18c2ecf20Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-or-later 28c2ecf20Sopenharmony_ci/* 38c2ecf20Sopenharmony_ci * Virtio vhost-user driver 48c2ecf20Sopenharmony_ci * 58c2ecf20Sopenharmony_ci * Copyright(c) 2019 Intel Corporation 68c2ecf20Sopenharmony_ci * 78c2ecf20Sopenharmony_ci * This driver allows virtio devices to be used over a vhost-user socket. 88c2ecf20Sopenharmony_ci * 98c2ecf20Sopenharmony_ci * Guest devices can be instantiated by kernel module or command line 108c2ecf20Sopenharmony_ci * parameters. One device will be created for each parameter. Syntax: 118c2ecf20Sopenharmony_ci * 128c2ecf20Sopenharmony_ci * virtio_uml.device=<socket>:<virtio_id>[:<platform_id>] 138c2ecf20Sopenharmony_ci * where: 148c2ecf20Sopenharmony_ci * <socket> := vhost-user socket path to connect 158c2ecf20Sopenharmony_ci * <virtio_id> := virtio device id (as in virtio_ids.h) 168c2ecf20Sopenharmony_ci * <platform_id> := (optional) platform device id 178c2ecf20Sopenharmony_ci * 188c2ecf20Sopenharmony_ci * example: 198c2ecf20Sopenharmony_ci * virtio_uml.device=/var/uml.socket:1 208c2ecf20Sopenharmony_ci * 218c2ecf20Sopenharmony_ci * Based on Virtio MMIO driver by Pawel Moll, copyright 2011-2014, ARM Ltd. 228c2ecf20Sopenharmony_ci */ 238c2ecf20Sopenharmony_ci#include <linux/module.h> 248c2ecf20Sopenharmony_ci#include <linux/platform_device.h> 258c2ecf20Sopenharmony_ci#include <linux/slab.h> 268c2ecf20Sopenharmony_ci#include <linux/virtio.h> 278c2ecf20Sopenharmony_ci#include <linux/virtio_config.h> 288c2ecf20Sopenharmony_ci#include <linux/virtio_ring.h> 298c2ecf20Sopenharmony_ci#include <linux/time-internal.h> 308c2ecf20Sopenharmony_ci#include <shared/as-layout.h> 318c2ecf20Sopenharmony_ci#include <irq_kern.h> 328c2ecf20Sopenharmony_ci#include <init.h> 338c2ecf20Sopenharmony_ci#include <os.h> 348c2ecf20Sopenharmony_ci#include "vhost_user.h" 358c2ecf20Sopenharmony_ci 368c2ecf20Sopenharmony_ci/* Workaround due to a conflict between irq_user.h and irqreturn.h */ 378c2ecf20Sopenharmony_ci#ifdef IRQ_NONE 388c2ecf20Sopenharmony_ci#undef IRQ_NONE 398c2ecf20Sopenharmony_ci#endif 408c2ecf20Sopenharmony_ci 418c2ecf20Sopenharmony_ci#define MAX_SUPPORTED_QUEUE_SIZE 256 428c2ecf20Sopenharmony_ci 438c2ecf20Sopenharmony_ci#define to_virtio_uml_device(_vdev) \ 448c2ecf20Sopenharmony_ci container_of(_vdev, struct virtio_uml_device, vdev) 458c2ecf20Sopenharmony_ci 468c2ecf20Sopenharmony_cistruct virtio_uml_platform_data { 478c2ecf20Sopenharmony_ci u32 virtio_device_id; 488c2ecf20Sopenharmony_ci const char *socket_path; 498c2ecf20Sopenharmony_ci struct work_struct conn_broken_wk; 508c2ecf20Sopenharmony_ci struct platform_device *pdev; 518c2ecf20Sopenharmony_ci}; 528c2ecf20Sopenharmony_ci 538c2ecf20Sopenharmony_cistruct virtio_uml_device { 548c2ecf20Sopenharmony_ci struct virtio_device vdev; 558c2ecf20Sopenharmony_ci struct platform_device *pdev; 568c2ecf20Sopenharmony_ci 578c2ecf20Sopenharmony_ci spinlock_t sock_lock; 588c2ecf20Sopenharmony_ci int sock, req_fd; 598c2ecf20Sopenharmony_ci u64 features; 608c2ecf20Sopenharmony_ci u64 protocol_features; 618c2ecf20Sopenharmony_ci u8 status; 628c2ecf20Sopenharmony_ci u8 registered:1; 638c2ecf20Sopenharmony_ci}; 648c2ecf20Sopenharmony_ci 658c2ecf20Sopenharmony_cistruct virtio_uml_vq_info { 668c2ecf20Sopenharmony_ci int kick_fd, call_fd; 678c2ecf20Sopenharmony_ci char name[32]; 688c2ecf20Sopenharmony_ci#ifdef CONFIG_UML_TIME_TRAVEL_SUPPORT 698c2ecf20Sopenharmony_ci struct virtqueue *vq; 708c2ecf20Sopenharmony_ci vq_callback_t *callback; 718c2ecf20Sopenharmony_ci struct time_travel_event defer; 728c2ecf20Sopenharmony_ci#endif 738c2ecf20Sopenharmony_ci}; 748c2ecf20Sopenharmony_ci 758c2ecf20Sopenharmony_ciextern unsigned long long physmem_size, highmem; 768c2ecf20Sopenharmony_ci 778c2ecf20Sopenharmony_ci#define vu_err(vu_dev, ...) dev_err(&(vu_dev)->pdev->dev, ##__VA_ARGS__) 788c2ecf20Sopenharmony_ci 798c2ecf20Sopenharmony_ci/* Vhost-user protocol */ 808c2ecf20Sopenharmony_ci 818c2ecf20Sopenharmony_cistatic int full_sendmsg_fds(int fd, const void *buf, unsigned int len, 828c2ecf20Sopenharmony_ci const int *fds, unsigned int fds_num) 838c2ecf20Sopenharmony_ci{ 848c2ecf20Sopenharmony_ci int rc; 858c2ecf20Sopenharmony_ci 868c2ecf20Sopenharmony_ci do { 878c2ecf20Sopenharmony_ci rc = os_sendmsg_fds(fd, buf, len, fds, fds_num); 888c2ecf20Sopenharmony_ci if (rc > 0) { 898c2ecf20Sopenharmony_ci buf += rc; 908c2ecf20Sopenharmony_ci len -= rc; 918c2ecf20Sopenharmony_ci fds = NULL; 928c2ecf20Sopenharmony_ci fds_num = 0; 938c2ecf20Sopenharmony_ci } 948c2ecf20Sopenharmony_ci } while (len && (rc >= 0 || rc == -EINTR)); 958c2ecf20Sopenharmony_ci 968c2ecf20Sopenharmony_ci if (rc < 0) 978c2ecf20Sopenharmony_ci return rc; 988c2ecf20Sopenharmony_ci return 0; 998c2ecf20Sopenharmony_ci} 1008c2ecf20Sopenharmony_ci 1018c2ecf20Sopenharmony_cistatic int full_read(int fd, void *buf, int len, bool abortable) 1028c2ecf20Sopenharmony_ci{ 1038c2ecf20Sopenharmony_ci int rc; 1048c2ecf20Sopenharmony_ci 1058c2ecf20Sopenharmony_ci do { 1068c2ecf20Sopenharmony_ci rc = os_read_file(fd, buf, len); 1078c2ecf20Sopenharmony_ci if (rc > 0) { 1088c2ecf20Sopenharmony_ci buf += rc; 1098c2ecf20Sopenharmony_ci len -= rc; 1108c2ecf20Sopenharmony_ci } 1118c2ecf20Sopenharmony_ci } while (len && (rc > 0 || rc == -EINTR || (!abortable && rc == -EAGAIN))); 1128c2ecf20Sopenharmony_ci 1138c2ecf20Sopenharmony_ci if (rc < 0) 1148c2ecf20Sopenharmony_ci return rc; 1158c2ecf20Sopenharmony_ci if (rc == 0) 1168c2ecf20Sopenharmony_ci return -ECONNRESET; 1178c2ecf20Sopenharmony_ci return 0; 1188c2ecf20Sopenharmony_ci} 1198c2ecf20Sopenharmony_ci 1208c2ecf20Sopenharmony_cistatic int vhost_user_recv_header(int fd, struct vhost_user_msg *msg) 1218c2ecf20Sopenharmony_ci{ 1228c2ecf20Sopenharmony_ci return full_read(fd, msg, sizeof(msg->header), true); 1238c2ecf20Sopenharmony_ci} 1248c2ecf20Sopenharmony_ci 1258c2ecf20Sopenharmony_cistatic int vhost_user_recv(struct virtio_uml_device *vu_dev, 1268c2ecf20Sopenharmony_ci int fd, struct vhost_user_msg *msg, 1278c2ecf20Sopenharmony_ci size_t max_payload_size, bool wait) 1288c2ecf20Sopenharmony_ci{ 1298c2ecf20Sopenharmony_ci size_t size; 1308c2ecf20Sopenharmony_ci int rc; 1318c2ecf20Sopenharmony_ci 1328c2ecf20Sopenharmony_ci /* 1338c2ecf20Sopenharmony_ci * In virtio time-travel mode, we're handling all the vhost-user 1348c2ecf20Sopenharmony_ci * FDs by polling them whenever appropriate. However, we may get 1358c2ecf20Sopenharmony_ci * into a situation where we're sending out an interrupt message 1368c2ecf20Sopenharmony_ci * to a device (e.g. a net device) and need to handle a simulation 1378c2ecf20Sopenharmony_ci * time message while doing so, e.g. one that tells us to update 1388c2ecf20Sopenharmony_ci * our idea of how long we can run without scheduling. 1398c2ecf20Sopenharmony_ci * 1408c2ecf20Sopenharmony_ci * Thus, we need to not just read() from the given fd, but need 1418c2ecf20Sopenharmony_ci * to also handle messages for the simulation time - this function 1428c2ecf20Sopenharmony_ci * does that for us while waiting for the given fd to be readable. 1438c2ecf20Sopenharmony_ci */ 1448c2ecf20Sopenharmony_ci if (wait) 1458c2ecf20Sopenharmony_ci time_travel_wait_readable(fd); 1468c2ecf20Sopenharmony_ci 1478c2ecf20Sopenharmony_ci rc = vhost_user_recv_header(fd, msg); 1488c2ecf20Sopenharmony_ci 1498c2ecf20Sopenharmony_ci if (rc == -ECONNRESET && vu_dev->registered) { 1508c2ecf20Sopenharmony_ci struct virtio_uml_platform_data *pdata; 1518c2ecf20Sopenharmony_ci 1528c2ecf20Sopenharmony_ci pdata = vu_dev->pdev->dev.platform_data; 1538c2ecf20Sopenharmony_ci 1548c2ecf20Sopenharmony_ci virtio_break_device(&vu_dev->vdev); 1558c2ecf20Sopenharmony_ci schedule_work(&pdata->conn_broken_wk); 1568c2ecf20Sopenharmony_ci } 1578c2ecf20Sopenharmony_ci if (rc) 1588c2ecf20Sopenharmony_ci return rc; 1598c2ecf20Sopenharmony_ci size = msg->header.size; 1608c2ecf20Sopenharmony_ci if (size > max_payload_size) 1618c2ecf20Sopenharmony_ci return -EPROTO; 1628c2ecf20Sopenharmony_ci return full_read(fd, &msg->payload, size, false); 1638c2ecf20Sopenharmony_ci} 1648c2ecf20Sopenharmony_ci 1658c2ecf20Sopenharmony_cistatic int vhost_user_recv_resp(struct virtio_uml_device *vu_dev, 1668c2ecf20Sopenharmony_ci struct vhost_user_msg *msg, 1678c2ecf20Sopenharmony_ci size_t max_payload_size) 1688c2ecf20Sopenharmony_ci{ 1698c2ecf20Sopenharmony_ci int