]>
Commit | Line | Data |
---|---|---|
7a338472 | 1 | // SPDX-License-Identifier: GPL-2.0-only |
0ea9e1d3 AH |
2 | /* |
3 | * virtio transport for vsock | |
4 | * | |
5 | * Copyright (C) 2013-2015 Red Hat, Inc. | |
6 | * Author: Asias He <[email protected]> | |
7 | * Stefan Hajnoczi <[email protected]> | |
8 | * | |
9 | * Some of the code is take from Gerd Hoffmann <[email protected]>'s | |
10 | * early virtio-vsock proof-of-concept bits. | |
0ea9e1d3 AH |
11 | */ |
12 | #include <linux/spinlock.h> | |
13 | #include <linux/module.h> | |
14 | #include <linux/list.h> | |
15 | #include <linux/atomic.h> | |
16 | #include <linux/virtio.h> | |
17 | #include <linux/virtio_ids.h> | |
18 | #include <linux/virtio_config.h> | |
19 | #include <linux/virtio_vsock.h> | |
20 | #include <net/sock.h> | |
21 | #include <linux/mutex.h> | |
22 | #include <net/af_vsock.h> | |
23 | ||
24 | static struct workqueue_struct *virtio_vsock_workqueue; | |
f961134a | 25 | static struct virtio_vsock __rcu *the_virtio_vsock; |
0ea9e1d3 | 26 | static DEFINE_MUTEX(the_virtio_vsock_mutex); /* protects the_virtio_vsock */ |
8e6ed963 | 27 | static struct virtio_transport virtio_transport; /* forward declaration */ |
0ea9e1d3 AH |
28 | |
29 | struct virtio_vsock { | |
30 | struct virtio_device *vdev; | |
31 | struct virtqueue *vqs[VSOCK_VQ_MAX]; | |
32 | ||
33 | /* Virtqueue processing is deferred to a workqueue */ | |
34 | struct work_struct tx_work; | |
35 | struct work_struct rx_work; | |
36 | struct work_struct event_work; | |
37 | ||
38 | /* The following fields are protected by tx_lock. vqs[VSOCK_VQ_TX] | |
39 | * must be accessed with tx_lock held. | |
40 | */ | |
41 | struct mutex tx_lock; | |
b917507e | 42 | bool tx_run; |
0ea9e1d3 AH |
43 | |
44 | struct work_struct send_pkt_work; | |
71dc9ec9 | 45 | struct sk_buff_head send_pkt_queue; |
0ea9e1d3 AH |
46 | |
47 | atomic_t queued_replies; | |
48 | ||
49 | /* The following fields are protected by rx_lock. vqs[VSOCK_VQ_RX] | |
50 | * must be accessed with rx_lock held. | |
51 | */ | |
52 | struct mutex rx_lock; | |
b917507e | 53 | bool rx_run; |
0ea9e1d3 AH |
54 | int rx_buf_nr; |
55 | int rx_buf_max_nr; | |
56 | ||
57 | /* The following fields are protected by event_lock. | |
58 | * vqs[VSOCK_VQ_EVENT] must be accessed with event_lock held. | |
59 | */ | |
60 | struct mutex event_lock; | |
b917507e | 61 | bool event_run; |
0ea9e1d3 AH |
62 | struct virtio_vsock_event event_list[8]; |
63 | ||
64 | u32 guest_cid; | |
53efbba1 | 65 | bool seqpacket_allow; |
64c99d2d AK |
66 | |
67 | /* These fields are used only in tx path in function | |
68 | * 'virtio_transport_send_pkt_work()', so to save | |
69 | * stack space in it, place both of them here. Each | |
70 | * pointer from 'out_sgs' points to the corresponding | |
71 | * element in 'out_bufs' - this is initialized in | |
72 | * 'virtio_vsock_probe()'. Both fields are protected | |
73 | * by 'tx_lock'. +1 is needed for packet header. | |
74 | */ | |
75 | struct scatterlist *out_sgs[MAX_SKB_FRAGS + 1]; | |
76 | struct scatterlist out_bufs[MAX_SKB_FRAGS + 1]; | |
0ea9e1d3 AH |
77 | }; |
78 | ||
0ea9e1d3 AH |
79 | static u32 virtio_transport_get_local_cid(void) |
80 | { | |
0deab087 SG |
81 | struct virtio_vsock *vsock; |
82 | u32 ret; | |
0ea9e1d3 | 83 | |
0deab087 SG |
84 | rcu_read_lock(); |
85 | vsock = rcu_dereference(the_virtio_vsock); | |
86 | if (!vsock) { | |
87 | ret = VMADDR_CID_ANY; | |
88 | goto out_rcu; | |
89 | } | |
22b5c0b6 | 90 | |
0deab087 SG |
91 | ret = vsock->guest_cid; |
92 | out_rcu: | |
93 | rcu_read_unlock(); | |
94 | return ret; | |
0ea9e1d3 AH |
95 | } |
96 | ||
26618da3 MP |
97 | /* Caller need to hold vsock->tx_lock on vq */ |
98 | static int virtio_transport_send_skb(struct sk_buff *skb, struct virtqueue *vq, | |
a194c985 | 99 | struct virtio_vsock *vsock, gfp_t gfp) |
26618da3 MP |
100 | { |
101 | int ret, in_sg = 0, out_sg = 0; | |
102 | struct scatterlist **sgs; | |
103 | ||
104 | sgs = vsock->out_sgs; | |
105 | sg_init_one(sgs[out_sg], virtio_vsock_hdr(skb), | |
106 | sizeof(*virtio_vsock_hdr(skb))); | |
107 | out_sg++; | |
108 | ||
109 | if (!skb_is_nonlinear(skb)) { | |
110 | if (skb->len > 0) { | |
111 | sg_init_one(sgs[out_sg], skb->data, skb->len); | |
112 | out_sg++; | |
