rfence.rs 8.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191
  1. use crate::hart_mask::HartMask;
  2. use crate::ecall::SbiRet;
  3. /// Remote fence support
  4. ///
  5. /// In RustSBI, RFENCE support requires an IPI support is implemented.
  6. /// If your platform does not provide IPI support, RustSBI will disable RFENCE
  7. /// interface access from supervisor level.
  8. ///
  9. /// The remote fence function acts as a full TLB flush if
  10. /// - `start_addr` and `size` are both 0, and
  11. /// - `size` is equal to `usize::MAX`.
  12. pub trait Rfence: Send {
  13. /// Instructs remote harts to execute `FENCE.I` instruction.
  14. ///
  15. /// # Return value
  16. ///
  17. /// Returns `SBI_SUCCESS` when remote fence was sent to all the targeted harts successfully.
  18. fn remote_fence_i(&mut self, hart_mask: HartMask) -> SbiRet;
  19. /// Instructs the remote harts to execute one or more `SFENCE.VMA` instructions,
  20. /// covering the range of virtual addresses between start and size.
  21. ///
  22. /// # Return value
  23. ///
  24. /// The possible return error codes returned in `SbiRet.error` are shown in the table below:
  25. ///
  26. /// | Return code | Description
  27. /// |:--------------------------|:----------------------------------------------
  28. /// | SBI_SUCCESS | Remote fence was sent to all the targeted harts successfully.
  29. /// | SBI_ERR_INVALID_ADDRESS | `start_addr` or `size` is not valid.
  30. fn remote_sfence_vma(&mut self, hart_mask: HartMask, start_addr: usize, size: usize) -> SbiRet;
  31. /// Instruct the remote harts to execute one or more `SFENCE.VMA` instructions,
  32. /// covering the range of virtual addresses between start and size. This covers only the given `ASID`.
  33. ///
  34. /// # Return value
  35. ///
  36. /// The possible return error codes returned in `SbiRet.error` are shown in the table below:
  37. ///
  38. /// | Return code | Description
  39. /// |:--------------------------|:----------------------------------------------
  40. /// | SBI_SUCCESS | Remote fence was sent to all the targeted harts successfully.
  41. /// | SBI_ERR_INVALID_ADDRESS | `start_addr` or `size` is not valid.
  42. fn remote_sfence_vma_asid(&mut self, hart_mask: HartMask, start_addr: usize, size: usize, asid: usize) -> SbiRet;
  43. /// Instruct the remote harts to execute one or more `HFENCE.GVMA` instructions,
  44. /// covering the range of guest physical addresses between start and size only for the given `VMID`.
  45. ///
  46. /// This function call is only valid for harts implementing hypervisor extension.
  47. ///
  48. /// # Return value
  49. ///
  50. /// The possible return error codes returned in `SbiRet.error` are shown in the table below:
  51. ///
  52. /// | Return code | Description
  53. /// |:--------------------------|:----------------------------------------------
  54. /// | SBI_SUCCESS | Remote fence was sent to all the targeted harts successfully.
  55. /// | SBI_ERR_NOT_SUPPORTED | This function is not supported as it is not implemented or one of the target hart doesn’t support hypervisor extension.
  56. /// | SBI_ERR_INVALID_ADDRESS | `start_addr` or `size` is not valid.
  57. fn remote_hfence_gvma_vmid(&mut self, hart_mask: HartMask, start_addr: usize, size: usize, vmid: usize) -> SbiRet {
  58. drop((hart_mask, start_addr, size, vmid));
  59. SbiRet::not_supported()
  60. }
  61. /// Instruct the remote harts to execute one or more `HFENCE.GVMA` instructions,
  62. /// covering the range of guest physical addresses between start and size for all the guests.
  63. ///
  64. /// This function call is only valid for harts implementing hypervisor extension.
  65. ///
  66. /// # Return value
  67. ///
  68. /// The possible return error codes returned in `SbiRet.error` are shown in the table below:
  69. ///
  70. /// | Return code | Description
  71. /// |:--------------------------|:----------------------------------------------
  72. /// | SBI_SUCCESS | Remote fence was sent to all the targeted harts successfully.
  73. /// | SBI_ERR_NOT_SUPPORTED | This function is not supported as it is not implemented or one of the target hart doesn’t support hypervisor extension.
  74. /// | SBI_ERR_INVALID_ADDRESS | `start_addr` or `size` is not valid.
  75. fn remote_hfence_gvma(&mut self, hart_mask: HartMask, start_addr: usize, size: usize) -> SbiRet {
  76. drop((hart_mask, start_addr, size));
  77. SbiRet::not_supported()
  78. }
  79. /// Instruct the remote harts to execute one or more `HFENCE.VVMA` instructions,
  80. /// covering the range of guest virtual addresses between start and size for the given `ASID` and current `VMID` (in `hgatp` CSR)
  81. /// of calling hart.
  82. ///
  83. /// This function call is only valid for harts implementing hypervisor extension.