rc = vhost_user_recv(vu_dev, vu_dev->sock, msg, 1708c2ecf20Sopenharmony_ci max_payload_size, true); 1718c2ecf20Sopenharmony_ci 1728c2ecf20Sopenharmony_ci if (rc) 1738c2ecf20Sopenharmony_ci return rc; 1748c2ecf20Sopenharmony_ci 1758c2ecf20Sopenharmony_ci if (msg->header.flags != (VHOST_USER_FLAG_REPLY | VHOST_USER_VERSION)) 1768c2ecf20Sopenharmony_ci return -EPROTO; 1778c2ecf20Sopenharmony_ci 1788c2ecf20Sopenharmony_ci return 0; 1798c2ecf20Sopenharmony_ci} 1808c2ecf20Sopenharmony_ci 1818c2ecf20Sopenharmony_cistatic int vhost_user_recv_u64(struct virtio_uml_device *vu_dev, 1828c2ecf20Sopenharmony_ci u64 *value) 1838c2ecf20Sopenharmony_ci{ 1848c2ecf20Sopenharmony_ci struct vhost_user_msg msg; 1858c2ecf20Sopenharmony_ci int rc = vhost_user_recv_resp(vu_dev, &msg, 1868c2ecf20Sopenharmony_ci sizeof(msg.payload.integer)); 1878c2ecf20Sopenharmony_ci 1888c2ecf20Sopenharmony_ci if (rc) 1898c2ecf20Sopenharmony_ci return rc; 1908c2ecf20Sopenharmony_ci if (msg.header.size != sizeof(msg.payload.integer)) 1918c2ecf20Sopenharmony_ci return -EPROTO; 1928c2ecf20Sopenharmony_ci *value = msg.payload.integer; 1938c2ecf20Sopenharmony_ci return 0; 1948c2ecf20Sopenharmony_ci} 1958c2ecf20Sopenharmony_ci 1968c2ecf20Sopenharmony_cistatic int vhost_user_recv_req(struct virtio_uml_device *vu_dev, 1978c2ecf20Sopenharmony_ci struct vhost_user_msg *msg, 1988c2ecf20Sopenharmony_ci size_t max_payload_size) 1998c2ecf20Sopenharmony_ci{ 2008c2ecf20Sopenharmony_ci int rc = vhost_user_recv(vu_dev, vu_dev->req_fd, msg, 2018c2ecf20Sopenharmony_ci max_payload_size, false); 2028c2ecf20Sopenharmony_ci 2038c2ecf20Sopenharmony_ci if (rc) 2048c2ecf20Sopenharmony_ci return rc; 2058c2ecf20Sopenharmony_ci 2068c2ecf20Sopenharmony_ci if ((msg->header.flags & ~VHOST_USER_FLAG_NEED_REPLY) != 2078c2ecf20Sopenharmony_ci VHOST_USER_VERSION) 2088c2ecf20Sopenharmony_ci return -EPROTO; 2098c2ecf20Sopenharmony_ci 2108c2ecf20Sopenharmony_ci return 0; 2118c2ecf20Sopenharmony_ci} 2128c2ecf20Sopenharmony_ci 2138c2ecf20Sopenharmony_cistatic int vhost_user_send(struct virtio_uml_device *vu_dev, 2148c2ecf20Sopenharmony_ci bool need_response, struct vhost_user_msg *msg, 2158c2ecf20Sopenharmony_ci int *fds, size_t num_fds) 2168c2ecf20Sopenharmony_ci{ 2178c2ecf20Sopenharmony_ci size_t size = sizeof(msg->header) + msg->header.size; 2188c2ecf20Sopenharmony_ci unsigned long flags; 2198c2ecf20Sopenharmony_ci bool request_ack; 2208c2ecf20Sopenharmony_ci int rc; 2218c2ecf20Sopenharmony_ci 2228c2ecf20Sopenharmony_ci msg->header.flags |= VHOST_USER_VERSION; 2238c2ecf20Sopenharmony_ci 2248c2ecf20Sopenharmony_ci /* 2258c2ecf20Sopenharmony_ci * The need_response flag indicates that we already need a response, 2268c2ecf20Sopenharmony_ci * e.g. to read the features. In these cases, don't request an ACK as 2278c2ecf20Sopenharmony_ci * it is meaningless. Also request an ACK only if supported. 2288c2ecf20Sopenharmony_ci */ 2298c2ecf20Sopenharmony_ci request_ack = !need_response; 2308c2ecf20Sopenharmony_ci if (!(vu_dev->protocol_features & 2318c2ecf20Sopenharmony_ci BIT_ULL(VHOST_USER_PROTOCOL_F_REPLY_ACK))) 2328c2ecf20Sopenharmony_ci request_ack = false; 2338c2ecf20Sopenharmony_ci 2348c2ecf20Sopenharmony_ci if (request_ack) 2358c2ecf20Sopenharmony_ci msg->header.flags |= VHOST_USER_FLAG_NEED_REPLY; 2368c2ecf20Sopenharmony_ci 2378c2ecf20Sopenharmony_ci spin_lock_irqsave(&vu_dev->sock_lock, flags); 2388c2ecf20Sopenharmony_ci rc = full_sendmsg_fds(vu_dev->sock, msg, size, fds, num_fds); 2398c2ecf20Sopenharmony_ci if (rc < 0) 2408c2ecf20Sopenharmony_ci goto out; 2418c2ecf20Sopenharmony_ci 2428c2ecf20Sopenharmony_ci if (request_ack) { 2438c2ecf20Sopenharmony_ci uint64_t status; 2448c2ecf20Sopenharmony_ci 2458c2ecf20Sopenharmony_ci rc = vhost_user_recv_u64(vu_dev, &status); 2468c2ecf20Sopenharmony_ci if (rc) 2478c2ecf20Sopenharmony_ci goto out; 2488c2ecf20Sopenharmony_ci 2498c2ecf20Sopenharmony_ci if (status) { 2508c2ecf20Sopenharmony_ci vu_err(vu_dev, "slave reports error: %llu\n", status); 2518c2ecf20Sopenharmony_ci rc = -EIO; 2528c2ecf20Sopenharmony_ci goto out; 2538c2ecf20Sopenharmony_ci } 2548c2ecf20Sopenharmony_ci } 2558c2ecf20Sopenharmony_ci 2568c2ecf20Sopenharmony_ciout: 2578c2ecf20Sopenharmony_ci spin_unlock_irqrestore(&vu_dev->sock_lock, flags); 2588c2ecf20Sopenharmony_ci return rc; 2598c2ecf20Sopenharmony_ci} 2608c2ecf20Sopenharmony_ci 2618c2ecf20Sopenharmony_cistatic int vhost_user_send_no_payload(struct virtio_uml_device *vu_dev, 2628c2ecf20Sopenharmony_ci bool need_response, u32 request) 2638c2ecf20Sopenharmony_ci{ 2648c2ecf20Sopenharmony_ci struct vhost_user_msg msg = { 2658c2ecf20Sopenharmony_ci .header.request = request, 2668c2ecf20Sopenharmony_ci }; 2678c2ecf20Sopenharmony_ci 2688c2ecf20Sopenharmony_ci return vhost_user_send(vu_dev, need_response, &msg, NULL, 0); 2698c2ecf20Sopenharmony_ci} 2708c2ecf20Sopenharmony_ci 2718c2ecf20Sopenharmony_cistatic int vhost_user_send_no_payload_fd(struct virtio_uml_device *vu_dev, 2728c2ecf20Sopenharmony_ci u32 request, int fd) 2738c2ecf20Sopenharmony_ci{ 2748c2ecf20Sopenharmony_ci struct vhost_user_msg msg = { 2758c2ecf20Sopenharmony_ci .header.request = request, 2768c2ecf20Sopenharmony_ci }; 2778c2ecf20Sopenharmony_ci 2788c2ecf20Sopenharmony_ci return vhost_user_send(vu_dev, false, &msg, &fd, 1); 2798c2ecf20Sopenharmony_ci} 2808c2ecf20Sopenharmony_ci 2818c2ecf20Sopenharmony_cistatic int vhost_user_send_u64(struct virtio_uml_device *vu_dev, 2828c2ecf20Sopenharmony_ci u32 request, u64 value) 2838c2ecf20Sopenharmony_ci{ 2848c2ecf20Sopenharmony_ci struct vhost_user_msg msg = { 2858c2ecf20Sopenharmony_ci .header.request = request, 2868c2ecf20Sopenharmony_ci .header.size = sizeof(msg.payload.integer), 2878c2ecf20Sopenharmony_ci .payload.integer = value, 2888c2ecf20Sopenharmony_ci }; 2898c2ecf20Sopenharmony_ci 2908c2ecf20Sopenharmony_ci return vhost_user_send(vu_dev, false, &msg, NULL, 0); 2918c2ecf20Sopenharmony_ci} 2928c2ecf20Sopenharmony_ci 2938c2ecf20Sopenharmony_cistatic int vhost_user_set_owner(struct virtio_uml_device *vu_dev) 2948c2ecf20Sopenharmony_ci{ 2958c2ecf20Sopenharmony_ci return vhost_user_send_no_payload(vu_dev, false, VHOST_USER_SET_OWNER); 2968c2ecf20Sopenharmony_ci} 2978c2ecf20Sopenharmony_ci 2988c2ecf20Sopenharmony_cistatic int vhost_user_get_features(struct virtio_uml_device *vu_dev, 2998c2ecf20Sopenharmony_ci u64 *features) 3008c2ecf20Sopenharmony_ci{ 3018c2ecf20Sopenharmony_ci int rc = vhost_user_send_no_payload(vu_dev, true, 3028c2ecf20Sopenharmony_ci VHOST_USER_GET_FEATURES); 3038c2ecf20Sopenharmony_ci 3048c2ecf20Sopenharmony_ci if (rc) 3058c2ecf20Sopenharmony_ci return rc; 3068c2ecf20Sopenharmony_ci return vhost_user_recv_u64(vu_dev, features); 3078c2ecf20Sopenharmony_ci} 3088c2ecf20Sopenharmony_ci 3098c2ecf20Sopenharmony_cistatic int vhost_user_set_features(struct virtio_uml_device *vu_dev, 3108c2ecf20Sopenharmony_ci u64 features) 3118c2ecf20Sopenharmony_ci{ 3128c2ecf20Sopenharmony_ci return vhost_user_send_u64(vu_dev, VHOST_USER_SET_FEATURES, features); 3138c2ecf20Sopenharmony_ci} 3148c2ecf20Sopenharmony_ci 3158c2ecf20Sopenharmony_cistatic int vhost_user_get_protocol_features(struct virtio_uml_device *vu_dev, 3168c2ecf20Sopenharmony_ci u64 *protocol_features) 3178c2ecf20Sopenharmony_ci{ 3188c2ecf20Sopenharmony_ci int rc = vhost_user_send_no_payload(vu_dev, true, 3198c2ecf20Sopenharmony_ci VHOST_USER_GET_PROTOCOL_FEATURES); 3208c2ecf20Sopenharmony_ci 3218c2ecf20Sopenharmony_ci if (rc) 3228c2ecf20Sopenharmony_ci return rc; 3238c2ecf20Sopenharmony_ci return vhost_user_recv_u64(vu_dev, protocol_features); 3248c2ecf20Sopenharmony_ci} 3258c2ecf20Sopenharmony_ci 3268c2ecf20Sopenharmony_cistatic int vhost_user_set_protocol_features(struct virtio_uml_device *vu_dev, 3278c2ecf20Sopenharmony_ci u64 protocol_features) 3288c2ecf20Sopenharmony_ci{ 3298c2ecf20Sopenharmony_ci return vhost_user_send_u64(vu_dev, VHOST_USER_SET_PROTOCOL_FEATURES, 3308c2ecf20Sopenharmony_ci protocol_features); 3318c2ecf20Sopenharmony_ci} 3328c2ecf20Sopenharmony_ci 3338c2ecf20Sopenharmony_cistatic void vhost_user_reply(struct virtio_uml_device *vu_dev, 3348c2ecf20Sopenharmony_ci struct vhost_user_msg *msg, int response) 3358c2ecf20Sopenharmony_ci{ 3368c2ecf20Sopenharmony_ci struct vhost_user_msg reply = { 3378c2ecf20Sopenharmony_ci .payload.integer = response, 3388c2ecf20Sopenharmony_ci }; 3398c2ecf20Sopenharmony_ci size_t size = sizeof(reply.header) + sizeof(reply.payload.integer); 3408c2ecf20Sopenharmony_ci int rc; 3418c2ecf20Sopenharmony_ci 3428c2ecf20Sopenharmony_ci reply.header = msg->header; 3438c2ecf20Sopenharmony_ci reply.header.flags &= ~VHOST_USER_FLAG_NEED_REPLY; 3448c2ecf20Sopenharmony_ci reply.header.flags |= VHOST_USER_FLAG_REPLY; 3458c2ecf20Sopenharmony_ci reply.header.size = sizeof(reply.payload.integer); 3468c2ecf20Sopenharmony_ci 3478c2ecf20Sopenharmony_ci rc = full_sendmsg_fds(vu_dev->req_fd, &reply, size, NULL, 0); 3488c2ecf20Sopenharmony_ci 3498c2ecf20Sopenharmony_ci if (rc) 3508c2ecf20Sopenharmony_ci vu_err(vu_dev, 3518c2ecf20Sopenharmony_ci "sending reply to slave request failed: %d (size %zu)\n", 3528c2ecf20Sopenharmony_ci rc, size); 3538c2ecf20Sopenharmony_ci} 3548c2ecf20Sopenharmony_ci 3558c2ecf20Sopenharmony_cistatic irqreturn_t vu_req_interrupt(int irq, void *data) 3568c2ecf20Sopenharmony_ci{ 3578c2ecf20Sopenharmony_ci struct virtio_uml_device *vu_dev = data; 3588c2ecf20Sopenharmony_ci struct virtqueue *vq; 3598c2ecf20Sopenharmony_ci int response = 1; 3608c2ecf20Sopenharmony_ci struct { 3618c2ecf20Sopenharmony_ci struct vhost_user_msg msg; 3628c2ecf20Sopenharmony_ci u8 extra_payload[512]; 3638c2ecf20Sopenharmony_ci } msg; 3648c2ecf20Sopenharmony_ci int rc; 3658c2ecf20Sopenharmony_ci 3668c2ecf20Sopenharmony_ci rc = vhost_user_recv_req(vu_dev, &msg.msg, 3678c2ecf20Sopenharmony_ci sizeof(msg.msg.payload) + 3688c2ecf20Sopenharmony_ci sizeof(msg.extra_payload)); 3698c2ecf20Sopenharmony_ci 3708c2ecf20Sopenharmony_ci if (rc) 3718c2ecf20Sopenharmony_ci return IRQ_NONE; 3728c2ecf20Sopenharmony_ci 3738c2ecf20Sopenharmony_ci switch (msg.msg.header.request) { 3748c2ecf20Sopenharmony_ci case VHOST_USER_SLAVE_CONFIG_CHANGE_MSG: 3758c2ecf20Sopenharmony_ci virtio_config_changed(&vu_dev->vdev); 3768c2ecf20Sopenharmony_ci response = 0; 3778c2ecf20Sopenharmony_ci break; 3788c2ecf20Sopenharmony_ci case VHOST_USER_SLAVE_VRING_CALL: 3798c2ecf20Sopenharmony_ci virtio_device_for_each_vq((&vu_dev->vdev), vq) { 3808c2ecf20Sopenharmony_ci if (vq->index == msg.msg.payload.vring_state.index) { 3818c2ecf20Sopenharmony_ci response = 0; 3828c2ecf20Sopenharmony_ci vring_interrupt(0 /* ignored */, vq); 3838c2ecf20Sopenharmony_ci break; 3848c2ecf20Sopenharmony_ci } 3858c2ecf20Sopenharmony_ci } 3868c2ecf20Sopenharmony_ci break; 3878c2ecf20Sopenharmony_ci case VHOST_USER_SLAVE_IOTLB_MSG: 3888c2ecf20Sopenharmony_ci /* not supported - VIRTIO_F_ACCESS_PLATFORM */ 3898c2ecf20Sopenharmony_ci case VHOST_USER_SLAVE_VRING_HOST_NOTIFIER_MSG: 3908c2ecf20Sopenharmony_ci /* not supported - VHOST_USER_PROTOCOL_F_HOST_NOTIFIER */ 3918c2ecf20Sopenharmony_ci default: 3928c2ecf20Sopenharmony_ci vu_err(vu_dev, "unexpected slave request %d\n", 3938c2ecf20Sopenharmony_ci msg.msg.header.request); 3948c2ecf20Sopenharmony_ci } 3958c2ecf20Sopenharmony_ci 3968c2ecf20Sopenharmony_ci if (msg.msg.header.flags & VHOST_USER_FLAG_NEED_REPLY) 3978c2ecf20Sopenharmony_ci vhost_user_reply(vu_dev, &msg.msg, response); 3988c2ecf20Sopenharmony_ci 3998c2ecf20Sopenharmony_ci return IRQ_HANDLED; 4008c2ecf20Sopenharmony_ci} 4018c2ecf20Sopenharmony_ci 4028c2ecf20Sopenharmony_cistatic int vhost_user_init_slave_req(struct virtio_uml_device *vu_dev) 4038c2ecf20Sopenharmony_ci{ 4048c2ecf20Sopenharmony_ci int rc, req_fds[2]; 4058c2ecf20Sopenharmony_ci 4068c2ecf20Sopenharmony_ci /* Use a pipe for slave req fd, SIGIO is not supported for eventfd */ 4078c2ecf20Sopenharmony_ci rc = os_pipe(req_fds, true, true); 4088c2ecf20Sopenharmony_ci if (rc < 0) 4098c2ecf20Sopenharmony_ci return rc; 4108c2ecf20Sopenharmony_ci vu_dev->req_fd = req_fds[0]; 4118c2ecf20Sopenharmony_ci 4128c2ecf20Sopenharmony_ci rc = um_request_irq(VIRTIO_IRQ, vu_dev->req_fd, IRQ_READ, 4138c2ecf20Sopenharmony_ci vu_req_interrupt, IRQF_SHARED, 4148c2ecf20Sopenharmony_ci vu_dev->pdev->name, vu_dev); 4158c2ecf20Sopenharmony_ci if (rc) 4168c2ecf20Sopenharmony_ci goto err_close; 4178c2ecf20Sopenharmony_ci 4188c2ecf20Sopenharmony_ci rc = vhost_user_send_no_payload_fd(vu_dev, VHOST_USER_SET_SLAVE_REQ_FD, 4198c2ecf20Sopenharmony_ci req_fds[1]); 4208c2ecf20Sopenharmony_ci if (rc) 4218c2ecf20Sopenharmony_ci goto err_free_irq; 4228c2ecf20Sopenharmony_ci 4238c2ecf20Sopenharmony_ci goto out; 4248c2ecf20Sopenharmony_ci 4258c2ecf20Sopenharmony_cierr_free_irq: 4268c2ecf20Sopenharmony_ci um_free_irq(VIRTIO_IRQ, vu_dev); 4278c2ecf20Sopenharmony_cierr_close: 4288c2ecf20Sopenharmony_ci os_close_file(req_fds[0]); 4298c2ecf20Sopenharmony_ciout: 4308c2ecf20Sopenharmony_ci /* Close unused write end of request fds */ 4318c2ecf20Sopenharmony_ci os_close_file(req_fds[1]); 4328c2ecf20Sopenharmony_ci return rc; 4338c2ecf20Sopenharmony_ci} 4348c2ecf20Sopenharmony_ci 4358c2ecf20Sopenharmony_cistatic int vhost_user_init(struct virtio_uml_device *vu_dev) 4368c2ecf20Sopenharmony_ci{ 4378c2ecf20Sopenharmony_ci int rc = vhost_user_set_owner(vu_dev); 4388c2ecf20Sopenharmony_ci 4398c2ecf20Sopenharmony_ci if (rc) 4408c2ecf20Sopenharmony_ci return rc; 4418c2ecf20Sopenharmony_ci rc = vhost_user_get_features(vu_dev, &vu_dev->features); 4428c2ecf20Sopenharmony_ci if (rc) 4438c2ecf20Sopenharmony_ci return rc; 4448c2ecf20Sopenharmony_ci 4458c2ecf20Sopenharmony_ci if (vu_dev->features & BIT_ULL(VHOST_USER_F_PROTOCOL_FEATURES)) { 4468c2ecf20Sopenharmony_ci rc = vhost_user_get_protocol_features(vu_dev, 4478c2ecf20Sopenharmony_ci &vu_dev->protocol_features); 4488c2ecf20Sopenharmony_ci if (rc) 4498c2ecf20Sopenharmony_ci return rc; 4508c2ecf20Sopenharmony_ci vu_dev->protocol_features &= VHOST_USER_SUPPORTED_PROTOCOL_F; 4518c2ecf20Sopenharmony_ci rc = vhost_user_set_protocol_features(vu_dev, 4528c2ecf20Sopenharmony_ci vu_dev->protocol_features); 4538c2ecf20Sopenharmony_ci if (rc) 4548c2ecf20Sopenharmony_ci return rc; 4558c2ecf20Sopenharmony_ci } 4568c2ecf20Sopenharmony_ci 4578c2ecf20Sopenharmony_ci if (vu_dev->protocol_features & 4588c2ecf20Sopenharmony_ci BIT_ULL(VHOST_USER_PROTOCOL_F_SLAVE_REQ)) { 4598c2ecf20Sopenharmony_ci rc = vhost_user_init_slave_req(vu_dev); 4608c2ecf20Sopenharmony_ci if (rc) 4618c2ecf20Sopenharmony_ci return rc; 4628c2ecf20Sopenharmony_ci } 4638c2ecf20Sopenharmony_ci 4648c2ecf20Sopenharmony_ci return 0; 4658c2ecf20Sopenharmony_ci} 4668c2ecf20Sopenharmony_ci 4678c2ecf20Sopenharmony_cistatic void vhost_user_get_config(struct virtio_uml_device *vu_dev, 4688c2ecf20Sopenharmony_ci u32 offset, void *buf, u32 len) 4698c2ecf20Sopenharmony_ci{ 4708c2ecf20Sopenharmony_ci u32 cfg_size = offset + len; 4718c2ecf20Sopenharmony_ci struct vhost_user_msg *msg; 4728c2ecf20Sopenharmony_ci size_t payload_size = sizeof(msg->payload.config) + cfg_size; 4738c2ecf20Sopenharmony_ci size_t msg_size = sizeof(msg->header) + payload_size; 4748c2ecf20Sopenharmony_ci int rc; 4758c2ecf20Sopenharmony_ci 4768c2ecf20Sopenharmony_ci if (!(vu_dev->protocol_features & 4778c2ecf20Sopenharmony_ci BIT_ULL(VHOST_USER_PROTOCOL_F_CONFIG))) 4788c2ecf20Sopenharmony_ci return; 4798c2ecf20Sopenharmony_ci 4808c2ecf20Sopenharmony_ci msg = kzalloc(msg_size, GFP_KERNEL); 4818c2ecf20Sopenharmony_ci if (!msg) 4828c2ecf20Sopenharmony_ci return; 4838c2ecf20Sopenharmony_ci msg->header.request = VHOST_USER_GET_CONFIG; 4848c2ecf20Sopenharmony_ci msg->header.size = payload_size; 4858c2ecf20Sopenharmony_ci msg->payload.config.offset = 0; 4868c2ecf20Sopenharmony_ci msg->payload.config.size = cfg_size; 4878c2ecf20Sopenharmony_ci 4888c2ecf20Sopenharmony_ci rc = vhost_user_send(vu_dev, true, msg, NULL, 0); 4898c2ecf20Sopenharmony_ci if (rc) { 4908c2ecf20Sopenharmony_ci vu_err(vu_dev, "sending VHOST_USER_GET_CONFIG failed: %d\n", 4918c2ecf20Sopenharmony_ci rc); 4928c2ecf20Sopenharmony_ci goto free; 4938c2ecf20Sopenharmony_ci } 4948c2ecf20Sopenharmony_ci 4958c2ecf20Sopenharmony_ci rc = vhost_user_recv_resp(vu_dev, msg, msg_size); 4968c2ecf20Sopenharmony_ci if (rc) { 4978c2ecf20Sopenharmony_ci vu_err(vu_dev, 4988c2ecf20Sopenharmony_ci "receiving VHOST_USER_GET_CONFIG response failed: %d\n", 4998c2ecf20Sopenharmony_ci rc); 5008c2ecf20Sopenharmony_ci goto free; 5018c2ecf20Sopenharmony_ci } 5028c2ecf20Sopenharmony_ci 5038c2ecf20Sopenharmony_ci if (msg->header.size != payload_size || 5048c2ecf20Sopenharmony_ci msg->payload.config.size != cfg_size) { 5058c2ecf20Sopenharmony_ci rc = -EPROTO; 5068c2ecf20Sopenharmony_ci vu_err(vu_dev, 5078c2ecf20Sopenharmony_ci "Invalid VHOST_USER_GET_CONFIG sizes (payload %d expected %zu, config %u expected %u)\n", 5088c2ecf20Sopenharmony_ci msg->header.size, payload_size, 5098c2ecf20Sopenharmony_ci msg->payload.config.size, cfg_size); 5108c2ecf20Sopenharmony_ci goto free; 5118c2ecf20Sopenharmony_ci } 5128c2ecf20Sopenharmony_ci memcpy(buf, msg->payload.config.payload + offset, len); 5138c2ecf20Sopenharmony_ci 5148c2ecf20Sopenharmony_cifree: 5158c2ecf20Sopenharmony_ci kfree(msg); 5168c2ecf20Sopenharmony_ci} 5178c2ecf20Sopenharmony_ci 5188c2ecf20Sopenharmony_cistatic void vhost_user_set_config(struct virtio_uml_device *vu_dev, 5198c2ecf20Sopenharmony_ci u32 offset, const void *buf, u32 len) 5208c2ecf20Sopenharmony_ci{ 5218c2ecf20Sopenharmony_ci struct vhost_user_msg *msg; 5228c2ecf20Sopenharmony_ci size_t payload_size = sizeof(msg->payload.config) + len; 5238c2ecf20Sopenharmony_ci size_t msg_size = sizeof(msg->header) + payload_size; 5248c2ecf20Sopenharmony_ci int rc; 5258c2ecf20Sopenharmony_ci 5268c2ecf20Sopenharmony_ci if (!