18c2ecf20Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-only 28c2ecf20Sopenharmony_ci/* 38c2ecf20Sopenharmony_ci * VMware VMCI Driver 48c2ecf20Sopenharmony_ci * 58c2ecf20Sopenharmony_ci * Copyright (C) 2012 VMware, Inc. All rights reserved. 68c2ecf20Sopenharmony_ci */ 78c2ecf20Sopenharmony_ci 88c2ecf20Sopenharmony_ci#include <linux/vmw_vmci_defs.h> 98c2ecf20Sopenharmony_ci#include <linux/vmw_vmci_api.h> 108c2ecf20Sopenharmony_ci#include <linux/highmem.h> 118c2ecf20Sopenharmony_ci#include <linux/kernel.h> 128c2ecf20Sopenharmony_ci#include <linux/module.h> 138c2ecf20Sopenharmony_ci#include <linux/sched.h> 148c2ecf20Sopenharmony_ci#include <linux/cred.h> 158c2ecf20Sopenharmony_ci#include <linux/slab.h> 168c2ecf20Sopenharmony_ci 178c2ecf20Sopenharmony_ci#include "vmci_queue_pair.h" 188c2ecf20Sopenharmony_ci#include "vmci_datagram.h" 198c2ecf20Sopenharmony_ci#include "vmci_doorbell.h" 208c2ecf20Sopenharmony_ci#include "vmci_context.h" 218c2ecf20Sopenharmony_ci#include "vmci_driver.h" 228c2ecf20Sopenharmony_ci#include "vmci_event.h" 238c2ecf20Sopenharmony_ci 248c2ecf20Sopenharmony_ci/* Use a wide upper bound for the maximum contexts. */ 258c2ecf20Sopenharmony_ci#define VMCI_MAX_CONTEXTS 2000 268c2ecf20Sopenharmony_ci 278c2ecf20Sopenharmony_ci/* 288c2ecf20Sopenharmony_ci * List of current VMCI contexts. Contexts can be added by 298c2ecf20Sopenharmony_ci * vmci_ctx_create() and removed via vmci_ctx_destroy(). 308c2ecf20Sopenharmony_ci * These, along with context lookup, are protected by the 318c2ecf20Sopenharmony_ci * list structure's lock. 328c2ecf20Sopenharmony_ci */ 338c2ecf20Sopenharmony_cistatic struct { 348c2ecf20Sopenharmony_ci struct list_head head; 358c2ecf20Sopenharmony_ci spinlock_t lock; /* Spinlock for context list operations */ 368c2ecf20Sopenharmony_ci} ctx_list = { 378c2ecf20Sopenharmony_ci .head = LIST_HEAD_INIT(ctx_list.head), 388c2ecf20Sopenharmony_ci .lock = __SPIN_LOCK_UNLOCKED(ctx_list.lock), 398c2ecf20Sopenharmony_ci}; 408c2ecf20Sopenharmony_ci 418c2ecf20Sopenharmony_ci/* Used by contexts that did not set up notify flag pointers */ 428c2ecf20Sopenharmony_cistatic bool ctx_dummy_notify; 438c2ecf20Sopenharmony_ci 448c2ecf20Sopenharmony_cistatic void ctx_signal_notify(struct vmci_ctx *context) 458c2ecf20Sopenharmony_ci{ 468c2ecf20Sopenharmony_ci *context->notify = true; 478c2ecf20Sopenharmony_ci} 488c2ecf20Sopenharmony_ci 498c2ecf20Sopenharmony_cistatic void ctx_clear_notify(struct vmci_ctx *context) 508c2ecf20Sopenharmony_ci{ 518c2ecf20Sopenharmony_ci *context->notify = false; 528c2ecf20Sopenharmony_ci} 538c2ecf20Sopenharmony_ci 548c2ecf20Sopenharmony_ci/* 558c2ecf20Sopenharmony_ci * If nothing requires the attention of the guest, clears both 568c2ecf20Sopenharmony_ci * notify flag and call. 578c2ecf20Sopenharmony_ci */ 588c2ecf20Sopenharmony_cistatic void ctx_clear_notify_call(struct vmci_ctx *context) 598c2ecf20Sopenharmony_ci{ 608c2ecf20Sopenharmony_ci if (context->pending_datagrams == 0 && 618c2ecf20Sopenharmony_ci vmci_handle_arr_get_size(context->pending_doorbell_array) == 0) 628c2ecf20Sopenharmony_ci ctx_clear_notify(context); 638c2ecf20Sopenharmony_ci} 648c2ecf20Sopenharmony_ci 658c2ecf20Sopenharmony_ci/* 668c2ecf20Sopenharmony_ci * Sets the context's notify flag iff datagrams are pending for this 678c2ecf20Sopenharmony_ci * context. Called from vmci_setup_notify(). 688c2ecf20Sopenharmony_ci */ 698c2ecf20Sopenharmony_civoid vmci_ctx_check_signal_notify(struct vmci_ctx *context) 708c2ecf20Sopenharmony_ci{ 718c2ecf20Sopenharmony_ci spin_lock(&context->lock); 728c2ecf20Sopenharmony_ci if (context->pending_datagrams) 738c2ecf20Sopenharmony_ci ctx_signal_notify(context); 748c2ecf20Sopenharmony_ci spin_unlock(&context->lock); 758c2ecf20Sopenharmony_ci} 768c2ecf20Sopenharmony_ci 778c2ecf20Sopenharmony_ci/* 788c2ecf20Sopenharmony_ci * Allocates and initializes a VMCI context. 798c2ecf20Sopenharmony_ci */ 808c2ecf20Sopenharmony_cistruct vmci_ctx *vmci_ctx_create(u32 cid, u32 priv_flags, 818c2ecf20Sopenharmony_ci uintptr_t event_hnd, 828c2ecf20Sopenharmony_ci int user_version, 838c2ecf20Sopenharmony_ci const struct cred *cred) 848c2ecf20Sopenharmony_ci{ 858c2ecf20Sopenharmony_ci struct vmci_ctx *context; 868c2ecf20Sopenharmony_ci int error; 878c2ecf20Sopenharmony_ci 888c2ecf20Sopenharmony_ci if (cid == VMCI_INVALID_ID) { 898c2ecf20Sopenharmony_ci pr_devel("Invalid context ID for VMCI context\n"); 908c2ecf20Sopenharmony_ci error = -EINVAL; 918c2ecf20Sopenharmony_ci goto err_out; 928c2ecf20Sopenharmony_ci } 938c2ecf20Sopenharmony_ci 948c2ecf20Sopenharmony_ci if (priv_flags & ~VMCI_PRIVILEGE_ALL_FLAGS) { 958c2ecf20Sopenharmony_ci pr_devel("Invalid flag (flags=0x%x) for VMCI context\n", 968c2ecf20Sopenharmony_ci priv_flags); 978c2ecf20Sopenharmony_ci error = -EINVAL; 988c2ecf20Sopenharmony_ci goto err_out; 998c2ecf20Sopenharmony_ci } 1008c2ecf20Sopenharmony_ci 1018c2ecf20Sopenharmony_ci if (user_version == 0) { 1028c2ecf20Sopenharmony_ci pr_devel("Invalid suer_version %d\n", user_version); 1038c2ecf20Sopenharmony_ci error = -EINVAL; 1048c2ecf20Sopenharmony_ci goto err_out; 1058c2ecf20Sopenharmony_ci } 1068c2ecf20Sopenharmony_ci 1078c2ecf20Sopenharmony_ci context = kzalloc(sizeof(*context), GFP_KERNEL); 1088c2ecf20Sopenharmony_ci if (!context) { 1098c2ecf20Sopenharmony_ci pr_warn("Failed to allocate memory for VMCI context\n"); 1108c2ecf20Sopenharmony_ci error = -EINVAL; 1118c2ecf20Sopenharmony_ci goto err_out; 1128c2ecf20Sopenharmony_ci } 1138c2ecf20Sopenharmony_ci 1148c2ecf20Sopenharmony_ci kref_init(&context->kref); 1158c2ecf20Sopenharmony_ci spin_lock_init(&context->lock); 1168c2ecf20Sopenharmony_ci INIT_LIST_HEAD(&context->list_item); 1178c2ecf20Sopenharmony_ci INIT_LIST_HEAD(&context->datagram_queue); 1188c2ecf20Sopenharmony_ci INIT_LIST_HEAD(&context->notifier_list); 1198c2ecf20Sopenharmony_ci 1208c2ecf20Sopenharmony_ci /* Initialize host-specific VMCI context. */ 1218c2ecf20Sopenharmony_ci init_waitqueue_head(&context->host_context.wait_queue); 1228c2ecf20Sopenharmony_ci 1238c2ecf20Sopenharmony_ci context->queue_pair_array = 1248c2ecf20Sopenharmony_ci vmci_handle_arr_create(0, VMCI_MAX_GUEST_QP_COUNT); 1258c2ecf20Sopenharmony_ci if (!context->queue_pair_array) { 1268c2ecf20Sopenharmony_ci error = -ENOMEM; 1278c2ecf20Sopenharmony_ci goto err_free_ctx; 1288c2ecf20Sopenharmony_ci } 1298c2ecf20Sopenharmony_ci 1308c2ecf20Sopenharmony_ci context->doorbell_array = 1318c2ecf20Sopenharmony_ci vmci_handle_arr_create(0, VMCI_MAX_GUEST_DOORBELL_COUNT); 1328c2ecf20Sopenharmony_ci if (!context->doorbell_array) { 1338c2ecf20Sopenharmony_ci error = -ENOMEM; 1348c2ecf20Sopenharmony_ci goto err_free_qp_array; 1358c2ecf20Sopenharmony_ci } 1368c2ecf20Sopenharmony_ci 1378c2ecf20Sopenharmony_ci context->pending_doorbell_array = 1388c2ecf20Sopenharmony_ci vmci_handle_arr_create(0, VMCI_MAX_GUEST_DOORBELL_COUNT); 1398c2ecf20Sopenharmony_ci if (!context->pending_doorbell_array) { 1408c2ecf20Sopenharmony_ci error = -ENOMEM; 1418c2ecf20Sopenharmony_ci goto err_free_db_array; 1428c2ecf20Sopenharmony_ci } 1438c2ecf20Sopenharmony_ci 1448c2ecf20Sopenharmony_ci context->user_version = user_version; 1458c2ecf20Sopenharmony_ci 1468c2ecf20Sopenharmony_ci context->priv_flags = priv_flags; 1478c2ecf20Sopenharmony_ci 1488c2ecf20Sopenharmony_ci if (cred) 1498c2ecf20Sopenharmony_ci context->cred = get_cred(cred); 1508c2ecf20Sopenharmony_ci 1518c2ecf20Sopenharmony_ci context->notify = &ctx_dummy_notify; 1528c2ecf20Sopenharmony_ci context->notify_page = NULL; 1538c2ecf20Sopenharmony_ci 1548c2ecf20Sopenharmony_ci /* 1558c2ecf20Sopenharmony_ci * If we collide with an existing context we generate a new 1568c2ecf20Sopenharmony_ci * and use it instead. The VMX will determine if regeneration 1578c2ecf20Sopenharmony_ci * is okay. Since there isn't 4B - 16 VMs running on a given 1588c2ecf20Sopenharmony_ci * host, the below loop will terminate. 