  84. ///
  85. /// # Return value
  86. ///
  87. /// The possible return error codes returned in `SbiRet.error` are shown in the table below:
  88. ///
  89. /// | Return code | Description
  90. /// |:--------------------------|:----------------------------------------------
  91. /// | SBI_SUCCESS | Remote fence was sent to all the targeted harts successfully.
  92. /// | SBI_ERR_NOT_SUPPORTED | This function is not supported as it is not implemented or one of the target hart doesn’t support hypervisor extension.
  93. /// | SBI_ERR_INVALID_ADDRESS | `start_addr` or `size` is not valid.
  94. fn remote_hfence_vvma_asid(&mut self, hart_mask: HartMask, start_addr: usize, size: usize, asid: usize) -> SbiRet {
  95. drop((hart_mask, start_addr, size, asid));
  96. SbiRet::not_supported()
  97. }
  98. /// Instruct the remote harts to execute one or more `HFENCE.VVMA` instructions,
  99. /// covering the range of guest virtual addresses between start and size for current `VMID` (in `hgatp` CSR)
  100. /// of calling hart.
  101. ///
  102. /// This function call is only valid for harts implementing hypervisor extension.
  103. ///
  104. /// # Return value
  105. ///
  106. /// The possible return error codes returned in `SbiRet.error` are shown in the table below:
  107. ///
  108. /// | Return code | Description
  109. /// |:--------------------------|:----------------------------------------------
  110. /// | SBI_SUCCESS | Remote fence was sent to all the targeted harts successfully.
  111. /// | SBI_ERR_NOT_SUPPORTED | This function is not supported as it is not implemented or one of the target hart doesn’t support hypervisor extension.
  112. /// | SBI_ERR_INVALID_ADDRESS | `start_addr` or `size` is not valid.
  113. fn remote_hfence_vvma(&mut self, hart_mask: HartMask, start_addr: usize, size: usize) -> SbiRet {
  114. drop((hart_mask, start_addr, size));
  115. SbiRet::not_supported()
  116. }
  117. }
  118. use alloc::boxed::Box;
  119. use spin::Mutex;
  120. lazy_static::lazy_static! {
  121. static ref RFENCE: Mutex<Option<Box<dyn Rfence>>> = Mutex::new(None);
  122. }
  123. #[doc(hidden)] // use through a macro
  124. pub fn init_rfence<T: Rfence + Send + 'static>(rfence: T) {
  125. *RFENCE.lock() = Some(Box::new(rfence));
  126. }
  127. #[inline]
  128. pub(crate) fn probe_rfence() -> bool {
  129. RFENCE.lock().as_ref().is_some()
  130. }
  131. pub(crate) fn remote_fence_i(hart_mask: HartMask) -> SbiRet {
  132. if let Some(rfence) = RFENCE.lock().as_mut() {
  133. rfence.remote_fence_i(hart_mask)
  134. } else {
  135. SbiRet::not_supported()
  136. }
  137. }
  138. pub(crate) fn remote_sfence_vma(hart_mask: HartMask, start_addr: usize, size: usize) -> SbiRet {
  139. if let Some(rfence) = RFENCE.lock().as_mut() {
  140. rfence.remote_sfence_vma(hart_mask, start_addr, size)
  141. } else {
  142. SbiRet::not_supported()
  143. }
  144. }
  145. pub(crate) fn remote_sfence_vma_asid(hart_mask: HartMask, start_addr: usize, size: usize, asid: usize) -> SbiRet {
  146. if let Some(rfence) = RFENCE.lock().as_mut() {
  147. rfence.remote_sfence_vma_asid(hart_mask, start_addr, size, asid)
  148. } else {
  149. SbiRet::not_supported()
  150. }
  151. }
  152. pub(crate) fn remote_hfence_gvma_vmid(hart_mask: HartMask, start_addr: usize, size: usize, vmid: usize) -> SbiRet {
  153. if let Some(rfence) = RFENCE.lock().as_mut() {
  154. rfence.remote_hfence_gvma_vmid(hart_mask, start_addr, size, vmid)
  155. } else {
  156. SbiRet::not_supported()
  157. }
  158. }
  159. pub(crate) fn remote_hfence_gvma(hart_mask: HartMask, start_addr: usize, size: usize) -> SbiRet {
  160. if let Some(rfence) = RFENCE.lock().as_mut() {
  161. rfence.remote_hfence_gvma(hart_mask, start_addr, size)
  162. } else {
  163. SbiRet::not_supported()
  164. }
  165. }
  166. pub(crate) fn remote_hfence_vvma_asid(hart_mask: HartMask, start_addr: usize, size: usize, asid: usize) -> SbiRet {
  167. if let Some(rfence) = RFENCE.lock().as_mut() {
  168. rfence.remote_hfence_vvma_asid(hart_mask, start_addr, size, asid)
  169. } else {
  170. SbiRet::not_supported()
  171. }
  172. }
  173. pub(crate) fn remote_hfence_vvma(hart_mask: HartMask, start_addr: usize, size: usize) -> SbiRet {
  174. if let Some(rfence) = RFENCE.lock().as_mut() {
  175. rfence.remote_hfence_vvma(hart_mask, start_addr, size)
  176. } else {
  177. SbiRet::not_supported()
  178. }
  179. }