Andrew Scull | 1883487 | 2018-10-12 11:48:09 +0100 | [diff] [blame] | 1 | /* |
Andrew Walbran | 692b325 | 2019-03-07 15:51:31 +0000 | [diff] [blame] | 2 | * Copyright 2018 The Hafnium Authors. |
Andrew Scull | 1883487 | 2018-10-12 11:48:09 +0100 | [diff] [blame] | 3 | * |
Andrew Walbran | e959ec1 | 2020-06-17 15:01:09 +0100 | [diff] [blame] | 4 | * Use of this source code is governed by a BSD-style |
| 5 | * license that can be found in the LICENSE file or at |
| 6 | * https://opensource.org/licenses/BSD-3-Clause. |
Andrew Scull | 1883487 | 2018-10-12 11:48:09 +0100 | [diff] [blame] | 7 | */ |
| 8 | |
Andrew Scull | fbc938a | 2018-08-20 14:09:28 +0100 | [diff] [blame] | 9 | #pragma once |
Wedson Almeida Filho | 987c0ff | 2018-06-20 16:34:38 +0100 | [diff] [blame] | 10 | |
Andrew Scull | 9726c25 | 2019-01-23 13:44:19 +0000 | [diff] [blame] | 11 | #include <stdatomic.h> |
| 12 | |
Olivier Deprez | febf9e6 | 2023-03-02 15:44:35 +0100 | [diff] [blame] | 13 | #include "hf/arch/vm/vm.h" |
Andrew Walbran | 1f32e72 | 2019-06-07 17:57:26 +0100 | [diff] [blame] | 14 | |
Andrew Scull | 18c78fc | 2018-08-20 12:57:41 +0100 | [diff] [blame] | 15 | #include "hf/cpu.h" |
Madhukar Pappireddy | 464f246 | 2021-08-03 11:23:07 -0500 | [diff] [blame] | 16 | #include "hf/interrupt_desc.h" |
Wedson Almeida Filho | ea62e2e | 2019-01-09 19:14:59 +0000 | [diff] [blame] | 17 | #include "hf/list.h" |
Andrew Scull | 18c78fc | 2018-08-20 12:57:41 +0100 | [diff] [blame] | 18 | #include "hf/mm.h" |
Wedson Almeida Filho | 22d5eaa | 2018-12-16 00:38:49 +0000 | [diff] [blame] | 19 | #include "hf/mpool.h" |
Jose Marinho | 75509b4 | 2019-04-09 09:34:59 +0100 | [diff] [blame] | 20 | |
Andrew Walbran | b5ab43c | 2020-04-30 11:32:54 +0100 | [diff] [blame] | 21 | #include "vmapi/hf/ffa.h" |
Wedson Almeida Filho | 987c0ff | 2018-06-20 16:34:38 +0100 | [diff] [blame] | 22 | |
Andrew Scull | ae9962e | 2019-10-03 16:51:16 +0100 | [diff] [blame] | 23 | #define MAX_SMCS 32 |
Andrew Walbran | c1ad4ce | 2019-05-09 11:41:39 +0100 | [diff] [blame] | 24 | #define LOG_BUFFER_SIZE 256 |
Madhukar Pappireddy | 464f246 | 2021-08-03 11:23:07 -0500 | [diff] [blame] | 25 | #define VM_MANIFEST_MAX_INTERRUPTS 32 |
Andrew Walbran | c1ad4ce | 2019-05-09 11:41:39 +0100 | [diff] [blame] | 26 | |
Madhukar Pappireddy | 5c04a38 | 2022-12-28 11:29:26 -0600 | [diff] [blame] | 27 | /** Action for Other-Secure interrupts by SPMC. */ |
| 28 | #define OTHER_S_INT_ACTION_QUEUED 0 |
| 29 | #define OTHER_S_INT_ACTION_SIGNALED 1 |
| 30 | |
Andrew Walbran | a36f759 | 2019-12-13 18:43:38 +0000 | [diff] [blame] | 31 | /** |
Olivier Deprez | 2013775 | 2023-02-07 10:55:35 +0100 | [diff] [blame] | 32 | * Power management bifields stating which messages a VM is willing to be |
| 33 | * notified about. |
| 34 | */ |
| 35 | #define VM_POWER_MANAGEMENT_CPU_OFF_SHIFT (0) |
| 36 | #define VM_POWER_MANAGEMENT_CPU_ON_SHIFT (3) |
| 37 | |
| 38 | /** |
J-Alves | e8c8c2b | 2022-12-16 15:34:48 +0000 | [diff] [blame] | 39 | * The state of an RX buffer, as defined by FF-A v1.1 EAC0 specification. |
| 40 | * It is used to implement ownership rules, as defined in the section 6.2.2.4.2. |
Andrew Walbran | a36f759 | 2019-12-13 18:43:38 +0000 | [diff] [blame] | 41 | * |
