mirror of
https://github.com/projectacrn/acrn-hypervisor.git
synced 2025-05-10 01:16:06 +00:00
After enabling vPCI in hypervisor for vm0, UOS may not able be launched successfully. Consider this scenario (take MSI-X for example): - DM makes hypercall to hypervisor to do MSI-X remapping on behalf of UOS guests. - After the hypercall, VHM module in SOS kernel updates the physical MSI-X table with the physical Message Data/Addr. - These MMIO write requests are intercepted by hypervisor, which will call ptdev_msix_remap() to do MSI-S remapping. It may fail due to 2 possible reasons: 1) wrong target VM because: hypervisor thinks it's a VM0 MSI-X device but they have been registered as UOS guests through HC_SET_PTDEV_INTR_INFO hypercall. 2) wrong ptdev_msi_info->vmsi_data because: The virtual MSI-X table is supposed to hold virtual Message data/addr but the SOS VHM writes the physical ones to it. This patch resolves these problems by ignoring the HC_VM_PCI_MSIX_REMAP hypercall, so virtual and physical Message Data are the same from SOS' perspective and it won't mess up the virtual PCI device in HV. Also in HC_SET_PTDEV_INTR_INFO handler, vpci updates the target VM when the PCI devices are assigned to different VMs. The UOS' MSI/MSI-X remapping is triggered by hypervisor when SOS (either DM or VHM) updates the Message Data/Addr. Tracked-On: #1568 Signed-off-by: dongshen <dongsheng.x.zhang@intel.com> Signed-off-by: Zide Chen <zide.chen@intel.com> Acked-by: Anthony Xu <anthony.xu@intel.com>
202 lines
4.4 KiB
C
202 lines
4.4 KiB
C
/*
|
|
* Copyright (C) 2018 Intel Corporation. All rights reserved.
|
|
*
|
|
* SPDX-License-Identifier: BSD-3-Clause
|
|
*/
|
|
|
|
#include <hypervisor.h>
|
|
#include <hypercall.h>
|
|
|
|
/*
|
|
* Pass return value to SOS by register rax.
|
|
* This function should always return 0 since we shouldn't
|
|
* deal with hypercall error in hypervisor.
|
|
*/
|
|
int vmcall_vmexit_handler(struct vcpu *vcpu)
|
|
{
|
|
int32_t ret = -EACCES;
|
|
struct vm *vm = vcpu->vm;
|
|
/* hypercall ID from guest*/
|
|
uint64_t hypcall_id = vcpu_get_gpreg(vcpu, CPU_REG_R8);
|
|
/* hypercall param1 from guest*/
|
|
uint64_t param1 = vcpu_get_gpreg(vcpu, CPU_REG_RDI);
|
|
/* hypercall param2 from guest*/
|
|
uint64_t param2 = vcpu_get_gpreg(vcpu, CPU_REG_RSI);
|
|
|
|
if (!is_hypercall_from_ring0()) {
|
|
pr_err("hypercall is only allowed from RING-0!\n");
|
|
goto out;
|
|
}
|
|
|
|
if (!is_vm0(vm) && (hypcall_id != HC_WORLD_SWITCH) &&
|
|
(hypcall_id != HC_INITIALIZE_TRUSTY) &&
|
|
(hypcall_id != HC_SAVE_RESTORE_SWORLD_CTX)) {
|
|
pr_err("hypercall %d is only allowed from VM0!\n", hypcall_id);
|
|
goto out;
|
|
}
|
|
|
|
/* Dispatch the hypercall handler */
|
|
switch (hypcall_id) {
|
|
case HC_SOS_OFFLINE_CPU:
|
|
ret = hcall_sos_offline_cpu(vm, param1);
|
|
break;
|
|
case HC_GET_API_VERSION:
|
|
ret = hcall_get_api_version(vm, param1);
|
|
break;
|
|
|
|
case HC_SET_CALLBACK_VECTOR:
|
|
ret = hcall_set_callback_vector(vm, param1);
|
|
|
|
break;
|
|
|
|
case HC_CREATE_VM:
|
|
ret = hcall_create_vm(vm, param1);
|
|
break;
|
|
|
|
case HC_DESTROY_VM:
|
|
/* param1: vmid */
|
|
ret = hcall_destroy_vm((uint16_t)param1);
|
|
break;
|
|
|
|
case HC_START_VM:
|
|
/* param1: vmid */
|
|
ret = hcall_start_vm((uint16_t)param1);
|
|
break;
