1 // SPDX-License-Identifier: GPL-2.0-only
2 /*
3  * VMware VMCI Driver
4  *
5  * Copyright (C) 2012 VMware, Inc. All rights reserved.
6  */
7 
8 #include <linux/vmw_vmci_defs.h>
9 #include <linux/vmw_vmci_api.h>
10 #include <linux/completion.h>
11 #include <linux/hash.h>
12 #include <linux/kernel.h>
13 #include <linux/list.h>
14 #include <linux/module.h>
15 #include <linux/sched.h>
16 #include <linux/slab.h>
17 
18 #include "vmci_datagram.h"
19 #include "vmci_doorbell.h"
20 #include "vmci_resource.h"
21 #include "vmci_driver.h"
22 #include "vmci_route.h"
23 
24 
25 #define VMCI_DOORBELL_INDEX_BITS	6
26 #define VMCI_DOORBELL_INDEX_TABLE_SIZE	(1 << VMCI_DOORBELL_INDEX_BITS)
27 #define VMCI_DOORBELL_HASH(_idx)	hash_32(_idx, VMCI_DOORBELL_INDEX_BITS)
28 
29 /*
30  * DoorbellEntry describes the a doorbell notification handle allocated by the
31  * host.
32  */
33 struct dbell_entry {
34 	struct vmci_resource resource;
35 	struct hlist_node node;
36 	struct work_struct work;
37 	vmci_callback notify_cb;
38 	void *client_data;
39 	u32 idx;
40 	u32 priv_flags;
41 	bool run_delayed;
42 	atomic_t active;	/* Only used by guest personality */
43 };
44 
45 /* The VMCI index table keeps track of currently registered doorbells. */
46 struct dbell_index_table {
47 	spinlock_t lock;	/* Index table lock */
48 	struct hlist_head entries[VMCI_DOORBELL_INDEX_TABLE_SIZE];
49 };
50 
51 static struct dbell_index_table vmci_doorbell_it = {
52 	.lock = __SPIN_LOCK_UNLOCKED(vmci_doorbell_it.lock),
53 };
54 
55 /*
56  * The max_notify_idx is one larger than the currently known bitmap index in
57  * use, and is used to determine how much of the bitmap needs to be scanned.
58  */
59 static u32 max_notify_idx;
60 
61 /*
62  * The notify_idx_count is used for determining whether there are free entries
63  * within the bitmap (if notify_idx_count + 1 < max_notify_idx).
64  */
65 static u32 notify_idx_count;
66 
67 /*
68  * The last_notify_idx_reserved is used to track the last index handed out - in
69  * the case where multiple handles share a notification index, we hand out
70  * indexes round robin based on last_notify_idx_reserved.
71  */
72 static u32 last_notify_idx_reserved;
73 
74 /* This is a one entry cache used to by the index allocation. */
75 static u32 last_notify_idx_released = PAGE_SIZE;
76 
77 
78 /*
79  * Utility function that retrieves the privilege flags associated
80  * with a given doorbell handle. For guest endpoints, the
81  * privileges are determined by the context ID, but for host
82  * endpoints privileges are associated with the complete
83  * handle. Hypervisor endpoints are not yet supported.
84  */
vmci_dbell_get_priv_flags(struct vmci_handle handle,u32 * priv_flags)85 int vmci_dbell_get_priv_flags(struct vmci_handle handle, u32 *priv_flags)
86 {
87 	if (priv_flags == NULL || handle.context == VMCI_INVALID_ID)
88 		return VMCI_ERROR_INVALID_ARGS;
89 
90 	if (handle.context == VMCI_HOST_CONTEXT_ID) {
91 		struct dbell_entry *entry;
92 		struct vmci_resource *resource;
93 
94 		resource = vmci_resource_by_handle(handle,
95 						   VMCI_RESOURCE_TYPE_DOORBELL);
96 		if (!resource)
97 			return VMCI_ERROR_NOT_FOUND;
98 
99 		entry = container_of(resource, struct dbell_entry, resource);
100 		*priv_flags = entry->priv_flags;
101 		vmci_resource_put(resource);
102 	} else if (handle.context == VMCI_HYPERVISOR_CONTEXT_ID) {
103 		/*
104 		 * Hypervisor endpoints for notifications are not
105 		 * supported (yet).
