162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0
262306a36Sopenharmony_ci/*
362306a36Sopenharmony_ci * ACRN HSM eventfd - use eventfd objects to signal expected I/O requests
462306a36Sopenharmony_ci *
562306a36Sopenharmony_ci * Copyright (C) 2020 Intel Corporation. All rights reserved.
662306a36Sopenharmony_ci *
762306a36Sopenharmony_ci * Authors:
862306a36Sopenharmony_ci *	Shuo Liu <shuo.a.liu@intel.com>
962306a36Sopenharmony_ci *	Yakui Zhao <yakui.zhao@intel.com>
1062306a36Sopenharmony_ci */
1162306a36Sopenharmony_ci
1262306a36Sopenharmony_ci#include <linux/eventfd.h>
1362306a36Sopenharmony_ci#include <linux/slab.h>
1462306a36Sopenharmony_ci
1562306a36Sopenharmony_ci#include "acrn_drv.h"
1662306a36Sopenharmony_ci
1762306a36Sopenharmony_ci/**
1862306a36Sopenharmony_ci * struct hsm_ioeventfd - Properties of HSM ioeventfd
1962306a36Sopenharmony_ci * @list:	Entry within &acrn_vm.ioeventfds of ioeventfds of a VM
2062306a36Sopenharmony_ci * @eventfd:	Eventfd of the HSM ioeventfd
2162306a36Sopenharmony_ci * @addr:	Address of I/O range
2262306a36Sopenharmony_ci * @data:	Data for matching
2362306a36Sopenharmony_ci * @length:	Length of I/O range
2462306a36Sopenharmony_ci * @type:	Type of I/O range (ACRN_IOREQ_TYPE_MMIO/ACRN_IOREQ_TYPE_PORTIO)
2562306a36Sopenharmony_ci * @wildcard:	Data matching or not
2662306a36Sopenharmony_ci */
2762306a36Sopenharmony_cistruct hsm_ioeventfd {
2862306a36Sopenharmony_ci	struct list_head	list;
2962306a36Sopenharmony_ci	struct eventfd_ctx	*eventfd;
3062306a36Sopenharmony_ci	u64			addr;
3162306a36Sopenharmony_ci	u64			data;
3262306a36Sopenharmony_ci	int			length;
3362306a36Sopenharmony_ci	int			type;
3462306a36Sopenharmony_ci	bool			wildcard;
3562306a36Sopenharmony_ci};
3662306a36Sopenharmony_ci
3762306a36Sopenharmony_cistatic inline int ioreq_type_from_flags(int flags)
3862306a36Sopenharmony_ci{
3962306a36Sopenharmony_ci	return flags & ACRN_IOEVENTFD_FLAG_PIO ?
4062306a36Sopenharmony_ci		       ACRN_IOREQ_TYPE_PORTIO : ACRN_IOREQ_TYPE_MMIO;
4162306a36Sopenharmony_ci}
4262306a36Sopenharmony_ci
4362306a36Sopenharmony_cistatic void acrn_ioeventfd_shutdown(struct acrn_vm *vm, struct hsm_ioeventfd *p)
4462306a36Sopenharmony_ci{
4562306a36Sopenharmony_ci	lockdep_assert_held(&vm->ioeventfds_lock);
4662306a36Sopenharmony_ci
4762306a36Sopenharmony_ci	eventfd_ctx_put(p->eventfd);
4862306a36Sopenharmony_ci	list_del(&p->list);
4962306a36Sopenharmony_ci	kfree(p);
5062306a36Sopenharmony_ci}
5162306a36Sopenharmony_ci
5262306a36Sopenharmony_cistatic bool hsm_ioeventfd_is_conflict(struct acrn_vm *vm,
5362306a36Sopenharmony_ci				      struct hsm_ioeventfd *ioeventfd)
5462306a36Sopenharmony_ci{
5562306a36Sopenharmony_ci	struct hsm_ioeventfd *p;
5662306a36Sopenharmony_ci
5762306a36Sopenharmony_ci	lockdep_assert_held(&vm->ioeventfds_lock);
5862306a36Sopenharmony_ci
5962306a36Sopenharmony_ci	/* Either one is wildcard, the data matching will be skipped. */
