guest_emulation_transport/
client.rs

1// Copyright (c) Microsoft Corporation.
2// Licensed under the MIT License.
3
4use super::process_loop::msg;
5use super::process_loop::msg::IgvmAttestRequestData;
6use crate::api::GuestSaveRequest;
7use crate::api::platform_settings;
8use chipset_resources::battery::HostBatteryUpdate;
9use cvm_tracing::CVM_ALLOWED;
10use get_protocol::RegisterState;
11use get_protocol::TripleFaultType;
12use guid::Guid;
13use inspect::Inspect;
14use mesh::MeshPayload;
15use mesh::rpc::Rpc;
16use mesh::rpc::RpcSend;
17use std::sync::Arc;
18use user_driver::DmaClient;
19use vpci::bus_control::VpciBusEvent;
20use zerocopy::IntoBytes;
21
22/// Operation types for provisioning telemetry.
23#[derive(Debug)]
24enum LogOpType {
25    BeginGspCallback,
26    GspCallback,
27}
28
29/// Guest-side client for the GET.
30///
31/// A new client is created from [`spawn_get_worker`](crate::spawn_get_worker),
32/// which initializes the GET worker and returns an instance of the client,
33/// which can then be cloned to any objects / devices that need to communicate
34/// over the GET.
35#[derive(Inspect, Debug, Clone, MeshPayload)]
36pub struct GuestEmulationTransportClient {
37    #[inspect(flatten)]
38    control: ProcessLoopControl,
39    #[inspect(debug)]
40    #[mesh(encoding = "mesh::payload::encoding::ZeroCopyEncoding")]
41    version: get_protocol::ProtocolVersion,
42}
43
44#[derive(Debug, Inspect, Clone, MeshPayload)]
45struct ProcessLoopControl(#[inspect(flatten, send = "msg::Msg::Inspect")] mesh::Sender<msg::Msg>);
46
47impl ProcessLoopControl {
48    async fn call<I, R: 'static + Send>(
49        &self,
50        msg: impl FnOnce(Rpc<I, R>) -> msg::Msg,
51        input: I,
52    ) -> R {
53        match self.0.call(msg, input).await {
54            Ok(val) => val,
55            // downstream clients are not expected to be resilient against the
56            // GET going down. The only thing they can do in this case is
57            // patiently wait for surrounding infrastructure to notice the GET
58            // is down and start tearing everything down.
59            Err(e) => {
60                tracing::error!(
61                    error = &e as &dyn std::error::Error,
62                    "fatal error: GET process loop not available. waiting to get blown away..."
63                );
64                std::future::pending::<()>().await;
65                unreachable!()
66            }
67        }
68    }
69
70    fn notify(&self, msg: msg::Msg) {
71        self.0.send(msg);
72    }
73}
74
75pub struct ModifyVtl2SettingsRequest(
76    pub Rpc<Vec<u8>, Result<(), Vec<underhill_config::Vtl2SettingsErrorInfo>>>,
77);
78
79impl GuestEmulationTransportClient {
80    pub(crate) fn new(
81        control: mesh::Sender<msg::Msg>,
82        version: get_protocol::ProtocolVersion,
83    ) -> GuestEmulationTransportClient {
84        GuestEmulationTransportClient {
85            control: ProcessLoopControl(control),
86            version,
87        }
88    }
89
90    /// Queries the version cached from the version negotiation when
91    /// initializing the GET worker
92    pub fn version(&self) -> crate::api::ProtocolVersion {
93        self.version
94    }
95
96    /// Reads `sector_count` sectors of size `sector_size` from the VMGS disk,
97    /// starting at `sector_offset`.
98    ///
99    /// The caller must ensure the read is smaller than the maximum transfer
100    /// size.
101    pub async fn vmgs_read(
102        &self,
103        sector_offset: u64,
104        sector_count: u32,
105        sector_size: u32,
106    ) -> Result<Vec<u8>, crate::error::VmgsIoError> {
107        self.control
108            .call(
109                msg::Msg::VmgsRead,
110                msg::VmgsReadInput {
111                    sector_offset,
112                    sector_count,
113                    sector_size,
114                },
115            )
116            .await
117            .map_err(|e| crate::error::VmgsIoError(e.0.status))
118    }
119
120    /// Sends a VMGS write request over the GET device
121    ///
122    /// # Arguments
123    /// * `sector_offset` - Offset to start reading from the file
124    /// * `buf` - Buffer containing data being written to VMGS file. Must be a
125    ///   sector multiple.
