
Andrew Walbran70bc8622019-10-07 14:15:58 +01001037 /* Copy the architected message into the internal buffer. */
1038 memcpy_s(architected_message_replica, message_buffer_size,
1039 architected_header, size);
Jose Marinho75509b42019-04-09 09:34:59 +01001040
1041 /*
Andrew Walbran70bc8622019-10-07 14:15:58 +01001042 * Note that architected_message_replica is passed as the third
1043 * parameter to spci_msg_handle_architected_message. The
1044 * execution flow commencing at
1045 * spci_msg_handle_architected_message will make several
1046 * accesses to fields in architected_message_replica. The memory
1047 * area architected_message_replica must be exclusively owned by
1048 * Hafnium so that TOCTOU issues do not arise.
Jose Marinho75509b42019-04-09 09:34:59 +01001049 */
1050 ret = spci_msg_handle_architected_message(
Andrew Walbranf6595962019-10-15 16:47:56 +01001051 vm_to_from_lock.vm1, vm_to_from_lock.vm2,
Andrew Walbran70bc8622019-10-07 14:15:58 +01001052 architected_message_replica, size);
Jose Marinho75509b42019-04-09 09:34:59 +01001053
Andrew Walbran70bc8622019-10-07 14:15:58 +01001054 if (ret.func != SPCI_SUCCESS_32) {
Jose Marinho75509b42019-04-09 09:34:59 +01001055 goto out;
1056 }
1057 } else {
1058 /* Copy data. */
Andrew Walbran70bc8622019-10-07 14:15:58 +01001059 memcpy_s(to->mailbox.recv, SPCI_MSG_PAYLOAD_MAX, from_msg,
1060 size);
1061 to->mailbox.recv_size = size;
1062 to->mailbox.recv_sender = sender_vm_id;
1063 to->mailbox.recv_attributes = 0;
1064 ret = (struct spci_value){.func = SPCI_SUCCESS_32};
Jose Marinho75509b42019-04-09 09:34:59 +01001065 }
1066
Andrew Walbrane0f575f2019-10-16 16:00:12 +01001067 deliver_msg(vm_to_from_lock.vm1, vm_to_from_lock.vm2, size, current,
1068 next);
Andrew Scullaa039b32018-10-04 15:02:26 +01001069
1070out:
Andrew Walbranf6595962019-10-15 16:47:56 +01001071 vm_unlock(&vm_to_from_lock.vm1);
1072 vm_unlock(&vm_to_from_lock.vm2);
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +01001073
Wedson Almeida Filho80eb4a32018-11-30 17:11:15 +00001074 return ret;
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +01001075}
1076
1077/**
Andrew Scullec52ddf2019-08-20 10:41:01 +01001078 * Checks whether the vCPU's attempt to block for a message has already been
1079 * interrupted or whether it is allowed to block.
1080 */
1081bool api_spci_msg_recv_block_interrupted(struct vcpu *current)
1082{
1083 bool interrupted;
1084
1085 sl_lock(&current->lock);
1086
1087 /*
1088 * Don't block if there are enabled and pending interrupts, to match
1089 * behaviour of wait_for_interrupt.
1090 */
1091 interrupted = (current->interrupts.enabled_and_pending_count > 0);
1092
1093 sl_unlock(&current->lock);
1094
1095 return interrupted;
1096}
1097
1098/**
Andrew Scullaa039b32018-10-04 15:02:26 +01001099 * Receives a message from the mailbox. If one isn't available, this function
1100 * can optionally block the caller until one becomes available.
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +01001101 *
Andrew Scullaa039b32018-10-04 15:02:26 +01001102 * No new messages can be received until the mailbox has been cleared.
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +01001103 */
Andrew Walbrand4d2fa12019-10-01 16:47:25 +01001104struct spci_value api_spci_msg_recv(bool block, struct vcpu *current,
1105 struct vcpu **next)
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +01001106{
Wedson Almeida Filho00df6c72018-10-18 11:19:24 +01001107 struct vm *vm = current->vm;
Andrew Walbrand4d2fa12019-10-01 16:47:25 +01001108 struct spci_value return_code;
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +01001109
Andrew Scullaa039b32018-10-04 15:02:26 +01001110 /*
1111 * The primary VM will receive messages as a status code from running
1112 * vcpus and must not call this function.
1113 */
Andrew Scull19503262018-09-20 14:48:39 +01001114 if (vm->id == HF_PRIMARY_VM_ID) {
Andrew Walbrand4d2fa12019-10-01 16:47:25 +01001115 return spci_error(SPCI_NOT_SUPPORTED);
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +01001116 }
1117
1118 sl_lock(&vm->lock);
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +01001119
Andrew Scullaa039b32018-10-04 15:02:26 +01001120 /* Return pending messages without blocking. */
Andrew Sculld6ee1102019-04-05 22:12:42 +01001121 if (vm->mailbox.state == MAILBOX_STATE_RECEIVED) {
1122 vm->mailbox.state = MAILBOX_STATE_READ;
Andrew Walbrand4d2fa12019-10-01 16:47:25 +01001123 return_code = spci_msg_recv_return(vm);
Jose Marinho3e2442f2019-03-12 13:30:37 +00001124 goto out;
1125 }
1126
1127 /* No pending message so fail if not allowed to block. */
1128 if (!block) {
Andrew Walbrand4d2fa12019-10-01 16:47:25 +01001129 return_code = spci_error(SPCI_RETRY);
Andrew Scullaa039b32018-10-04 15:02:26 +01001130 goto out;
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +01001131 }
Andrew Scullaa039b32018-10-04 15:02:26 +01001132
Andrew Walbran9311c9a2019-03-12 16:59:04 +00001133 /*
Jose Marinho3e2442f2019-03-12 13:30:37 +00001134 * From this point onward this call can only be interrupted or a message
1135 * received. If a message is received the return value will be set at
1136 * that time to SPCI_SUCCESS.
