18c2ecf20Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-or-later
28c2ecf20Sopenharmony_ci/*
38c2ecf20Sopenharmony_ci * Virtio vhost-user driver
48c2ecf20Sopenharmony_ci *
58c2ecf20Sopenharmony_ci * Copyright(c) 2019 Intel Corporation
68c2ecf20Sopenharmony_ci *
78c2ecf20Sopenharmony_ci * This driver allows virtio devices to be used over a vhost-user socket.
88c2ecf20Sopenharmony_ci *
98c2ecf20Sopenharmony_ci * Guest devices can be instantiated by kernel module or command line
108c2ecf20Sopenharmony_ci * parameters. One device will be created for each parameter. Syntax:
118c2ecf20Sopenharmony_ci *
128c2ecf20Sopenharmony_ci *		virtio_uml.device=<socket>:<virtio_id>[:<platform_id>]
138c2ecf20Sopenharmony_ci * where:
148c2ecf20Sopenharmony_ci *		<socket>	:= vhost-user socket path to connect
158c2ecf20Sopenharmony_ci *		<virtio_id>	:= virtio device id (as in virtio_ids.h)
168c2ecf20Sopenharmony_ci *		<platform_id>	:= (optional) platform device id
178c2ecf20Sopenharmony_ci *
188c2ecf20Sopenharmony_ci * example:
198c2ecf20Sopenharmony_ci *		virtio_uml.device=/var/uml.socket:1
208c2ecf20Sopenharmony_ci *
218c2ecf20Sopenharmony_ci * Based on Virtio MMIO driver by Pawel Moll, copyright 2011-2014, ARM Ltd.
228c2ecf20Sopenharmony_ci */
238c2ecf20Sopenharmony_ci#include <linux/module.h>
248c2ecf20Sopenharmony_ci#include <linux/platform_device.h>
258c2ecf20Sopenharmony_ci#include <linux/slab.h>
268c2ecf20Sopenharmony_ci#include <linux/virtio.h>
278c2ecf20Sopenharmony_ci#include <linux/virtio_config.h>
288c2ecf20Sopenharmony_ci#include <linux/virtio_ring.h>
298c2ecf20Sopenharmony_ci#include <linux/time-internal.h>
308c2ecf20Sopenharmony_ci#include <shared/as-layout.h>
318c2ecf20Sopenharmony_ci#include <irq_kern.h>
328c2ecf20Sopenharmony_ci#include <init.h>
338c2ecf20Sopenharmony_ci#include <os.h>
348c2ecf20Sopenharmony_ci#include "vhost_user.h"
358c2ecf20Sopenharmony_ci
368c2ecf20Sopenharmony_ci/* Workaround due to a conflict between irq_user.h and irqreturn.h */
378c2ecf20Sopenharmony_ci#ifdef IRQ_NONE
388c2ecf20Sopenharmony_ci#undef IRQ_NONE
398c2ecf20Sopenharmony_ci#endif
408c2ecf20Sopenharmony_ci
418c2ecf20Sopenharmony_ci#define MAX_SUPPORTED_QUEUE_SIZE	256
428c2ecf20Sopenharmony_ci
438c2ecf20Sopenharmony_ci#define to_virtio_uml_device(_vdev) \
448c2ecf20Sopenharmony_ci	container_of(_vdev, struct virtio_uml_device, vdev)
458c2ecf20Sopenharmony_ci
468c2ecf20Sopenharmony_cistruct virtio_uml_platform_data {
478c2ecf20Sopenharmony_ci	u32 virtio_device_id;
488c2ecf20Sopenharmony_ci	const char *socket_path;
498c2ecf20Sopenharmony_ci	struct work_struct conn_broken_wk;
508c2ecf20Sopenharmony_ci	struct platform_device *pdev;
518c2ecf20Sopenharmony_ci};
528c2ecf20Sopenharmony_ci
538c2ecf20Sopenharmony_cistruct virtio_uml_device {
548c2ecf20Sopenharmony_ci	struct virtio_device vdev;
558c2ecf20Sopenharmony_ci	struct platform_device *pdev;
568c2ecf20Sopenharmony_ci
578c2ecf20Sopenharmony_ci	spinlock_t sock_lock;
588c2ecf20Sopenharmony_ci	int sock, req_fd;
598c2ecf20Sopenharmony_ci	u64 features;
608c2ecf20Sopenharmony_ci	u64 protocol_features;
618c2ecf20Sopenharmony_ci	u8 status;
628c2ecf20Sopenharmony_ci	u8 registered:1;
638c2ecf20Sopenharmony_ci};
648c2ecf20Sopenharmony_ci
658c2ecf20Sopenharmony_cistruct virtio_uml_vq_info {
668c2ecf20Sopenharmony_ci	int kick_fd, call_fd;
678c2ecf20Sopenharmony_ci	char name[32];
688c2ecf20Sopenharmony_ci#ifdef CONFIG_UML_TIME_TRAVEL_SUPPORT
698c2ecf20Sopenharmony_ci	struct virtqueue *vq;
708c2ecf20Sopenharmony_ci	vq_callback_t *callback;
718c2ecf20Sopenharmony_ci	struct time_travel_event defer;
728c2ecf20Sopenharmony_ci#endif
738c2ecf20Sopenharmony_ci};
748c2ecf20Sopenharmony_ci
758c2ecf20Sopenharmony_ciextern unsigned long long physmem_size, highmem;
768c2ecf20Sopenharmony_ci
778c2ecf20Sopenharmony_ci#define vu_err(vu_dev, ...)	dev_err(&(vu_dev)->pdev->dev, ##__VA_ARGS__)
788c2ecf20Sopenharmony_ci
798c2ecf20Sopenharmony_ci/* Vhost-user protocol */
808c2ecf20Sopenharmony_ci
818c2ecf20Sopenharmony_cistatic int full_sendmsg_fds(int fd, const void *buf, unsigned int len,
828c2ecf20Sopenharmony_ci			    const int *fds, unsigned int fds_num)
838c2ecf20Sopenharmony_ci{
848c2ecf20Sopenharmony_ci	int rc;
858c2ecf20Sopenharmony_ci
868c2ecf20Sopenharmony_ci	do {
878c2ecf20Sopenharmony_ci		rc = os_sendmsg_fds(fd, buf, len, fds, fds_num);
888c2ecf20Sopenharmony_ci		if (rc > 0) {
898c2ecf20Sopenharmony_ci			buf += rc;
908c2ecf20Sopenharmony_ci			len -= rc;
918c2ecf20Sopenharmony_ci			fds = NULL;
928c2ecf20Sopenharmony_ci			fds_num = 0;
938c2ecf20Sopenharmony_ci		}
948c2ecf20Sopenharmony_ci	} while (len && (rc >= 0 || rc == -EINTR));
958c2ecf20Sopenharmony_ci
968c2ecf20Sopenharmony_ci	if (rc < 0)
978c2ecf20Sopenharmony_ci		return rc;
988c2ecf20Sopenharmony_ci	return 0;
998c2ecf20Sopenharmony_ci}
1008c2ecf20Sopenharmony_ci
1018c2ecf20Sopenharmony_cistatic int full_read(int fd, void *buf, int len, bool abortable)
1028c2ecf20Sopenharmony_ci{
1038c2ecf20Sopenharmony_ci	int rc;
1048c2ecf20Sopenharmony_ci
1058c2ecf20Sopenharmony_ci	do {
1068c2ecf20Sopenharmony_ci		rc = os_read_file(fd, buf, len);
1078c2ecf20Sopenharmony_ci		if (rc > 0) {
1088c2ecf20Sopenharmony_ci			buf += rc;
1098c2ecf20Sopenharmony_ci			len -= rc;
1108c2ecf20Sopenharmony_ci		}
1118c2ecf20Sopenharmony_ci	} while (len && (rc > 0 || rc == -EINTR || (!abortable && rc == -EAGAIN)));
1128c2ecf20Sopenharmony_ci
1138c2ecf20Sopenharmony_ci	if (rc < 0)
1148c2ecf20Sopenharmony_ci		return rc;
1158c2ecf20Sopenharmony_ci	if (rc == 0)
1168c2ecf20Sopenharmony_ci		return -ECONNRESET;
1178c2ecf20Sopenharmony_ci	return 0;
1188c2ecf20Sopenharmony_ci}
1198c2ecf20Sopenharmony_ci
1208c2ecf20Sopenharmony_cistatic int vhost_user_recv_header(int fd, struct vhost_user_msg *msg)
1218c2ecf20Sopenharmony_ci{
1228c2ecf20Sopenharmony_ci	return full_read(fd, msg, sizeof(msg->header), true);
1238c2ecf20Sopenharmony_ci}
1248c2ecf20Sopenharmony_ci
1258c2ecf20Sopenharmony_cistatic int vhost_user_recv(struct virtio_uml_device *vu_dev,
1268c2ecf20Sopenharmony_ci			   int fd, struct vhost_user_msg *msg,
1278c2ecf20Sopenharmony_ci			   size_t max_payload_size, bool wait)
1288c2ecf20Sopenharmony_ci{
1298c2ecf20Sopenharmony_ci	size_t size;
1308c2ecf20Sopenharmony_ci	int rc;
1318c2ecf20Sopenharmony_ci
1328c2ecf20Sopenharmony_ci	/*
1338c2ecf20Sopenharmony_ci	 * In virtio time-travel mode, we're handling all the vhost-user
1348c2ecf20Sopenharmony_ci	 * FDs by polling them whenever appropriate. However, we may get
1358c2ecf20Sopenharmony_ci	 * into a situation where we're sending out an interrupt message
1368c2ecf20Sopenharmony_ci	 * to a device (e.g. a net device) and need to handle a simulation
1378c2ecf20Sopenharmony_ci	 * time message while doing so, e.g. one that tells us to update
1388c2ecf20Sopenharmony_ci	 * our idea of how long we can run without scheduling.
1398c2ecf20Sopenharmony_ci	 *
1408c2ecf20Sopenharmony_ci	 * Thus, we need to not just read() from the given fd, but need
1418c2ecf20Sopenharmony_ci	 * to also handle messages for the simulation time - this function
1428c2ecf20Sopenharmony_ci	 * does that for us while waiting for the given fd to be readable.
