1 // SPDX-License-Identifier: GPL-2.0-only
2 /* Copyright (C) 2009 Red Hat, Inc.
5 * test virtio server in host kernel.
8 #include <linux/compat.h>
9 #include <linux/eventfd.h>
10 #include <linux/vhost.h>
11 #include <linux/miscdevice.h>
12 #include <linux/module.h>
13 #include <linux/mutex.h>
14 #include <linux/workqueue.h>
15 #include <linux/file.h>
16 #include <linux/slab.h>
21 /* Max number of bytes transferred before requeueing the job.
22 * Using this limit prevents one virtqueue from starving others. */
23 #define VHOST_TEST_WEIGHT 0x80000
27 VHOST_TEST_VQ_MAX = 1,
32 struct vhost_virtqueue vqs[VHOST_TEST_VQ_MAX];
35 /* Expects to be always run from workqueue - which acts as
36 * read-size critical section for our kind of RCU. */
37 static void handle_vq(struct vhost_test *n)
39 struct vhost_virtqueue *vq = &n->vqs[VHOST_TEST_VQ];
42 size_t len, total_len = 0;
45 mutex_lock(&vq->mutex);
46 private = vq->private_data;
48 mutex_unlock(&vq->mutex);
52 vhost_disable_notify(&n->dev, vq);
55 head = vhost_get_vq_desc(vq, vq->iov,
59 /* On error, stop handling until the next kick. */
60 if (unlikely(head < 0))
62 /* Nothing new? Wait for eventfd to tell us they refilled. */
63 if (head == vq->num) {
64 if (unlikely(vhost_enable_notify(&n->dev, vq))) {
65 vhost_disable_notify(&n->dev, vq);
71 vq_err(vq, "Unexpected descriptor format for TX: "
72 "out %d, int %d\n", out, in);
75 len = iov_length(vq->iov, out);
78 vq_err(vq, "Unexpected 0 len for TX\n");
81 vhost_add_used_and_signal(&n->dev, vq, head, 0);
83 if (unlikely(total_len >= VHOST_TEST_WEIGHT)) {
84 vhost_poll_queue(&vq->poll);
89 mutex_unlock(&vq->mutex);
92 static void handle_vq_kick(struct vhost_work *work)
94 struct vhost_virtqueue *vq = container_of(work, struct vhost_virtqueue,
96 struct vhost_test *n = container_of(vq->dev, struct vhost_test, dev);
101 static int vhost_test_open(struct inode *inode, struct file *f)
103 struct vhost_test *n = kmalloc(sizeof *n, GFP_KERNEL);
104 struct vhost_dev *dev;
105 struct vhost_virtqueue **vqs;
109 vqs = kmalloc_array(VHOST_TEST_VQ_MAX, sizeof(*vqs), GFP_KERNEL);
116 vqs[VHOST_TEST_VQ] = &n->vqs[VHOST_TEST_VQ];
117 n->vqs[VHOST_TEST_VQ].handle_kick = handle_vq_kick;
118 vhost_dev_init(dev, vqs, VHOST_TEST_VQ_MAX);
125 static void *vhost_test_stop_vq(struct vhost_test *n,
126 struct vhost_virtqueue *vq)
130 mutex_lock(&vq->mutex);
131 private = vq->private_data;
132 vq->private_data = NULL;
133 mutex_unlock(&vq->mutex);
137 static void vhost_test_stop(struct vhost_test *n, void **privatep)
139 *privatep = vhost_test_stop_vq(n, n->vqs + VHOST_TEST_VQ);
142 static void vhost_test_flush_vq(struct vhost_test *n, int index)
144 vhost_poll_flush(&n->vqs[index].poll);
147 static void vhost_test_flush(struct vhost_test *n)
149 vhost_test_flush_vq(n, VHOST_TEST_VQ);
152 static int vhost_test_release(struct inode *inode, struct file *f)
154 struct vhost_test *n = f->private_data;
157 vhost_test_stop(n, &private);
159 vhost_dev_cleanup(&n->dev);
160 /* We do an extra flush before freeing memory,
161 * since jobs can re-queue themselves. */