Andrew Walbran9311c9a2019-03-12 16:59:04 +00001137 */
Andrew Walbrand4d2fa12019-10-01 16:47:25 +01001138 return_code = spci_error(SPCI_INTERRUPTED);
Andrew Scullec52ddf2019-08-20 10:41:01 +01001139 if (api_spci_msg_recv_block_interrupted(current)) {
Andrew Scullaa039b32018-10-04 15:02:26 +01001140 goto out;
1141 }
1142
Andrew Scullaa039b32018-10-04 15:02:26 +01001143 /* Switch back to primary vm to block. */
Andrew Walbranb4816552018-12-05 17:35:42 +00001144 {
Andrew Walbran7a1ea0b2019-10-02 18:18:44 +01001145 struct spci_value run_return = {
1146 .func = SPCI_MSG_WAIT_32,
Andrew Walbran4db5f3a2019-11-04 11:42:42 +00001147 .arg1 = spci_vm_vcpu(vm->id, vcpu_index(current)),
Andrew Walbranb4816552018-12-05 17:35:42 +00001148 };
Wedson Almeida Filho81568c42019-01-04 13:33:02 +00001149
Andrew Walbranb4816552018-12-05 17:35:42 +00001150 *next = api_switch_to_primary(current, run_return,
Andrew Sculld6ee1102019-04-05 22:12:42 +01001151 VCPU_STATE_BLOCKED_MAILBOX);
Andrew Walbranb4816552018-12-05 17:35:42 +00001152 }
Andrew Scullaa039b32018-10-04 15:02:26 +01001153out:
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +01001154 sl_unlock(&vm->lock);
1155
Jose Marinho3e2442f2019-03-12 13:30:37 +00001156 return return_code;
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +01001157}
1158
1159/**
Wedson Almeida Filhoea62e2e2019-01-09 19:14:59 +00001160 * Retrieves the next VM whose mailbox became writable. For a VM to be notified
1161 * by this function, the caller must have called api_mailbox_send before with
1162 * the notify argument set to true, and this call must have failed because the
1163 * mailbox was not available.
1164 *
1165 * It should be called repeatedly to retrieve a list of VMs.
1166 *
1167 * Returns -1 if no VM became writable, or the id of the VM whose mailbox
1168 * became writable.
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +01001169 */
Wedson Almeida Filhoea62e2e2019-01-09 19:14:59 +00001170int64_t api_mailbox_writable_get(const struct vcpu *current)
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +01001171{
Wedson Almeida Filho00df6c72018-10-18 11:19:24 +01001172 struct vm *vm = current->vm;
Wedson Almeida Filhoea62e2e2019-01-09 19:14:59 +00001173 struct wait_entry *entry;
Andrew Scullc0e569a2018-10-02 18:05:21 +01001174 int64_t ret;
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +01001175
1176 sl_lock(&vm->lock);
Wedson Almeida Filhoea62e2e2019-01-09 19:14:59 +00001177 if (list_empty(&vm->mailbox.ready_list)) {
1178 ret = -1;
1179 goto exit;
1180 }
1181
1182 entry = CONTAINER_OF(vm->mailbox.ready_list.next, struct wait_entry,
1183 ready_links);
1184 list_remove(&entry->ready_links);
Wedson Almeida Filhob790f652019-01-22 23:41:56 +00001185 ret = entry - vm->wait_entries;
Wedson Almeida Filhoea62e2e2019-01-09 19:14:59 +00001186
1187exit:
1188 sl_unlock(&vm->lock);
1189 return ret;
1190}
1191
1192/**
1193 * Retrieves the next VM waiting to be notified that the mailbox of the
1194 * specified VM became writable. Only primary VMs are allowed to call this.
1195 *
Wedson Almeida Filhob790f652019-01-22 23:41:56 +00001196 * Returns -1 on failure or if there are no waiters; the VM id of the next
1197 * waiter otherwise.