106 		 */
107 		return VMCI_ERROR_INVALID_ARGS;
108 	} else {
109 		*priv_flags = vmci_context_get_priv_flags(handle.context);
110 	}
111 
112 	return VMCI_SUCCESS;
113 }
114 
115 /*
116  * Find doorbell entry by bitmap index.
117  */
dbell_index_table_find(u32 idx)118 static struct dbell_entry *dbell_index_table_find(u32 idx)
119 {
120 	u32 bucket = VMCI_DOORBELL_HASH(idx);
121 	struct dbell_entry *dbell;
122 
123 	hlist_for_each_entry(dbell, &vmci_doorbell_it.entries[bucket],
124 			     node) {
125 		if (idx == dbell->idx)
126 			return dbell;
127 	}
128 
129 	return NULL;
130 }
131 
132 /*
133  * Add the given entry to the index table.  This willi take a reference to the
134  * entry's resource so that the entry is not deleted before it is removed from
135  * the * table.
136  */
dbell_index_table_add(struct dbell_entry * entry)137 static void dbell_index_table_add(struct dbell_entry *entry)
138 {
139 	u32 bucket;
140 	u32 new_notify_idx;
141 
142 	vmci_resource_get(&entry->resource);
143 
144 	spin_lock_bh(&vmci_doorbell_it.lock);
145 
146 	/*
147 	 * Below we try to allocate an index in the notification
148 	 * bitmap with "not too much" sharing between resources. If we
149 	 * use less that the full bitmap, we either add to the end if
150 	 * there are no unused flags within the currently used area,
151 	 * or we search for unused ones. If we use the full bitmap, we
152 	 * allocate the index round robin.
153 	 */
154 	if (max_notify_idx < PAGE_SIZE || notify_idx_count < PAGE_SIZE) {
155 		if (last_notify_idx_released < max_notify_idx &&
156 		    !dbell_index_table_find(last_notify_idx_released)) {
157 			new_notify_idx = last_notify_idx_released;
158 			last_notify_idx_released = PAGE_SIZE;
159 		} else {
160 			bool reused = false;
161 			new_notify_idx = last_notify_idx_reserved;
162 			if (notify_idx_count + 1 < max_notify_idx) {
163 				do {
164 					if (!dbell_index_table_find
165 					    (new_notify_idx)) {
166 						reused = true;
167 						break;
168 					}
169 					new_notify_idx = (new_notify_idx + 1) %
170 					    max_notify_idx;
171 				} while (new_notify_idx !=
172 					 last_notify_idx_released);
173 			}
174 			if (!reused) {
175 				new_notify_idx = max_notify_idx;
176 				max_notify_idx++;
177 			}
178 		}
179 	} else {
180 		new_notify_idx = (last_notify_idx_reserved + 1) % PAGE_SIZE;
181 	}
182 
183 	last_notify_idx_reserved = new_notify_idx;
184 	notify_idx_count++;
185 
186 	entry->idx = new_notify_idx;
187 	bucket = VMCI_DOORBELL_HASH(entry->idx);
188 	hlist_add_head(&entry->node, &vmci_doorbell_it.entries[bucket]);
189 
190 	spin_unlock_bh(&vmci_doorbell_it.lock);
191 }
192 
193 /*
194  * Remove the given entry from the index table.  This will release() the
195  * entry's resource.
196  */
dbell_index_table_remove(struct dbell_entry * entry)197 static void dbell_index_table_remove(struct dbell_entry *entry)
198 {
199 	spin_lock_bh(&vmci_doorbell_it.lock);
200 
201 	hlist_del_init(&entry->node);
202 
203 	notify_idx_count--;
204 	if (entry->idx == max_notify_idx - 1) {
205 		/*
206 		 * If we delete an entry with the maximum known
207 		 * notification index, we take the opportunity to
208 		 * prune the current max. As there might be other
209 		 * unused indices immediately below, we lower the
210 		 * maximum until we hit an index in use.
