Message ID | 0475e48ace0acd862224e7ff628d11db94392871.1729069025.git.bertrand.marquis@arm.com (mailing list archive) |
---|---|
State | New |
Headers | show |
Series | FF-A VM to VM support | expand |
On 16/10/2024 10:21 am, Bertrand Marquis wrote: > diff --git a/xen/arch/arm/tee/ffa_partinfo.c b/xen/arch/arm/tee/ffa_partinfo.c > index fde187dba4e5..d699a267cc76 100644 > --- a/xen/arch/arm/tee/ffa_partinfo.c > +++ b/xen/arch/arm/tee/ffa_partinfo.c > @@ -77,7 +77,21 @@ void ffa_handle_partition_info_get(struct cpu_user_regs *regs) > }; > uint32_t src_size, dst_size; > void *dst_buf; > - uint32_t ffa_sp_count = 0; > + uint32_t ffa_vm_count = 0, ffa_sp_count = 0; > +#ifdef CONFIG_FFA_VM_TO_VM > + struct domain *dom; > + > + /* Count the number of VM with FF-A support */ > + rcu_read_lock(&domlist_read_lock); > + for_each_domain( dom ) > + { > + struct ffa_ctx *vm = dom->arch.tee; > + > + if (dom != d && vm != NULL && vm->guest_vers != 0) > + ffa_vm_count++; > + } > + rcu_read_unlock(&domlist_read_lock); > +#endif ... struct domain *dom; if ( IS_ENABLED(CONFIG_FFA_VM_TO_VM) ) { /* Count the number of VM with FF-A support */ rcu_read_lock(&domlist_read_lock); ... rcu_read_unlock(&domlist_read_lock); } drops the explicit ifdef. Hiding function-level variable declarations behind an ifdef like that works exactly once, and it doesn't make pleasant code. ~Andrew
Hi Andrew, > On 1 Nov 2024, at 12:05, Andrew Cooper <andrew.cooper3@citrix.com> wrote: > > On 16/10/2024 10:21 am, Bertrand Marquis wrote: >> diff --git a/xen/arch/arm/tee/ffa_partinfo.c b/xen/arch/arm/tee/ffa_partinfo.c >> index fde187dba4e5..d699a267cc76 100644 >> --- a/xen/arch/arm/tee/ffa_partinfo.c >> +++ b/xen/arch/arm/tee/ffa_partinfo.c >> @@ -77,7 +77,21 @@ void ffa_handle_partition_info_get(struct cpu_user_regs *regs) >> }; >> uint32_t src_size, dst_size; >> void *dst_buf; >> - uint32_t ffa_sp_count = 0; >> + uint32_t ffa_vm_count = 0, ffa_sp_count = 0; >> +#ifdef CONFIG_FFA_VM_TO_VM >> + struct domain *dom; >> + >> + /* Count the number of VM with FF-A support */ >> + rcu_read_lock(&domlist_read_lock); >> + for_each_domain( dom ) >> + { >> + struct ffa_ctx *vm = dom->arch.tee; >> + >> + if (dom != d && vm != NULL && vm->guest_vers != 0) >> + ffa_vm_count++; >> + } >> + rcu_read_unlock(&domlist_read_lock); >> +#endif > > ... > struct domain *dom; > > if ( IS_ENABLED(CONFIG_FFA_VM_TO_VM) ) > { > /* Count the number of VM with FF-A support */ > rcu_read_lock(&domlist_read_lock); > ... > rcu_read_unlock(&domlist_read_lock); > } > > drops the explicit ifdef. Hiding function-level variable declarations > behind an ifdef like that works exactly once, and it doesn't make > pleasant code. Ack I will fix that. Cheers Bertrand
