1 // SPDX-License-Identifier: GPL-2.0-only 2 /* 3 * VDUSE: vDPA Device in Userspace 4 * 5 * Copyright (C) 2020-2021 Bytedance Inc. and/or its affiliates. All rights reserved. 6 * 7 * Author: Xie Yongji <xieyongji@bytedance.com> 8 * 9 */ 10 11 #include <linux/init.h> 12 #include <linux/module.h> 13 #include <linux/cdev.h> 14 #include <linux/device.h> 15 #include <linux/eventfd.h> 16 #include <linux/slab.h> 17 #include <linux/wait.h> 18 #include <linux/dma-map-ops.h> 19 #include <linux/poll.h> 20 #include <linux/file.h> 21 #include <linux/uio.h> 22 #include <linux/vdpa.h> 23 #include <linux/nospec.h> 24 #include <linux/vmalloc.h> 25 #include <linux/sched/mm.h> 26 #include <uapi/linux/vduse.h> 27 #include <uapi/linux/vdpa.h> 28 #include <uapi/linux/virtio_config.h> 29 #include <uapi/linux/virtio_ids.h> 30 #include <uapi/linux/virtio_blk.h> 31 #include <linux/mod_devicetable.h> 32 33 #include "iova_domain.h" 34 35 #define DRV_AUTHOR "Yongji Xie <xieyongji@bytedance.com>" 36 #define DRV_DESC "vDPA Device in Userspace" 37 #define DRV_LICENSE "GPL v2" 38 39 #define VDUSE_DEV_MAX (1U << MINORBITS) 40 #define VDUSE_BOUNCE_SIZE (64 * 1024 * 1024) 41 #define VDUSE_IOVA_SIZE (128 * 1024 * 1024) 42 #define VDUSE_MSG_DEFAULT_TIMEOUT 30 43 44 struct vduse_virtqueue { 45 u16 index; 46 u16 num_max; 47 u32 num; 48 u64 desc_addr; 49 u64 driver_addr; 50 u64 device_addr; 51 struct vdpa_vq_state state; 52 bool ready; 53 bool kicked; 54 spinlock_t kick_lock; 55 spinlock_t irq_lock; 56 struct eventfd_ctx *kickfd; 57 struct vdpa_callback cb; 58 struct work_struct inject; 59 struct work_struct kick; 60 }; 61 62 struct vduse_dev; 63 64 struct vduse_vdpa { 65 struct vdpa_device vdpa; 66 struct vduse_dev *dev; 67 }; 68 69 struct vduse_umem { 70 unsigned long iova; 71 unsigned long npages; 72 struct page **pages; 73 struct mm_struct *mm; 74 }; 75 76 struct vduse_dev { 77 struct vduse_vdpa *vdev; 78 struct device *dev; 79 struct vduse_virtqueue *vqs; 80 struct vduse_iova_domain *domain; 81 char *name; 82 struct mutex lock; 83 spinlock_t msg_lock; 84 u64 msg_unique; 85 u32 msg_timeout; 86 wait_queue_head_t waitq; 87 struct list_head send_list; 88 struct list_head recv_list; 89 struct vdpa_callback config_cb; 90 struct work_struct inject; 91 spinlock_t irq_lock; 92 struct rw_semaphore rwsem; 93 int minor; 94 bool broken; 95 bool connected; 96 u64 api_version; 97 u64 device_features; 98 u64 driver_features; 99 u32 device_id; 100 u32 vendor_id; 101 u32 generation; 102 u32 config_size; 103 void *config; 104 u8 status; 105 u32 vq_num; 106 u32 vq_align; 107 struct vduse_umem *umem; 108 struct mutex mem_lock; 109 }; 110 111 struct vduse_dev_msg { 112 struct vduse_dev_request req; 113 struct vduse_dev_response resp; 114 struct list_head list; 115 wait_queue_head_t waitq; 116 bool completed; 117 }; 118 119 struct vduse_control { 120 u64 api_version; 121 }; 122 123 static DEFINE_MUTEX(vduse_lock); 124 static DEFINE_IDR(vduse_idr); 125 126 static dev_t vduse_major; 127 static struct class *vduse_class; 128 static struct cdev vduse_ctrl_cdev; 129 static struct cdev vduse_cdev; 130 static struct workqueue_struct *vduse_irq_wq; 131 132 static u32 allowed_device_id[] = { 133 VIRTIO_ID_BLOCK, 134 }; 135 136 static inline struct vduse_dev *vdpa_to_vduse(struct vdpa_device *vdpa) 137 { 138 struct vduse_vdpa *vdev = container_of(vdpa, struct vduse_vdpa, vdpa); 139 140 return vdev->dev; 141 } 142 143 static inline struct vduse_dev *dev_to_vduse(struct device *dev) 144 { 145 struct vdpa_device *vdpa = dev_to_vdpa(dev); 146 147 return vdpa_to_vduse(vdpa); 148 } 149 150 static struct vduse_dev_msg *vduse_find_msg(struct list_head *head, 151 uint32_t request_id) 152 { 153 struct vduse_dev_msg *msg; 154 155 list_for_each_entry(msg, head, list) { 156 if (msg->req.request_id == request_id) { 157 list_del(&msg->list); 158 return msg; 159 } 160 } 161 162 return NULL; 163 } 164 165 static struct vduse_dev_msg *vduse_dequeue_msg(struct list_head *head) 166 { 167 struct vduse_dev_msg *msg = NULL; 168 169 if (!list_empty(head)) { 170 msg = list_first_entry(head, struct vduse_dev_msg, list); 171 list_del(&msg->list); 172 } 173 174 return msg; 175 } 176 177 static void vduse_enqueue_msg(struct list_head *head, 178 struct vduse_dev_msg *msg) 179 { 180 list_add_tail(&msg->list, head); 181 } 182 183 static void vduse_dev_broken(struct vduse_dev *dev) 184 { 185 struct vduse_dev_msg *msg, *tmp; 186 187 if (unlikely(dev->broken)) 188 return; 189 190 list_splice_init(&dev->recv_list, &dev->send_list); 191 list_for_each_entry_safe(msg, tmp, &dev->send_list, list) { 192 list_del(&msg->list); 193 msg->completed = 1; 194 msg->resp.result = VDUSE_REQ_RESULT_FAILED; 195 wake_up(&msg->waitq); 196 } 197 dev->broken = true; 198 wake_up(&dev->waitq); 199 } 200 201 static int vduse_dev_msg_sync(struct vduse_dev *dev, 202 struct vduse_dev_msg *msg) 203 { 204 int ret; 205 206 if (unlikely(dev->broken)) 207 return -EIO; 208 209 init_waitqueue_head(&msg->waitq); 210 spin_lock(&dev->msg_lock); 211 if (unlikely(dev->broken)) { 212 spin_unlock(&dev->msg_lock); 213 return -EIO; 214 } 215 msg->req.request_id = dev->msg_unique++; 216 vduse_enqueue_msg(&dev->send_list, msg); 217 wake_up(&dev->waitq); 218 spin_unlock(&dev->msg_lock); 219 if (dev->msg_timeout) 220 ret = wait_event_killable_timeout(msg->waitq, msg->completed, 221 (long)dev->msg_timeout * HZ); 222 else 223 ret = wait_event_killable(msg->waitq, msg->completed); 224 225 spin_lock(&dev->msg_lock); 226 if (!msg->completed) { 227 list_del(&msg->list); 228 msg->resp.result = VDUSE_REQ_RESULT_FAILED; 229 /* Mark the device as malfunction when there is a timeout */ 230 if (!ret) 231 vduse_dev_broken(dev); 232 } 233 ret = (msg->resp.result == VDUSE_REQ_RESULT_OK) ? 