Merge tag 'pull-request-2023-07-10v2' of https://gitlab.com/thuth/qemu into staging
[qemu/armbru.git] / hw / virtio / vhost-backend.c
blob8e581575c9b3f73e8c57820c6171473a4003d59f
1 /*
2 * vhost-backend
4 * Copyright (c) 2013 Virtual Open Systems Sarl.
6 * This work is licensed under the terms of the GNU GPL, version 2 or later.
7 * See the COPYING file in the top-level directory.
9 */
11 #include "qemu/osdep.h"
12 #include "hw/virtio/vhost.h"
13 #include "hw/virtio/vhost-backend.h"
14 #include "qemu/error-report.h"
15 #include "qemu/main-loop.h"
16 #include "standard-headers/linux/vhost_types.h"
18 #include "hw/virtio/vhost-vdpa.h"
19 #ifdef CONFIG_VHOST_KERNEL
20 #include <linux/vhost.h>
21 #include <sys/ioctl.h>
23 static int vhost_kernel_call(struct vhost_dev *dev, unsigned long int request,
24 void *arg)
26 int fd = (uintptr_t) dev->opaque;
27 int ret;
29 assert(dev->vhost_ops->backend_type == VHOST_BACKEND_TYPE_KERNEL);
31 ret = ioctl(fd, request, arg);
32 return ret < 0 ? -errno : ret;
35 static int vhost_kernel_init(struct vhost_dev *dev, void *opaque, Error **errp)
37 assert(dev->vhost_ops->backend_type == VHOST_BACKEND_TYPE_KERNEL);
39 dev->opaque = opaque;
41 return 0;
44 static int vhost_kernel_cleanup(struct vhost_dev *dev)
46 int fd = (uintptr_t) dev->opaque;
48 assert(dev->vhost_ops->backend_type == VHOST_BACKEND_TYPE_KERNEL);
50 return close(fd) < 0 ? -errno : 0;
53 static int vhost_kernel_memslots_limit(struct vhost_dev *dev)
55 int limit = 64;
56 char *s;
58 if (g_file_get_contents("/sys/module/vhost/parameters/max_mem_regions",
59 &s, NULL, NULL)) {
60 uint64_t val = g_ascii_strtoull(s, NULL, 10);
61 if (val < INT_MAX && val > 0) {
62 g_free(s);
63 return val;
65 error_report("ignoring invalid max_mem_regions value in vhost module:"
66 " %s", s);
68 g_free(s);
69 return limit;
72 static int vhost_kernel_net_set_backend(struct vhost_dev *dev,
73 struct vhost_vring_file *file)
75 return vhost_kernel_call(dev, VHOST_NET_SET_BACKEND, file);
78 static int vhost_kernel_scsi_set_endpoint(struct vhost_dev *dev,
79 struct vhost_scsi_target *target)
81 return vhost_kernel_call(dev, VHOST_SCSI_SET_ENDPOINT, target);
84 static int vhost_kernel_scsi_clear_endpoint(struct vhost_dev *dev,
85 struct vhost_scsi_target *target)
87 return vhost_kernel_call(dev, VHOST_SCSI_CLEAR_ENDPOINT, target);
90 static int vhost_kernel_scsi_get_abi_version(struct vhost_dev *dev, int *version)
92 return vhost_kernel_call(dev, VHOST_SCSI_GET_ABI_VERSION, version);
95 static int vhost_kernel_set_log_base(struct vhost_dev *dev, uint64_t base,
96 struct vhost_log *log)
98 return vhost_kernel_call(dev, VHOST_SET_LOG_BASE, &base);
101 static int vhost_kernel_set_mem_table(struct vhost_dev *dev,
102 struct vhost_memory *mem)
104 return vhost_kernel_call(dev, VHOST_SET_MEM_TABLE, mem);
107 static int vhost_kernel_set_vring_addr(struct vhost_dev *dev,
108 struct vhost_vring_addr *addr)
110 return vhost_kernel_call(dev, VHOST_SET_VRING_ADDR, addr);
113 static int vhost_kernel_set_vring_endian(struct vhost_dev *dev,
114 struct vhost_vring_state *ring)
116 return vhost_kernel_call(dev, VHOST_SET_VRING_ENDIAN, ring);
119 static int vhost_kernel_set_vring_num(struct vhost_dev *dev,
120 struct vhost_vring_state *ring)
122 return vhost_kernel_call(dev, VHOST_SET_VRING_NUM, ring);
125 static int vhost_kernel_set_vring_base(struct vhost_dev *dev,
126 struct vhost_vring_state *ring)
128 return vhost_kernel_call(dev, VHOST_SET_VRING_BASE, ring);
131 static int vhost_kernel_get_vring_base(struct vhost_dev *dev,
132 struct vhost_vring_state *ring)
134 return vhost_kernel_call(dev, VHOST_GET_VRING_BASE, ring);
137 static int vhost_kernel_set_vring_kick(struct vhost_dev *dev,
