blob: c0d9d75dbaa194f41ac877f392977d56cc08f277 [file] [log] [blame]
// Copyright 2017 The Fuchsia Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "src/virtualization/bin/vmm/guest.h"
#include <fcntl.h>
#include <lib/fdio/directory.h>
#include <lib/fdio/fd.h>
#include <lib/fdio/fdio.h>
#include <lib/syslog/cpp/macros.h>
#include <lib/zx/channel.h>
#include <limits.h>
#include <string.h>
#include <unistd.h>
#include <zircon/process.h>
#include <zircon/syscalls.h>
#include <zircon/syscalls/hypervisor.h>
#include <zircon/syscalls/port.h>
#include <zircon/threads.h>
#include "src/lib/fxl/strings/string_printf.h"
#include "src/virtualization/bin/vmm/sysinfo.h"
#ifdef __aarch64__
static constexpr uint8_t kSpiBase = 32;
#endif
static constexpr uint32_t trap_kind(TrapType type) {
switch (type) {
case TrapType::MMIO_SYNC:
return ZX_GUEST_TRAP_MEM;
case TrapType::MMIO_BELL:
return ZX_GUEST_TRAP_BELL;
case TrapType::PIO_SYNC:
return ZX_GUEST_TRAP_IO;
default:
ZX_PANIC("Unhandled TrapType %d\n", static_cast<int>(type));
return 0;
}
}
static constexpr uint32_t cache_policy(fuchsia::virtualization::MemoryPolicy policy) {
switch (policy) {
case fuchsia::virtualization::MemoryPolicy::HOST_DEVICE:
return ZX_CACHE_POLICY_UNCACHED_DEVICE;
default:
return ZX_CACHE_POLICY_CACHED;
}
}
zx_status_t Guest::Init(const std::vector<fuchsia::virtualization::MemorySpec>& memory) {
zx::resource hypervisor_resource;
zx_status_t status = get_hypervisor_resource(&hypervisor_resource);
if (status != ZX_OK) {
FX_LOGS(ERROR) << "Failed to get hypervisor resource " << status;
return status;
}
status = zx::guest::create(hypervisor_resource, 0, &guest_, &vmar_);
if (status != ZX_OK) {
FX_LOGS(ERROR) << "Failed to create guest " << status;
return status;
}
zx::resource mmio_resource;
zx::resource vmex_resource;
for (const fuchsia::virtualization::MemorySpec& spec : memory) {
zx::vmo vmo;
switch (spec.policy) {
case fuchsia::virtualization::MemoryPolicy::GUEST_CACHED:
status = zx::vmo::create(spec.size, 0, &vmo);
if (status != ZX_OK) {
FX_LOGS(ERROR) << "Failed to create VMO " << status;
return status;
}
break;
case fuchsia::virtualization::MemoryPolicy::HOST_CACHED:
case fuchsia::virtualization::MemoryPolicy::HOST_DEVICE:
if (!mmio_resource) {
status = get_mmio_resource(&mmio_resource);
if (status != ZX_OK) {
FX_LOGS(ERROR) << "Failed to get mmio resource " << status;
return status;
}
}
status = zx::vmo::create_physical(mmio_resource, spec.base, spec.size, &vmo);
if (status != ZX_OK) {
FX_LOGS(ERROR) << "Failed to create physical VMO " << status;
return status;
}
status = vmo.set_cache_policy(cache_policy(spec.policy));
if (status != ZX_OK) {
FX_LOGS(ERROR) << "Failed to set cache policy on VMO " << status;
return status;
}
break;
default:
FX_LOGS(ERROR) << "Unknown memory policy " << static_cast<uint32_t>(spec.policy);
return ZX_ERR_INVALID_ARGS;
}
if (!vmex_resource) {
status = get_vmex_resource(&vmex_resource);
if (status != ZX_OK) {
FX_LOGS(ERROR) << "Failed to get VMEX resource " << status;
return status;
}
}
status = vmo.replace_as_executable(vmex_resource, &vmo);
if (status != ZX_OK) {
FX_LOGS(ERROR) << "Failed to make VMO executable " << status;
return status;
}
zx_gpaddr_t addr;
status = vmar_.map(ZX_VM_PERM_READ | ZX_VM_PERM_WRITE | ZX_VM_PERM_EXECUTE | ZX_VM_SPECIFIC |
ZX_VM_REQUIRE_NON_RESIZABLE,
spec.base, vmo, 0, spec.size, &addr);
if (status != ZX_OK) {
FX_LOGS(ERROR) << "Failed to map guest physical memory " << status;
return status;
}
if (!phys_mem_.vmo() && spec.policy == fuchsia::virtualization::MemoryPolicy::GUEST_CACHED) {
status = phys_mem_.Init(std::move(vmo));
if (status != ZX_OK) {
FX_LOGS(ERROR) << "Failed to initialize guest physical memory " << status;
return status;
}
}
}
return ZX_OK;
}
zx_status_t Guest::CreateMapping(TrapType type, uint64_t addr, size_t size, uint64_t offset,
IoHandler* handler, async_dispatcher_t* dispatcher) {
uint32_t kind = trap_kind(type);
mappings_.emplace_front(kind, addr, size, offset, handler);
zx_status_t status = mappings_.front().SetTrap(this, dispatcher);
if (status != ZX_OK) {
mappings_.pop_front();
return status;
}
return ZX_OK;
}
zx_status_t Guest::CreateSubVmar(uint64_t addr, size_t size, zx::vmar* vmar) {
uintptr_t guest_addr;
return vmar_.allocate(ZX_VM_CAN_MAP_READ | ZX_VM_CAN_MAP_WRITE | ZX_VM_SPECIFIC, addr, size,
vmar, &guest_addr);
}
zx_status_t Guest::StartVcpu(uint64_t id, zx_gpaddr_t entry, zx_gpaddr_t boot_ptr,
async::Loop* loop) {
if (id >= kMaxVcpus) {
FX_LOGS(ERROR) << "Failed to start VCPU-" << id << ", up to " << kMaxVcpus
<< " VCPUs are supported";
return ZX_ERR_OUT_OF_RANGE;
}
std::lock_guard<std::shared_mutex> lock(mutex_);
if (vcpus_[0] == nullptr && id != 0) {
FX_LOGS(ERROR) << "VCPU-0 must be started before other VCPUs";
return ZX_ERR_BAD_STATE;
}
if (vcpus_[id] != nullptr) {
// The guest might make multiple requests to start a particular VCPU. On
// x86, the guest should send two START_UP IPIs but we initialize the VCPU
// on the first. So, we ignore subsequent requests.
return ZX_OK;
}
vcpus_[id] = std::make_unique<Vcpu>(id, this, entry, boot_ptr, loop);
return vcpus_[id]->Start();
}
zx_status_t Guest::Interrupt(uint64_t mask, uint8_t vector) {
std::shared_lock<std::shared_mutex> lock(mutex_);
for (size_t id = 0; id != kMaxVcpus; ++id) {
if (!(mask & (1ul << id)) || !vcpus_[id]) {
continue;
}
zx_status_t status = vcpus_[id]->Interrupt(vector);
if (status != ZX_OK) {
return status;
}
#ifdef __aarch64__
if (vector >= kSpiBase) {
break;
}
#endif
}
return ZX_OK;
}