J-Alves | e8c8c2b | 2022-12-16 15:34:48 +0000 | [diff] [blame] | 42 | * EMPTY is the initial state. It is set by default to the endpoints at the |
| 43 | * virtual instance. |
| 44 | * The follow state transitions are possible: |
| 45 | * * EMPTY => FULL: message sent to a partition. Ownership given to the |
| 46 | * partition. |
| 47 | * * EMPTY => OTHER_WORLD_OWNED: This state transition only applies to NWd VMs. |
| 48 | * Used by the SPMC or Hypervisor to track that ownership of the RX buffer |
| 49 | * belong to the other world: |
| 50 | * - The Hypervisor does this state transition after forwarding |
| 51 | * FFA_RXTX_MAP call to the SPMC, for it to map a VM's RXTX buffers into SPMC's |
| 52 | * translation regime. |
| 53 | * - SPMC was previously given ownership of the VM's RX buffer, after the |
| 54 | * FFA_RXTX_MAP interface has been successfully forwarded to it. The SPMC does |
| 55 | * this state transition, when handling a successful FFA_RX_ACQUIRE, assigning |
| 56 | * ownership to the hypervisor. |
| 57 | * * FULL => EMPTY: Partition received an RX buffer full notification, consumed |
| 58 | * the content of buffers, and called FFA_RX_RELEASE or FFA_MSG_WAIT. SPMC or |
| 59 | * Hypervisor's ownership reestablished. |
| 60 | * * OTHER_WORLD_OWNED => EMPTY: VM called FFA_RX_RELEASE, the hypervisor |
| 61 | * forwarded it to the SPMC, which reestablishes ownership of the VM's buffer. |
| 62 | * SPs should never have their buffers state set to OTHER_WORLD_OWNED. |
Andrew Walbran | a36f759 | 2019-12-13 18:43:38 +0000 | [diff] [blame] | 63 | */ |
Andrew Scull | aa039b3 | 2018-10-04 15:02:26 +0100 | [diff] [blame] | 64 | enum mailbox_state { |
Andrew Walbran | c3910f7 | 2018-11-27 14:24:36 +0000 | [diff] [blame] | 65 | /** There is no message in the mailbox. */ |
Andrew Scull | d6ee110 | 2019-04-05 22:12:42 +0100 | [diff] [blame] | 66 | MAILBOX_STATE_EMPTY, |
Andrew Scull | aa039b3 | 2018-10-04 15:02:26 +0100 | [diff] [blame] | 67 | |
Andrew Walbran | c3910f7 | 2018-11-27 14:24:36 +0000 | [diff] [blame] | 68 | /** There is a message in the mailbox that is waiting for a reader. */ |
J-Alves | e8c8c2b | 2022-12-16 15:34:48 +0000 | [diff] [blame] | 69 | MAILBOX_STATE_FULL, |
Andrew Scull | aa039b3 | 2018-10-04 15:02:26 +0100 | [diff] [blame] | 70 | |
J-Alves | e8c8c2b | 2022-12-16 15:34:48 +0000 | [diff] [blame] | 71 | /** |
| 72 | * In the SPMC, it means the Hypervisor/OS Kernel owns the RX buffer. |
| 73 | * In the Hypervisor, it means the SPMC owns the Rx buffer. |
| 74 | */ |
| 75 | MAILBOX_STATE_OTHER_WORLD_OWNED, |
Wedson Almeida Filho | 2f94ec1 | 2018-07-26 16:00:48 +0100 | [diff] [blame] | 76 | }; |
| 77 | |
Wedson Almeida Filho | ea62e2e | 2019-01-09 19:14:59 +0000 | [diff] [blame] | 78 | struct wait_entry { |
| 79 | /** The VM that is waiting for a mailbox to become writable. */ |
| 80 | struct vm *waiting_vm; |
| 81 | |
| 82 | /** |
| 83 | * Links used to add entry to a VM's waiter_list. This is protected by |
| 84 | * the notifying VM's lock. |
| 85 | */ |
| 86 | struct list_entry wait_links; |
| 87 | |
| 88 | /** |
| 89 | * Links used to add entry to a VM's ready_list. This is protected by |
| 90 | * the waiting VM's lock. |
| 91 | */ |
| 92 | struct list_entry ready_links; |
| 93 | }; |
| 94 | |
Andrew Scull | aa039b3 | 2018-10-04 15:02:26 +0100 | [diff] [blame] | 95 | struct mailbox { |