1438c2ecf20Sopenharmony_ci	 */
1448c2ecf20Sopenharmony_ci	if (wait)
1458c2ecf20Sopenharmony_ci		time_travel_wait_readable(fd);
1468c2ecf20Sopenharmony_ci
1478c2ecf20Sopenharmony_ci	rc = vhost_user_recv_header(fd, msg);
1488c2ecf20Sopenharmony_ci
1498c2ecf20Sopenharmony_ci	if (rc == -ECONNRESET && vu_dev->registered) {
1508c2ecf20Sopenharmony_ci		struct virtio_uml_platform_data *pdata;
1518c2ecf20Sopenharmony_ci
1528c2ecf20Sopenharmony_ci		pdata = vu_dev->pdev->dev.platform_data;
1538c2ecf20Sopenharmony_ci
1548c2ecf20Sopenharmony_ci		virtio_break_device(&vu_dev->vdev);
1558c2ecf20Sopenharmony_ci		schedule_work(&pdata->conn_broken_wk);
1568c2ecf20Sopenharmony_ci	}
1578c2ecf20Sopenharmony_ci	if (rc)
1588c2ecf20Sopenharmony_ci		return rc;
1598c2ecf20Sopenharmony_ci	size = msg->header.size;
1608c2ecf20Sopenharmony_ci	if (size > max_payload_size)
1618c2ecf20Sopenharmony_ci		return -EPROTO;
1628c2ecf20Sopenharmony_ci	return full_read(fd, &msg->payload, size, false);
1638c2ecf20Sopenharmony_ci}
1648c2ecf20Sopenharmony_ci
1658c2ecf20Sopenharmony_cistatic int vhost_user_recv_resp(struct virtio_uml_device *vu_dev,
1668c2ecf20Sopenharmony_ci				struct vhost_user_msg *msg,
1678c2ecf20Sopenharmony_ci				size_t max_payload_size)
1688c2ecf20Sopenharmony_ci{
1698c2ecf20Sopenharmony_ci	int rc = vhost_user_recv(vu_dev, vu_dev->sock, msg,
1708c2ecf20Sopenharmony_ci				 max_payload_size, true);
1718c2ecf20Sopenharmony_ci
1728c2ecf20Sopenharmony_ci	if (rc)
1738c2ecf20Sopenharmony_ci		return rc;
1748c2ecf20Sopenharmony_ci
1758c2ecf20Sopenharmony_ci	if (msg->header.flags != (VHOST_USER_FLAG_REPLY | VHOST_USER_VERSION))
1768c2ecf20Sopenharmony_ci		return -EPROTO;
1778c2ecf20Sopenharmony_ci
1788c2ecf20Sopenharmony_ci	return 0;
1798c2ecf20Sopenharmony_ci}
1808c2ecf20Sopenharmony_ci
1818c2ecf20Sopenharmony_cistatic int vhost_user_recv_u64(struct virtio_uml_device *vu_dev,
1828c2ecf20Sopenharmony_ci			       u64 *value)
1838c2ecf20Sopenharmony_ci{
1848c2ecf20Sopenharmony_ci	struct vhost_user_msg msg;
1858c2ecf20Sopenharmony_ci	int rc = vhost_user_recv_resp(vu_dev, &msg,
1868c2ecf20Sopenharmony_ci				      sizeof(msg.payload.integer));
1878c2ecf20Sopenharmony_ci
1888c2ecf20Sopenharmony_ci	if (rc)
1898c2ecf20Sopenharmony_ci		return rc;
1908c2ecf20Sopenharmony_ci	if (msg.header.size != sizeof(msg.payload.integer))
1918c2ecf20Sopenharmony_ci		return -EPROTO;
1928c2ecf20Sopenharmony_ci	*value = msg.payload.integer;
1938c2ecf20Sopenharmony_ci	return 0;
1948c2ecf20Sopenharmony_ci}
1958c2ecf20Sopenharmony_ci
1968c2ecf20Sopenharmony_cistatic int vhost_user_recv_req(struct virtio_uml_device *vu_dev,
1978c2ecf20Sopenharmony_ci			       struct vhost_user_msg *msg,
1988c2ecf20Sopenharmony_ci			       size_t max_payload_size)
1998c2ecf20Sopenharmony_ci{
2008c2ecf20Sopenharmony_ci	int rc = vhost_user_recv(vu_dev, vu_dev->req_fd, msg,
2018c2ecf20Sopenharmony_ci				 max_payload_size, false);
2028c2ecf20Sopenharmony_ci
2038c2ecf20Sopenharmony_ci	if (rc)
2048c2ecf20Sopenharmony_ci		return rc;
2058c2ecf20Sopenharmony_ci
2068c2ecf20Sopenharmony_ci	if ((msg->header.flags & ~VHOST_USER_FLAG_NEED_REPLY) !=
2078c2ecf20Sopenharmony_ci			VHOST_USER_VERSION)
2088c2ecf20Sopenharmony_ci		return -EPROTO;
2098c2ecf20Sopenharmony_ci
2108c2ecf20Sopenharmony_ci	return 0;
2118c2ecf20Sopenharmony_ci}
2128c2ecf20Sopenharmony_ci
2138c2ecf20Sopenharmony_cistatic int vhost_user_send(struct virtio_uml_device *vu_dev,
2148c2ecf20Sopenharmony_ci			   bool need_response, struct vhost_user_msg *msg,
2158c2ecf20Sopenharmony_ci			   int *fds, size_t num_fds)
2168c2ecf20Sopenharmony_ci{
2178c2ecf20Sopenharmony_ci	size_t size = sizeof(msg->header) + msg->header.size;
2188c2ecf20Sopenharmony_ci	unsigned long flags;
2198c2ecf20Sopenharmony_ci	bool request_ack;
2208c2ecf20Sopenharmony_ci	int rc;
2218c2ecf20Sopenharmony_ci
2228c2ecf20Sopenharmony_ci	msg->header.flags |= VHOST_USER_VERSION;
2238c2ecf20Sopenharmony_ci
2248c2ecf20Sopenharmony_ci	/*
2258c2ecf20Sopenharmony_ci	 * The need_response flag indicates that we already need a response,
2268c2ecf20Sopenharmony_ci	 * e.g. to read the features. In these cases, don't request an ACK as
2278c2ecf20Sopenharmony_ci	 * it is meaningless. Also request an ACK only if supported.
2288c2ecf20Sopenharmony_ci	 */
2298c2ecf20Sopenharmony_ci	request_ack = !need_response;
2308c2ecf20Sopenharmony_ci	if (!(vu_dev->protocol_features &
2318c2ecf20Sopenharmony_ci			BIT_ULL(VHOST_USER_PROTOCOL_F_REPLY_ACK)))
2328c2ecf20Sopenharmony_ci		request_ack = false;
2338c2ecf20Sopenharmony_ci
2348c2ecf20Sopenharmony_ci	if (request_ack)
2358c2ecf20Sopenharmony_ci		msg->header.flags |= VHOST_USER_FLAG_NEED_REPLY;
2368c2ecf20Sopenharmony_ci
2378c2ecf20Sopenharmony_ci	spin_lock_irqsave(&vu_dev->sock_lock, flags);
2388c2ecf20Sopenharmony_ci	rc = full_sendmsg_fds(vu_dev->sock, msg, size, fds, num_fds);
2398c2ecf20Sopenharmony_ci	if (rc < 0)
2408c2ecf20Sopenharmony_ci		goto out;
2418c2ecf20Sopenharmony_ci
2428c2ecf20Sopenharmony_ci	if (request_ack) {
2438c2ecf20Sopenharmony_ci		uint64_t status;
2448c2ecf20Sopenharmony_ci
2458c2ecf20Sopenharmony_ci		rc = vhost_user_recv_u64(vu_dev, &status);
2468c2ecf20Sopenharmony_ci		if (rc)
2478c2ecf20Sopenharmony_ci			goto out;
2488c2ecf20Sopenharmony_ci
2498c2ecf20Sopenharmony_ci		if (status) {
2508c2ecf20Sopenharmony_ci			vu_err(vu_dev, "slave reports error: %llu\n", status);
2518c2ecf20Sopenharmony_ci			rc = -EIO;
2528c2ecf20Sopenharmony_ci			goto out;
2538c2ecf20Sopenharmony_ci		}
2548c2ecf20Sopenharmony_ci	}
2558c2ecf20Sopenharmony_ci
2568c2ecf20Sopenharmony_ciout:
2578c2ecf20Sopenharmony_ci	spin_unlock_irqrestore(&vu_dev->sock_lock, flags);
2588c2ecf20Sopenharmony_ci	return rc;
2598c2ecf20Sopenharmony_ci}
2608c2ecf20Sopenharmony_ci
2618c2ecf20Sopenharmony_cistatic int vhost_user_send_no_payload(struct virtio_uml_device *vu_dev,
2628c2ecf20Sopenharmony_ci				      bool need_response, u32 request)
2638c2ecf20Sopenharmony_ci{
2648c2ecf20Sopenharmony_ci	struct vhost_user_msg msg = {
2658c2ecf20Sopenharmony_ci		.header.request = request,
2668c2ecf20Sopenharmony_ci	};
2678c2ecf20Sopenharmony_ci
2688c2ecf20Sopenharmony_ci	return vhost_user_send(vu_dev, need_response, &msg, NULL, 0);
2698c2ecf20Sopenharmony_ci}
2708c2ecf20Sopenharmony_ci
2718c2ecf20Sopenharmony_cistatic int vhost_user_send_no_payload_fd(struct virtio_uml_device *vu_dev,
2728c2ecf20Sopenharmony_ci					 u32 request, int fd)
2738c2ecf20Sopenharmony_ci{
2748c2ecf20Sopenharmony_ci	struct vhost_user_msg msg = {
2758c2ecf20Sopenharmony_ci		.header.request = request,
2768c2ecf20Sopenharmony_ci	};
2778c2ecf20Sopenharmony_ci
2788c2ecf20Sopenharmony_ci	return vhost_user_send(vu_dev, false, &msg, &fd, 1);
2798c2ecf20Sopenharmony_ci}
2808c2ecf20Sopenharmony_ci
2818c2ecf20Sopenharmony_cistatic int vhost_user_send_u64(struct virtio_uml_device *vu_dev,
2828c2ecf20Sopenharmony_ci			       u32 request, u64 value)
2838c2ecf20Sopenharmony_ci{
2848c2ecf20Sopenharmony_ci	struct vhost_user_msg msg = {
2858c2ecf20Sopenharmony_ci		.header.request = request,
2868c2ecf20Sopenharmony_ci		.header.size = sizeof(msg.payload.integer),
2878c2ecf20Sopenharmony_ci		.payload.integer = value,
2888c2ecf20Sopenharmony_ci	};
2898c2ecf20Sopenharmony_ci
2908c2ecf20Sopenharmony_ci	return vhost_user_send(vu_dev, false, &msg, NULL, 0);
2918c2ecf20Sopenharmony_ci}
2928c2ecf20Sopenharmony_ci
2938c2ecf20Sopenharmony_cistatic int vhost_user_set_owner(struct virtio_uml_device *vu_dev)
2948c2ecf20Sopenharmony_ci{
2958c2ecf20Sopenharmony_ci	return vhost_user_send_no_payload(vu_dev, false, VHOST_USER_SET_OWNER);
2968c2ecf20Sopenharmony_ci}
2978c2ecf20Sopenharmony_ci
2988c2ecf20Sopenharmony_cistatic int vhost_user_get_features(struct virtio_uml_device *vu_dev,
2998c2ecf20Sopenharmony_ci				   u64 *features)
3008c2ecf20Sopenharmony_ci{
3018c2ecf20Sopenharmony_ci	int rc = vhost_user_send_no_payload(vu_dev, true,
3028c2ecf20Sopenharmony_ci					    VHOST_USER_GET_FEATURES);
3038c2ecf20Sopenharmony_ci
3048c2ecf20Sopenharmony_ci	if (rc)
3058c2ecf20Sopenharmony_ci		return rc;
3068c2ecf20Sopenharmony_ci	return vhost_user_recv_u64(vu_dev, features);
3078c2ecf20Sopenharmony_ci}
3088c2ecf20Sopenharmony_ci
3098c2ecf20Sopenharmony_cistatic int vhost_user_set_features(struct virtio_uml_device *vu_dev,
3108c2ecf20Sopenharmony_ci				   u64 features)