211 		 */
212 		while (max_notify_idx > 0 &&
213 		       !dbell_index_table_find(max_notify_idx - 1))
214 			max_notify_idx--;
215 	}
216 
217 	last_notify_idx_released = entry->idx;
218 
219 	spin_unlock_bh(&vmci_doorbell_it.lock);
220 
221 	vmci_resource_put(&entry->resource);
222 }
223 
224 /*
225  * Creates a link between the given doorbell handle and the given
226  * index in the bitmap in the device backend. A notification state
227  * is created in hypervisor.
228  */
dbell_link(struct vmci_handle handle,u32 notify_idx)229 static int dbell_link(struct vmci_handle handle, u32 notify_idx)
230 {
231 	struct vmci_doorbell_link_msg link_msg;
232 
233 	link_msg.hdr.dst = vmci_make_handle(VMCI_HYPERVISOR_CONTEXT_ID,
234 					    VMCI_DOORBELL_LINK);
235 	link_msg.hdr.src = VMCI_ANON_SRC_HANDLE;
236 	link_msg.hdr.payload_size = sizeof(link_msg) - VMCI_DG_HEADERSIZE;
237 	link_msg.handle = handle;
238 	link_msg.notify_idx = notify_idx;
239 
240 	return vmci_send_datagram(&link_msg.hdr);
241 }
242 
243 /*
244  * Unlinks the given doorbell handle from an index in the bitmap in
245  * the device backend. The notification state is destroyed in hypervisor.
246  */
dbell_unlink(struct vmci_handle handle)247 static int dbell_unlink(struct vmci_handle handle)
248 {
249 	struct vmci_doorbell_unlink_msg unlink_msg;
250 
251 	unlink_msg.hdr.dst = vmci_make_handle(VMCI_HYPERVISOR_CONTEXT_ID,
252 					      VMCI_DOORBELL_UNLINK);
253 	unlink_msg.hdr.src = VMCI_ANON_SRC_HANDLE;
254 	unlink_msg.hdr.payload_size = sizeof(unlink_msg) - VMCI_DG_HEADERSIZE;
255 	unlink_msg.handle = handle;
256 
257 	return vmci_send_datagram(&unlink_msg.hdr);
258 }
259 
260 /*
261  * Notify another guest or the host.  We send a datagram down to the
262  * host via the hypervisor with the notification info.
263  */
dbell_notify_as_guest(struct vmci_handle handle,u32 priv_flags)264 static int dbell_notify_as_guest(struct vmci_handle handle, u32 priv_flags)
265 {
266 	struct vmci_doorbell_notify_msg notify_msg;
267 
268 	notify_msg.hdr.dst = vmci_make_handle(VMCI_HYPERVISOR_CONTEXT_ID,
269 					      VMCI_DOORBELL_NOTIFY);
270 	notify_msg.hdr.src = VMCI_ANON_SRC_HANDLE;
271 	notify_msg.hdr.payload_size = sizeof(notify_msg) - VMCI_DG_HEADERSIZE;
272 	notify_msg.handle = handle;
273 
274 	return vmci_send_datagram(&notify_msg.hdr);
275 }
276 
277 /*
278  * Calls the specified callback in a delayed context.
279  */
dbell_delayed_dispatch(struct work_struct * work)280 static void dbell_delayed_dispatch(struct work_struct *work)
281 {
282 	struct dbell_entry *entry = container_of(work,
283 						 struct dbell_entry, work);
284 
285 	entry->notify_cb(entry->client_data);
286 	vmci_resource_put(&entry->resource);
287 }
288 
289 /*
290  * Dispatches a doorbell notification to the host context.
291  */
vmci_dbell_host_context_notify(u32 src_cid,struct vmci_handle handle)292 int vmci_dbell_host_context_notify(u32 src_cid, struct vmci_handle handle)
293 {
294 	struct dbell_entry *entry;
295 	struct vmci_resource *resource;
296 
297 	if (vmci_handle_is_invalid(handle)) {
298 		pr_devel("Notifying an invalid doorbell (handle=0x%x:0x%x)\n",
299 			 handle.context, handle.resource);
300 		return VMCI_ERROR_INVALID_ARGS;
301 	}
302 
303 	resource = vmci_resource_by_handle(handle,
304 					   VMCI_RESOURCE_TYPE_DOORBELL);
305 	if (!resource) {
306 		pr_devel("Notifying an unknown doorbell (handle=0x%x:0x%x)\n",
307 			 handle.context, handle.resource);
308 		return VMCI_ERROR_NOT_FOUND;
309 	}
310 
311 	entry = container_of(resource, struct dbell_entry, resource);
312 	if (entry->run_delayed) {
313 		if (!schedule_work(&entry->work))
314 			vmci_resource_put(resource);
315 	} else {
316 		entry->notify_cb(entry->client_data);
317 		vmci_resource_put(resource);
318 	}
319 
320 	return VMCI_SUCCESS;
321 }
322 
323 /*
324  * Register the notification bitmap with the host.