Wedson Almeida Filhoea62e2e2019-01-09 19:14:59 +00001198 */
Andrew Walbran42347a92019-05-09 13:59:03 +01001199int64_t api_mailbox_waiter_get(spci_vm_id_t vm_id, const struct vcpu *current)
Wedson Almeida Filhoea62e2e2019-01-09 19:14:59 +00001200{
1201 struct vm *vm;
1202 struct vm_locked locked;
1203 struct wait_entry *entry;
1204 struct vm *waiting_vm;
1205
1206 /* Only primary VMs are allowed to call this function. */
1207 if (current->vm->id != HF_PRIMARY_VM_ID) {
1208 return -1;
1209 }
1210
Andrew Walbran42347a92019-05-09 13:59:03 +01001211 vm = vm_find(vm_id);
Wedson Almeida Filhoea62e2e2019-01-09 19:14:59 +00001212 if (vm == NULL) {
1213 return -1;
1214 }
1215
1216 /* Check if there are outstanding notifications from given vm. */
Andrew Walbran7e932bd2019-04-29 16:47:06 +01001217 locked = vm_lock(vm);
Wedson Almeida Filhoea62e2e2019-01-09 19:14:59 +00001218 entry = api_fetch_waiter(locked);
1219 vm_unlock(&locked);
1220
1221 if (entry == NULL) {
1222 return -1;
1223 }
1224
1225 /* Enqueue notification to waiting VM. */
1226 waiting_vm = entry->waiting_vm;
1227
1228 sl_lock(&waiting_vm->lock);
1229 if (list_empty(&entry->ready_links)) {
1230 list_append(&waiting_vm->mailbox.ready_list,
1231 &entry->ready_links);
1232 }
1233 sl_unlock(&waiting_vm->lock);
1234
1235 return waiting_vm->id;
1236}
1237
1238/**
Andrew Walbran8a0f5ca2019-11-05 13:12:23 +00001239 * Releases the caller's mailbox so that a new message can be received. The
1240 * caller must have copied out all data they wish to preserve as new messages
1241 * will overwrite the old and will arrive asynchronously.
Wedson Almeida Filhoea62e2e2019-01-09 19:14:59 +00001242 *
1243 * Returns:
Andrew Walbran8a0f5ca2019-11-05 13:12:23 +00001244 * - SPCI_ERROR SPCI_DENIED on failure, if the mailbox hasn't been read.
1245 * - SPCI_SUCCESS on success if no further action is needed.
1246 * - SPCI_RX_RELEASE if it was called by the primary VM and the primary VM now
1247 * needs to wake up or kick waiters. Waiters should be retrieved by calling
Wedson Almeida Filhoea62e2e2019-01-09 19:14:59 +00001248 * hf_mailbox_waiter_get.
1249 */
Andrew Walbran8a0f5ca2019-11-05 13:12:23 +00001250struct spci_value api_spci_rx_release(struct vcpu *current, struct vcpu **next)
Wedson Almeida Filhoea62e2e2019-01-09 19:14:59 +00001251{
1252 struct vm *vm = current->vm;
1253 struct vm_locked locked;
Andrew Walbran8a0f5ca2019-11-05 13:12:23 +00001254 struct spci_value ret;
Wedson Almeida Filhoea62e2e2019-01-09 19:14:59 +00001255
Andrew Walbran7e932bd2019-04-29 16:47:06 +01001256 locked = vm_lock(vm);
Andrew Scullaa7db8e2019-02-01 14:12:19 +00001257 switch (vm->mailbox.state) {
Andrew Sculld6ee1102019-04-05 22:12:42 +01001258 case MAILBOX_STATE_EMPTY:
Andrew Walbran8a0f5ca2019-11-05 13:12:23 +00001259 ret = (struct spci_value){.func = SPCI_SUCCESS_32};
Andrew Scullaa7db8e2019-02-01 14:12:19 +00001260 break;
1261
Andrew Sculld6ee1102019-04-05 22:12:42 +01001262 case MAILBOX_STATE_RECEIVED:
Andrew Walbran8a0f5ca2019-11-05 13:12:23 +00001263 ret = spci_error(SPCI_DENIED);
Andrew Scullaa7db8e2019-02-01 14:12:19 +00001264 break;
1265
Andrew Sculld6ee1102019-04-05 22:12:42 +01001266 case MAILBOX_STATE_READ:
Andrew Walbranbfffb0f2019-11-05 14:02:34 +00001267 ret = api_waiter_result(locked, current, next);
Andrew Sculld6ee1102019-04-05 22:12:42 +01001268 vm->mailbox.state = MAILBOX_STATE_EMPTY;
Andrew Scullaa7db8e2019-02-01 14:12:19 +00001269 break;
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +01001270 }
Wedson Almeida Filhoea62e2e2019-01-09 19:14:59 +00001271 vm_unlock(&locked);
Wedson Almeida Filho2f94ec12018-07-26 16:00:48 +01001272
1273 return ret;
Wedson Almeida Filho3fcbcff2018-07-10 23:53:39 +01001274}
Andrew Walbran318f5732018-11-20 16:23:42 +00001275
1276/**
1277 * Enables or disables a given interrupt ID for the calling vCPU.
1278 *
1279 * Returns 0 on success, or -1 if the intid is invalid.
1280 */
Wedson Almeida Filhoc559d132019-01-09 19:33:40 +00001281int64_t api_interrupt_enable(uint32_t intid, bool enable, struct vcpu *current)
Andrew Walbran318f5732018-11-20 16:23:42 +00001282{
1283 uint32_t intid_index = intid / INTERRUPT_REGISTER_BITS;
Andrew Walbrane52006c2019-10-22 18:01:28 +01001284 uint32_t intid_mask = 1U << (intid % INTERRUPT_REGISTER_BITS);
Wedson Almeida Filho81568c42019-01-04 13:33:02 +00001285
Andrew Walbran318f5732018-11-20 16:23:42 +00001286 if (intid >= HF_NUM_INTIDS) {
1287 return -1;
1288 }
1289
1290 sl_lock(&current->lock);
1291 if (enable) {
Andrew Walbran3d84a262018-12-13 14:41:19 +00001292 /*
1293 * If it is pending and was not enabled before, increment the
1294 * count.