113 | } | |
114 | } else { | |
115 | struct skb_shared_info *si; | |
116 | int i; | |
117 | ||
118 | /* If skb is nonlinear, then its buffer must contain | |
119 | * only header and nothing more. Data is stored in | |
120 | * the fragged part. | |
121 | */ | |
122 | WARN_ON_ONCE(skb_headroom(skb) != sizeof(*virtio_vsock_hdr(skb))); | |
123 | ||
124 | si = skb_shinfo(skb); | |
125 | ||
126 | for (i = 0; i < si->nr_frags; i++) { | |
127 | skb_frag_t *skb_frag = &si->frags[i]; | |
128 | void *va; | |
129 | ||
130 | /* We will use 'page_to_virt()' for the userspace page | |
131 | * here, because virtio or dma-mapping layers will call | |
132 | * 'virt_to_phys()' later to fill the buffer descriptor. | |
133 | * We don't touch memory at "virtual" address of this page. | |
134 | */ | |
135 | va = page_to_virt(skb_frag_page(skb_frag)); | |
136 | sg_init_one(sgs[out_sg], | |
137 | va + skb_frag_off(skb_frag), | |
138 | skb_frag_size(skb_frag)); | |
139 | out_sg++; | |
140 | } | |
141 | } | |
142 | ||
a194c985 | 143 | ret = virtqueue_add_sgs(vq, sgs, out_sg, in_sg, skb, gfp); |
26618da3 MP |
144 | /* Usually this means that there is no more space available in |
145 | * the vq | |
146 | */ | |
147 | if (ret < 0) | |
148 | return ret; | |
149 | ||
150 | virtio_transport_deliver_tap_pkt(skb); | |
151 | return 0; | |
152 | } | |
153 | ||
0ea9e1d3 AH |
154 | static void |
155 | virtio_transport_send_pkt_work(struct work_struct *work) | |
156 | { | |
157 | struct virtio_vsock *vsock = | |
158 | container_of(work, struct virtio_vsock, send_pkt_work); | |
159 | struct virtqueue *vq; | |
160 | bool added = false; | |
161 | bool restart_rx = false; | |
162 | ||
163 | mutex_lock(&vsock->tx_lock); | |
164 | ||
b917507e SG |
165 | if (!vsock->tx_run) |
166 | goto out; | |
167 | ||
0ea9e1d3 AH |
168 | vq = vsock->vqs[VSOCK_VQ_TX]; |
169 | ||
0ea9e1d3 | 170 | for (;;) { |
71dc9ec9 | 171 | struct sk_buff *skb; |
0ea9e1d3 | 172 | bool reply; |
26618da3 | 173 | int ret; |
0ea9e1d3 | 174 | |
71dc9ec9 BE |
175 | skb = virtio_vsock_skb_dequeue(&vsock->send_pkt_queue); |
176 | if (!skb) | |
0ea9e1d3 | 177 | break; |
0ea9e1d3 | 178 | |
71dc9ec9 | 179 | reply = virtio_vsock_skb_reply(skb); |
0ea9e1d3 | 180 | |
a194c985 | 181 | ret = virtio_transport_send_skb(skb, vq, vsock, GFP_KERNEL); |
0ea9e1d3 | 182 | if (ret < 0) { |
71dc9ec9 | 183 | virtio_vsock_skb_queue_head(&vsock->send_pkt_queue, skb); |
0ea9e1d3 AH |
184 | break; |
185 | } | |
186 | ||
187 | if (reply) { | |
188 | struct virtqueue *rx_vq = vsock->vqs[VSOCK_VQ_RX]; | |
189 | int val; | |
190 | ||
191 | val = atomic_dec_return(&vsock->queued_replies); | |
192 | ||
193 | /* Do we now have resources to resume rx processing? */ | |
194 | if (val + 1 == virtqueue_get_vring_size(rx_vq)) | |
195 | restart_rx = true; | |
196 | } | |
197 | ||
198 | added = true; | |
199 | } | |
200 | ||
201 | if (added) | |
202 | virtqueue_kick(vq); | |
203 | ||
b917507e | 204 | out: |
0ea9e1d3 AH |
205 | mutex_unlock(&vsock->tx_lock); |
206 | ||
207 | if (restart_rx) | |
208 | queue_work(virtio_vsock_workqueue, &vsock->rx_work); | |
209 | } | |
210 | ||
efcd71af LL |
211 | /* Caller need to hold RCU for vsock. |
212 | * Returns 0 if the packet is successfully put on the vq. | |
213 | */ | |
214 | static int virtio_transport_send_skb_fast_path(struct virtio_vsock *vsock, struct sk_buff *skb) | |
215 | { | |
216 | struct virtqueue *vq = vsock->vqs[VSOCK_VQ_TX]; | |
217 | int ret; | |
218 | ||
219 | /* Inside RCU, can't sleep! */ | |
220 | ret = mutex_trylock(&vsock->tx_lock); | |
221 | if (unlikely(ret == 0)) | |
222 | return -EBUSY; | |
223 | ||
a194c985 | 224 | ret = virtio_transport_send_skb(skb, vq, vsock, GFP_ATOMIC); |
efcd71af LL |
225 | if (ret == 0) |
226 | virtqueue_kick(vq); | |
227 | ||
228 | mutex_unlock(&vsock->tx_lock); | |
229 | ||
230 | return ret; | |
231 | } | |
232 | ||
0ea9e1d3 | 233 | static int |
71dc9ec9 | 234 | virtio_transport_send_pkt(struct sk_buff *skb) |
0ea9e1d3 | 235 | { |
71dc9ec9 | 236 | struct virtio_vsock_hdr *hdr; |
0ea9e1d3 | 237 | struct virtio_vsock *vsock; |
71dc9ec9 BE |
238 | int len = skb->len; |
239 | ||
240 | hdr = virtio_vsock_hdr(skb); | |
0ea9e1d3 | 241 | |
0deab087 SG |
242 | rcu_read_lock(); |
243 | vsock = rcu_dereference(the_virtio_vsock); | |
