Received: by 2002:a05:6358:a55:b0:ec:fcf4:3ecf with SMTP id 21csp1990619rwb; Thu, 19 Jan 2023 19:03:48 -0800 (PST) X-Google-Smtp-Source: AMrXdXtwJelLTkAJr1qiMKNi3rnIKzLGa5d7wy96w7WmgjzffnVWjiVT6MxXcTSXdbRam5TxSHtW X-Received: by 2002:a17:906:244b:b0:7be:fb2c:c112 with SMTP id a11-20020a170906244b00b007befb2cc112mr13424280ejb.66.1674183828621; Thu, 19 Jan 2023 19:03:48 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1674183828; cv=none; d=google.com; s=arc-20160816; b=RDuk+hgbBNOzwiStxsp3fjwuTBHY7esKXyI/22qoTn1ap3S0lKyEWV1oMzC9QIRzLS w6DI0f8SLwz89IwxevqEzACkV2x+yeal8wc3JqFj7QtXXC7M9kKWec6S4k7n7bTYuK/O e+VS6L0vCxCB0GS8sScaArbpL/AzysXa7xwjOY3BBD2U/DyJvnsyDERJPZIAaBIC08/8 gPJWSNPIfAXZHpH82QTWMynLc5453To0yHE/TZZnd61EI/Gnh+ZB7dYTjQVMAzPXYJpe z3Qu0oqK5OJ4Hn4f4tE/W9JLOygRXDju1erxcKh63Q4M4pJ0tkz+7J7BPDeDck+C3/zp fcZw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to :content-language:references:cc:to:subject:from:user-agent :mime-version:date:message-id:dkim-signature; bh=mIgoW/fLOQ033D0tM09c6IF0e+za6gisYdjdnnouWZI=; b=kg+ejhgiySyKPBAfChIn4huENuxmNvXgH3XBj8MC4DdvyF5nF12ldDLWhqS/jqjUWK ksWusZmuOGdUGUGjP2bBHmctTiR7UEqI/tPkChb1gB7cJwLf8xhIYtE/Moz24ZbN3Ruc skPs6QTHsxf74b7/Y0oSbXmAF+LDIrrApI+uNSRVVBjJPQPFmpsWSf1It1/j59AmfLSH lHwwbJXZKAw70xZL9KdYXi/V+GkPU7YbsChkwwDhVHh4Tqzsr+XxjguKSlAgHGZg7Dr7 FaRv+xsO41iZQDIZdcEq69q7BvPdKpjRTybxRI2KHLRgQR6X3+eS0CzZgGfN52U07HXo AGlw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@quicinc.com header.s=qcppdkim1 header.b=e1KMfyZC; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=quicinc.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id xe6-20020a170907318600b0084cbde35b2fsi44827451ejb.465.2023.01.19.19.03.37; Thu, 19 Jan 2023 19:03:48 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@quicinc.com header.s=qcppdkim1 header.b=e1KMfyZC; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=quicinc.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229911AbjATBca (ORCPT + 46 others); Thu, 19 Jan 2023 20:32:30 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:46418 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229877AbjATBc2 (ORCPT ); Thu, 19 Jan 2023 20:32:28 -0500 Received: from mx0b-0031df01.pphosted.com (mx0b-0031df01.pphosted.com [205.220.180.131]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1527186EE6; Thu, 19 Jan 2023 17:32:22 -0800 (PST) Received: from pps.filterd (m0279872.ppops.net [127.0.0.1]) by mx0a-0031df01.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 30K1NFTB008821; Fri, 20 Jan 2023 01:32:00 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=quicinc.com; h=message-id : date : mime-version : from : subject : to : cc : references : in-reply-to : content-type : content-transfer-encoding; s=qcppdkim1; bh=mIgoW/fLOQ033D0tM09c6IF0e+za6gisYdjdnnouWZI=; b=e1KMfyZCd7CNHffr0WV5Z5d1jKb5rYreoXdTlP5P9AvqtX15bNfmHMXjRbo113xpcdmr lzP3c3wtbI/bQV7iCc4SW4Jgj/lqfRVjPlHi0m/OAQafBSCVFZUsA+NEggkrnHhe4uzG spvmrf7bUSDMuWvlTkK0Ca/fN8wJ8/nW6qrkEvHrzGlus1OfAEBLIkoaamiHyPU50uMI xNKFJHuaUWQDXmXGBxxvtWCjdhSmt5CcHxf6Zk2o+hZHJJIZjHvHIdoYTfTQ2eFiyQ/3 mjR6R4PebzP8QCZEXBf4FPwOHUomAG4jdHSJjAUU6VK9TKiy4ERgbLK9NkC/72UAVkp8 XA== Received: from nasanppmta02.qualcomm.com (i-global254.qualcomm.com [199.106.103.254]) by