From patchwork Wed Sep 4 07:11:15 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Johannes Berg X-Patchwork-Id: 1157504 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=none (mailfrom) smtp.mailfrom=lists.infradead.org (client-ip=2607:7c80:54:e::133; helo=bombadil.infradead.org; envelope-from=linux-um-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org; receiver=) Authentication-Results: ozlabs.org; dmarc=none (p=none dis=none) header.from=sipsolutions.net Authentication-Results: ozlabs.org; dkim=pass (2048-bit key; unprotected) header.d=lists.infradead.org header.i=@lists.infradead.org header.b="iWcqN+/o"; dkim-atps=neutral Received: from bombadil.infradead.org (bombadil.infradead.org [IPv6:2607:7c80:54:e::133]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 46NZkG3QCzz9sDB for ; Wed, 4 Sep 2019 17:11:34 +1000 (AEST) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20170209; h=Sender: Content-Transfer-Encoding:Content-Type:Cc:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:MIME-Version:Message-Id:Date:Subject:To :From:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References: List-Owner; bh=64yFUC3QwCrhza4T+FoFq/R1xeO55xScmwHI0Dap6Z4=; b=iWcqN+/ooSXOy9 cTwU2tVQMLkr9SIcn3ZR5h9c5Arg10KEzD82dYgJMLLzSXPpqFbTfGCXwZPiiRGfy/fne6y6aymId Qbp0vwd/pcxwY9oQnQMM/Y1RL4Bf/06NG7ZNnm2kZW327Idj+mmBhasJdl9gY0SrbTo5ZZZ+7PqaU 8L3ncXcoC1PAmayh4RnvQBluWaww4DGUkurwf8sV/AhTIpB/Fwnj+acgB6fQ7cgh36wUiirZx21fZ k5gX81to7Ffm3u4iqAmmFvP2labzdN9lBID1QmJq0IM1X7nxKxW1Zj3VfUVzclqxtzKiEcbpHG+jc ZhpRCTJp8IkBS7QBMiww==; Received: from localhost ([127.0.0.1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.92 #3 (Red Hat Linux)) id 1i5PRt-00068V-Ry; Wed, 04 Sep 2019 07:11:25 +0000 Received: from s3.sipsolutions.net ([2a01:4f8:191:4433::2] helo=sipsolutions.net) by bombadil.infradead.org with esmtps (Exim 4.92 #3 (Red Hat Linux)) id 1i5PRr-00067t-Eb for linux-um@lists.infradead.org; Wed, 04 Sep 2019 07:11:25 +0000 Received: by sipsolutions.net with esmtpsa (TLS1.3:ECDHE_X25519__RSA_PSS_RSAE_SHA256__AES_256_GCM:256) (Exim 4.92.1) (envelope-from ) id 1i5PRq-0008Tb-3t; Wed, 04 Sep 2019 09:11:22 +0200 From: Johannes Berg To: linux-um@lists.infradead.org Subject: [PATCH 1/2] um: virtio: implement VHOST_USER_PROTOCOL_F_SLAVE_REQ Date: Wed, 4 Sep 2019 09:11:15 +0200 Message-Id: <20190904071116.8204-1-johannes@sipsolutions.net> X-Mailer: git-send-email 2.20.1 MIME-Version: 1.0 X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20190904_001123_745577_34EA53F9 X-CRM114-Status: GOOD ( 15.24 ) X-Spam-Score: 0.0 (/) X-Spam-Report: SpamAssassin version 3.4.2 on bombadil.infradead.org summary: Content analysis details: (0.0 points) pts rule name description ---- ---------------------- -------------------------------------------------- 0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record 0.0 SPF_NONE SPF: sender does not publish an SPF Record 0.0 KHOP_HELO_FCRDNS Relay HELO differs from its IP's reverse DNS X-BeenThere: linux-um@lists.infradead.