1598c2ecf20Sopenharmony_ci */ 1608c2ecf20Sopenharmony_ci spin_lock(&ctx_list.lock); 1618c2ecf20Sopenharmony_ci 1628c2ecf20Sopenharmony_ci while (vmci_ctx_exists(cid)) { 1638c2ecf20Sopenharmony_ci /* We reserve the lowest 16 ids for fixed contexts. */ 1648c2ecf20Sopenharmony_ci cid = max(cid, VMCI_RESERVED_CID_LIMIT - 1) + 1; 1658c2ecf20Sopenharmony_ci if (cid == VMCI_INVALID_ID) 1668c2ecf20Sopenharmony_ci cid = VMCI_RESERVED_CID_LIMIT; 1678c2ecf20Sopenharmony_ci } 1688c2ecf20Sopenharmony_ci context->cid = cid; 1698c2ecf20Sopenharmony_ci 1708c2ecf20Sopenharmony_ci list_add_tail_rcu(&context->list_item, &ctx_list.head); 1718c2ecf20Sopenharmony_ci spin_unlock(&ctx_list.lock); 1728c2ecf20Sopenharmony_ci 1738c2ecf20Sopenharmony_ci return context; 1748c2ecf20Sopenharmony_ci 1758c2ecf20Sopenharmony_ci err_free_db_array: 1768c2ecf20Sopenharmony_ci vmci_handle_arr_destroy(context->doorbell_array); 1778c2ecf20Sopenharmony_ci err_free_qp_array: 1788c2ecf20Sopenharmony_ci vmci_handle_arr_destroy(context->queue_pair_array); 1798c2ecf20Sopenharmony_ci err_free_ctx: 1808c2ecf20Sopenharmony_ci kfree(context); 1818c2ecf20Sopenharmony_ci err_out: 1828c2ecf20Sopenharmony_ci return ERR_PTR(error); 1838c2ecf20Sopenharmony_ci} 1848c2ecf20Sopenharmony_ci 1858c2ecf20Sopenharmony_ci/* 1868c2ecf20Sopenharmony_ci * Destroy VMCI context. 1878c2ecf20Sopenharmony_ci */ 1888c2ecf20Sopenharmony_civoid vmci_ctx_destroy(struct vmci_ctx *context) 1898c2ecf20Sopenharmony_ci{ 1908c2ecf20Sopenharmony_ci spin_lock(&ctx_list.lock); 1918c2ecf20Sopenharmony_ci list_del_rcu(&context->list_item); 1928c2ecf20Sopenharmony_ci spin_unlock(&ctx_list.lock); 1938c2ecf20Sopenharmony_ci synchronize_rcu(); 1948c2ecf20Sopenharmony_ci 1958c2ecf20Sopenharmony_ci vmci_ctx_put(context); 1968c2ecf20Sopenharmony_ci} 1978c2ecf20Sopenharmony_ci 1988c2ecf20Sopenharmony_ci/* 1998c2ecf20Sopenharmony_ci * Fire notification for all contexts interested in given cid. 2008c2ecf20Sopenharmony_ci */ 2018c2ecf20Sopenharmony_cistatic int ctx_fire_notification(u32 context_id, u32 priv_flags) 2028c2ecf20Sopenharmony_ci{ 2038c2ecf20Sopenharmony_ci u32 i, array_size; 2048c2ecf20Sopenharmony_ci struct vmci_ctx *sub_ctx; 2058c2ecf20Sopenharmony_ci struct vmci_handle_arr *subscriber_array; 2068c2ecf20Sopenharmony_ci struct vmci_handle context_handle = 2078c2ecf20Sopenharmony_ci vmci_make_handle(context_id, VMCI_EVENT_HANDLER); 2088c2ecf20Sopenharmony_ci 2098c2ecf20Sopenharmony_ci /* 2108c2ecf20Sopenharmony_ci * We create an array to hold the subscribers we find when 2118c2ecf20Sopenharmony_ci * scanning through all contexts. 2128c2ecf20Sopenharmony_ci */ 2138c2ecf20Sopenharmony_ci subscriber_array = vmci_handle_arr_create(0, VMCI_MAX_CONTEXTS); 2148c2ecf20Sopenharmony_ci if (subscriber_array == NULL) 2158c2ecf20Sopenharmony_ci return VMCI_ERROR_NO_MEM; 2168c2ecf20Sopenharmony_ci 2178c2ecf20Sopenharmony_ci /* 2188c2ecf20Sopenharmony_ci * Scan all contexts to find who is interested in being 2198c2ecf20Sopenharmony_ci * notified about given contextID. 2208c2ecf20Sopenharmony_ci */ 2218c2ecf20Sopenharmony_ci rcu_read_lock(); 2228c2ecf20Sopenharmony_ci list_for_each_entry_rcu(sub_ctx, &ctx_list.head, list_item) { 2238c2ecf20Sopenharmony_ci struct vmci_handle_list *node; 2248c2ecf20Sopenharmony_ci 2258c2ecf20Sopenharmony_ci /* 2268c2ecf20Sopenharmony_ci * We only deliver notifications of the removal of 2278c2ecf20Sopenharmony_ci * contexts, if the two contexts are allowed to 2288c2ecf20Sopenharmony_ci * interact. 2298c2ecf20Sopenharmony_ci */ 2308c2ecf20Sopenharmony_ci if (vmci_deny_interaction(priv_flags, sub_ctx->priv_flags)) 2318c2ecf20Sopenharmony_ci continue; 2328c2ecf20Sopenharmony_ci 2338c2ecf20Sopenharmony_ci list_for_each_entry_rcu(node, &sub_ctx->notifier_list, node) { 2348c2ecf20Sopenharmony_ci if (!vmci_handle_is_equal(node->handle, context_handle)) 2358c2ecf20Sopenharmony_ci continue; 2368c2ecf20Sopenharmony_ci 2378c2ecf20Sopenharmony_ci vmci_handle_arr_append_entry(&subscriber_array, 2388c2ecf20Sopenharmony_ci vmci_make_handle(sub_ctx->cid, 2398c2ecf20Sopenharmony_ci VMCI_EVENT_HANDLER)); 2408c2ecf20Sopenharmony_ci } 2418c2ecf20Sopenharmony_ci } 2428c2ecf20Sopenharmony_ci rcu_read_unlock(); 2438c2ecf20Sopenharmony_ci 2448c2ecf20Sopenharmony_ci /* Fire event to all subscribers. */ 2458c2ecf20Sopenharmony_ci array_size = vmci_handle_arr_get_size(subscriber_array); 2468c2ecf20Sopenharmony_ci for (i = 0; i < array_size; i++) { 2478c2ecf20Sopenharmony_ci int result; 2488c2ecf20Sopenharmony_ci struct vmci_event_ctx ev; 2498c2ecf20Sopenharmony_ci 2508c2ecf20Sopenharmony_ci ev.msg.hdr.dst = vmci_handle_arr_get_entry(subscriber_array, i); 2518c2ecf20Sopenharmony_ci ev.msg.hdr.src = vmci_make_handle(VMCI_HYPERVISOR_CONTEXT_ID, 2528c2ecf20Sopenharmony_ci VMCI_CONTEXT_RESOURCE_ID); 2538c2ecf20Sopenharmony_ci ev.msg.hdr.payload_size = sizeof(ev) - sizeof(ev.msg.hdr); 2548c2ecf20Sopenharmony_ci ev.msg.event_data.event = VMCI_EVENT_CTX_REMOVED; 2558c2ecf20Sopenharmony_ci ev.payload.context_id = context_id; 2568c2ecf20Sopenharmony_ci 2578c2ecf20Sopenharmony_ci result = vmci_datagram_dispatch(VMCI_HYPERVISOR_CONTEXT_ID, 2588c2ecf20Sopenharmony_ci &ev.msg.hdr, false); 2598c2ecf20Sopenharmony_ci if (result < VMCI_SUCCESS) { 2608c2ecf20Sopenharmony_ci pr_devel("Failed to enqueue event datagram (type=%d) for context (ID=0x%x)\n", 2618c2ecf20Sopenharmony_ci ev.msg.event_data.event, 2628c2ecf20Sopenharmony_ci ev.msg.hdr.dst.context); 2638c2ecf20Sopenharmony_ci /* We continue to enqueue on next subscriber. */ 2648c2ecf20Sopenharmony_ci } 2658c2ecf20Sopenharmony_ci } 2668c2ecf20Sopenharmony_ci vmci_handle_arr_destroy(subscriber_array); 2678c2ecf20Sopenharmony_ci 2688c2ecf20Sopenharmony_ci return VMCI_SUCCESS; 2698c2ecf20Sopenharmony_ci} 2708c2ecf20Sopenharmony_ci 2718c2ecf20Sopenharmony_ci/* 2728c2ecf20Sopenharmony_ci * Returns the current number of pending datagrams. The call may 2738c2ecf20Sopenharmony_ci * also serve as a synchronization point for the datagram queue, 2748c2ecf20Sopenharmony_ci * as no enqueue operations can occur concurrently. 2758c2ecf20Sopenharmony_ci */ 2768c2ecf20Sopenharmony_ciint vmci_ctx_pending_datagrams(u32 cid, u32 *pending) 2778c2ecf20Sopenharmony_ci{ 2788c2ecf20Sopenharmony_ci struct vmci_ctx *context; 2798c2ecf20Sopenharmony_ci 2808c2ecf20Sopenharmony_ci context = vmci_ctx_get(cid); 2818c2ecf20Sopenharmony_ci if (context == NULL) 2828c2ecf20Sopenharmony_ci return VMCI_ERROR_INVALID_ARGS; 2838c2ecf20Sopenharmony_ci 2848c2ecf20Sopenharmony_ci spin_lock(&context->lock); 2858c2ecf20Sopenharmony_ci if (pending) 2868c2ecf20Sopenharmony_ci *pending = context->pending_datagrams; 2878c2ecf20Sopenharmony_ci spin_unlock(&context->lock); 2888c2ecf20Sopenharmony_ci vmci_ctx_put(context); 2898c2ecf20Sopenharmony_ci 2908c2ecf20Sopenharmony_ci return VMCI_SUCCESS; 2918c2ecf20Sopenharmony_ci} 2928c2ecf20Sopenharmony_ci 2938c2ecf20Sopenharmony_ci/* 2948c2ecf20Sopenharmony_ci * Queues a VMCI datagram for the appropriate target VM context. 