0ea9e1d3 | 244 | if (!vsock) { |
71dc9ec9 | 245 | kfree_skb(skb); |
0deab087 SG |
246 | len = -ENODEV; |
247 | goto out_rcu; | |
0ea9e1d3 AH |
248 | } |
249 | ||
71dc9ec9 BE |
250 | if (le64_to_cpu(hdr->dst_cid) == vsock->guest_cid) { |
251 | kfree_skb(skb); | |
bf5432b1 | 252 | len = -ENODEV; |
0deab087 SG |
253 | goto out_rcu; |
254 | } | |
b9116823 | 255 | |
efcd71af LL |
256 | /* If send_pkt_queue is empty, we can safely bypass this queue |
257 | * because packet order is maintained and (try) to put the packet | |
258 | * on the virtqueue using virtio_transport_send_skb_fast_path. | |
259 | * If this fails we simply put the packet on the intermediate | |
260 | * queue and schedule the worker. | |
261 | */ | |
262 | if (!skb_queue_empty_lockless(&vsock->send_pkt_queue) || | |
263 | virtio_transport_send_skb_fast_path(vsock, skb)) { | |
264 | if (virtio_vsock_skb_reply(skb)) | |
265 | atomic_inc(&vsock->queued_replies); | |
0ea9e1d3 | 266 | |
efcd71af LL |
267 | virtio_vsock_skb_queue_tail(&vsock->send_pkt_queue, skb); |
268 | queue_work(virtio_vsock_workqueue, &vsock->send_pkt_work); | |
269 | } | |
0deab087 SG |
270 | |
271 | out_rcu: | |
272 | rcu_read_unlock(); | |
0ea9e1d3 AH |
273 | return len; |
274 | } | |
275 | ||
073b4f2c PT |
276 | static int |
277 | virtio_transport_cancel_pkt(struct vsock_sock *vsk) | |
278 | { | |
279 | struct virtio_vsock *vsock; | |
0deab087 | 280 | int cnt = 0, ret; |
073b4f2c | 281 | |
0deab087 SG |
282 | rcu_read_lock(); |
283 | vsock = rcu_dereference(the_virtio_vsock); | |
073b4f2c | 284 | if (!vsock) { |
0deab087 SG |
285 | ret = -ENODEV; |
286 | goto out_rcu; | |
073b4f2c PT |
287 | } |
288 | ||
71dc9ec9 | 289 | cnt = virtio_transport_purge_skbs(vsk, &vsock->send_pkt_queue); |
073b4f2c PT |
290 | |
291 | if (cnt) { | |
292 | struct virtqueue *rx_vq = vsock->vqs[VSOCK_VQ_RX]; | |
293 | int new_cnt; | |
294 | ||
295 | new_cnt = atomic_sub_return(cnt, &vsock->queued_replies); | |
296 | if (new_cnt + cnt >= virtqueue_get_vring_size(rx_vq) && | |
297 | new_cnt < virtqueue_get_vring_size(rx_vq)) | |
298 | queue_work(virtio_vsock_workqueue, &vsock->rx_work); | |
299 | } | |
300 | ||
0deab087 SG |
301 | ret = 0; |
302 | ||
303 | out_rcu: | |
304 | rcu_read_unlock(); | |
305 | return ret; | |
073b4f2c PT |
306 | } |
307 | ||
0ea9e1d3 AH |
308 | static void virtio_vsock_rx_fill(struct virtio_vsock *vsock) |
309 | { | |
71dc9ec9 BE |
310 | int total_len = VIRTIO_VSOCK_DEFAULT_RX_BUF_SIZE + VIRTIO_VSOCK_SKB_HEADROOM; |
311 | struct scatterlist pkt, *p; | |
0ea9e1d3 | 312 | struct virtqueue *vq; |
71dc9ec9 | 313 | struct sk_buff *skb; |
0ea9e1d3 AH |
314 | int ret; |
315 | ||
316 | vq = vsock->vqs[VSOCK_VQ_RX]; | |
317 | ||
318 | do { | |
71dc9ec9 BE |
319 | skb = virtio_vsock_alloc_skb(total_len, GFP_KERNEL); |
320 | if (!skb) | |
0ea9e1d3 AH |
321 | break; |
322 | ||
71dc9ec9 BE |
323 | memset(skb->head, 0, VIRTIO_VSOCK_SKB_HEADROOM); |
324 | sg_init_one(&pkt, virtio_vsock_hdr(skb), total_len); | |
325 | p = &pkt; | |
326 | ret = virtqueue_add_sgs(vq, &p, 0, 1, skb, GFP_KERNEL); | |
327 | if (ret < 0) { | |
328 | kfree_skb(skb); | |
0ea9e1d3 AH |
329 | break; |
330 | } | |
331 | ||
0ea9e1d3 AH |
332 | vsock->rx_buf_nr++; |
333 | } while (vq->num_free); | |
334 | if (vsock->rx_buf_nr > vsock->rx_buf_max_nr) | |
335 | vsock->rx_buf_max_nr = vsock->rx_buf_nr; | |
336 | virtqueue_kick(vq); | |
337 | } | |
338 | ||
339 | static void virtio_transport_tx_work(struct work_struct *work) | |
340 | { | |
341 | struct virtio_vsock *vsock = | |
342 | container_of(work, struct virtio_vsock, tx_work); | |
343 | struct virtqueue *vq; | |
344 | bool added = false; | |
345 | ||
346 | vq = vsock->vqs[VSOCK_VQ_TX]; | |
347 | mutex_lock(&vsock->tx_lock); | |
b917507e SG |
348 | |
349 | if (!vsock->tx_run) | |
350 | goto out; | |
351 | ||
0ea9e1d3 | 352 | do { |
71dc9ec9 | 353 | struct sk_buff *skb; |
0ea9e1d3 AH |
354 | unsigned int len; |
355 | ||
356 | virtqueue_disable_cb(vq); | |
71dc9ec9 | 357 | while ((skb = virtqueue_get_buf(vq, &len)) != NULL) { |
e6ab4500 | 358 | virtio_transport_consume_skb_sent(skb, true); |
0ea9e1d3 AH |
359 | added = true; |
360 | } | |
361 | } while (!virtqueue_enable_cb(vq)); | |
b917507e SG |
362 | |
363 | out: | |
0ea9e1d3 AH |