3118c2ecf20Sopenharmony_ci{
3128c2ecf20Sopenharmony_ci	return vhost_user_send_u64(vu_dev, VHOST_USER_SET_FEATURES, features);
3138c2ecf20Sopenharmony_ci}
3148c2ecf20Sopenharmony_ci
3158c2ecf20Sopenharmony_cistatic int vhost_user_get_protocol_features(struct virtio_uml_device *vu_dev,
3168c2ecf20Sopenharmony_ci					    u64 *protocol_features)
3178c2ecf20Sopenharmony_ci{
3188c2ecf20Sopenharmony_ci	int rc = vhost_user_send_no_payload(vu_dev, true,
3198c2ecf20Sopenharmony_ci			VHOST_USER_GET_PROTOCOL_FEATURES);
3208c2ecf20Sopenharmony_ci
3218c2ecf20Sopenharmony_ci	if (rc)
3228c2ecf20Sopenharmony_ci		return rc;
3238c2ecf20Sopenharmony_ci	return vhost_user_recv_u64(vu_dev, protocol_features);
3248c2ecf20Sopenharmony_ci}
3258c2ecf20Sopenharmony_ci
3268c2ecf20Sopenharmony_cistatic int vhost_user_set_protocol_features(struct virtio_uml_device *vu_dev,
3278c2ecf20Sopenharmony_ci					    u64 protocol_features)
3288c2ecf20Sopenharmony_ci{
3298c2ecf20Sopenharmony_ci	return vhost_user_send_u64(vu_dev, VHOST_USER_SET_PROTOCOL_FEATURES,
3308c2ecf20Sopenharmony_ci				   protocol_features);
3318c2ecf20Sopenharmony_ci}
3328c2ecf20Sopenharmony_ci
3338c2ecf20Sopenharmony_cistatic void vhost_user_reply(struct virtio_uml_device *vu_dev,
3348c2ecf20Sopenharmony_ci			     struct vhost_user_msg *msg, int response)
3358c2ecf20Sopenharmony_ci{
3368c2ecf20Sopenharmony_ci	struct vhost_user_msg reply = {
3378c2ecf20Sopenharmony_ci		.payload.integer = response,
3388c2ecf20Sopenharmony_ci	};
3398c2ecf20Sopenharmony_ci	size_t size = sizeof(reply.header) + sizeof(reply.payload.integer);
3408c2ecf20Sopenharmony_ci	int rc;
3418c2ecf20Sopenharmony_ci
3428c2ecf20Sopenharmony_ci	reply.header = msg->header;
3438c2ecf20Sopenharmony_ci	reply.header.flags &= ~VHOST_USER_FLAG_NEED_REPLY;
3448c2ecf20Sopenharmony_ci	reply.header.flags |= VHOST_USER_FLAG_REPLY;
3458c2ecf20Sopenharmony_ci	reply.header.size = sizeof(reply.payload.integer);
3468c2ecf20Sopenharmony_ci
3478c2ecf20Sopenharmony_ci	rc = full_sendmsg_fds(vu_dev->req_fd, &reply, size, NULL, 0);
3488c2ecf20Sopenharmony_ci
3498c2ecf20Sopenharmony_ci	if (rc)
3508c2ecf20Sopenharmony_ci		vu_err(vu_dev,
3518c2ecf20Sopenharmony_ci		       "sending reply to slave request failed: %d (size %zu)\n",
3528c2ecf20Sopenharmony_ci		       rc, size);
3538c2ecf20Sopenharmony_ci}
3548c2ecf20Sopenharmony_ci
3558c2ecf20Sopenharmony_cistatic irqreturn_t vu_req_interrupt(int irq, void *data)
3568c2ecf20Sopenharmony_ci{
3578c2ecf20Sopenharmony_ci	struct virtio_uml_device *vu_dev = data;
3588c2ecf20Sopenharmony_ci	struct virtqueue *vq;
3598c2ecf20Sopenharmony_ci	int response = 1;
3608c2ecf20Sopenharmony_ci	struct {
3618c2ecf20Sopenharmony_ci		struct vhost_user_msg msg;
3628c2ecf20Sopenharmony_ci		u8 extra_payload[512];
3638c2ecf20Sopenharmony_ci	} msg;
3648c2ecf20Sopenharmony_ci	int rc;
3658c2ecf20Sopenharmony_ci
3668c2ecf20Sopenharmony_ci	rc = vhost_user_recv_req(vu_dev, &msg.msg,
3678c2ecf20Sopenharmony_ci				 sizeof(msg.msg.payload) +
3688c2ecf20Sopenharmony_ci				 sizeof(msg.extra_payload));
3698c2ecf20Sopenharmony_ci
3708c2ecf20Sopenharmony_ci	if (rc)
3718c2ecf20Sopenharmony_ci		return IRQ_NONE;
3728c2ecf20Sopenharmony_ci
3738c2ecf20Sopenharmony_ci	switch (msg.msg.header.request) {
3748c2ecf20Sopenharmony_ci	case VHOST_USER_SLAVE_CONFIG_CHANGE_MSG:
3758c2ecf20Sopenharmony_ci		virtio_config_changed(&vu_dev->vdev);
3768c2ecf20Sopenharmony_ci		response = 0;
3778c2ecf20Sopenharmony_ci		break;
3788c2ecf20Sopenharmony_ci	case VHOST_USER_SLAVE_VRING_CALL:
3798c2ecf20Sopenharmony_ci		virtio_device_for_each_vq((&vu_dev->vdev), vq) {
3808c2ecf20Sopenharmony_ci			if (vq->index == msg.msg.payload.vring_state.index) {
3818c2ecf20Sopenharmony_ci				response = 0;
3828c2ecf20Sopenharmony_ci				vring_interrupt(0 /* ignored */, vq);
3838c2ecf20Sopenharmony_ci				break;
3848c2ecf20Sopenharmony_ci			}
3858c2ecf20Sopenharmony_ci		}
3868c2ecf20Sopenharmony_ci		break;
3878c2ecf20Sopenharmony_ci	case VHOST_USER_SLAVE_IOTLB_MSG:
3888c2ecf20Sopenharmony_ci		/* not supported - VIRTIO_F_ACCESS_PLATFORM */
3898c2ecf20Sopenharmony_ci	case VHOST_USER_SLAVE_VRING_HOST_NOTIFIER_MSG:
3908c2ecf20Sopenharmony_ci		/* not supported - VHOST_USER_PROTOCOL_F_HOST_NOTIFIER */
3918c2ecf20Sopenharmony_ci	default:
3928c2ecf20Sopenharmony_ci		vu_err(vu_dev, "unexpected slave request %d\n",
3938c2ecf20Sopenharmony_ci		       msg.msg.header.request);
3948c2ecf20Sopenharmony_ci	}
3958c2ecf20Sopenharmony_ci
3968c2ecf20Sopenharmony_ci	if (msg.msg.header.flags & VHOST_USER_FLAG_NEED_REPLY)
3978c2ecf20Sopenharmony_ci		vhost_user_reply(vu_dev, &msg.msg, response);
3988c2ecf20Sopenharmony_ci
3998c2ecf20Sopenharmony_ci	return IRQ_HANDLED;
4008c2ecf20Sopenharmony_ci}
4018c2ecf20Sopenharmony_ci
4028c2ecf20Sopenharmony_cistatic int vhost_user_init_slave_req(struct virtio_uml_device *vu_dev)
4038c2ecf20Sopenharmony_ci{
4048c2ecf20Sopenharmony_ci	int rc, req_fds[2];
4058c2ecf20Sopenharmony_ci
4068c2ecf20Sopenharmony_ci	/* Use a pipe for slave req fd, SIGIO is not supported for eventfd */
4078c2ecf20Sopenharmony_ci	rc = os_pipe(req_fds, true, true);
4088c2ecf20Sopenharmony_ci	if (rc < 0)
4098c2ecf20Sopenharmony_ci		return rc;
4108c2ecf20Sopenharmony_ci	vu_dev->req_fd = req_fds[0];
4118c2ecf20Sopenharmony_ci
4128c2ecf20Sopenharmony_ci	rc = um_request_irq(VIRTIO_IRQ, vu_dev->req_fd, IRQ_READ,
4138c2ecf20Sopenharmony_ci			    vu_req_interrupt, IRQF_SHARED,
4148c2ecf20Sopenharmony_ci			    vu_dev->pdev->name, vu_dev);
4158c2ecf20Sopenharmony_ci	if (rc)
4168c2ecf20Sopenharmony_ci		goto err_close;
4178c2ecf20Sopenharmony_ci
4188c2ecf20Sopenharmony_ci	rc = vhost_user_send_no_payload_fd(vu_dev, VHOST_USER_SET_SLAVE_REQ_FD,
4198c2ecf20Sopenharmony_ci					   req_fds[1]);
4208c2ecf20Sopenharmony_ci	if (rc)
4218c2ecf20Sopenharmony_ci		goto err_free_irq;
4228c2ecf20Sopenharmony_ci
4238c2ecf20Sopenharmony_ci	goto out;
4248c2ecf20Sopenharmony_ci
4258c2ecf20Sopenharmony_cierr_free_irq:
4268c2ecf20Sopenharmony_ci	um_free_irq(VIRTIO_IRQ, vu_dev);
4278c2ecf20Sopenharmony_cierr_close:
4288c2ecf20Sopenharmony_ci	os_close_file(req_fds[0]);
4298c2ecf20Sopenharmony_ciout:
4308c2ecf20Sopenharmony_ci	/* Close unused write end of request fds */
4318c2ecf20Sopenharmony_ci	os_close_file(req_fds[1]);
4328c2ecf20Sopenharmony_ci	return rc;
4338c2ecf20Sopenharmony_ci}
4348c2ecf20Sopenharmony_ci
4358c2ecf20Sopenharmony_cistatic int vhost_user_init(struct virtio_uml_device *vu_dev)
4368c2ecf20Sopenharmony_ci{
4378c2ecf20Sopenharmony_ci	int rc = vhost_user_set_owner(vu_dev);
4388c2ecf20Sopenharmony_ci
4398c2ecf20Sopenharmony_ci	if (rc)
4408c2ecf20Sopenharmony_ci		return rc;
4418c2ecf20Sopenharmony_ci	rc = vhost_user_get_features(vu_dev, &vu_dev->features);
4428c2ecf20Sopenharmony_ci	if (rc)
4438c2ecf20Sopenharmony_ci		return rc;
4448c2ecf20Sopenharmony_ci
4458c2ecf20Sopenharmony_ci	if (vu_dev->features & BIT_ULL(VHOST_USER_F_PROTOCOL_FEATURES)) {
4468c2ecf20Sopenharmony_ci		rc = vhost_user_get_protocol_features(vu_dev,
4478c2ecf20Sopenharmony_ci				&vu_dev->protocol_features);
4488c2ecf20Sopenharmony_ci		if (rc)
4498c2ecf20Sopenharmony_ci			return rc;
4508c2ecf20Sopenharmony_ci		vu_dev->protocol_features &= VHOST_USER_SUPPORTED_PROTOCOL_F;
4518c2ecf20Sopenharmony_ci		rc = vhost_user_set_protocol_features(vu_dev,
4528c2ecf20Sopenharmony_ci				vu_dev->protocol_features);
4538c2ecf20Sopenharmony_ci		if (rc)
4548c2ecf20Sopenharmony_ci			return rc;
4558c2ecf20Sopenharmony_ci	}
4568c2ecf20Sopenharmony_ci
4578c2ecf20Sopenharmony_ci	if (vu_dev->protocol_features &
4588c2ecf20Sopenharmony_ci			BIT_ULL(VHOST_USER_PROTOCOL_F_SLAVE_REQ)) {
4598c2ecf20Sopenharmony_ci		rc = vhost_user_init_slave_req(vu_dev);
4608c2ecf20Sopenharmony_ci		if (rc)
4618c2ecf20Sopenharmony_ci			return rc;
4628c2ecf20Sopenharmony_ci	}
4638c2ecf20Sopenharmony_ci
4648c2ecf20Sopenharmony_ci	return 0;
4658c2ecf20Sopenharmony_ci}
4668c2ecf20Sopenharmony_ci
4678c2ecf20Sopenharmony_cistatic void vhost_user_get_config(struct virtio_uml_device *vu_dev,
4688c2ecf20Sopenharmony_ci				  u32 offset, void *buf, u32 len)
4698c2ecf20Sopenharmony_ci{
4708c2ecf20Sopenharmony_ci	u32 cfg_size = offset + len;
4718c2ecf20Sopenharmony_ci	struct vhost_user_msg *msg;
4728c2ecf20Sopenharmony_ci	size_t payload_size = sizeof(msg->payload.config) + cfg_size;