2958c2ecf20Sopenharmony_ci */ 2968c2ecf20Sopenharmony_ciint vmci_ctx_enqueue_datagram(u32 cid, struct vmci_datagram *dg) 2978c2ecf20Sopenharmony_ci{ 2988c2ecf20Sopenharmony_ci struct vmci_datagram_queue_entry *dq_entry; 2998c2ecf20Sopenharmony_ci struct vmci_ctx *context; 3008c2ecf20Sopenharmony_ci struct vmci_handle dg_src; 3018c2ecf20Sopenharmony_ci size_t vmci_dg_size; 3028c2ecf20Sopenharmony_ci 3038c2ecf20Sopenharmony_ci vmci_dg_size = VMCI_DG_SIZE(dg); 3048c2ecf20Sopenharmony_ci if (vmci_dg_size > VMCI_MAX_DG_SIZE) { 3058c2ecf20Sopenharmony_ci pr_devel("Datagram too large (bytes=%zu)\n", vmci_dg_size); 3068c2ecf20Sopenharmony_ci return VMCI_ERROR_INVALID_ARGS; 3078c2ecf20Sopenharmony_ci } 3088c2ecf20Sopenharmony_ci 3098c2ecf20Sopenharmony_ci /* Get the target VM's VMCI context. */ 3108c2ecf20Sopenharmony_ci context = vmci_ctx_get(cid); 3118c2ecf20Sopenharmony_ci if (!context) { 3128c2ecf20Sopenharmony_ci pr_devel("Invalid context (ID=0x%x)\n", cid); 3138c2ecf20Sopenharmony_ci return VMCI_ERROR_INVALID_ARGS; 3148c2ecf20Sopenharmony_ci } 3158c2ecf20Sopenharmony_ci 3168c2ecf20Sopenharmony_ci /* Allocate guest call entry and add it to the target VM's queue. */ 3178c2ecf20Sopenharmony_ci dq_entry = kmalloc(sizeof(*dq_entry), GFP_KERNEL); 3188c2ecf20Sopenharmony_ci if (dq_entry == NULL) { 3198c2ecf20Sopenharmony_ci pr_warn("Failed to allocate memory for datagram\n"); 3208c2ecf20Sopenharmony_ci vmci_ctx_put(context); 3218c2ecf20Sopenharmony_ci return VMCI_ERROR_NO_MEM; 3228c2ecf20Sopenharmony_ci } 3238c2ecf20Sopenharmony_ci dq_entry->dg = dg; 3248c2ecf20Sopenharmony_ci dq_entry->dg_size = vmci_dg_size; 3258c2ecf20Sopenharmony_ci dg_src = dg->src; 3268c2ecf20Sopenharmony_ci INIT_LIST_HEAD(&dq_entry->list_item); 3278c2ecf20Sopenharmony_ci 3288c2ecf20Sopenharmony_ci spin_lock(&context->lock); 3298c2ecf20Sopenharmony_ci 3308c2ecf20Sopenharmony_ci /* 3318c2ecf20Sopenharmony_ci * We put a higher limit on datagrams from the hypervisor. If 3328c2ecf20Sopenharmony_ci * the pending datagram is not from hypervisor, then we check 3338c2ecf20Sopenharmony_ci * if enqueueing it would exceed the 3348c2ecf20Sopenharmony_ci * VMCI_MAX_DATAGRAM_QUEUE_SIZE limit on the destination. If 3358c2ecf20Sopenharmony_ci * the pending datagram is from hypervisor, we allow it to be 3368c2ecf20Sopenharmony_ci * queued at the destination side provided we don't reach the 3378c2ecf20Sopenharmony_ci * VMCI_MAX_DATAGRAM_AND_EVENT_QUEUE_SIZE limit. 3388c2ecf20Sopenharmony_ci */ 3398c2ecf20Sopenharmony_ci if (context->datagram_queue_size + vmci_dg_size >= 3408c2ecf20Sopenharmony_ci VMCI_MAX_DATAGRAM_QUEUE_SIZE && 3418c2ecf20Sopenharmony_ci (!vmci_handle_is_equal(dg_src, 3428c2ecf20Sopenharmony_ci vmci_make_handle 3438c2ecf20Sopenharmony_ci (VMCI_HYPERVISOR_CONTEXT_ID, 3448c2ecf20Sopenharmony_ci VMCI_CONTEXT_RESOURCE_ID)) || 3458c2ecf20Sopenharmony_ci context->datagram_queue_size + vmci_dg_size >= 3468c2ecf20Sopenharmony_ci VMCI_MAX_DATAGRAM_AND_EVENT_QUEUE_SIZE)) { 3478c2ecf20Sopenharmony_ci spin_unlock(&context->lock); 3488c2ecf20Sopenharmony_ci vmci_ctx_put(context); 3498c2ecf20Sopenharmony_ci kfree(dq_entry); 3508c2ecf20Sopenharmony_ci pr_devel("Context (ID=0x%x) receive queue is full\n", cid); 3518c2ecf20Sopenharmony_ci return VMCI_ERROR_NO_RESOURCES; 3528c2ecf20Sopenharmony_ci } 3538c2ecf20Sopenharmony_ci 3548c2ecf20Sopenharmony_ci list_add(&dq_entry->list_item, &context->datagram_queue); 3558c2ecf20Sopenharmony_ci context->pending_datagrams++; 3568c2ecf20Sopenharmony_ci context->datagram_queue_size += vmci_dg_size; 3578c2ecf20Sopenharmony_ci ctx_signal_notify(context); 3588c2ecf20Sopenharmony_ci wake_up(&context->host_context.wait_queue); 3598c2ecf20Sopenharmony_ci spin_unlock(&context->lock); 3608c2ecf20Sopenharmony_ci vmci_ctx_put(context); 3618c2ecf20Sopenharmony_ci 3628c2ecf20Sopenharmony_ci return vmci_dg_size; 3638c2ecf20Sopenharmony_ci} 3648c2ecf20Sopenharmony_ci 3658c2ecf20Sopenharmony_ci/* 3668c2ecf20Sopenharmony_ci * Verifies whether a context with the specified context ID exists. 3678c2ecf20Sopenharmony_ci * FIXME: utility is dubious as no decisions can be reliably made 3688c2ecf20Sopenharmony_ci * using this data as context can appear and disappear at any time. 3698c2ecf20Sopenharmony_ci */ 3708c2ecf20Sopenharmony_cibool vmci_ctx_exists(u32 cid) 3718c2ecf20Sopenharmony_ci{ 3728c2ecf20Sopenharmony_ci struct vmci_ctx *context; 3738c2ecf20Sopenharmony_ci bool exists = false; 3748c2ecf20Sopenharmony_ci 3758c2ecf20Sopenharmony_ci rcu_read_lock(); 3768c2ecf20Sopenharmony_ci 3778c2ecf20Sopenharmony_ci list_for_each_entry_rcu(context, &ctx_list.head, list_item) { 3788c2ecf20Sopenharmony_ci if (context->cid == cid) { 3798c2ecf20Sopenharmony_ci exists = true; 3808c2ecf20Sopenharmony_ci break; 3818c2ecf20Sopenharmony_ci } 3828c2ecf20Sopenharmony_ci } 3838c2ecf20Sopenharmony_ci 3848c2ecf20Sopenharmony_ci rcu_read_unlock(); 3858c2ecf20Sopenharmony_ci return exists; 3868c2ecf20Sopenharmony_ci} 3878c2ecf20Sopenharmony_ci 3888c2ecf20Sopenharmony_ci/* 3898c2ecf20Sopenharmony_ci * Retrieves VMCI context corresponding to the given cid. 3908c2ecf20Sopenharmony_ci */ 3918c2ecf20Sopenharmony_cistruct vmci_ctx *vmci_ctx_get(u32 cid) 3928c2ecf20Sopenharmony_ci{ 3938c2ecf20Sopenharmony_ci struct vmci_ctx *c, *context = NULL; 3948c2ecf20Sopenharmony_ci 3958c2ecf20Sopenharmony_ci if (cid == VMCI_INVALID_ID) 3968c2ecf20Sopenharmony_ci return NULL; 3978c2ecf20Sopenharmony_ci 3988c2ecf20Sopenharmony_ci rcu_read_lock(); 3998c2ecf20Sopenharmony_ci list_for_each_entry_rcu(c, &ctx_list.head, list_item) { 4008c2ecf20Sopenharmony_ci if (c->cid == cid) { 4018c2ecf20Sopenharmony_ci /* 4028c2ecf20Sopenharmony_ci * The context owner drops its own reference to the 4038c2ecf20Sopenharmony_ci * context only after removing it from the list and 4048c2ecf20Sopenharmony_ci * waiting for RCU grace period to expire. This 4058c2ecf20Sopenharmony_ci * means that we are not about to increase the 4068c2ecf20Sopenharmony_ci * reference count of something that is in the 4078c2ecf20Sopenharmony_ci * process of being destroyed. 4088c2ecf20Sopenharmony_ci */ 4098c2ecf20Sopenharmony_ci context = c; 4108c2ecf20Sopenharmony_ci kref_get(&context->kref); 4118c2ecf20Sopenharmony_ci break; 4128c2ecf20Sopenharmony_ci } 4138c2ecf20Sopenharmony_ci } 4148c2ecf20Sopenharmony_ci rcu_read_unlock(); 4158c2ecf20Sopenharmony_ci 4168c2ecf20Sopenharmony_ci return context; 4178c2ecf20Sopenharmony_ci} 4188c2ecf20Sopenharmony_ci 4198c2ecf20Sopenharmony_ci/* 4208c2ecf20Sopenharmony_ci * Deallocates all parts of a context data structure. This 4218c2ecf20Sopenharmony_ci * function doesn't lock the context, because it assumes that 4228c2ecf20Sopenharmony_ci * the caller was holding the last reference to context. 4238c2ecf20Sopenharmony_ci */ 4248c2ecf20Sopenharmony_cistatic void ctx_free_ctx(struct kref *kref) 4258c2ecf20Sopenharmony_ci{ 4268c2ecf20Sopenharmony_ci struct vmci_ctx *context = container_of(kref, struct vmci_ctx, kref); 4278c2ecf20Sopenharmony_ci struct vmci_datagram_queue_entry *dq_entry, *dq_entry_tmp; 4288c2ecf20Sopenharmony_ci struct vmci_handle temp_handle; 4298c2ecf20Sopenharmony_ci struct vmci_handle_list *notifier, *tmp; 4308c2ecf20Sopenharmony_ci 4318c2ecf20Sopenharmony_ci /* 4328c2ecf20Sopenharmony_ci * Fire event to all contexts interested in knowing this 4338c2ecf20Sopenharmony_ci * context is dying. 4348c2ecf20Sopenharmony_ci */ 4358c2ecf20Sopenharmony_ci ctx_fire_notification(context->cid, context->priv_flags); 4368c2ecf20Sopenharmony_ci 4378c2ecf20Sopenharmony_ci /* 4388c2ecf20Sopenharmony_ci * Cleanup all queue pair resources attached to context. If 4398c2ecf20Sopenharmony_ci * the VM dies without cleaning up, this code will make sure 4408c2ecf20Sopenharmony_ci * that no resources are leaked. 4418c2ecf20Sopenharmony_ci */ 4428c2ecf20Sopenharmony_ci temp_handle = vmci_handle_arr_get_entry(context->queue_pair_array, 0); 4438c2ecf20Sopenharmony_ci while (!vmci_handle_is_equal(temp_handle, VMCI_INVALID_HANDLE)) { 4448c2ecf20Sopenharmony_ci if (vmci_qp_broker_detach(temp_handle, 4458c2ecf20Sopenharmony_ci context) < VMCI_SUCCESS) { 4468c2ecf20Sopenharmony_ci /* 4478c2ecf20Sopenharmony_ci * When vmci_qp_broker_detach() succeeds it 4488c2ecf20Sopenharmony_ci * removes the handle from the array. If 4498c2ecf20Sopenharmony_ci * detach fails, we must remove the handle 4508c2ecf20Sopenharmony_ci * ourselves. 