6062306a36Sopenharmony_ci	list_for_each_entry(p, &vm->ioeventfds, list)
6162306a36Sopenharmony_ci		if (p->eventfd == ioeventfd->eventfd &&
6262306a36Sopenharmony_ci		    p->addr == ioeventfd->addr &&
6362306a36Sopenharmony_ci		    p->type == ioeventfd->type &&
6462306a36Sopenharmony_ci		    (p->wildcard || ioeventfd->wildcard ||
6562306a36Sopenharmony_ci			p->data == ioeventfd->data))
6662306a36Sopenharmony_ci			return true;
6762306a36Sopenharmony_ci
6862306a36Sopenharmony_ci	return false;
6962306a36Sopenharmony_ci}
7062306a36Sopenharmony_ci
7162306a36Sopenharmony_ci/*
7262306a36Sopenharmony_ci * Assign an eventfd to a VM and create a HSM ioeventfd associated with the
7362306a36Sopenharmony_ci * eventfd. The properties of the HSM ioeventfd are built from a &struct
7462306a36Sopenharmony_ci * acrn_ioeventfd.
7562306a36Sopenharmony_ci */
7662306a36Sopenharmony_cistatic int acrn_ioeventfd_assign(struct acrn_vm *vm,
7762306a36Sopenharmony_ci				 struct acrn_ioeventfd *args)
7862306a36Sopenharmony_ci{
7962306a36Sopenharmony_ci	struct eventfd_ctx *eventfd;
8062306a36Sopenharmony_ci	struct hsm_ioeventfd *p;
8162306a36Sopenharmony_ci	int ret;
8262306a36Sopenharmony_ci
8362306a36Sopenharmony_ci	/* Check for range overflow */
8462306a36Sopenharmony_ci	if (args->addr + args->len < args->addr)
8562306a36Sopenharmony_ci		return -EINVAL;
8662306a36Sopenharmony_ci
8762306a36Sopenharmony_ci	/*
8862306a36Sopenharmony_ci	 * Currently, acrn_ioeventfd is used to support vhost. 1,2,4,8 width
8962306a36Sopenharmony_ci	 * accesses can cover vhost's requirements.
9062306a36Sopenharmony_ci	 */
9162306a36Sopenharmony_ci	if (!(args->len == 1 || args->len == 2 ||
9262306a36Sopenharmony_ci	      args->len == 4 || args->len == 8))
9362306a36Sopenharmony_ci		return -EINVAL;
9462306a36Sopenharmony_ci
9562306a36Sopenharmony_ci	eventfd = eventfd_ctx_fdget(args->fd);
9662306a36Sopenharmony_ci	if (IS_ERR(eventfd))
9762306a36Sopenharmony_ci		return PTR_ERR(eventfd);
9862306a36Sopenharmony_ci
9962306a36Sopenharmony_ci	p = kzalloc(sizeof(*p), GFP_KERNEL);
10062306a36Sopenharmony_ci	if (!p) {
10162306a36Sopenharmony_ci		ret = -ENOMEM;
10262306a36Sopenharmony_ci		goto fail;
10362306a36Sopenharmony_ci	}
10462306a36Sopenharmony_ci
10562306a36Sopenharmony_ci	INIT_LIST_HEAD(&p->list);
10662306a36Sopenharmony_ci	p->addr = args->addr;
10762306a36Sopenharmony_ci	p->length = args->len;
10862306a36Sopenharmony_ci	p->eventfd = eventfd;
10962306a36Sopenharmony_ci	p->type = ioreq_type_from_flags(args->flags);
11062306a36Sopenharmony_ci
11162306a36Sopenharmony_ci	/*
11262306a36Sopenharmony_ci	 * ACRN_IOEVENTFD_FLAG_DATAMATCH flag is set in virtio 1.0 support, the
11362306a36Sopenharmony_ci	 * writing of notification register of each virtqueue may trigger the
11462306a36Sopenharmony_ci	 * notification. There is no data matching requirement.