On 04.11.2024 08:19, Bertrand Marquis wrote: > Hi Andrew, > >> On 1 Nov 2024, at 12:05, Andrew Cooper <andrew.cooper3@citrix.com> wrote: >> >> On 16/10/2024 10:21 am, Bertrand Marquis wrote: >>> diff --git a/xen/arch/arm/tee/ffa_partinfo.c b/xen/arch/arm/tee/ffa_partinfo.c >>> index fde187dba4e5..d699a267cc76 100644 >>> --- a/xen/arch/arm/tee/ffa_partinfo.c >>> +++ b/xen/arch/arm/tee/ffa_partinfo.c >>> @@ -77,7 +77,21 @@ void ffa_handle_partition_info_get(struct cpu_user_regs *regs) >>> }; >>> uint32_t src_size, dst_size; >>> void *dst_buf; >>> - uint32_t ffa_sp_count = 0; >>> + uint32_t ffa_vm_count = 0, ffa_sp_count = 0; >>> +#ifdef CONFIG_FFA_VM_TO_VM >>> + struct domain *dom; >>> + >>> + /* Count the number of VM with FF-A support */ >>> + rcu_read_lock(&domlist_read_lock); >>> + for_each_domain( dom ) >>> + { >>> + struct ffa_ctx *vm = dom->arch.tee; >>> + >>> + if (dom != d && vm != NULL && vm->guest_vers != 0) >>> + ffa_vm_count++; >>> + } >>> + rcu_read_unlock(&domlist_read_lock); >>> +#endif >> >> ... >> struct domain *dom; >> >> if ( IS_ENABLED(CONFIG_FFA_VM_TO_VM) ) >> { >> /* Count the number of VM with FF-A support */ >> rcu_read_lock(&domlist_read_lock); >> ... >> rcu_read_unlock(&domlist_read_lock); >> } >> >> drops the explicit ifdef. Hiding function-level variable declarations >> behind an ifdef like that works exactly once, and it doesn't make >> pleasant code. > > Ack I will fix that. While at that, please also name struct domain * type variables "d", not "dom". For consistency with (almost) all other code we have. Jan
Hi Jan, > On 4 Nov 2024, at 08:46, Jan Beulich <jbeulich@suse.com> wrote: > > On 04.11.2024 08:19, Bertrand Marquis wrote: >> Hi Andrew, >> >>> On 1 Nov 2024, at 12:05, Andrew Cooper <andrew.cooper3@citrix.com> wrote: >>> >>> On 16/10/2024 10:21 am, Bertrand Marquis wrote: >>>> diff --git a/xen/arch/arm/tee/ffa_partinfo.c b/xen/arch/arm/tee/ffa_partinfo.c >>>> index fde187dba4e5..d699a267cc76 100644 >>>> --- a/xen/arch/arm/tee/ffa_partinfo.c >>>> +++ b/xen/arch/arm/tee/ffa_partinfo.c >>>> @@ -77,7 +77,21 @@ void ffa_handle_partition_info_get(struct cpu_user_regs *regs) >>>> }; >>>> uint32_t src_size, dst_size; >>>> void *dst_buf; >>>> - uint32_t ffa_sp_count = 0; >>>> + uint32_t ffa_vm_count = 0, ffa_sp_count = 0; >>>> +#ifdef CONFIG_FFA_VM_TO_VM >>>> + struct domain *dom; >>>> + >>>> + /* Count the number of VM with FF-A support */ >>>> + rcu_read_lock(&domlist_read_lock); >>>> + for_each_domain( dom ) >>>> + { >>>> + struct ffa_ctx *vm = dom->arch.tee; >>>> + >>>> + if (dom != d && vm != NULL && vm->guest_vers != 0) >>>> + ffa_vm_count++; >>>> + } >>>> + rcu_read_unlock(&domlist_read_lock); >>>> +#endif >>> >>> ... >>> struct domain *dom; >>> >>> if ( IS_ENABLED(CONFIG_FFA_VM_TO_VM) ) >>> { >>> /* Count the number of VM with FF-A support */ >>> rcu_read_lock(&domlist_read_lock); >>> ... >>> rcu_read_unlock(&domlist_read_lock); >>> } >>> >>> drops the explicit ifdef. Hiding function-level variable declarations >>> behind an ifdef like that works exactly once, and it doesn't make >>> pleasant code. >> >> Ack I will fix that. > > While at that, please also name struct domain * type variables "d", not > "dom". For consistency with (almost) all other code we have. Sure, I will fix that. Cheers Bertrand > > Jan