| 96 | enum mailbox_state state; |
Andrew Walbran | 70bc862 | 2019-10-07 14:15:58 +0100 | [diff] [blame] | 97 | void *recv; |
| 98 | const void *send; |
| 99 | |
| 100 | /** The ID of the VM which sent the message currently in `recv`. */ |
Andrew Walbran | b5ab43c | 2020-04-30 11:32:54 +0100 | [diff] [blame] | 101 | ffa_vm_id_t recv_sender; |
Andrew Walbran | 70bc862 | 2019-10-07 14:15:58 +0100 | [diff] [blame] | 102 | |
| 103 | /** The size of the message currently in `recv`. */ |
| 104 | uint32_t recv_size; |
| 105 | |
Andrew Walbran | e7ad3c0 | 2019-12-24 17:03:04 +0000 | [diff] [blame] | 106 | /** |
Andrew Walbran | b5ab43c | 2020-04-30 11:32:54 +0100 | [diff] [blame] | 107 | * The FF-A function ID to use to deliver the message currently in |
Andrew Walbran | e7ad3c0 | 2019-12-24 17:03:04 +0000 | [diff] [blame] | 108 | * `recv`. |
| 109 | */ |
| 110 | uint32_t recv_func; |
Wedson Almeida Filho | ea62e2e | 2019-01-09 19:14:59 +0000 | [diff] [blame] | 111 | |
| 112 | /** |
| 113 | * List of wait_entry structs representing VMs that want to be notified |
| 114 | * when the mailbox becomes writable. Once the mailbox does become |
| 115 | * writable, the entry is removed from this list and added to the |
| 116 | * waiting VM's ready_list. |
| 117 | */ |
| 118 | struct list_entry waiter_list; |
| 119 | |
| 120 | /** |
| 121 | * List of wait_entry structs representing VMs whose mailboxes became |
| 122 | * writable since the owner of the mailbox registers for notification. |
| 123 | */ |
| 124 | struct list_entry ready_list; |
Wedson Almeida Filho | 2f94ec1 | 2018-07-26 16:00:48 +0100 | [diff] [blame] | 125 | }; |
| 126 | |
J-Alves | 4ef6e84 | 2021-03-18 12:47:01 +0000 | [diff] [blame] | 127 | struct notifications_state { |
| 128 | /** |
| 129 | * To keep track of the notifications pending. |
| 130 | * Set on call to FFA_NOTIFICATION_SET, and cleared on call to |
| 131 | * FFA_NOTIFICATION_GET. |
| 132 | */ |
| 133 | ffa_notifications_bitmap_t pending; |
| 134 | |
| 135 | /** |
| 136 | * Set on FFA_NOTIFICATION_INFO_GET to keep track of the notifications |
| 137 | * whose information has been retrieved by the referred ABI. |
| 138 | * Cleared on call to FFA_NOTIFICATION_GET. |
| 139 | */ |
| 140 | ffa_notifications_bitmap_t info_get_retrieved; |
| 141 | }; |
| 142 | |
| 143 | struct notifications { |
| 144 | /** |
| 145 | * The following array maps the notifications to the bound FF-A |
| 146 | * endpoint. |
| 147 | * The index in the bindings array relates to the notification |
| 148 | * ID, and bit position in 'ffa_notifications_bitmap_t'. |
| 149 | */ |
| 150 | ffa_vm_id_t bindings_sender_id[MAX_FFA_NOTIFICATIONS]; |
| 151 | ffa_notifications_bitmap_t bindings_per_vcpu; |
| 152 | |
Raghu Krishnamurthy | f5fec20 | 2022-09-30 07:25:10 -0700 | [diff] [blame] | 153 | /* The index of the array below relates to the ID of the VCPU. |
| 154 | * This is a dynamically allocated array of struct |
| 155 | * notifications_state and has as many entries as vcpu_count. |
| 156 | */ |
| 157 | struct notifications_state *per_vcpu; |
J-Alves | 4ef6e84 | 2021-03-18 12:47:01 +0000 | [diff] [blame] | 158 | struct notifications_state global; |
| 159 | }; |
| 160 | |
J-Alves | c8e8a22 | 2021-06-08 17:33:52 +0100 | [diff] [blame] | 161 | /** |
