162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0 262306a36Sopenharmony_ci/* 362306a36Sopenharmony_ci * ACRN HSM eventfd - use eventfd objects to signal expected I/O requests 462306a36Sopenharmony_ci * 562306a36Sopenharmony_ci * Copyright (C) 2020 Intel Corporation. All rights reserved. 662306a36Sopenharmony_ci * 762306a36Sopenharmony_ci * Authors: 862306a36Sopenharmony_ci * Shuo Liu <shuo.a.liu@intel.com> 962306a36Sopenharmony_ci * Yakui Zhao <yakui.zhao@intel.com> 1062306a36Sopenharmony_ci */ 1162306a36Sopenharmony_ci 1262306a36Sopenharmony_ci#include <linux/eventfd.h> 1362306a36Sopenharmony_ci#include <linux/slab.h> 1462306a36Sopenharmony_ci 1562306a36Sopenharmony_ci#include "acrn_drv.h" 1662306a36Sopenharmony_ci 1762306a36Sopenharmony_ci/** 1862306a36Sopenharmony_ci * struct hsm_ioeventfd - Properties of HSM ioeventfd 1962306a36Sopenharmony_ci * @list: Entry within &acrn_vm.ioeventfds of ioeventfds of a VM 2062306a36Sopenharmony_ci * @eventfd: Eventfd of the HSM ioeventfd 2162306a36Sopenharmony_ci * @addr: Address of I/O range 2262306a36Sopenharmony_ci * @data: Data for matching 2362306a36Sopenharmony_ci * @length: Length of I/O range 2462306a36Sopenharmony_ci * @type: Type of I/O range (ACRN_IOREQ_TYPE_MMIO/ACRN_IOREQ_TYPE_PORTIO) 2562306a36Sopenharmony_ci * @wildcard: Data matching or not 2662306a36Sopenharmony_ci */ 2762306a36Sopenharmony_cistruct hsm_ioeventfd { 2862306a36Sopenharmony_ci struct list_head list; 2962306a36Sopenharmony_ci struct eventfd_ctx *eventfd; 3062306a36Sopenharmony_ci u64 addr; 3162306a36Sopenharmony_ci u64 data; 3262306a36Sopenharmony_ci int length; 3362306a36Sopenharmony_ci int type; 3462306a36Sopenharmony_ci bool wildcard; 3562306a36Sopenharmony_ci}; 3662306a36Sopenharmony_ci 3762306a36Sopenharmony_cistatic inline int ioreq_type_from_flags(int flags) 3862306a36Sopenharmony_ci{ 3962306a36Sopenharmony_ci return flags & ACRN_IOEVENTFD_FLAG_PIO ? 4062306a36Sopenharmony_ci ACRN_IOREQ_TYPE_PORTIO : ACRN_IOREQ_TYPE_MMIO; 4162306a36Sopenharmony_ci} 4262306a36Sopenharmony_ci 4362306a36Sopenharmony_cistatic void acrn_ioeventfd_shutdown(struct acrn_vm *vm, struct hsm_ioeventfd *p) 4462306a36Sopenharmony_ci{ 4562306a36Sopenharmony_ci lockdep_assert_held(&vm->ioeventfds_lock); 4662306a36Sopenharmony_ci 4762306a36Sopenharmony_ci eventfd_ctx_put(p->eventfd); 4862306a36Sopenharmony_ci list_del(&p->list); 4962306a36Sopenharmony_ci kfree(p); 5062306a36Sopenharmony_ci} 5162306a36Sopenharmony_ci 5262306a36Sopenharmony_cistatic bool hsm_ioeventfd_is_conflict(struct acrn_vm *vm, 5362306a36Sopenharmony_ci struct hsm_ioeventfd *ioeventfd) 5462306a36Sopenharmony_ci{ 5562306a36Sopenharmony_ci struct hsm_ioeventfd *p; 5662306a36Sopenharmony_ci 5762306a36Sopenharmony_ci lockdep_assert_held(&vm->ioeventfds_lock); 5862306a36Sopenharmony_ci 5962306a36Sopenharmony_ci /* Either one is wildcard, the data matching will be skipped. */ 6062306a36Sopenharmony_ci list_for_each_entry(p, &vm->ioeventfds, list) 6162306a36Sopenharmony_ci if (p->eventfd == ioeventfd->eventfd && 6262306a36Sopenharmony_ci p->addr == ioeventfd->addr && 6362306a36Sopenharmony_ci p->type == ioeventfd->type && 6462306a36Sopenharmony_ci (p->wildcard || ioeventfd->wildcard || 6562306a36Sopenharmony_ci p->data == ioeventfd->data)) 6662306a36Sopenharmony_ci return true; 6762306a36Sopenharmony_ci 6862306a36Sopenharmony_ci return false; 6962306a36Sopenharmony_ci} 7062306a36Sopenharmony_ci 7162306a36Sopenharmony_ci/* 7262306a36Sopenharmony_ci * Assign an eventfd to a VM and create a HSM ioeventfd associated with the 7362306a36Sopenharmony_ci * eventfd. The properties of the HSM ioeventfd are built from a &struct 7462306a36Sopenharmony_ci * acrn_ioeventfd. 