11562306a36Sopenharmony_ci	 */
11662306a36Sopenharmony_ci	if (args->flags & ACRN_IOEVENTFD_FLAG_DATAMATCH)
11762306a36Sopenharmony_ci		p->data = args->data;
11862306a36Sopenharmony_ci	else
11962306a36Sopenharmony_ci		p->wildcard = true;
12062306a36Sopenharmony_ci
12162306a36Sopenharmony_ci	mutex_lock(&vm->ioeventfds_lock);
12262306a36Sopenharmony_ci
12362306a36Sopenharmony_ci	if (hsm_ioeventfd_is_conflict(vm, p)) {
12462306a36Sopenharmony_ci		ret = -EEXIST;
12562306a36Sopenharmony_ci		goto unlock_fail;
12662306a36Sopenharmony_ci	}
12762306a36Sopenharmony_ci
12862306a36Sopenharmony_ci	/* register the I/O range into ioreq client */
12962306a36Sopenharmony_ci	ret = acrn_ioreq_range_add(vm->ioeventfd_client, p->type,
13062306a36Sopenharmony_ci				   p->addr, p->addr + p->length - 1);
13162306a36Sopenharmony_ci	if (ret < 0)
13262306a36Sopenharmony_ci		goto unlock_fail;
13362306a36Sopenharmony_ci
13462306a36Sopenharmony_ci	list_add_tail(&p->list, &vm->ioeventfds);
13562306a36Sopenharmony_ci	mutex_unlock(&vm->ioeventfds_lock);
13662306a36Sopenharmony_ci
13762306a36Sopenharmony_ci	return 0;
13862306a36Sopenharmony_ci
13962306a36Sopenharmony_ciunlock_fail:
14062306a36Sopenharmony_ci	mutex_unlock(&vm->ioeventfds_lock);
14162306a36Sopenharmony_ci	kfree(p);
14262306a36Sopenharmony_cifail:
14362306a36Sopenharmony_ci	eventfd_ctx_put(eventfd);
14462306a36Sopenharmony_ci	return ret;
14562306a36Sopenharmony_ci}
14662306a36Sopenharmony_ci
14762306a36Sopenharmony_cistatic int acrn_ioeventfd_deassign(struct acrn_vm *vm,
14862306a36Sopenharmony_ci				   struct acrn_ioeventfd *args)
14962306a36Sopenharmony_ci{
15062306a36Sopenharmony_ci	struct hsm_ioeventfd *p;
15162306a36Sopenharmony_ci	struct eventfd_ctx *eventfd;
15262306a36Sopenharmony_ci
15362306a36Sopenharmony_ci	eventfd = eventfd_ctx_fdget(args->fd);
15462306a36Sopenharmony_ci	if (IS_ERR(eventfd))
15562306a36Sopenharmony_ci		return PTR_ERR(eventfd);
15662306a36Sopenharmony_ci
15762306a36Sopenharmony_ci	mutex_lock(&vm->ioeventfds_lock);
15862306a36Sopenharmony_ci	list_for_each_entry(p, &vm->ioeventfds, list) {
15962306a36Sopenharmony_ci		if (p->eventfd != eventfd)
16062306a36Sopenharmony_ci			continue;
16162306a36Sopenharmony_ci
16262306a36Sopenharmony_ci		acrn_ioreq_range_del(vm->ioeventfd_client, p->type,
16362306a36Sopenharmony_ci				     p->addr, p->addr + p->length - 1);
16462306a36Sopenharmony_ci		acrn_ioeventfd_shutdown(vm, p);
16562306a36Sopenharmony_ci		break;
16662306a36Sopenharmony_ci	}
16762306a36Sopenharmony_ci	mutex_unlock(&vm->ioeventfds_lock);
16862306a36Sopenharmony_ci
16962306a36Sopenharmony_ci	eventfd_ctx_put(eventfd);
17062306a36Sopenharmony_ci	return 0;
17162306a36Sopenharmony_ci}
17262306a36Sopenharmony_ci