4738c2ecf20Sopenharmony_ci	size_t msg_size = sizeof(msg->header) + payload_size;
4748c2ecf20Sopenharmony_ci	int rc;
4758c2ecf20Sopenharmony_ci
4768c2ecf20Sopenharmony_ci	if (!(vu_dev->protocol_features &
4778c2ecf20Sopenharmony_ci	      BIT_ULL(VHOST_USER_PROTOCOL_F_CONFIG)))
4788c2ecf20Sopenharmony_ci		return;
4798c2ecf20Sopenharmony_ci
4808c2ecf20Sopenharmony_ci	msg = kzalloc(msg_size, GFP_KERNEL);
4818c2ecf20Sopenharmony_ci	if (!msg)
4828c2ecf20Sopenharmony_ci		return;
4838c2ecf20Sopenharmony_ci	msg->header.request = VHOST_USER_GET_CONFIG;
4848c2ecf20Sopenharmony_ci	msg->header.size = payload_size;
4858c2ecf20Sopenharmony_ci	msg->payload.config.offset = 0;
4868c2ecf20Sopenharmony_ci	msg->payload.config.size = cfg_size;
4878c2ecf20Sopenharmony_ci
4888c2ecf20Sopenharmony_ci	rc = vhost_user_send(vu_dev, true, msg, NULL, 0);
4898c2ecf20Sopenharmony_ci	if (rc) {
4908c2ecf20Sopenharmony_ci		vu_err(vu_dev, "sending VHOST_USER_GET_CONFIG failed: %d\n",
4918c2ecf20Sopenharmony_ci		       rc);
4928c2ecf20Sopenharmony_ci		goto free;
4938c2ecf20Sopenharmony_ci	}
4948c2ecf20Sopenharmony_ci
4958c2ecf20Sopenharmony_ci	rc = vhost_user_recv_resp(vu_dev, msg, msg_size);
4968c2ecf20Sopenharmony_ci	if (rc) {
4978c2ecf20Sopenharmony_ci		vu_err(vu_dev,
4988c2ecf20Sopenharmony_ci		       "receiving VHOST_USER_GET_CONFIG response failed: %d\n",
4998c2ecf20Sopenharmony_ci		       rc);
5008c2ecf20Sopenharmony_ci		goto free;
5018c2ecf20Sopenharmony_ci	}
5028c2ecf20Sopenharmony_ci
5038c2ecf20Sopenharmony_ci	if (msg->header.size != payload_size ||
5048c2ecf20Sopenharmony_ci	    msg->payload.config.size != cfg_size) {
5058c2ecf20Sopenharmony_ci		rc = -EPROTO;
5068c2ecf20Sopenharmony_ci		vu_err(vu_dev,
5078c2ecf20Sopenharmony_ci		       "Invalid VHOST_USER_GET_CONFIG sizes (payload %d expected %zu, config %u expected %u)\n",
5088c2ecf20Sopenharmony_ci		       msg->header.size, payload_size,
5098c2ecf20Sopenharmony_ci		       msg->payload.config.size, cfg_size);
5108c2ecf20Sopenharmony_ci		goto free;
5118c2ecf20Sopenharmony_ci	}
5128c2ecf20Sopenharmony_ci	memcpy(buf, msg->payload.config.payload + offset, len);
5138c2ecf20Sopenharmony_ci
5148c2ecf20Sopenharmony_cifree:
5158c2ecf20Sopenharmony_ci	kfree(msg);
5168c2ecf20Sopenharmony_ci}
5178c2ecf20Sopenharmony_ci
5188c2ecf20Sopenharmony_cistatic void vhost_user_set_config(struct virtio_uml_device *vu_dev,
5198c2ecf20Sopenharmony_ci				  u32 offset, const void *buf, u32 len)
5208c2ecf20Sopenharmony_ci{
5218c2ecf20Sopenharmony_ci	struct vhost_user_msg *msg;
5228c2ecf20Sopenharmony_ci	size_t payload_size = sizeof(msg->payload.config) + len;
5238c2ecf20Sopenharmony_ci	size_t msg_size = sizeof(msg->header) + payload_size;
5248c2ecf20Sopenharmony_ci	int rc;
5258c2ecf20Sopenharmony_ci
5268c2ecf20Sopenharmony_ci	if (!(vu_dev->protocol_features &
5278c2ecf20Sopenharmony_ci	      BIT_ULL(VHOST_USER_PROTOCOL_F_CONFIG)))
5288c2ecf20Sopenharmony_ci		return;
5298c2ecf20Sopenharmony_ci
5308c2ecf20Sopenharmony_ci	msg = kzalloc(msg_size, GFP_KERNEL);
5318c2ecf20Sopenharmony_ci	if (!msg)
5328c2ecf20Sopenharmony_ci		return;
5338c2ecf20Sopenharmony_ci	msg->header.request = VHOST_USER_SET_CONFIG;
5348c2ecf20Sopenharmony_ci	msg->header.size = payload_size;
5358c2ecf20Sopenharmony_ci	msg->payload.config.offset = offset;
5368c2ecf20Sopenharmony_ci	msg->payload.config.size = len;
5378c2ecf20Sopenharmony_ci	memcpy(msg->payload.config.payload, buf, len);
5388c2ecf20Sopenharmony_ci
5398c2ecf20Sopenharmony_ci	rc = vhost_user_send(vu_dev, false, msg, NULL, 0);
5408c2ecf20Sopenharmony_ci	if (rc)
5418c2ecf20Sopenharmony_ci		vu_err(vu_dev, "sending VHOST_USER_SET_CONFIG failed: %d\n",
5428c2ecf20Sopenharmony_ci		       rc);
5438c2ecf20Sopenharmony_ci
5448c2ecf20Sopenharmony_ci	kfree(msg);
5458c2ecf20Sopenharmony_ci}
5468c2ecf20Sopenharmony_ci
5478c2ecf20Sopenharmony_cistatic int vhost_user_init_mem_region(u64 addr, u64 size, int *fd_out,
5488c2ecf20Sopenharmony_ci				      struct vhost_user_mem_region *region_out)
5498c2ecf20Sopenharmony_ci{
5508c2ecf20Sopenharmony_ci	unsigned long long mem_offset;
5518c2ecf20Sopenharmony_ci	int rc = phys_mapping(addr, &mem_offset);
5528c2ecf20Sopenharmony_ci
5538c2ecf20Sopenharmony_ci	if (WARN(rc < 0, "phys_mapping of 0x%llx returned %d\n", addr, rc))
5548c2ecf20Sopenharmony_ci		return -EFAULT;
5558c2ecf20Sopenharmony_ci	*fd_out = rc;
5568c2ecf20Sopenharmony_ci	region_out->guest_addr = addr;
5578c2ecf20Sopenharmony_ci	region_out->user_addr = addr;
5588c2ecf20Sopenharmony_ci	region_out->size = size;
5598c2ecf20Sopenharmony_ci	region_out->mmap_offset = mem_offset;
5608c2ecf20Sopenharmony_ci
5618c2ecf20Sopenharmony_ci	/* Ensure mapping is valid for the entire region */
5628c2ecf20Sopenharmony_ci	rc = phys_mapping(addr + size - 1, &mem_offset);
5638c2ecf20Sopenharmony_ci	if (WARN(rc != *fd_out, "phys_mapping of 0x%llx failed: %d != %d\n",
5648c2ecf20Sopenharmony_ci		 addr + size - 1, rc, *fd_out))
5658c2ecf20Sopenharmony_ci		return -EFAULT;
5668c2ecf20Sopenharmony_ci	return 0;
5678c2ecf20Sopenharmony_ci}
5688c2ecf20Sopenharmony_ci
5698c2ecf20Sopenharmony_cistatic int vhost_user_set_mem_table(struct virtio_uml_device *vu_dev)
5708c2ecf20Sopenharmony_ci{
5718c2ecf20Sopenharmony_ci	struct vhost_user_msg msg = {
5728c2ecf20Sopenharmony_ci		.header.request = VHOST_USER_SET_MEM_TABLE,
5738c2ecf20Sopenharmony_ci		.header.size = sizeof(msg.payload.mem_regions),
5748c2ecf20Sopenharmony_ci		.payload.mem_regions.num = 1,
5758c2ecf20Sopenharmony_ci	};
5768c2ecf20Sopenharmony_ci	unsigned long reserved = uml_reserved - uml_physmem;
5778c2ecf20Sopenharmony_ci	int fds[2];
5788c2ecf20Sopenharmony_ci	int rc;
5798c2ecf20Sopenharmony_ci
5808c2ecf20Sopenharmony_ci	/*
5818c2ecf20Sopenharmony_ci	 * This is a bit tricky, see also the comment with setup_physmem().
5828c2ecf20Sopenharmony_ci	 *
5838c2ecf20Sopenharmony_ci	 * Essentially, setup_physmem() uses a file to mmap() our physmem,
5848c2ecf20Sopenharmony_ci	 * but the code and data we *already* have is omitted. To us, this
5858c2ecf20Sopenharmony_ci	 * is no difference, since they both become part of our address
5868c2ecf20Sopenharmony_ci	 * space and memory consumption. To somebody looking in from the
5878c2ecf20Sopenharmony_ci	 * outside, however, it is different because the part of our memory
5888c2ecf20Sopenharmony_ci	 * consumption that's already part of the binary (code/data) is not
5898c2ecf20Sopenharmony_ci	 * mapped from the file, so it's not visible to another mmap from
5908c2ecf20Sopenharmony_ci	 * the file descriptor.
5918c2ecf20Sopenharmony_ci	 *
5928c2ecf20Sopenharmony_ci	 * Thus, don't advertise this space to the vhost-user slave. This
5938c2ecf20Sopenharmony_ci	 * means that the slave will likely abort or similar when we give
5948c2ecf20Sopenharmony_ci	 * it an address from the hidden range, since it's not marked as
5958c2ecf20Sopenharmony_ci	 * a valid address, but at least that way we detect the issue and
5968c2ecf20Sopenharmony_ci	 * don't just have the slave read an all-zeroes buffer from the
5978c2ecf20Sopenharmony_ci	 * shared memory file, or write something there that we can never
5988c2ecf20Sopenharmony_ci	 * see (depending on the direction of the virtqueue traffic.)
5998c2ecf20Sopenharmony_ci	 *
6008c2ecf20Sopenharmony_ci	 * Since we usually don't want to use .text for virtio buffers,
6018c2ecf20Sopenharmony_ci	 * this effectively means that you cannot use
6028c2ecf20Sopenharmony_ci	 *  1) global variables, which are in the .bss and not in the shm
6038c2ecf20Sopenharmony_ci	 *     file-backed memory
6048c2ecf20Sopenharmony_ci	 *  2) the stack in some processes, depending on where they have
6058c2ecf20Sopenharmony_ci	 *     their stack (or maybe only no interrupt stack?)
6068c2ecf20Sopenharmony_ci	 *
6078c2ecf20Sopenharmony_ci	 * The stack is already not typically valid for DMA, so this isn't
6088c2ecf20Sopenharmony_ci	 * much of a restriction, but global variables might be encountered.
6098c2ecf20Sopenharmony_ci	 *
6108c2ecf20Sopenharmony_ci	 * It might be possible to fix it by copying around the data that's
6118c2ecf20Sopenharmony_ci	 * between bss_start and where we map the file now, but it's not
6128c2ecf20Sopenharmony_ci	 * something that you typically encounter with virtio drivers, so
6138c2ecf20Sopenharmony_ci	 * it didn't seem worthwhile.