7562306a36Sopenharmony_ci */ 7662306a36Sopenharmony_cistatic int acrn_ioeventfd_assign(struct acrn_vm *vm, 7762306a36Sopenharmony_ci struct acrn_ioeventfd *args) 7862306a36Sopenharmony_ci{ 7962306a36Sopenharmony_ci struct eventfd_ctx *eventfd; 8062306a36Sopenharmony_ci struct hsm_ioeventfd *p; 8162306a36Sopenharmony_ci int ret; 8262306a36Sopenharmony_ci 8362306a36Sopenharmony_ci /* Check for range overflow */ 8462306a36Sopenharmony_ci if (args->addr + args->len < args->addr) 8562306a36Sopenharmony_ci return -EINVAL; 8662306a36Sopenharmony_ci 8762306a36Sopenharmony_ci /* 8862306a36Sopenharmony_ci * Currently, acrn_ioeventfd is used to support vhost. 1,2,4,8 width 8962306a36Sopenharmony_ci * accesses can cover vhost's requirements. 9062306a36Sopenharmony_ci */ 9162306a36Sopenharmony_ci if (!(args->len == 1 || args->len == 2 || 9262306a36Sopenharmony_ci args->len == 4 || args->len == 8)) 9362306a36Sopenharmony_ci return -EINVAL; 9462306a36Sopenharmony_ci 9562306a36Sopenharmony_ci eventfd = eventfd_ctx_fdget(args->fd); 9662306a36Sopenharmony_ci if (IS_ERR(eventfd)) 9762306a36Sopenharmony_ci return PTR_ERR(eventfd); 9862306a36Sopenharmony_ci 9962306a36Sopenharmony_ci p = kzalloc(sizeof(*p), GFP_KERNEL); 10062306a36Sopenharmony_ci if (!p) { 10162306a36Sopenharmony_ci ret = -ENOMEM; 10262306a36Sopenharmony_ci goto fail; 10362306a36Sopenharmony_ci } 10462306a36Sopenharmony_ci 10562306a36Sopenharmony_ci INIT_LIST_HEAD(&p->list); 10662306a36Sopenharmony_ci p->addr = args->addr; 10762306a36Sopenharmony_ci p->length = args->len; 10862306a36Sopenharmony_ci p->eventfd = eventfd; 10962306a36Sopenharmony_ci p->type = ioreq_type_from_flags(args->flags); 11062306a36Sopenharmony_ci 11162306a36Sopenharmony_ci /* 11262306a36Sopenharmony_ci * ACRN_IOEVENTFD_FLAG_DATAMATCH flag is set in virtio 1.0 support, the 11362306a36Sopenharmony_ci * writing of notification register of each virtqueue may trigger the 11462306a36Sopenharmony_ci * notification. There is no data matching requirement. 11562306a36Sopenharmony_ci */ 11662306a36Sopenharmony_ci if (args->flags & ACRN_IOEVENTFD_FLAG_DATAMATCH) 11762306a36Sopenharmony_ci p->data = args->data; 11862306a36Sopenharmony_ci else 11962306a36Sopenharmony_ci p->wildcard = true; 12062306a36Sopenharmony_ci 12162306a36Sopenharmony_ci mutex_lock(&vm->ioeventfds_lock); 12262306a36Sopenharmony_ci 12362306a36Sopenharmony_ci if (hsm_ioeventfd_is_conflict(vm, p)) { 12462306a36Sopenharmony_ci ret = -EEXIST; 12562306a36Sopenharmony_ci goto unlock_fail; 12662306a36Sopenharmony_ci } 12762306a36Sopenharmony_ci 12862306a36Sopenharmony_ci /* register the I/O range into ioreq client */ 12962306a36Sopenharmony_ci ret = acrn_ioreq_range_add(vm->ioeventfd_client, p->type, 13062306a36Sopenharmony_ci p->addr, p->addr + p->length - 1); 13162306a36Sopenharmony_ci if (ret < 0) 13262306a36Sopenharmony_ci goto unlock_fail; 13362306a36Sopenharmony_ci 13462306a36Sopenharmony_ci list_add_tail(&p->list, &vm->ioeventfds); 13562306a36Sopenharmony_ci mutex_unlock(&vm->ioeventfds_lock); 13662306a36Sopenharmony_ci 13762306a36Sopenharmony_ci return 0; 13862306a36Sopenharmony_ci 13962306a36Sopenharmony_ciunlock_fail: 