325  */
vmci_dbell_register_notification_bitmap(u64 bitmap_ppn)326 bool vmci_dbell_register_notification_bitmap(u64 bitmap_ppn)
327 {
328 	int result;
329 	struct vmci_notify_bm_set_msg bitmap_set_msg = { };
330 
331 	bitmap_set_msg.hdr.dst = vmci_make_handle(VMCI_HYPERVISOR_CONTEXT_ID,
332 						  VMCI_SET_NOTIFY_BITMAP);
333 	bitmap_set_msg.hdr.src = VMCI_ANON_SRC_HANDLE;
334 	bitmap_set_msg.hdr.payload_size = sizeof(bitmap_set_msg) -
335 	    VMCI_DG_HEADERSIZE;
336 	if (vmci_use_ppn64())
337 		bitmap_set_msg.bitmap_ppn64 = bitmap_ppn;
338 	else
339 		bitmap_set_msg.bitmap_ppn32 = (u32) bitmap_ppn;
340 
341 	result = vmci_send_datagram(&bitmap_set_msg.hdr);
342 	if (result != VMCI_SUCCESS) {
343 		pr_devel("Failed to register (PPN=%llu) as notification bitmap (error=%d)\n",
344 			 bitmap_ppn, result);
345 		return false;
346 	}
347 	return true;
348 }
349 
350 /*
351  * Executes or schedules the handlers for a given notify index.
352  */
dbell_fire_entries(u32 notify_idx)353 static void dbell_fire_entries(u32 notify_idx)
354 {
355 	u32 bucket = VMCI_DOORBELL_HASH(notify_idx);
356 	struct dbell_entry *dbell;
357 
358 	spin_lock_bh(&vmci_doorbell_it.lock);
359 
360 	hlist_for_each_entry(dbell, &vmci_doorbell_it.entries[bucket], node) {
361 		if (dbell->idx == notify_idx &&
362 		    atomic_read(&dbell->active) == 1) {
363 			if (dbell->run_delayed) {
364 				vmci_resource_get(&dbell->resource);
365 				if (!schedule_work(&dbell->work))
366 					vmci_resource_put(&dbell->resource);
367 			} else {
368 				dbell->notify_cb(dbell->client_data);
369 			}
370 		}
371 	}
372 
373 	spin_unlock_bh(&vmci_doorbell_it.lock);
374 }
375 
376 /*
377  * Scans the notification bitmap, collects pending notifications,
378  * resets the bitmap and invokes appropriate callbacks.
379  */
vmci_dbell_scan_notification_entries(u8 * bitmap)380 void vmci_dbell_scan_notification_entries(u8 *bitmap)
381 {
382 	u32 idx;
383 
384 	for (idx = 0; idx < max_notify_idx; idx++) {
385 		if (bitmap[idx] & 0x1) {
386 			bitmap[idx] &= ~1;
387 			dbell_fire_entries(idx);
388 		}
389 	}
390 }
391 
392 /*
393  * vmci_doorbell_create() - Creates a doorbell
394  * @handle:     A handle used to track the resource.  Can be invalid.
395  * @flags:      Flag that determines context of callback.
396  * @priv_flags: Privileges flags.
397  * @notify_cb:  The callback to be ivoked when the doorbell fires.
398  * @client_data:        A parameter to be passed to the callback.