364 | mutex_unlock(&vsock->tx_lock); |
365 | ||
366 | if (added) | |
367 | queue_work(virtio_vsock_workqueue, &vsock->send_pkt_work); | |
368 | } | |
369 | ||
370 | /* Is there space left for replies to rx packets? */ | |
371 | static bool virtio_transport_more_replies(struct virtio_vsock *vsock) | |
372 | { | |
373 | struct virtqueue *vq = vsock->vqs[VSOCK_VQ_RX]; | |
374 | int val; | |
375 | ||
376 | smp_rmb(); /* paired with atomic_inc() and atomic_dec_return() */ | |
377 | val = atomic_read(&vsock->queued_replies); | |
378 | ||
379 | return val < virtqueue_get_vring_size(vq); | |
380 | } | |
381 | ||
0ea9e1d3 AH |
382 | /* event_lock must be held */ |
383 | static int virtio_vsock_event_fill_one(struct virtio_vsock *vsock, | |
384 | struct virtio_vsock_event *event) | |
385 | { | |
386 | struct scatterlist sg; | |
387 | struct virtqueue *vq; | |
388 | ||
389 | vq = vsock->vqs[VSOCK_VQ_EVENT]; | |
390 | ||
391 | sg_init_one(&sg, event, sizeof(*event)); | |
392 | ||
393 | return virtqueue_add_inbuf(vq, &sg, 1, event, GFP_KERNEL); | |
394 | } | |
395 | ||
396 | /* event_lock must be held */ | |
397 | static void virtio_vsock_event_fill(struct virtio_vsock *vsock) | |
398 | { | |
399 | size_t i; | |
400 | ||
401 | for (i = 0; i < ARRAY_SIZE(vsock->event_list); i++) { | |
402 | struct virtio_vsock_event *event = &vsock->event_list[i]; | |
403 | ||
404 | virtio_vsock_event_fill_one(vsock, event); | |
405 | } | |
406 | ||
407 | virtqueue_kick(vsock->vqs[VSOCK_VQ_EVENT]); | |
408 | } | |
409 | ||
410 | static void virtio_vsock_reset_sock(struct sock *sk) | |
411 | { | |
49b0b6ff LM |
412 | /* vmci_transport.c doesn't take sk_lock here either. At least we're |
413 | * under vsock_table_lock so the sock cannot disappear while we're | |
414 | * executing. | |
415 | */ | |
416 | ||
3b4477d2 | 417 | sk->sk_state = TCP_CLOSE; |
0ea9e1d3 | 418 | sk->sk_err = ECONNRESET; |
e3ae2365 | 419 | sk_error_report(sk); |
0ea9e1d3 AH |
420 | } |
421 | ||
422 | static void virtio_vsock_update_guest_cid(struct virtio_vsock *vsock) | |
423 | { | |
424 | struct virtio_device *vdev = vsock->vdev; | |
6c7efafd | 425 | __le64 guest_cid; |
0ea9e1d3 AH |
426 | |
427 | vdev->config->get(vdev, offsetof(struct virtio_vsock_config, guest_cid), | |
428 | &guest_cid, sizeof(guest_cid)); | |
429 | vsock->guest_cid = le64_to_cpu(guest_cid); | |
430 | } | |
431 | ||
432 | /* event_lock must be held */ | |
433 | static void virtio_vsock_event_handle(struct virtio_vsock *vsock, | |
434 | struct virtio_vsock_event *event) | |
435 | { | |
436 | switch (le32_to_cpu(event->id)) { | |
437 | case VIRTIO_VSOCK_EVENT_TRANSPORT_RESET: | |
438 | virtio_vsock_update_guest_cid(vsock); | |
8e6ed963 JP |
439 | vsock_for_each_connected_socket(&virtio_transport.transport, |
440 | virtio_vsock_reset_sock); | |
0ea9e1d3 AH |
441 | break; |
442 | } | |
443 | } | |
444 | ||
445 | static void virtio_transport_event_work(struct work_struct *work) | |
446 | { | |
447 | struct virtio_vsock *vsock = | |
448 | container_of(work, struct virtio_vsock, event_work); | |
449 | struct virtqueue *vq; | |
450 | ||
451 | vq = vsock->vqs[VSOCK_VQ_EVENT]; | |
452 | ||
453 | mutex_lock(&vsock->event_lock); | |
454 | ||
b917507e SG |
455 | if (!vsock->event_run) |
456 | goto out; | |
457 | ||
0ea9e1d3 AH |
458 | do { |
459 | struct virtio_vsock_event *event; | |
460 | unsigned int len; | |
461 | ||
462 | virtqueue_disable_cb(vq); | |
463 | while ((event = virtqueue_get_buf(vq, &len)) != NULL) { | |
464 | if (len == sizeof(*event)) | |
465 | virtio_vsock_event_handle(vsock, event); | |
466 | ||
467 | virtio_vsock_event_fill_one(vsock, event); | |
468 | } | |
469 | } while (!virtqueue_enable_cb(vq)); | |
470 | ||
471 | virtqueue_kick(vsock->vqs[VSOCK_VQ_EVENT]); | |
b917507e | 472 | out: |
0ea9e1d3 AH |
473 | mutex_unlock(&vsock->event_lock); |
474 | } | |
475 | ||
476 | static void virtio_vsock_event_done(struct virtqueue *vq) | |
477 | { | |
478 | struct virtio_vsock *vsock = vq->vdev->priv; | |
479 | ||
480 | if (!vsock) | |
481 | return; | |
482 | queue_work(virtio_vsock_workqueue, &vsock->event_work); | |
483 | } | |
484 | ||
485 | static void virtio_vsock_tx_done(struct virtqueue *vq) | |
486 | { | |
487 | struct virtio_vsock *vsock = vq->vdev->priv; | |