mx0a-0031df01.pphosted.com (PPS) with ESMTPS id 3n700ytkq0-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 20 Jan 2023 01:32:00 +0000 Received: from nasanex01b.na.qualcomm.com (nasanex01b.na.qualcomm.com [10.46.141.250]) by NASANPPMTA02.qualcomm.com (8.17.1.5/8.17.1.5) with ESMTPS id 30K1Vxle022112 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 20 Jan 2023 01:31:59 GMT Received: from [10.134.67.48] (10.80.80.8) by nasanex01b.na.qualcomm.com (10.46.141.250) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.36; Thu, 19 Jan 2023 17:31:58 -0800 Message-ID: <6ae00909-7d05-3be9-c5f9-dcd403afaf04@quicinc.com> Date: Thu, 19 Jan 2023 17:31:58 -0800 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101 Thunderbird/102.6.1 From: Elliot Berman Subject: Re: [PATCH v8 11/28] gunyah: rsc_mgr: Add VM lifecycle RPC To: Alex Elder , Bjorn Andersson , Murali Nalajala CC: Trilok Soni , Srivatsa Vaddagiri , Carl van Schaik , Prakruthi Deepak Heragu , Arnd Bergmann , Greg Kroah-Hartman , Rob Herring , Krzysztof Kozlowski , Jonathan Corbet , "Bagas Sanjaya" , Catalin Marinas , Will Deacon , Jassi Brar , "Sudeep Holla" , Mark Rutland , "Lorenzo Pieralisi" , Dmitry Baryshkov , , , , , , References: <20221219225850.2397345-1-quic_eberman@quicinc.com> <20221219225850.2397345-12-quic_eberman@quicinc.com> <7a4fdcca-b72a-d155-854f-07ec1a4a9107@linaro.org> Content-Language: en-US In-Reply-To: <7a4fdcca-b72a-d155-854f-07ec1a4a9107@linaro.org> Content-Type: text/plain; charset="UTF-8"; format=flowed Content-Transfer-Encoding: 8bit X-Originating-IP: [10.80.80.8] X-ClientProxiedBy: nasanex01b.na.qualcomm.com (10.46.141.250) To nasanex01b.na.qualcomm.com (10.46.141.250) X-QCInternal: smtphost X-Proofpoint-Virus-Version: vendor=nai engine=6200 definitions=5800 signatures=585085 X-Proofpoint-GUID: z9hdqLUt_tAVFydd48aSI-J7xFxaPSL4 X-Proofpoint-ORIG-GUID: z9hdqLUt_tAVFydd48aSI-J7xFxaPSL4 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.219,Aquarius:18.0.930,Hydra:6.0.562,FMLib:17.11.122.1 definitions=2023-01-19_16,2023-01-19_01,2022-06-22_01 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 lowpriorityscore=0 malwarescore=0 priorityscore=1501 mlxscore=0 bulkscore=0 phishscore=0 mlxlogscore=999 impostorscore=0 adultscore=0 suspectscore=0 spamscore=0 clxscore=1015 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2212070000 definitions=main-2301200010 X-Spam-Status: No, score=-2.2 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A,SPF_HELO_NONE, SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 1/18/2023 10:26 AM, Alex Elder wrote: > On 12/19/22 4:58 PM, Elliot Berman wrote: >> Add Gunyah Resource Manager RPC to launch an unauthenticated VM. > > I have a number of general comments on your patch, and there > are a few bugs that you will need to address. > >> Signed-off-by: Elliot Berman >> --- >>   drivers/virt/gunyah/Makefile      |   2 +- >>   drivers/virt/gunyah/rsc_mgr.h     |  41 ++++++ >>   drivers/virt/gunyah/rsc_mgr_rpc.c | 224 ++++++++++++++++++++++++++++++ >>   include/linux/gunyah_rsc_mgr.h    |  50 +++++++ >>   4 files changed, 316 insertions(+), 1 deletion(-) >>   create mode 100644 drivers/virt/gunyah/rsc_mgr_rpc.c >> >> diff --git a/drivers/virt/gunyah/Makefile