6148c2ecf20Sopenharmony_ci	 */
6158c2ecf20Sopenharmony_ci	rc = vhost_user_init_mem_region(reserved, physmem_size - reserved,
6168c2ecf20Sopenharmony_ci					&fds[0],
6178c2ecf20Sopenharmony_ci					&msg.payload.mem_regions.regions[0]);
6188c2ecf20Sopenharmony_ci
6198c2ecf20Sopenharmony_ci	if (rc < 0)
6208c2ecf20Sopenharmony_ci		return rc;
6218c2ecf20Sopenharmony_ci	if (highmem) {
6228c2ecf20Sopenharmony_ci		msg.payload.mem_regions.num++;
6238c2ecf20Sopenharmony_ci		rc = vhost_user_init_mem_region(__pa(end_iomem), highmem,
6248c2ecf20Sopenharmony_ci				&fds[1], &msg.payload.mem_regions.regions[1]);
6258c2ecf20Sopenharmony_ci		if (rc < 0)
6268c2ecf20Sopenharmony_ci			return rc;
6278c2ecf20Sopenharmony_ci	}
6288c2ecf20Sopenharmony_ci
6298c2ecf20Sopenharmony_ci	return vhost_user_send(vu_dev, false, &msg, fds,
6308c2ecf20Sopenharmony_ci			       msg.payload.mem_regions.num);
6318c2ecf20Sopenharmony_ci}
6328c2ecf20Sopenharmony_ci
6338c2ecf20Sopenharmony_cistatic int vhost_user_set_vring_state(struct virtio_uml_device *vu_dev,
6348c2ecf20Sopenharmony_ci				      u32 request, u32 index, u32 num)
6358c2ecf20Sopenharmony_ci{
6368c2ecf20Sopenharmony_ci	struct vhost_user_msg msg = {
6378c2ecf20Sopenharmony_ci		.header.request = request,
6388c2ecf20Sopenharmony_ci		.header.size = sizeof(msg.payload.vring_state),
6398c2ecf20Sopenharmony_ci		.payload.vring_state.index = index,
6408c2ecf20Sopenharmony_ci		.payload.vring_state.num = num,
6418c2ecf20Sopenharmony_ci	};
6428c2ecf20Sopenharmony_ci
6438c2ecf20Sopenharmony_ci	return vhost_user_send(vu_dev, false, &msg, NULL, 0);
6448c2ecf20Sopenharmony_ci}
6458c2ecf20Sopenharmony_ci
6468c2ecf20Sopenharmony_cistatic int vhost_user_set_vring_num(struct virtio_uml_device *vu_dev,
6478c2ecf20Sopenharmony_ci				    u32 index, u32 num)
6488c2ecf20Sopenharmony_ci{
6498c2ecf20Sopenharmony_ci	return vhost_user_set_vring_state(vu_dev, VHOST_USER_SET_VRING_NUM,
6508c2ecf20Sopenharmony_ci					  index, num);
6518c2ecf20Sopenharmony_ci}
6528c2ecf20Sopenharmony_ci
6538c2ecf20Sopenharmony_cistatic int vhost_user_set_vring_base(struct virtio_uml_device *vu_dev,
6548c2ecf20Sopenharmony_ci				     u32 index, u32 offset)
6558c2ecf20Sopenharmony_ci{
6568c2ecf20Sopenharmony_ci	return vhost_user_set_vring_state(vu_dev, VHOST_USER_SET_VRING_BASE,
6578c2ecf20Sopenharmony_ci					  index, offset);
6588c2ecf20Sopenharmony_ci}
6598c2ecf20Sopenharmony_ci
6608c2ecf20Sopenharmony_cistatic int vhost_user_set_vring_addr(struct virtio_uml_device *vu_dev,
6618c2ecf20Sopenharmony_ci				     u32 index, u64 desc, u64 used, u64 avail,
6628c2ecf20Sopenharmony_ci				     u64 log)
6638c2ecf20Sopenharmony_ci{
6648c2ecf20Sopenharmony_ci	struct vhost_user_msg msg = {
6658c2ecf20Sopenharmony_ci		.header.request = VHOST_USER_SET_VRING_ADDR,
6668c2ecf20Sopenharmony_ci		.header.size = sizeof(msg.payload.vring_addr),
6678c2ecf20Sopenharmony_ci		.payload.vring_addr.index = index,
6688c2ecf20Sopenharmony_ci		.payload.vring_addr.desc = desc,
6698c2ecf20Sopenharmony_ci		.payload.vring_addr.used = used,
6708c2ecf20Sopenharmony_ci		.payload.vring_addr.avail = avail,
6718c2ecf20Sopenharmony_ci		.payload.vring_addr.log = log,
6728c2ecf20Sopenharmony_ci	};
6738c2ecf20Sopenharmony_ci
6748c2ecf20Sopenharmony_ci	return vhost_user_send(vu_dev, false, &msg, NULL, 0);
6758c2ecf20Sopenharmony_ci}
6768c2ecf20Sopenharmony_ci
6778c2ecf20Sopenharmony_cistatic int vhost_user_set_vring_fd(struct virtio_uml_device *vu_dev,
6788c2ecf20Sopenharmony_ci				   u32 request, int index, int fd)
6798c2ecf20Sopenharmony_ci{
6808c2ecf20Sopenharmony_ci	struct vhost_user_msg msg = {
6818c2ecf20Sopenharmony_ci		.header.request = request,
6828c2ecf20Sopenharmony_ci		.header.size = sizeof(msg.payload.integer),
6838c2ecf20Sopenharmony_ci		.payload.integer = index,
6848c2ecf20Sopenharmony_ci	};
6858c2ecf20Sopenharmony_ci
6868c2ecf20Sopenharmony_ci	if (index & ~VHOST_USER_VRING_INDEX_MASK)
6878c2ecf20Sopenharmony_ci		return -EINVAL;
6888c2ecf20Sopenharmony_ci	if (fd < 0) {
6898c2ecf20Sopenharmony_ci		msg.payload.integer |= VHOST_USER_VRING_POLL_MASK;
6908c2ecf20Sopenharmony_ci		return vhost_user_send(vu_dev, false, &msg, NULL, 0);
6918c2ecf20Sopenharmony_ci	}
6928c2ecf20Sopenharmony_ci	return vhost_user_send(vu_dev, false, &msg, &fd, 1);
6938c2ecf20Sopenharmony_ci}
6948c2ecf20Sopenharmony_ci
6958c2ecf20Sopenharmony_cistatic int vhost_user_set_vring_call(struct virtio_uml_device *vu_dev,
6968c2ecf20Sopenharmony_ci				     int index, int fd)
6978c2ecf20Sopenharmony_ci{
6988c2ecf20Sopenharmony_ci	return vhost_user_set_vring_fd(vu_dev, VHOST_USER_SET_VRING_CALL,
6998c2ecf20Sopenharmony_ci				       index, fd);
7008c2ecf20Sopenharmony_ci}
7018c2ecf20Sopenharmony_ci
7028c2ecf20Sopenharmony_cistatic int vhost_user_set_vring_kick(struct virtio_uml_device *vu_dev,
7038c2ecf20Sopenharmony_ci				     int index, int fd)
7048c2ecf20Sopenharmony_ci{
7058c2ecf20Sopenharmony_ci	return vhost_user_set_vring_fd(vu_dev, VHOST_USER_SET_VRING_KICK,
7068c2ecf20Sopenharmony_ci				       index, fd);
7078c2ecf20Sopenharmony_ci}
7088c2ecf20Sopenharmony_ci
7098c2ecf20Sopenharmony_cistatic int vhost_user_set_vring_enable(struct virtio_uml_device *vu_dev,
7108c2ecf20Sopenharmony_ci				       u32 index, bool enable)
7118c2ecf20Sopenharmony_ci{
7128c2ecf20Sopenharmony_ci	if (!(vu_dev->features & BIT_ULL(VHOST_USER_F_PROTOCOL_FEATURES)))
7138c2ecf20Sopenharmony_ci		return 0;
7148c2ecf20Sopenharmony_ci
7158c2ecf20Sopenharmony_ci	return vhost_user_set_vring_state(vu_dev, VHOST_USER_SET_VRING_ENABLE,
7168c2ecf20Sopenharmony_ci					  index, enable);
7178c2ecf20Sopenharmony_ci}
7188c2ecf20Sopenharmony_ci
7198c2ecf20Sopenharmony_ci
7208c2ecf20Sopenharmony_ci/* Virtio interface */
7218c2ecf20Sopenharmony_ci
7228c2ecf20Sopenharmony_cistatic bool vu_notify(struct virtqueue *vq)
7238c2ecf20Sopenharmony_ci{
7248c2ecf20Sopenharmony_ci	struct virtio_uml_vq_info *info = vq->priv;
7258c2ecf20Sopenharmony_ci	const uint64_t n = 1;
7268c2ecf20Sopenharmony_ci	int rc;
7278c2ecf20Sopenharmony_ci
7288c2ecf20Sopenharmony_ci	time_travel_propagate_time();
7298c2ecf20Sopenharmony_ci
7308c2ecf20Sopenharmony_ci	if (info->kick_fd < 0) {
7318c2ecf20Sopenharmony_ci		struct virtio_uml_device *vu_dev;
7328c2ecf20Sopenharmony_ci
7338c2ecf20Sopenharmony_ci		vu_dev = to_virtio_uml_device(vq->vdev);
7348c2ecf20Sopenharmony_ci
7358c2ecf20Sopenharmony_ci		return vhost_user_set_vring_state(vu_dev, VHOST_USER_VRING_KICK,
7368c2ecf20Sopenharmony_ci						  vq->index, 0) == 0;
7378c2ecf20Sopenharmony_ci	}
7388c2ecf20Sopenharmony_ci
7398c2ecf20Sopenharmony_ci	do {
7408c2ecf20Sopenharmony_ci		rc = os_write_file(info->kick_fd, &n, sizeof(n));
7418c2ecf20Sopenharmony_ci	} while (rc == -EINTR);
7428c2ecf20Sopenharmony_ci	return !WARN(rc != sizeof(n), "write returned %d\n", rc);
7438c2ecf20Sopenharmony_ci}
7448c2ecf20Sopenharmony_ci
7458c2ecf20Sopenharmony_cistatic irqreturn_t vu_interrupt(int irq, void *opaque)
7468c2ecf20Sopenharmony_ci{
7478c2ecf20Sopenharmony_ci	struct virtqueue *vq = opaque;
7488c2ecf20Sopenharmony_ci	struct virtio_uml_vq_info *info = vq->priv;
7498c2ecf20Sopenharmony_ci	uint64_t n;
7508c2ecf20Sopenharmony_ci	int rc;
7518c2ecf20Sopenharmony_ci	irqreturn_t ret = IRQ_NONE;
7528c2ecf20Sopenharmony_ci
7538c2ecf20Sopenharmony_ci	do {
7548c2ecf20Sopenharmony_ci		rc = os_read_file(info->call_fd, &n, sizeof(n));
7558c2ecf20Sopenharmony_ci		if (rc == sizeof(n))
7568c2ecf20Sopenharmony_ci			ret |= vring_interrupt(irq, vq);
7578c2ecf20Sopenharmony_ci	} while (rc == sizeof(n) || rc == -EINTR);
7588c2ecf20Sopenharmony_ci	WARN(rc != -EAGAIN, "read returned %d\n", rc);
7598c2ecf20Sopenharmony_ci	return ret;
7608c2ecf20Sopenharmony_ci}
7618c2ecf20Sopenharmony_ci
7628c2ecf20Sopenharmony_ci
7638c2ecf20Sopenharmony_cistatic void vu_get(struct virtio_device *vdev, unsigned offset,
7648c2ecf20Sopenharmony_ci		   void *buf, unsigned len)
7658c2ecf20Sopenharmony_ci{
7668c2ecf20Sopenharmony_ci	struct virtio_uml_device *vu_dev = to_virtio_uml_device(vdev);
7678c2ecf20Sopenharmony_ci
7688c2ecf20Sopenharmony_ci	vhost_user_get_config(vu_dev, offset, buf, len);
7698c2ecf20Sopenharmony_ci}
7708c2ecf20Sopenharmony_ci
7718c2ecf20Sopenharmony_cistatic void vu_set(struct virtio_device *vdev, unsigned offset,
7728c2ecf20Sopenharmony_ci		   const void *buf, unsigned len)
7738c2ecf20Sopenharmony_ci{
7748c2ecf20Sopenharmony_ci	struct virtio_uml_device *vu_dev = to_virtio_uml_device(vdev);
7758c2ecf20Sopenharmony_ci
7768c2ecf20Sopenharmony_ci	vhost_user_set_config(vu_dev, offset, buf, len);
7778c2ecf20Sopenharmony_ci}
7788c2ecf20Sopenharmony_ci
7798c2ecf20Sopenharmony_cistatic u8 vu_get_status(struct virtio_device *vdev)
7808c2ecf20Sopenharmony_ci{
7818c2ecf20Sopenharmony_ci	struct virtio_uml_device *vu_dev = to_virtio_uml_device(vdev);
7828c2ecf20Sopenharmony_ci
7838c2ecf20Sopenharmony_ci	return vu_dev->status;
7848c2ecf20Sopenharmony_ci}
7858c2ecf20Sopenharmony_ci
7868c2ecf20Sopenharmony_cistatic void vu_set_status(struct virtio_device *vdev, u8 status)