138 struct vhost_vring_file *file)
140 return vhost_kernel_call(dev, VHOST_SET_VRING_KICK, file);
143 static int vhost_kernel_set_vring_call(struct vhost_dev *dev,
144 struct vhost_vring_file *file)
146 return vhost_kernel_call(dev, VHOST_SET_VRING_CALL, file);
149 static int vhost_kernel_set_vring_err(struct vhost_dev *dev,
150 struct vhost_vring_file *file)
152 return vhost_kernel_call(dev, VHOST_SET_VRING_ERR, file);
155 static int vhost_kernel_set_vring_busyloop_timeout(struct vhost_dev *dev,
156 struct vhost_vring_state *s)
158 return vhost_kernel_call(dev, VHOST_SET_VRING_BUSYLOOP_TIMEOUT, s);
161 static int vhost_kernel_set_features(struct vhost_dev *dev,
162 uint64_t features)
164 return vhost_kernel_call(dev, VHOST_SET_FEATURES, &features);
167 static int vhost_kernel_set_backend_cap(struct vhost_dev *dev)
169 uint64_t features;
170 uint64_t f = 0x1ULL << VHOST_BACKEND_F_IOTLB_MSG_V2;
171 int r;
173 if (vhost_kernel_call(dev, VHOST_GET_BACKEND_FEATURES, &features)) {
174 return 0;
177 features &= f;
178 r = vhost_kernel_call(dev, VHOST_SET_BACKEND_FEATURES,
179 &features);
180 if (r) {
181 return 0;
184 dev->backend_cap = features;
186 return 0;
189 static int vhost_kernel_get_features(struct vhost_dev *dev,
190 uint64_t *features)
192 return vhost_kernel_call(dev, VHOST_GET_FEATURES, features);
195 static int vhost_kernel_set_owner(struct vhost_dev *dev)
197 return vhost_kernel_call(dev, VHOST_SET_OWNER, NULL);
200 static int vhost_kernel_reset_device(struct vhost_dev *dev)
202 return vhost_kernel_call(dev, VHOST_RESET_OWNER, NULL);
205 static int vhost_kernel_get_vq_index(struct vhost_dev *dev, int idx)
207 assert(idx >= dev->vq_index && idx < dev->vq_index + dev->nvqs);
209 return idx - dev->vq_index;
212 static int vhost_kernel_vsock_set_guest_cid(struct vhost_dev *dev,
213 uint64_t guest_cid)
215 return vhost_kernel_call(dev, VHOST_VSOCK_SET_GUEST_CID, &guest_cid);
218 static int vhost_kernel_vsock_set_running(struct vhost_dev *dev, int start)
220 return vhost_kernel_call(dev, VHOST_VSOCK_SET_RUNNING, &start);
223 static void vhost_kernel_iotlb_read(void *opaque)
225 struct vhost_dev *dev = opaque;
226 ssize_t len;
228 if (dev->backend_cap &
229 (0x1ULL << VHOST_BACKEND_F_IOTLB_MSG_V2)) {
230 struct vhost_msg_v2 msg;
232 while ((len = read((uintptr_t)dev->opaque, &msg, sizeof msg)) > 0) {
233 if (len < sizeof msg) {
234 error_report("Wrong vhost message len: %d", (int)len);
235 break;
237 if (msg.type != VHOST_IOTLB_MSG_V2) {
238 error_report("Unknown vhost iotlb message type");
239 break;
242 vhost_backend_handle_iotlb_msg(dev, &msg.iotlb);
244 } else {
245 struct vhost_msg msg;
247 while ((len = read((uintptr_t)dev->opaque, &msg, sizeof msg)) > 0) {
248 if (len < sizeof msg) {
249 error_report("Wrong vhost message len: %d", (int)len);
250 break;
252 if (msg.type != VHOST_IOTLB_MSG) {
253 error_report("Unknown vhost iotlb message type");
254 break;
257 vhost_backend_handle_iotlb_msg(dev, &msg.iotlb);
262 static int vhost_kernel_send_device_iotlb_msg(struct vhost_dev *dev,
263 struct vhost_iotlb_msg *imsg)
265 if (dev->backend_cap & (1ULL << VHOST_BACKEND_F_IOTLB_MSG_V2)) {
266 struct vhost_msg_v2 msg = {};
268 msg.type = VHOST_IOTLB_MSG_V2;
269 msg.iotlb = *imsg;
271 if (write((uintptr_t)dev->opaque, &msg, sizeof msg) != sizeof msg) {
272 error_report("Fail to update device iotlb");
273 return -EFAULT;
275 } else {
276 struct vhost_msg msg = {};
278 msg.type = VHOST_IOTLB_MSG;
279 msg.iotlb = *imsg;
281 if (write((uintptr_t)dev->opaque, &msg, sizeof msg) != sizeof msg) {
282 error_report("Fail to update device iotlb");
283 return -EFAULT;
287 return 0;
290 static void vhost_kernel_set_iotlb_callback(struct vhost_dev *dev,
291 int enabled)