b/drivers/virt/gunyah/Makefile >> index e7cf59b9e64e..5caa05267a58 100644 >> --- a/drivers/virt/gunyah/Makefile >> +++ b/drivers/virt/gunyah/Makefile >> @@ -1,4 +1,4 @@ >>   obj-$(CONFIG_GUNYAH) += gunyah.o >> -gunyah_rsc_mgr-y += rsc_mgr.o >> +gunyah_rsc_mgr-y += rsc_mgr.o rsc_mgr_rpc.o >>   obj-$(CONFIG_GUNYAH_RESOURCE_MANAGER) += gunyah_rsc_mgr.o >> diff --git a/drivers/virt/gunyah/rsc_mgr.h >> b/drivers/virt/gunyah/rsc_mgr.h >> index b5bb36a7a4cc..1f9e3c38038e 100644 >> --- a/drivers/virt/gunyah/rsc_mgr.h >> +++ b/drivers/virt/gunyah/rsc_mgr.h >> @@ -33,4 +33,45 @@ struct gh_rm_rpc; >>   int gh_rm_call(struct gh_rm_rpc *rsc_mgr, u32 message_id, void >> *req_buff, size_t req_buff_size, >>           void **resp_buf, size_t *resp_buff_size); >> +/* Message IDs: VM Management */ >> +#define GH_RM_RPC_VM_ALLOC_VMID            0x56000001 > > These values very clearly appear to be encoded.  Like the top > byte (0x56) might be defining the resource type and bytes below > it are the request ID?  If that is truly the case I think it > is useful to lay out that format, and perhaps define the values > based on the components that they are comprised of. > Gunyah doesn't have any formal encoding scheme. It's separated out into logical regions, but there is no meaning for the "0x56" except that it mostly has functions related to VM management. >> +#define GH_RM_RPC_VM_DEALLOC_VMID        0x56000002 >> +#define GH_RM_RPC_VM_START            0x56000004 >> +#define GH_RM_RPC_VM_STOP            0x56000005 >> +#define GH_RM_RPC_VM_CONFIG_IMAGE        0x56000009 >> +#define GH_RM_RPC_VM_INIT            0x5600000B >> +#define GH_RM_RPC_VM_GET_HYP_RESOURCES        0x56000020 >> +#define GH_RM_RPC_VM_GET_VMID            0x56000024 >> + >> +/* Call: CONSOLE_OPEN, CONSOLE_CLOSE, CONSOLE_FLUSH */ > > The above comment is nonsense.  None of these symbols (or > similar) are defined, anywhere.  For the current patch, this > structure is used for VM_ALLOC_VMID, VM_GET_HYP_RESOURCES, > and via gh_rm_common_vmid_call(), VM_DEALLOC_VMID, VM_START, > and VM_INIT.  It's possible you'll use it for other requests > in subsequent patches. > > Here you are defining a single "common" structure that's > used for several message types.  I think there are legitimate > reasons for that.  However... > > In general, I think I'd rather see every message type laid > out separately.  It becomes a little long, here, where you > would define them, but in the code that uses them it allows > some simple patterns to be used in message handler functions > that I think improve understandability and perhaps correctness. > I'll provide some examples below to try to make my case. > >> +struct gh_vm_common_vmid_req { >> +    __le16 vmid; >> +    __le16 reserved0; > > If the above is really reserved (and unused), its > endianness doesn't matter.  (Not really a big deal.) > >> +} __packed; > > The above structure defines the format of a *request* > message.  But it is *also* the format of a VM_ALLOC_VMID > *response* message.  So the name of the type does not > match the way it's used.  