488 | ||
489 | if (!vsock) | |
490 | return; | |
491 | queue_work(virtio_vsock_workqueue, &vsock->tx_work); | |
492 | } | |
493 | ||
494 | static void virtio_vsock_rx_done(struct virtqueue *vq) | |
495 | { | |
496 | struct virtio_vsock *vsock = vq->vdev->priv; | |
497 | ||
498 | if (!vsock) | |
499 | return; | |
500 | queue_work(virtio_vsock_workqueue, &vsock->rx_work); | |
501 | } | |
502 | ||
581512a6 AK |
503 | static bool virtio_transport_can_msgzerocopy(int bufs_num) |
504 | { | |
505 | struct virtio_vsock *vsock; | |
506 | bool res = false; | |
507 | ||
508 | rcu_read_lock(); | |
509 | ||
510 | vsock = rcu_dereference(the_virtio_vsock); | |
511 | if (vsock) { | |
512 | struct virtqueue *vq = vsock->vqs[VSOCK_VQ_TX]; | |
513 | ||
514 | /* Check that tx queue is large enough to keep whole | |
515 | * data to send. This is needed, because when there is | |
516 | * not enough free space in the queue, current skb to | |
517 | * send will be reinserted to the head of tx list of | |
518 | * the socket to retry transmission later, so if skb | |
519 | * is bigger than whole queue, it will be reinserted | |
520 | * again and again, thus blocking other skbs to be sent. | |
521 | * Each page of the user provided buffer will be added | |
522 | * as a single buffer to the tx virtqueue, so compare | |
523 | * number of pages against maximum capacity of the queue. | |
524 | */ | |
525 | if (bufs_num <= vq->num_max) | |
526 | res = true; | |
527 | } | |
528 | ||
529 | rcu_read_unlock(); | |
530 | ||
531 | return res; | |
532 | } | |
533 | ||
e2fcc326 AK |
534 | static bool virtio_transport_msgzerocopy_allow(void) |
535 | { | |
536 | return true; | |
537 | } | |
538 | ||
53efbba1 AK |
539 | static bool virtio_transport_seqpacket_allow(u32 remote_cid); |
540 | ||
0ea9e1d3 AH |
541 | static struct virtio_transport virtio_transport = { |
542 | .transport = { | |
6a2c0962 SG |
543 | .module = THIS_MODULE, |
544 | ||
0ea9e1d3 AH |
545 | .get_local_cid = virtio_transport_get_local_cid, |
546 | ||
547 | .init = virtio_transport_do_socket_init, | |
548 | .destruct = virtio_transport_destruct, | |
549 | .release = virtio_transport_release, | |
550 | .connect = virtio_transport_connect, | |
551 | .shutdown = virtio_transport_shutdown, | |
073b4f2c | 552 | .cancel_pkt = virtio_transport_cancel_pkt, |
0ea9e1d3 AH |
553 | |
554 | .dgram_bind = virtio_transport_dgram_bind, | |
555 | .dgram_dequeue = virtio_transport_dgram_dequeue, | |
556 | .dgram_enqueue = virtio_transport_dgram_enqueue, | |
557 | .dgram_allow = virtio_transport_dgram_allow, | |
558 | ||
559 | .stream_dequeue = virtio_transport_stream_dequeue, | |
560 | .stream_enqueue = virtio_transport_stream_enqueue, | |
561 | .stream_has_data = virtio_transport_stream_has_data, | |
562 | .stream_has_space = virtio_transport_stream_has_space, | |
563 | .stream_rcvhiwat = virtio_transport_stream_rcvhiwat, | |
564 | .stream_is_active = virtio_transport_stream_is_active, | |
565 | .stream_allow = virtio_transport_stream_allow, | |
566 | ||
53efbba1 AK |
567 | .seqpacket_dequeue = virtio_transport_seqpacket_dequeue, |
568 | .seqpacket_enqueue = virtio_transport_seqpacket_enqueue, | |
569 | .seqpacket_allow = virtio_transport_seqpacket_allow, | |
570 | .seqpacket_has_data = virtio_transport_seqpacket_has_data, | |
571 | ||
e2fcc326 AK |
572 | .msgzerocopy_allow = virtio_transport_msgzerocopy_allow, |
573 | ||
0ea9e1d3 AH |
574 | .notify_poll_in = virtio_transport_notify_poll_in, |
575 | .notify_poll_out = virtio_transport_notify_poll_out, | |
576 | .notify_recv_init = virtio_transport_notify_recv_init, | |
577 | .notify_recv_pre_block = virtio_transport_notify_recv_pre_block, | |
578 | .notify_recv_pre_dequeue = virtio_transport_notify_recv_pre_dequeue, | |
579 | .notify_recv_post_dequeue = virtio_transport_notify_recv_post_dequeue, | |
580 | .notify_send_init = virtio_transport_notify_send_init, | |
581 | .notify_send_pre_block = virtio_transport_notify_send_pre_block, | |
582 | .notify_send_pre_enqueue = virtio_transport_notify_send_pre_enqueue, | |
583 | .notify_send_post_enqueue = virtio_transport_notify_send_post_enqueue, | |
b9f2b0ff | 584 | .notify_buffer_size = virtio_transport_notify_buffer_size, |
0fe17989 | 585 | .notify_set_rcvlowat = virtio_transport_notify_set_rcvlowat, |