(vu_dev->protocol_features & 5278c2ecf20Sopenharmony_ci BIT_ULL(VHOST_USER_PROTOCOL_F_CONFIG))) 5288c2ecf20Sopenharmony_ci return; 5298c2ecf20Sopenharmony_ci 5308c2ecf20Sopenharmony_ci msg = kzalloc(msg_size, GFP_KERNEL); 5318c2ecf20Sopenharmony_ci if (!msg) 5328c2ecf20Sopenharmony_ci return; 5338c2ecf20Sopenharmony_ci msg->header.request = VHOST_USER_SET_CONFIG; 5348c2ecf20Sopenharmony_ci msg->header.size = payload_size; 5358c2ecf20Sopenharmony_ci msg->payload.config.offset = offset; 5368c2ecf20Sopenharmony_ci msg->payload.config.size = len; 5378c2ecf20Sopenharmony_ci memcpy(msg->payload.config.payload, buf, len); 5388c2ecf20Sopenharmony_ci 5398c2ecf20Sopenharmony_ci rc = vhost_user_send(vu_dev, false, msg, NULL, 0); 5408c2ecf20Sopenharmony_ci if (rc) 5418c2ecf20Sopenharmony_ci vu_err(vu_dev, "sending VHOST_USER_SET_CONFIG failed: %d\n", 5428c2ecf20Sopenharmony_ci rc); 5438c2ecf20Sopenharmony_ci 5448c2ecf20Sopenharmony_ci kfree(msg); 5458c2ecf20Sopenharmony_ci} 5468c2ecf20Sopenharmony_ci 5478c2ecf20Sopenharmony_cistatic int vhost_user_init_mem_region(u64 addr, u64 size, int *fd_out, 5488c2ecf20Sopenharmony_ci struct vhost_user_mem_region *region_out) 5498c2ecf20Sopenharmony_ci{ 5508c2ecf20Sopenharmony_ci unsigned long long mem_offset; 5518c2ecf20Sopenharmony_ci int rc = phys_mapping(addr, &mem_offset); 5528c2ecf20Sopenharmony_ci 5538c2ecf20Sopenharmony_ci if (WARN(rc < 0, "phys_mapping of 0x%llx returned %d\n", addr, rc)) 5548c2ecf20Sopenharmony_ci return -EFAULT; 5558c2ecf20Sopenharmony_ci *fd_out = rc; 5568c2ecf20Sopenharmony_ci region_out->guest_addr = addr; 5578c2ecf20Sopenharmony_ci region_out->user_addr = addr; 5588c2ecf20Sopenharmony_ci region_out->size = size; 5598c2ecf20Sopenharmony_ci region_out->mmap_offset = mem_offset; 5608c2ecf20Sopenharmony_ci 5618c2ecf20Sopenharmony_ci /* Ensure mapping is valid for the entire region */ 5628c2ecf20Sopenharmony_ci rc = phys_mapping(addr + size - 1, &mem_offset); 5638c2ecf20Sopenharmony_ci if (WARN(rc != *fd_out, "phys_mapping of 0x%llx failed: %d != %d\n", 5648c2ecf20Sopenharmony_ci addr + size - 1, rc, *fd_out)) 5658c2ecf20Sopenharmony_ci return -EFAULT; 5668c2ecf20Sopenharmony_ci return 0; 5678c2ecf20Sopenharmony_ci} 5688c2ecf20Sopenharmony_ci 5698c2ecf20Sopenharmony_cistatic int vhost_user_set_mem_table(struct virtio_uml_device *vu_dev) 5708c2ecf20Sopenharmony_ci{ 5718c2ecf20Sopenharmony_ci struct vhost_user_msg msg = { 5728c2ecf20Sopenharmony_ci .header.request = VHOST_USER_SET_MEM_TABLE, 5738c2ecf20Sopenharmony_ci .header.size = sizeof(msg.payload.mem_regions), 5748c2ecf20Sopenharmony_ci .payload.mem_regions.num = 1, 5758c2ecf20Sopenharmony_ci }; 5768c2ecf20Sopenharmony_ci unsigned long reserved = uml_reserved - uml_physmem; 5778c2ecf20Sopenharmony_ci int fds[2]; 5788c2ecf20Sopenharmony_ci int rc; 5798c2ecf20Sopenharmony_ci 5808c2ecf20Sopenharmony_ci /* 5818c2ecf20Sopenharmony_ci * This is a bit tricky, see also the comment with setup_physmem(). 5828c2ecf20Sopenharmony_ci * 5838c2ecf20Sopenharmony_ci * Essentially, setup_physmem() uses a file to mmap() our physmem, 5848c2ecf20Sopenharmony_ci * but the code and data we *already* have is omitted. To us, this 5858c2ecf20Sopenharmony_ci * is no difference, since they both become part of our address 5868c2ecf20Sopenharmony_ci * space and memory consumption. To somebody looking in from the 5878c2ecf20Sopenharmony_ci * outside, however, it is different because the part of our memory 5888c2ecf20Sopenharmony_ci * consumption that's already part of the binary (code/data) is not 5898c2ecf20Sopenharmony_ci * mapped from the file, so it's not visible to another mmap from 5908c2ecf20Sopenharmony_ci * the file descriptor. 5918c2ecf20Sopenharmony_ci * 5928c2ecf20Sopenharmony_ci * Thus, don't advertise this space to the vhost-user slave. This 5938c2ecf20Sopenharmony_ci * means that the slave will likely abort or similar when we give 5948c2ecf20Sopenharmony_ci * it an address from the hidden range, since it's not marked as 5958c2ecf20Sopenharmony_ci * a valid address, but at least that way we detect the issue and 5968c2ecf20Sopenharmony_ci * don't just have the slave read an all-zeroes buffer from the 5978c2ecf20Sopenharmony_ci * shared memory file, or write something there that we can never 5988c2ecf20Sopenharmony_ci * see (depending on the direction of the virtqueue traffic.) 5998c2ecf20Sopenharmony_ci * 6008c2ecf20Sopenharmony_ci * Since we usually don't want to use .text for virtio buffers, 6018c2ecf20Sopenharmony_ci * this effectively means that you cannot use 6028c2ecf20Sopenharmony_ci * 1) global variables, which are in the .bss and not in the shm 6038c2ecf20Sopenharmony_ci * file-backed memory 6048c2ecf20Sopenharmony_ci * 2) the stack in some processes, depending on where they have 6058c2ecf20Sopenharmony_ci * their stack (or maybe only no interrupt stack?) 6068c2ecf20Sopenharmony_ci * 6078c2ecf20Sopenharmony_ci * The stack is already not typically valid for DMA, so this isn't 6088c2ecf20Sopenharmony_ci * much of a restriction, but global variables might be encountered. 6098c2ecf20Sopenharmony_ci * 6108c2ecf20Sopenharmony_ci * It might be possible to fix it by copying around the data that's 6118c2ecf20Sopenharmony_ci * between bss_start and where we map the file now, but it's not 6128c2ecf20Sopenharmony_ci * something that you typically encounter with virtio drivers, so 6138c2ecf20Sopenharmony_ci * it didn't seem worthwhile. 6148c2ecf20Sopenharmony_ci */ 6158c2ecf20Sopenharmony_ci rc = vhost_user_init_mem_region(reserved, physmem_size - reserved, 6168c2ecf20Sopenharmony_ci &fds[0], 6178c2ecf20Sopenharmony_ci &msg.payload.mem_regions.regions[0]); 6188c2ecf20Sopenharmony_ci 6198c2ecf20Sopenharmony_ci if (rc < 0) 6208c2ecf20Sopenharmony_ci return rc; 6218c2ecf20Sopenharmony_ci if (highmem) { 6228c2ecf20Sopenharmony_ci msg.payload.mem_regions.num++; 6238c2ecf20Sopenharmony_ci rc = vhost_user_init_mem_region(__pa(end_iomem), highmem, 6248c2ecf20Sopenharmony_ci &fds[1], &msg.payload.mem_regions.regions[1]); 6258c2ecf20Sopenharmony_ci if (rc < 0) 6268c2ecf20Sopenharmony_ci return rc; 6278c2ecf20Sopenharmony_ci } 6288c2ecf20Sopenharmony_ci 6298c2ecf20Sopenharmony_ci return vhost_user_send(vu_dev, false, &msg, fds, 6308c2ecf20Sopenharmony_ci msg.payload.mem_regions.num); 6318c2ecf20Sopenharmony_ci} 6328c2ecf20Sopenharmony_ci 6338c2ecf20Sopenharmony_cistatic int vhost_user_set_vring_state(struct virtio_uml_device *vu_dev, 6348c2ecf20Sopenharmony_ci u32 request, u32 index, u32 num) 6358c2ecf20Sopenharmony_ci{ 6368c2ecf20Sopenharmony_ci struct vhost_user_msg msg = { 6378c2ecf20Sopenharmony_ci .header.request = request, 6388c2ecf20Sopenharmony_ci .header.size = sizeof(msg.payload.vring_state), 6398c2ecf20Sopenharmony_ci .payload.vring_state.index = index, 6408c2ecf20Sopenharmony_ci .payload.vring_state.num = num, 6418c2ecf20Sopenharmony_ci }; 6428c2ecf20Sopenharmony_ci 6438c2ecf20Sopenharmony_ci return vhost_user_send(vu_dev, false, &msg, NULL, 0); 6448c2ecf20Sopenharmony_ci} 6458c2ecf20Sopenharmony_ci 6468c2ecf20Sopenharmony_cistatic int vhost_user_set_vring_num(struct virtio_uml_device *vu_dev, 6478c2ecf20Sopenharmony_ci u32 index, u32 num) 6488c2ecf20Sopenharmony_ci{ 6498c2ecf20Sopenharmony_ci return vhost_user_set_vring_state(vu_dev, VHOST_USER_SET_VRING_NUM, 6508c2ecf20Sopenharmony_ci index, num); 6518c2ecf20Sopenharmony_ci} 6528c2ecf20Sopenharmony_ci 6538c2ecf20Sopenharmony_cistatic