0 : -EIO; 234 spin_unlock(&dev->msg_lock); 235 236 return ret; 237 } 238 239 static int vduse_dev_get_vq_state_packed(struct vduse_dev *dev, 240 struct vduse_virtqueue *vq, 241 struct vdpa_vq_state_packed *packed) 242 { 243 struct vduse_dev_msg msg = { 0 }; 244 int ret; 245 246 msg.req.type = VDUSE_GET_VQ_STATE; 247 msg.req.vq_state.index = vq->index; 248 249 ret = vduse_dev_msg_sync(dev, &msg); 250 if (ret) 251 return ret; 252 253 packed->last_avail_counter = 254 msg.resp.vq_state.packed.last_avail_counter & 0x0001; 255 packed->last_avail_idx = 256 msg.resp.vq_state.packed.last_avail_idx & 0x7FFF; 257 packed->last_used_counter = 258 msg.resp.vq_state.packed.last_used_counter & 0x0001; 259 packed->last_used_idx = 260 msg.resp.vq_state.packed.last_used_idx & 0x7FFF; 261 262 return 0; 263 } 264 265 static int vduse_dev_get_vq_state_split(struct vduse_dev *dev, 266 struct vduse_virtqueue *vq, 267 struct vdpa_vq_state_split *split) 268 { 269 struct vduse_dev_msg msg = { 0 }; 270 int ret; 271 272 msg.req.type = VDUSE_GET_VQ_STATE; 273 msg.req.vq_state.index = vq->index; 274 275 ret = vduse_dev_msg_sync(dev, &msg); 276 if (ret) 277 return ret; 278 279 split->avail_index = msg.resp.vq_state.split.avail_index; 280 281 return 0; 282 } 283 284 static int vduse_dev_set_status(struct vduse_dev *dev, u8 status) 285 { 286 struct vduse_dev_msg msg = { 0 }; 287 288 msg.req.type = VDUSE_SET_STATUS; 289 msg.req.s.status = status; 290 291 return vduse_dev_msg_sync(dev, &msg); 292 } 293 294 static int vduse_dev_update_iotlb(struct vduse_dev *dev, 295 u64 start, u64 last) 296 { 297 struct vduse_dev_msg msg = { 0 }; 298 299 if (last < start) 300 return -EINVAL; 301 302 msg.req.type = VDUSE_UPDATE_IOTLB; 303 msg.req.iova.start = start; 304 msg.req.iova.last = last; 305 306 return vduse_dev_msg_sync(dev, &msg); 307 } 308 309 static ssize_t vduse_dev_read_iter(struct kiocb *iocb, struct iov_iter *to) 310 { 311 struct file *file = iocb->ki_filp; 312 struct vduse_dev *dev = file->private_data; 313 struct vduse_dev_msg *msg; 314 int size = sizeof(struct vduse_dev_request); 315 ssize_t ret; 316 317 if (iov_iter_count(to) < size) 318 return -EINVAL; 319 320 spin_lock(&dev->msg_lock); 321 while (1) { 322 msg = vduse_dequeue_msg(&dev->send_list); 323 if (msg) 324 break; 325 326 ret = -EAGAIN; 327 if (file->f_flags & O_NONBLOCK) 328 goto unlock; 329 330 spin_unlock(&dev->msg_lock); 331 ret = wait_event_interruptible_exclusive(dev->waitq, 332 !list_empty(&dev->send_list)); 333 if (ret) 334 return ret; 335 336 spin_lock(&dev->msg_lock); 337 } 338 spin_unlock(&dev->msg_lock); 339 ret = copy_to_iter(&msg->req, size, to); 340 spin_lock(&dev->msg_lock); 341 if (ret != size) { 342 ret = -EFAULT; 343 vduse_enqueue_msg(&dev->send_list, msg); 344 goto unlock; 345 } 346 vduse_enqueue_msg(&dev->recv_list, msg); 347 unlock: 348 spin_unlock(&dev->msg_lock); 349 350 return ret; 351 } 352 353 static bool is_mem_zero(const char *ptr, int size) 354 { 355 int i; 356 357 for (i = 0; i < size; i++) { 358 if (ptr[i]) 359 return false; 360 } 361 return true; 362 } 363 364 static ssize_t vduse_dev_write_iter(struct kiocb *iocb, struct iov_iter *from) 365 { 366 struct file *file = iocb->ki_filp; 367 struct vduse_dev *dev = file->private_data; 368 struct vduse_dev_response resp; 369 struct vduse_dev_msg *msg; 370 size_t ret; 371 372 ret = copy_from_iter(&resp, sizeof(resp), from); 373 if (ret != sizeof(resp)) 374 return -EINVAL; 375 376 if (!is_mem_zero((const char *)resp.reserved, sizeof(resp.reserved))) 377 return -EINVAL; 378 379 spin_lock(&dev->msg_lock); 380 msg = vduse_find_msg(&dev->recv_list, resp.request_id); 381 if (!msg) { 382 ret = -ENOENT; 383 goto unlock; 384 } 385 386 memcpy(&msg->resp, &resp, sizeof(resp)); 387 msg->completed = 1; 388 wake_up(&msg->waitq); 389 unlock: 390 spin_unlock(&dev->msg_lock); 391 392 return ret; 393 } 394 395 static __poll_t vduse_dev_poll(struct file *file, poll_table *wait) 396 { 397 struct vduse_dev *dev = file->private_data; 398 __poll_t mask = 0; 399 400 poll_wait(file, &dev->waitq, wait); 401 402 spin_lock(&dev->msg_lock); 403 404 if (unlikely(dev->broken)) 405 mask |= EPOLLERR; 406 if (!list_empty(&dev->send_list)) 407 mask |= EPOLLIN | EPOLLRDNORM; 408 if (!list_empty(&dev->recv_list)) 409 mask |= EPOLLOUT | EPOLLWRNORM; 410 411 spin_unlock(&dev->msg_lock); 412 413 return mask; 414 } 415 416 static void vduse_dev_reset(struct vduse_dev *dev) 417 { 418 int i; 419 struct vduse_iova_domain *domain = dev->domain; 420 421 /* The coherent mappings are handled in vduse_dev_free_coherent() */ 422 if (domain->bounce_map) 423 vduse_domain_reset_bounce_map(domain); 424 425 down_write(&dev->rwsem); 426 427 dev->status = 0; 428 dev->driver_features = 0; 429 dev->generation++; 430 spin_lock(&dev->irq_lock); 431 dev->config_cb.callback = NULL; 432 dev->config_cb.private = NULL; 433 spin_unlock(&dev->irq_lock); 434 flush_work(&dev->inject); 435 436 for (i = 0; i < dev->vq_num; i++) { 437 struct vduse_virtqueue *vq = &dev->vqs[i]; 438 439 vq->ready = false; 440 vq->desc_addr = 0; 441 vq->driver_addr = 0; 442 vq->device_addr = 0; 443 vq->num = 0; 444 memset(&vq->state, 0, sizeof(vq->state)); 445 446 spin_lock(&vq->kick_lock); 447 vq->kicked = false; 448 if (vq->kickfd) 449 eventfd_ctx_put(vq->kickfd); 450 vq->kickfd = NULL; 451 spin_unlock(&vq->kick_lock); 452 453 spin_lock(&vq->irq_lock); 454 vq->cb.callback = NULL; 455 vq->cb.private = NULL; 456 spin_unlock(&vq->irq_lock); 457 flush_work(&vq->inject); 458 flush_work(&vq->kick); 459 } 460 461 up_write(&dev->rwsem); 462 } 463 464 static int vduse_vdpa_set_vq_address(struct vdpa_device *vdpa, u16 idx, 465 u64 desc_area, u64 driver_area, 466 u64 device_area) 467 { 468 struct vduse_dev *dev = vdpa_to_vduse(vdpa); 469 struct vduse_virtqueue *vq = &dev->vqs[idx]; 470 471 vq->desc_addr = desc_area; 472 vq->driver_addr = driver_area; 473 vq->device_addr = device_area; 474 475 return 0; 476 } 477 478 static void vduse_vq_kick(struct vduse_virtqueue *vq) 479 { 480 spin_lock(&vq->kick_lock); 481 if (!vq->ready) 482 goto unlock; 483 484 if (vq->kickfd) 485 eventfd_signal(vq->kickfd, 1); 486 else 487 vq->kicked = true; 488 