634f1a71 | 586 | |
e6ab4500 LL |
587 | .unsent_bytes = virtio_transport_unsent_bytes, |
588 | ||
634f1a71 | 589 | .read_skb = virtio_transport_read_skb, |
0ea9e1d3 AH |
590 | }, |
591 | ||
592 | .send_pkt = virtio_transport_send_pkt, | |
581512a6 | 593 | .can_msgzerocopy = virtio_transport_can_msgzerocopy, |
0ea9e1d3 AH |
594 | }; |
595 | ||
53efbba1 AK |
596 | static bool virtio_transport_seqpacket_allow(u32 remote_cid) |
597 | { | |
598 | struct virtio_vsock *vsock; | |
599 | bool seqpacket_allow; | |
600 | ||
64295f0d | 601 | seqpacket_allow = false; |
53efbba1 AK |
602 | rcu_read_lock(); |
603 | vsock = rcu_dereference(the_virtio_vsock); | |
64295f0d ED |
604 | if (vsock) |
605 | seqpacket_allow = vsock->seqpacket_allow; | |
53efbba1 AK |
606 | rcu_read_unlock(); |
607 | ||
608 | return seqpacket_allow; | |
609 | } | |
610 | ||
4c7246dc SG |
611 | static void virtio_transport_rx_work(struct work_struct *work) |
612 | { | |
613 | struct virtio_vsock *vsock = | |
614 | container_of(work, struct virtio_vsock, rx_work); | |
615 | struct virtqueue *vq; | |
616 | ||
617 | vq = vsock->vqs[VSOCK_VQ_RX]; | |
618 | ||
619 | mutex_lock(&vsock->rx_lock); | |
620 | ||
621 | if (!vsock->rx_run) | |
622 | goto out; | |
623 | ||
624 | do { | |
625 | virtqueue_disable_cb(vq); | |
626 | for (;;) { | |
71dc9ec9 | 627 | struct sk_buff *skb; |
4c7246dc SG |
628 | unsigned int len; |
629 | ||
630 | if (!virtio_transport_more_replies(vsock)) { | |
631 | /* Stop rx until the device processes already | |
632 | * pending replies. Leave rx virtqueue | |
633 | * callbacks disabled. | |
634 | */ | |
635 | goto out; | |
636 | } | |
637 | ||
71dc9ec9 BE |
638 | skb = virtqueue_get_buf(vq, &len); |
639 | if (!skb) | |
4c7246dc | 640 | break; |
4c7246dc SG |
641 | |
642 | vsock->rx_buf_nr--; | |
643 | ||
644 | /* Drop short/long packets */ | |
71dc9ec9 BE |
645 | if (unlikely(len < sizeof(struct virtio_vsock_hdr) || |
646 | len > virtio_vsock_skb_len(skb))) { | |
647 | kfree_skb(skb); | |
4c7246dc SG |
648 | continue; |
649 | } | |
650 | ||
71dc9ec9 BE |
651 | virtio_vsock_skb_rx_put(skb); |
652 | virtio_transport_deliver_tap_pkt(skb); | |
653 | virtio_transport_recv_pkt(&virtio_transport, skb); | |
4c7246dc SG |
654 | } |
655 | } while (!virtqueue_enable_cb(vq)); | |
656 | ||
657 | out: | |
658 | if (vsock->rx_buf_nr < vsock->rx_buf_max_nr / 2) | |
659 | virtio_vsock_rx_fill(vsock); | |
660 | mutex_unlock(&vsock->rx_lock); | |
661 | } | |
662 | ||
a1032098 | 663 | static int virtio_vsock_vqs_init(struct virtio_vsock *vsock) |
0ea9e1d3 | 664 | { |
a1032098 | 665 | struct virtio_device *vdev = vsock->vdev; |
c95e67ba JP |
666 | struct virtqueue_info vqs_info[] = { |
667 | { "rx", virtio_vsock_rx_done }, | |
668 | { "tx", virtio_vsock_tx_done }, | |
669 | { "event", virtio_vsock_event_done }, | |
a1032098 | 670 | }; |
0ea9e1d3 AH |
671 | int ret; |
672 | ||
6c85d6b6 | 673 | ret = virtio_find_vqs(vdev, VSOCK_VQ_MAX, vsock->vqs, vqs_info, NULL); |
0ea9e1d3 | 674 | if (ret < 0) |
a1032098 | 675 | return ret; |
0ea9e1d3 AH |
676 | |
677 | virtio_vsock_update_guest_cid(vsock); | |
678 | ||
88704454 SG |
679 | virtio_device_ready(vdev); |
680 | ||
53b08c49 AM |
681 | return 0; |
682 | } | |
683 | ||
684 | static void virtio_vsock_vqs_start(struct virtio_vsock *vsock) | |
685 | { | |
b917507e SG |
686 | mutex_lock(&vsock->tx_lock); |
687 | vsock->tx_run = true; | |
688 | mutex_unlock(&vsock->tx_lock); | |
689 | ||
0ea9e1d3 AH |
690 | mutex_lock(&vsock->rx_lock); |
691 | virtio_vsock_rx_fill(vsock); | |
b917507e | 692 | vsock->rx_run = true; |
0ea9e1d3 AH |
693 | mutex_unlock(&vsock->rx_lock); |
694 | ||
695 | mutex_lock(&vsock->event_lock); | |
696 | virtio_vsock_event_fill(vsock); | |
b917507e | 697 | vsock->event_run = true; |
0ea9e1d3 AH |
698 | mutex_unlock(&vsock->event_lock); |
699 | ||
53b08c49 AM |
700 | /* virtio_transport_send_pkt() can queue packets once |
701 | * the_virtio_vsock is set, but they won't be processed until | |
702 | * vsock->tx_run is set to true. We queue vsock->send_pkt_work | |
703 | * when initialization finishes to send those packets queued | |
704 | * earlier. | |
705 | * We don't need to queue the other workers (rx, event) because | |