int vhost_user_set_vring_base(struct virtio_uml_device *vu_dev, 6548c2ecf20Sopenharmony_ci u32 index, u32 offset) 6558c2ecf20Sopenharmony_ci{ 6568c2ecf20Sopenharmony_ci return vhost_user_set_vring_state(vu_dev, VHOST_USER_SET_VRING_BASE, 6578c2ecf20Sopenharmony_ci index, offset); 6588c2ecf20Sopenharmony_ci} 6598c2ecf20Sopenharmony_ci 6608c2ecf20Sopenharmony_cistatic int vhost_user_set_vring_addr(struct virtio_uml_device *vu_dev, 6618c2ecf20Sopenharmony_ci u32 index, u64 desc, u64 used, u64 avail, 6628c2ecf20Sopenharmony_ci u64 log) 6638c2ecf20Sopenharmony_ci{ 6648c2ecf20Sopenharmony_ci struct vhost_user_msg msg = { 6658c2ecf20Sopenharmony_ci .header.request = VHOST_USER_SET_VRING_ADDR, 6668c2ecf20Sopenharmony_ci .header.size = sizeof(msg.payload.vring_addr), 6678c2ecf20Sopenharmony_ci .payload.vring_addr.index = index, 6688c2ecf20Sopenharmony_ci .payload.vring_addr.desc = desc, 6698c2ecf20Sopenharmony_ci .payload.vring_addr.used = used, 6708c2ecf20Sopenharmony_ci .payload.vring_addr.avail = avail, 6718c2ecf20Sopenharmony_ci .payload.vring_addr.log = log, 6728c2ecf20Sopenharmony_ci }; 6738c2ecf20Sopenharmony_ci 6748c2ecf20Sopenharmony_ci return vhost_user_send(vu_dev, false, &msg, NULL, 0); 6758c2ecf20Sopenharmony_ci} 6768c2ecf20Sopenharmony_ci 6778c2ecf20Sopenharmony_cistatic int vhost_user_set_vring_fd(struct virtio_uml_device *vu_dev, 6788c2ecf20Sopenharmony_ci u32 request, int index, int fd) 6798c2ecf20Sopenharmony_ci{ 6808c2ecf20Sopenharmony_ci struct vhost_user_msg msg = { 6818c2ecf20Sopenharmony_ci .header.request = request, 6828c2ecf20Sopenharmony_ci .header.size = sizeof(msg.payload.integer), 6838c2ecf20Sopenharmony_ci .payload.integer = index, 6848c2ecf20Sopenharmony_ci }; 6858c2ecf20Sopenharmony_ci 6868c2ecf20Sopenharmony_ci if (index & ~VHOST_USER_VRING_INDEX_MASK) 6878c2ecf20Sopenharmony_ci return -EINVAL; 6888c2ecf20Sopenharmony_ci if (fd < 0) { 6898c2ecf20Sopenharmony_ci msg.payload.integer |= VHOST_USER_VRING_POLL_MASK; 6908c2ecf20Sopenharmony_ci return vhost_user_send(vu_dev, false, &msg, NULL, 0); 6918c2ecf20Sopenharmony_ci } 6928c2ecf20Sopenharmony_ci return vhost_user_send(vu_dev, false, &msg, &fd, 1); 6938c2ecf20Sopenharmony_ci} 6948c2ecf20Sopenharmony_ci 6958c2ecf20Sopenharmony_cistatic int vhost_user_set_vring_call(struct virtio_uml_device *vu_dev, 6968c2ecf20Sopenharmony_ci int index, int fd) 6978c2ecf20Sopenharmony_ci{ 6988c2ecf20Sopenharmony_ci return vhost_user_set_vring_fd(vu_dev, VHOST_USER_SET_VRING_CALL, 6998c2ecf20Sopenharmony_ci index, fd); 7008c2ecf20Sopenharmony_ci} 7018c2ecf20Sopenharmony_ci 7028c2ecf20Sopenharmony_cistatic int vhost_user_set_vring_kick(struct virtio_uml_device *vu_dev, 7038c2ecf20Sopenharmony_ci int index, int fd) 7048c2ecf20Sopenharmony_ci{ 7058c2ecf20Sopenharmony_ci return vhost_user_set_vring_fd(vu_dev, VHOST_USER_SET_VRING_KICK, 7068c2ecf20Sopenharmony_ci index, fd); 7078c2ecf20Sopenharmony_ci} 7088c2ecf20Sopenharmony_ci 7098c2ecf20Sopenharmony_cistatic int vhost_user_set_vring_enable(struct virtio_uml_device *vu_dev, 7108c2ecf20Sopenharmony_ci u32 index, bool enable) 7118c2ecf20Sopenharmony_ci{ 7128c2ecf20Sopenharmony_ci if (!(vu_dev->features & BIT_ULL(VHOST_USER_F_PROTOCOL_FEATURES))) 7138c2ecf20Sopenharmony_ci return 0; 7148c2ecf20Sopenharmony_ci 7158c2ecf20Sopenharmony_ci return vhost_user_set_vring_state(vu_dev, VHOST_USER_SET_VRING_ENABLE, 7168c2ecf20Sopenharmony_ci index, enable); 7178c2ecf20Sopenharmony_ci} 7188c2ecf20Sopenharmony_ci 7198c2ecf20Sopenharmony_ci 7208c2ecf20Sopenharmony_ci/* Virtio interface */ 7218c2ecf20Sopenharmony_ci 7228c2ecf20Sopenharmony_cistatic bool vu_notify(struct virtqueue *vq) 7238c2ecf20Sopenharmony_ci{ 7248c2ecf20Sopenharmony_ci struct virtio_uml_vq_info *info = vq->priv; 7258c2ecf20Sopenharmony_ci const uint64_t n = 1; 7268c2ecf20Sopenharmony_ci int rc; 7278c2ecf20Sopenharmony_ci 7288c2ecf20Sopenharmony_ci time_travel_propagate_time(); 7298c2ecf20Sopenharmony_ci 7308c2ecf20Sopenharmony_ci if (info->kick_fd < 0) { 7318c2ecf20Sopenharmony_ci struct virtio_uml_device *vu_dev; 7328c2ecf20Sopenharmony_ci 7338c2ecf20Sopenharmony_ci vu_dev = to_virtio_uml_device(vq->vdev); 7348c2ecf20Sopenharmony_ci 7358c2ecf20Sopenharmony_ci return vhost_user_set_vring_state(vu_dev, VHOST_USER_VRING_KICK, 7368c2ecf20Sopenharmony_ci vq->index, 0) == 0; 7378c2ecf20Sopenharmony_ci } 7388c2ecf20Sopenharmony_ci 7398c2ecf20Sopenharmony_ci do { 7408c2ecf20Sopenharmony_ci rc = os_write_file(info->kick_fd, &n, sizeof(n)); 7418c2ecf20Sopenharmony_ci } while (rc == -EINTR); 7428c2ecf20Sopenharmony_ci return !WARN(rc != sizeof(n), "write returned %d\n", rc); 7438c2ecf20Sopenharmony_ci} 7448c2ecf20Sopenharmony_ci 7458c2ecf20Sopenharmony_cistatic irqreturn_t vu_interrupt(int irq, void *opaque) 7468c2ecf20Sopenharmony_ci{ 7478c2ecf20Sopenharmony_ci struct virtqueue *vq = opaque; 7488c2ecf20Sopenharmony_ci struct virtio_uml_vq_info *info = vq->priv; 7498c2ecf20Sopenharmony_ci uint64_t n; 7508c2ecf20Sopenharmony_ci int rc; 7518c2ecf20Sopenharmony_ci irqreturn_t ret = IRQ_NONE; 7528c2ecf20Sopenharmony_ci 7538c2ecf20Sopenharmony_ci do { 7548c2ecf20Sopenharmony_ci rc = os_read_file(info->call_fd, &n, sizeof(n)); 7558c2ecf20Sopenharmony_ci if (rc == sizeof(n)) 7568c2ecf20Sopenharmony_ci ret |= vring_interrupt(irq, vq); 7578c2ecf20Sopenharmony_ci } while (rc == sizeof(n) || rc == -EINTR); 7588c2ecf20Sopenharmony_ci WARN(rc != -EAGAIN, "read returned %d\n", rc); 7598c2ecf20Sopenharmony_ci return ret; 7608c2ecf20Sopenharmony_ci} 7618c2ecf20Sopenharmony_ci 7628c2ecf20Sopenharmony_ci 7638c2ecf20Sopenharmony_cistatic void vu_get(struct virtio_device *vdev, unsigned offset, 7648c2ecf20Sopenharmony_ci void *buf, unsigned len) 7658c2ecf20Sopenharmony_ci{ 7668c2ecf20Sopenharmony_ci struct virtio_uml_device *vu_dev = to_virtio_uml_device(vdev); 7678c2ecf20Sopenharmony_ci 7688c2ecf20Sopenharmony_ci vhost_user_get_config(vu_dev, offset, buf, len); 7698c2ecf20Sopenharmony_ci} 7708c2ecf20Sopenharmony_ci 7718c2ecf20Sopenharmony_cistatic void vu_set(struct virtio_device *vdev, unsigned offset, 7728c2ecf20Sopenharmony_ci const void *buf, unsigned len) 7738c2ecf20Sopenharmony_ci{ 7748c2ecf20Sopenharmony_ci struct virtio_uml_device *vu_dev = to_virtio_uml_device(vdev); 7758c2ecf20Sopenharmony_ci 7768c2ecf20Sopenharmony_ci vhost_user_set_config(vu_dev, offset, buf, len); 7778c2ecf20Sopenharmony_ci} 7788c2ecf20Sopenharmony_ci 7798c2ecf20Sopenharmony_cistatic u8 vu_get_status(struct virtio_device *vdev) 7808c2ecf20Sopenharmony_ci{ 7818c2ecf20Sopenharmony_ci struct virtio_uml_device *vu_dev = to_virtio_uml_device(vdev); 7828c2ecf20Sopenharmony_ci 7838c2ecf20Sopenharmony_ci return vu_dev->status; 7848c2ecf20Sopenharmony_ci} 7858c2ecf20Sopenharmony_ci 7868c2ecf20Sopenharmony_cistatic void vu_set_status(struct virtio_device *vdev, u8 status) 7878c2ecf20Sopenharmony_ci{ 7888c2ecf20Sopenharmony_ci struct virtio_uml_device *vu_dev = to_virtio_uml_device(vdev); 7898c2ecf20Sopenharmony_ci 7908c2ecf20Sopenharmony_ci vu_dev->status = status; 7918c2ecf20Sopenharmony_ci} 7928c2ecf20Sopenharmony_ci 7938c2ecf20Sopenharmony_cistatic void vu_reset(struct virtio_device *vdev) 7948c2ecf20Sopenharmony_ci{ 7958c2ecf20Sopenharmony_ci struct virtio_uml_device *vu_dev = to_virtio_uml_device(vdev); 7968c2ecf20Sopenharmony_ci 7978c2ecf20Sopenharmony_ci vu_dev->status = 0; 7988c2ecf20Sopenharmony_ci} 7998c2ecf20Sopenharmony_ci 8008c2ecf20Sopenharmony_cistatic void vu_del_vq(struct virtqueue *vq) 8018c2ecf20Sopenharmony_ci{ 8028c2ecf20Sopenharmony_ci struct virtio_uml_vq_info *info = vq->priv; 8038c2ecf20Sopenharmony_ci 8048c2ecf20Sopenharmony_ci if (info->call_fd >= 0) { 8058c2ecf20Sopenharmony_ci um_free_irq(VIRTIO_IRQ, vq); 8068c2ecf20Sopenharmony_ci os_close_file(info->call_fd); 8078c2ecf20Sopenharmony_ci } 8088c2ecf20Sopenharmony_ci 8098c2ecf20Sopenharmony_ci if (info->kick_fd >= 0) 8108c2ecf20Sopenharmony_ci os_close_file(info->kick_fd); 8118c2ecf20Sopenharmony_ci 8128c2ecf20Sopenharmony_ci vring_del_virtqueue(vq); 8138c2ecf20Sopenharmony_ci kfree(info); 8148c2ecf20Sopenharmony_ci} 8158c2ecf20Sopenharmony_ci 8168c2ecf20Sopenharmony_cistatic void vu_del_vqs(struct virtio_device *vdev) 8178c2ecf20Sopenharmony_ci{ 8188c2ecf20Sopenharmony_ci struct virtio_uml_device *vu_dev = to_virtio_uml_device(vdev); 8198c2ecf20Sopenharmony_ci struct virtqueue *vq, *n; 8208c2ecf20Sopenharmony_ci