1295 */
1296 if (current->interrupts.interrupt_pending[intid_index] &
1297 ~current->interrupts.interrupt_enabled[intid_index] &
1298 intid_mask) {
1299 current->interrupts.enabled_and_pending_count++;
1300 }
Andrew Walbran318f5732018-11-20 16:23:42 +00001301 current->interrupts.interrupt_enabled[intid_index] |=
1302 intid_mask;
Andrew Walbran318f5732018-11-20 16:23:42 +00001303 } else {
Andrew Walbran3d84a262018-12-13 14:41:19 +00001304 /*
1305 * If it is pending and was enabled before, decrement the count.
1306 */
1307 if (current->interrupts.interrupt_pending[intid_index] &
1308 current->interrupts.interrupt_enabled[intid_index] &
1309 intid_mask) {
1310 current->interrupts.enabled_and_pending_count--;
1311 }
Andrew Walbran318f5732018-11-20 16:23:42 +00001312 current->interrupts.interrupt_enabled[intid_index] &=
1313 ~intid_mask;
1314 }
1315
1316 sl_unlock(&current->lock);
1317 return 0;
1318}
1319
1320/**
1321 * Returns the ID of the next pending interrupt for the calling vCPU, and
1322 * acknowledges it (i.e. marks it as no longer pending). Returns
1323 * HF_INVALID_INTID if there are no pending interrupts.
1324 */
Wedson Almeida Filhoc559d132019-01-09 19:33:40 +00001325uint32_t api_interrupt_get(struct vcpu *current)
Andrew Walbran318f5732018-11-20 16:23:42 +00001326{
1327 uint8_t i;
1328 uint32_t first_interrupt = HF_INVALID_INTID;
Andrew Walbran318f5732018-11-20 16:23:42 +00001329
1330 /*
1331 * Find the first enabled and pending interrupt ID, return it, and
1332 * deactivate it.
1333 */
1334 sl_lock(&current->lock);
1335 for (i = 0; i < HF_NUM_INTIDS / INTERRUPT_REGISTER_BITS; ++i) {
1336 uint32_t enabled_and_pending =
1337 current->interrupts.interrupt_enabled[i] &
1338 current->interrupts.interrupt_pending[i];
Wedson Almeida Filho81568c42019-01-04 13:33:02 +00001339
Andrew Walbran318f5732018-11-20 16:23:42 +00001340 if (enabled_and_pending != 0) {
Andrew Walbran3d84a262018-12-13 14:41:19 +00001341 uint8_t bit_index = ctz(enabled_and_pending);
1342 /*
1343 * Mark it as no longer pending and decrement the count.
1344 */
1345 current->interrupts.interrupt_pending[i] &=
Andrew Walbrane52006c2019-10-22 18:01:28 +01001346 ~(1U << bit_index);
Andrew Walbran3d84a262018-12-13 14:41:19 +00001347 current->interrupts.enabled_and_pending_count--;
1348 first_interrupt =
1349 i * INTERRUPT_REGISTER_BITS + bit_index;
Andrew Walbran318f5732018-11-20 16:23:42 +00001350 break;
1351 }
1352 }
Andrew Walbran318f5732018-11-20 16:23:42 +00001353
1354 sl_unlock(&current->lock);
1355 return first_interrupt;
1356}
1357
1358/**
Andrew Walbran4cf217a2018-12-14 15:24:50 +00001359 * Returns whether the current vCPU is allowed to inject an interrupt into the
Andrew Walbran318f5732018-11-20 16:23:42 +00001360 * given VM and vCPU.
1361 */
1362static inline bool is_injection_allowed(uint32_t target_vm_id,
1363 struct vcpu *current)
1364{
1365 uint32_t current_vm_id = current->vm->id;
Wedson Almeida Filho81568c42019-01-04 13:33:02 +00001366
Andrew Walbran318f5732018-11-20 16:23:42 +00001367 /*
1368 * The primary VM is allowed to inject interrupts into any VM. Secondary
1369 * VMs are only allowed to inject interrupts into their own vCPUs.
1370 */
1371 return current_vm_id == HF_PRIMARY_VM_ID ||
1372 current_vm_id == target_vm_id;
1373}
1374
1375/**
1376 * Injects a virtual interrupt of the given ID into the given target vCPU.
1377 * This doesn't cause the vCPU to actually be run immediately; it will be taken
1378 * when the vCPU is next run, which is up to the scheduler.
1379 *
Andrew Walbran3d84a262018-12-13 14:41:19 +00001380 * Returns:
1381 * - -1 on failure because the target VM or vCPU doesn't exist, the interrupt
1382 * ID is invalid, or the current VM is not allowed to inject interrupts to
1383 * the target VM.
1384 * - 0 on success if no further action is needed.
1385 * - 1 if it was called by the primary VM and the primary VM now needs to wake
1386 * up or kick the target vCPU.