706 | * as long as we don't fill the queues with empty buffers, the | |
707 | * host can't send us any notification. | |
708 | */ | |
709 | queue_work(virtio_vsock_workqueue, &vsock->send_pkt_work); | |
0ea9e1d3 AH |
710 | } |
711 | ||
a1032098 | 712 | static void virtio_vsock_vqs_del(struct virtio_vsock *vsock) |
0ea9e1d3 | 713 | { |
a1032098 | 714 | struct virtio_device *vdev = vsock->vdev; |
71dc9ec9 | 715 | struct sk_buff *skb; |
0ea9e1d3 | 716 | |
a1032098 | 717 | /* Reset all connected sockets when the VQs disappear */ |
8e6ed963 JP |
718 | vsock_for_each_connected_socket(&virtio_transport.transport, |
719 | virtio_vsock_reset_sock); | |
85965487 | 720 | |
b917507e | 721 | /* Stop all work handlers to make sure no one is accessing the device, |
d9679d00 | 722 | * so we can safely call virtio_reset_device(). |
b917507e SG |
723 | */ |
724 | mutex_lock(&vsock->rx_lock); | |
725 | vsock->rx_run = false; | |
726 | mutex_unlock(&vsock->rx_lock); | |
727 | ||
728 | mutex_lock(&vsock->tx_lock); | |
729 | vsock->tx_run = false; | |
730 | mutex_unlock(&vsock->tx_lock); | |
731 | ||
732 | mutex_lock(&vsock->event_lock); | |
733 | vsock->event_run = false; | |
734 | mutex_unlock(&vsock->event_lock); | |
735 | ||
736 | /* Flush all device writes and interrupts, device will not use any | |
737 | * more buffers. | |
738 | */ | |
d9679d00 | 739 | virtio_reset_device(vdev); |
0ea9e1d3 AH |
740 | |
741 | mutex_lock(&vsock->rx_lock); | |
71dc9ec9 BE |
742 | while ((skb = virtqueue_detach_unused_buf(vsock->vqs[VSOCK_VQ_RX]))) |
743 | kfree_skb(skb); | |
0ea9e1d3 AH |
744 | mutex_unlock(&vsock->rx_lock); |
745 | ||
746 | mutex_lock(&vsock->tx_lock); | |
71dc9ec9 BE |
747 | while ((skb = virtqueue_detach_unused_buf(vsock->vqs[VSOCK_VQ_TX]))) |
748 | kfree_skb(skb); | |
0ea9e1d3 AH |
749 | mutex_unlock(&vsock->tx_lock); |
750 | ||
71dc9ec9 | 751 | virtio_vsock_skb_queue_purge(&vsock->send_pkt_queue); |
0ea9e1d3 | 752 | |
b917507e | 753 | /* Delete virtqueues and flush outstanding callbacks if any */ |
0ea9e1d3 | 754 | vdev->config->del_vqs(vdev); |
a1032098 SG |
755 | } |
756 | ||
757 | static int virtio_vsock_probe(struct virtio_device *vdev) | |
758 | { | |
759 | struct virtio_vsock *vsock = NULL; | |
760 | int ret; | |
64c99d2d | 761 | int i; |
a1032098 SG |
762 | |
763 | ret = mutex_lock_interruptible(&the_virtio_vsock_mutex); | |
764 | if (ret) | |
765 | return ret; | |
766 | ||
767 | /* Only one virtio-vsock device per guest is supported */ | |
768 | if (rcu_dereference_protected(the_virtio_vsock, | |
769 | lockdep_is_held(&the_virtio_vsock_mutex))) { | |
770 | ret = -EBUSY; | |
771 | goto out; | |
772 | } | |
773 | ||
774 | vsock = kzalloc(sizeof(*vsock), GFP_KERNEL); | |
775 | if (!vsock) { | |
776 | ret = -ENOMEM; | |
777 | goto out; | |
778 | } | |
779 | ||
780 | vsock->vdev = vdev; | |
781 | ||
782 | vsock->rx_buf_nr = 0; | |
783 | vsock->rx_buf_max_nr = 0; | |
784 | atomic_set(&vsock->queued_replies, 0); | |
785 | ||
786 | mutex_init(&vsock->tx_lock); | |
787 | mutex_init(&vsock->rx_lock); | |
788 | mutex_init(&vsock->event_lock); | |
71dc9ec9 | 789 | skb_queue_head_init(&vsock->send_pkt_queue); |
a1032098 SG |
790 | INIT_WORK(&vsock->rx_work, virtio_transport_rx_work); |
791 | INIT_WORK(&vsock->tx_work, virtio_transport_tx_work); | |
792 | INIT_WORK(&vsock->event_work, virtio_transport_event_work); | |
793 | INIT_WORK(&vsock->send_pkt_work, virtio_transport_send_pkt_work); | |
794 | ||
795 | if (virtio_has_feature(vdev, VIRTIO_VSOCK_F_SEQPACKET)) | |
796 | vsock->seqpacket_allow = true; | |
797 | ||
798 | vdev->priv = vsock; | |
799 | ||
800 | ret = virtio_vsock_vqs_init(vsock); | |
801 | if (ret < 0) | |
802 | goto out; | |
803 | ||
64c99d2d AK |
804 | for (i = 0; i < ARRAY_SIZE(vsock->out_sgs); i++) |
805 | vsock->out_sgs[i] = &vsock->out_bufs[i]; | |
806 | ||
a1032098 | 807 | rcu_assign_pointer(the_virtio_vsock, vsock); |
53b08c49 | 808 | virtio_vsock_vqs_start(vsock); |
a1032098 SG |
809 | |
810 | mutex_unlock(&the_virtio_vsock_mutex); | |
811 | ||
812 | return 0; | |
813 | ||
814 | out: | |
815 | kfree(vsock); | |
816 | mutex_unlock(&the_virtio_vsock_mutex); | |
817 | return ret; | |
818 | } | |
819 | ||
820 | static void virtio_vsock_remove(struct virtio_device *vdev) | |
821 | { | |