As a reviewer, this seems off. > Yes, I see the point here. I've created separate struct for the VM_ALLOC_VMID response message. I'd still like to keep the "gh_vm_common_vmid_req" for >> +/* Call: VM_STOP */ >> +struct gh_vm_stop_req { >> +    __le16 vmid; >> +    u8 flags; > > I don't believe you specify what the valid values this > "flags" field can hold.  If not, I think you should (and > if it's currently not used/needed, say that). > >> +    u8 reserved; >> +    __le32 stop_reason; > > Same thing here.  This field is defined but from what > I can tell, it is not currently used.  What values > *could* it take on?  Why is it currently ignored? > Neither of the fields are currently used, so I've not defined them. Flags has the following bit: // Forcibly shutdown VM without sending a VM_SHUTDOWN notification #define GH_VM_STOP_FORCE_SHUTDOWN BIT(1) stop_reason is a code that is passed to the VM in the VM_SHUTDOWN notification. >> +} __packed; >> + >> +/* Call: VM_CONFIG_IMAGE */ >> +struct gh_vm_config_image_req { >> +    __le16 vmid; >> +    __le16 auth_mech; >> +    __le32 mem_handle; >> +    __le64 image_offset; >> +    __le64 image_size; >> +    __le64 dtb_offset; >> +    __le64 dtb_size; >> +} __packed; >> + >> +/* Call: GET_HYP_RESOURCES */ >> +struct gh_vm_get_hyp_resources_resp { >> +    __le32 n_entries; >> +    struct gh_rm_hyp_resource entries[]; > > This header file should include to get > the required definition of struct gh_rm_hyp_resource. > Done. >> +} __packed; >> + >>   #endif >> diff --git a/drivers/virt/gunyah/rsc_mgr_rpc.c >> b/drivers/virt/gunyah/rsc_mgr_rpc.c >> new file mode 100644 >> index 000000000000..8d9c1c635a27 >> --- /dev/null >> +++ b/drivers/virt/gunyah/rsc_mgr_rpc.c >> @@ -0,0 +1,224 @@ >> +// SPDX-License-Identifier: GPL-2.0-only >> +/* >> + * Copyright (c) 2022 Qualcomm Innovation Center, Inc. All rights >> reserved. >> + */ >> + >> +#include >> + >> +#include "rsc_mgr.h" >> + >> +/* >> + * Several RM calls take only a VMID as a parameter and give only >> standard >> + * response back. Deduplicate boilerplate code by using this common >> call. > > In other words, the response message is empty for the requests that use > this function. > >> + */ >> +static int gh_rm_common_vmid_call(struct gh_rm_rpc *rm, u32 >> message_id, u16 vmid) >> +{ >> +    void *resp = NULL; > > No need to set this to NULL if you ignore its value > when the gh_rm_call() is unsuccessful. > Done. >> +    struct gh_vm_common_vmid_req req_payload = { >> +        .vmid = cpu_to_le16(vmid), >> +    }; >> +    size_t resp_size; >> +    int ret; >> + >> +    ret = gh_rm_call(rm, message_id, &req_payload, >> sizeof(req_payload), &resp, &resp_size); > > Here and in all other calls to gh_rm_call() here (and added later), > you need to handle the return value differently.  (THIS IS A BUG.) > > There are three classes of return value from gh_rm_call(): > - Zero (success) > - Negative errno > - Positive Gunyah resource manager error code > > In practice, it might be nice to distinguish Gunyah error codes from > Linux errnos, but I think the easiest solution might be to have a > function that maps Gunyah codes to comparable errno values, and have > gh_rm_call() use it so its return value is always 0 or negative. > >> +    if (!ret) >> +        kfree(resp); >> + >> +    WARN_ON(!ret && resp_size); > > You should have well-defined behavior when the response message > is empty.  