17362306a36Sopenharmony_cistatic struct hsm_ioeventfd *hsm_ioeventfd_match(struct acrn_vm *vm, u64 addr,
17462306a36Sopenharmony_ci						 u64 data, int len, int type)
17562306a36Sopenharmony_ci{
17662306a36Sopenharmony_ci	struct hsm_ioeventfd *p = NULL;
17762306a36Sopenharmony_ci
17862306a36Sopenharmony_ci	lockdep_assert_held(&vm->ioeventfds_lock);
17962306a36Sopenharmony_ci
18062306a36Sopenharmony_ci	list_for_each_entry(p, &vm->ioeventfds, list) {
18162306a36Sopenharmony_ci		if (p->type == type && p->addr == addr && p->length >= len &&
18262306a36Sopenharmony_ci		    (p->wildcard || p->data == data))
18362306a36Sopenharmony_ci			return p;
18462306a36Sopenharmony_ci	}
18562306a36Sopenharmony_ci
18662306a36Sopenharmony_ci	return NULL;
18762306a36Sopenharmony_ci}
18862306a36Sopenharmony_ci
18962306a36Sopenharmony_cistatic int acrn_ioeventfd_handler(struct acrn_ioreq_client *client,
19062306a36Sopenharmony_ci				  struct acrn_io_request *req)
19162306a36Sopenharmony_ci{
19262306a36Sopenharmony_ci	struct hsm_ioeventfd *p;
19362306a36Sopenharmony_ci	u64 addr, val;
19462306a36Sopenharmony_ci	int size;
19562306a36Sopenharmony_ci
19662306a36Sopenharmony_ci	if (req->type == ACRN_IOREQ_TYPE_MMIO) {
19762306a36Sopenharmony_ci		/*
19862306a36Sopenharmony_ci		 * I/O requests are dispatched by range check only, so a
19962306a36Sopenharmony_ci		 * acrn_ioreq_client need process both READ and WRITE accesses
20062306a36Sopenharmony_ci		 * of same range. READ accesses are safe to be ignored here
20162306a36Sopenharmony_ci		 * because virtio PCI devices write the notify registers for
20262306a36Sopenharmony_ci		 * notification.
20362306a36Sopenharmony_ci		 */
20462306a36Sopenharmony_ci		if (req->reqs.mmio_request.direction == ACRN_IOREQ_DIR_READ) {
20562306a36Sopenharmony_ci			/* reading does nothing and return 0 */
20662306a36Sopenharmony_ci			req->reqs.mmio_request.value = 0;
20762306a36Sopenharmony_ci			return 0;
20862306a36Sopenharmony_ci		}
20962306a36Sopenharmony_ci		addr = req->reqs.mmio_request.address;
21062306a36Sopenharmony_ci		size = req->reqs.mmio_request.size;
21162306a36Sopenharmony_ci		val = req->reqs.mmio_request.value;
21262306a36Sopenharmony_ci	} else {
21362306a36Sopenharmony_ci		if (req->reqs.pio_request.direction == ACRN_IOREQ_DIR_READ) {
21462306a36Sopenharmony_ci			/* reading does nothing and return 0 */
21562306a36Sopenharmony_ci			req->reqs.pio_request.value = 0;
21662306a36Sopenharmony_ci			return 0;
21762306a36Sopenharmony_ci		}
21862306a36Sopenharmony_ci		addr = req->reqs.pio_request.address;
21962306a36Sopenharmony_ci		size = req->reqs.pio_request.size;
22062306a36Sopenharmony_ci		val = req->reqs.pio_request.value;
22162306a36Sopenharmony_ci	}