u64 features; 8218c2ecf20Sopenharmony_ci 8228c2ecf20Sopenharmony_ci /* Note: reverse order as a workaround to a decoding bug in snabb */ 8238c2ecf20Sopenharmony_ci list_for_each_entry_reverse(vq, &vdev->vqs, list) 8248c2ecf20Sopenharmony_ci WARN_ON(vhost_user_set_vring_enable(vu_dev, vq->index, false)); 8258c2ecf20Sopenharmony_ci 8268c2ecf20Sopenharmony_ci /* Ensure previous messages have been processed */ 8278c2ecf20Sopenharmony_ci WARN_ON(vhost_user_get_features(vu_dev, &features)); 8288c2ecf20Sopenharmony_ci 8298c2ecf20Sopenharmony_ci list_for_each_entry_safe(vq, n, &vdev->vqs, list) 8308c2ecf20Sopenharmony_ci vu_del_vq(vq); 8318c2ecf20Sopenharmony_ci} 8328c2ecf20Sopenharmony_ci 8338c2ecf20Sopenharmony_cistatic int vu_setup_vq_call_fd(struct virtio_uml_device *vu_dev, 8348c2ecf20Sopenharmony_ci struct virtqueue *vq) 8358c2ecf20Sopenharmony_ci{ 8368c2ecf20Sopenharmony_ci struct virtio_uml_vq_info *info = vq->priv; 8378c2ecf20Sopenharmony_ci int call_fds[2]; 8388c2ecf20Sopenharmony_ci int rc; 8398c2ecf20Sopenharmony_ci 8408c2ecf20Sopenharmony_ci /* no call FD needed/desired in this case */ 8418c2ecf20Sopenharmony_ci if (vu_dev->protocol_features & 8428c2ecf20Sopenharmony_ci BIT_ULL(VHOST_USER_PROTOCOL_F_INBAND_NOTIFICATIONS) && 8438c2ecf20Sopenharmony_ci vu_dev->protocol_features & 8448c2ecf20Sopenharmony_ci BIT_ULL(VHOST_USER_PROTOCOL_F_SLAVE_REQ)) { 8458c2ecf20Sopenharmony_ci info->call_fd = -1; 8468c2ecf20Sopenharmony_ci return 0; 8478c2ecf20Sopenharmony_ci } 8488c2ecf20Sopenharmony_ci 8498c2ecf20Sopenharmony_ci /* Use a pipe for call fd, since SIGIO is not supported for eventfd */ 8508c2ecf20Sopenharmony_ci rc = os_pipe(call_fds, true, true); 8518c2ecf20Sopenharmony_ci if (rc < 0) 8528c2ecf20Sopenharmony_ci return rc; 8538c2ecf20Sopenharmony_ci 8548c2ecf20Sopenharmony_ci info->call_fd = call_fds[0]; 8558c2ecf20Sopenharmony_ci rc = um_request_irq(VIRTIO_IRQ, info->call_fd, IRQ_READ, 8568c2ecf20Sopenharmony_ci vu_interrupt, IRQF_SHARED, info->name, vq); 8578c2ecf20Sopenharmony_ci if (rc) 8588c2ecf20Sopenharmony_ci goto close_both; 8598c2ecf20Sopenharmony_ci 8608c2ecf20Sopenharmony_ci rc = vhost_user_set_vring_call(vu_dev, vq->index, call_fds[1]); 8618c2ecf20Sopenharmony_ci if (rc) 8628c2ecf20Sopenharmony_ci goto release_irq; 8638c2ecf20Sopenharmony_ci 8648c2ecf20Sopenharmony_ci goto out; 8658c2ecf20Sopenharmony_ci 8668c2ecf20Sopenharmony_cirelease_irq: 8678c2ecf20Sopenharmony_ci um_free_irq(VIRTIO_IRQ, vq); 8688c2ecf20Sopenharmony_ciclose_both: 8698c2ecf20Sopenharmony_ci os_close_file(call_fds[0]); 8708c2ecf20Sopenharmony_ciout: 8718c2ecf20Sopenharmony_ci /* Close (unused) write end of call fds */ 8728c2ecf20Sopenharmony_ci os_close_file(call_fds[1]); 8738c2ecf20Sopenharmony_ci 8748c2ecf20Sopenharmony_ci return rc; 8758c2ecf20Sopenharmony_ci} 8768c2ecf20Sopenharmony_ci 8778c2ecf20Sopenharmony_ci#ifdef CONFIG_UML_TIME_TRAVEL_SUPPORT 8788c2ecf20Sopenharmony_cistatic void vu_defer_irq_handle(struct time_travel_event *d) 8798c2ecf20Sopenharmony_ci{ 8808c2ecf20Sopenharmony_ci struct virtio_uml_vq_info *info; 8818c2ecf20Sopenharmony_ci 8828c2ecf20Sopenharmony_ci info = container_of(d, struct virtio_uml_vq_info, defer); 8838c2ecf20Sopenharmony_ci info->callback(info->vq); 8848c2ecf20Sopenharmony_ci} 8858c2ecf20Sopenharmony_ci 8868c2ecf20Sopenharmony_cistatic void vu_defer_irq_callback(struct virtqueue *vq) 8878c2ecf20Sopenharmony_ci{ 8888c2ecf20Sopenharmony_ci struct virtio_uml_vq_info *info = vq->priv; 8898c2ecf20Sopenharmony_ci 8908c2ecf20Sopenharmony_ci time_travel_add_irq_event(&info->defer); 8918c2ecf20Sopenharmony_ci} 8928c2ecf20Sopenharmony_ci#endif 8938c2ecf20Sopenharmony_ci 8948c2ecf20Sopenharmony_cistatic struct virtqueue *vu_setup_vq(struct virtio_device *vdev, 8958c2ecf20Sopenharmony_ci unsigned index, vq_callback_t *callback, 8968c2ecf20Sopenharmony_ci const char *name, bool ctx) 8978c2ecf20Sopenharmony_ci{ 8988c2ecf20Sopenharmony_ci struct virtio_uml_device *vu_dev = to_virtio_uml_device(vdev); 8998c2ecf20Sopenharmony_ci struct platform_device *pdev = vu_dev->pdev; 9008c2ecf20Sopenharmony_ci struct virtio_uml_vq_info *info; 9018c2ecf20Sopenharmony_ci struct virtqueue *vq; 9028c2ecf20Sopenharmony_ci int num = MAX_SUPPORTED_QUEUE_SIZE; 9038c2ecf20Sopenharmony_ci int rc; 9048c2ecf20Sopenharmony_ci 9058c2ecf20Sopenharmony_ci info = kzalloc(sizeof(*info), GFP_KERNEL); 9068c2ecf20Sopenharmony_ci if (!info) { 9078c2ecf20Sopenharmony_ci rc = -ENOMEM; 9088c2ecf20Sopenharmony_ci goto error_kzalloc; 9098c2ecf20Sopenharmony_ci } 9108c2ecf20Sopenharmony_ci snprintf(info->name, sizeof(info->name), "%s.%d-%s", pdev->name, 9118c2ecf20Sopenharmony_ci pdev->id, name); 9128c2ecf20Sopenharmony_ci 9138c2ecf20Sopenharmony_ci#ifdef CONFIG_UML_TIME_TRAVEL_SUPPORT 9148c2ecf20Sopenharmony_ci /* 9158c2ecf20Sopenharmony_ci * When we get an interrupt, we must bounce it through the simulation 9168c2ecf20Sopenharmony_ci * calendar (the simtime device), except for the simtime device itself 9178c2ecf20Sopenharmony_ci * since that's part of the simulation control. 9188c2ecf20Sopenharmony_ci */ 9198c2ecf20Sopenharmony_ci if (time_travel_mode == TT_MODE_EXTERNAL && callback) { 9208c2ecf20Sopenharmony_ci info->callback = callback; 9218c2ecf20Sopenharmony_ci callback = vu_defer_irq_callback; 9228c2ecf20Sopenharmony_ci time_travel_set_event_fn(&info->defer, vu_defer_irq_handle); 9238c2ecf20Sopenharmony_ci } 9248c2ecf20Sopenharmony_ci#endif 9258c2ecf20Sopenharmony_ci 9268c2ecf20Sopenharmony_ci vq = vring_create_virtqueue(index, num, PAGE_SIZE, vdev, true, true, 9278c2ecf20Sopenharmony_ci ctx, vu_notify, callback, info->name); 9288c2ecf20Sopenharmony_ci if (!vq) { 9298c2ecf20Sopenharmony_ci rc = -ENOMEM; 9308c2ecf20Sopenharmony_ci goto error_create; 9318c2ecf20Sopenharmony_ci } 9328c2ecf20Sopenharmony_ci vq->priv = info; 9338c2ecf20Sopenharmony_ci num = virtqueue_get_vring_size(vq); 9348c2ecf20Sopenharmony_ci#ifdef CONFIG_UML_TIME_TRAVEL_SUPPORT 9358c2ecf20Sopenharmony_ci info->vq = vq; 9368c2ecf20Sopenharmony_ci#endif 9378c2ecf20Sopenharmony_ci 9388c2ecf20Sopenharmony_ci if (vu_dev->protocol_features & 9398c2ecf20Sopenharmony_ci BIT_ULL(VHOST_USER_PROTOCOL_F_INBAND_NOTIFICATIONS)) { 9408c2ecf20Sopenharmony_ci info->kick_fd = -1; 9418c2ecf20Sopenharmony_ci } else { 9428c2ecf20Sopenharmony_ci rc = os_eventfd(0, 0); 9438c2ecf20Sopenharmony_ci if (rc < 0) 9448c2ecf20Sopenharmony_ci goto error_kick; 9458c2ecf20Sopenharmony_ci info->kick_fd = rc; 9468c2ecf20Sopenharmony_ci } 9478c2ecf20Sopenharmony_ci 9488c2ecf20Sopenharmony_ci rc = vu_setup_vq_call_fd(vu_dev, vq); 9498c2ecf20Sopenharmony_ci if (rc) 9508c2ecf20Sopenharmony_ci goto error_call; 9518c2ecf20Sopenharmony_ci 9528c2ecf20Sopenharmony_ci rc = vhost_user_set_vring_num(vu_dev, index, num); 9538c2ecf20Sopenharmony_ci if (rc) 9548c2ecf20Sopenharmony_ci goto error_setup; 9558c2ecf20Sopenharmony_ci 9568c2ecf20Sopenharmony_ci rc = vhost_user_set_vring_base(vu_dev, index, 0); 9578c2ecf20Sopenharmony_ci if (rc) 9588c2ecf20Sopenharmony_ci goto error_setup; 9598c2ecf20Sopenharmony_ci 9608c2ecf20Sopenharmony_ci rc = vhost_user_set_vring_addr(vu_dev, index, 9618c2ecf20Sopenharmony_ci virtqueue_get_desc_addr(vq), 9628c2ecf20Sopenharmony_ci virtqueue_get_used_addr(vq), 9638c2ecf20Sopenharmony_ci virtqueue_get_avail_addr(vq), 9648c2ecf20Sopenharmony_ci (u64) -1); 9658c2ecf20Sopenharmony_ci if (rc) 9668c2ecf20Sopenharmony_ci goto error_setup; 9678c2ecf20Sopenharmony_ci 9688c2ecf20Sopenharmony_ci return vq; 9698c2ecf20Sopenharmony_ci 9708c2ecf20Sopenharmony_cierror_setup: 9718c2ecf20Sopenharmony_ci if (info->call_fd >= 0) { 9728c2ecf20Sopenharmony_ci um_free_irq(VIRTIO_IRQ, vq); 9738c2ecf20Sopenharmony_ci os_close_file(info->call_fd); 9748c2ecf20Sopenharmony_ci } 9758c2ecf20Sopenharmony_cierror_call: 9768c2ecf20Sopenharmony_ci if (info->kick_fd >= 0) 9778c2ecf20Sopenharmony_ci os_close_file(info->kick_fd); 9788c2ecf20Sopenharmony_cierror_kick: 9798c2ecf20Sopenharmony_ci vring_del_virtqueue(vq); 9808c2ecf20Sopenharmony_cierror_create: 9818c2ecf20Sopenharmony_ci kfree(info); 9828c2ecf20Sopenharmony_cierror_kzalloc: 9838c2ecf20Sopenharmony_ci return ERR_PTR(rc); 9848c2ecf20Sopenharmony_ci} 9858c2ecf20Sopenharmony_ci 9868c2ecf20Sopenharmony_cistatic int vu_find_vqs(struct virtio_device *vdev, unsigned nvqs, 9878c2ecf20Sopenharmony_ci struct virtqueue *vqs[], vq_callback_t *callbacks[], 