Will the response pointer be valid or not?  I suggest > that a 0 length response message be guaranteed to return a null > pointer if the return value indicates success.  And a non-zero > length should be guaranteed to be valid.  There should be no > need for callers to issue warnings like this. > > So the above would then just be (note this follows a pattern > similar to used by handlers later in the file): > >     if (ret) >         return ret; > >     if (resp_size)        /* (this is optional) */ >         kfree(resp); > >     return 0; > > Done, I'll clean up the error flow here. >> + >> +    return ret; >> +} >> + >> +/** >> + * gh_rm_alloc_vmid() - Allocate a new VM in Gunyah. Returns the VM >> identifier. >> + * @vmid: Use GH_VMID_INVAL to dynamically allocate a VM. A reserved >> VMID can also be requested >> + *        for a special-purpose platform-defined VM. >> + * >> + * Returns - the allocated VMID or negative value on error > > Currently (based on a comment I made above) this statement > is not correct.  But I think what's described is the proper > return convention.  It's probably worth mentioning that it > will never return GH_VMID_SELF or GH_VMID_INVAL. > >> + */ >> +int gh_rm_alloc_vmid(struct gh_rm_rpc *rm, u16 vmid) >> +{ >> +    void *resp; >> +    struct gh_vm_common_vmid_req req_payload = { >> +        .vmid = cpu_to_le16(vmid), >> +    }; >> +    struct gh_vm_common_vmid_req *resp_payload; >> +    size_t resp_size; >> +    int ret; >> + > > What is the meaning of this call if you pass GH_VMID_SELF? > Is that defined to be valid?  The code allows it, and if > so it treats it as equivalent to passing GH_VMID_INVAL. > I've updated the docstring to allow for GH_VMID_SELF and 0 to all be equivalent. >> +    if (vmid == GH_VMID_INVAL) >> +        vmid = 0; >> + >> +    ret = gh_rm_call(rm, GH_RM_RPC_VM_ALLOC_VMID, &req_payload, >> sizeof(req_payload), &resp, >> +            &resp_size); > > This *can* return a positive Gunyah resource manager error ID. > So in this case the caller would (erroneously) assume it was > a valid VMID. > > You need to fix this. > >> +    if (ret) >> +        return ret; >> + >> +    if (!vmid) { >> +        if (resp_size != sizeof(*resp_payload)) { >> +            ret = -EINVAL; > > EINVAL means "invalid argument".  I *think* the right thing > to return would be -EBADMSG.  In any case I don't really > think -EINVAL is appropriate. > >> +        } else { >> +            resp_payload = resp; >> +            ret = resp_payload->vmid; > > This is a bug.  The vmid is a little-endian value, so you need > to use: > >     ret = le16_to_cpu(resp_payload->vmid); > >> +        } >> +    } >> +    kfree(resp); >> + >> +    return ret; >> +} >> +EXPORT_SYMBOL_GPL(gh_rm_alloc_vmid); >> + >> +/** >> + * gh_rm_dealloc_vmid() - Dispose the VMID >> + * @vmid: VM identifier > >   * Returns: ...    (here and throughout) > >> + */ >> +int gh_rm_dealloc_vmid(struct gh_rm_rpc *rm, u16 vmid) >> +{ >> +    return gh_rm_common_vmid_call(rm, GH_RM_RPC_VM_DEALLOC_VMID, vmid); >> +} >> +EXPORT_SYMBOL_GPL(gh_rm_dealloc_vmid); >> + >> +/** >> + * gh_rm_vm_start() - Move the VM into "ready to run" state >> + * @vmid: VM identifier >> + * >> + * On VMs which use proxy scheduling, vcpu_run is needed to actually >> run the VM. >> + * On VMs which use Gunyah's scheduling, the vCPUs start executing in >> accordance with Gunyah >> + * scheduling policies. >> + */ >> +int gh_rm_vm_start(struct gh_rm_rpc *rm, u16 vmid) >> +{ >> +    return gh_rm_common_vmid_call(rm, GH_RM_RPC_VM_START, vmid); >> +} >> +EXPORT_SYMBOL_GPL(gh_rm_vm_start); >> + >> +/** >> + * gh_rm_vm_stop() - Send a request to Resource Manager VM to stop a VM. >> + * @vmid: VM identifier >> + */ >> +int gh_rm_vm_stop(struct gh_rm_rpc *rm, u16 vmid) >> +{ >> +    struct gh_vm_stop_req req_payload = { >> +        .vmid = cpu_to_le16(vmid), > > This structure has a flags and a stop_reason field.  As I mentioned > earlier, I think you ought to explain what values this might have, > or perhaps explain why they're not used. > >> +    }; >> +    void *resp; >> +    size_t resp_size; >> +    int ret; >> + >> +    ret = gh_rm_call(rm, GH_RM_RPC_VM_STOP, &req_payload, >> sizeof(req_payload), >> +            &resp, &resp_size); >> +    if (ret) >> +        return ret; > > Is the response in this case in fact empty?  You are discarding > it, but because you don't specify how every request/response is > structured, we can only guess what's contained in the response > (if there is one).  This is a reason why I prefer having every > message structure shown explicitly, even if some are identical. > It makes it very clear to the reader what the protocol actually > looks like.  And unlike what you do in gh_rm_common_vmid_call(), > you ignore the resp_size, which could be checked if we knew its > expected size. > The response is empty, I've added the resp_size check. >> +    kfree(resp); >> + >> +    return ret; >> +} >> +EXPORT_SYMBOL_GPL(gh_rm_vm_stop); >> + >> +int gh_rm_vm_configure(struct gh_rm_rpc *rm, u16 vmid, enum >> gh_rm_vm_auth_mechanism auth_mechanism, >> +        u32 mem_handle, u64 image_offset, u64 image_size, u64 >> dtb_offset, u64 dtb_size) >> +{ >> +    struct gh_vm_config_image_req req_payload = { 0 }; >> +    void *resp; >> +    size_t resp_size; >> +    int ret; >> + >> +    req_payload.vmid = cpu_to_le16(vmid); >> +    req_payload.auth_mech = cpu_to_le32(auth_mechanism); >> +    req_payload.mem_handle = cpu_to_le32(mem_handle); >> +    req_payload.image_offset = cpu_to_le64(image_offset); >> +    req_payload.image_size = cpu_to_le64(image_size); >> +    req_payload.dtb_offset = cpu_to_le64(dtb_offset); >> +    req_payload.dtb_size = cpu_to_le64(dtb_size); >> + >> +    ret = gh_rm_call(rm, GH_RM_RPC_VM_CONFIG_IMAGE, &req_payload, >> sizeof(req_payload), >> +            &resp, &resp_size); >> +    if (ret) >> +        return ret; >> +    kfree(resp); >> + >> +    return ret; >> +} >> +EXPORT_SYMBOL_GPL(gh_rm_vm_configure); >> + >> +/** >> + * gh_rm_vm_init() - Move the VM to initialized state. >> + * @vmid: VM identifier >> + * >> + * RM will allocate needed resources for the VM. After gh_rm_vm_init, >> gh_rm_get_hyp_resources() >> + * can be called to learn of the capabilities we can use with the new >> VM. >> + */ >> +int gh_rm_vm_init(struct gh_rm_rpc *rm, u16 