22262306a36Sopenharmony_ci
22362306a36Sopenharmony_ci	mutex_lock(&client->vm->ioeventfds_lock);
22462306a36Sopenharmony_ci	p = hsm_ioeventfd_match(client->vm, addr, val, size, req->type);
22562306a36Sopenharmony_ci	if (p)
22662306a36Sopenharmony_ci		eventfd_signal(p->eventfd, 1);
22762306a36Sopenharmony_ci	mutex_unlock(&client->vm->ioeventfds_lock);
22862306a36Sopenharmony_ci
22962306a36Sopenharmony_ci	return 0;
23062306a36Sopenharmony_ci}
23162306a36Sopenharmony_ci
23262306a36Sopenharmony_ciint acrn_ioeventfd_config(struct acrn_vm *vm, struct acrn_ioeventfd *args)
23362306a36Sopenharmony_ci{
23462306a36Sopenharmony_ci	int ret;
23562306a36Sopenharmony_ci
23662306a36Sopenharmony_ci	if (args->flags & ACRN_IOEVENTFD_FLAG_DEASSIGN)
23762306a36Sopenharmony_ci		ret = acrn_ioeventfd_deassign(vm, args);
23862306a36Sopenharmony_ci	else
23962306a36Sopenharmony_ci		ret = acrn_ioeventfd_assign(vm, args);
24062306a36Sopenharmony_ci
24162306a36Sopenharmony_ci	return ret;
24262306a36Sopenharmony_ci}
24362306a36Sopenharmony_ci
24462306a36Sopenharmony_ciint acrn_ioeventfd_init(struct acrn_vm *vm)
24562306a36Sopenharmony_ci{
24662306a36Sopenharmony_ci	char name[ACRN_NAME_LEN];
24762306a36Sopenharmony_ci
24862306a36Sopenharmony_ci	mutex_init(&vm->ioeventfds_lock);
24962306a36Sopenharmony_ci	INIT_LIST_HEAD(&vm->ioeventfds);
25062306a36Sopenharmony_ci	snprintf(name, sizeof(name), "ioeventfd-%u", vm->vmid);
25162306a36Sopenharmony_ci	vm->ioeventfd_client = acrn_ioreq_client_create(vm,
25262306a36Sopenharmony_ci							acrn_ioeventfd_handler,
25362306a36Sopenharmony_ci							NULL, false, name);
25462306a36Sopenharmony_ci	if (!vm->ioeventfd_client) {
25562306a36Sopenharmony_ci		dev_err(acrn_dev.this_device, "Failed to create ioeventfd ioreq client!\n");
25662306a36Sopenharmony_ci		return -EINVAL;
25762306a36Sopenharmony_ci	}
25862306a36Sopenharmony_ci
25962306a36Sopenharmony_ci	dev_dbg(acrn_dev.this_device, "VM %u ioeventfd init.\n", vm->vmid);
26062306a36Sopenharmony_ci	return 0;
26162306a36Sopenharmony_ci}
26262306a36Sopenharmony_ci
26362306a36Sopenharmony_civoid acrn_ioeventfd_deinit(struct acrn_vm *vm)
26462306a36Sopenharmony_ci{
26562306a36Sopenharmony_ci	struct hsm_ioeventfd *p, *next;
26662306a36Sopenharmony_ci
26762306a36Sopenharmony_ci	dev_dbg(acrn_dev.this_device, "VM %u ioeventfd deinit.\n", vm->vmid);
26862306a36Sopenharmony_ci	acrn_ioreq_client_destroy(vm->ioeventfd_client);
26962306a36Sopenharmony_ci	mutex_lock(&vm->ioeventfds_lock);
27062306a36Sopenharmony_ci	list_for_each_entry_safe(p, next, &vm->ioeventfds, list)
27162306a36Sopenharmony_ci		acrn_ioeventfd_shutdown(vm, p);
27262306a36Sopenharmony_ci	mutex_unlock(&vm->ioeventfds_lock);
27362306a36Sopenharmony_ci}
274