HV: specify dispatch hypercall for sos or trusty

Changes:

- In current design, the hypercall is only allowed calling from SOS or
trusty VM, so separate the trusty hypercalls from dispatch_hypercall().
The vm parameter which referenced by hcall_xxx() should be SOS VM;

- do not inject #UD for hypercalls from non-SOS, just return -ENODEV;

Tracked-On: #3214

Signed-off-by: Victor Sun <victor.sun@intel.com>
Acked-by: Eddie Dong <eddie.dong@Intel.com>
This commit is contained in:
Victor Sun 2019-06-10 16:41:04 +08:00 committed by ACRN System Integration
parent 8c70871ff1
commit 3d3de6bd38
2 changed files with 46 additions and 46 deletions

View File

@ -19,9 +19,9 @@ static spinlock_t vmm_hypercall_lock = {
.tail = 0U, .tail = 0U,
}; };
static int32_t dispatch_hypercall(struct acrn_vcpu *vcpu) static int32_t dispatch_sos_hypercall(const struct acrn_vcpu *vcpu)
{ {
struct acrn_vm *vm = vcpu->vm; struct acrn_vm *sos_vm = vcpu->vm;
/* hypercall ID from guest*/ /* hypercall ID from guest*/
uint64_t hypcall_id = vcpu_get_gpreg(vcpu, CPU_REG_R8); uint64_t hypcall_id = vcpu_get_gpreg(vcpu, CPU_REG_R8);
/* hypercall param1 from guest*/ /* hypercall param1 from guest*/
@ -36,25 +36,25 @@ static int32_t dispatch_hypercall(struct acrn_vcpu *vcpu)
switch (hypcall_id) { switch (hypcall_id) {
case HC_SOS_OFFLINE_CPU: case HC_SOS_OFFLINE_CPU:
spinlock_obtain(&vmm_hypercall_lock); spinlock_obtain(&vmm_hypercall_lock);
ret = hcall_sos_offline_cpu(vm, param1); ret = hcall_sos_offline_cpu(sos_vm, param1);
spinlock_release(&vmm_hypercall_lock); spinlock_release(&vmm_hypercall_lock);
break; break;
case HC_GET_API_VERSION: case HC_GET_API_VERSION:
ret = hcall_get_api_version(vm, param1); ret = hcall_get_api_version(sos_vm, param1);
break; break;
case HC_GET_PLATFORM_INFO: case HC_GET_PLATFORM_INFO:
ret = hcall_get_platform_info(vm, param1); ret = hcall_get_platform_info(sos_vm, param1);
break; break;
case HC_SET_CALLBACK_VECTOR: case HC_SET_CALLBACK_VECTOR:
ret = hcall_set_callback_vector(vm, param1); ret = hcall_set_callback_vector(sos_vm, param1);
break; break;
case HC_CREATE_VM: case HC_CREATE_VM:
spinlock_obtain(&vmm_hypercall_lock); spinlock_obtain(&vmm_hypercall_lock);
ret = hcall_create_vm(vm, param1); ret = hcall_create_vm(sos_vm, param1);
spinlock_release(&vmm_hypercall_lock); spinlock_release(&vmm_hypercall_lock);
break; break;
@ -98,7 +98,7 @@ static int32_t dispatch_hypercall(struct acrn_vcpu *vcpu)
/* param1: vmid */ /* param1: vmid */
if (vmid_is_valid) { if (vmid_is_valid) {
spinlock_obtain(&vmm_hypercall_lock); spinlock_obtain(&vmm_hypercall_lock);
ret = hcall_create_vcpu(vm, vm_id, param2); ret = hcall_create_vcpu(sos_vm, vm_id, param2);
spinlock_release(&vmm_hypercall_lock); spinlock_release(&vmm_hypercall_lock);
} }
break; break;
@ -107,7 +107,7 @@ static int32_t dispatch_hypercall(struct acrn_vcpu *vcpu)
/* param1: vmid */ /* param1: vmid */
if (vmid_is_valid) { if (vmid_is_valid) {
spinlock_obtain(&vmm_hypercall_lock); spinlock_obtain(&vmm_hypercall_lock);
ret = hcall_set_vcpu_regs(vm, vm_id, param2); ret = hcall_set_vcpu_regs(sos_vm, vm_id, param2);
spinlock_release(&vmm_hypercall_lock); spinlock_release(&vmm_hypercall_lock);
} }
break; break;
@ -115,7 +115,7 @@ static int32_t dispatch_hypercall(struct acrn_vcpu *vcpu)
case HC_SET_IRQLINE: case HC_SET_IRQLINE:
/* param1: vmid */ /* param1: vmid */
if (vmid_is_valid) { if (vmid_is_valid) {
ret = hcall_set_irqline(vm, vm_id, ret = hcall_set_irqline(sos_vm, vm_id,
(struct acrn_irqline_ops *)&param2); (struct acrn_irqline_ops *)&param2);
} }
break; break;
@ -123,7 +123,7 @@ static int32_t dispatch_hypercall(struct acrn_vcpu *vcpu)
case HC_INJECT_MSI: case HC_INJECT_MSI:
/* param1: vmid */ /* param1: vmid */
if (vmid_is_valid) { if (vmid_is_valid) {
ret = hcall_inject_msi(vm, vm_id, param2); ret = hcall_inject_msi(sos_vm, vm_id, param2);
} }
break; break;
@ -131,7 +131,7 @@ static int32_t dispatch_hypercall(struct acrn_vcpu *vcpu)
/* param1: vmid */ /* param1: vmid */
if (vmid_is_valid) { if (vmid_is_valid) {
spinlock_obtain(&vmm_hypercall_lock); spinlock_obtain(&vmm_hypercall_lock);
ret = hcall_set_ioreq_buffer(vm, vm_id, param2); ret = hcall_set_ioreq_buffer(sos_vm, vm_id, param2);
spinlock_release(&vmm_hypercall_lock); spinlock_release(&vmm_hypercall_lock);