399  *
400  * Creates a doorbell with the given callback. If the handle is
401  * VMCI_INVALID_HANDLE, a free handle will be assigned, if
402  * possible. The callback can be run immediately (potentially with
403  * locks held - the default) or delayed (in a kernel thread) by
404  * specifying the flag VMCI_FLAG_DELAYED_CB. If delayed execution
405  * is selected, a given callback may not be run if the kernel is
406  * unable to allocate memory for the delayed execution (highly
407  * unlikely).
408  */
vmci_doorbell_create(struct vmci_handle * handle,u32 flags,u32 priv_flags,vmci_callback notify_cb,void * client_data)409 int vmci_doorbell_create(struct vmci_handle *handle,
410 			 u32 flags,
411 			 u32 priv_flags,
412 			 vmci_callback notify_cb, void *client_data)
413 {
414 	struct dbell_entry *entry;
415 	struct vmci_handle new_handle;
416 	int result;
417 
418 	if (!handle || !notify_cb || flags & ~VMCI_FLAG_DELAYED_CB ||
419 	    priv_flags & ~VMCI_PRIVILEGE_ALL_FLAGS)
420 		return VMCI_ERROR_INVALID_ARGS;
421 
422 	entry = kmalloc(sizeof(*entry), GFP_KERNEL);
423 	if (entry == NULL) {
424 		pr_warn("Failed allocating memory for datagram entry\n");
425 		return VMCI_ERROR_NO_MEM;
426 	}
427 
428 	if (vmci_handle_is_invalid(*handle)) {
429 		u32 context_id = vmci_get_context_id();
430 
431 		if (context_id == VMCI_INVALID_ID) {
432 			pr_warn("Failed to get context ID\n");
433 			result = VMCI_ERROR_NO_RESOURCES;
434 			goto free_mem;
435 		}
436 
437 		/* Let resource code allocate a free ID for us */
438 		new_handle = vmci_make_handle(context_id, VMCI_INVALID_ID);
439 	} else {
440 		bool valid_context = false;
441 
442 		/*
443 		 * Validate the handle.  We must do both of the checks below
444 		 * because we can be acting as both a host and a guest at the
445 		 * same time. We always allow the host context ID, since the
446 		 * host functionality is in practice always there with the
447 		 * unified driver.
448 		 */
449 		if (handle->context == VMCI_HOST_CONTEXT_ID ||
450 		    (vmci_guest_code_active() &&
451 		     vmci_get_context_id() == handle->context)) {
452 			valid_context = true;
453 		}
454 
455 		if (!valid_context || handle->resource == VMCI_INVALID_ID) {
456 			pr_devel("Invalid argument (handle=0x%x:0x%x)\n",
457 				 handle->context, handle->resource);
458 			result = VMCI_ERROR_INVALID_ARGS;
459 			goto free_mem;
460 		}
461 
462 		new_handle = *handle;
463 	}
464 
465 	entry->idx = 0;
466 	INIT_HLIST_NODE(&entry->node);
467 	entry->priv_flags = priv_flags;
468 	INIT_WORK(&entry->work, dbell_delayed_dispatch);
469 	entry->run_delayed = flags & VMCI_FLAG_DELAYED_CB;
470 	entry->notify_cb = notify_cb;
471 	entry->client_data = client_data;
472 	atomic_set(&entry->active, 0);
473 
474 	result = vmci_resource_add(&entry->resource,
475 				   VMCI_RESOURCE_TYPE_DOORBELL,
476 				   new_handle);
477 	if (result != VMCI_SUCCESS) {
478 		pr_warn("Failed to add new resource (handle=0x%x:0x%x), error: %d\n",
479 			new_handle.context, new_handle.resource, result);
480 		goto free_mem;
481 	}
482 
483 	new_handle = vmci_resource_handle(&entry->resource);
484 	if (vmci_guest_code_active()) {
485 		dbell_index_table_add(entry);
486 		result = dbell_link(new_handle, entry->idx);
487 		if (VMCI_SUCCESS != result)
488 			goto destroy_resource;
489 
490 		atomic_set(&entry->active, 1);
491 	}
492 
493 	*handle = new_handle;
494 
495 	return result;
496 
497  destroy_resource:
498 	dbell_index_table_remove(entry);
499 	vmci_resource_remove(&entry->resource);
500  free_mem:
501 	kfree(entry);
502 	return result;
503 }
504 EXPORT_SYMBOL_GPL(vmci_doorbell_create);
505 
506 /*
507  * vmci_doorbell_destroy() - Destroy a doorbell.