| 162 | * The following enum relates to a state machine to guide the insertion of |
| 163 | * IDs in the respective list as a result of a FFA_NOTIFICATION_INFO_GET call. |
| 164 | * As per the FF-A v1.1 specification, the return of the interface |
| 165 | * FFA_NOTIFICATION_INFO_GET, is a list of 16-bit values, regarding the VM ID |
| 166 | * and VCPU IDs of those with pending notifications. |
| 167 | * The overall list, is composed of "sub-lists", that starts with the VM ID, and |
| 168 | * can follow with up to 3 more VCPU IDs. A VM can have multiple 'sub-lists'. |
| 169 | * The states are traversed on a per VM basis, and should help with filling the |
| 170 | * list of IDs. |
| 171 | * |
| 172 | * INIT is the initial state. The following state transitions are possible: |
| 173 | * * INIT => INSERTING: no list has been created for the VM prior. There are |
| 174 | * notifications pending and VM ID should be inserted first. If it regards to |
| 175 | * a per VCPU notification the VCPU ID should follow. Only VCPU IDs should be |
| 176 | * inserted from this point, until reaching "sub-list" size limit. |
| 177 | * * INIT => FULL: There is no space in the ID list to insert IDs. |
| 178 | * * INSERTING => STARTING_NEW: list has been created. Adding only VCPU IDs, |
| 179 | * however "sub-list" limit has been reached. If there are more pending per VCPU |
| 180 | * notifications pending for the VM, a new list should be created starting with |
| 181 | * VM ID. |
| 182 | * * INSERTING => FULL: There is no space in the ID list to insert IDs. |
| 183 | * * STARTING_NEW => INSERTING: Started a new 'sub-list' for the given VM, for |
| 184 | * the remaining pending per VCPU notifications, only the VCPU ID should be |
| 185 | * inserted. |
| 186 | * * STARTING_NEW => FULL: There is no space in the ID list to insert IDs. |
| 187 | */ |
| 188 | enum notifications_info_get_state { |
| 189 | INIT, |
| 190 | INSERTING, |
| 191 | STARTING_NEW, |
| 192 | FULL, |
| 193 | }; |
| 194 | |
Andrew Scull | ae9962e | 2019-10-03 16:51:16 +0100 | [diff] [blame] | 195 | struct smc_whitelist { |
| 196 | uint32_t smcs[MAX_SMCS]; |
| 197 | uint16_t smc_count; |
| 198 | bool permissive; |
| 199 | }; |
| 200 | |
Wedson Almeida Filho | 987c0ff | 2018-06-20 16:34:38 +0100 | [diff] [blame] | 201 | struct vm { |
Andrew Walbran | b5ab43c | 2020-04-30 11:32:54 +0100 | [diff] [blame] | 202 | ffa_vm_id_t id; |
Fuad Tabba | e4efcc3 | 2020-07-16 15:37:27 +0100 | [diff] [blame] | 203 | struct ffa_uuid uuid; |
Daniel Boulby | baeaf2e | 2021-12-09 11:42:36 +0000 | [diff] [blame] | 204 | uint32_t ffa_version; |
Andrew Scull | ae9962e | 2019-10-03 16:51:16 +0100 | [diff] [blame] | 205 | struct smc_whitelist smc_whitelist; |
| 206 | |
Andrew Walbran | 0d7a068 | 2018-12-06 16:48:47 +0000 | [diff] [blame] | 207 | /** See api.c for the partial ordering on locks. */ |
Wedson Almeida Filho | 2f94ec1 | 2018-07-26 16:00:48 +0100 | [diff] [blame] | 208 | struct spinlock lock; |
Andrew Walbran | b5ab43c | 2020-04-30 11:32:54 +0100 | [diff] [blame] | 209 | ffa_vcpu_count_t vcpu_count; |
Raghu Krishnamurthy | 30aabd6 | 2022-09-17 21:41:00 -0700 | [diff] [blame] | 210 | struct vcpu *vcpus; |
Andrew Scull | 89a7524 | 2018-08-06 17:04:55 +0100 | [diff] [blame] | 211 | struct mm_ptable ptable; |