} }
break; break;
@ -146,13 +146,13 @@ static int32_t dispatch_hypercall(struct acrn_vcpu *vcpu)
break; break;
case HC_VM_SET_MEMORY_REGIONS: case HC_VM_SET_MEMORY_REGIONS:
ret = hcall_set_vm_memory_regions(vm, param1); ret = hcall_set_vm_memory_regions(sos_vm, param1);
break; break;
case HC_VM_WRITE_PROTECT_PAGE: case HC_VM_WRITE_PROTECT_PAGE:
/* param1: vmid */ /* param1: vmid */
if (vmid_is_valid) { if (vmid_is_valid) {
ret = hcall_write_protect_page(vm, vm_id, param2); ret = hcall_write_protect_page(sos_vm, vm_id, param2);
} }
break; break;
@ -167,63 +167,51 @@ static int32_t dispatch_hypercall(struct acrn_vcpu *vcpu)
case HC_VM_GPA2HPA: case HC_VM_GPA2HPA:
/* param1: vmid */ /* param1: vmid */
if (vmid_is_valid) { if (vmid_is_valid) {
ret = hcall_gpa_to_hpa(vm, vm_id, param2); ret = hcall_gpa_to_hpa(sos_vm, vm_id, param2);
} }
break; break;
case HC_ASSIGN_PTDEV: case HC_ASSIGN_PTDEV:
/* param1: vmid */ /* param1: vmid */
if (vmid_is_valid) { if (vmid_is_valid) {
ret = hcall_assign_ptdev(vm, vm_id, param2); ret = hcall_assign_ptdev(sos_vm, vm_id, param2);
} }
break; break;
case HC_DEASSIGN_PTDEV: case HC_DEASSIGN_PTDEV:
/* param1: vmid */ /* param1: vmid */
if (vmid_is_valid) { if (vmid_is_valid) {
ret = hcall_deassign_ptdev(vm, vm_id, param2); ret = hcall_deassign_ptdev(sos_vm, vm_id, param2);
} }
break; break;
case HC_SET_PTDEV_INTR_INFO: case HC_SET_PTDEV_INTR_INFO:
/* param1: vmid */ /* param1: vmid */
if (vmid_is_valid) { if (vmid_is_valid) {
ret = hcall_set_ptdev_intr_info(vm, vm_id, param2); ret = hcall_set_ptdev_intr_info(sos_vm, vm_id, param2);
} }
break; break;
case HC_RESET_PTDEV_INTR_INFO: case HC_RESET_PTDEV_INTR_INFO:
/* param1: vmid */ /* param1: vmid */
if (vmid_is_valid) { if (vmid_is_valid) {
ret = hcall_reset_ptdev_intr_info(vm, vm_id, param2); ret = hcall_reset_ptdev_intr_info(sos_vm, vm_id, param2);
} }
break; break;
case HC_WORLD_SWITCH:
ret = hcall_world_switch(vcpu);
break;
case HC_INITIALIZE_TRUSTY:
ret = hcall_initialize_trusty(vcpu, param1);
break;
case HC_PM_GET_CPU_STATE: case HC_PM_GET_CPU_STATE:
ret = hcall_get_cpu_pm_state(vm, param1, param2); ret = hcall_get_cpu_pm_state(sos_vm, param1, param2);
break;
case HC_SAVE_RESTORE_SWORLD_CTX:
ret = hcall_save_restore_sworld_ctx(vcpu);
break; break;
case HC_VM_INTR_MONITOR: case HC_VM_INTR_MONITOR:
/* param1: vmid */ /* param1: vmid */
if (vmid_is_valid) { if (vmid_is_valid) {
ret = hcall_vm_intr_monitor(vm, vm_id, param2); ret = hcall_vm_intr_monitor(sos_vm, vm_id, param2);
} }
break; break;
default: default:
ret = hcall_debug(vm, param1, param2, hypcall_id); ret = hcall_debug(sos_vm, param1, param2, hypcall_id);
break; break;
} }
@ -242,21 +230,27 @@ int32_t vmcall_vmexit_handler(struct acrn_vcpu *vcpu)
/* hypercall ID from guest*/ /* hypercall ID from guest*/
uint64_t hypcall_id = vcpu_get_gpreg(vcpu, CPU_REG_R8); uint64_t hypcall_id = vcpu_get_gpreg(vcpu, CPU_REG_R8);
if (!is_sos_vm(vm) && (hypcall_id != HC_WORLD_SWITCH) && if (!is_hypercall_from_ring0()) {
(hypcall_id != HC_INITIALIZE_TRUSTY) &&
(hypcall_id != HC_SAVE_RESTORE_SWORLD_CTX)) {
vcpu_inject_ud(vcpu);
pr_err("hypercall %d is only allowed from SOS_VM!\n", hypcall_id);
} else if (!is_hypercall_from_ring0()) {
pr_err("hypercall is only allowed from RING-0!\n"); pr_err("hypercall is only allowed from RING-0!\n");
ret = -EACCES; ret = -EACCES;
vcpu_set_gpreg(vcpu, CPU_REG_RAX, (uint64_t)ret); } else if (hypcall_id == HC_WORLD_SWITCH) {
} else { ret = hcall_world_switch(vcpu);
} else if (hypcall_id == HC_INITIALIZE_TRUSTY) {
/* hypercall param1 from guest*/
uint64_t param1 = vcpu_get_gpreg(vcpu, CPU_REG_RDI);
ret = hcall_initialize_trusty(vcpu, param1);
} else if (hypcall_id == HC_SAVE_RESTORE_SWORLD_CTX) {
ret = hcall_save_restore_sworld_ctx(vcpu);
} else if (is_sos_vm(vm)) {
/* Dispatch the hypercall handler */ /* Dispatch the hypercall handler */
ret = dispatch_hypercall(vcpu); ret = dispatch_sos_hypercall(vcpu);
vcpu_set_gpreg(vcpu, CPU_REG_RAX, (uint64_t)ret); } else {
pr_err("hypercall %d is only allowed from SOS_VM!\n", hypcall_id);
ret = -ENODEV;
} }
vcpu_set_gpreg(vcpu, CPU_REG_RAX, (uint64_t)ret);
TRACE_2L(TRACE_VMEXIT_VMCALL, vm->vm_id, hypcall_id); TRACE_2L(TRACE_VMEXIT_VMCALL, vm->vm_id, hypcall_id);
return 0; return 0;