126    /// * `sector_size` - Size of a sector, must read entire sectors over the
127    ///   GET
128    pub async fn vmgs_write(
129        &self,
130        sector_offset: u64,
131        buf: Vec<u8>,
132        sector_size: u32,
133    ) -> Result<(), crate::error::VmgsIoError> {
134        self.control
135            .call(
136                msg::Msg::VmgsWrite,
137                msg::VmgsWriteInput {
138                    sector_offset,
139                    buf,
140                    sector_size,
141                },
142            )
143            .await
144            .map_err(|e| crate::error::VmgsIoError(e.0.status))
145    }
146
147    /// Sends a VMGS get device info over the GET device
148    pub async fn vmgs_get_device_info(
149        &self,
150    ) -> Result<crate::api::VmgsGetDeviceInfo, crate::error::VmgsIoError> {
151        let response = self.control.call(msg::Msg::VmgsGetDeviceInfo, ()).await.0;
152
153        if response.status != get_protocol::VmgsIoStatus::SUCCESS {
154            return Err(crate::error::VmgsIoError(response.status));
155        }
156
157        let maximum_transfer_size_bytes = response
158            .maximum_transfer_size_bytes
159            .min(get_protocol::MAX_PAYLOAD_SIZE as u32);
160
161        if maximum_transfer_size_bytes != response.maximum_transfer_size_bytes {
162            tracing::warn!(
163                host_value = response.maximum_transfer_size_bytes,
164                clamped_value = maximum_transfer_size_bytes,
165                "VMGS maximum transfer size was clamped due to protocol limitations",
166            );
167        }
168
169        Ok(crate::api::VmgsGetDeviceInfo {
170            status: response.status,
171            capacity: response.capacity,
172            bytes_per_logical_sector: response.bytes_per_logical_sector,
173            bytes_per_physical_sector: response.bytes_per_physical_sector,
174            maximum_transfer_size_bytes,
175        })
176    }
177
178    /// Sends a VMGS flush request over the GET device
179    pub async fn vmgs_flush(&self) -> Result<(), crate::error::VmgsIoError> {
180        let response = self.control.call(msg::Msg::VmgsFlush, ()).await.0;
181
182        if response.status != get_protocol::VmgsIoStatus::SUCCESS {
183            return Err(crate::error::VmgsIoError(response.status));
184        }
185
186        Ok(())
187    }
188
189    /// Retrieve Device Platform Settings using the new
190    /// DEVICE_PLATFORM_SETTINGS_V2 packet (introduced in the Nickel GET
191    /// protocol version)
192    pub async fn device_platform_settings(
193        &self,
194    ) -> Result<platform_settings::DevicePlatformSettings, crate::error::DevicePlatformSettingsError>
195    {
196        let json = self
197            .control
198            .call(msg::Msg::DevicePlatformSettingsV2, ())
199            .await;
200
201        let json =
202            serde_json::from_slice::<get_protocol::dps_json::DevicePlatformSettingsV2Json>(&json)
203                .map_err(crate::error::DevicePlatformSettingsError::BadJson)?;
204
205        let vtl2_settings = if let Some(settings) = &json.v2.r#static.vtl2_settings {
206            Some(
207                underhill_config::Vtl2Settings::read_from(settings, Default::default())
208                    .map_err(crate::error::DevicePlatformSettingsError::BadVtl2Settings)?,
209            )
210        } else {
211            None
212        };
213
214        Ok(platform_settings::DevicePlatformSettings {
215            smbios: platform_settings::Smbios {
216                serial_number: json.v1.serial_number.into(),
217                base_board_serial_number: json.v1.base_board_serial_number.into(),
218                chassis_serial_number: json.v1.chassis_serial_number.into(),
219                chassis_asset_tag: json.v1.chassis_asset_tag.into(),
220
221                system_manufacturer: json.v2.r#static.smbios.system_manufacturer.into(),
222                system_product_name: json.v2.r#static.smbios.system_product_name.into(),
223                system_version: json.v2.r#static.smbios.system_version.into(),
224                system_sku_number: json.v2.r#static.smbios.system_sku_number.into(),
225                system_family: json.v2.r#static.smbios.system_family.into(),
226                bios_lock_string: json.v2.r#static.smbios.bios_lock_string.into(),
227                memory_device_serial_number: json
228                    .v2
229                    .r#static
230                    .smbios