4518c2ecf20Sopenharmony_ci */ 4528c2ecf20Sopenharmony_ci vmci_handle_arr_remove_entry(context->queue_pair_array, 4538c2ecf20Sopenharmony_ci temp_handle); 4548c2ecf20Sopenharmony_ci } 4558c2ecf20Sopenharmony_ci temp_handle = 4568c2ecf20Sopenharmony_ci vmci_handle_arr_get_entry(context->queue_pair_array, 0); 4578c2ecf20Sopenharmony_ci } 4588c2ecf20Sopenharmony_ci 4598c2ecf20Sopenharmony_ci /* 4608c2ecf20Sopenharmony_ci * It is fine to destroy this without locking the callQueue, as 4618c2ecf20Sopenharmony_ci * this is the only thread having a reference to the context. 4628c2ecf20Sopenharmony_ci */ 4638c2ecf20Sopenharmony_ci list_for_each_entry_safe(dq_entry, dq_entry_tmp, 4648c2ecf20Sopenharmony_ci &context->datagram_queue, list_item) { 4658c2ecf20Sopenharmony_ci WARN_ON(dq_entry->dg_size != VMCI_DG_SIZE(dq_entry->dg)); 4668c2ecf20Sopenharmony_ci list_del(&dq_entry->list_item); 4678c2ecf20Sopenharmony_ci kfree(dq_entry->dg); 4688c2ecf20Sopenharmony_ci kfree(dq_entry); 4698c2ecf20Sopenharmony_ci } 4708c2ecf20Sopenharmony_ci 4718c2ecf20Sopenharmony_ci list_for_each_entry_safe(notifier, tmp, 4728c2ecf20Sopenharmony_ci &context->notifier_list, node) { 4738c2ecf20Sopenharmony_ci list_del(¬ifier->node); 4748c2ecf20Sopenharmony_ci kfree(notifier); 4758c2ecf20Sopenharmony_ci } 4768c2ecf20Sopenharmony_ci 4778c2ecf20Sopenharmony_ci vmci_handle_arr_destroy(context->queue_pair_array); 4788c2ecf20Sopenharmony_ci vmci_handle_arr_destroy(context->doorbell_array); 4798c2ecf20Sopenharmony_ci vmci_handle_arr_destroy(context->pending_doorbell_array); 4808c2ecf20Sopenharmony_ci vmci_ctx_unset_notify(context); 4818c2ecf20Sopenharmony_ci if (context->cred) 4828c2ecf20Sopenharmony_ci put_cred(context->cred); 4838c2ecf20Sopenharmony_ci kfree(context); 4848c2ecf20Sopenharmony_ci} 4858c2ecf20Sopenharmony_ci 4868c2ecf20Sopenharmony_ci/* 4878c2ecf20Sopenharmony_ci * Drops reference to VMCI context. If this is the last reference to 4888c2ecf20Sopenharmony_ci * the context it will be deallocated. A context is created with 4898c2ecf20Sopenharmony_ci * a reference count of one, and on destroy, it is removed from 4908c2ecf20Sopenharmony_ci * the context list before its reference count is decremented. Thus, 4918c2ecf20Sopenharmony_ci * if we reach zero, we are sure that nobody else are about to increment 4928c2ecf20Sopenharmony_ci * it (they need the entry in the context list for that), and so there 4938c2ecf20Sopenharmony_ci * is no need for locking. 4948c2ecf20Sopenharmony_ci */ 4958c2ecf20Sopenharmony_civoid vmci_ctx_put(struct vmci_ctx *context) 4968c2ecf20Sopenharmony_ci{ 4978c2ecf20Sopenharmony_ci kref_put(&context->kref, ctx_free_ctx); 4988c2ecf20Sopenharmony_ci} 4998c2ecf20Sopenharmony_ci 5008c2ecf20Sopenharmony_ci/* 5018c2ecf20Sopenharmony_ci * Dequeues the next datagram and returns it to caller. 5028c2ecf20Sopenharmony_ci * The caller passes in a pointer to the max size datagram 5038c2ecf20Sopenharmony_ci * it can handle and the datagram is only unqueued if the 5048c2ecf20Sopenharmony_ci * size is less than max_size. If larger max_size is set to 5058c2ecf20Sopenharmony_ci * the size of the datagram to give the caller a chance to 5068c2ecf20Sopenharmony_ci * set up a larger buffer for the guestcall. 5078c2ecf20Sopenharmony_ci */ 5088c2ecf20Sopenharmony_ciint vmci_ctx_dequeue_datagram(struct vmci_ctx *context, 5098c2ecf20Sopenharmony_ci size_t *max_size, 5108c2ecf20Sopenharmony_ci struct vmci_datagram **dg) 5118c2ecf20Sopenharmony_ci{ 5128c2ecf20Sopenharmony_ci struct vmci_datagram_queue_entry *dq_entry; 5138c2ecf20Sopenharmony_ci struct list_head *list_item; 5148c2ecf20Sopenharmony_ci int rv; 5158c2ecf20Sopenharmony_ci 5168c2ecf20Sopenharmony_ci /* Dequeue the next datagram entry. */ 5178c2ecf20Sopenharmony_ci spin_lock(&context->lock); 5188c2ecf20Sopenharmony_ci if (context->pending_datagrams == 0) { 5198c2ecf20Sopenharmony_ci ctx_clear_notify_call(context); 5208c2ecf20Sopenharmony_ci spin_unlock(&context->lock); 5218c2ecf20Sopenharmony_ci pr_devel("No datagrams pending\n"); 5228c2ecf20Sopenharmony_ci return VMCI_ERROR_NO_MORE_DATAGRAMS; 5238c2ecf20Sopenharmony_ci } 5248c2ecf20Sopenharmony_ci 5258c2ecf20Sopenharmony_ci list_item = context->datagram_queue.next; 5268c2ecf20Sopenharmony_ci 5278c2ecf20Sopenharmony_ci dq_entry = 5288c2ecf20Sopenharmony_ci list_entry(list_item, struct vmci_datagram_queue_entry, list_item); 5298c2ecf20Sopenharmony_ci 5308c2ecf20Sopenharmony_ci /* Check size of caller's buffer. */ 5318c2ecf20Sopenharmony_ci if (*max_size < dq_entry->dg_size) { 5328c2ecf20Sopenharmony_ci *max_size = dq_entry->dg_size; 5338c2ecf20Sopenharmony_ci spin_unlock(&context->lock); 5348c2ecf20Sopenharmony_ci pr_devel("Caller's buffer should be at least (size=%u bytes)\n", 5358c2ecf20Sopenharmony_ci (u32) *max_size); 5368c2ecf20Sopenharmony_ci return VMCI_ERROR_NO_MEM; 5378c2ecf20Sopenharmony_ci } 5388c2ecf20Sopenharmony_ci 5398c2ecf20Sopenharmony_ci list_del(list_item); 5408c2ecf20Sopenharmony_ci context->pending_datagrams--; 5418c2ecf20Sopenharmony_ci context->datagram_queue_size -= dq_entry->dg_size; 5428c2ecf20Sopenharmony_ci if (context->pending_datagrams == 0) { 5438c2ecf20Sopenharmony_ci ctx_clear_notify_call(context); 5448c2ecf20Sopenharmony_ci rv = VMCI_SUCCESS; 5458c2ecf20Sopenharmony_ci } else { 5468c2ecf20Sopenharmony_ci /* 5478c2ecf20Sopenharmony_ci * Return the size of the next datagram. 5488c2ecf20Sopenharmony_ci */ 5498c2ecf20Sopenharmony_ci struct vmci_datagram_queue_entry *next_entry; 5508c2ecf20Sopenharmony_ci 5518c2ecf20Sopenharmony_ci list_item = context->datagram_queue.next; 5528c2ecf20Sopenharmony_ci next_entry = 5538c2ecf20Sopenharmony_ci list_entry(list_item, struct vmci_datagram_queue_entry, 5548c2ecf20Sopenharmony_ci list_item); 5558c2ecf20Sopenharmony_ci 5568c2ecf20Sopenharmony_ci /* 5578c2ecf20Sopenharmony_ci * The following size_t -> int truncation is fine as 5588c2ecf20Sopenharmony_ci * the maximum size of a (routable) datagram is 68KB. 5598c2ecf20Sopenharmony_ci */ 5608c2ecf20Sopenharmony_ci rv = (int)next_entry->dg_size; 5618c2ecf20Sopenharmony_ci } 5628c2ecf20Sopenharmony_ci spin_unlock(&context->lock); 5638c2ecf20Sopenharmony_ci 5648c2ecf20Sopenharmony_ci /* Caller must free datagram. */ 5658c2ecf20Sopenharmony_ci *dg = dq_entry->dg; 5668c2ecf20Sopenharmony_ci dq_entry->dg = NULL; 5678c2ecf20Sopenharmony_ci kfree(dq_entry); 5688c2ecf20Sopenharmony_ci 5698c2ecf20Sopenharmony_ci return rv; 5708c2ecf20Sopenharmony_ci} 5718c2ecf20Sopenharmony_ci 5728c2ecf20Sopenharmony_ci/* 5738c2ecf20Sopenharmony_ci * Reverts actions set up by vmci_setup_notify(). Unmaps and unlocks the 5748c2ecf20Sopenharmony_ci * page mapped/locked by vmci_setup_notify(). 5758c2ecf20Sopenharmony_ci */ 5768c2ecf20Sopenharmony_civoid vmci_ctx_unset_notify(struct vmci_ctx *context) 5778c2ecf20Sopenharmony_ci{ 5788c2ecf20Sopenharmony_ci struct page *notify_page; 5798c2ecf20Sopenharmony_ci 5808c2ecf20Sopenharmony_ci spin_lock(&context->lock); 5818c2ecf20Sopenharmony_ci 5828c2ecf20Sopenharmony_ci notify_page = context->notify_page; 5838c2ecf20Sopenharmony_ci context->notify = &ctx_dummy_notify; 5848c2ecf20Sopenharmony_ci context->notify_page = NULL; 5858c2ecf20Sopenharmony_ci 5868c2ecf20Sopenharmony_ci spin_unlock(&context->lock); 5878c2ecf20Sopenharmony_ci 5888c2ecf20Sopenharmony_ci if (notify_page) { 5898c2ecf20Sopenharmony_ci kunmap(notify_page); 5908c2ecf20Sopenharmony_ci put_page(notify_page); 5918c2ecf20Sopenharmony_ci } 5928c2ecf20Sopenharmony_ci} 5938c2ecf20Sopenharmony_ci 5948c2ecf20Sopenharmony_ci/* 5958c2ecf20Sopenharmony_ci * Add remote_cid to list of contexts current contexts wants 5968c2ecf20Sopenharmony_ci * notifications from/about. 