293 if (enabled)
294 qemu_set_fd_handler((uintptr_t)dev->opaque,
295 vhost_kernel_iotlb_read, NULL, dev);
296 else
297 qemu_set_fd_handler((uintptr_t)dev->opaque, NULL, NULL, NULL);
300 const VhostOps kernel_ops = {
301 .backend_type = VHOST_BACKEND_TYPE_KERNEL,
302 .vhost_backend_init = vhost_kernel_init,
303 .vhost_backend_cleanup = vhost_kernel_cleanup,
304 .vhost_backend_memslots_limit = vhost_kernel_memslots_limit,
305 .vhost_net_set_backend = vhost_kernel_net_set_backend,
306 .vhost_scsi_set_endpoint = vhost_kernel_scsi_set_endpoint,
307 .vhost_scsi_clear_endpoint = vhost_kernel_scsi_clear_endpoint,
308 .vhost_scsi_get_abi_version = vhost_kernel_scsi_get_abi_version,
309 .vhost_set_log_base = vhost_kernel_set_log_base,
310 .vhost_set_mem_table = vhost_kernel_set_mem_table,
311 .vhost_set_vring_addr = vhost_kernel_set_vring_addr,
312 .vhost_set_vring_endian = vhost_kernel_set_vring_endian,
313 .vhost_set_vring_num = vhost_kernel_set_vring_num,
314 .vhost_set_vring_base = vhost_kernel_set_vring_base,
315 .vhost_get_vring_base = vhost_kernel_get_vring_base,
316 .vhost_set_vring_kick = vhost_kernel_set_vring_kick,
317 .vhost_set_vring_call = vhost_kernel_set_vring_call,
318 .vhost_set_vring_err = vhost_kernel_set_vring_err,
319 .vhost_set_vring_busyloop_timeout =
320 vhost_kernel_set_vring_busyloop_timeout,
321 .vhost_set_features = vhost_kernel_set_features,
322 .vhost_get_features = vhost_kernel_get_features,
323 .vhost_set_backend_cap = vhost_kernel_set_backend_cap,
324 .vhost_set_owner = vhost_kernel_set_owner,
325 .vhost_reset_device = vhost_kernel_reset_device,
326 .vhost_get_vq_index = vhost_kernel_get_vq_index,
327 .vhost_vsock_set_guest_cid = vhost_kernel_vsock_set_guest_cid,
328 .vhost_vsock_set_running = vhost_kernel_vsock_set_running,
329 .vhost_set_iotlb_callback = vhost_kernel_set_iotlb_callback,
330 .vhost_send_device_iotlb_msg = vhost_kernel_send_device_iotlb_msg,
332 #endif
334 int vhost_backend_update_device_iotlb(struct vhost_dev *dev,
335 uint64_t iova, uint64_t uaddr,
336 uint64_t len,
337 IOMMUAccessFlags perm)
339 struct vhost_iotlb_msg imsg;
341 imsg.iova = iova;
342 imsg.uaddr = uaddr;
343 imsg.size = len;
344 imsg.type = VHOST_IOTLB_UPDATE;
346 switch (perm) {
347 case IOMMU_RO:
348 imsg.perm = VHOST_ACCESS_RO;
349 break;
350 case IOMMU_WO:
351 imsg.perm = VHOST_ACCESS_WO;
352 break;
353 case IOMMU_RW:
354 imsg.perm = VHOST_ACCESS_RW;
355 break;
356 default:
357 return -EINVAL;
360 if (dev->vhost_ops && dev->vhost_ops->vhost_send_device_iotlb_msg)
361 return dev->vhost_ops->vhost_send_device_iotlb_msg(dev, &imsg);
363 return -ENODEV;
366 int vhost_backend_invalidate_device_iotlb(struct vhost_dev *dev,
367 uint64_t iova, uint64_t len)
369 struct vhost_iotlb_msg imsg;
371 imsg.iova = iova;
372 imsg.size = len;
373 imsg.type = VHOST_IOTLB_INVALIDATE;
375 if (dev->vhost_ops && dev->vhost_ops->vhost_send_device_iotlb_msg)
376 return dev->vhost_ops->vhost_send_device_iotlb_msg(dev, &imsg);
378 return -ENODEV;
381 int vhost_backend_handle_iotlb_msg(struct vhost_dev *dev,
382 struct vhost_iotlb_msg *imsg)
384 int ret = 0;
386 if (unlikely(!dev->vdev)) {
387 error_report("Unexpected IOTLB message when virtio device is stopped");
388 return -EINVAL;
391 switch (imsg->type) {
392 case VHOST_IOTLB_MISS:
393 ret = vhost_device_iotlb_miss(dev, imsg->iova,
394 imsg->perm != VHOST_ACCESS_RO);
395 break;
396 case VHOST_IOTLB_ACCESS_FAIL:
397 /* FIXME: report device iotlb error */
398 error_report("Access failure IOTLB message type not supported");
399 ret = -ENOTSUP;
400 break;
401 case VHOST_IOTLB_UPDATE:
402 case VHOST_IOTLB_INVALIDATE:
403 default:
404 error_report("Unexpected IOTLB message type");
405 ret = -EINVAL;
406 break;
409 return ret;