7878c2ecf20Sopenharmony_ci{
7888c2ecf20Sopenharmony_ci	struct virtio_uml_device *vu_dev = to_virtio_uml_device(vdev);
7898c2ecf20Sopenharmony_ci
7908c2ecf20Sopenharmony_ci	vu_dev->status = status;
7918c2ecf20Sopenharmony_ci}
7928c2ecf20Sopenharmony_ci
7938c2ecf20Sopenharmony_cistatic void vu_reset(struct virtio_device *vdev)
7948c2ecf20Sopenharmony_ci{
7958c2ecf20Sopenharmony_ci	struct virtio_uml_device *vu_dev = to_virtio_uml_device(vdev);
7968c2ecf20Sopenharmony_ci
7978c2ecf20Sopenharmony_ci	vu_dev->status = 0;
7988c2ecf20Sopenharmony_ci}
7998c2ecf20Sopenharmony_ci
8008c2ecf20Sopenharmony_cistatic void vu_del_vq(struct virtqueue *vq)
8018c2ecf20Sopenharmony_ci{
8028c2ecf20Sopenharmony_ci	struct virtio_uml_vq_info *info = vq->priv;
8038c2ecf20Sopenharmony_ci
8048c2ecf20Sopenharmony_ci	if (info->call_fd >= 0) {
8058c2ecf20Sopenharmony_ci		um_free_irq(VIRTIO_IRQ, vq);
8068c2ecf20Sopenharmony_ci		os_close_file(info->call_fd);
8078c2ecf20Sopenharmony_ci	}
8088c2ecf20Sopenharmony_ci
8098c2ecf20Sopenharmony_ci	if (info->kick_fd >= 0)
8108c2ecf20Sopenharmony_ci		os_close_file(info->kick_fd);
8118c2ecf20Sopenharmony_ci
8128c2ecf20Sopenharmony_ci	vring_del_virtqueue(vq);
8138c2ecf20Sopenharmony_ci	kfree(info);
8148c2ecf20Sopenharmony_ci}
8158c2ecf20Sopenharmony_ci
8168c2ecf20Sopenharmony_cistatic void vu_del_vqs(struct virtio_device *vdev)
8178c2ecf20Sopenharmony_ci{
8188c2ecf20Sopenharmony_ci	struct virtio_uml_device *vu_dev = to_virtio_uml_device(vdev);
8198c2ecf20Sopenharmony_ci	struct virtqueue *vq, *n;
8208c2ecf20Sopenharmony_ci	u64 features;
8218c2ecf20Sopenharmony_ci
8228c2ecf20Sopenharmony_ci	/* Note: reverse order as a workaround to a decoding bug in snabb */
8238c2ecf20Sopenharmony_ci	list_for_each_entry_reverse(vq, &vdev->vqs, list)
8248c2ecf20Sopenharmony_ci		WARN_ON(vhost_user_set_vring_enable(vu_dev, vq->index, false));
8258c2ecf20Sopenharmony_ci
8268c2ecf20Sopenharmony_ci	/* Ensure previous messages have been processed */
8278c2ecf20Sopenharmony_ci	WARN_ON(vhost_user_get_features(vu_dev, &features));
8288c2ecf20Sopenharmony_ci
8298c2ecf20Sopenharmony_ci	list_for_each_entry_safe(vq, n, &vdev->vqs, list)
8308c2ecf20Sopenharmony_ci		vu_del_vq(vq);
8318c2ecf20Sopenharmony_ci}
8328c2ecf20Sopenharmony_ci
8338c2ecf20Sopenharmony_cistatic int vu_setup_vq_call_fd(struct virtio_uml_device *vu_dev,
8348c2ecf20Sopenharmony_ci			       struct virtqueue *vq)
8358c2ecf20Sopenharmony_ci{
8368c2ecf20Sopenharmony_ci	struct virtio_uml_vq_info *info = vq->priv;
8378c2ecf20Sopenharmony_ci	int call_fds[2];
8388c2ecf20Sopenharmony_ci	int rc;
8398c2ecf20Sopenharmony_ci
8408c2ecf20Sopenharmony_ci	/* no call FD needed/desired in this case */
8418c2ecf20Sopenharmony_ci	if (vu_dev->protocol_features &
8428c2ecf20Sopenharmony_ci			BIT_ULL(VHOST_USER_PROTOCOL_F_INBAND_NOTIFICATIONS) &&
8438c2ecf20Sopenharmony_ci	    vu_dev->protocol_features &
8448c2ecf20Sopenharmony_ci			BIT_ULL(VHOST_USER_PROTOCOL_F_SLAVE_REQ)) {
8458c2ecf20Sopenharmony_ci		info->call_fd = -1;
8468c2ecf20Sopenharmony_ci		return 0;
8478c2ecf20Sopenharmony_ci	}
8488c2ecf20Sopenharmony_ci
8498c2ecf20Sopenharmony_ci	/* Use a pipe for call fd, since SIGIO is not supported for eventfd */
8508c2ecf20Sopenharmony_ci	rc = os_pipe(call_fds, true, true);
8518c2ecf20Sopenharmony_ci	if (rc < 0)
8528c2ecf20Sopenharmony_ci		return rc;
8538c2ecf20Sopenharmony_ci
8548c2ecf20Sopenharmony_ci	info->call_fd = call_fds[0];
8558c2ecf20Sopenharmony_ci	rc = um_request_irq(VIRTIO_IRQ, info->call_fd, IRQ_READ,
8568c2ecf20Sopenharmony_ci			    vu_interrupt, IRQF_SHARED, info->name, vq);
8578c2ecf20Sopenharmony_ci	if (rc)
8588c2ecf20Sopenharmony_ci		goto close_both;
8598c2ecf20Sopenharmony_ci
8608c2ecf20Sopenharmony_ci	rc = vhost_user_set_vring_call(vu_dev, vq->index, call_fds[1]);
8618c2ecf20Sopenharmony_ci	if (rc)
8628c2ecf20Sopenharmony_ci		goto release_irq;
8638c2ecf20Sopenharmony_ci
8648c2ecf20Sopenharmony_ci	goto out;
8658c2ecf20Sopenharmony_ci
8668c2ecf20Sopenharmony_cirelease_irq:
8678c2ecf20Sopenharmony_ci	um_free_irq(VIRTIO_IRQ, vq);
8688c2ecf20Sopenharmony_ciclose_both:
8698c2ecf20Sopenharmony_ci	os_close_file(call_fds[0]);
8708c2ecf20Sopenharmony_ciout:
8718c2ecf20Sopenharmony_ci	/* Close (unused) write end of call fds */
8728c2ecf20Sopenharmony_ci	os_close_file(call_fds[1]);
8738c2ecf20Sopenharmony_ci
8748c2ecf20Sopenharmony_ci	return rc;
8758c2ecf20Sopenharmony_ci}
8768c2ecf20Sopenharmony_ci
8778c2ecf20Sopenharmony_ci#ifdef CONFIG_UML_TIME_TRAVEL_SUPPORT
8788c2ecf20Sopenharmony_cistatic void vu_defer_irq_handle(struct time_travel_event *d)
8798c2ecf20Sopenharmony_ci{
8808c2ecf20Sopenharmony_ci	struct virtio_uml_vq_info *info;
8818c2ecf20Sopenharmony_ci
8828c2ecf20Sopenharmony_ci	info = container_of(d, struct virtio_uml_vq_info, defer);
8838c2ecf20Sopenharmony_ci	info->callback(info->vq);
8848c2ecf20Sopenharmony_ci}
8858c2ecf20Sopenharmony_ci
8868c2ecf20Sopenharmony_cistatic void vu_defer_irq_callback(struct virtqueue *vq)
8878c2ecf20Sopenharmony_ci{
8888c2ecf20Sopenharmony_ci	struct virtio_uml_vq_info *info = vq->priv;
8898c2ecf20Sopenharmony_ci
8908c2ecf20Sopenharmony_ci	time_travel_add_irq_event(&info->defer);
8918c2ecf20Sopenharmony_ci}
8928c2ecf20Sopenharmony_ci#endif
8938c2ecf20Sopenharmony_ci
8948c2ecf20Sopenharmony_cistatic struct virtqueue *vu_setup_vq(struct virtio_device *vdev,
8958c2ecf20Sopenharmony_ci				     unsigned index, vq_callback_t *callback,
8968c2ecf20Sopenharmony_ci				     const char *name, bool ctx)
8978c2ecf20Sopenharmony_ci{
8988c2ecf20Sopenharmony_ci	struct virtio_uml_device *vu_dev = to_virtio_uml_device(vdev);
8998c2ecf20Sopenharmony_ci	struct platform_device *pdev = vu_dev->pdev;
9008c2ecf20Sopenharmony_ci	struct virtio_uml_vq_info *info;
9018c2ecf20Sopenharmony_ci	struct virtqueue *vq;
9028c2ecf20Sopenharmony_ci	int num = MAX_SUPPORTED_QUEUE_SIZE;
9038c2ecf20Sopenharmony_ci	int rc;
9048c2ecf20Sopenharmony_ci
9058c2ecf20Sopenharmony_ci	info = kzalloc(sizeof(*info), GFP_KERNEL);
9068c2ecf20Sopenharmony_ci	if (!info) {
9078c2ecf20Sopenharmony_ci		rc = -ENOMEM;
9088c2ecf20Sopenharmony_ci		goto error_kzalloc;
9098c2ecf20Sopenharmony_ci	}
9108c2ecf20Sopenharmony_ci	snprintf(info->name, sizeof(info->name), "%s.%d-%s", pdev->name,
9118c2ecf20Sopenharmony_ci		 pdev->id, name);
9128c2ecf20Sopenharmony_ci
9138c2ecf20Sopenharmony_ci#ifdef CONFIG_UML_TIME_TRAVEL_SUPPORT
9148c2ecf20Sopenharmony_ci	/*
9158c2ecf20Sopenharmony_ci	 * When we get an interrupt, we must bounce it through the simulation
9168c2ecf20Sopenharmony_ci	 * calendar (the simtime device), except for the simtime device itself
9178c2ecf20Sopenharmony_ci	 * since that's part of the simulation control.
9188c2ecf20Sopenharmony_ci	 */
9198c2ecf20Sopenharmony_ci	if (time_travel_mode == TT_MODE_EXTERNAL && callback) {
9208c2ecf20Sopenharmony_ci		info->callback = callback;
9218c2ecf20Sopenharmony_ci		callback = vu_defer_irq_callback;
9228c2ecf20Sopenharmony_ci		time_travel_set_event_fn(&info->defer, vu_defer_irq_handle);
9238c2ecf20Sopenharmony_ci	}
9248c2ecf20Sopenharmony_ci#endif
9258c2ecf20Sopenharmony_ci
9268c2ecf20Sopenharmony_ci	vq = vring_create_virtqueue(index, num, PAGE_SIZE, vdev, true, true,
9278c2ecf20Sopenharmony_ci				    ctx, vu_notify, callback, info->name);
9288c2ecf20Sopenharmony_ci	if (!vq) {
9298c2ecf20Sopenharmony_ci		rc = -ENOMEM;
9308c2ecf20Sopenharmony_ci		goto error_create;
9318c2ecf20Sopenharmony_ci	}
9328c2ecf20Sopenharmony_ci	vq->priv = info;
9338c2ecf20Sopenharmony_ci	num = virtqueue_get_vring_size(vq);
9348c2ecf20Sopenharmony_ci#ifdef CONFIG_UML_TIME_TRAVEL_SUPPORT
9358c2ecf20Sopenharmony_ci	info->vq = vq;
9368c2ecf20Sopenharmony_ci#endif
9378c2ecf20Sopenharmony_ci
9388c2ecf20Sopenharmony_ci	if (vu_dev->protocol_features &
9398c2ecf20Sopenharmony_ci			BIT_ULL(VHOST_USER_PROTOCOL_F_INBAND_NOTIFICATIONS)) {
9408c2ecf20Sopenharmony_ci		info->kick_fd = -1;
9418c2ecf20Sopenharmony_ci	} else {
9428c2ecf20Sopenharmony_ci		rc = os_eventfd(0, 0);
9438c2ecf20Sopenharmony_ci		if (rc < 0)
9448c2ecf20Sopenharmony_ci			goto error_kick;
9458c2ecf20Sopenharmony_ci		info->kick_fd = rc;
9468c2ecf20Sopenharmony_ci	}
9478c2ecf20Sopenharmony_ci
9488c2ecf20Sopenharmony_ci	rc = vu_setup_vq_call_fd(vu_dev, vq);
9498c2ecf20Sopenharmony_ci	if (rc)
9508c2ecf20Sopenharmony_ci		goto error_call;
9518c2ecf20Sopenharmony_ci
9528c2ecf20Sopenharmony_ci	rc = vhost_user_set_vring_num(vu_dev, index, num);
9538c2ecf20Sopenharmony_ci	if (rc)
9548c2ecf20Sopenharmony_ci		goto error_setup;
9558c2ecf20Sopenharmony_ci
9568c2ecf20Sopenharmony_ci	rc = vhost_user_set_vring_base(vu_dev, index, 0);
9578c2ecf20Sopenharmony_ci	if (rc)
9588c2ecf20Sopenharmony_ci		goto error_setup;
9598c2ecf20Sopenharmony_ci
9608c2ecf20Sopenharmony_ci	rc = vhost_user_set_vring_addr(vu_dev, index,
9618c2ecf20Sopenharmony_ci				       virtqueue_get_desc_addr(vq),
9628c2ecf20Sopenharmony_ci				       virtqueue_get_used_addr(vq),
9638c2ecf20Sopenharmony_ci				       virtqueue_get_avail_addr(vq),
9648c2ecf20Sopenharmony_ci				       (u64) -1);