5978c2ecf20Sopenharmony_ci */ 5988c2ecf20Sopenharmony_ciint vmci_ctx_add_notification(u32 context_id, u32 remote_cid) 5998c2ecf20Sopenharmony_ci{ 6008c2ecf20Sopenharmony_ci struct vmci_ctx *context; 6018c2ecf20Sopenharmony_ci struct vmci_handle_list *notifier, *n; 6028c2ecf20Sopenharmony_ci int result; 6038c2ecf20Sopenharmony_ci bool exists = false; 6048c2ecf20Sopenharmony_ci 6058c2ecf20Sopenharmony_ci context = vmci_ctx_get(context_id); 6068c2ecf20Sopenharmony_ci if (!context) 6078c2ecf20Sopenharmony_ci return VMCI_ERROR_NOT_FOUND; 6088c2ecf20Sopenharmony_ci 6098c2ecf20Sopenharmony_ci if (VMCI_CONTEXT_IS_VM(context_id) && VMCI_CONTEXT_IS_VM(remote_cid)) { 6108c2ecf20Sopenharmony_ci pr_devel("Context removed notifications for other VMs not supported (src=0x%x, remote=0x%x)\n", 6118c2ecf20Sopenharmony_ci context_id, remote_cid); 6128c2ecf20Sopenharmony_ci result = VMCI_ERROR_DST_UNREACHABLE; 6138c2ecf20Sopenharmony_ci goto out; 6148c2ecf20Sopenharmony_ci } 6158c2ecf20Sopenharmony_ci 6168c2ecf20Sopenharmony_ci if (context->priv_flags & VMCI_PRIVILEGE_FLAG_RESTRICTED) { 6178c2ecf20Sopenharmony_ci result = VMCI_ERROR_NO_ACCESS; 6188c2ecf20Sopenharmony_ci goto out; 6198c2ecf20Sopenharmony_ci } 6208c2ecf20Sopenharmony_ci 6218c2ecf20Sopenharmony_ci notifier = kmalloc(sizeof(struct vmci_handle_list), GFP_KERNEL); 6228c2ecf20Sopenharmony_ci if (!notifier) { 6238c2ecf20Sopenharmony_ci result = VMCI_ERROR_NO_MEM; 6248c2ecf20Sopenharmony_ci goto out; 6258c2ecf20Sopenharmony_ci } 6268c2ecf20Sopenharmony_ci 6278c2ecf20Sopenharmony_ci INIT_LIST_HEAD(¬ifier->node); 6288c2ecf20Sopenharmony_ci notifier->handle = vmci_make_handle(remote_cid, VMCI_EVENT_HANDLER); 6298c2ecf20Sopenharmony_ci 6308c2ecf20Sopenharmony_ci spin_lock(&context->lock); 6318c2ecf20Sopenharmony_ci 6328c2ecf20Sopenharmony_ci if (context->n_notifiers < VMCI_MAX_CONTEXTS) { 6338c2ecf20Sopenharmony_ci list_for_each_entry(n, &context->notifier_list, node) { 6348c2ecf20Sopenharmony_ci if (vmci_handle_is_equal(n->handle, notifier->handle)) { 6358c2ecf20Sopenharmony_ci exists = true; 6368c2ecf20Sopenharmony_ci break; 6378c2ecf20Sopenharmony_ci } 6388c2ecf20Sopenharmony_ci } 6398c2ecf20Sopenharmony_ci 6408c2ecf20Sopenharmony_ci if (exists) { 6418c2ecf20Sopenharmony_ci kfree(notifier); 6428c2ecf20Sopenharmony_ci result = VMCI_ERROR_ALREADY_EXISTS; 6438c2ecf20Sopenharmony_ci } else { 6448c2ecf20Sopenharmony_ci list_add_tail_rcu(¬ifier->node, 6458c2ecf20Sopenharmony_ci &context->notifier_list); 6468c2ecf20Sopenharmony_ci context->n_notifiers++; 6478c2ecf20Sopenharmony_ci result = VMCI_SUCCESS; 6488c2ecf20Sopenharmony_ci } 6498c2ecf20Sopenharmony_ci } else { 6508c2ecf20Sopenharmony_ci kfree(notifier); 6518c2ecf20Sopenharmony_ci result = VMCI_ERROR_NO_MEM; 6528c2ecf20Sopenharmony_ci } 6538c2ecf20Sopenharmony_ci 6548c2ecf20Sopenharmony_ci spin_unlock(&context->lock); 6558c2ecf20Sopenharmony_ci 6568c2ecf20Sopenharmony_ci out: 6578c2ecf20Sopenharmony_ci vmci_ctx_put(context); 6588c2ecf20Sopenharmony_ci return result; 6598c2ecf20Sopenharmony_ci} 6608c2ecf20Sopenharmony_ci 6618c2ecf20Sopenharmony_ci/* 6628c2ecf20Sopenharmony_ci * Remove remote_cid from current context's list of contexts it is 6638c2ecf20Sopenharmony_ci * interested in getting notifications from/about. 6648c2ecf20Sopenharmony_ci */ 6658c2ecf20Sopenharmony_ciint vmci_ctx_remove_notification(u32 context_id, u32 remote_cid) 6668c2ecf20Sopenharmony_ci{ 6678c2ecf20Sopenharmony_ci struct vmci_ctx *context; 6688c2ecf20Sopenharmony_ci struct vmci_handle_list *notifier, *tmp; 6698c2ecf20Sopenharmony_ci struct vmci_handle handle; 6708c2ecf20Sopenharmony_ci bool found = false; 6718c2ecf20Sopenharmony_ci 6728c2ecf20Sopenharmony_ci context = vmci_ctx_get(context_id); 6738c2ecf20Sopenharmony_ci if (!context) 6748c2ecf20Sopenharmony_ci return VMCI_ERROR_NOT_FOUND; 6758c2ecf20Sopenharmony_ci 6768c2ecf20Sopenharmony_ci handle = vmci_make_handle(remote_cid, VMCI_EVENT_HANDLER); 6778c2ecf20Sopenharmony_ci 6788c2ecf20Sopenharmony_ci spin_lock(&context->lock); 6798c2ecf20Sopenharmony_ci list_for_each_entry_safe(notifier, tmp, 6808c2ecf20Sopenharmony_ci &context->notifier_list, node) { 6818c2ecf20Sopenharmony_ci if (vmci_handle_is_equal(notifier->handle, handle)) { 6828c2ecf20Sopenharmony_ci list_del_rcu(¬ifier->node); 6838c2ecf20Sopenharmony_ci context->n_notifiers--; 6848c2ecf20Sopenharmony_ci found = true; 6858c2ecf20Sopenharmony_ci break; 6868c2ecf20Sopenharmony_ci } 6878c2ecf20Sopenharmony_ci } 6888c2ecf20Sopenharmony_ci spin_unlock(&context->lock); 6898c2ecf20Sopenharmony_ci 6908c2ecf20Sopenharmony_ci if (found) { 6918c2ecf20Sopenharmony_ci synchronize_rcu(); 6928c2ecf20Sopenharmony_ci kfree(notifier); 6938c2ecf20Sopenharmony_ci } 6948c2ecf20Sopenharmony_ci 6958c2ecf20Sopenharmony_ci vmci_ctx_put(context); 6968c2ecf20Sopenharmony_ci 6978c2ecf20Sopenharmony_ci return found ? VMCI_SUCCESS : VMCI_ERROR_NOT_FOUND; 6988c2ecf20Sopenharmony_ci} 6998c2ecf20Sopenharmony_ci 7008c2ecf20Sopenharmony_cistatic int vmci_ctx_get_chkpt_notifiers(struct vmci_ctx *context, 7018c2ecf20Sopenharmony_ci u32 *buf_size, void **pbuf) 7028c2ecf20Sopenharmony_ci{ 7038c2ecf20Sopenharmony_ci u32 *notifiers; 7048c2ecf20Sopenharmony_ci size_t data_size; 7058c2ecf20Sopenharmony_ci struct vmci_handle_list *entry; 7068c2ecf20Sopenharmony_ci int i = 0; 7078c2ecf20Sopenharmony_ci 7088c2ecf20Sopenharmony_ci if (context->n_notifiers == 0) { 7098c2ecf20Sopenharmony_ci *buf_size = 0; 7108c2ecf20Sopenharmony_ci *pbuf = NULL; 7118c2ecf20Sopenharmony_ci return VMCI_SUCCESS; 7128c2ecf20Sopenharmony_ci } 7138c2ecf20Sopenharmony_ci 7148c2ecf20Sopenharmony_ci data_size = context->n_notifiers * sizeof(*notifiers); 7158c2ecf20Sopenharmony_ci if (*buf_size < data_size) { 7168c2ecf20Sopenharmony_ci *buf_size = data_size; 7178c2ecf20Sopenharmony_ci return VMCI_ERROR_MORE_DATA; 7188c2ecf20Sopenharmony_ci } 7198c2ecf20Sopenharmony_ci 7208c2ecf20Sopenharmony_ci notifiers = kmalloc(data_size, GFP_ATOMIC); /* FIXME: want GFP_KERNEL */ 7218c2ecf20Sopenharmony_ci if (!notifiers) 7228c2ecf20Sopenharmony_ci return VMCI_ERROR_NO_MEM; 7238c2ecf20Sopenharmony_ci 7248c2ecf20Sopenharmony_ci list_for_each_entry(entry, &context->notifier_list, node) 7258c2ecf20Sopenharmony_ci notifiers[i++] = entry->handle.context; 7268c2ecf20Sopenharmony_ci 7278c2ecf20Sopenharmony_ci *buf_size = data_size; 7288c2ecf20Sopenharmony_ci *pbuf = notifiers; 7298c2ecf20Sopenharmony_ci return VMCI_SUCCESS; 7308c2ecf20Sopenharmony_ci} 7318c2ecf20Sopenharmony_ci 7328c2ecf20Sopenharmony_cistatic int vmci_ctx_get_chkpt_doorbells(struct vmci_ctx *context, 7338c2ecf20Sopenharmony_ci u32 *buf_size, void **pbuf) 7348c2ecf20Sopenharmony_ci{ 7358c2ecf20Sopenharmony_ci struct dbell_cpt_state *dbells; 7368c2ecf20Sopenharmony_ci u32 i, n_doorbells; 7378c2ecf20Sopenharmony_ci 7388c2ecf20Sopenharmony_ci n_doorbells = vmci_handle_arr_get_size(context->doorbell_array); 7398c2ecf20Sopenharmony_ci if (n_doorbells > 0) { 7408c2ecf20Sopenharmony_ci size_t data_size = n_doorbells * sizeof(*dbells); 7418c2ecf20Sopenharmony_ci if (*buf_size < data_size) { 7428c2ecf20Sopenharmony_ci *buf_size = data_size; 7438c2ecf20Sopenharmony_ci return VMCI_ERROR_MORE_DATA; 7448c2ecf20Sopenharmony_ci } 7458c2ecf20Sopenharmony_ci 7468c2ecf20Sopenharmony_ci dbells = kzalloc(data_size, GFP_ATOMIC); 7478c2ecf20Sopenharmony_ci if (!dbells) 7488c2ecf20Sopenharmony_ci return VMCI_ERROR_NO_MEM; 7498c2ecf20Sopenharmony_ci 7508c2ecf20Sopenharmony_ci for (i = 0; i < n_doorbells; i++) 7518c2ecf20Sopenharmony_ci dbells[i].handle = vmci_handle_arr_get_entry( 7528c2ecf20Sopenharmony_ci context->doorbell_array, i); 7538c2ecf20Sopenharmony_ci 7548c2ecf20Sopenharmony_ci *buf_size = data_size; 7558c2ecf20Sopenharmony_ci *pbuf = dbells; 7568c2ecf20Sopenharmony_ci } else { 7578c2ecf20Sopenharmony_ci *buf_size = 0; 7588c2ecf20Sopenharmony_ci *pbuf = NULL; 7598c2ecf20Sopenharmony_ci } 7608c2ecf20Sopenharmony_ci 7618c2ecf20Sopenharmony_ci return VMCI_SUCCESS; 7628c2ecf20Sopenharmony_ci} 7638c2ecf20Sopenharmony_ci 7648c2ecf20Sopenharmony_ci/* 7658c2ecf20Sopenharmony_ci * Get current context's checkpoint state of given type. 7668c2ecf20Sopenharmony_ci */ 7678c2ecf20Sopenharmony_ciint vmci_ctx_get_chkpt_state(u32 context_id, 7688c2ecf20Sopenharmony_ci u32 cpt_type, 7698c2ecf20Sopenharmony_ci u32 *buf_size, 7708c2ecf20Sopenharmony_ci void **pbuf) 7718c2ecf20Sopenharmony_ci{ 7728c2ecf20Sopenharmony_ci struct vmci_ctx *context; 7738c2ecf20Sopenharmony_ci int result; 7748c2ecf20Sopenharmony_ci 7758c2ecf20Sopenharmony_ci context = vmci_ctx_get(context_id); 7768c2ecf20Sopenharmony_ci if (!context) 7778c2ecf20Sopenharmony_ci return VMCI_ERROR_NOT_FOUND; 7788c2ecf20Sopenharmony_ci 7798c2ecf20Sopenharmony_ci spin_lock(&context->lock); 7808c2ecf20Sopenharmony_ci 7818c2ecf20Sopenharmony_ci switch (cpt_type) { 7828c2ecf20Sopenharmony_ci case VMCI_NOTIFICATION_CPT_STATE: 7838c2ecf20Sopenharmony_ci result = vmci_ctx_get_chkpt_notifiers(context, buf_size, pbuf); 7848c2ecf20Sopenharmony_ci break; 7858c2ecf20Sopenharmony_ci 7868c2ecf20Sopenharmony_ci case VMCI_WELLKNOWN_CPT_STATE: 7878c2ecf20Sopenharmony_ci /* 7888c2ecf20Sopenharmony_ci * For compatibility with VMX'en with VM to VM communication, we 7898c2ecf20Sopenharmony_ci * always return zero wellknown handles. 