|
|
|
|
case HC_RESET_VM:
|
|
/* param1: vmid */
|
|
ret = hcall_reset_vm((uint16_t)param1);
|
|
break;
|
|
|
|
case HC_PAUSE_VM:
|
|
/* param1: vmid */
|
|
ret = hcall_pause_vm((uint16_t)param1);
|
|
break;
|
|
|
|
case HC_CREATE_VCPU:
|
|
/* param1: vmid */
|
|
ret = hcall_create_vcpu(vm, (uint16_t)param1, param2);
|
|
break;
|
|
|
|
case HC_SET_VCPU_REGS:
|
|
/* param1: vmid */
|
|
ret = hcall_set_vcpu_regs(vm, (uint16_t)param1, param2);
|
|
break;
|
|
|
|
case HC_SET_IRQLINE:
|
|
/* param1: vmid */
|
|
ret = hcall_set_irqline(vm, (uint16_t)param1,
|
|
(struct acrn_irqline_ops *)¶m2);
|
|
break;
|
|
|
|
case HC_INJECT_MSI:
|
|
/* param1: vmid */
|
|
ret = hcall_inject_msi(vm, (uint16_t)param1, param2);
|
|
break;
|
|
|
|
case HC_SET_IOREQ_BUFFER:
|
|
/* param1: vmid */
|
|
ret = hcall_set_ioreq_buffer(vm, (uint16_t)param1, param2);
|
|
break;
|
|
|
|
case HC_NOTIFY_REQUEST_FINISH:
|
|
/* param1: vmid
|
|
* param2: vcpu_id */
|
|
ret = hcall_notify_ioreq_finish((uint16_t)param1,
|
|
(uint16_t)param2);
|
|
break;
|
|
|
|
case HC_VM_SET_MEMORY_REGION:
|
|
/* param1: vmid */
|
|
ret = hcall_set_vm_memory_region(vm, (uint16_t)param1, param2);
|
|
break;
|
|
|
|
case HC_VM_SET_MEMORY_REGIONS:
|
|
ret = hcall_set_vm_memory_regions(vm, param1);
|
|
break;
|
|
|
|
case HC_VM_WRITE_PROTECT_PAGE:
|
|
ret = hcall_write_protect_page(vm, (uint16_t)param1, param2);
|
|
break;
|
|
|
|
/*
|
|
* Don't do MSI remapping and make the pmsi_data equal to vmsi_data
|
|
* This is a temporary solution before this hypercall is removed from SOS
|
|
*/
|
|
case HC_VM_PCI_MSIX_REMAP:
|
|
ret = 0;
|
|
break;
|
|
|
|
case HC_VM_GPA2HPA:
|
|
/* param1: vmid */
|
|
ret = hcall_gpa_to_hpa(vm, (uint16_t)param1, param2);
|
|
break;
|
|
|
|
case HC_ASSIGN_PTDEV:
|
|
/* param1: vmid */
|
|
ret = hcall_assign_ptdev(vm, (uint16_t)param1, param2);
|
|
break;
|
|
|
|
case HC_DEASSIGN_PTDEV:
|
|
/* param1: vmid */
|
|
ret = hcall_deassign_ptdev(vm, (uint16_t)param1, param2);
|
|
break;
|
|
|
|
case HC_SET_PTDEV_INTR_INFO:
|
|
/* param1: vmid */
|
|
ret = hcall_set_ptdev_intr_info(vm, (uint16_t)param1, param2);
|
|
break;
|
|
|
|
case HC_RESET_PTDEV_INTR_INFO:
|
|
/* param1: vmid */
|
|
ret = hcall_reset_ptdev_intr_info(vm, (uint16_t)param1, param2);
|
|
break;
|
|
|
|
#ifdef HV_DEBUG
|
|
case HC_SETUP_SBUF:
|
|
ret = hcall_setup_sbuf(vm, param1);
|
|
break;
|
|
|
|
case HC_SETUP_HV_NPK_LOG:
|
|
ret = hcall_setup_hv_npk_log(vm, param1);
|
|
break;
|
|
|
|
case HC_PROFILING_OPS:
|
|
ret = hcall_profiling_ops(vm, param1, param2);
|
|
break;
|
|
#endif
|
|
|
|
case HC_WORLD_SWITCH:
|
|
ret = hcall_world_switch(vcpu);
|
|
break;
|
|
|
|
case HC_INITIALIZE_TRUSTY:
|
|
ret = hcall_initialize_trusty(vcpu, param1);
|
|
break;
|
|
|
|
case HC_PM_GET_CPU_STATE:
|
|
ret = hcall_get_cpu_pm_state(vm, param1, param2);
|
|
break;
|
|
|
|
case HC_SAVE_RESTORE_SWORLD_CTX:
|
|
ret = hcall_save_restore_sworld_ctx(vcpu);
|
|
break;
|
|
|
|
case HC_VM_INTR_MONITOR:
|
|
ret = hcall_vm_intr_monitor(vm, (uint16_t)param1, param2);
|
|
break;
|
|
|
|
default:
|
|
pr_err("op %d: Invalid hypercall\n", hypcall_id);
|
|
ret = -EPERM;
|
|
break;
|
|
}
|
|
|
|
out:
|
|
vcpu_set_gpreg(vcpu, CPU_REG_RAX, (uint64_t)ret);
|
|
|
|
TRACE_2L(TRACE_VMEXIT_VMCALL, vm->vm_id, hypcall_id);
|
|
|
|
return 0;
|
|
}
|