diff --git a/xen/arch/arm/tee/Kconfig b/xen/arch/arm/tee/Kconfig index c5b0f88d7522..88a4c4c99154 100644 --- a/xen/arch/arm/tee/Kconfig +++ b/xen/arch/arm/tee/Kconfig @@ -28,5 +28,16 @@ config FFA [1] https://developer.arm.com/documentation/den0077/latest +config FFA_VM_TO_VM + bool "Enable FF-A between VMs (UNSUPPORTED)" if UNSUPPORTED + default n + depends on FFA + help + This option enables to use FF-A between VMs. + This is experimental and there is no access control so any + guest can communicate with any other guest. + + If unsure, say N. + endmenu diff --git a/xen/arch/arm/tee/ffa_partinfo.c b/xen/arch/arm/tee/ffa_partinfo.c index fde187dba4e5..d699a267cc76 100644 --- a/xen/arch/arm/tee/ffa_partinfo.c +++ b/xen/arch/arm/tee/ffa_partinfo.c @@ -77,7 +77,21 @@ void ffa_handle_partition_info_get(struct cpu_user_regs *regs) }; uint32_t src_size, dst_size; void *dst_buf; - uint32_t ffa_sp_count = 0; + uint32_t ffa_vm_count = 0, ffa_sp_count = 0; +#ifdef CONFIG_FFA_VM_TO_VM + struct domain *dom; + + /* Count the number of VM with FF-A support */ + rcu_read_lock(&domlist_read_lock); + for_each_domain( dom ) + { + struct ffa_ctx *vm = dom->arch.tee; + + if (dom != d && vm != NULL && vm->guest_vers != 0) + ffa_vm_count++; + } + rcu_read_unlock(&domlist_read_lock); +#endif /* * If the guest is v1.0, he does not get back the entry size so we must @@ -127,33 +141,38 @@ void ffa_handle_partition_info_get(struct cpu_user_regs *regs) dst_buf = ctx->rx; - if ( !ffa_rx ) + /* If not supported, we have ffa_sp_count=0 */ + if ( ffa_fw_supports_fid(FFA_PARTITION_INFO_GET) ) { - ret = FFA_RET_DENIED; - goto out_rx_release; - } + if ( !ffa_rx ) + { + ret = FFA_RET_DENIED; + goto out_rx_release; + } - spin_lock(&ffa_rx_buffer_lock); + spin_lock(&ffa_rx_buffer_lock); - ret = ffa_partition_info_get(uuid, 0, &ffa_sp_count, &src_size); + ret = ffa_partition_info_get(uuid, 0, &ffa_sp_count, &src_size); - if ( ret ) - goto out_rx_hyp_unlock; + if ( ret ) + goto out_rx_hyp_unlock; - /* - * ffa_partition_info_get() succeeded so we now own the RX buffer we - * share with the SPMC. We must give it back using ffa_hyp_rx_release() - * once we've copied the content. - */ + /* + * ffa_partition_info_get() succeeded so we now own the RX buffer we + * share with the SPMC. We must give it back using ffa_hyp_rx_release() + * once we've copied the content. + */ - /* we cannot have a size smaller than 1.0 structure */ - if ( src_size < sizeof(struct ffa_partition_info_1_0) ) - { - ret = FFA_RET_NOT_SUPPORTED; - goto out_rx_hyp_release; + /* we cannot have a size smaller than 1.0 structure */ + if ( src_size < sizeof(struct ffa_partition_info_1_0) ) + { + ret = FFA_RET_NOT_SUPPORTED; + goto out_rx_hyp_release; + } } - if ( ctx->page_count * FFA_PAGE_SIZE < ffa_sp_count * dst_size ) + if ( ctx->page_count * FFA_PAGE_SIZE < + (ffa_sp_count + ffa_vm_count) * dst_size ) { ret = FFA_RET_NO_MEMORY; goto out_rx_hyp_release; @@ -185,18 +204,88 @@ void ffa_handle_partition_info_get(struct cpu_user_regs *regs) } } + if ( ffa_fw_supports_fid(FFA_PARTITION_INFO_GET) ) + { + ffa_hyp_rx_release(); + spin_unlock(&ffa_rx_buffer_lock); + } + +#ifdef CONFIG_FFA_VM_TO_VM + if ( ffa_vm_count ) + { + uint32_t curr = 0; + /* add the VM informations if any */ + rcu_read_lock(&domlist_read_lock); + for_each_domain( dom ) + { + struct ffa_ctx *vm = dom->arch.tee; + + /* + * we do not add the VM calling to the list and only VMs with + * FF-A support + */ + if (dom != d && vm != NULL && vm->guest_vers != 0) + { + /* + * We do not have UUID info for VMs so use + * the 1.0 structure so that we set UUIDs to + * zero using memset + */ + struct ffa_partition_info_1_0 srcvm; + + if ( curr == ffa_vm_count ) + { + /* + * The number of domains changed since we counted them, we + * can add new ones if there is enough space in the + * destination buffer so check it or go out with an error. + */ + ffa_vm_count++; + if ( ctx->page_count * FFA_PAGE_SIZE < + (ffa_sp_count + ffa_vm_count) * dst_size ) + { + ret = FFA_RET_NO_MEMORY; + rcu_read_unlock(&domlist_read_lock); + goto out_rx_release; + } + } + + srcvm.id = ffa_get_vm_id(dom); + srcvm.execution_context = dom->max_vcpus; + srcvm.partition_properties = FFA_PART_VM_PROP; + if ( is_64bit_domain(dom) ) + srcvm.partition_properties |= FFA_PART_PROP_AARCH64_STATE; + + memcpy(dst_buf, &srcvm, MIN(sizeof(srcvm), dst_size)); + + if ( dst_size > sizeof(srcvm) ) + memset(dst_buf + sizeof(srcvm), 0, + dst_size - sizeof(srcvm)); + + dst_buf += dst_size; + curr++; + } + } + rcu_read_unlock(&domlist_read_lock); + + /* the number of domains could have reduce since the initial count */ + ffa_vm_count = curr; + } +#endif + + goto out; + out_rx_hyp_release: ffa_hyp_rx_release(); out_rx_hyp_unlock: spin_unlock(&ffa_rx_buffer_lock); out_rx_release: - if ( ret != FFA_RET_OK ) - ffa_rx_release(d); + ffa_rx_release(d); out: if ( ret ) ffa_set_regs_error(regs, ret); else - ffa_set_regs_success(regs, ffa_sp_count, dst_size); + ffa_set_regs_success(regs, ffa_sp_count + ffa_vm_count, dst_size); } static int32_t ffa_direct_req_send_vm(uint16_t sp_id, uint16_t vm_id, diff --git a/xen/arch/arm/tee/ffa_private.h b/xen/arch/arm/tee/ffa_private.h index d441c0ca5598..47dd6b5fadea 100644 --- a/xen/arch/arm/tee/ffa_private.h +++ b/xen/arch/arm/tee/ffa_private.h @@ -187,6 +187,18 @@ */ #define FFA_PARTITION_INFO_GET_COUNT_FLAG BIT(0, U) +/* + * Partition properties we give for a normal world VM: + * - can send direct message but not receive them + * - can handle indirect messages + * - can receive notifications + * 32/64 bit flag is set depending on the VM + */ +#define FFA_PART_VM_PROP (FFA_PART_PROP_DIRECT_REQ_SEND | \ + FFA_PART_PROP_INDIRECT_MSGS | \ + FFA_PART_PROP_RECV_NOTIF | \ + FFA_PART_PROP_IS_PE_ID) + /* Flags used in calls to FFA_NOTIFICATION_GET interface */ #define FFA_NOTIF_FLAG_BITMAP_SP BIT(0, U) #define FFA_NOTIF_FLAG_BITMAP_VM BIT(1, U)
Create a CONFIG_FFA_VM_TO_VM parameter to activate FFA communication between VMs. When activated list VMs in the system with FF-A support in part_info_get. WARNING: There is no filtering for now and all VMs are listed !! Signed-off-by: Bertrand Marquis <bertrand.marquis@arm.com> --- xen/arch/arm/tee/Kconfig | 11 +++ xen/arch/arm/tee/ffa_partinfo.c | 135 ++++++++++++++++++++++++++------ xen/arch/arm/tee/ffa_private.h | 12 +++ 3 files changed, 135 insertions(+), 23 deletions(-)