231                    .memory_device_serial_number
232                    .into(),
233                processor_manufacturer: json.v2.dynamic.smbios.processor_manufacturer,
234                processor_version: json.v2.dynamic.smbios.processor_version,
235                processor_id: json.v2.dynamic.smbios.processor_id,
236                external_clock: json.v2.dynamic.smbios.external_clock,
237                max_speed: json.v2.dynamic.smbios.max_speed,
238                current_speed: json.v2.dynamic.smbios.current_speed,
239                processor_characteristics: json.v2.dynamic.smbios.processor_characteristics,
240                processor_family2: json.v2.dynamic.smbios.processor_family2,
241                processor_type: json.v2.dynamic.smbios.processor_type,
242                voltage: json.v2.dynamic.smbios.voltage,
243                status: json.v2.dynamic.smbios.status,
244                processor_upgrade: json.v2.dynamic.smbios.processor_upgrade,
245            },
246            general: platform_settings::General {
247                secure_boot_enabled: json.v1.secure_boot_enabled,
248                secure_boot_template: {
249                    use crate::api::platform_settings::SecureBootTemplateType;
250                    use get_protocol::dps_json::HclSecureBootTemplateId;
251
252                    match json.v1.secure_boot_template_id {
253                        HclSecureBootTemplateId::None => SecureBootTemplateType::None,
254                        HclSecureBootTemplateId::MicrosoftWindows => {
255                            SecureBootTemplateType::MicrosoftWindows
256                        }
257                        HclSecureBootTemplateId::MicrosoftUEFICertificateAuthority => {
258                            SecureBootTemplateType::MicrosoftUefiCertificateAuthority
259                        }
260                    }
261                },
262                bios_guid: json.v1.bios_guid,
263                console_mode: {
264                    use crate::api::platform_settings::UefiConsoleMode;
265
266                    match get_protocol::UefiConsoleMode(json.v1.console_mode) {
267                        get_protocol::UefiConsoleMode::DEFAULT => UefiConsoleMode::Default,
268                        get_protocol::UefiConsoleMode::COM1 => UefiConsoleMode::COM1,
269                        get_protocol::UefiConsoleMode::COM2 => UefiConsoleMode::COM2,
270                        get_protocol::UefiConsoleMode::NONE => UefiConsoleMode::None,
271                        o => {
272                            return Err(
273                                crate::error::DevicePlatformSettingsError::InvalidConsoleMode(o),
274                            );
275                        }
276                    }
277                },
278                battery_enabled: json.v1.enable_battery,
279                processor_idle_enabled: json.v1.enable_processor_idle,
280                tpm_enabled: json.v1.enable_tpm,
281                com1_enabled: json.v1.com1.enable_port,
282                com1_debugger_mode: json.v1.com1.debugger_mode,
283                com1_vmbus_redirector: json.v1.com1.enable_vmbus_redirector,
284                com2_enabled: json.v1.com2.enable_port,
285                com2_debugger_mode: json.v1.com2.debugger_mode,
286                com2_vmbus_redirector: json.v1.com2.enable_vmbus_redirector,
287                firmware_debugging_enabled: json.v1.enable_firmware_debugging,
288                hibernation_enabled: json.v1.enable_hibernation,
289
290                suppress_attestation: Some(json.v2.r#static.no_persistent_secrets),
291                generation_id: {
292                    let mut gen_id = [0; 16];
293                    gen_id[..8].copy_from_slice(&json.v2.dynamic.generation_id_low.to_ne_bytes());
294                    gen_id[8..].copy_from_slice(&json.v2.dynamic.generation_id_high.to_ne_bytes());
295                    Some(gen_id)
296                },
297
298                legacy_memory_map: json.v2.r#static.legacy_memory_map,
299                pause_after_boot_failure: json.v2.r#static.pause_after_boot_failure,
300                pxe_ip_v6: json.v2.r#static.pxe_ip_v6,
301                measure_additional_pcrs: json.v2.r#static.measure_additional_pcrs,
302                disable_frontpage: json.v2.r#static.disable_frontpage,
303                disable_sha384_pcr: json.v2.r#static.disable_sha384_pcr,
304                media_present_enabled_by_default: json.v2.r#static.media_present_enabled_by_default,