14062306a36Sopenharmony_ci mutex_unlock(&vm->ioeventfds_lock); 14162306a36Sopenharmony_ci kfree(p); 14262306a36Sopenharmony_cifail: 14362306a36Sopenharmony_ci eventfd_ctx_put(eventfd); 14462306a36Sopenharmony_ci return ret; 14562306a36Sopenharmony_ci} 14662306a36Sopenharmony_ci 14762306a36Sopenharmony_cistatic int acrn_ioeventfd_deassign(struct acrn_vm *vm, 14862306a36Sopenharmony_ci struct acrn_ioeventfd *args) 14962306a36Sopenharmony_ci{ 15062306a36Sopenharmony_ci struct hsm_ioeventfd *p; 15162306a36Sopenharmony_ci struct eventfd_ctx *eventfd; 15262306a36Sopenharmony_ci 15362306a36Sopenharmony_ci eventfd = eventfd_ctx_fdget(args->fd); 15462306a36Sopenharmony_ci if (IS_ERR(eventfd)) 15562306a36Sopenharmony_ci return PTR_ERR(eventfd); 15662306a36Sopenharmony_ci 15762306a36Sopenharmony_ci mutex_lock(&vm->ioeventfds_lock); 15862306a36Sopenharmony_ci list_for_each_entry(p, &vm->ioeventfds, list) { 15962306a36Sopenharmony_ci if (p->eventfd != eventfd) 16062306a36Sopenharmony_ci continue; 16162306a36Sopenharmony_ci 16262306a36Sopenharmony_ci acrn_ioreq_range_del(vm->ioeventfd_client, p->type, 16362306a36Sopenharmony_ci p->addr, p->addr + p->length - 1); 16462306a36Sopenharmony_ci acrn_ioeventfd_shutdown(vm, p); 16562306a36Sopenharmony_ci break; 16662306a36Sopenharmony_ci } 16762306a36Sopenharmony_ci mutex_unlock(&vm->ioeventfds_lock); 16862306a36Sopenharmony_ci 16962306a36Sopenharmony_ci eventfd_ctx_put(eventfd); 17062306a36Sopenharmony_ci return 0; 17162306a36Sopenharmony_ci} 17262306a36Sopenharmony_ci 17362306a36Sopenharmony_cistatic struct hsm_ioeventfd *hsm_ioeventfd_match(struct acrn_vm *vm, u64 addr, 17462306a36Sopenharmony_ci u64 data, int len, int type) 17562306a36Sopenharmony_ci{ 17662306a36Sopenharmony_ci struct hsm_ioeventfd *p = NULL; 17762306a36Sopenharmony_ci 17862306a36Sopenharmony_ci lockdep_assert_held(&vm->ioeventfds_lock); 17962306a36Sopenharmony_ci 18062306a36Sopenharmony_ci list_for_each_entry(p, &vm->ioeventfds, list) { 18162306a36Sopenharmony_ci if (p->type == type && p->addr == addr && p->length >= len && 18262306a36Sopenharmony_ci (p->wildcard || p->data == data)) 18362306a36Sopenharmony_ci return p; 18462306a36Sopenharmony_ci } 18562306a36Sopenharmony_ci 18662306a36Sopenharmony_ci return NULL; 18762306a36Sopenharmony_ci} 18862306a36Sopenharmony_ci 18962306a36Sopenharmony_cistatic int acrn_ioeventfd_handler(struct acrn_ioreq_client *client, 19062306a36Sopenharmony_ci struct acrn_io_request *req) 19162306a36Sopenharmony_ci{ 19262306a36Sopenharmony_ci struct hsm_ioeventfd *p; 19362306a36Sopenharmony_ci u64 addr, val; 19462306a36Sopenharmony_ci int size; 19562306a36Sopenharmony_ci 19662306a36Sopenharmony_ci if (req->type == ACRN_IOREQ_TYPE_MMIO) { 19762306a36Sopenharmony_ci /* 19862306a36Sopenharmony_ci * I/O requests are dispatched by range check only, so a 19962306a36Sopenharmony_ci * acrn_ioreq_client need process both READ and WRITE accesses 20062306a36Sopenharmony_ci * of same range. READ accesses are safe to be ignored here 20162306a36Sopenharmony_ci * because virtio PCI devices write the notify registers for 20262306a36Sopenharmony_ci * notification. 