unlock: 489 spin_unlock(&vq->kick_lock); 490 } 491 492 static void vduse_vq_kick_work(struct work_struct *work) 493 { 494 struct vduse_virtqueue *vq = container_of(work, 495 struct vduse_virtqueue, kick); 496 497 vduse_vq_kick(vq); 498 } 499 500 static void vduse_vdpa_kick_vq(struct vdpa_device *vdpa, u16 idx) 501 { 502 struct vduse_dev *dev = vdpa_to_vduse(vdpa); 503 struct vduse_virtqueue *vq = &dev->vqs[idx]; 504 505 if (!eventfd_signal_allowed()) { 506 schedule_work(&vq->kick); 507 return; 508 } 509 vduse_vq_kick(vq); 510 } 511 512 static void vduse_vdpa_set_vq_cb(struct vdpa_device *vdpa, u16 idx, 513 struct vdpa_callback *cb) 514 { 515 struct vduse_dev *dev = vdpa_to_vduse(vdpa); 516 struct vduse_virtqueue *vq = &dev->vqs[idx]; 517 518 spin_lock(&vq->irq_lock); 519 vq->cb.callback = cb->callback; 520 vq->cb.private = cb->private; 521 spin_unlock(&vq->irq_lock); 522 } 523 524 static void vduse_vdpa_set_vq_num(struct vdpa_device *vdpa, u16 idx, u32 num) 525 { 526 struct vduse_dev *dev = vdpa_to_vduse(vdpa); 527 struct vduse_virtqueue *vq = &dev->vqs[idx]; 528 529 vq->num = num; 530 } 531 532 static void vduse_vdpa_set_vq_ready(struct vdpa_device *vdpa, 533 u16 idx, bool ready) 534 { 535 struct vduse_dev *dev = vdpa_to_vduse(vdpa); 536 struct vduse_virtqueue *vq = &dev->vqs[idx]; 537 538 vq->ready = ready; 539 } 540 541 static bool vduse_vdpa_get_vq_ready(struct vdpa_device *vdpa, u16 idx) 542 { 543 struct vduse_dev *dev = vdpa_to_vduse(vdpa); 544 struct vduse_virtqueue *vq = &dev->vqs[idx]; 545 546 return vq->ready; 547 } 548 549 static int vduse_vdpa_set_vq_state(struct vdpa_device *vdpa, u16 idx, 550 const struct vdpa_vq_state *state) 551 { 552 struct vduse_dev *dev = vdpa_to_vduse(vdpa); 553 struct vduse_virtqueue *vq = &dev->vqs[idx]; 554 555 if (dev->driver_features & BIT_ULL(VIRTIO_F_RING_PACKED)) { 556 vq->state.packed.last_avail_counter = 557 state->packed.last_avail_counter; 558 vq->state.packed.last_avail_idx = state->packed.last_avail_idx; 559 vq->state.packed.last_used_counter = 560 state->packed.last_used_counter; 561 vq->state.packed.last_used_idx = state->packed.last_used_idx; 562 } else 563 vq->state.split.avail_index = state->split.avail_index; 564 565 return 0; 566 } 567 568 static int vduse_vdpa_get_vq_state(struct vdpa_device *vdpa, u16 idx, 569 struct vdpa_vq_state *state) 570 { 571 struct vduse_dev *dev = vdpa_to_vduse(vdpa); 572 struct vduse_virtqueue *vq = &dev->vqs[idx]; 573 574 if (dev->driver_features & BIT_ULL(VIRTIO_F_RING_PACKED)) 575 return vduse_dev_get_vq_state_packed(dev, vq, &state->packed); 576 577 return vduse_dev_get_vq_state_split(dev, vq, &state->split); 578 } 579 580 static u32 vduse_vdpa_get_vq_align(struct vdpa_device *vdpa) 581 { 582 struct vduse_dev *dev = vdpa_to_vduse(vdpa); 583 584 return dev->vq_align; 585 } 586 587 static u64 vduse_vdpa_get_device_features(struct vdpa_device *vdpa) 588 { 589 struct vduse_dev *dev = vdpa_to_vduse(vdpa); 590 591 return dev->device_features; 592 } 593 594 static int vduse_vdpa_set_driver_features(struct vdpa_device *vdpa, u64 features) 595 { 596 struct vduse_dev *dev = vdpa_to_vduse(vdpa); 597 598 dev->driver_features = features; 599 return 0; 600 } 601 602 static u64 vduse_vdpa_get_driver_features(struct vdpa_device *vdpa) 603 { 604 struct vduse_dev *dev = vdpa_to_vduse(vdpa); 605 606 return dev->driver_features; 607 } 608 609 static void vduse_vdpa_set_config_cb(struct vdpa_device *vdpa, 610 struct vdpa_callback *cb) 611 { 612 struct vduse_dev *dev = vdpa_to_vduse(vdpa); 613 614 spin_lock(&dev->irq_lock); 615 dev->config_cb.callback = cb->callback; 616 dev->config_cb.private = cb->private; 617 spin_unlock(&dev->irq_lock); 618 } 619 620 static u16 vduse_vdpa_get_vq_num_max(struct vdpa_device *vdpa) 621 { 622 struct vduse_dev *dev = vdpa_to_vduse(vdpa); 623 u16 num_max = 0; 624 int i; 625 626 for (i = 0; i < dev->vq_num; i++) 627 if (num_max < dev->vqs[i].num_max) 628 num_max = dev->vqs[i].num_max; 629 630 return num_max; 631 } 632 633 static u32 vduse_vdpa_get_device_id(struct vdpa_device *vdpa) 634 { 635 struct vduse_dev *dev = vdpa_to_vduse(vdpa); 636 637 return dev->device_id; 638 } 639 640 static u32 vduse_vdpa_get_vendor_id(struct vdpa_device *vdpa) 641 { 642 struct vduse_dev *dev = vdpa_to_vduse(vdpa); 643 644 return dev->vendor_id; 645 } 646 647 static u8 vduse_vdpa_get_status(struct vdpa_device *vdpa) 648 { 649 struct vduse_dev *dev = vdpa_to_vduse(vdpa); 650 651 return dev->status; 652 } 653 654 static void vduse_vdpa_set_status(struct vdpa_device *vdpa, u8 status) 655 { 656 struct vduse_dev *dev = vdpa_to_vduse(vdpa); 657 658 if (vduse_dev_set_status(dev, status)) 659 return; 660 661 dev->status = status; 662 } 663 664 static size_t vduse_vdpa_get_config_size(struct vdpa_device *vdpa) 665 { 666 struct vduse_dev *dev = vdpa_to_vduse(vdpa); 667 668 return dev->config_size; 669 } 670 671 static void vduse_vdpa_get_config(struct vdpa_device *vdpa, unsigned int offset, 672 void *buf, unsigned int len) 673 { 674 struct vduse_dev *dev = vdpa_to_vduse(vdpa); 675 676 /* Initialize the buffer in case of partial copy. */ 677 memset(buf, 0, len); 678 679 if (offset > dev->config_size) 680 return; 681 682 if (len > dev->config_size - offset) 683 len = dev->config_size - offset; 684 685 memcpy(buf, dev->config + offset, len); 686 } 687 688 static void vduse_vdpa_set_config(struct vdpa_device *vdpa, unsigned int offset, 689 const void *buf, unsigned int len) 690 { 691 /* Now we only support read-only configuration space */ 692 } 693 694 static int vduse_vdpa_reset(struct vdpa_device *vdpa) 695 { 696 struct vduse_dev *dev = vdpa_to_vduse(vdpa); 697 int ret = vduse_dev_set_status(dev, 0); 698 699 vduse_dev_reset(dev); 700 701 return ret; 702 } 703 704 static u32 vduse_vdpa_get_generation(struct vdpa_device *vdpa) 705 { 706 struct vduse_dev *dev = vdpa_to_vduse(vdpa); 707 708 return dev->generation; 709 } 710 711 static int vduse_vdpa_set_map(struct