9888c2ecf20Sopenharmony_ci const char * const names[], const bool *ctx, 9898c2ecf20Sopenharmony_ci struct irq_affinity *desc) 9908c2ecf20Sopenharmony_ci{ 9918c2ecf20Sopenharmony_ci struct virtio_uml_device *vu_dev = to_virtio_uml_device(vdev); 9928c2ecf20Sopenharmony_ci int i, queue_idx = 0, rc; 9938c2ecf20Sopenharmony_ci struct virtqueue *vq; 9948c2ecf20Sopenharmony_ci 9958c2ecf20Sopenharmony_ci rc = vhost_user_set_mem_table(vu_dev); 9968c2ecf20Sopenharmony_ci if (rc) 9978c2ecf20Sopenharmony_ci return rc; 9988c2ecf20Sopenharmony_ci 9998c2ecf20Sopenharmony_ci for (i = 0; i < nvqs; ++i) { 10008c2ecf20Sopenharmony_ci if (!names[i]) { 10018c2ecf20Sopenharmony_ci vqs[i] = NULL; 10028c2ecf20Sopenharmony_ci continue; 10038c2ecf20Sopenharmony_ci } 10048c2ecf20Sopenharmony_ci 10058c2ecf20Sopenharmony_ci vqs[i] = vu_setup_vq(vdev, queue_idx++, callbacks[i], names[i], 10068c2ecf20Sopenharmony_ci ctx ? ctx[i] : false); 10078c2ecf20Sopenharmony_ci if (IS_ERR(vqs[i])) { 10088c2ecf20Sopenharmony_ci rc = PTR_ERR(vqs[i]); 10098c2ecf20Sopenharmony_ci goto error_setup; 10108c2ecf20Sopenharmony_ci } 10118c2ecf20Sopenharmony_ci } 10128c2ecf20Sopenharmony_ci 10138c2ecf20Sopenharmony_ci list_for_each_entry(vq, &vdev->vqs, list) { 10148c2ecf20Sopenharmony_ci struct virtio_uml_vq_info *info = vq->priv; 10158c2ecf20Sopenharmony_ci 10168c2ecf20Sopenharmony_ci if (info->kick_fd >= 0) { 10178c2ecf20Sopenharmony_ci rc = vhost_user_set_vring_kick(vu_dev, vq->index, 10188c2ecf20Sopenharmony_ci info->kick_fd); 10198c2ecf20Sopenharmony_ci if (rc) 10208c2ecf20Sopenharmony_ci goto error_setup; 10218c2ecf20Sopenharmony_ci } 10228c2ecf20Sopenharmony_ci 10238c2ecf20Sopenharmony_ci rc = vhost_user_set_vring_enable(vu_dev, vq->index, true); 10248c2ecf20Sopenharmony_ci if (rc) 10258c2ecf20Sopenharmony_ci goto error_setup; 10268c2ecf20Sopenharmony_ci } 10278c2ecf20Sopenharmony_ci 10288c2ecf20Sopenharmony_ci return 0; 10298c2ecf20Sopenharmony_ci 10308c2ecf20Sopenharmony_cierror_setup: 10318c2ecf20Sopenharmony_ci vu_del_vqs(vdev); 10328c2ecf20Sopenharmony_ci return rc; 10338c2ecf20Sopenharmony_ci} 10348c2ecf20Sopenharmony_ci 10358c2ecf20Sopenharmony_cistatic u64 vu_get_features(struct virtio_device *vdev) 10368c2ecf20Sopenharmony_ci{ 10378c2ecf20Sopenharmony_ci struct virtio_uml_device *vu_dev = to_virtio_uml_device(vdev); 10388c2ecf20Sopenharmony_ci 10398c2ecf20Sopenharmony_ci return vu_dev->features; 10408c2ecf20Sopenharmony_ci} 10418c2ecf20Sopenharmony_ci 10428c2ecf20Sopenharmony_cistatic int vu_finalize_features(struct virtio_device *vdev) 10438c2ecf20Sopenharmony_ci{ 10448c2ecf20Sopenharmony_ci struct virtio_uml_device *vu_dev = to_virtio_uml_device(vdev); 10458c2ecf20Sopenharmony_ci u64 supported = vdev->features & VHOST_USER_SUPPORTED_F; 10468c2ecf20Sopenharmony_ci 10478c2ecf20Sopenharmony_ci vring_transport_features(vdev); 10488c2ecf20Sopenharmony_ci vu_dev->features = vdev->features | supported; 10498c2ecf20Sopenharmony_ci 10508c2ecf20Sopenharmony_ci return vhost_user_set_features(vu_dev, vu_dev->features); 10518c2ecf20Sopenharmony_ci} 10528c2ecf20Sopenharmony_ci 10538c2ecf20Sopenharmony_cistatic const char *vu_bus_name(struct virtio_device *vdev) 10548c2ecf20Sopenharmony_ci{ 10558c2ecf20Sopenharmony_ci struct virtio_uml_device *vu_dev = to_virtio_uml_device(vdev); 10568c2ecf20Sopenharmony_ci 10578c2ecf20Sopenharmony_ci return vu_dev->pdev->name; 10588c2ecf20Sopenharmony_ci} 10598c2ecf20Sopenharmony_ci 10608c2ecf20Sopenharmony_cistatic const struct virtio_config_ops virtio_uml_config_ops = { 10618c2ecf20Sopenharmony_ci .get = vu_get, 10628c2ecf20Sopenharmony_ci .set = vu_set, 10638c2ecf20Sopenharmony_ci .get_status = vu_get_status, 10648c2ecf20Sopenharmony_ci .set_status = vu_set_status, 10658c2ecf20Sopenharmony_ci .reset = vu_reset, 10668c2ecf20Sopenharmony_ci .find_vqs = vu_find_vqs, 10678c2ecf20Sopenharmony_ci .del_vqs = vu_del_vqs, 10688c2ecf20Sopenharmony_ci .get_features = vu_get_features, 10698c2ecf20Sopenharmony_ci .finalize_features = vu_finalize_features, 10708c2ecf20Sopenharmony_ci .bus_name = vu_bus_name, 10718c2ecf20Sopenharmony_ci}; 10728c2ecf20Sopenharmony_ci 10738c2ecf20Sopenharmony_cistatic void virtio_uml_release_dev(struct device *d) 10748c2ecf20Sopenharmony_ci{ 10758c2ecf20Sopenharmony_ci struct virtio_device *vdev = 10768c2ecf20Sopenharmony_ci container_of(d, struct virtio_device, dev); 10778c2ecf20Sopenharmony_ci struct virtio_uml_device *vu_dev = to_virtio_uml_device(vdev); 10788c2ecf20Sopenharmony_ci 10798c2ecf20Sopenharmony_ci time_travel_propagate_time(); 10808c2ecf20Sopenharmony_ci 10818c2ecf20Sopenharmony_ci /* might not have been opened due to not negotiating the feature */ 10828c2ecf20Sopenharmony_ci if (vu_dev->req_fd >= 0) { 10838c2ecf20Sopenharmony_ci um_free_irq(VIRTIO_IRQ, vu_dev); 10848c2ecf20Sopenharmony_ci os_close_file(vu_dev->req_fd); 10858c2ecf20Sopenharmony_ci } 10868c2ecf20Sopenharmony_ci 10878c2ecf20Sopenharmony_ci os_close_file(vu_dev->sock); 10888c2ecf20Sopenharmony_ci kfree(vu_dev); 10898c2ecf20Sopenharmony_ci} 10908c2ecf20Sopenharmony_ci 10918c2ecf20Sopenharmony_ci/* Platform device */ 10928c2ecf20Sopenharmony_ci 10938c2ecf20Sopenharmony_cistatic int virtio_uml_probe(struct platform_device *pdev) 10948c2ecf20Sopenharmony_ci{ 10958c2ecf20Sopenharmony_ci struct virtio_uml_platform_data *pdata = pdev->dev.platform_data; 10968c2ecf20Sopenharmony_ci struct virtio_uml_device *vu_dev; 10978c2ecf20Sopenharmony_ci int rc; 10988c2ecf20Sopenharmony_ci 10998c2ecf20Sopenharmony_ci if (!pdata) 11008c2ecf20Sopenharmony_ci return -EINVAL; 11018c2ecf20Sopenharmony_ci 11028c2ecf20Sopenharmony_ci vu_dev = kzalloc(sizeof(*vu_dev), GFP_KERNEL); 11038c2ecf20Sopenharmony_ci if (!vu_dev) 11048c2ecf20Sopenharmony_ci return -ENOMEM; 11058c2ecf20Sopenharmony_ci 11068c2ecf20Sopenharmony_ci vu_dev->vdev.dev.parent = &pdev->dev; 11078c2ecf20Sopenharmony_ci vu_dev->vdev.dev.release = virtio_uml_release_dev; 11088c2ecf20Sopenharmony_ci vu_dev->vdev.config = &virtio_uml_config_ops; 11098c2ecf20Sopenharmony_ci vu_dev->vdev.id.device = pdata->virtio_device_id; 11108c2ecf20Sopenharmony_ci vu_dev->vdev.id.vendor = VIRTIO_DEV_ANY_ID; 11118c2ecf20Sopenharmony_ci vu_dev->pdev = pdev; 11128c2ecf20Sopenharmony_ci vu_dev->req_fd = -1; 11138c2ecf20Sopenharmony_ci 11148c2ecf20Sopenharmony_ci time_travel_propagate_time(); 11158c2ecf20Sopenharmony_ci 11168c2ecf20Sopenharmony_ci do { 11178c2ecf20Sopenharmony_ci rc = os_connect_socket(pdata->socket_path); 11188c2ecf20Sopenharmony_ci } while (rc == -EINTR); 11198c2ecf20Sopenharmony_ci if (rc < 0) 11208c2ecf20Sopenharmony_ci goto error_free; 11218c2ecf20Sopenharmony_ci vu_dev->sock = rc; 11228c2ecf20Sopenharmony_ci 11238c2ecf20Sopenharmony_ci spin_lock_init(&vu_dev->sock_lock); 11248c2ecf20Sopenharmony_ci 11258c2ecf20Sopenharmony_ci rc = vhost_user_init(vu_dev); 11268c2ecf20Sopenharmony_ci if (rc) 11278c2ecf20Sopenharmony_ci goto error_init; 11288c2ecf20Sopenharmony_ci 11298c2ecf20Sopenharmony_ci platform_set_drvdata(pdev, vu_dev); 11308c2ecf20Sopenharmony_ci 11318c2ecf20Sopenharmony_ci rc = register_virtio_device(&vu_dev->vdev); 11328c2ecf20Sopenharmony_ci if (rc) 11338c2ecf20Sopenharmony_ci put_device(&vu_dev->vdev.dev); 11348c2ecf20Sopenharmony_ci vu_dev->registered = 1; 11358c2ecf20Sopenharmony_ci return rc; 11368c2ecf20Sopenharmony_ci 11378c2ecf20Sopenharmony_cierror_init: 11388c2ecf20Sopenharmony_ci os_close_file(vu_dev->sock); 11398c2ecf20Sopenharmony_cierror_free: 11408c2ecf20Sopenharmony_ci kfree(vu_dev); 11418c2ecf20Sopenharmony_ci return rc; 11428c2ecf20Sopenharmony_ci} 11438c2ecf20Sopenharmony_ci 11448c2ecf20Sopenharmony_cistatic int virtio_uml_remove(struct platform_device *pdev) 11458c2ecf20Sopenharmony_ci{ 11468c2ecf20Sopenharmony_ci struct virtio_uml_device *vu_dev = platform_get_drvdata(pdev); 11478c2ecf20Sopenharmony_ci 11488c2ecf20Sopenharmony_ci unregister_virtio_device(&vu_dev->vdev); 11498c2ecf20Sopenharmony_ci return 0; 11508c2ecf20Sopenharmony_ci} 11518c2ecf20Sopenharmony_ci 11528c2ecf20Sopenharmony_ci/* Command line device list */ 11538c2ecf20Sopenharmony_ci 11548c2ecf20Sopenharmony_cistatic void vu_cmdline_release_dev(struct device *d) 11558c2ecf20Sopenharmony_ci{ 11568c2ecf20Sopenharmony_ci} 11578c2ecf20Sopenharmony_ci 11588c2ecf20Sopenharmony_cistatic struct device vu_cmdline_parent = { 11598c2ecf20Sopenharmony_ci .init_name = "virtio-uml-cmdline", 