7908c2ecf20Sopenharmony_ci */ 7918c2ecf20Sopenharmony_ci 7928c2ecf20Sopenharmony_ci *buf_size = 0; 7938c2ecf20Sopenharmony_ci *pbuf = NULL; 7948c2ecf20Sopenharmony_ci result = VMCI_SUCCESS; 7958c2ecf20Sopenharmony_ci break; 7968c2ecf20Sopenharmony_ci 7978c2ecf20Sopenharmony_ci case VMCI_DOORBELL_CPT_STATE: 7988c2ecf20Sopenharmony_ci result = vmci_ctx_get_chkpt_doorbells(context, buf_size, pbuf); 7998c2ecf20Sopenharmony_ci break; 8008c2ecf20Sopenharmony_ci 8018c2ecf20Sopenharmony_ci default: 8028c2ecf20Sopenharmony_ci pr_devel("Invalid cpt state (type=%d)\n", cpt_type); 8038c2ecf20Sopenharmony_ci result = VMCI_ERROR_INVALID_ARGS; 8048c2ecf20Sopenharmony_ci break; 8058c2ecf20Sopenharmony_ci } 8068c2ecf20Sopenharmony_ci 8078c2ecf20Sopenharmony_ci spin_unlock(&context->lock); 8088c2ecf20Sopenharmony_ci vmci_ctx_put(context); 8098c2ecf20Sopenharmony_ci 8108c2ecf20Sopenharmony_ci return result; 8118c2ecf20Sopenharmony_ci} 8128c2ecf20Sopenharmony_ci 8138c2ecf20Sopenharmony_ci/* 8148c2ecf20Sopenharmony_ci * Set current context's checkpoint state of given type. 8158c2ecf20Sopenharmony_ci */ 8168c2ecf20Sopenharmony_ciint vmci_ctx_set_chkpt_state(u32 context_id, 8178c2ecf20Sopenharmony_ci u32 cpt_type, 8188c2ecf20Sopenharmony_ci u32 buf_size, 8198c2ecf20Sopenharmony_ci void *cpt_buf) 8208c2ecf20Sopenharmony_ci{ 8218c2ecf20Sopenharmony_ci u32 i; 8228c2ecf20Sopenharmony_ci u32 current_id; 8238c2ecf20Sopenharmony_ci int result = VMCI_SUCCESS; 8248c2ecf20Sopenharmony_ci u32 num_ids = buf_size / sizeof(u32); 8258c2ecf20Sopenharmony_ci 8268c2ecf20Sopenharmony_ci if (cpt_type == VMCI_WELLKNOWN_CPT_STATE && num_ids > 0) { 8278c2ecf20Sopenharmony_ci /* 8288c2ecf20Sopenharmony_ci * We would end up here if VMX with VM to VM communication 8298c2ecf20Sopenharmony_ci * attempts to restore a checkpoint with wellknown handles. 8308c2ecf20Sopenharmony_ci */ 8318c2ecf20Sopenharmony_ci pr_warn("Attempt to restore checkpoint with obsolete wellknown handles\n"); 8328c2ecf20Sopenharmony_ci return VMCI_ERROR_OBSOLETE; 8338c2ecf20Sopenharmony_ci } 8348c2ecf20Sopenharmony_ci 8358c2ecf20Sopenharmony_ci if (cpt_type != VMCI_NOTIFICATION_CPT_STATE) { 8368c2ecf20Sopenharmony_ci pr_devel("Invalid cpt state (type=%d)\n", cpt_type); 8378c2ecf20Sopenharmony_ci return VMCI_ERROR_INVALID_ARGS; 8388c2ecf20Sopenharmony_ci } 8398c2ecf20Sopenharmony_ci 8408c2ecf20Sopenharmony_ci for (i = 0; i < num_ids && result == VMCI_SUCCESS; i++) { 8418c2ecf20Sopenharmony_ci current_id = ((u32 *)cpt_buf)[i]; 8428c2ecf20Sopenharmony_ci result = vmci_ctx_add_notification(context_id, current_id); 8438c2ecf20Sopenharmony_ci if (result != VMCI_SUCCESS) 8448c2ecf20Sopenharmony_ci break; 8458c2ecf20Sopenharmony_ci } 8468c2ecf20Sopenharmony_ci if (result != VMCI_SUCCESS) 8478c2ecf20Sopenharmony_ci pr_devel("Failed to set cpt state (type=%d) (error=%d)\n", 8488c2ecf20Sopenharmony_ci cpt_type, result); 8498c2ecf20Sopenharmony_ci 8508c2ecf20Sopenharmony_ci return result; 8518c2ecf20Sopenharmony_ci} 8528c2ecf20Sopenharmony_ci 8538c2ecf20Sopenharmony_ci/* 8548c2ecf20Sopenharmony_ci * Retrieves the specified context's pending notifications in the 8558c2ecf20Sopenharmony_ci * form of a handle array. The handle arrays returned are the 8568c2ecf20Sopenharmony_ci * actual data - not a copy and should not be modified by the 8578c2ecf20Sopenharmony_ci * caller. They must be released using 8588c2ecf20Sopenharmony_ci * vmci_ctx_rcv_notifications_release. 8598c2ecf20Sopenharmony_ci */ 8608c2ecf20Sopenharmony_ciint vmci_ctx_rcv_notifications_get(u32 context_id, 8618c2ecf20Sopenharmony_ci struct vmci_handle_arr **db_handle_array, 8628c2ecf20Sopenharmony_ci struct vmci_handle_arr **qp_handle_array) 8638c2ecf20Sopenharmony_ci{ 8648c2ecf20Sopenharmony_ci struct vmci_ctx *context; 8658c2ecf20Sopenharmony_ci int result = VMCI_SUCCESS; 8668c2ecf20Sopenharmony_ci 8678c2ecf20Sopenharmony_ci context = vmci_ctx_get(context_id); 8688c2ecf20Sopenharmony_ci if (context == NULL) 8698c2ecf20Sopenharmony_ci return VMCI_ERROR_NOT_FOUND; 8708c2ecf20Sopenharmony_ci 8718c2ecf20Sopenharmony_ci spin_lock(&context->lock); 8728c2ecf20Sopenharmony_ci 8738c2ecf20Sopenharmony_ci *db_handle_array = context->pending_doorbell_array; 8748c2ecf20Sopenharmony_ci context->pending_doorbell_array = 8758c2ecf20Sopenharmony_ci vmci_handle_arr_create(0, VMCI_MAX_GUEST_DOORBELL_COUNT); 8768c2ecf20Sopenharmony_ci if (!context->pending_doorbell_array) { 8778c2ecf20Sopenharmony_ci context->pending_doorbell_array = *db_handle_array; 8788c2ecf20Sopenharmony_ci *db_handle_array = NULL; 8798c2ecf20Sopenharmony_ci result = VMCI_ERROR_NO_MEM; 8808c2ecf20Sopenharmony_ci } 8818c2ecf20Sopenharmony_ci *qp_handle_array = NULL; 8828c2ecf20Sopenharmony_ci 8838c2ecf20Sopenharmony_ci spin_unlock(&context->lock); 8848c2ecf20Sopenharmony_ci vmci_ctx_put(context); 8858c2ecf20Sopenharmony_ci 8868c2ecf20Sopenharmony_ci return result; 8878c2ecf20Sopenharmony_ci} 8888c2ecf20Sopenharmony_ci 8898c2ecf20Sopenharmony_ci/* 8908c2ecf20Sopenharmony_ci * Releases handle arrays with pending notifications previously 8918c2ecf20Sopenharmony_ci * retrieved using vmci_ctx_rcv_notifications_get. If the 8928c2ecf20Sopenharmony_ci * notifications were not successfully handed over to the guest, 8938c2ecf20Sopenharmony_ci * success must be false. 8948c2ecf20Sopenharmony_ci */ 8958c2ecf20Sopenharmony_civoid vmci_ctx_rcv_notifications_release(u32 context_id, 8968c2ecf20Sopenharmony_ci struct vmci_handle_arr *db_handle_array, 8978c2ecf20Sopenharmony_ci struct vmci_handle_arr *qp_handle_array, 8988c2ecf20Sopenharmony_ci bool success) 8998c2ecf20Sopenharmony_ci{ 9008c2ecf20Sopenharmony_ci struct vmci_ctx *context = vmci_ctx_get(context_id); 9018c2ecf20Sopenharmony_ci 9028c2ecf20Sopenharmony_ci spin_lock(&context->lock); 9038c2ecf20Sopenharmony_ci if (!success) { 9048c2ecf20Sopenharmony_ci struct vmci_handle handle; 9058c2ecf20Sopenharmony_ci 9068c2ecf20Sopenharmony_ci /* 9078c2ecf20Sopenharmony_ci * New notifications may have been added while we were not 9088c2ecf20Sopenharmony_ci * holding the context lock, so we transfer any new pending 9098c2ecf20Sopenharmony_ci * doorbell notifications to the old array, and reinstate the 9108c2ecf20Sopenharmony_ci * old array. 