vdpa_device *vdpa, 712 unsigned int asid, 713 struct vhost_iotlb *iotlb) 714 { 715 struct vduse_dev *dev = vdpa_to_vduse(vdpa); 716 int ret; 717 718 ret = vduse_domain_set_map(dev->domain, iotlb); 719 if (ret) 720 return ret; 721 722 ret = vduse_dev_update_iotlb(dev, 0ULL, ULLONG_MAX); 723 if (ret) { 724 vduse_domain_clear_map(dev->domain, iotlb); 725 return ret; 726 } 727 728 return 0; 729 } 730 731 static void vduse_vdpa_free(struct vdpa_device *vdpa) 732 { 733 struct vduse_dev *dev = vdpa_to_vduse(vdpa); 734 735 dev->vdev = NULL; 736 } 737 738 static const struct vdpa_config_ops vduse_vdpa_config_ops = { 739 .set_vq_address = vduse_vdpa_set_vq_address, 740 .kick_vq = vduse_vdpa_kick_vq, 741 .set_vq_cb = vduse_vdpa_set_vq_cb, 742 .set_vq_num = vduse_vdpa_set_vq_num, 743 .set_vq_ready = vduse_vdpa_set_vq_ready, 744 .get_vq_ready = vduse_vdpa_get_vq_ready, 745 .set_vq_state = vduse_vdpa_set_vq_state, 746 .get_vq_state = vduse_vdpa_get_vq_state, 747 .get_vq_align = vduse_vdpa_get_vq_align, 748 .get_device_features = vduse_vdpa_get_device_features, 749 .set_driver_features = vduse_vdpa_set_driver_features, 750 .get_driver_features = vduse_vdpa_get_driver_features, 751 .set_config_cb = vduse_vdpa_set_config_cb, 752 .get_vq_num_max = vduse_vdpa_get_vq_num_max, 753 .get_device_id = vduse_vdpa_get_device_id, 754 .get_vendor_id = vduse_vdpa_get_vendor_id, 755 .get_status = vduse_vdpa_get_status, 756 .set_status = vduse_vdpa_set_status, 757 .get_config_size = vduse_vdpa_get_config_size, 758 .get_config = vduse_vdpa_get_config, 759 .set_config = vduse_vdpa_set_config, 760 .get_generation = vduse_vdpa_get_generation, 761 .reset = vduse_vdpa_reset, 762 .set_map = vduse_vdpa_set_map, 763 .free = vduse_vdpa_free, 764 }; 765 766 static dma_addr_t vduse_dev_map_page(struct device *dev, struct page *page, 767 unsigned long offset, size_t size, 768 enum dma_data_direction dir, 769 unsigned long attrs) 770 { 771 struct vduse_dev *vdev = dev_to_vduse(dev); 772 struct vduse_iova_domain *domain = vdev->domain; 773 774 return vduse_domain_map_page(domain, page, offset, size, dir, attrs); 775 } 776 777 static void vduse_dev_unmap_page(struct device *dev, dma_addr_t dma_addr, 778 size_t size, enum dma_data_direction dir, 779 unsigned long attrs) 780 { 781 struct vduse_dev *vdev = dev_to_vduse(dev); 782 struct vduse_iova_domain *domain = vdev->domain; 783 784 return vduse_domain_unmap_page(domain, dma_addr, size, dir, attrs); 785 } 786 787 static void *vduse_dev_alloc_coherent(struct device *dev, size_t size, 788 dma_addr_t *dma_addr, gfp_t flag, 789 unsigned long attrs) 790 { 791 struct vduse_dev *vdev = dev_to_vduse(dev); 792 struct vduse_iova_domain *domain = vdev->domain; 793 unsigned long iova; 794 void *addr; 795 796 *dma_addr = DMA_MAPPING_ERROR; 797 addr = vduse_domain_alloc_coherent(domain, size, 798 (dma_addr_t *)&iova, flag, attrs); 799 if (!addr) 800 return NULL; 801 802 *dma_addr = (dma_addr_t)iova; 803 804 return addr; 805 } 806 807 static void vduse_dev_free_coherent(struct device *dev, size_t size, 808 void *vaddr, dma_addr_t dma_addr, 809 unsigned long attrs) 810 { 811 struct vduse_dev *vdev = dev_to_vduse(dev); 812 struct vduse_iova_domain *domain = vdev->domain; 813 814 vduse_domain_free_coherent(domain, size, vaddr, dma_addr, attrs); 815 } 816 817 static size_t vduse_dev_max_mapping_size(struct device *dev) 818 { 819 struct vduse_dev *vdev = dev_to_vduse(dev); 820 struct vduse_iova_domain *domain = vdev->domain; 821 822 return domain->bounce_size; 823 } 824 825 static const struct dma_map_ops vduse_dev_dma_ops = { 826 .map_page = vduse_dev_map_page, 827 .unmap_page = vduse_dev_unmap_page, 828 .alloc = vduse_dev_alloc_coherent, 829 .free = vduse_dev_free_coherent, 830 .max_mapping_size = vduse_dev_max_mapping_size, 831 }; 832 833 static unsigned int perm_to_file_flags(u8 perm) 834 { 835 unsigned int flags = 0; 836 837 switch (perm) { 838 case VDUSE_ACCESS_WO: 839 flags |= O_WRONLY; 840 break; 841 case VDUSE_ACCESS_RO: 842 flags |= O_RDONLY; 843 break; 844 case VDUSE_ACCESS_RW: 845 flags |= O_RDWR; 846 break; 847 default: 848 WARN(1, "invalidate vhost IOTLB permission\n"); 849 break; 850 } 851 852 return flags; 853 } 854 855 static int vduse_kickfd_setup(struct vduse_dev *dev, 856 struct vduse_vq_eventfd *eventfd) 857 { 858 struct eventfd_ctx *ctx = NULL; 859 struct vduse_virtqueue *vq; 860 u32 index; 861 862 if (eventfd->index >= dev->vq_num) 863 return -EINVAL; 864 865 index = array_index_nospec(eventfd->index, dev->vq_num); 866 vq = &dev->vqs[index]; 867 if (eventfd->fd >= 0) { 868 ctx = eventfd_ctx_fdget(eventfd->fd); 869 if (IS_ERR(ctx)) 870 return PTR_ERR(ctx); 871 } else if (eventfd->fd != VDUSE_EVENTFD_DEASSIGN) 872 return 0; 873 874 spin_lock(&vq->kick_lock); 875 if (vq->kickfd) 876 eventfd_ctx_put(vq->kickfd); 877 vq->kickfd = ctx; 878 if (vq->ready && vq->kicked && vq->kickfd) { 879 eventfd_signal(vq->kickfd, 1); 880 vq->kicked = false; 881 } 882 spin_unlock(&vq->kick_lock); 883 884 return 0; 885 } 886 887 static bool vduse_dev_is_ready(struct vduse_dev *dev) 888 { 889 int i; 890 891 for (i = 0; i < dev->vq_num; i++) 892 if (!dev->vqs[i].num_max) 893 return false; 894 895 return true; 896 } 897 898 static void vduse_dev_irq_inject(struct work_struct *work) 899 { 900 struct vduse_dev *dev = container_of(work, struct vduse_dev, inject); 901 902 spin_lock_irq(&dev->irq_lock); 903 if (dev->config_cb.callback) 904 dev->config_cb.callback(dev->config_cb.private); 905 spin_unlock_irq(&dev->irq_lock); 906 } 907 908 static void vduse_vq_irq_inject(struct work_struct *work) 909 { 910 struct vduse_virtqueue *vq = container_of(work, 911 struct vduse_virtqueue, inject); 912 913 spin_lock_irq(&vq->irq_lock); 914 if (vq->ready && vq->cb.callback) 915 vq->cb.callback(vq->cb.private); 916 spin_unlock_irq(&vq->irq_lock); 917 } 918 919 static int vduse_dev_queue_irq_work(struct vduse_dev *dev, 920 struct work_struct *irq_work) 921 { 922 int ret = -EINVAL; 923 924 down_read(&dev->rwsem); 925 if (!