305                vpci_boot_enabled: json.v2.r#static.vpci_boot_enabled,
306                vpci_instance_filter: json.v2.r#static.vpci_instance_filter,
307                memory_protection_mode: {
308                    use crate::api::platform_settings::MemoryProtectionMode;
309
310                    match json.v2.r#static.memory_protection_mode {
311                        0b00 => MemoryProtectionMode::Disabled,
312                        0b01 => MemoryProtectionMode::Default,
313                        0b10 => MemoryProtectionMode::Strict,
314                        0b11 => MemoryProtectionMode::Relaxed,
315                        o => return Err(
316                            crate::error::DevicePlatformSettingsError::InvalidMemoryProtectionMode(
317                                o,
318                            ),
319                        ),
320                    }
321                },
322                default_boot_always_attempt: json.v2.r#static.default_boot_always_attempt,
323                nvdimm_count: json.v2.dynamic.nvdimm_count,
324                psp_enabled: json.v2.dynamic.enable_psp,
325                vmbus_redirection_enabled: json.v2.r#static.vmbus_redirection_enabled,
326                always_relay_host_mmio: json.v2.r#static.always_relay_host_mmio,
327                vtl2_settings,
328                watchdog_enabled: json.v2.r#static.watchdog_enabled,
329                num_lock_enabled: json.v2.r#static.num_lock_enabled,
330                pcat_boot_device_order: json.v2.r#static.pcat_boot_device_order.unwrap_or({
331                    use crate::api::platform_settings::PcatBootDevice;
332                    [
333                        PcatBootDevice::Floppy,
334                        PcatBootDevice::Optical,
335                        PcatBootDevice::HardDrive,
336                        PcatBootDevice::Network,
337                    ]
338                }),
339                is_servicing_scenario: json.v2.dynamic.is_servicing_scenario,
340                firmware_mode_is_pcat: json.v2.r#static.firmware_mode_is_pcat,
341                imc_enabled: json.v2.r#static.imc_enabled,
342                cxl_memory_enabled: json.v2.r#static.cxl_memory_enabled,
343                efi_diagnostics_log_level: json.v2.r#static.efi_diagnostics_log_level,
344                guest_state_lifetime: json.v2.r#static.guest_state_lifetime,
345                guest_state_encryption_policy: json.v2.r#static.guest_state_encryption_policy,
346                management_vtl_features: json.v2.r#static.management_vtl_features,
347            },
348            acpi_tables: json.v2.dynamic.acpi_tables,
349        })
350    }
351
352    /// Sends the host new content to encrypt and save content to decrypt
353    pub async fn guest_state_protection_data(
354        &self,
355        encrypted_gsp: [crate::api::GspCiphertextContent; crate::api::NUMBER_GSP as usize],
356        gsp_extended_status: crate::api::GspExtendedStatusFlags,
357    ) -> crate::api::GuestStateProtection {
358        let mut buffer = [0; get_protocol::GSP_CLEARTEXT_MAX as usize * 2];
359        let start_time = std::time::SystemTime::now();
360        getrandom::fill(&mut buffer).expect("rng failure");
361
362        tracing::info!(
363            CVM_ALLOWED,
364            op_type = ?LogOpType::BeginGspCallback,
365            "Getting guest state protection data"
366        );
367
368        let gsp_request = get_protocol::GuestStateProtectionRequest::new(
369            buffer,
370            encrypted_gsp,
371            gsp_extended_status,
372        );
373
374        let response = self
375            .control
376            .call(msg::Msg::GuestStateProtection, Box::new(gsp_request.into()))
377            .await
378            .0;
379
380        tracing::info!(
381            CVM_ALLOWED,
382            op_type = ?LogOpType::GspCallback,
383            latency = std::time::SystemTime::now()
384                .duration_since(start_time)
385                .map_or(0, |d| d.as_millis()),
386            "Got guest state protection data"
387        );
388
389        crate::api::GuestStateProtection {
390            encrypted_gsp: response.encrypted_gsp,
391            decrypted_gsp: response.decrypted_gsp,
392            extended_status_flags: response.extended_status_flags,
393            new_gsp: gsp_request.new_gsp,
394        }
395    }
396
397    /// Set the gpa allocator, which is required by ['igvm_attest'].