11608c2ecf20Sopenharmony_ci .release = vu_cmdline_release_dev, 11618c2ecf20Sopenharmony_ci}; 11628c2ecf20Sopenharmony_ci 11638c2ecf20Sopenharmony_cistatic bool vu_cmdline_parent_registered; 11648c2ecf20Sopenharmony_cistatic int vu_cmdline_id; 11658c2ecf20Sopenharmony_ci 11668c2ecf20Sopenharmony_cistatic int vu_unregister_cmdline_device(struct device *dev, void *data) 11678c2ecf20Sopenharmony_ci{ 11688c2ecf20Sopenharmony_ci struct platform_device *pdev = to_platform_device(dev); 11698c2ecf20Sopenharmony_ci struct virtio_uml_platform_data *pdata = pdev->dev.platform_data; 11708c2ecf20Sopenharmony_ci 11718c2ecf20Sopenharmony_ci kfree(pdata->socket_path); 11728c2ecf20Sopenharmony_ci platform_device_unregister(pdev); 11738c2ecf20Sopenharmony_ci return 0; 11748c2ecf20Sopenharmony_ci} 11758c2ecf20Sopenharmony_ci 11768c2ecf20Sopenharmony_cistatic void vu_conn_broken(struct work_struct *wk) 11778c2ecf20Sopenharmony_ci{ 11788c2ecf20Sopenharmony_ci struct virtio_uml_platform_data *pdata; 11798c2ecf20Sopenharmony_ci 11808c2ecf20Sopenharmony_ci pdata = container_of(wk, struct virtio_uml_platform_data, conn_broken_wk); 11818c2ecf20Sopenharmony_ci vu_unregister_cmdline_device(&pdata->pdev->dev, NULL); 11828c2ecf20Sopenharmony_ci} 11838c2ecf20Sopenharmony_ci 11848c2ecf20Sopenharmony_cistatic int vu_cmdline_set(const char *device, const struct kernel_param *kp) 11858c2ecf20Sopenharmony_ci{ 11868c2ecf20Sopenharmony_ci const char *ids = strchr(device, ':'); 11878c2ecf20Sopenharmony_ci unsigned int virtio_device_id; 11888c2ecf20Sopenharmony_ci int processed, consumed, err; 11898c2ecf20Sopenharmony_ci char *socket_path; 11908c2ecf20Sopenharmony_ci struct virtio_uml_platform_data pdata, *ppdata; 11918c2ecf20Sopenharmony_ci struct platform_device *pdev; 11928c2ecf20Sopenharmony_ci 11938c2ecf20Sopenharmony_ci if (!ids || ids == device) 11948c2ecf20Sopenharmony_ci return -EINVAL; 11958c2ecf20Sopenharmony_ci 11968c2ecf20Sopenharmony_ci processed = sscanf(ids, ":%u%n:%d%n", 11978c2ecf20Sopenharmony_ci &virtio_device_id, &consumed, 11988c2ecf20Sopenharmony_ci &vu_cmdline_id, &consumed); 11998c2ecf20Sopenharmony_ci 12008c2ecf20Sopenharmony_ci if (processed < 1 || ids[consumed]) 12018c2ecf20Sopenharmony_ci return -EINVAL; 12028c2ecf20Sopenharmony_ci 12038c2ecf20Sopenharmony_ci if (!vu_cmdline_parent_registered) { 12048c2ecf20Sopenharmony_ci err = device_register(&vu_cmdline_parent); 12058c2ecf20Sopenharmony_ci if (err) { 12068c2ecf20Sopenharmony_ci pr_err("Failed to register parent device!\n"); 12078c2ecf20Sopenharmony_ci put_device(&vu_cmdline_parent); 12088c2ecf20Sopenharmony_ci return err; 12098c2ecf20Sopenharmony_ci } 12108c2ecf20Sopenharmony_ci vu_cmdline_parent_registered = true; 12118c2ecf20Sopenharmony_ci } 12128c2ecf20Sopenharmony_ci 12138c2ecf20Sopenharmony_ci socket_path = kmemdup_nul(device, ids - device, GFP_KERNEL); 12148c2ecf20Sopenharmony_ci if (!socket_path) 12158c2ecf20Sopenharmony_ci return -ENOMEM; 12168c2ecf20Sopenharmony_ci 12178c2ecf20Sopenharmony_ci pdata.virtio_device_id = (u32) virtio_device_id; 12188c2ecf20Sopenharmony_ci pdata.socket_path = socket_path; 12198c2ecf20Sopenharmony_ci 12208c2ecf20Sopenharmony_ci pr_info("Registering device virtio-uml.%d id=%d at %s\n", 12218c2ecf20Sopenharmony_ci vu_cmdline_id, virtio_device_id, socket_path); 12228c2ecf20Sopenharmony_ci 12238c2ecf20Sopenharmony_ci pdev = platform_device_register_data(&vu_cmdline_parent, "virtio-uml", 12248c2ecf20Sopenharmony_ci vu_cmdline_id++, &pdata, 12258c2ecf20Sopenharmony_ci sizeof(pdata)); 12268c2ecf20Sopenharmony_ci err = PTR_ERR_OR_ZERO(pdev); 12278c2ecf20Sopenharmony_ci if (err) 12288c2ecf20Sopenharmony_ci goto free; 12298c2ecf20Sopenharmony_ci 12308c2ecf20Sopenharmony_ci ppdata = pdev->dev.platform_data; 12318c2ecf20Sopenharmony_ci ppdata->pdev = pdev; 12328c2ecf20Sopenharmony_ci INIT_WORK(&ppdata->conn_broken_wk, vu_conn_broken); 12338c2ecf20Sopenharmony_ci 12348c2ecf20Sopenharmony_ci return 0; 12358c2ecf20Sopenharmony_ci 12368c2ecf20Sopenharmony_cifree: 12378c2ecf20Sopenharmony_ci kfree(socket_path); 12388c2ecf20Sopenharmony_ci return err; 12398c2ecf20Sopenharmony_ci} 12408c2ecf20Sopenharmony_ci 12418c2ecf20Sopenharmony_cistatic int vu_cmdline_get_device(struct device *dev, void *data) 12428c2ecf20Sopenharmony_ci{ 12438c2ecf20Sopenharmony_ci struct platform_device *pdev = to_platform_device(dev); 12448c2ecf20Sopenharmony_ci struct virtio_uml_platform_data *pdata = pdev->dev.platform_data; 12458c2ecf20Sopenharmony_ci char *buffer = data; 12468c2ecf20Sopenharmony_ci unsigned int len = strlen(buffer); 12478c2ecf20Sopenharmony_ci 12488c2ecf20Sopenharmony_ci snprintf(buffer + len, PAGE_SIZE - len, "%s:%d:%d\n", 12498c2ecf20Sopenharmony_ci pdata->socket_path, pdata->virtio_device_id, pdev->id); 12508c2ecf20Sopenharmony_ci return 0; 12518c2ecf20Sopenharmony_ci} 12528c2ecf20Sopenharmony_ci 12538c2ecf20Sopenharmony_cistatic int vu_cmdline_get(char *buffer, const struct kernel_param *kp) 12548c2ecf20Sopenharmony_ci{ 12558c2ecf20Sopenharmony_ci buffer[0] = '\0'; 12568c2ecf20Sopenharmony_ci if (vu_cmdline_parent_registered) 12578c2ecf20Sopenharmony_ci device_for_each_child(&vu_cmdline_parent, buffer, 12588c2ecf20Sopenharmony_ci vu_cmdline_get_device); 12598c2ecf20Sopenharmony_ci return strlen(buffer) + 1; 12608c2ecf20Sopenharmony_ci} 12618c2ecf20Sopenharmony_ci 12628c2ecf20Sopenharmony_cistatic const struct kernel_param_ops vu_cmdline_param_ops = { 12638c2ecf20Sopenharmony_ci .set = vu_cmdline_set, 12648c2ecf20Sopenharmony_ci .get = vu_cmdline_get, 12658c2ecf20Sopenharmony_ci}; 12668c2ecf20Sopenharmony_ci 12678c2ecf20Sopenharmony_cidevice_param_cb(device, &vu_cmdline_param_ops, NULL, S_IRUSR); 12688c2ecf20Sopenharmony_ci__uml_help(vu_cmdline_param_ops, 12698c2ecf20Sopenharmony_ci"virtio_uml.device=<socket>:<virtio_id>[:<platform_id>]\n" 12708c2ecf20Sopenharmony_ci" Configure a virtio device over a vhost-user socket.\n" 12718c2ecf20Sopenharmony_ci" See virtio_ids.h for a list of possible virtio device id values.\n" 12728c2ecf20Sopenharmony_ci" Optionally use a specific platform_device id.\n\n" 12738c2ecf20Sopenharmony_ci); 12748c2ecf20Sopenharmony_ci 12758c2ecf20Sopenharmony_ci 12768c2ecf20Sopenharmony_cistatic void vu_unregister_cmdline_devices(void) 12778c2ecf20Sopenharmony_ci{ 12788c2ecf20Sopenharmony_ci if (vu_cmdline_parent_registered) { 12798c2ecf20Sopenharmony_ci device_for_each_child(&vu_cmdline_parent, NULL, 12808c2ecf20Sopenharmony_ci vu_unregister_cmdline_device); 12818c2ecf20Sopenharmony_ci device_unregister(&vu_cmdline_parent); 12828c2ecf20Sopenharmony_ci vu_cmdline_parent_registered = false; 12838c2ecf20Sopenharmony_ci } 12848c2ecf20Sopenharmony_ci} 12858c2ecf20Sopenharmony_ci 12868c2ecf20Sopenharmony_ci/* Platform driver */ 12878c2ecf20Sopenharmony_ci 12888c2ecf20Sopenharmony_cistatic const struct of_device_id virtio_uml_match[] = { 12898c2ecf20Sopenharmony_ci { .compatible = "virtio,uml", }, 12908c2ecf20Sopenharmony_ci { } 12918c2ecf20Sopenharmony_ci}; 12928c2ecf20Sopenharmony_ciMODULE_DEVICE_TABLE(of, virtio_uml_match); 12938c2ecf20Sopenharmony_ci 12948c2ecf20Sopenharmony_cistatic struct platform_driver virtio_uml_driver = { 12958c2ecf20Sopenharmony_ci .probe = virtio_uml_probe, 12968c2ecf20Sopenharmony_ci .remove = virtio_uml_remove, 12978c2ecf20Sopenharmony_ci .driver = { 12988c2ecf20Sopenharmony_ci .name = "virtio-uml", 12998c2ecf20Sopenharmony_ci .of_match_table = virtio_uml_match, 13008c2ecf20Sopenharmony_ci }, 13018c2ecf20Sopenharmony_ci}; 13028c2ecf20Sopenharmony_ci 13038c2ecf20Sopenharmony_cistatic int __init virtio_uml_init(void) 13048c2ecf20Sopenharmony_ci{ 13058c2ecf20Sopenharmony_ci return platform_driver_register(&virtio_uml_driver); 13068c2ecf20Sopenharmony_ci} 13078c2ecf20Sopenharmony_ci 13088c2ecf20Sopenharmony_cistatic void __exit virtio_uml_exit(void) 13098c2ecf20Sopenharmony_ci{ 13108c2ecf20Sopenharmony_ci platform_driver_unregister(&virtio_uml_driver); 13118c2ecf20Sopenharmony_ci vu_unregister_cmdline_devices(); 13128c2ecf20Sopenharmony_ci} 13138c2ecf20Sopenharmony_ci 13148c2ecf20Sopenharmony_cimodule_init(virtio_uml_init); 13158c2ecf20Sopenharmony_cimodule_exit(virtio_uml_exit); 13168c2ecf20Sopenharmony_ci__uml_exitcall(virtio_uml_exit); 13178c2ecf20Sopenharmony_ci 13188c2ecf20Sopenharmony_ciMODULE_DESCRIPTION("UML driver for vhost-user virtio devices"); 13198c2ecf20Sopenharmony_ciMODULE_LICENSE("GPL"); 1320