vmid) >> +{ >> +    return gh_rm_common_vmid_call(rm, GH_RM_RPC_VM_INIT,vmid); >> +} >> +EXPORT_SYMBOL_GPL(gh_rm_vm_init); >> + >> +/** >> + * gh_rm_get_hyp_resources() - Retrieve hypervisor resources >> (capabilities) associated with a VM >> + * @vmid: VMID of the other VM to get the resources of >> + * @resources: Set by gh_rm_get_hyp_resources and contains the >> returned hypervisor resources. >> + * >> + * Return: >=0 value indicates the number of gh_rm_hyp_resource >> entries filled into *resources >> + */ >> +ssize_t gh_rm_get_hyp_resources(struct gh_rm_rpc *rm, u16 vmid, >> +                struct gh_rm_hyp_resource **resources) > > First, this function can return a positive Gunyah resource manager > error as well, which is a problem. > > But this function is also pretty different from the rest, returning > the number of elements in the array whose address is returned. > > I don't know why you don't just return the actual response > buffer (rather than duplicating most of it), and let the > caller use its embedded n_entries field to determine its > length.  Either way it's not beautiful I guess, but the > kmemdup() call seems unneccesary and adds a possible > additional error condition. > I can return the response buffer. It arbitrarily felt like a better idea at the time, but returning the actual response is also a clean approach. >> +{ >> +    struct gh_vm_get_hyp_resources_resp *resp; >> +    size_t resp_size; >> +    int ret; >> +    struct gh_vm_common_vmid_req req_payload = { >> +        .vmid = cpu_to_le16(vmid), >> +    }; >> + >> +    ret = gh_rm_call(rm, GH_RM_RPC_VM_GET_HYP_RESOURCES, >> +             &req_payload, sizeof(req_payload), >> +             (void **)&resp, &resp_size); >> +    if (ret) >> +        return ret; >> + >> +    if (resp_size < sizeof(*resp) || >> +        (sizeof(*resp->entries) && (resp->n_entries > U32_MAX / >> sizeof(*resp->entries))) || >> +        (resp_size != sizeof(*resp) + (resp->n_entries * >> sizeof(*resp->entries)))) { >> +        ret = -EIO; >> +        goto out; >> +    } >> + >> +    *resources = kmemdup(resp->entries, (resp->n_entries * >> sizeof(*resp->entries)), GFP_KERNEL); > > If *resources is NULL you should return -ENOMEM. > >> +    ret = resp->n_entries; >> + >> +out: >> +    kfree(resp); >> +    return ret; >> +} >> +EXPORT_SYMBOL_GPL(gh_rm_get_hyp_resources); >> + >> +/** >> + * gh_rm_get_vmid() - Retrieve VMID of this virtual machine >> + * @vmid: Filled with the VMID of this VM >> + */ >> +int gh_rm_get_vmid(struct gh_rm_rpc *rm, u16 *vmid) >> +{ >> +    static u16 cached_vmid = GH_VMID_INVAL; > > This cached VMID seems like a good idea, but you don't actually use it. > >> +    void *resp; >> +    size_t resp_size; >> +    int ret; >> +    int payload = 0; > > In fact the payload has type __le16 (or at least I assume so). > I don't actually know what this payload represents.  