Andrew Scull | aa039b3 | 2018-10-04 15:02:26 +0100 | [diff] [blame] | 212 | struct mailbox mailbox; |
J-Alves | 4ef6e84 | 2021-03-18 12:47:01 +0000 | [diff] [blame] | 213 | |
| 214 | struct { |
| 215 | /** |
| 216 | * State structures for notifications coming from VMs or coming |
| 217 | * from SPs. Both fields are maintained by the SPMC. |
| 218 | * The hypervisor ignores the 'from_sp' field, given VM |
| 219 | * notifications from SPs are managed by the SPMC. |
| 220 | */ |
| 221 | struct notifications from_vm; |
| 222 | struct notifications from_sp; |
J-Alves | 52578f8 | 2022-03-25 12:30:47 +0000 | [diff] [blame] | 223 | struct notifications_state framework; |
J-Alves | 4ef6e84 | 2021-03-18 12:47:01 +0000 | [diff] [blame] | 224 | bool enabled; |
J-Alves | 6e2abc6 | 2021-12-02 14:58:56 +0000 | [diff] [blame] | 225 | bool npi_injected; |
J-Alves | 4ef6e84 | 2021-03-18 12:47:01 +0000 | [diff] [blame] | 226 | } notifications; |
| 227 | |
Andrew Walbran | c1ad4ce | 2019-05-09 11:41:39 +0100 | [diff] [blame] | 228 | char log_buffer[LOG_BUFFER_SIZE]; |
Andrew Scull | ae9962e | 2019-10-03 16:51:16 +0100 | [diff] [blame] | 229 | uint16_t log_buffer_length; |
Wedson Almeida Filho | ea62e2e | 2019-01-09 19:14:59 +0000 | [diff] [blame] | 230 | |
Andrew Walbran | f76f575 | 2019-12-03 18:33:08 +0000 | [diff] [blame] | 231 | /** |
| 232 | * Wait entries to be used when waiting on other VM mailboxes. See |
| 233 | * comments on `struct wait_entry` for the lock discipline of these. |
| 234 | */ |
Wedson Almeida Filho | b790f65 | 2019-01-22 23:41:56 +0000 | [diff] [blame] | 235 | struct wait_entry wait_entries[MAX_VMS]; |
Andrew Scull | 9726c25 | 2019-01-23 13:44:19 +0000 | [diff] [blame] | 236 | |
| 237 | atomic_bool aborting; |
Andrew Walbran | 1f32e72 | 2019-06-07 17:57:26 +0100 | [diff] [blame] | 238 | |
J-Alves | b37fd08 | 2020-10-22 12:29:21 +0100 | [diff] [blame] | 239 | /** |
Max Shvetsov | 40108e7 | 2020-08-27 12:39:50 +0100 | [diff] [blame] | 240 | * Booting parameters (FF-A SP partitions). |
J-Alves | b37fd08 | 2020-10-22 12:29:21 +0100 | [diff] [blame] | 241 | */ |
J-Alves | b37fd08 | 2020-10-22 12:29:21 +0100 | [diff] [blame] | 242 | uint16_t boot_order; |
J-Alves | 7d38f7b | 2022-04-13 13:22:30 +0100 | [diff] [blame] | 243 | |
| 244 | /** Entries to pass boot data to the VM. */ |
| 245 | struct { |
| 246 | uint32_t gp_register_num; |
| 247 | ipaddr_t blob_addr; |
| 248 | } boot_info; |
| 249 | |
Maksims Svecovs | b596eab | 2021-04-27 00:52:27 +0100 | [diff] [blame] | 250 | uint8_t messaging_method; |
Madhukar Pappireddy | 8415405 | 2022-06-21 18:30:25 -0500 | [diff] [blame] | 251 | |
| 252 | /** |
| 253 | * Action specified by a Partition through the manifest in response to |
| 254 | * non secure interrupt. |
| 255 | */ |
| 256 | uint8_t ns_interrupts_action; |
Madhukar Pappireddy | 5c04a38 | 2022-12-28 11:29:26 -0600 | [diff] [blame] | 257 | |
| 258 | /** |
| 259 | * Action specified by a Partition through the manifest in response to |
| 260 | * Other-S-Int. |
| 261 | */ |
| 262 | uint8_t other_s_interrupts_action; |
Madhukar Pappireddy | 046dad0 | 2022-06-21 18:43:33 -0500 | [diff] [blame] | 263 | bool me_signal_virq; |
J-Alves | b37fd08 | 2020-10-22 12:29:21 +0100 | [diff] [blame] | 264 | |