(dev->status & VIRTIO_CONFIG_S_DRIVER_OK)) 926 goto unlock; 927 928 ret = 0; 929 queue_work(vduse_irq_wq, irq_work); 930 unlock: 931 up_read(&dev->rwsem); 932 933 return ret; 934 } 935 936 static int vduse_dev_dereg_umem(struct vduse_dev *dev, 937 u64 iova, u64 size) 938 { 939 int ret; 940 941 mutex_lock(&dev->mem_lock); 942 ret = -ENOENT; 943 if (!dev->umem) 944 goto unlock; 945 946 ret = -EINVAL; 947 if (dev->umem->iova != iova || size != dev->domain->bounce_size) 948 goto unlock; 949 950 vduse_domain_remove_user_bounce_pages(dev->domain); 951 unpin_user_pages_dirty_lock(dev->umem->pages, 952 dev->umem->npages, true); 953 atomic64_sub(dev->umem->npages, &dev->umem->mm->pinned_vm); 954 mmdrop(dev->umem->mm); 955 vfree(dev->umem->pages); 956 kfree(dev->umem); 957 dev->umem = NULL; 958 ret = 0; 959 unlock: 960 mutex_unlock(&dev->mem_lock); 961 return ret; 962 } 963 964 static int vduse_dev_reg_umem(struct vduse_dev *dev, 965 u64 iova, u64 uaddr, u64 size) 966 { 967 struct page **page_list = NULL; 968 struct vduse_umem *umem = NULL; 969 long pinned = 0; 970 unsigned long npages, lock_limit; 971 int ret; 972 973 if (!dev->domain->bounce_map || 974 size != dev->domain->bounce_size || 975 iova != 0 || uaddr & ~PAGE_MASK) 976 return -EINVAL; 977 978 mutex_lock(&dev->mem_lock); 979 ret = -EEXIST; 980 if (dev->umem) 981 goto unlock; 982 983 ret = -ENOMEM; 984 npages = size >> PAGE_SHIFT; 985 page_list = __vmalloc(array_size(npages, sizeof(struct page *)), 986 GFP_KERNEL_ACCOUNT); 987 umem = kzalloc(sizeof(*umem), GFP_KERNEL); 988 if (!page_list || !umem) 989 goto unlock; 990 991 mmap_read_lock(current->mm); 992 993 lock_limit = PFN_DOWN(rlimit(RLIMIT_MEMLOCK)); 994 if (npages + atomic64_read(¤t->mm->pinned_vm) > lock_limit) 995 goto out; 996 997 pinned = pin_user_pages(uaddr, npages, FOLL_LONGTERM | FOLL_WRITE, 998 page_list, NULL); 999 if (pinned != npages) { 1000 ret = pinned < 0 ? pinned : -ENOMEM; 1001 goto out; 1002 } 1003 1004 ret = vduse_domain_add_user_bounce_pages(dev->domain, 1005 page_list, pinned); 1006 if (ret) 1007 goto out; 1008 1009 atomic64_add(npages, ¤t->mm->pinned_vm); 1010 1011 umem->pages = page_list; 1012 umem->npages = pinned; 1013 umem->iova = iova; 1014 umem->mm = current->mm; 1015 mmgrab(current->mm); 1016 1017 dev->umem = umem; 1018 out: 1019 if (ret && pinned > 0) 1020 unpin_user_pages(page_list, pinned); 1021 1022 mmap_read_unlock(current->mm); 1023 unlock: 1024 if (ret) { 1025 vfree(page_list); 1026 kfree(umem); 1027 } 1028 mutex_unlock(&dev->mem_lock); 1029 return ret; 1030 } 1031 1032 static long vduse_dev_ioctl(struct file *file, unsigned int cmd, 1033 unsigned long arg) 1034 { 1035 struct vduse_dev *dev = file->private_data; 1036 void __user *argp = (void __user *)arg; 1037 int ret; 1038 1039 if (unlikely(dev->broken)) 1040 return -EPERM; 1041 1042 switch (cmd) { 1043 case VDUSE_IOTLB_GET_FD: { 1044 struct vduse_iotlb_entry entry; 1045 struct vhost_iotlb_map *map; 1046 struct vdpa_map_file *map_file; 1047 struct vduse_iova_domain *domain = dev->domain; 1048 struct file *f = NULL; 1049 1050 ret = -EFAULT; 1051 if (copy_from_user(&entry, argp, sizeof(entry))) 1052 break; 1053 1054 ret = -EINVAL; 1055 if (entry.start > entry.last) 1056 break; 1057 1058 spin_lock(&domain->iotlb_lock); 1059 map = vhost_iotlb_itree_first(domain->iotlb, 1060 entry.start, entry.last); 1061 if (map) { 1062 map_file = (struct vdpa_map_file *)map->opaque; 1063 f = get_file(map_file->file); 1064 entry.offset = map_file->offset; 1065 entry.start = map->start; 1066 entry.last = map->last; 1067 entry.perm = map->perm; 1068 } 1069 spin_unlock(&domain->iotlb_lock); 1070 ret = -EINVAL; 1071 if (!f) 1072 break; 1073 1074 ret = -EFAULT; 1075 if (copy_to_user(argp, &entry, sizeof(entry))) { 1076 fput(f); 1077 break; 1078 } 1079 ret = receive_fd(f, perm_to_file_flags(entry.perm)); 1080 fput(f); 1081 break; 1082 } 1083 case VDUSE_DEV_GET_FEATURES: 1084 /* 1085 * Just mirror what driver wrote here. 1086 * The driver is expected to check FEATURE_OK later. 1087 */ 1088 ret = put_user(dev->driver_features, (u64 __user *)argp); 1089 break; 1090 case VDUSE_DEV_SET_CONFIG: { 1091 struct vduse_config_data config; 1092 unsigned long size = offsetof(struct vduse_config_data, 1093 buffer); 1094 1095 ret = -EFAULT; 1096 if (copy_from_user(&config, argp, size)) 1097 break; 1098 1099 ret = -EINVAL; 1100 if (config.offset > dev->config_size || 1101 config.length == 0 || 1102 config.length > dev->config_size - config.offset) 1103 break; 1104 1105 ret = -EFAULT; 1106 if (copy_from_user(dev->config + config.offset, argp + size, 1107 config.length)) 1108 break; 1109 1110 ret = 0; 1111 break; 1112 } 1113 case VDUSE_DEV_INJECT_CONFIG_IRQ: 1114 ret = vduse_dev_queue_irq_work(dev, &dev->inject); 1115 break; 1116 case VDUSE_VQ_SETUP: { 1117 struct vduse_vq_config config; 1118 u32 index; 1119 1120 ret = -EFAULT; 1121 if (copy_from_user(&config, argp, sizeof(config))) 1122 break; 1123 1124 ret = -EINVAL; 1125 if (config.index >= dev->vq_num) 1126 break; 1127 1128 if (!is_mem_zero((const char *)config.reserved, 1129 sizeof(config.reserved))) 1130 break; 1131 1132 index = array_index_nospec(config.index, dev->vq_num); 1133 dev->vqs[index].num_max = config.max_size; 1134 ret = 0; 1135 break; 1136 } 1137 case VDUSE_VQ_GET_INFO: { 1138 struct vduse_vq_info vq_info; 1139 struct vduse_virtqueue *vq; 1140 u32 index; 1141 1142 ret = -EFAULT; 1143 if (copy_from_user(&vq_info, argp, sizeof(vq_info))) 1144 break; 1145 1146 ret = -EINVAL; 1147 if (vq_info.index >= dev->vq_num) 1148 break; 1149 1150 index = array_index_nospec(vq_info.index, dev->vq_num); 1151 vq = &dev->vqs[index]; 1152 vq_info.desc_addr = vq->desc_addr; 1153 vq_info.driver_addr = vq->driver_addr; 1154 vq_info.device_addr = vq->device_addr; 1155 vq_info.num = vq->num; 1156 1157 if (dev->driver_features & BIT_ULL(VIRTIO_F_RING_PACKED)) { 1158 vq_info.packed.last_avail_counter = 1159 vq->state.packed.last_avail_counter; 1160 vq_info.packed.last_avail_idx = 1161 vq->state.packed.last_avail_idx; 1162 vq_info.packed.last_used_counter = 1163 vq->state.packed.last_used_counter; 1164 vq_info.packed.last_used_idx = 1165 vq->state.packed.last_used_idx; 1166 } else 1167 vq_info.split.avail_index = 1168 vq->state.split.avail_index; 1169 1170 vq_info.ready = vq->ready; 1171 1172 ret = -EFAULT; 1173 if (copy_to_user(argp, &vq_info, sizeof(vq_info))) 1174 break; 1175 1176 ret = 0; 1177 break; 1178 } 1179 case VDUSE_VQ_SETUP_KICKFD: { 1180 struct vduse_vq_eventfd eventfd; 1181 1182 ret = -EFAULT; 1183 if (copy_from_user(&eventfd, argp, sizeof(eventfd))) 1184 break; 1185 1186 ret = vduse_kickfd_setup(dev, &eventfd); 1187 break; 1188 } 1189 case VDUSE_VQ_INJECT_IRQ: { 1190 u32 index; 1191 1192 ret = -EFAULT; 1193 if (get_user(index, (u32 __user *)argp)) 1194 break; 1195 1196 ret = -EINVAL; 1197 if (index >= dev->vq_num) 1198 break; 1199 1200 index = array_index_nospec(index, dev->vq_num); 1201 ret = vduse_dev_queue_irq_work(dev, &dev->vqs[index].inject); 1202 break; 1203 } 1204 case VDUSE_IOTLB_REG_UMEM: { 1205 struct vduse_iova_umem umem; 1206 1207 ret = -EFAULT; 1208 if (copy_from_user(&umem, argp, sizeof(umem))) 1209 break; 1210 1211 ret = -EINVAL; 1212 if (!is_mem_zero((const char *)umem.reserved, 1213 sizeof(umem.reserved))) 1214 break; 1215 1216 ret = vduse_dev_reg_umem(dev, umem.iova, 1217 umem.uaddr, umem.size); 1218 break; 1219 } 1220 case VDUSE_IOTLB_DEREG_UMEM: { 1221 struct vduse_iova_umem umem; 1222 1223 ret = -EFAULT; 1224 if (copy_from_user(&umem, argp, sizeof(umem))) 1225 break; 1226 1227 ret = -EINVAL; 1228 if (!is_mem_zero((const char *)umem.reserved, 1229 sizeof(umem.reserved))) 1230 break; 1231 1232 ret = vduse_dev_dereg_umem(dev, umem.iova, 1233 umem.size); 1234 break; 1235 } 1236 case VDUSE_IOTLB_GET_INFO: { 1237 struct vduse_iova_info info; 1238 struct vhost_iotlb_map *map; 1239 struct vduse_iova_domain *domain = dev->domain; 1240 1241 ret = -EFAULT; 1242 if (copy_from_user(&info, argp, sizeof(info))) 1243 break; 1244 1245 ret = -EINVAL; 1246 if (info.start > info.last) 1247 break; 1248 1249 if (!is_mem_zero((const char *)info.reserved, 1250 sizeof(info.reserved))) 1251 break; 1252 1253 spin_lock(&domain->iotlb_lock); 1254 map = vhost_iotlb_itree_first(domain->iotlb, 1255 info.start, info.last); 1256 if (map) { 1257 info.start = map->start; 1258 info.last = map->last; 1259 info.capability = 0; 1260 if (domain->bounce_map && map->start == 0 && 1261 map->last == domain->bounce_size - 1) 1262 info.capability |= VDUSE_IOVA_CAP_UMEM; 1263 } 1264 spin_unlock(&domain->iotlb_lock); 1265 if (!map) 1266 break; 1267 1268 ret = -EFAULT; 1269 if (copy_to_user(argp, &info, sizeof(info))) 1270 break; 1271 1272 ret = 0; 1273 break; 1274 } 1275 default: 1276 ret = -ENOIOCTLCMD; 1277 break; 1278 } 1279 1280 return ret; 1281 } 1282 1283 static int vduse_dev_release(struct inode *inode, struct file *file) 1284 { 1285 struct vduse_dev *dev = file->private_data; 1286 1287 vduse_dev_dereg_umem(dev, 0, dev->domain->bounce_size); 1288 spin_lock(&dev->msg_lock); 1289 /* Make sure the inflight messages can processed after reconncection */ 1290 list_splice_init(&dev->recv_list, &dev->send_list); 1291 spin_unlock(&dev->msg_lock); 1292 dev->connected = false; 1293 1294 return 0; 1295 } 1296 1297 static struct vduse_dev *vduse_dev_get_from_minor(int minor) 1298 { 1299 struct vduse_dev *dev; 1300 1301 mutex_lock(&vduse_lock); 1302 dev = idr_find(&vduse_idr, minor); 1303 mutex_unlock(&vduse_lock); 1304 1305 return dev; 1306 } 1307 1308 static int vduse_dev_open(struct inode *inode, struct file *file) 1309 { 1310 int ret; 1311 struct vduse_dev *dev = vduse_dev_get_from_minor(iminor(inode)); 1312 1313 if (!dev) 1314 return -ENODEV; 1315 1316 ret = -EBUSY; 1317 mutex_lock(&dev->lock); 1318 if (dev->connected) 1319 goto unlock; 1320 1321 ret = 0; 1322 dev->connected = true; 1323 file->private_data = dev; 1324 unlock: 1325 mutex_unlock(&dev->lock); 1326 1327 return ret; 1328 } 1329 1330 static const struct file_operations vduse_dev_fops = { 1331 .owner = THIS_MODULE, 1332 .open = vduse_dev_open, 1333 .release = vduse_dev_release, 1334 .read_iter = vduse_dev_read_iter, 1335 .write_iter = vduse_dev_write_iter, 1336 .poll = vduse_dev_poll, 1337 .unlocked_ioctl = vduse_dev_ioctl, 1338 .compat_ioctl = compat_ptr_ioctl, 1339 .llseek = noop_llseek, 1340 }; 1341 1342 static struct vduse_dev *vduse_dev_create(void) 1343 { 1344 struct vduse_dev *dev = kzalloc(sizeof(*dev), GFP_KERNEL); 1345 1346 if (!dev) 1347 return NULL; 1348 1349 mutex_init(&dev->lock); 1350 mutex_init(&dev->mem_lock); 1351 spin_lock_init(&dev->msg_lock); 1352 INIT_LIST_HEAD(&dev->send_list); 1353 INIT_LIST_HEAD(&dev->recv_list); 1354 spin_lock_init(&dev->irq_lock); 1355 init_rwsem(&dev->rwsem); 1356 1357 INIT_WORK(&dev->inject, vduse_dev_irq_inject); 1358 init_waitqueue_head(&dev->waitq); 1359 1360 return dev; 1361 } 1362 1363 static void vduse_dev_destroy(struct vduse_dev *dev) 1364 { 1365 kfree(dev); 1366 } 1367 1368 static struct vduse_dev *vduse_find_dev(const char *name) 1369 { 1370 struct vduse_dev *dev; 1371 int id; 1372 1373 idr_for_each_entry(&vduse_idr, dev, id) 1374 if (!strcmp(dev->name, name)) 1375 return dev; 1376 1377 return NULL; 1378 } 1379 1380 static int vduse_destroy_dev(char *name) 1381 { 1382 struct vduse_dev *dev = vduse_find_dev(name); 1383 1384 if (!dev) 1385 return -EINVAL; 1386 1387 mutex_lock(&dev->lock); 1388 if (dev->vdev || dev->connected) { 1389 mutex_unlock(&dev->lock); 1390 return -EBUSY; 1391 } 1392 dev->connected = true; 1393 mutex_unlock(&dev->lock); 1394 1395 vduse_dev_reset(dev); 1396 device_destroy(vduse_class, MKDEV(MAJOR(vduse_major), dev->minor)); 1397 idr_remove(&vduse_idr, dev->minor); 1398 kvfree(dev->config); 1399 kfree(dev->vqs); 1400 vduse_domain_destroy(dev->domain); 1401 kfree(dev->name); 1402 vduse_dev_destroy(dev); 1403 module_put(THIS_MODULE); 1404 1405 return 0; 1406 } 1407 1408 static bool device_is_allowed(u32 device_id) 1409 { 1410 int i; 1411 1412 for (i = 0; i < ARRAY_SIZE(allowed_device_id); i++) 1413 if (allowed_device_id[i] == device_id) 1414 return true; 1415 1416 return false; 1417 } 1418 1419 static bool features_is_valid(u64 features) 1420 { 1421 if (!