Is it a > VMID (which would I presume in this case be GH_VMID_SELF)? > How big is it, actually? > > If you were to define each request and response, I would hope > each would be a packed structure, so in this case: > >     struct gh_rm_get_vmid_request { >         __le16 vmid; >         u16 reserved;    /* ??? */ >     } __packed; > The payload here is a dummy payload and not used due to some earlier limitations in RM's handling of messages. This brought up the point again, and they have fixed the limitation. I should've commented that it is empty payload without meaning. In v9, I'll simply remove the payload entirely. >> + >> +    if (cached_vmid != GH_VMID_INVAL) { >> +        *vmid = cached_vmid; >> +        return 0; >> +    } >> + >> +    ret = gh_rm_call(rm, GH_RM_RPC_VM_GET_VMID, &payload, >> sizeof(payload), &resp, &resp_size); >> +    if (ret) >> +        return ret; >> + >> +    if (resp_size != sizeof(*vmid)) >> +        return -EIO; >> +    *vmid = *(u16 *)resp; > > This is a bug.  The response is little endian, so you need to do: > >     *vmid = le16_to_32(resp); > >> +    kfree(resp); >> + >> +    return ret; >> +} >> +EXPORT_SYMBOL_GPL(gh_rm_get_vmid); >> diff --git a/include/linux/gunyah_rsc_mgr.h >> b/include/linux/gunyah_rsc_mgr.h >> index b4f55c19954b..eb94b48c41de 100644 >> --- a/include/linux/gunyah_rsc_mgr.h >> +++ b/include/linux/gunyah_rsc_mgr.h >> @@ -15,4 +15,54 @@ >>   /* Gunyah recognizes VMID0 as an alias to the current VM's ID */ >>   #define GH_VMID_SELF            0 > > Please be sure to use this symbol in place of 0 when that's > what you mean.  In gh_rm_get_vmid() it looked like *maybe* > that's what was being passed as an argument in the request > payload--and if so, that's a case I'd like to see GH_VMID_SELF. > >                     -Alex > >> +struct gh_rm_rpc; >> + >> +enum gh_rm_vm_status { >> +    GH_RM_VM_STATUS_NO_STATE    = 0, >> +    GH_RM_VM_STATUS_INIT        = 1, >> +    GH_RM_VM_STATUS_READY        = 2, >> +    GH_RM_VM_STATUS_RUNNING        = 3, >> +    GH_RM_VM_STATUS_PAUSED        = 4, >> +    GH_RM_VM_STATUS_LOAD        = 5, >> +    GH_RM_VM_STATUS_AUTH        = 6, >> +    GH_RM_VM_STATUS_INIT_FAILED    = 8, >> +    GH_RM_VM_STATUS_EXITED        = 9, >> +    GH_RM_VM_STATUS_RESETTING    = 10, >> +    GH_RM_VM_STATUS_RESET        = 11, >> +}; >> + >> +/* RPC Calls */ >> +int gh_rm_alloc_vmid(struct gh_rm_rpc *rm, u16 vmid); >> +int gh_rm_dealloc_vmid(struct gh_rm_rpc *rm, u16 vmid); >> +int gh_rm_vm_start(struct gh_rm_rpc *rm, u16 vmid); >> +int gh_rm_vm_stop(struct gh_rm_rpc *rm, u16 vmid); >> + >> +enum gh_rm_vm_auth_mechanism { >> +    GH_RM_VM_AUTH_NONE        = 0, >> +    GH_RM_VM_AUTH_QCOM_PIL_ELF    = 1, >> +    GH_RM_VM_AUTH_QCOM_ANDROID_PVM    =2, >> +}; >> + >> +int gh_rm_vm_configure(struct gh_rm_rpc *rm, u16 vmid, enum >> gh_rm_vm_auth_mechanism auth_mechanism, >> +            u32 mem_handle, u64 image_offset, u64 image_size, >> +            u64 dtb_offset, u64 dtb_size); >> +int gh_rm_vm_init(struct gh_rm_rpc *rm, u16 vmid); >> + >> +struct gh_rm_hyp_resource { >> +    u8 type; >> +    u8 reserved; >> +    __le16 partner_vmid; >> +    __le32 resource_handle; >> +    __le32 resource_label; >> +    __le64 cap_id; >> +    __le32 virq_handle; >> +    __le32 virq; >> +    __le64 base; >> +    __le64 size; >> +} __packed; >> + >> +ssize_t gh_rm_get_hyp_resources(struct gh_rm_rpc *rm, u16 vmid, >> +                struct gh_rm_hyp_resource **resources); >> +int gh_rm_get_vmid(struct gh_rm_rpc *rm, u16 *vmid); >> + >>   #endif >