9658c2ecf20Sopenharmony_ci	if (rc)
9668c2ecf20Sopenharmony_ci		goto error_setup;
9678c2ecf20Sopenharmony_ci
9688c2ecf20Sopenharmony_ci	return vq;
9698c2ecf20Sopenharmony_ci
9708c2ecf20Sopenharmony_cierror_setup:
9718c2ecf20Sopenharmony_ci	if (info->call_fd >= 0) {
9728c2ecf20Sopenharmony_ci		um_free_irq(VIRTIO_IRQ, vq);
9738c2ecf20Sopenharmony_ci		os_close_file(info->call_fd);
9748c2ecf20Sopenharmony_ci	}
9758c2ecf20Sopenharmony_cierror_call:
9768c2ecf20Sopenharmony_ci	if (info->kick_fd >= 0)
9778c2ecf20Sopenharmony_ci		os_close_file(info->kick_fd);
9788c2ecf20Sopenharmony_cierror_kick:
9798c2ecf20Sopenharmony_ci	vring_del_virtqueue(vq);
9808c2ecf20Sopenharmony_cierror_create:
9818c2ecf20Sopenharmony_ci	kfree(info);
9828c2ecf20Sopenharmony_cierror_kzalloc:
9838c2ecf20Sopenharmony_ci	return ERR_PTR(rc);
9848c2ecf20Sopenharmony_ci}
9858c2ecf20Sopenharmony_ci
9868c2ecf20Sopenharmony_cistatic int vu_find_vqs(struct virtio_device *vdev, unsigned nvqs,
9878c2ecf20Sopenharmony_ci		       struct virtqueue *vqs[], vq_callback_t *callbacks[],
9888c2ecf20Sopenharmony_ci		       const char * const names[], const bool *ctx,
9898c2ecf20Sopenharmony_ci		       struct irq_affinity *desc)
9908c2ecf20Sopenharmony_ci{
9918c2ecf20Sopenharmony_ci	struct virtio_uml_device *vu_dev = to_virtio_uml_device(vdev);
9928c2ecf20Sopenharmony_ci	int i, queue_idx = 0, rc;
9938c2ecf20Sopenharmony_ci	struct virtqueue *vq;
9948c2ecf20Sopenharmony_ci
9958c2ecf20Sopenharmony_ci	rc = vhost_user_set_mem_table(vu_dev);
9968c2ecf20Sopenharmony_ci	if (rc)
9978c2ecf20Sopenharmony_ci		return rc;
9988c2ecf20Sopenharmony_ci
9998c2ecf20Sopenharmony_ci	for (i = 0; i < nvqs; ++i) {
10008c2ecf20Sopenharmony_ci		if (!names[i]) {
10018c2ecf20Sopenharmony_ci			vqs[i] = NULL;
10028c2ecf20Sopenharmony_ci			continue;
10038c2ecf20Sopenharmony_ci		}
10048c2ecf20Sopenharmony_ci
10058c2ecf20Sopenharmony_ci		vqs[i] = vu_setup_vq(vdev, queue_idx++, callbacks[i], names[i],
10068c2ecf20Sopenharmony_ci				     ctx ? ctx[i] : false);
10078c2ecf20Sopenharmony_ci		if (IS_ERR(vqs[i])) {
10088c2ecf20Sopenharmony_ci			rc = PTR_ERR(vqs[i]);
10098c2ecf20Sopenharmony_ci			goto error_setup;
10108c2ecf20Sopenharmony_ci		}
10118c2ecf20Sopenharmony_ci	}
10128c2ecf20Sopenharmony_ci
10138c2ecf20Sopenharmony_ci	list_for_each_entry(vq, &vdev->vqs, list) {
10148c2ecf20Sopenharmony_ci		struct virtio_uml_vq_info *info = vq->priv;
10158c2ecf20Sopenharmony_ci
10168c2ecf20Sopenharmony_ci		if (info->kick_fd >= 0) {
10178c2ecf20Sopenharmony_ci			rc = vhost_user_set_vring_kick(vu_dev, vq->index,
10188c2ecf20Sopenharmony_ci						       info->kick_fd);
10198c2ecf20Sopenharmony_ci			if (rc)
10208c2ecf20Sopenharmony_ci				goto error_setup;
10218c2ecf20Sopenharmony_ci		}
10228c2ecf20Sopenharmony_ci
10238c2ecf20Sopenharmony_ci		rc = vhost_user_set_vring_enable(vu_dev, vq->index, true);
10248c2ecf20Sopenharmony_ci		if (rc)
10258c2ecf20Sopenharmony_ci			goto error_setup;
10268c2ecf20Sopenharmony_ci	}
10278c2ecf20Sopenharmony_ci
10288c2ecf20Sopenharmony_ci	return 0;
10298c2ecf20Sopenharmony_ci
10308c2ecf20Sopenharmony_cierror_setup:
10318c2ecf20Sopenharmony_ci	vu_del_vqs(vdev);
10328c2ecf20Sopenharmony_ci	return rc;
10338c2ecf20Sopenharmony_ci}
10348c2ecf20Sopenharmony_ci
10358c2ecf20Sopenharmony_cistatic u64 vu_get_features(struct virtio_device *vdev)
10368c2ecf20Sopenharmony_ci{
10378c2ecf20Sopenharmony_ci	struct virtio_uml_device *vu_dev = to_virtio_uml_device(vdev);
10388c2ecf20Sopenharmony_ci
10398c2ecf20Sopenharmony_ci	return vu_dev->features;
10408c2ecf20Sopenharmony_ci}
10418c2ecf20Sopenharmony_ci
10428c2ecf20Sopenharmony_cistatic int vu_finalize_features(struct virtio_device *vdev)
10438c2ecf20Sopenharmony_ci{
10448c2ecf20Sopenharmony_ci	struct virtio_uml_device *vu_dev = to_virtio_uml_device(vdev);
10458c2ecf20Sopenharmony_ci	u64 supported = vdev->features & VHOST_USER_SUPPORTED_F;
10468c2ecf20Sopenharmony_ci
10478c2ecf20Sopenharmony_ci	vring_transport_features(vdev);
10488c2ecf20Sopenharmony_ci	vu_dev->features = vdev->features | supported;
10498c2ecf20Sopenharmony_ci
10508c2ecf20Sopenharmony_ci	return vhost_user_set_features(vu_dev, vu_dev->features);
10518c2ecf20Sopenharmony_ci}
10528c2ecf20Sopenharmony_ci
10538c2ecf20Sopenharmony_cistatic const char *vu_bus_name(struct virtio_device *vdev)
10548c2ecf20Sopenharmony_ci{
10558c2ecf20Sopenharmony_ci	struct virtio_uml_device *vu_dev = to_virtio_uml_device(vdev);
10568c2ecf20Sopenharmony_ci
10578c2ecf20Sopenharmony_ci	return vu_dev->pdev->name;
10588c2ecf20Sopenharmony_ci}
10598c2ecf20Sopenharmony_ci
10608c2ecf20Sopenharmony_cistatic const struct virtio_config_ops virtio_uml_config_ops = {
10618c2ecf20Sopenharmony_ci	.get = vu_get,
10628c2ecf20Sopenharmony_ci	.set = vu_set,
10638c2ecf20Sopenharmony_ci	.get_status = vu_get_status,
10648c2ecf20Sopenharmony_ci	.set_status = vu_set_status,
10658c2ecf20Sopenharmony_ci	.reset = vu_reset,
10668c2ecf20Sopenharmony_ci	.find_vqs = vu_find_vqs,
10678c2ecf20Sopenharmony_ci	.del_vqs = vu_del_vqs,
10688c2ecf20Sopenharmony_ci	.get_features = vu_get_features,
10698c2ecf20Sopenharmony_ci	.finalize_features = vu_finalize_features,
10708c2ecf20Sopenharmony_ci	.bus_name = vu_bus_name,
10718c2ecf20Sopenharmony_ci};
10728c2ecf20Sopenharmony_ci
10738c2ecf20Sopenharmony_cistatic void virtio_uml_release_dev(struct device *d)
10748c2ecf20Sopenharmony_ci{
10758c2ecf20Sopenharmony_ci	struct virtio_device *vdev =
10768c2ecf20Sopenharmony_ci			container_of(d, struct virtio_device, dev);
10778c2ecf20Sopenharmony_ci	struct virtio_uml_device *vu_dev = to_virtio_uml_device(vdev);
10788c2ecf20Sopenharmony_ci
10798c2ecf20Sopenharmony_ci	time_travel_propagate_time();
10808c2ecf20Sopenharmony_ci
10818c2ecf20Sopenharmony_ci	/* might not have been opened due to not negotiating the feature */
10828c2ecf20Sopenharmony_ci	if (vu_dev->req_fd >= 0) {
10838c2ecf20Sopenharmony_ci		um_free_irq(VIRTIO_IRQ, vu_dev);
10848c2ecf20Sopenharmony_ci		os_close_file(vu_dev->req_fd);
10858c2ecf20Sopenharmony_ci	}
10868c2ecf20Sopenharmony_ci
10878c2ecf20Sopenharmony_ci	os_close_file(vu_dev->sock);
10888c2ecf20Sopenharmony_ci	kfree(vu_dev);
10898c2ecf20Sopenharmony_ci}
10908c2ecf20Sopenharmony_ci
10918c2ecf20Sopenharmony_ci/* Platform device */
10928c2ecf20Sopenharmony_ci
10938c2ecf20Sopenharmony_cistatic int virtio_uml_probe(struct platform_device *pdev)
10948c2ecf20Sopenharmony_ci{
10958c2ecf20Sopenharmony_ci	struct virtio_uml_platform_data *pdata = pdev->dev.platform_data;
10968c2ecf20Sopenharmony_ci	struct virtio_uml_device *vu_dev;
10978c2ecf20Sopenharmony_ci	int rc;
10988c2ecf20Sopenharmony_ci
10998c2ecf20Sopenharmony_ci	if (!pdata)
11008c2ecf20Sopenharmony_ci		return -EINVAL;
11018c2ecf20Sopenharmony_ci
11028c2ecf20Sopenharmony_ci	vu_dev = kzalloc(sizeof(*vu_dev), GFP_KERNEL);
11038c2ecf20Sopenharmony_ci	if (!vu_dev)
11048c2ecf20Sopenharmony_ci		return -ENOMEM;
11058c2ecf20Sopenharmony_ci
11068c2ecf20Sopenharmony_ci	vu_dev->vdev.dev.parent = &pdev->dev;
11078c2ecf20Sopenharmony_ci	vu_dev->vdev.dev.release = virtio_uml_release_dev;
11088c2ecf20Sopenharmony_ci	vu_dev->vdev.config = &virtio_uml_config_ops;
11098c2ecf20Sopenharmony_ci	vu_dev->vdev.id.device = pdata->virtio_device_id;
11108c2ecf20Sopenharmony_ci	vu_dev->vdev.id.vendor = VIRTIO_DEV_ANY_ID;
11118c2ecf20Sopenharmony_ci	vu_dev->pdev = pdev;
11128c2ecf20Sopenharmony_ci	vu_dev->req_fd = -1;
11138c2ecf20Sopenharmony_ci
11148c2ecf20Sopenharmony_ci	time_travel_propagate_time();
11158c2ecf20Sopenharmony_ci
11168c2ecf20Sopenharmony_ci	do {
11178c2ecf20Sopenharmony_ci		rc = os_connect_socket(pdata->socket_path);
11188c2ecf20Sopenharmony_ci	} while (rc == -EINTR);
11198c2ecf20Sopenharmony_ci	if (rc < 0)
11208c2ecf20Sopenharmony_ci		goto error_free;
11218c2ecf20Sopenharmony_ci	vu_dev->sock = rc;
11228c2ecf20Sopenharmony_ci
11238c2ecf20Sopenharmony_ci	spin_lock_init(&vu_dev->sock_lock);
11248c2ecf20Sopenharmony_ci
11258c2ecf20Sopenharmony_ci	rc = vhost_user_init(vu_dev);
11268c2ecf20Sopenharmony_ci	if (rc)
11278c2ecf20Sopenharmony_ci		goto error_init;
11288c2ecf20Sopenharmony_ci
11298c2ecf20Sopenharmony_ci	platform_set_drvdata(pdev, vu_dev);
11308c2ecf20Sopenharmony_ci
11318c2ecf20Sopenharmony_ci	rc = register_virtio_device(&vu_dev->vdev);
11328c2ecf20Sopenharmony_ci	if (rc)
11338c2ecf20Sopenharmony_ci		put_device(&vu_dev->vdev.dev);
11348c2ecf20Sopenharmony_ci	vu_dev->registered = 1;
11358c2ecf20Sopenharmony_ci	return rc;
11368c2ecf20Sopenharmony_ci
11378c2ecf20Sopenharmony_cierror_init:
11388c2ecf20Sopenharmony_ci	os_close_file(vu_dev->sock);
11398c2ecf20Sopenharmony_cierror_free:
11408c2ecf20Sopenharmony_ci	kfree(vu_dev);
11418c2ecf20Sopenharmony_ci	return rc;
11428c2ecf20Sopenharmony_ci}
11438c2ecf20Sopenharmony_ci
11448c2ecf20Sopenharmony_cistatic int virtio_uml_remove(struct platform_device *pdev)
11458c2ecf20Sopenharmony_ci{
11468c2ecf20Sopenharmony_ci	struct virtio_uml_device *vu_dev = platform_get_drvdata(pdev);
11478c2ecf20Sopenharmony_ci