398    ///
399    /// TODO: This isn't a VfioDevice, but the VfioDmaBuffer is a convienent
400    /// trait to use for wrapping the PFN allocations. Refactor this in the
401    /// future once a central DMA API is made.
402    pub fn set_gpa_allocator(&mut self, gpa_allocator: Arc<dyn DmaClient>) {
403        self.control
404            .notify(msg::Msg::SetGpaAllocator(gpa_allocator.into()));
405    }
406
407    /// Set the the callback to trigger the debug interrupt.
408    pub fn set_debug_interrupt_callback(&mut self, callback: Box<dyn Fn(u8) + Send + Sync>) {
409        self.control
410            .notify(msg::Msg::SetDebugInterruptCallback(callback.into()));
411    }
412
413    /// Send the attestation request to the IGVM agent on the host.
414    pub async fn igvm_attest(
415        &self,
416        agent_data: Vec<u8>,
417        report: Vec<u8>,
418        response_buffer_len: usize,
419    ) -> Result<crate::api::IgvmAttest, crate::error::IgvmAttestError> {
420        let request = IgvmAttestRequestData {
421            agent_data,
422            report,
423            response_buffer_len,
424        };
425
426        let response = self
427            .control
428            .call(msg::Msg::IgvmAttest, Box::new(request))
429            .await?;
430
431        Ok(crate::api::IgvmAttest { response })
432    }
433
434    /// Sends a PowerOff notification back to the host.
435    ///
436    /// This function does not wait for a response from the host, since the host
437    /// will terminate Underhill shortly after it receives the notification.
438    pub fn send_power_off(&self) {
439        tracing::info!("powering off...");
440        self.control
441            .notify(msg::Msg::PowerState(msg::PowerState::PowerOff));
442    }
443
444    /// Sends a Hibernate notification back to the host.
445    ///
446    /// This function does not wait for a response from the host, since the host
447    /// will terminate Underhill shortly after it receives the notification.
448    pub fn send_hibernate(&self) {
449        tracing::info!("hibernating...");
450        self.control
451            .notify(msg::Msg::PowerState(msg::PowerState::Hibernate));
452    }
453
454    /// Sends a Reset notification back to the host.
455    ///
456    /// This function does not wait for a response from the host, since the host
457    /// will terminate Underhill shortly after it receives the notification.
458    pub fn send_reset(&self) {
459        tracing::info!("resetting...");
460        self.control
461            .notify(msg::Msg::PowerState(msg::PowerState::Reset));
462    }
463
464    /// Customer facing event logging.
465    ///
466    /// This function is non-blocking and does not wait for a response from the
467    /// host.
468    ///
469    /// When reporting fatal events (i.e: events which terminate OpenHCL
470    /// execution entirely), the caller must also await-on
471    /// [`event_log_flush`](Self::event_log_flush) in order to ensure all queued
472    /// events has actually been sent to the host.
473    ///
474    /// Not doing so may result in message loss due to the GET worker being
475    /// shutdown prior to having processed all outstanding requests.
476    pub fn event_log(&self, event_log_id: crate::api::EventLogId) {
477        self.control.notify(msg::Msg::EventLog(event_log_id.into()));
478    }
479
480    /// This async method will only resolve after all outstanding event logs
481    /// are written back to the host.
482    pub async fn event_log_flush(&self) {
483        self.control.call(msg::Msg::FlushWrites, ()).await
484    }
485
486    /// Report the fatal event to the host and flush the event queue.
487    ///
488    /// This function is asynchronous and is equivalent to the combination of
489    /// [`event_log`](Self::event_log) and [`event_log_flush`](Self::event_log_flush).
490    ///
491    /// Use this function to ensure all the events prior to the fatal event are sent to
492    /// the host before the OpenHCL tears down. For non-fatal event, use
493    /// [`event_log`](Self::event_log).