Max Shvetsov | 40108e7 | 2020-08-27 12:39:50 +0100 | [diff] [blame] | 265 | /** |
Olivier Deprez | a15f235 | 2022-09-26 09:17:24 +0200 | [diff] [blame] | 266 | * Bitmask reporting the power management events that a partition |
| 267 | * requests to the signaled about. |
| 268 | */ |
| 269 | uint32_t power_management; |
| 270 | |
| 271 | /** |
Max Shvetsov | 40108e7 | 2020-08-27 12:39:50 +0100 | [diff] [blame] | 272 | * Secondary entry point supplied by FFA_SECONDARY_EP_REGISTER used |
| 273 | * for cold and warm boot of SP execution contexts. |
| 274 | */ |
| 275 | ipaddr_t secondary_ep; |
| 276 | |
Andrew Walbran | 1f32e72 | 2019-06-07 17:57:26 +0100 | [diff] [blame] | 277 | /** Arch-specific VM information. */ |
| 278 | struct arch_vm arch; |
Raghu Krishnamurthy | cd1eceb | 2021-01-04 12:20:48 -0800 | [diff] [blame] | 279 | bool el0_partition; |
Madhukar Pappireddy | 464f246 | 2021-08-03 11:23:07 -0500 | [diff] [blame] | 280 | |
| 281 | /** Interrupt descriptor */ |
| 282 | struct interrupt_descriptor interrupt_desc[VM_MANIFEST_MAX_INTERRUPTS]; |
Wedson Almeida Filho | ea62e2e | 2019-01-09 19:14:59 +0000 | [diff] [blame] | 283 | }; |
| 284 | |
| 285 | /** Encapsulates a VM whose lock is held. */ |
| 286 | struct vm_locked { |
| 287 | struct vm *vm; |
Wedson Almeida Filho | 987c0ff | 2018-06-20 16:34:38 +0100 | [diff] [blame] | 288 | }; |
| 289 | |
Jose Marinho | 75509b4 | 2019-04-09 09:34:59 +0100 | [diff] [blame] | 290 | /** Container for two vm_locked structures */ |
| 291 | struct two_vm_locked { |
| 292 | struct vm_locked vm1; |
| 293 | struct vm_locked vm2; |
| 294 | }; |
| 295 | |
Andrew Walbran | b5ab43c | 2020-04-30 11:32:54 +0100 | [diff] [blame] | 296 | struct vm *vm_init(ffa_vm_id_t id, ffa_vcpu_count_t vcpu_count, |
Raghu Krishnamurthy | cd1eceb | 2021-01-04 12:20:48 -0800 | [diff] [blame] | 297 | struct mpool *ppool, bool el0_partition); |
Andrew Walbran | b5ab43c | 2020-04-30 11:32:54 +0100 | [diff] [blame] | 298 | bool vm_init_next(ffa_vcpu_count_t vcpu_count, struct mpool *ppool, |
Raghu Krishnamurthy | cd1eceb | 2021-01-04 12:20:48 -0800 | [diff] [blame] | 299 | struct vm **new_vm, bool el0_partition); |
Andrew Walbran | b5ab43c | 2020-04-30 11:32:54 +0100 | [diff] [blame] | 300 | ffa_vm_count_t vm_get_count(void); |
| 301 | struct vm *vm_find(ffa_vm_id_t id); |
J-Alves | 46ee068 | 2021-07-26 15:17:53 +0100 | [diff] [blame] | 302 | struct vm_locked vm_find_locked(ffa_vm_id_t id); |
Fuad Tabba | e4efcc3 | 2020-07-16 15:37:27 +0100 | [diff] [blame] | 303 | struct vm *vm_find_index(uint16_t index); |
Andrew Walbran | 7e932bd | 2019-04-29 16:47:06 +0100 | [diff] [blame] | 304 | struct vm_locked vm_lock(struct vm *vm); |
Jose Marinho | 75509b4 | 2019-04-09 09:34:59 +0100 | [diff] [blame] | 305 | struct two_vm_locked vm_lock_both(struct vm *vm1, struct vm *vm2); |
Wedson Almeida Filho | ea62e2e | 2019-01-09 19:14:59 +0000 | [diff] [blame] | 306 | void vm_unlock(struct vm_locked *locked); |
Andrew Walbran | b5ab43c | 2020-04-30 11:32:54 +0100 | [diff] [blame] | 307 | struct vcpu *vm_get_vcpu(struct vm *vm, ffa_vcpu_index_t vcpu_index); |
| 308 | struct wait_entry *vm_get_wait_entry(struct vm *vm, ffa_vm_id_t for_vm); |
| 309 | ffa_vm_id_t vm_id_for_wait_entry(struct vm *vm, struct wait_entry *entry); |