508  * @handle:     The handle tracking the resource.
509  *
510  * Destroys a doorbell previously created with vmcii_doorbell_create. This
511  * operation may block waiting for a callback to finish.
512  */
vmci_doorbell_destroy(struct vmci_handle handle)513 int vmci_doorbell_destroy(struct vmci_handle handle)
514 {
515 	struct dbell_entry *entry;
516 	struct vmci_resource *resource;
517 
518 	if (vmci_handle_is_invalid(handle))
519 		return VMCI_ERROR_INVALID_ARGS;
520 
521 	resource = vmci_resource_by_handle(handle,
522 					   VMCI_RESOURCE_TYPE_DOORBELL);
523 	if (!resource) {
524 		pr_devel("Failed to destroy doorbell (handle=0x%x:0x%x)\n",
525 			 handle.context, handle.resource);
526 		return VMCI_ERROR_NOT_FOUND;
527 	}
528 
529 	entry = container_of(resource, struct dbell_entry, resource);
530 
531 	if (!hlist_unhashed(&entry->node)) {
532 		int result;
533 
534 		dbell_index_table_remove(entry);
535 
536 		result = dbell_unlink(handle);
537 		if (VMCI_SUCCESS != result) {
538 
539 			/*
540 			 * The only reason this should fail would be
541 			 * an inconsistency between guest and
542 			 * hypervisor state, where the guest believes
543 			 * it has an active registration whereas the
544 			 * hypervisor doesn't. One case where this may
545 			 * happen is if a doorbell is unregistered
546 			 * following a hibernation at a time where the
547 			 * doorbell state hasn't been restored on the
548 			 * hypervisor side yet. Since the handle has
549 			 * now been removed in the guest, we just
550 			 * print a warning and return success.
551 			 */
552 			pr_devel("Unlink of doorbell (handle=0x%x:0x%x) unknown by hypervisor (error=%d)\n",
553 				 handle.context, handle.resource, result);
554 		}
555 	}
556 
557 	/*
558 	 * Now remove the resource from the table.  It might still be in use
559 	 * after this, in a callback or still on the delayed work queue.
560 	 */
561 	vmci_resource_put(&entry->resource);
562 	vmci_resource_remove(&entry->resource);
563 
564 	kfree(entry);
565 
566 	return VMCI_SUCCESS;
567 }
568 EXPORT_SYMBOL_GPL(vmci_doorbell_destroy);
569 
570 /*
571  * vmci_doorbell_notify() - Ring the doorbell (and hide in the bushes).
572  * @dst:        The handlle identifying the doorbell resource
573  * @priv_flags: Priviledge flags.
574  *
575  * Generates a notification on the doorbell identified by the
576  * handle. For host side generation of notifications, the caller
577  * can specify what the privilege of the calling side is.
578  */
vmci_doorbell_notify(struct vmci_handle dst,u32 priv_flags)579 int vmci_doorbell_notify(struct vmci_handle dst, u32 priv_flags)
580 {
581 	int retval;
582 	enum vmci_route route;
583 	struct vmci_handle src;
584 
585 	if (vmci_handle_is_invalid(dst) ||
586 	    (priv_flags & ~VMCI_PRIVILEGE_ALL_FLAGS))
587 		return VMCI_ERROR_INVALID_ARGS;
588 
589 	src = VMCI_INVALID_HANDLE;
590 	retval = vmci_route(&src, &dst, false, &route);
591 	if (retval < VMCI_SUCCESS)
592 		return retval;
593 
594 	if (VMCI_ROUTE_AS_HOST == route)
595 		return vmci_ctx_notify_dbell(VMCI_HOST_CONTEXT_ID,
596 					     dst, priv_flags);
597 
598 	if (VMCI_ROUTE_AS_GUEST == route)
599 		return dbell_notify_as_guest(dst, priv_flags);
600 
601 	pr_warn("Unknown route (%d) for doorbell\n", route);
602 	return VMCI_ERROR_DST_UNREACHABLE;
603 }
604 EXPORT_SYMBOL_GPL(vmci_doorbell_notify);
605