494    pub async fn event_log_fatal(&self, event_log_id: crate::api::EventLogId) {
495        self.control.notify(msg::Msg::EventLog(event_log_id.into()));
496        self.control.call(msg::Msg::FlushWrites, ()).await
497    }
498
499    /// Retrieves the current time from the host.
500    pub async fn host_time(&self) -> crate::api::Time {
501        let response = self.control.call(msg::Msg::HostTime, ()).await;
502        crate::api::Time {
503            utc: response.0.utc,
504            time_zone: response.0.time_zone,
505        }
506    }
507
508    /// Gets encryption seed from host.
509    pub async fn guest_state_protection_data_by_id(
510        &self,
511    ) -> Result<crate::api::GuestStateProtectionById, crate::error::GuestStateProtectionByIdError>
512    {
513        let response = self
514            .control
515            .call(msg::Msg::GuestStateProtectionById, ())
516            .await
517            .0;
518
519        if response.seed.length > response.seed.buffer.len() as u32 {
520            return Err(crate::error::GuestStateProtectionByIdError(
521                response.seed.length,
522                response.seed.buffer.len() as u32,
523            ));
524        }
525
526        Ok(crate::api::GuestStateProtectionById {
527            seed: response.seed,
528            extended_status_flags: response.extended_status_flags,
529        })
530    }
531
532    /// Send start VTL0 complete notification to host.
533    pub async fn complete_start_vtl0(&self, error_msg: Option<String>) {
534        if self.version >= get_protocol::ProtocolVersion::NICKEL_REV2 {
535            self.control
536                .call(msg::Msg::CompleteStartVtl0, error_msg.clone())
537                .await;
538
539            if let Some(error_msg) = error_msg {
540                // If we sent an error to the host, Underhill expects to be
541                // terminated/halted. If this doesn't occur in 2 minutes, then
542                // surface a panic to force a guest crash. Make sure our timeout
543                // is longer than any host-side timeouts to avoid false positives.
544                // Currently known host timeouts:
545                // Vdev/VF removal: 1 minute
546                mesh::CancelContext::new()
547                    .with_timeout(std::time::Duration::from_mins(2))
548                    .until_cancelled(std::future::pending::<()>())
549                    .await
550                    .unwrap_or_else(|_| {
551                        panic!(
552                            "should have been terminated after reporting start failure: {error_msg}"
553                        )
554                    });
555            }
556        }
557    }
558
559    /// Map the framebuffer
560    pub async fn map_framebuffer(&self, gpa: u64) -> Result<(), crate::error::MapFramebufferError> {
561        let response = self.control.call(msg::Msg::MapFramebuffer, gpa).await.0;
562        match response.status {
563            get_protocol::MapFramebufferStatus::SUCCESS => Ok(()),
564            _ => Err(crate::error::MapFramebufferError(response.status)),
565        }
566    }
567
568    /// Unmap the framebuffer
569    pub async fn unmap_framebuffer(&self) -> Result<(), crate::error::UnmapFramebufferError> {
570        let response = self.control.call(msg::Msg::UnmapFramebuffer, ()).await.0;
571        match response.status {
572            get_protocol::UnmapFramebufferStatus::SUCCESS => Ok(()),
573            _ => Err(crate::error::UnmapFramebufferError(response.status)),
574        }
575    }
576
577    /// Sends a message requesting the host to offer a VPCI device to this guest.
578    pub async fn offer_vpci_device(
579        &self,
580        bus_instance_id: Guid,
581    ) -> Result<(), crate::error::VpciControlError> {
582        let response = self
583            .control
584            .call(
585                msg::Msg::VpciDeviceControl,
586                msg::VpciDeviceControlInput {
587                    code: get_protocol::VpciDeviceControlCode::OFFER.into(),
588                    bus_instance_id,
589                },
590            )
591            .await
592            .0;
593        if response.status != get_protocol::VpciDeviceControlStatus::SUCCESS {
594            Err(crate::error::VpciControlError(response.status))
595        } else {
596            Ok(())
597        }
598    }
599
600    /// Sends a message requesting the host to revoke a VPCI device to this guest.