Andrew Walbran | 45633dd | 2020-10-07 17:59:54 +0100 | [diff] [blame] | 310 | bool vm_id_is_current_world(ffa_vm_id_t vm_id); |
J-Alves | 122f1a1 | 2022-12-12 15:55:42 +0000 | [diff] [blame] | 311 | bool vm_is_mailbox_busy(struct vm_locked to); |
J-Alves | e8c8c2b | 2022-12-16 15:34:48 +0000 | [diff] [blame] | 312 | bool vm_is_mailbox_other_world_owned(struct vm_locked to); |
Andrew Scull | 3c25745 | 2019-11-26 13:32:50 +0000 | [diff] [blame] | 313 | bool vm_identity_map(struct vm_locked vm_locked, paddr_t begin, paddr_t end, |
| 314 | uint32_t mode, struct mpool *ppool, ipaddr_t *ipa); |
| 315 | bool vm_identity_prepare(struct vm_locked vm_locked, paddr_t begin, paddr_t end, |
| 316 | uint32_t mode, struct mpool *ppool); |
| 317 | void vm_identity_commit(struct vm_locked vm_locked, paddr_t begin, paddr_t end, |
| 318 | uint32_t mode, struct mpool *ppool, ipaddr_t *ipa); |
| 319 | bool vm_unmap(struct vm_locked vm_locked, paddr_t begin, paddr_t end, |
| 320 | struct mpool *ppool); |
Raghu Krishnamurthy | 7ad3d14 | 2021-03-28 00:47:35 -0700 | [diff] [blame] | 321 | void vm_ptable_defrag(struct vm_locked vm_locked, struct mpool *ppool); |
Andrew Scull | 3c25745 | 2019-11-26 13:32:50 +0000 | [diff] [blame] | 322 | bool vm_unmap_hypervisor(struct vm_locked vm_locked, struct mpool *ppool); |
J-Alves | b37fd08 | 2020-10-22 12:29:21 +0100 | [diff] [blame] | 323 | |
Raghu Krishnamurthy | ea195fa | 2021-02-12 23:29:00 -0800 | [diff] [blame] | 324 | bool vm_mem_get_mode(struct vm_locked vm_locked, ipaddr_t begin, ipaddr_t end, |
| 325 | uint32_t *mode); |
Raghu Krishnamurthy | f5fec20 | 2022-09-30 07:25:10 -0700 | [diff] [blame] | 326 | void vm_notifications_init(struct vm *vm, ffa_vcpu_count_t vcpu_count, |
| 327 | struct mpool *ppool); |
J-Alves | 6665225 | 2022-07-06 09:49:51 +0100 | [diff] [blame] | 328 | bool vm_mailbox_state_busy(struct vm_locked vm_locked); |
J-Alves | a0f317d | 2021-06-09 13:31:59 +0100 | [diff] [blame] | 329 | bool vm_are_notifications_pending(struct vm_locked vm_locked, bool from_vm, |
| 330 | ffa_notifications_bitmap_t notifications); |
J-Alves | e8c8c2b | 2022-12-16 15:34:48 +0000 | [diff] [blame] | 331 | bool vm_are_fwk_notifications_pending(struct vm_locked vm_locked); |
J-Alves | 7461ef2 | 2021-10-18 17:21:33 +0100 | [diff] [blame] | 332 | bool vm_are_global_notifications_pending(struct vm_locked vm_locked); |
| 333 | bool vm_are_per_vcpu_notifications_pending(struct vm_locked vm_locked, |
| 334 | ffa_vcpu_index_t vcpu_id); |
J-Alves | 09ff9d8 | 2021-11-02 11:55:20 +0000 | [diff] [blame] | 335 | bool vm_are_notifications_enabled(struct vm *vm); |
| 336 | bool vm_locked_are_notifications_enabled(struct vm_locked vm_locked); |
J-Alves | c003a7a | 2021-03-18 13:06:53 +0000 | [diff] [blame] | 337 | bool vm_notifications_validate_per_vcpu(struct vm_locked vm_locked, |
| 338 | bool is_from_vm, bool is_per_vcpu, |
| 339 | ffa_notifications_bitmap_t notif); |
| 340 | bool vm_notifications_validate_bound_sender( |
| 341 | struct vm_locked vm_locked, bool is_from_vm, ffa_vm_id_t sender_id, |
| 342 | ffa_notifications_bitmap_t notifications); |
| 343 | bool vm_notifications_validate_binding(struct vm_locked vm_locked, |
| 344 | bool is_from_vm, ffa_vm_id_t sender_id, |
| 345 | ffa_notifications_bitmap_t notifications, |