(features & (1ULL << VIRTIO_F_ACCESS_PLATFORM))) 1422 return false; 1423 1424 /* Now we only support read-only configuration space */ 1425 if (features & (1ULL << VIRTIO_BLK_F_CONFIG_WCE)) 1426 return false; 1427 1428 return true; 1429 } 1430 1431 static bool vduse_validate_config(struct vduse_dev_config *config) 1432 { 1433 if (!is_mem_zero((const char *)config->reserved, 1434 sizeof(config->reserved))) 1435 return false; 1436 1437 if (config->vq_align > PAGE_SIZE) 1438 return false; 1439 1440 if (config->config_size > PAGE_SIZE) 1441 return false; 1442 1443 if (!device_is_allowed(config->device_id)) 1444 return false; 1445 1446 if (!features_is_valid(config->features)) 1447 return false; 1448 1449 return true; 1450 } 1451 1452 static ssize_t msg_timeout_show(struct device *device, 1453 struct device_attribute *attr, char *buf) 1454 { 1455 struct vduse_dev *dev = dev_get_drvdata(device); 1456 1457 return sysfs_emit(buf, "%u\n", dev->msg_timeout); 1458 } 1459 1460 static ssize_t msg_timeout_store(struct device *device, 1461 struct device_attribute *attr, 1462 const char *buf, size_t count) 1463 { 1464 struct vduse_dev *dev = dev_get_drvdata(device); 1465 int ret; 1466 1467 ret = kstrtouint(buf, 10, &dev->msg_timeout); 1468 if (ret < 0) 1469 return ret; 1470 1471 return count; 1472 } 1473 1474 static DEVICE_ATTR_RW(msg_timeout); 1475 1476 static struct attribute *vduse_dev_attrs[] = { 1477 &dev_attr_msg_timeout.attr, 1478 NULL 1479 }; 1480 1481 ATTRIBUTE_GROUPS(vduse_dev); 1482 1483 static int vduse_create_dev(struct vduse_dev_config *config, 1484 void *config_buf, u64 api_version) 1485 { 1486 int i, ret; 1487 struct vduse_dev *dev; 1488 1489 ret = -EEXIST; 1490 if (vduse_find_dev(config->name)) 1491 goto err; 1492 1493 ret = -ENOMEM; 1494 dev = vduse_dev_create(); 1495 if (!dev) 1496 goto err; 1497 1498 dev->api_version = api_version; 1499 dev->device_features = config->features; 1500 dev->device_id = config->device_id; 1501 dev->vendor_id = config->vendor_id; 1502 dev->name = kstrdup(config->name, GFP_KERNEL); 1503 if (!dev->name) 1504 goto err_str; 1505 1506 dev->domain = vduse_domain_create(VDUSE_IOVA_SIZE - 1, 1507 VDUSE_BOUNCE_SIZE); 1508 if (!dev->domain) 1509 goto err_domain; 1510 1511 dev->config = config_buf; 1512 dev->config_size = config->config_size; 1513 dev->vq_align = config->vq_align; 1514 dev->vq_num = config->vq_num; 1515 dev->vqs = kcalloc(dev->vq_num, sizeof(*dev->vqs), GFP_KERNEL); 1516 if (!dev->vqs) 1517 goto err_vqs; 1518 1519 for (i = 0; i < dev->vq_num; i++) { 1520 dev->vqs[i].index = i; 1521 INIT_WORK(&dev->vqs[i].inject, vduse_vq_irq_inject); 1522 INIT_WORK(&dev->vqs[i].kick, vduse_vq_kick_work); 1523 spin_lock_init(&dev->vqs[i].kick_lock); 1524 spin_lock_init(&dev->vqs[i].irq_lock); 1525 } 1526 1527 ret = idr_alloc(&vduse_idr, dev, 1, VDUSE_DEV_MAX, GFP_KERNEL); 1528 if (ret < 0) 1529 goto err_idr; 1530 1531 dev->minor = ret; 1532 dev->msg_timeout = VDUSE_MSG_DEFAULT_TIMEOUT; 1533 dev->dev = device_create_with_groups(vduse_class, NULL, 1534 MKDEV(MAJOR(vduse_major), dev->minor), 1535 dev, vduse_dev_groups, "%s", config->name); 1536 if (IS_ERR(dev->dev)) { 1537 ret = PTR_ERR(dev->dev); 1538 goto err_dev; 1539 } 1540 __module_get(THIS_MODULE); 1541 1542 return 0; 1543 err_dev: 1544 idr_remove(&vduse_idr, dev->minor); 1545 err_idr: 1546 kfree(dev->vqs); 1547 err_vqs: 1548 vduse_domain_destroy(dev->domain); 1549 err_domain: 1550 kfree(dev->name); 1551 err_str: 1552 vduse_dev_destroy(dev); 1553 err: 1554 return ret; 1555 } 1556 1557 static long vduse_ioctl(struct file *file, unsigned int cmd, 1558 unsigned long arg) 1559 { 1560 int ret; 1561 void __user *argp = (void __user *)arg; 1562 struct vduse_control *control = file->private_data; 1563 1564 mutex_lock(&vduse_lock); 1565 switch (cmd) { 1566 case VDUSE_GET_API_VERSION: 1567 ret = put_user(control->api_version, (u64 __user *)argp); 1568 break; 1569 case VDUSE_SET_API_VERSION: { 1570 u64 api_version; 1571 1572 ret = -EFAULT; 1573 if (get_user(api_version, (u64 __user *)argp)) 1574 break; 1575 1576 ret = -EINVAL; 1577 if (api_version > VDUSE_API_VERSION) 1578 break; 1579 1580 ret = 0; 1581 control->api_version = api_version; 1582 break; 1583 } 1584 case VDUSE_CREATE_DEV: { 1585 struct vduse_dev_config config; 1586 unsigned long size = offsetof(struct vduse_dev_config, config); 1587 void *buf; 1588 1589 ret = -EFAULT; 1590 if (copy_from_user(&config, argp, size)) 1591 break; 1592 1593 ret = -EINVAL; 1594 if (vduse_validate_config(&config) == false) 1595 break; 1596 1597 buf = vmemdup_user(argp + size, config.config_size); 1598 if (IS_ERR(buf)) { 1599 ret = PTR_ERR(buf); 1600 break; 1601 } 1602 config.name[VDUSE_NAME_MAX - 1] = '\0'; 1603 ret = vduse_create_dev(&config, buf, control->api_version); 1604 if (ret) 1605 kvfree(buf); 1606 break; 1607 } 1608 case VDUSE_DESTROY_DEV: { 1609 char name[VDUSE_NAME_MAX]; 1610 1611 ret = -EFAULT; 1612 if (copy_from_user(name, argp, VDUSE_NAME_MAX)) 1613 break; 1614 1615 name[VDUSE_NAME_MAX - 1] = '\0'; 1616 ret = vduse_destroy_dev(name); 1617 break; 1618 } 1619 default: 1620 ret = -EINVAL; 1621 break; 1622 } 1623 mutex_unlock(&vduse_lock); 1624 1625 return ret; 1626 } 1627 1628 static int vduse_release(struct inode *inode, struct file *file) 1629 { 1630 struct vduse_control *control = file->private_data; 1631 1632 kfree(control); 1633 return 0; 1634 } 1635 1636 static int vduse_open(struct inode *inode, struct file *file) 1637 { 1638 struct vduse_control *control; 1639 1640 control = kmalloc(sizeof(struct vduse_control), GFP_KERNEL); 1641 if (!control) 1642 return -ENOMEM; 1643 1644 control->api_version = VDUSE_API_VERSION; 1645 file->private_data = control; 1646 1647 return 0; 1648 } 1649 1650 static const struct file_operations vduse_ctrl_fops = { 1651 .owner = THIS_MODULE, 1652 .open = vduse_open, 1653 .release = vduse_release, 1654 .unlocked_ioctl = vduse_ioctl, 1655 .compat_ioctl = compat_ptr_ioctl, 1656 .llseek = noop_llseek, 1657 }; 1658 1659 static char *vduse_devnode(struct device *dev, umode_t *mode) 1660 { 1661 return kasprintf(GFP_KERNEL, "vduse/%s", dev_name(dev)); 1662 } 1663 1664 struct vduse_mgmt_dev { 1665 struct vdpa_mgmt_dev mgmt_dev; 1666 struct device dev; 1667 }; 1668 1669 static struct vduse_mgmt_dev *vduse_mgmt; 1670 1671 static int vduse_dev_init_vdpa(struct vduse_dev *dev, const char *name) 1672 { 1673 struct vduse_vdpa *vdev; 1674 int ret; 1675 1676 if (dev->vdev) 1677 return -EEXIST; 1678 1679 vdev = vdpa_alloc_device(struct vduse_vdpa, vdpa, dev->dev, 1680 &vduse_vdpa_config_ops, 1, 1, name, true); 1681 if (IS_ERR(vdev)) 1682 return PTR_ERR(vdev); 1683 1684 dev->vdev = vdev; 1685 vdev->dev = dev; 1686 vdev->vdpa.dev.dma_mask = &vdev->vdpa.dev.coherent_dma_mask; 1687 ret = dma_set_mask_and_coherent(&vdev->vdpa.dev, DMA_BIT_MASK(64)); 1688 if (ret) { 1689 put_device(&vdev->vdpa.dev); 1690 return ret; 1691 } 1692 set_dma_ops(&vdev->vdpa.dev, &vduse_dev_dma_ops); 1693 vdev->vdpa.dma_dev = &vdev->vdpa.dev; 1694 vdev->vdpa.mdev = &vduse_mgmt->mgmt_dev; 1695 1696 return 0; 1697 } 1698 1699 static int vdpa_dev_add(struct vdpa_mgmt_dev *mdev, const char *name, 1700 const struct vdpa_dev_set_config *config) 1701 { 1702 struct vduse_dev *dev; 1703 int ret; 1704 1705 mutex_lock(&vduse_lock); 1706 dev = vduse_find_dev(name); 1707 if (!dev || !vduse_dev_is_ready(dev)) { 1708 mutex_unlock(&vduse_lock); 1709 return -EINVAL; 1710 } 1711 ret = vduse_dev_init_vdpa(dev, name); 1712 mutex_unlock(&vduse_lock); 1713 if (ret) 1714 return ret; 1715 1716 ret = _vdpa_register_device(&dev->vdev->vdpa, dev->vq_num); 1717 if (ret) { 1718 put_device(&dev->vdev->vdpa.dev); 1719 return ret; 1720 } 1721 1722 return 0; 1723 } 1724 1725 static void vdpa_dev_del(struct vdpa_mgmt_dev *mdev, struct vdpa_device *dev) 1726 { 1727 _vdpa_unregister_device(dev); 1728 } 1729 1730 static const struct vdpa_mgmtdev_ops vdpa_dev_mgmtdev_ops = { 1731 .dev_add = vdpa_dev_add, 1732 .dev_del = vdpa_dev_del, 1733 }; 1734 1735 static struct virtio_device_id id_table[] = { 1736 { VIRTIO_ID_BLOCK, VIRTIO_DEV_ANY_ID }, 1737 { 0 }, 1738 }; 1739 1740 static void vduse_mgmtdev_release(struct device *dev) 1741 { 1742 struct vduse_mgmt_dev *mgmt_dev; 1743 1744 mgmt_dev = container_of(dev, struct vduse_mgmt_dev, dev); 1745 kfree(mgmt_dev); 1746 } 1747 1748 static int vduse_mgmtdev_init(void) 1749 { 1750 int ret; 1751 1752 vduse_mgmt = kzalloc(sizeof(*vduse_mgmt), GFP_KERNEL); 1753 if (!vduse_mgmt) 1754 return -ENOMEM; 1755 1756 ret = dev_set_name(&vduse_mgmt->dev, "vduse"); 1757 if (ret) { 1758 kfree(vduse_mgmt); 1759 return ret; 1760 } 1761 1762 vduse_mgmt->dev.release = vduse_mgmtdev_release; 1763 1764 ret = device_register(&vduse_mgmt->dev); 1765 if (ret) 1766 goto dev_reg_err; 1767 1768 vduse_mgmt->mgmt_dev.id_table = id_table; 1769 vduse_mgmt->mgmt_dev.ops = &vdpa_dev_mgmtdev_ops; 1770 vduse_mgmt->mgmt_dev.device = &vduse_mgmt->dev; 1771 ret = vdpa_mgmtdev_register(&vduse_mgmt->mgmt_dev); 1772 if (ret) 1773 device_unregister(&vduse_mgmt->dev); 1774 1775 return ret; 1776 1777 dev_reg_err: 1778 put_device(&vduse_mgmt->dev); 1779 return ret; 1780 } 1781 1782 static void vduse_mgmtdev_exit(void) 1783 { 1784 vdpa_mgmtdev_unregister(&vduse_mgmt->mgmt_dev); 1785 device_unregister(&vduse_mgmt->dev); 1786 } 1787 1788 static int vduse_init(void) 1789 { 1790 int ret; 1791 struct device *dev; 1792 1793 vduse_class = class_create(THIS_MODULE, "vduse"); 1794 if (IS_ERR(vduse_class)) 1795 return PTR_ERR(vduse_class); 1796 1797 vduse_class->devnode = vduse_devnode; 1798 1799 ret = alloc_chrdev_region(&vduse_major, 0, VDUSE_DEV_MAX, "vduse"); 1800 if (ret) 1801 goto err_chardev_region; 1802 1803 /* /dev/vduse/control */ 1804 cdev_init(&vduse_ctrl_cdev, &vduse_ctrl_fops); 1805 vduse_ctrl_cdev.owner = THIS_MODULE; 1806 ret = cdev_add(&vduse_ctrl_cdev, vduse_major, 1); 1807 if (ret) 1808 goto err_ctrl_cdev; 1809 1810 dev = device_create(vduse_class, NULL, vduse_major, NULL, "control"); 1811 if (IS_ERR(dev)) { 1812 ret = PTR_ERR(dev); 1813 goto err_device; 1814 } 1815 1816 /* /dev/vduse/$DEVICE */ 1817 cdev_init(&vduse_cdev, &vduse_dev_fops); 1818 vduse_cdev.owner = THIS_MODULE; 1819 ret = cdev_add(&vduse_cdev, MKDEV(MAJOR(vduse_major), 1), 1820 VDUSE_DEV_MAX - 1); 1821 if (ret) 1822 goto err_cdev; 1823 1824 vduse_irq_wq = alloc_workqueue("vduse-irq", 1825 WQ_HIGHPRI | WQ_SYSFS | WQ_UNBOUND, 0); 1826 if (!vduse_irq_wq) { 1827 ret = -ENOMEM; 1828 goto err_wq; 1829 } 1830 1831 ret = vduse_domain_init(); 1832 if (ret) 1833 goto err_domain; 1834 1835 ret = vduse_mgmtdev_init(); 1836 if (ret) 1837 goto err_mgmtdev; 1838 1839 return 0; 1840 err_mgmtdev: 1841 vduse_domain_exit(); 1842 err_domain: 1843 destroy_workqueue(vduse_irq_wq); 1844 err_wq: 1845 cdev_del(&vduse_cdev); 1846 err_cdev: 1847 device_destroy(vduse_class, vduse_major); 1848 err_device: 1849 cdev_del(&vduse_ctrl_cdev); 1850 err_ctrl_cdev: 1851 unregister_chrdev_region(vduse_major, VDUSE_DEV_MAX); 1852 err_chardev_region: 1853 class_destroy(vduse_class); 1854 return ret; 1855 } 1856 module_init(vduse_init); 1857 1858 static void vduse_exit(void) 1859 { 1860 vduse_mgmtdev_exit(); 1861 vduse_domain_exit(); 1862 destroy_workqueue(vduse_irq_wq); 1863 cdev_del(&vduse_cdev); 1864 device_destroy(vduse_class, vduse_major); 1865 cdev_del(&vduse_ctrl_cdev); 1866 unregister_chrdev_region(vduse_major, VDUSE_DEV_MAX); 1867 class_destroy(vduse_class); 1868 } 1869 module_exit(vduse_exit); 1870 1871 MODULE_LICENSE(DRV_LICENSE); 1872 MODULE_AUTHOR(DRV_AUTHOR); 1873 MODULE_DESCRIPTION(DRV_DESC); 1874