601    pub async fn revoke_vpci_device(
602        &self,
603        bus_instance_id: Guid,
604    ) -> Result<(), crate::error::VpciControlError> {
605        let response = self
606            .control
607            .call(
608                msg::Msg::VpciDeviceControl,
609                msg::VpciDeviceControlInput {
610                    code: get_protocol::VpciDeviceControlCode::REVOKE.into(),
611                    bus_instance_id,
612                },
613            )
614            .await
615            .0;
616        if response.status != get_protocol::VpciDeviceControlStatus::SUCCESS {
617            Err(crate::error::VpciControlError(response.status))
618        } else {
619            Ok(())
620        }
621    }
622
623    /// Sends a message to the host reporting a VPCI device binding state change.
624    pub async fn report_vpci_device_binding_state(
625        &self,
626        bus_instance_id: Guid,
627        binding_state: bool,
628    ) -> Result<(), crate::error::VpciControlError> {
629        let response = self
630            .control
631            .call(
632                msg::Msg::VpciDeviceBindingChange,
633                msg::VpciDeviceBindingChangeInput {
634                    bus_instance_id,
635                    binding_state,
636                },
637            )
638            .await
639            .0;
640        if response.status != get_protocol::VpciDeviceControlStatus::SUCCESS {
641            Err(crate::error::VpciControlError(response.status))
642        } else {
643            Ok(())
644        }
645    }
646
647    /// Creates a listener (in the form of an `UnboundedReceiver`) that receives
648    /// notifications for the specified VPCI device.
649    pub async fn connect_to_vpci_event_source(
650        &self,
651        bus_instance_id: Guid,
652    ) -> mesh::Receiver<VpciBusEvent> {
653        let (sender, receiver) = mesh::channel();
654        self.control
655            .call(
656                msg::Msg::VpciListenerRegistration,
657                msg::VpciListenerRegistrationInput {
658                    bus_instance_id,
659                    sender,
660                },
661            )
662            .await;
663        receiver
664    }
665
666    /// Disconnects a listener from the specified VPCI device.
667    pub fn disconnect_from_vpci_event_source(&self, bus_instance_id: Guid) {
668        self.control
669            .notify(msg::Msg::VpciListenerDeregistration(bus_instance_id));
670    }
671
672    /// Take the vtl2 settings recv channel. Returns `None` if the channel has already been taken.
673    pub async fn take_vtl2_settings_recv(
674        &self,
675    ) -> Option<mesh::Receiver<ModifyVtl2SettingsRequest>> {
676        self.control
677            .call(msg::Msg::TakeVtl2SettingsReceiver, ())
678            .await
679            .0
680    }
681
682    /// Take the generation id recv channel. Returns `None` if the channel has already been taken.
683    pub async fn take_generation_id_recv(&self) -> Option<mesh::Receiver<[u8; 16]>> {
684        self.control.call(msg::Msg::TakeGenIdReceiver, ()).await
685    }
686
687    /// Take the battery status recv channel. Returns 'None' if the channel has already been taken.
688    pub async fn take_battery_status_recv(&self) -> Option<mesh::Receiver<HostBatteryUpdate>> {
689        self.control
690            .call(msg::Msg::TakeBatteryStatusReceiver, ())
691            .await
692    }
693
694    /// Read a PCI config space value from the proxied VGA device.
695    pub async fn vga_proxy_pci_read(&self, offset: u16) -> u32 {
696        let response = self.control.call(msg::Msg::VgaProxyPciRead, offset).await.0;
697        response.value
698    }
699
700    /// Write a PCI config space value to the proxied VGA device.