Andrew Walbran318f5732018-11-20 16:23:42 +00001387 */
Andrew Walbran42347a92019-05-09 13:59:03 +01001388int64_t api_interrupt_inject(spci_vm_id_t target_vm_id,
Andrew Walbranb037d5b2019-06-25 17:19:41 +01001389 spci_vcpu_index_t target_vcpu_idx, uint32_t intid,
Andrew Walbran42347a92019-05-09 13:59:03 +01001390 struct vcpu *current, struct vcpu **next)
Andrew Walbran318f5732018-11-20 16:23:42 +00001391{
Andrew Walbran318f5732018-11-20 16:23:42 +00001392 struct vcpu *target_vcpu;
Andrew Walbran42347a92019-05-09 13:59:03 +01001393 struct vm *target_vm = vm_find(target_vm_id);
Andrew Walbran318f5732018-11-20 16:23:42 +00001394
1395 if (intid >= HF_NUM_INTIDS) {
1396 return -1;
1397 }
Wedson Almeida Filho81568c42019-01-04 13:33:02 +00001398
Andrew Walbran318f5732018-11-20 16:23:42 +00001399 if (target_vm == NULL) {
1400 return -1;
1401 }
Wedson Almeida Filho81568c42019-01-04 13:33:02 +00001402
Andrew Walbran318f5732018-11-20 16:23:42 +00001403 if (target_vcpu_idx >= target_vm->vcpu_count) {
1404 /* The requested vcpu must exist. */
1405 return -1;
1406 }
Wedson Almeida Filho81568c42019-01-04 13:33:02 +00001407
Andrew Walbran318f5732018-11-20 16:23:42 +00001408 if (!is_injection_allowed(target_vm_id, current)) {
1409 return -1;
1410 }
Wedson Almeida Filho81568c42019-01-04 13:33:02 +00001411
Andrew Walbrane1310df2019-04-29 17:28:28 +01001412 target_vcpu = vm_get_vcpu(target_vm, target_vcpu_idx);
Andrew Walbran318f5732018-11-20 16:23:42 +00001413
1414 dlog("Injecting IRQ %d for VM %d VCPU %d from VM %d VCPU %d\n", intid,
1415 target_vm_id, target_vcpu_idx, current->vm->id, current->cpu->id);
Andrew Walbranfc9d4382019-05-10 18:07:21 +01001416 return internal_interrupt_inject(target_vcpu, intid, current, next);
Andrew Walbran318f5732018-11-20 16:23:42 +00001417}
Andrew Scull6386f252018-12-06 13:29:10 +00001418
1419/**
1420 * Clears a region of physical memory by overwriting it with zeros. The data is
1421 * flushed from the cache so the memory has been cleared across the system.
1422 */
1423static bool api_clear_memory(paddr_t begin, paddr_t end, struct mpool *ppool)
1424{
1425 /*
1426 * TODO: change this to a cpu local single page window rather than a
1427 * global mapping of the whole range. Such an approach will limit
1428 * the changes to stage-1 tables and will allow only local
1429 * invalidation.
1430 */
Andrew Scull3c0a90a2019-07-01 11:55:53 +01001431 bool ret;
1432 struct mm_stage1_locked stage1_locked = mm_lock_stage1();
1433 void *ptr =
1434 mm_identity_map(stage1_locked, begin, end, MM_MODE_W, ppool);
Andrew Walbran2cb43392019-04-17 12:52:45 +01001435 size_t size = pa_difference(begin, end);
Andrew Scull6386f252018-12-06 13:29:10 +00001436
1437 if (!ptr) {
1438 /* TODO: partial defrag of failed range. */
1439 /* Recover any memory consumed in failed mapping. */
Andrew Scull3c0a90a2019-07-01 11:55:53 +01001440 mm_defrag(stage1_locked, ppool);
1441 goto fail;
Andrew Scull6386f252018-12-06 13:29:10 +00001442 }
1443
Andrew Scull2b5fbad2019-04-05 13:55:56 +01001444 memset_s(ptr, size, 0, size);
Andrew Scullc059fbe2019-09-12 12:58:40 +01001445 arch_mm_flush_dcache(ptr, size);
Andrew Scull3c0a90a2019-07-01 11:55:53 +01001446 mm_unmap(stage1_locked, begin, end, ppool);
Andrew Scull6386f252018-12-06 13:29:10 +00001447
Andrew Scull3c0a90a2019-07-01 11:55:53 +01001448 ret = true;
1449 goto out;
1450
1451fail:
1452 ret = false;
1453
1454out:
1455 mm_unlock_stage1(&stage1_locked);
1456
1457 return ret;
Andrew Scull6386f252018-12-06 13:29:10 +00001458}
1459
Andrew Walbrane0f575f2019-10-16 16:00:12 +01001460/** TODO: Move function to spci_architected_message.c. */
Jose Marinho75509b42019-04-09 09:34:59 +01001461/**
1462 * Shares memory from the calling VM with another. The memory can be shared in
1463 * different modes.
1464 *
1465 * This function requires the calling context to hold the <to> and <from> locks.
1466 *
1467 * Returns:
1468 * In case of error one of the following values is returned:
1469 * 1) SPCI_INVALID_PARAMETERS - The endpoint provided parameters were
1470 * erroneous;
Andrew Walbran379aa722019-10-07 14:16:34 +01001471 * 2) SPCI_NO_MEMORY - Hafnium did not have sufficient memory to complete
Jose Marinho75509b42019-04-09 09:34:59 +01001472 * the request.