9118c2ecf20Sopenharmony_ci */ 9128c2ecf20Sopenharmony_ci 9138c2ecf20Sopenharmony_ci handle = vmci_handle_arr_remove_tail( 9148c2ecf20Sopenharmony_ci context->pending_doorbell_array); 9158c2ecf20Sopenharmony_ci while (!vmci_handle_is_invalid(handle)) { 9168c2ecf20Sopenharmony_ci if (!vmci_handle_arr_has_entry(db_handle_array, 9178c2ecf20Sopenharmony_ci handle)) { 9188c2ecf20Sopenharmony_ci vmci_handle_arr_append_entry( 9198c2ecf20Sopenharmony_ci &db_handle_array, handle); 9208c2ecf20Sopenharmony_ci } 9218c2ecf20Sopenharmony_ci handle = vmci_handle_arr_remove_tail( 9228c2ecf20Sopenharmony_ci context->pending_doorbell_array); 9238c2ecf20Sopenharmony_ci } 9248c2ecf20Sopenharmony_ci vmci_handle_arr_destroy(context->pending_doorbell_array); 9258c2ecf20Sopenharmony_ci context->pending_doorbell_array = db_handle_array; 9268c2ecf20Sopenharmony_ci db_handle_array = NULL; 9278c2ecf20Sopenharmony_ci } else { 9288c2ecf20Sopenharmony_ci ctx_clear_notify_call(context); 9298c2ecf20Sopenharmony_ci } 9308c2ecf20Sopenharmony_ci spin_unlock(&context->lock); 9318c2ecf20Sopenharmony_ci vmci_ctx_put(context); 9328c2ecf20Sopenharmony_ci 9338c2ecf20Sopenharmony_ci if (db_handle_array) 9348c2ecf20Sopenharmony_ci vmci_handle_arr_destroy(db_handle_array); 9358c2ecf20Sopenharmony_ci 9368c2ecf20Sopenharmony_ci if (qp_handle_array) 9378c2ecf20Sopenharmony_ci vmci_handle_arr_destroy(qp_handle_array); 9388c2ecf20Sopenharmony_ci} 9398c2ecf20Sopenharmony_ci 9408c2ecf20Sopenharmony_ci/* 9418c2ecf20Sopenharmony_ci * Registers that a new doorbell handle has been allocated by the 9428c2ecf20Sopenharmony_ci * context. Only doorbell handles registered can be notified. 9438c2ecf20Sopenharmony_ci */ 9448c2ecf20Sopenharmony_ciint vmci_ctx_dbell_create(u32 context_id, struct vmci_handle handle) 9458c2ecf20Sopenharmony_ci{ 9468c2ecf20Sopenharmony_ci struct vmci_ctx *context; 9478c2ecf20Sopenharmony_ci int result; 9488c2ecf20Sopenharmony_ci 9498c2ecf20Sopenharmony_ci if (context_id == VMCI_INVALID_ID || vmci_handle_is_invalid(handle)) 9508c2ecf20Sopenharmony_ci return VMCI_ERROR_INVALID_ARGS; 9518c2ecf20Sopenharmony_ci 9528c2ecf20Sopenharmony_ci context = vmci_ctx_get(context_id); 9538c2ecf20Sopenharmony_ci if (context == NULL) 9548c2ecf20Sopenharmony_ci return VMCI_ERROR_NOT_FOUND; 9558c2ecf20Sopenharmony_ci 9568c2ecf20Sopenharmony_ci spin_lock(&context->lock); 9578c2ecf20Sopenharmony_ci if (!vmci_handle_arr_has_entry(context->doorbell_array, handle)) 9588c2ecf20Sopenharmony_ci result = vmci_handle_arr_append_entry(&context->doorbell_array, 9598c2ecf20Sopenharmony_ci handle); 9608c2ecf20Sopenharmony_ci else 9618c2ecf20Sopenharmony_ci result = VMCI_ERROR_DUPLICATE_ENTRY; 9628c2ecf20Sopenharmony_ci 9638c2ecf20Sopenharmony_ci spin_unlock(&context->lock); 9648c2ecf20Sopenharmony_ci vmci_ctx_put(context); 9658c2ecf20Sopenharmony_ci 9668c2ecf20Sopenharmony_ci return result; 9678c2ecf20Sopenharmony_ci} 9688c2ecf20Sopenharmony_ci 9698c2ecf20Sopenharmony_ci/* 9708c2ecf20Sopenharmony_ci * Unregisters a doorbell handle that was previously registered 9718c2ecf20Sopenharmony_ci * with vmci_ctx_dbell_create. 9728c2ecf20Sopenharmony_ci */ 9738c2ecf20Sopenharmony_ciint vmci_ctx_dbell_destroy(u32 context_id, struct vmci_handle handle) 9748c2ecf20Sopenharmony_ci{ 9758c2ecf20Sopenharmony_ci struct vmci_ctx *context; 9768c2ecf20Sopenharmony_ci struct vmci_handle removed_handle; 9778c2ecf20Sopenharmony_ci 9788c2ecf20Sopenharmony_ci if (context_id == VMCI_INVALID_ID || vmci_handle_is_invalid(handle)) 9798c2ecf20Sopenharmony_ci return VMCI_ERROR_INVALID_ARGS; 9808c2ecf20Sopenharmony_ci 9818c2ecf20Sopenharmony_ci context = vmci_ctx_get(context_id); 9828c2ecf20Sopenharmony_ci if (context == NULL) 9838c2ecf20Sopenharmony_ci return VMCI_ERROR_NOT_FOUND; 9848c2ecf20Sopenharmony_ci 9858c2ecf20Sopenharmony_ci spin_lock(&context->lock); 9868c2ecf20Sopenharmony_ci removed_handle = 9878c2ecf20Sopenharmony_ci vmci_handle_arr_remove_entry(context->doorbell_array, handle); 9888c2ecf20Sopenharmony_ci vmci_handle_arr_remove_entry(context->pending_doorbell_array, handle); 9898c2ecf20Sopenharmony_ci spin_unlock(&context->lock); 9908c2ecf20Sopenharmony_ci 9918c2ecf20Sopenharmony_ci vmci_ctx_put(context); 9928c2ecf20Sopenharmony_ci 9938c2ecf20Sopenharmony_ci return vmci_handle_is_invalid(removed_handle) ? 9948c2ecf20Sopenharmony_ci VMCI_ERROR_NOT_FOUND : VMCI_SUCCESS; 9958c2ecf20Sopenharmony_ci} 9968c2ecf20Sopenharmony_ci 9978c2ecf20Sopenharmony_ci/* 9988c2ecf20Sopenharmony_ci * Unregisters all doorbell handles that were previously 9998c2ecf20Sopenharmony_ci * registered with vmci_ctx_dbell_create. 10008c2ecf20Sopenharmony_ci */ 10018c2ecf20Sopenharmony_ciint vmci_ctx_dbell_destroy_all(u32 context_id) 10028c2ecf20Sopenharmony_ci{ 10038c2ecf20Sopenharmony_ci struct vmci_ctx *context; 10048c2ecf20Sopenharmony_ci struct vmci_handle handle; 10058c2ecf20Sopenharmony_ci 10068c2ecf20Sopenharmony_ci if (context_id == VMCI_INVALID_ID) 10078c2ecf20Sopenharmony_ci return VMCI_ERROR_INVALID_ARGS; 10088c2ecf20Sopenharmony_ci 10098c2ecf20Sopenharmony_ci context = vmci_ctx_get(context_id); 10108c2ecf20Sopenharmony_ci if (context == NULL) 10118c2ecf20Sopenharmony_ci return VMCI_ERROR_NOT_FOUND; 10128c2ecf20Sopenharmony_ci 10138c2ecf20Sopenharmony_ci spin_lock(&context->lock); 10148c2ecf20Sopenharmony_ci do { 10158c2ecf20Sopenharmony_ci struct vmci_handle_arr *arr = context->doorbell_array; 10168c2ecf20Sopenharmony_ci handle = vmci_handle_arr_remove_tail(arr); 10178c2ecf20Sopenharmony_ci } while (!vmci_handle_is_invalid(handle)); 10188c2ecf20Sopenharmony_ci do { 10198c2ecf20Sopenharmony_ci struct vmci_handle_arr *arr = context->pending_doorbell_array; 10208c2ecf20Sopenharmony_ci handle = vmci_handle_arr_remove_tail(arr); 10218c2ecf20Sopenharmony_ci } while (!vmci_handle_is_invalid(handle)); 10228c2ecf20Sopenharmony_ci spin_unlock(&context->lock); 10238c2ecf20Sopenharmony_ci 10248c2ecf20Sopenharmony_ci vmci_ctx_put(context); 10258c2ecf20Sopenharmony_ci 10268c2ecf20Sopenharmony_ci return VMCI_SUCCESS; 10278c2ecf20Sopenharmony_ci} 10288c2ecf20Sopenharmony_ci 10298c2ecf20Sopenharmony_ci/* 10308c2ecf20Sopenharmony_ci * Registers a notification of a doorbell handle initiated by the 10318c2ecf20Sopenharmony_ci * specified source context. The notification of doorbells are 10328c2ecf20Sopenharmony_ci * subject to the same isolation rules as datagram delivery. To 10338c2ecf20Sopenharmony_ci * allow host side senders of notifications a finer granularity 10348c2ecf20Sopenharmony_ci * of sender rights than those assigned to the sending context 10358c2ecf20Sopenharmony_ci * itself, the host context is required to specify a different 10368c2ecf20Sopenharmony_ci * set of privilege flags that will override the privileges of 10378c2ecf20Sopenharmony_ci * the source context. 10388c2ecf20Sopenharmony_ci */ 10398c2ecf20Sopenharmony_ciint vmci_ctx_notify_dbell(u32 src_cid, 10408c2ecf20Sopenharmony_ci struct vmci_handle handle, 10418c2ecf20Sopenharmony_ci u32 src_priv_flags) 10428c2ecf20Sopenharmony_ci{ 10438c2ecf20Sopenharmony_ci struct vmci_ctx *dst_context; 10448c2ecf20Sopenharmony_ci int result; 10458c2ecf20Sopenharmony_ci 10468c2ecf20Sopenharmony_ci if (vmci_handle_is_invalid(handle)) 10478c2ecf20Sopenharmony_ci return VMCI_ERROR_INVALID_ARGS; 10488c2ecf20Sopenharmony_ci 10498c2ecf20Sopenharmony_ci /* Get the target VM's VMCI context. */ 10508c2ecf20Sopenharmony_ci dst_context = vmci_ctx_get(handle.context); 10518c2ecf20Sopenharmony_ci if (!dst_context) { 10528c2ecf20Sopenharmony_ci pr_devel("Invalid context (ID=0x%x)\n", handle.context); 10538c2ecf20Sopenharmony_ci return VMCI_ERROR_NOT_FOUND; 10548c2ecf20Sopenharmony_ci } 10558c2ecf20Sopenharmony_ci 10568c2ecf20Sopenharmony_ci if (src_cid != handle.context) { 10578c2ecf20Sopenharmony_ci u32 dst_priv_flags; 10588c2ecf20Sopenharmony_ci 10598c2ecf20Sopenharmony_ci if (VMCI_CONTEXT_IS_VM(src_cid) && 10608c2ecf20Sopenharmony_ci VMCI_CONTEXT_IS_VM(handle.context)) { 10618c2ecf20Sopenharmony_ci pr_devel("Doorbell notification from VM to VM not supported (src=0x%x, dst=0x%x)\n", 10628c2ecf20Sopenharmony_ci src_cid, handle.context); 10638c2ecf20Sopenharmony_ci result = VMCI_ERROR_DST_UNREACHABLE; 10648c2ecf20Sopenharmony_ci goto out; 10658c2ecf20Sopenharmony_ci } 10668c2ecf20Sopenharmony_ci 10678c2ecf20Sopenharmony_ci result = vmci_dbell_get_priv_flags(handle, &dst_priv_flags); 10688c2ecf20Sopenharmony_ci if (result < VMCI_SUCCESS) { 10698c2ecf20Sopenharmony_ci pr_warn("Failed to get privilege flags for destination (handle=0x%x:0x%x)\n", 10708c2ecf20Sopenharmony_ci handle.context, handle.resource); 10718c2ecf20Sopenharmony_ci goto out; 10728c2ecf20Sopenharmony_ci } 10738c2ecf20Sopenharmony_ci 10748c2ecf20Sopenharmony_ci if (src_cid != VMCI_HOST_CONTEXT_ID || 10758c2ecf20Sopenharmony_ci src_priv_flags == VMCI_NO_PRIVILEGE_FLAGS) { 10768c2ecf20Sopenharmony_ci src_priv_flags = vmci_context_get_priv_flags(src_cid); 10778c2ecf20Sopenharmony_ci } 10788c2ecf20Sopenharmony_ci 10798c2ecf20Sopenharmony_ci if (vmci_deny_interaction(src_priv_flags, dst_priv_flags)) { 10808c2ecf20Sopenharmony_ci result = VMCI_ERROR_NO_ACCESS; 10818c2ecf20Sopenharmony_ci goto out; 10828c2ecf20Sopenharmony_ci } 10838c2ecf20Sopenharmony_ci } 10848c2ecf20Sopenharmony_ci 10858c2ecf20Sopenharmony_ci if (handle.context == VMCI_HOST_CONTEXT_ID) { 10868c2ecf20Sopenharmony_ci result = vmci_dbell_host_context_notify(src_cid, handle); 10878c2ecf20Sopenharmony_ci } else { 10888c2ecf20Sopenharmony_ci spin_lock(&dst_context->lock); 10898c2ecf20Sopenharmony_ci 10908c2ecf20Sopenharmony_ci if (!vmci_handle_arr_has_entry(dst_context->doorbell_array, 10918c2ecf20Sopenharmony_ci handle)) { 10928c2ecf20Sopenharmony_ci result = VMCI_ERROR_NOT_FOUND; 10938c2ecf20Sopenharmony_ci } else { 10948c2ecf20Sopenharmony_ci if (!vmci_handle_arr_has_entry( 10958c2ecf20Sopenharmony_ci dst_context->pending_doorbell_array, 10968c2ecf20Sopenharmony_ci handle)) { 10978c2ecf20Sopenharmony_ci result = vmci_handle_arr_append_entry( 10988c2ecf20Sopenharmony_ci &dst_context->pending_doorbell_array, 10998c2ecf20Sopenharmony_ci handle); 11008c2ecf20Sopenharmony_ci if (result == VMCI_SUCCESS) { 11018c2ecf20Sopenharmony_ci ctx_signal_notify(dst_context); 11028c2ecf20Sopenharmony_ci wake_up(&dst_context->host_context.wait_queue); 11038c2ecf20Sopenharmony_ci } 11048c2ecf20Sopenharmony_ci } else { 11058c2ecf20Sopenharmony_ci result = VMCI_SUCCESS; 11068c2ecf20Sopenharmony_ci } 11078c2ecf20Sopenharmony_ci } 11088c2ecf20Sopenharmony_ci spin_unlock(&dst_context->lock); 11098c2ecf20Sopenharmony_ci } 11108c2ecf20Sopenharmony_ci 11118c2ecf20Sopenharmony_ci out: 11128c2ecf20Sopenharmony_ci vmci_ctx_put(dst_context); 11138c2ecf20Sopenharmony_ci 11148c2ecf20Sopenharmony_ci return result; 11158c2ecf20Sopenharmony_ci} 11168c2ecf20Sopenharmony_ci 11178c2ecf20Sopenharmony_cibool vmci_ctx_supports_host_qp(struct vmci_ctx *context) 11188c2ecf20Sopenharmony_ci{ 11198c2ecf20Sopenharmony_ci return context && context->user_version >= VMCI_VERSION_HOSTQP; 11208c2ecf20Sopenharmony_ci} 11218c2ecf20Sopenharmony_ci 11228c2ecf20Sopenharmony_ci/* 11238c2ecf20Sopenharmony_ci * Registers that a new queue pair handle has been allocated by 11248c2ecf20Sopenharmony_ci * the context. 11258c2ecf20Sopenharmony_ci */ 11268c2ecf20Sopenharmony_ciint vmci_ctx_qp_create(struct vmci_ctx *context, struct vmci_handle handle) 11278c2ecf20Sopenharmony_ci{ 11288c2ecf20Sopenharmony_ci int result; 11298c2ecf20Sopenharmony_ci 11308c2ecf20Sopenharmony_ci if (context == NULL || vmci_handle_is_invalid(handle)) 11318c2ecf20Sopenharmony_ci return VMCI_ERROR_INVALID_ARGS; 11328c2ecf20Sopenharmony_ci 11338c2ecf20Sopenharmony_ci if (!vmci_handle_arr_has_entry(context->queue_pair_array, handle)) 11348c2ecf20Sopenharmony_ci result = vmci_handle_arr_append_entry( 11358c2ecf20Sopenharmony_ci &context->queue_pair_array, handle); 11368c2ecf20Sopenharmony_ci else 11378c2ecf20Sopenharmony_ci result = VMCI_ERROR_DUPLICATE_ENTRY; 11388c2ecf20Sopenharmony_ci 11398c2ecf20Sopenharmony_ci return result; 11408c2ecf20Sopenharmony_ci} 11418c2ecf20Sopenharmony_ci 11428c2ecf20Sopenharmony_ci/* 11438c2ecf20Sopenharmony_ci * Unregisters a queue pair handle that was previously registered 11448c2ecf20Sopenharmony_ci * with vmci_ctx_qp_create. 11458c2ecf20Sopenharmony_ci */ 11468c2ecf20Sopenharmony_ciint vmci_ctx_qp_destroy(struct vmci_ctx *context, struct vmci_handle handle) 11478c2ecf20Sopenharmony_ci{ 11488c2ecf20Sopenharmony_ci struct vmci_handle hndl; 11498c2ecf20Sopenharmony_ci 11508c2ecf20Sopenharmony_ci if (context == NULL || vmci_handle_is_invalid(handle)) 11518c2ecf20Sopenharmony_ci return VMCI_ERROR_INVALID_ARGS; 11528c2ecf20Sopenharmony_ci 11538c2ecf20Sopenharmony_ci hndl = vmci_handle_arr_remove_entry(context->queue_pair_array, handle); 11548c2ecf20Sopenharmony_ci 11558c2ecf20Sopenharmony_ci return vmci_handle_is_invalid(hndl) ? 11568c2ecf20Sopenharmony_ci VMCI_ERROR_NOT_FOUND : VMCI_SUCCESS; 11578c2ecf20Sopenharmony_ci} 11588c2ecf20Sopenharmony_ci 11598c2ecf20Sopenharmony_ci/* 11608c2ecf20Sopenharmony_ci * Determines whether a given queue pair handle is registered 11618c2ecf20Sopenharmony_ci * with the given context. 11628c2ecf20Sopenharmony_ci */ 11638c2ecf20Sopenharmony_cibool vmci_ctx_qp_exists(struct vmci_ctx *context, struct vmci_handle handle) 11648c2ecf20Sopenharmony_ci{ 11658c2ecf20Sopenharmony_ci if (context == NULL || vmci_handle_is_invalid(handle)) 11668c2ecf20Sopenharmony_ci return false; 11678c2ecf20Sopenharmony_ci 11688c2ecf20Sopenharmony_ci return vmci_handle_arr_has_entry(context->queue_pair_array, handle); 11698c2ecf20Sopenharmony_ci} 11708c2ecf20Sopenharmony_ci 11718c2ecf20Sopenharmony_ci/* 11728c2ecf20Sopenharmony_ci * vmci_context_get_priv_flags() - Retrieve privilege flags. 11738c2ecf20Sopenharmony_ci * @context_id: The context ID of the VMCI context. 11748c2ecf20Sopenharmony_ci * 11758c2ecf20Sopenharmony_ci * Retrieves privilege flags of the given VMCI context ID. 11768c2ecf20Sopenharmony_ci */ 11778c2ecf20Sopenharmony_ciu32 vmci_context_get_priv_flags(u32 context_id) 11788c2ecf20Sopenharmony_ci{ 11798c2ecf20Sopenharmony_ci if (vmci_host_code_active()) { 11808c2ecf20Sopenharmony_ci u32 flags; 11818c2ecf20Sopenharmony_ci struct vmci_ctx *context; 11828c2ecf20Sopenharmony_ci 11838c2ecf20Sopenharmony_ci context = vmci_ctx_get(context_id); 11848c2ecf20Sopenharmony_ci if (!context) 11858c2ecf20Sopenharmony_ci return VMCI_LEAST_PRIVILEGE_FLAGS; 11868c2ecf20Sopenharmony_ci 11878c2ecf20Sopenharmony_ci flags = context->priv_flags; 11888c2ecf20Sopenharmony_ci vmci_ctx_put(context); 11898c2ecf20Sopenharmony_ci return flags; 11908c2ecf20Sopenharmony_ci } 11918c2ecf20Sopenharmony_ci return VMCI_NO_PRIVILEGE_FLAGS; 11928c2ecf20Sopenharmony_ci} 11938c2ecf20Sopenharmony_ciEXPORT_SYMBOL_GPL(vmci_context_get_priv_flags); 11948c2ecf20Sopenharmony_ci 11958c2ecf20Sopenharmony_ci/* 11968c2ecf20Sopenharmony_ci * vmci_is_context_owner() - Determimnes if user is the context owner 11978c2ecf20Sopenharmony_ci * @context_id: The context ID of the VMCI context. 11988c2ecf20Sopenharmony_ci * @uid: The host user id (real kernel value). 11998c2ecf20Sopenharmony_ci * 12008c2ecf20Sopenharmony_ci * Determines whether a given UID is the owner of given VMCI context. 12018c2ecf20Sopenharmony_ci */ 12028c2ecf20Sopenharmony_cibool vmci_is_context_owner(u32 context_id, kuid_t uid) 12038c2ecf20Sopenharmony_ci{ 12048c2ecf20Sopenharmony_ci bool is_owner = false; 12058c2ecf20Sopenharmony_ci 12068c2ecf20Sopenharmony_ci if (vmci_host_code_active()) { 12078c2ecf20Sopenharmony_ci struct vmci_ctx *context = vmci_ctx_get(context_id); 12088c2ecf20Sopenharmony_ci if (context) { 12098c2ecf20Sopenharmony_ci if (context->cred) 12108c2ecf20Sopenharmony_ci is_owner = uid_eq(context->cred->uid, uid); 12118c2ecf20Sopenharmony_ci vmci_ctx_put(context); 12128c2ecf20Sopenharmony_ci } 12138c2ecf20Sopenharmony_ci } 12148c2ecf20Sopenharmony_ci 12158c2ecf20Sopenharmony_ci return is_owner; 12168c2ecf20Sopenharmony_ci} 12178c2ecf20Sopenharmony_ciEXPORT_SYMBOL_GPL(vmci_is_context_owner); 1218