822 | struct virtio_vsock *vsock = vdev->priv; | |
823 | ||
824 | mutex_lock(&the_virtio_vsock_mutex); | |
825 | ||
826 | vdev->priv = NULL; | |
827 | rcu_assign_pointer(the_virtio_vsock, NULL); | |
828 | synchronize_rcu(); | |
829 | ||
830 | virtio_vsock_vqs_del(vsock); | |
0ea9e1d3 | 831 | |
e226121f SG |
832 | /* Other works can be queued before 'config->del_vqs()', so we flush |
833 | * all works before to free the vsock object to avoid use after free. | |
834 | */ | |
e226121f SG |
835 | flush_work(&vsock->rx_work); |
836 | flush_work(&vsock->tx_work); | |
837 | flush_work(&vsock->event_work); | |
838 | flush_work(&vsock->send_pkt_work); | |
839 | ||
0deab087 SG |
840 | mutex_unlock(&the_virtio_vsock_mutex); |
841 | ||
0ea9e1d3 AH |
842 | kfree(vsock); |
843 | } | |
844 | ||
bd50c5dc SG |
845 | #ifdef CONFIG_PM_SLEEP |
846 | static int virtio_vsock_freeze(struct virtio_device *vdev) | |
847 | { | |
848 | struct virtio_vsock *vsock = vdev->priv; | |
849 | ||
850 | mutex_lock(&the_virtio_vsock_mutex); | |
851 | ||
852 | rcu_assign_pointer(the_virtio_vsock, NULL); | |
853 | synchronize_rcu(); | |
854 | ||
855 | virtio_vsock_vqs_del(vsock); | |
856 | ||
857 | mutex_unlock(&the_virtio_vsock_mutex); | |
858 | ||
859 | return 0; | |
860 | } | |
861 | ||
862 | static int virtio_vsock_restore(struct virtio_device *vdev) | |
863 | { | |
864 | struct virtio_vsock *vsock = vdev->priv; | |
865 | int ret; | |
866 | ||
867 | mutex_lock(&the_virtio_vsock_mutex); | |
868 | ||
869 | /* Only one virtio-vsock device per guest is supported */ | |
870 | if (rcu_dereference_protected(the_virtio_vsock, | |
871 | lockdep_is_held(&the_virtio_vsock_mutex))) { | |
872 | ret = -EBUSY; | |
873 | goto out; | |
874 | } | |
875 | ||
876 | ret = virtio_vsock_vqs_init(vsock); | |
877 | if (ret < 0) | |
878 | goto out; | |
879 | ||
880 | rcu_assign_pointer(the_virtio_vsock, vsock); | |
53b08c49 | 881 | virtio_vsock_vqs_start(vsock); |
bd50c5dc SG |
882 | |
883 | out: | |
884 | mutex_unlock(&the_virtio_vsock_mutex); | |
885 | return ret; | |
886 | } | |
887 | #endif /* CONFIG_PM_SLEEP */ | |
888 | ||
0ea9e1d3 AH |
889 | static struct virtio_device_id id_table[] = { |
890 | { VIRTIO_ID_VSOCK, VIRTIO_DEV_ANY_ID }, | |
891 | { 0 }, | |
892 | }; | |
893 | ||
894 | static unsigned int features[] = { | |
53efbba1 | 895 | VIRTIO_VSOCK_F_SEQPACKET |
0ea9e1d3 AH |
896 | }; |
897 | ||
898 | static struct virtio_driver virtio_vsock_driver = { | |
899 | .feature_table = features, | |
900 | .feature_table_size = ARRAY_SIZE(features), | |
901 | .driver.name = KBUILD_MODNAME, | |
0ea9e1d3 AH |
902 | .id_table = id_table, |
903 | .probe = virtio_vsock_probe, | |
904 | .remove = virtio_vsock_remove, | |
bd50c5dc SG |
905 | #ifdef CONFIG_PM_SLEEP |
906 | .freeze = virtio_vsock_freeze, | |
907 | .restore = virtio_vsock_restore, | |
908 | #endif | |
0ea9e1d3 AH |
909 | }; |
910 | ||
911 | static int __init virtio_vsock_init(void) | |
912 | { | |
913 | int ret; | |
914 | ||
915 | virtio_vsock_workqueue = alloc_workqueue("virtio_vsock", 0, 0); | |
916 | if (!virtio_vsock_workqueue) | |
917 | return -ENOMEM; | |
22b5c0b6 | 918 | |
c0cfa2d8 SG |
919 | ret = vsock_core_register(&virtio_transport.transport, |
920 | VSOCK_TRANSPORT_F_G2H); | |
0ea9e1d3 | 921 | if (ret) |
22b5c0b6 SG |
922 | goto out_wq; |
923 | ||
ba95e5df | 924 | ret = register_virtio_driver(&virtio_vsock_driver); |
22b5c0b6 | 925 | if (ret) |
ba95e5df | 926 | goto out_vci; |
22b5c0b6 SG |
927 | |
928 | return 0; | |
929 | ||
ba95e5df | 930 | out_vci: |
c0cfa2d8 | 931 | vsock_core_unregister(&virtio_transport.transport); |
22b5c0b6 SG |
932 | out_wq: |
933 | destroy_workqueue(virtio_vsock_workqueue); | |
0ea9e1d3 AH |
934 | return ret; |
935 | } | |
936 | ||
937 | static void __exit virtio_vsock_exit(void) | |
938 | { | |
939 | unregister_virtio_driver(&virtio_vsock_driver); | |
c0cfa2d8 | 940 | vsock_core_unregister(&virtio_transport.transport); |
0ea9e1d3 AH |
941 | destroy_workqueue(virtio_vsock_workqueue); |
942 | } | |
943 | ||
944 | module_init(virtio_vsock_init); | |
945 | module_exit(virtio_vsock_exit); | |
946 | MODULE_LICENSE("GPL v2"); | |
947 | MODULE_AUTHOR("Asias He"); | |
948 | MODULE_DESCRIPTION("virtio transport for vsock"); | |
949 | MODULE_DEVICE_TABLE(virtio, id_table); |