1473 * Success is indicated by SPCI_SUCCESS.
1474 */
Andrew Walbran70bc8622019-10-07 14:15:58 +01001475struct spci_value api_spci_share_memory(
1476 struct vm_locked to_locked, struct vm_locked from_locked,
1477 struct spci_memory_region *memory_region, uint32_t memory_to_attributes,
1478 enum spci_memory_share share)
Jose Marinho75509b42019-04-09 09:34:59 +01001479{
1480 struct vm *to = to_locked.vm;
1481 struct vm *from = from_locked.vm;
Andrew Walbran1281ed42019-10-22 17:23:40 +01001482 uint32_t orig_from_mode;
1483 uint32_t from_mode;
1484 uint32_t to_mode;
Jose Marinho75509b42019-04-09 09:34:59 +01001485 struct mpool local_page_pool;
Andrew Walbran70bc8622019-10-07 14:15:58 +01001486 struct spci_value ret;
Jose Marinho75509b42019-04-09 09:34:59 +01001487 paddr_t pa_begin;
1488 paddr_t pa_end;
1489 ipaddr_t begin;
1490 ipaddr_t end;
Andrew Walbranf5972182019-10-15 15:41:26 +01001491 struct spci_memory_region_constituent *constituents =
1492 spci_memory_region_get_constituents(memory_region);
Jose Marinho75509b42019-04-09 09:34:59 +01001493
1494 size_t size;
1495
Andrew Walbrana4224452019-11-07 13:07:50 +00001496 /*
1497 * Make sure constituents are properly aligned to a 64-bit boundary. If
1498 * not we would get alignment faults trying to read (64-bit) page
1499 * addresses.
1500 */
1501 if (!is_aligned(constituents, 8)) {
1502 return spci_error(SPCI_INVALID_PARAMETERS);
1503 }
1504
Jose Marinho75509b42019-04-09 09:34:59 +01001505 /* Disallow reflexive shares as this suggests an error in the VM. */
1506 if (to == from) {
Andrew Walbran70bc8622019-10-07 14:15:58 +01001507 return spci_error(SPCI_INVALID_PARAMETERS);
Jose Marinho75509b42019-04-09 09:34:59 +01001508 }
1509
1510 /*
1511 * Create a local pool so any freed memory can't be used by another
1512 * thread. This is to ensure the original mapping can be restored if any
1513 * stage of the process fails.
1514 */
1515 mpool_init_with_fallback(&local_page_pool, &api_page_pool);
1516
1517 /* Obtain the single contiguous set of pages from the memory_region. */
1518 /* TODO: Add support for multiple constituent regions. */
Andrew Walbranf5972182019-10-15 15:41:26 +01001519 size = constituents[0].page_count * PAGE_SIZE;
1520 begin = ipa_init(constituents[0].address);
Jose Marinho75509b42019-04-09 09:34:59 +01001521 end = ipa_add(begin, size);
1522
1523 /*
1524 * Check if the state transition is lawful for both VMs involved
1525 * in the memory exchange, ensure that all constituents of a memory
1526 * region being shared are at the same state.
1527 */
1528 if (!spci_msg_check_transition(to, from, share, &orig_from_mode, begin,
1529 end, memory_to_attributes, &from_mode,
1530 &to_mode)) {
Andrew Walbran70bc8622019-10-07 14:15:58 +01001531 return spci_error(SPCI_INVALID_PARAMETERS);
Jose Marinho75509b42019-04-09 09:34:59 +01001532 }
1533
1534 pa_begin = pa_from_ipa(begin);
1535 pa_end = pa_from_ipa(end);
1536
1537 /*
1538 * First update the mapping for the sender so there is not overlap with
1539 * the recipient.
1540 */
1541 if (!mm_vm_identity_map(&from->ptable, pa_begin, pa_end, from_mode,
1542 NULL, &local_page_pool)) {
Andrew Walbran70bc8622019-10-07 14:15:58 +01001543 ret = spci_error(SPCI_NO_MEMORY);
Jose Marinho75509b42019-04-09 09:34:59 +01001544 goto out;
1545 }
1546
1547 /* Complete the transfer by mapping the memory into the recipient. */
1548 if (!mm_vm_identity_map(&to->ptable, pa_begin, pa_end, to_mode, NULL,
1549 &local_page_pool)) {
1550 /* TODO: partial defrag of failed range. */
1551 /* Recover any memory consumed in failed mapping. */
1552 mm_vm_defrag(&from->ptable, &local_page_pool);
1553
Andrew Walbran70bc8622019-10-07 14:15:58 +01001554 ret = spci_error(SPCI_NO_MEMORY);
Jose Marinho75509b42019-04-09 09:34:59 +01001555
1556 CHECK(mm_vm_identity_map(&from->ptable, pa_begin, pa_end,
1557 orig_from_mode, NULL,
1558 &local_page_pool));
1559
1560 goto out;
1561 }
1562
Andrew Walbran70bc8622019-10-07 14:15:58 +01001563 ret = (struct spci_value){.func = SPCI_SUCCESS_32};
Jose Marinho75509b42019-04-09 09:34:59 +01001564
1565out:
Jose Marinho75509b42019-04-09 09:34:59 +01001566 mpool_fini(&local_page_pool);
1567
1568 return ret;
1569}
1570
Andrew Scull6386f252018-12-06 13:29:10 +00001571/**
1572 * Shares memory from the calling VM with another. The memory can be shared in
1573 * different modes.