701    pub async fn vga_proxy_pci_write(&self, offset: u16, value: u32) {
702        self.control
703            .call(
704                msg::Msg::VgaProxyPciWrite,
705                msg::VgaProxyPciWriteInput { offset, value },
706            )
707            .await;
708    }
709
710    /// Invokes `IVmGuestMemoryAccess::CreateRamGpaRange` on the host
711    pub async fn create_ram_gpa_range(
712        &self,
713        slot: u32,
714        gpa_start: u64,
715        gpa_count: u64,
716        gpa_offset: u64,
717        flags: crate::api::CreateRamGpaRangeFlags,
718    ) -> Result<crate::api::RemoteRamGpaRangeHandle, crate::error::CreateRamGpaRangeError> {
719        let response = self
720            .control
721            .call(
722                msg::Msg::CreateRamGpaRange,
723                msg::CreateRamGpaRangeInput {
724                    slot,
725                    gpa_start,
726                    gpa_count,
727                    gpa_offset,
728                    flags: flags.into(),
729                },
730            )
731            .await
732            .0;
733        if response.status != get_protocol::CreateRamGpaRangeStatus::SUCCESS {
734            Err(crate::error::CreateRamGpaRangeError(response.status))
735        } else {
736            Ok(crate::api::RemoteRamGpaRangeHandle::from_raw(slot))
737        }
738    }
739
740    /// Invokes `.Reset()` on host object corresponding to a handle returned by
741    /// `CreateRamGpaHandle`
742    pub async fn reset_ram_gpa_range(&self, handle: crate::api::RemoteRamGpaRangeHandle) {
743        self.control
744            .call(msg::Msg::ResetRamGpaRange, handle.as_raw())
745            .await;
746    }
747
748    /// Gets the saved state from the host. Returns immediately with whatever
749    /// saved state existed at the time the call is processed, which may be None.
750    pub async fn get_saved_state_from_host(
751        &self,
752    ) -> Result<Vec<u8>, crate::error::SaveRestoreOperationFailure> {
753        self.control
754            .call(msg::Msg::GetVtl2SavedStateFromHost, ())
755            .await
756            .map_err(|()| crate::error::SaveRestoreOperationFailure {})
757    }
758
759    /// Reports the result of a restore operation to the host.
760    /// Limited to reporting either success or failure.
761    /// TODO: consider adding an error code or similar
762    /// to increase reporting ability/host-side diagnosability.
763    pub async fn report_restore_result_to_host(&self, success: bool) {
764        self.control
765            .notify(msg::Msg::ReportRestoreResultToHost(success));
766    }
767
768    /// Take the save request receiver, which allows the VM to respond to
769    /// host-sent notifications to save state. Returns `None` if the channel has
770    /// already been taken.
771    pub async fn take_save_request_recv(&self) -> Option<mesh::Receiver<GuestSaveRequest>> {
772        self.control
773            .call(msg::Msg::TakeSaveRequestReceiver, ())
774            .await
775    }
776
777    /// Sends servicing state to the host.
778    ///
779    /// This should only be called when servicing state has been requested via
780    /// the channel returned by [`Self::take_save_request_recv`].
781    pub async fn send_servicing_state(
782        &self,
783        data: Vec<u8>,
784    ) -> Result<(), crate::error::SaveRestoreOperationFailure> {
785        self.control
786            .call(msg::Msg::SendServicingState, Ok(data))
787            .await
788            .map_err(|()| crate::error::SaveRestoreOperationFailure {})
789    }
790
791    /// Sends a servicing failure to the host.
792    ///
793    /// This should only be called when servicing state has been requested via
794    /// the channel returned by [`Self::take_save_request_recv`].
795    pub async fn send_servicing_failure(
796        &self,
797        err: impl ToString,
798    ) -> Result<(), crate::error::SaveRestoreOperationFailure> {
799        self.control
800            .call(msg::Msg::SendServicingState, Err(err.to_string()))
801            .await
802            .map_err(|()| crate::error::SaveRestoreOperationFailure {})
803    }
804
805    /// Notify of a VTL crash
806    pub fn notify_of_vtl_crash(
807        &self,
808        vp_index: u32,
809        last_vtl: u8,
810        control: u64,
811        parameters: [u64; get_protocol::VTL_CRASH_PARAMETERS],
812    ) {
813        self.control.notify(msg::Msg::VtlCrashNotification(
814            get_protocol::VtlCrashNotification::new(vp_index, last_vtl, control, parameters).into(),
815        ));
816    }
817
818    /// Notify of a triple fault.
819    pub fn triple_fault(
820        &self,
821        vp_index: u32,
822        fault_type: TripleFaultType,
823        reg_state: Vec<RegisterState>,
824    ) {
825        let mut payload = vec![];
826
827        let notification = get_protocol::TripleFaultNotification::new(
828            vp_index,
829            fault_type,
830            reg_state.len() as u32,
831        );
832        payload.extend_from_slice(notification.as_bytes());
833        payload.extend_from_slice(reg_state.as_bytes());
834
835        self.control
836            .notify(msg::Msg::TripleFaultNotification(payload));
837    }
838}