| 346 | bool is_per_vcpu); |
| 347 | void vm_notifications_update_bindings(struct vm_locked vm_locked, |
| 348 | bool is_from_vm, ffa_vm_id_t sender_id, |
| 349 | ffa_notifications_bitmap_t notifications, |
| 350 | bool is_per_vcpu); |
J-Alves | 5a16c96 | 2022-03-25 12:32:51 +0000 | [diff] [blame] | 351 | void vm_notifications_partition_set_pending( |
| 352 | struct vm_locked vm_locked, bool is_from_vm, |
| 353 | ffa_notifications_bitmap_t notifications, ffa_vcpu_index_t vcpu_id, |
| 354 | bool is_per_vcpu); |
J-Alves | 5136dda | 2022-03-25 12:26:38 +0000 | [diff] [blame] | 355 | ffa_notifications_bitmap_t vm_notifications_partition_get_pending( |
| 356 | struct vm_locked vm_locked, bool is_from_vm, ffa_vcpu_index_t vcpu_id); |
J-Alves | 14163a7 | 2022-03-25 14:01:34 +0000 | [diff] [blame] | 357 | void vm_notifications_framework_set_pending( |
| 358 | struct vm_locked vm_locked, ffa_notifications_bitmap_t notifications); |
J-Alves | 663682a | 2022-03-25 13:56:51 +0000 | [diff] [blame] | 359 | ffa_notifications_bitmap_t vm_notifications_framework_get_pending( |
| 360 | struct vm_locked vm_locked); |
J-Alves | c8e8a22 | 2021-06-08 17:33:52 +0100 | [diff] [blame] | 361 | void vm_notifications_info_get_pending( |
| 362 | struct vm_locked vm_locked, bool is_from_vm, uint16_t *ids, |
| 363 | uint32_t *ids_count, uint32_t *lists_sizes, uint32_t *lists_count, |
| 364 | const uint32_t ids_max_count, |
| 365 | enum notifications_info_get_state *info_get_state); |
J-Alves | fe23ebe | 2021-10-13 16:07:07 +0100 | [diff] [blame] | 366 | bool vm_notifications_pending_not_retrieved_by_scheduler(void); |
| 367 | bool vm_is_notifications_pending_count_zero(void); |
J-Alves | c8e8a22 | 2021-06-08 17:33:52 +0100 | [diff] [blame] | 368 | bool vm_notifications_info_get(struct vm_locked vm_locked, uint16_t *ids, |
| 369 | uint32_t *ids_count, uint32_t *lists_sizes, |
| 370 | uint32_t *lists_count, |
| 371 | const uint32_t ids_max_count); |
J-Alves | 439ac97 | 2021-11-18 17:32:03 +0000 | [diff] [blame] | 372 | bool vm_supports_messaging_method(struct vm *vm, uint8_t messaging_method); |
J-Alves | 6e2abc6 | 2021-12-02 14:58:56 +0000 | [diff] [blame] | 373 | void vm_notifications_set_npi_injected(struct vm_locked vm_locked, |
| 374 | bool npi_injected); |
| 375 | bool vm_notifications_is_npi_injected(struct vm_locked vm_locked); |
J-Alves | 7d38f7b | 2022-04-13 13:22:30 +0100 | [diff] [blame] | 376 | void vm_set_boot_info_gp_reg(struct vm *vm, struct vcpu *vcpu); |
Olivier Deprez | 2013775 | 2023-02-07 10:55:35 +0100 | [diff] [blame] | 377 | |
| 378 | /** |
| 379 | * Returns true if the VM requested to receive cpu on power management |
| 380 | * events. |
| 381 | */ |
| 382 | static inline bool vm_power_management_cpu_on_requested(struct vm *vm) |
| 383 | { |
| 384 | return (vm->power_management & |
| 385 | (UINT32_C(1) << VM_POWER_MANAGEMENT_CPU_ON_SHIFT)) != 0; |
| 386 | } |
| 387 | |
| 388 | /** |
| 389 | * Returns true if the VM requested to receive cpu off power management |
| 390 | * events. |
| 391 | */ |
| 392 | static inline bool vm_power_management_cpu_off_requested(struct vm *vm) |
| 393 | { |
| 394 | return (vm->power_management & |
| 395 | (UINT32_C(1) << VM_POWER_MANAGEMENT_CPU_OFF_SHIFT)) != 0; |
| 396 | } |