1574 *
1575 * TODO: the interface for sharing memory will need to be enhanced to allow
1576 * sharing with different modes e.g. read-only, informing the recipient
1577 * of the memory they have been given, opting to not wipe the memory and
1578 * possibly allowing multiple blocks to be transferred. What this will
1579 * look like is TBD.
1580 */
Andrew Walbran42347a92019-05-09 13:59:03 +01001581int64_t api_share_memory(spci_vm_id_t vm_id, ipaddr_t addr, size_t size,
Andrew Scull6386f252018-12-06 13:29:10 +00001582 enum hf_share share, struct vcpu *current)
1583{
1584 struct vm *from = current->vm;
1585 struct vm *to;
Andrew Walbran1281ed42019-10-22 17:23:40 +01001586 uint32_t orig_from_mode;
1587 uint32_t from_mode;
1588 uint32_t to_mode;
Andrew Scull6386f252018-12-06 13:29:10 +00001589 ipaddr_t begin;
1590 ipaddr_t end;
1591 paddr_t pa_begin;
1592 paddr_t pa_end;
1593 struct mpool local_page_pool;
1594 int64_t ret;
1595
1596 /* Disallow reflexive shares as this suggests an error in the VM. */
1597 if (vm_id == from->id) {
1598 return -1;
1599 }
1600
1601 /* Ensure the target VM exists. */
Andrew Walbran42347a92019-05-09 13:59:03 +01001602 to = vm_find(vm_id);
Andrew Scull6386f252018-12-06 13:29:10 +00001603 if (to == NULL) {
1604 return -1;
1605 }
1606
1607 begin = addr;
1608 end = ipa_add(addr, size);
1609
1610 /* Fail if addresses are not page-aligned. */
Alfredo Mazzinghieb1997c2019-02-07 18:00:01 +00001611 if (!is_aligned(ipa_addr(begin), PAGE_SIZE) ||
1612 !is_aligned(ipa_addr(end), PAGE_SIZE)) {
Andrew Scull6386f252018-12-06 13:29:10 +00001613 return -1;
1614 }
1615
1616 /* Convert the sharing request to memory management modes. */
1617 switch (share) {
1618 case HF_MEMORY_GIVE:
1619 from_mode = MM_MODE_INVALID | MM_MODE_UNOWNED;
1620 to_mode = MM_MODE_R | MM_MODE_W | MM_MODE_X;
1621 break;
1622
1623 case HF_MEMORY_LEND:
1624 from_mode = MM_MODE_INVALID;
1625 to_mode = MM_MODE_R | MM_MODE_W | MM_MODE_X | MM_MODE_UNOWNED;
1626 break;
1627
1628 case HF_MEMORY_SHARE:
1629 from_mode = MM_MODE_R | MM_MODE_W | MM_MODE_X | MM_MODE_SHARED;
1630 to_mode = MM_MODE_R | MM_MODE_W | MM_MODE_X | MM_MODE_UNOWNED |
1631 MM_MODE_SHARED;
1632 break;
1633
1634 default:
1635 /* The input is untrusted so might not be a valid value. */
1636 return -1;
1637 }
1638
1639 /*
1640 * Create a local pool so any freed memory can't be used by another
1641 * thread. This is to ensure the original mapping can be restored if any
1642 * stage of the process fails.
1643 */
1644 mpool_init_with_fallback(&local_page_pool, &api_page_pool);
1645
1646 sl_lock_both(&from->lock, &to->lock);
1647
1648 /*
1649 * Ensure that the memory range is mapped with the same mode so that
1650 * changes can be reverted if the process fails.
1651 */
1652 if (!mm_vm_get_mode(&from->ptable, begin, end, &orig_from_mode)) {
1653 goto fail;
1654 }
1655
Andrew Scullb5f49e02019-10-02 13:20:47 +01001656 /* Ensure the address range is normal memory and not a device. */
1657 if (orig_from_mode & MM_MODE_D) {
1658 goto fail;
1659 }
1660
Andrew Scull6386f252018-12-06 13:29:10 +00001661 /*
1662 * Ensure the memory range is valid for the sender. If it isn't, the
1663 * sender has either shared it with another VM already or has no claim
1664 * to the memory.
1665 */
1666 if (orig_from_mode & MM_MODE_INVALID) {
1667 goto fail;
1668 }
1669
1670 /*
1671 * The sender must own the memory and have exclusive access to it in
1672 * order to share it. Alternatively, it is giving memory back to the
1673 * owning VM.
1674 */
1675 if (orig_from_mode & MM_MODE_UNOWNED) {
Andrew Walbran1281ed42019-10-22 17:23:40 +01001676 uint32_t orig_to_mode;
Andrew Scull6386f252018-12-06 13:29:10 +00001677
1678 if (share != HF_MEMORY_GIVE ||
1679 !mm_vm_get_mode(&to->ptable, begin, end, &orig_to_mode) ||
1680 orig_to_mode & MM_MODE_UNOWNED) {
1681 goto fail;
1682 }
1683 } else if (orig_from_mode & MM_MODE_SHARED) {
1684 goto fail;
1685 }
1686
1687 pa_begin = pa_from_ipa(begin);
1688 pa_end = pa_from_ipa(end);
1689
1690 /*
1691 * First update the mapping for the sender so there is not overlap with
1692 * the recipient.