11488c2ecf20Sopenharmony_ci	unregister_virtio_device(&vu_dev->vdev);
11498c2ecf20Sopenharmony_ci	return 0;
11508c2ecf20Sopenharmony_ci}
11518c2ecf20Sopenharmony_ci
11528c2ecf20Sopenharmony_ci/* Command line device list */
11538c2ecf20Sopenharmony_ci
11548c2ecf20Sopenharmony_cistatic void vu_cmdline_release_dev(struct device *d)
11558c2ecf20Sopenharmony_ci{
11568c2ecf20Sopenharmony_ci}
11578c2ecf20Sopenharmony_ci
11588c2ecf20Sopenharmony_cistatic struct device vu_cmdline_parent = {
11598c2ecf20Sopenharmony_ci	.init_name = "virtio-uml-cmdline",
11608c2ecf20Sopenharmony_ci	.release = vu_cmdline_release_dev,
11618c2ecf20Sopenharmony_ci};
11628c2ecf20Sopenharmony_ci
11638c2ecf20Sopenharmony_cistatic bool vu_cmdline_parent_registered;
11648c2ecf20Sopenharmony_cistatic int vu_cmdline_id;
11658c2ecf20Sopenharmony_ci
11668c2ecf20Sopenharmony_cistatic int vu_unregister_cmdline_device(struct device *dev, void *data)
11678c2ecf20Sopenharmony_ci{
11688c2ecf20Sopenharmony_ci	struct platform_device *pdev = to_platform_device(dev);
11698c2ecf20Sopenharmony_ci	struct virtio_uml_platform_data *pdata = pdev->dev.platform_data;
11708c2ecf20Sopenharmony_ci
11718c2ecf20Sopenharmony_ci	kfree(pdata->socket_path);
11728c2ecf20Sopenharmony_ci	platform_device_unregister(pdev);
11738c2ecf20Sopenharmony_ci	return 0;
11748c2ecf20Sopenharmony_ci}
11758c2ecf20Sopenharmony_ci
11768c2ecf20Sopenharmony_cistatic void vu_conn_broken(struct work_struct *wk)
11778c2ecf20Sopenharmony_ci{
11788c2ecf20Sopenharmony_ci	struct virtio_uml_platform_data *pdata;
11798c2ecf20Sopenharmony_ci
11808c2ecf20Sopenharmony_ci	pdata = container_of(wk, struct virtio_uml_platform_data, conn_broken_wk);
11818c2ecf20Sopenharmony_ci	vu_unregister_cmdline_device(&pdata->pdev->dev, NULL);
11828c2ecf20Sopenharmony_ci}
11838c2ecf20Sopenharmony_ci
11848c2ecf20Sopenharmony_cistatic int vu_cmdline_set(const char *device, const struct kernel_param *kp)
11858c2ecf20Sopenharmony_ci{
11868c2ecf20Sopenharmony_ci	const char *ids = strchr(device, ':');
11878c2ecf20Sopenharmony_ci	unsigned int virtio_device_id;
11888c2ecf20Sopenharmony_ci	int processed, consumed, err;
11898c2ecf20Sopenharmony_ci	char *socket_path;
11908c2ecf20Sopenharmony_ci	struct virtio_uml_platform_data pdata, *ppdata;
11918c2ecf20Sopenharmony_ci	struct platform_device *pdev;
11928c2ecf20Sopenharmony_ci
11938c2ecf20Sopenharmony_ci	if (!ids || ids == device)
11948c2ecf20Sopenharmony_ci		return -EINVAL;
11958c2ecf20Sopenharmony_ci
11968c2ecf20Sopenharmony_ci	processed = sscanf(ids, ":%u%n:%d%n",
11978c2ecf20Sopenharmony_ci			   &virtio_device_id, &consumed,
11988c2ecf20Sopenharmony_ci			   &vu_cmdline_id, &consumed);
11998c2ecf20Sopenharmony_ci
12008c2ecf20Sopenharmony_ci	if (processed < 1 || ids[consumed])
12018c2ecf20Sopenharmony_ci		return -EINVAL;
12028c2ecf20Sopenharmony_ci
12038c2ecf20Sopenharmony_ci	if (!vu_cmdline_parent_registered) {
12048c2ecf20Sopenharmony_ci		err = device_register(&vu_cmdline_parent);
12058c2ecf20Sopenharmony_ci		if (err) {
12068c2ecf20Sopenharmony_ci			pr_err("Failed to register parent device!\n");
12078c2ecf20Sopenharmony_ci			put_device(&vu_cmdline_parent);
12088c2ecf20Sopenharmony_ci			return err;
12098c2ecf20Sopenharmony_ci		}
12108c2ecf20Sopenharmony_ci		vu_cmdline_parent_registered = true;
12118c2ecf20Sopenharmony_ci	}
12128c2ecf20Sopenharmony_ci
12138c2ecf20Sopenharmony_ci	socket_path = kmemdup_nul(device, ids - device, GFP_KERNEL);
12148c2ecf20Sopenharmony_ci	if (!socket_path)
12158c2ecf20Sopenharmony_ci		return -ENOMEM;
12168c2ecf20Sopenharmony_ci
12178c2ecf20Sopenharmony_ci	pdata.virtio_device_id = (u32) virtio_device_id;
12188c2ecf20Sopenharmony_ci	pdata.socket_path = socket_path;
12198c2ecf20Sopenharmony_ci
12208c2ecf20Sopenharmony_ci	pr_info("Registering device virtio-uml.%d id=%d at %s\n",
12218c2ecf20Sopenharmony_ci		vu_cmdline_id, virtio_device_id, socket_path);
12228c2ecf20Sopenharmony_ci
12238c2ecf20Sopenharmony_ci	pdev = platform_device_register_data(&vu_cmdline_parent, "virtio-uml",
12248c2ecf20Sopenharmony_ci					     vu_cmdline_id++, &pdata,
12258c2ecf20Sopenharmony_ci					     sizeof(pdata));
12268c2ecf20Sopenharmony_ci	err = PTR_ERR_OR_ZERO(pdev);
12278c2ecf20Sopenharmony_ci	if (err)
12288c2ecf20Sopenharmony_ci		goto free;
12298c2ecf20Sopenharmony_ci
12308c2ecf20Sopenharmony_ci	ppdata = pdev->dev.platform_data;
12318c2ecf20Sopenharmony_ci	ppdata->pdev = pdev;
12328c2ecf20Sopenharmony_ci	INIT_WORK(&ppdata->conn_broken_wk, vu_conn_broken);
12338c2ecf20Sopenharmony_ci
12348c2ecf20Sopenharmony_ci	return 0;
12358c2ecf20Sopenharmony_ci
12368c2ecf20Sopenharmony_cifree:
12378c2ecf20Sopenharmony_ci	kfree(socket_path);
12388c2ecf20Sopenharmony_ci	return err;
12398c2ecf20Sopenharmony_ci}
12408c2ecf20Sopenharmony_ci
12418c2ecf20Sopenharmony_cistatic int vu_cmdline_get_device(struct device *dev, void *data)
12428c2ecf20Sopenharmony_ci{
12438c2ecf20Sopenharmony_ci	struct platform_device *pdev = to_platform_device(dev);
12448c2ecf20Sopenharmony_ci	struct virtio_uml_platform_data *pdata = pdev->dev.platform_data;
12458c2ecf20Sopenharmony_ci	char *buffer = data;
12468c2ecf20Sopenharmony_ci	unsigned int len = strlen(buffer);
12478c2ecf20Sopenharmony_ci
12488c2ecf20Sopenharmony_ci	snprintf(buffer + len, PAGE_SIZE - len, "%s:%d:%d\n",
12498c2ecf20Sopenharmony_ci		 pdata->socket_path, pdata->virtio_device_id, pdev->id);
12508c2ecf20Sopenharmony_ci	return 0;
12518c2ecf20Sopenharmony_ci}
12528c2ecf20Sopenharmony_ci
12538c2ecf20Sopenharmony_cistatic int vu_cmdline_get(char *buffer, const struct kernel_param *kp)
12548c2ecf20Sopenharmony_ci{
12558c2ecf20Sopenharmony_ci	buffer[0] = '\0';
12568c2ecf20Sopenharmony_ci	if (vu_cmdline_parent_registered)
12578c2ecf20Sopenharmony_ci		device_for_each_child(&vu_cmdline_parent, buffer,
12588c2ecf20Sopenharmony_ci				      vu_cmdline_get_device);
12598c2ecf20Sopenharmony_ci	return strlen(buffer) + 1;
12608c2ecf20Sopenharmony_ci}
12618c2ecf20Sopenharmony_ci
12628c2ecf20Sopenharmony_cistatic const struct kernel_param_ops vu_cmdline_param_ops = {
12638c2ecf20Sopenharmony_ci	.set = vu_cmdline_set,
12648c2ecf20Sopenharmony_ci	.get = vu_cmdline_get,
12658c2ecf20Sopenharmony_ci};
12668c2ecf20Sopenharmony_ci
12678c2ecf20Sopenharmony_cidevice_param_cb(device, &vu_cmdline_param_ops, NULL, S_IRUSR);
12688c2ecf20Sopenharmony_ci__uml_help(vu_cmdline_param_ops,
12698c2ecf20Sopenharmony_ci"virtio_uml.device=<socket>:<virtio_id>[:<platform_id>]\n"
12708c2ecf20Sopenharmony_ci"    Configure a virtio device over a vhost-user socket.\n"
12718c2ecf20Sopenharmony_ci"    See virtio_ids.h for a list of possible virtio device id values.\n"
12728c2ecf20Sopenharmony_ci"    Optionally use a specific platform_device id.\n\n"
12738c2ecf20Sopenharmony_ci);
12748c2ecf20Sopenharmony_ci
12758c2ecf20Sopenharmony_ci
12768c2ecf20Sopenharmony_cistatic void vu_unregister_cmdline_devices(void)
12778c2ecf20Sopenharmony_ci{
12788c2ecf20Sopenharmony_ci	if (vu_cmdline_parent_registered) {
12798c2ecf20Sopenharmony_ci		device_for_each_child(&vu_cmdline_parent, NULL,
12808c2ecf20Sopenharmony_ci				      vu_unregister_cmdline_device);
12818c2ecf20Sopenharmony_ci		device_unregister(&vu_cmdline_parent);
12828c2ecf20Sopenharmony_ci		vu_cmdline_parent_registered = false;
12838c2ecf20Sopenharmony_ci	}
12848c2ecf20Sopenharmony_ci}
12858c2ecf20Sopenharmony_ci
12868c2ecf20Sopenharmony_ci/* Platform driver */
12878c2ecf20Sopenharmony_ci
12888c2ecf20Sopenharmony_cistatic const struct of_device_id virtio_uml_match[] = {
12898c2ecf20Sopenharmony_ci	{ .compatible = "virtio,uml", },
12908c2ecf20Sopenharmony_ci	{ }
12918c2ecf20Sopenharmony_ci};
12928c2ecf20Sopenharmony_ciMODULE_DEVICE_TABLE(of, virtio_uml_match);
12938c2ecf20Sopenharmony_ci
12948c2ecf20Sopenharmony_cistatic struct platform_driver virtio_uml_driver = {
12958c2ecf20Sopenharmony_ci	.probe = virtio_uml_probe,
12968c2ecf20Sopenharmony_ci	.remove = virtio_uml_remove,
12978c2ecf20Sopenharmony_ci	.driver = {
12988c2ecf20Sopenharmony_ci		.name = "virtio-uml",
12998c2ecf20Sopenharmony_ci		.of_match_table = virtio_uml_match,
13008c2ecf20Sopenharmony_ci	},
13018c2ecf20Sopenharmony_ci};
13028c2ecf20Sopenharmony_ci
13038c2ecf20Sopenharmony_cistatic int __init virtio_uml_init(void)
13048c2ecf20Sopenharmony_ci{
13058c2ecf20Sopenharmony_ci	return platform_driver_register(&virtio_uml_driver);
13068c2ecf20Sopenharmony_ci}
13078c2ecf20Sopenharmony_ci
13088c2ecf20Sopenharmony_cistatic void __exit virtio_uml_exit(void)
13098c2ecf20Sopenharmony_ci{
13108c2ecf20Sopenharmony_ci	platform_driver_unregister(&virtio_uml_driver);
13118c2ecf20Sopenharmony_ci	vu_unregister_cmdline_devices();
13128c2ecf20Sopenharmony_ci}
13138c2ecf20Sopenharmony_ci
13148c2ecf20Sopenharmony_cimodule_init(virtio_uml_init);
13158c2ecf20Sopenharmony_cimodule_exit(virtio_uml_exit);
13168c2ecf20Sopenharmony_ci__uml_exitcall(virtio_uml_exit);
13178c2ecf20Sopenharmony_ci
13188c2ecf20Sopenharmony_ciMODULE_DESCRIPTION("UML driver for vhost-user virtio devices");
13198c2ecf20Sopenharmony_ciMODULE_LICENSE("GPL");
1320