167 static long vhost_test_run(struct vhost_test *n, int test)
169 void *priv, *oldpriv;
170 struct vhost_virtqueue *vq;
173 if (test < 0 || test > 1)
176 mutex_lock(&n->dev.mutex);
177 r = vhost_dev_check_owner(&n->dev);
181 for (index = 0; index < n->dev.nvqs; ++index) {
182 /* Verify that ring has been setup correctly. */
183 if (!vhost_vq_access_ok(&n->vqs[index])) {
189 for (index = 0; index < n->dev.nvqs; ++index) {
191 mutex_lock(&vq->mutex);
192 priv = test ? n : NULL;
194 /* start polling new socket */
195 oldpriv = vq->private_data;
196 vq->private_data = priv;
198 r = vhost_vq_init_access(&n->vqs[index]);
200 mutex_unlock(&vq->mutex);
206 vhost_test_flush_vq(n, index);
210 mutex_unlock(&n->dev.mutex);
214 mutex_unlock(&n->dev.mutex);
218 static long vhost_test_reset_owner(struct vhost_test *n)
222 struct vhost_umem *umem;
224 mutex_lock(&n->dev.mutex);
225 err = vhost_dev_check_owner(&n->dev);
228 umem = vhost_dev_reset_owner_prepare();
233 vhost_test_stop(n, &priv);
235 vhost_dev_reset_owner(&n->dev, umem);
237 mutex_unlock(&n->dev.mutex);
241 static int vhost_test_set_features(struct vhost_test *n, u64 features)
243 struct vhost_virtqueue *vq;
245 mutex_lock(&n->dev.mutex);
246 if ((features & (1 << VHOST_F_LOG_ALL)) &&
247 !vhost_log_access_ok(&n->dev)) {
248 mutex_unlock(&n->dev.mutex);
251 vq = &n->vqs[VHOST_TEST_VQ];
252 mutex_lock(&vq->mutex);
253 vq->acked_features = features;
254 mutex_unlock(&vq->mutex);
255 mutex_unlock(&n->dev.mutex);
259 static long vhost_test_ioctl(struct file *f, unsigned int ioctl,
262 struct vhost_test *n = f->private_data;
263 void __user *argp = (void __user *)arg;
264 u64 __user *featurep = argp;
270 if (copy_from_user(&test, argp, sizeof test))
272 return vhost_test_run(n, test);
273 case VHOST_GET_FEATURES:
274 features = VHOST_FEATURES;
275 if (copy_to_user(featurep, &features, sizeof features))
278 case VHOST_SET_FEATURES:
279 printk(KERN_ERR "1\n");
280 if (copy_from_user(&features, featurep, sizeof features))
282 printk(KERN_ERR "2\n");
283 if (features & ~VHOST_FEATURES)
285 printk(KERN_ERR "3\n");
286 return vhost_test_set_features(n, features);
287 case VHOST_RESET_OWNER:
288 return vhost_test_reset_owner(n);
290 mutex_lock(&n->dev.mutex);
291 r = vhost_dev_ioctl(&n->dev, ioctl, argp);
292 if (r == -ENOIOCTLCMD)
293 r = vhost_vring_ioctl(&n->dev, ioctl, argp);
295 mutex_unlock(&n->dev.mutex);
301 static long vhost_test_compat_ioctl(struct file *f, unsigned int ioctl,
304 return vhost_test_ioctl(f, ioctl, (unsigned long)compat_ptr(arg));
308 static const struct file_operations vhost_test_fops = {
309 .owner = THIS_MODULE,
310 .release = vhost_test_release,
311 .unlocked_ioctl = vhost_test_ioctl,
313 .compat_ioctl = vhost_test_compat_ioctl,
315 .open = vhost_test_open,
316 .llseek = noop_llseek,
319 static struct miscdevice vhost_test_misc = {
324 module_misc_device(vhost_test_misc);
326 MODULE_VERSION("0.0.1");
327 MODULE_LICENSE("GPL v2");
328 MODULE_AUTHOR("Michael S. Tsirkin");
329 MODULE_DESCRIPTION("Host kernel side for virtio simulator");