View File

@ -337,6 +337,7 @@ int32_t hcall_reset_vm(uint16_t vmid)
* @param param guest physical address. This gpa points to * @param param guest physical address. This gpa points to
* struct acrn_vcpu_regs * struct acrn_vcpu_regs
* *
* @pre Pointer vm shall point to SOS_VM
* @return 0 on success, non-zero on error. * @return 0 on success, non-zero on error.
*/ */
int32_t hcall_set_vcpu_regs(struct acrn_vm *vm, uint16_t vmid, uint64_t param) int32_t hcall_set_vcpu_regs(struct acrn_vm *vm, uint16_t vmid, uint64_t param)
@ -407,6 +408,9 @@ int32_t hcall_set_irqline(const struct acrn_vm *vm, uint16_t vmid,
return ret; return ret;
} }
/**
*@pre Pointer vm shall point to SOS_VM
*/
static void inject_msi_lapic_pt(struct acrn_vm *vm, const struct acrn_msi_entry *vmsi) static void inject_msi_lapic_pt(struct acrn_vm *vm, const struct acrn_msi_entry *vmsi)
{ {
union apic_icr icr; union apic_icr icr;
@ -578,7 +582,9 @@ int32_t hcall_notify_ioreq_finish(uint16_t vmid, uint16_t vcpu_id)
return ret; return ret;
} }
/**
*@pre Pointer vm shall point to SOS_VM
*/
static int32_t add_vm_memory_region(struct acrn_vm *vm, struct acrn_vm *target_vm, static int32_t add_vm_memory_region(struct acrn_vm *vm, struct acrn_vm *target_vm,
const struct vm_memory_region *region,uint64_t *pml4_page) const struct vm_memory_region *region,uint64_t *pml4_page)
{ {