20362306a36Sopenharmony_ci */ 20462306a36Sopenharmony_ci if (req->reqs.mmio_request.direction == ACRN_IOREQ_DIR_READ) { 20562306a36Sopenharmony_ci /* reading does nothing and return 0 */ 20662306a36Sopenharmony_ci req->reqs.mmio_request.value = 0; 20762306a36Sopenharmony_ci return 0; 20862306a36Sopenharmony_ci } 20962306a36Sopenharmony_ci addr = req->reqs.mmio_request.address; 21062306a36Sopenharmony_ci size = req->reqs.mmio_request.size; 21162306a36Sopenharmony_ci val = req->reqs.mmio_request.value; 21262306a36Sopenharmony_ci } else { 21362306a36Sopenharmony_ci if (req->reqs.pio_request.direction == ACRN_IOREQ_DIR_READ) { 21462306a36Sopenharmony_ci /* reading does nothing and return 0 */ 21562306a36Sopenharmony_ci req->reqs.pio_request.value = 0; 21662306a36Sopenharmony_ci return 0; 21762306a36Sopenharmony_ci } 21862306a36Sopenharmony_ci addr = req->reqs.pio_request.address; 21962306a36Sopenharmony_ci size = req->reqs.pio_request.size; 22062306a36Sopenharmony_ci val = req->reqs.pio_request.value; 22162306a36Sopenharmony_ci } 22262306a36Sopenharmony_ci 22362306a36Sopenharmony_ci mutex_lock(&client->vm->ioeventfds_lock); 22462306a36Sopenharmony_ci p = hsm_ioeventfd_match(client->vm, addr, val, size, req->type); 22562306a36Sopenharmony_ci if (p) 22662306a36Sopenharmony_ci eventfd_signal(p->eventfd, 1); 22762306a36Sopenharmony_ci mutex_unlock(&client->vm->ioeventfds_lock); 22862306a36Sopenharmony_ci 22962306a36Sopenharmony_ci return 0; 23062306a36Sopenharmony_ci} 23162306a36Sopenharmony_ci 23262306a36Sopenharmony_ciint acrn_ioeventfd_config(struct acrn_vm *vm, struct acrn_ioeventfd *args) 23362306a36Sopenharmony_ci{ 23462306a36Sopenharmony_ci int ret; 23562306a36Sopenharmony_ci 23662306a36Sopenharmony_ci if (args->flags & ACRN_IOEVENTFD_FLAG_DEASSIGN) 23762306a36Sopenharmony_ci ret = acrn_ioeventfd_deassign(vm, args); 23862306a36Sopenharmony_ci else 23962306a36Sopenharmony_ci ret = acrn_ioeventfd_assign(vm, args); 24062306a36Sopenharmony_ci 24162306a36Sopenharmony_ci return ret; 24262306a36Sopenharmony_ci} 24362306a36Sopenharmony_ci 24462306a36Sopenharmony_ciint acrn_ioeventfd_init(struct acrn_vm *vm) 24562306a36Sopenharmony_ci{ 24662306a36Sopenharmony_ci char name[ACRN_NAME_LEN]; 24762306a36Sopenharmony_ci 24862306a36Sopenharmony_ci mutex_init(&vm->ioeventfds_lock); 24962306a36Sopenharmony_ci INIT_LIST_HEAD(&vm->ioeventfds); 25062306a36Sopenharmony_ci snprintf(name, sizeof(name), "ioeventfd-%u", vm->vmid); 25162306a36Sopenharmony_ci vm->ioeventfd_client = acrn_ioreq_client_create(vm, 25262306a36Sopenharmony_ci acrn_ioeventfd_handler, 25362306a36Sopenharmony_ci NULL, false, name); 25462306a36Sopenharmony_ci if (!vm->ioeventfd_client) { 25562306a36Sopenharmony_ci dev_err(acrn_dev.this_device, "Failed to create ioeventfd ioreq client!\n"); 25662306a36Sopenharmony_ci return -EINVAL; 25762306a36Sopenharmony_ci } 25862306a36Sopenharmony_ci 25962306a36Sopenharmony_ci dev_dbg(acrn_dev.this_device, "VM %u ioeventfd init.\n", vm->vmid); 26062306a36Sopenharmony_ci return 0; 26162306a36Sopenharmony_ci} 26262306a36Sopenharmony_ci 26362306a36Sopenharmony_civoid acrn_ioeventfd_deinit(struct acrn_vm *vm) 26462306a36Sopenharmony_ci{ 26562306a36Sopenharmony_ci struct hsm_ioeventfd *p, *next; 26662306a36Sopenharmony_ci 26762306a36Sopenharmony_ci dev_dbg(acrn_dev.this_device, "VM %u ioeventfd deinit.\n", vm->vmid); 26862306a36Sopenharmony_ci acrn_ioreq_client_destroy(vm->ioeventfd_client); 26962306a36Sopenharmony_ci mutex_lock(&vm->ioeventfds_lock); 27062306a36Sopenharmony_ci list_for_each_entry_safe(p, next, &vm->ioeventfds, list) 27162306a36Sopenharmony_ci acrn_ioeventfd_shutdown(vm, p); 27262306a36Sopenharmony_ci mutex_unlock(&vm->ioeventfds_lock); 27362306a36Sopenharmony_ci} 274