1693 */
1694 if (!mm_vm_identity_map(&from->ptable, pa_begin, pa_end, from_mode,
1695 NULL, &local_page_pool)) {
1696 goto fail;
1697 }
1698
1699 /* Clear the memory so no VM or device can see the previous contents. */
1700 if (!api_clear_memory(pa_begin, pa_end, &local_page_pool)) {
1701 goto fail_return_to_sender;
1702 }
1703
1704 /* Complete the transfer by mapping the memory into the recipient. */
1705 if (!mm_vm_identity_map(&to->ptable, pa_begin, pa_end, to_mode, NULL,
1706 &local_page_pool)) {
1707 /* TODO: partial defrag of failed range. */
1708 /* Recover any memory consumed in failed mapping. */
1709 mm_vm_defrag(&from->ptable, &local_page_pool);
1710 goto fail_return_to_sender;
1711 }
1712
1713 ret = 0;
1714 goto out;
1715
1716fail_return_to_sender:
Andrew Scull7e8de322019-07-02 13:00:56 +01001717 CHECK(mm_vm_identity_map(&from->ptable, pa_begin, pa_end,
1718 orig_from_mode, NULL, &local_page_pool));
Andrew Scull6386f252018-12-06 13:29:10 +00001719
1720fail:
1721 ret = -1;
1722
1723out:
1724 sl_unlock(&from->lock);
1725 sl_unlock(&to->lock);
1726
1727 mpool_fini(&local_page_pool);
1728
1729 return ret;
1730}
Jose Marinhofc0b2b62019-06-06 11:18:45 +01001731
1732/** Returns the version of the implemented SPCI specification. */
Andrew Walbran7f920af2019-09-03 17:09:30 +01001733struct spci_value api_spci_version(void)
Jose Marinhofc0b2b62019-06-06 11:18:45 +01001734{
1735 /*
1736 * Ensure that both major and minor revision representation occupies at
1737 * most 15 bits.
1738 */
1739 static_assert(0x8000 > SPCI_VERSION_MAJOR,
1740 "Major revision representation take more than 15 bits.");
1741 static_assert(0x10000 > SPCI_VERSION_MINOR,
1742 "Minor revision representation take more than 16 bits.");
1743
Andrew Walbran7f920af2019-09-03 17:09:30 +01001744 struct spci_value ret = {
1745 .func = SPCI_SUCCESS_32,
Andrew Walbran455c53a2019-10-10 13:56:19 +01001746 .arg2 = (SPCI_VERSION_MAJOR << SPCI_VERSION_MAJOR_OFFSET) |
Andrew Walbran7f920af2019-09-03 17:09:30 +01001747 SPCI_VERSION_MINOR};
1748 return ret;
Jose Marinhofc0b2b62019-06-06 11:18:45 +01001749}
Andrew Walbranc1ad4ce2019-05-09 11:41:39 +01001750
1751int64_t api_debug_log(char c, struct vcpu *current)
1752{
Andrew Sculld54e1be2019-08-20 11:09:42 +01001753 bool flush;
Andrew Walbranc1ad4ce2019-05-09 11:41:39 +01001754 struct vm *vm = current->vm;
1755 struct vm_locked vm_locked = vm_lock(vm);
1756
Andrew Sculld54e1be2019-08-20 11:09:42 +01001757 if (c == '\n' || c == '\0') {
1758 flush = true;
1759 } else {
1760 vm->log_buffer[vm->log_buffer_length++] = c;
1761 flush = (vm->log_buffer_length == sizeof(vm->log_buffer));
1762 }
1763
1764 if (flush) {
Andrew Walbran7f904bf2019-07-12 16:38:38 +01001765 dlog_flush_vm_buffer(vm->id, vm->log_buffer,
1766 vm->log_buffer_length);
1767 vm->log_buffer_length = 0;
Andrew Walbranc1ad4ce2019-05-09 11:41:39 +01001768 }
1769
1770 vm_unlock(&vm_locked);
1771
1772 return 0;
1773}
Jose Marinhoc0f4ff22019-10-09 10:37:42 +01001774
1775/**
1776 * Discovery function returning information about the implementation of optional
1777 * SPCI interfaces.
1778 */
1779struct spci_value api_spci_features(uint32_t function_id)
1780{
1781 switch (function_id) {
1782 case SPCI_ERROR_32:
1783 case SPCI_SUCCESS_32:
1784 case SPCI_ID_GET_32:
1785 case SPCI_YIELD_32:
1786 case SPCI_VERSION_32:
1787 case SPCI_FEATURES_32:
1788 case SPCI_MSG_SEND_32:
1789 case SPCI_MSG_POLL_32:
1790 case SPCI_MSG_WAIT_32:
1791 return (struct spci_value){.func = SPCI_SUCCESS_32};
1792 default:
1793 return spci_error(SPCI_NOT_SUPPORTED);
1794 }
1795}