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Johannes Berg Sender: "linux-um" Errors-To: linux-um-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org From: Johannes Berg Implement the communication channel for the device to notify us of some events, and notably implement the handling of the config updates needed for the combination of this feature and VHOST_USER_PROTOCOL_F_CONFIG. Signed-off-by: Johannes Berg --- arch/um/drivers/vhost_user.h | 18 ++++- arch/um/drivers/virtio_uml.c | 153 ++++++++++++++++++++++++++++++----- 2 files changed, 147 insertions(+), 24 deletions(-) diff --git a/arch/um/drivers/vhost_user.h b/arch/um/drivers/vhost_user.h index 2a9829b0782b..8aee9919581e 100644 --- a/arch/um/drivers/vhost_user.h +++ b/arch/um/drivers/vhost_user.h @@ -9,7 +9,8 @@ /* Feature bits */ #define VHOST_USER_F_PROTOCOL_FEATURES 30 /* Protocol feature bits */ -#define VHOST_USER_PROTOCOL_F_CONFIG 9 +#define VHOST_USER_PROTOCOL_F_SLAVE_REQ 5 +#define VHOST_USER_PROTOCOL_F_CONFIG 9 /* Vring state index masks */ #define VHOST_USER_VRING_INDEX_MASK 0xff #define VHOST_USER_VRING_POLL_MASK BIT(8) @@ -19,7 +20,8 @@ /* Supported transport features */ #define VHOST_USER_SUPPORTED_F BIT_ULL(VHOST_USER_F_PROTOCOL_FEATURES) /* Supported protocol features */ -#define VHOST_USER_SUPPORTED_PROTOCOL_F BIT_ULL(VHOST_USER_PROTOCOL_F_CONFIG) +#define VHOST_USER_SUPPORTED_PROTOCOL_F (BIT_ULL(VHOST_USER_PROTOCOL_F_SLAVE_REQ) | \ + BIT_ULL(VHOST_USER_PROTOCOL_F_CONFIG)) enum vhost_user_request { VHOST_USER_GET_FEATURES = 1, @@ -49,8 +51,18 @@ enum vhost_user_request { VHOST_USER_SET_CONFIG = 25, }; +enum vhost_user_slave_request { + VHOST_USER_SLAVE_IOTLB_MSG = 1, + VHOST_USER_SLAVE_CONFIG_CHANGE_MSG = 2, + VHOST_USER_SLAVE_VRING_HOST_NOTIFIER_MSG = 3, +}; + struct vhost_user_header { - u32 request; /* Use enum vhost_user_request */ + /* + * Use enum vhost_user_request for outgoing messages, + * uses enum vhost_user_slave_request for incoming ones. + */ + u32 request; u32 flags; u32 size; } __packed; diff --git a/arch/um/drivers/virtio_uml.c b/arch/um/drivers/virtio_uml.c index b4737dfddde8..a261977244b9 100644 --- a/arch/um/drivers/virtio_uml.c +++ b/arch/um/drivers/virtio_uml.c @@ -45,7 +45,7 @@ struct virtio_uml_device { struct virtio_device vdev; struct platform_device *pdev; - int sock; + int sock, req_fd; u64 features; u64 protocol_features; u8 status; @@ -101,40 +101,46 @@ static int full_read(int fd, void *buf, int len) return 0; } -static int vhost_user_recv_header(struct virtio_uml_device *vu_dev, - struct vhost_user_msg *msg) +static int vhost_user_recv_header(int fd, struct vhost_user_msg *msg) { - size_t size = sizeof(msg->header); - int rc; - - rc = full_read(vu_dev->sock, (void *) msg, size); - if (rc) - return rc; - if (msg->header.flags != (VHOST_USER_FLAG_REPLY | VHOST_USER_VERSION)) - return -EPROTO; - return 0; + return full_read(fd, msg, sizeof(msg->header)); } -static int vhost_user_recv(struct virtio_uml_device *vu_dev, - struct vhost_user_msg *msg, +static int vhost_user_recv(int fd, struct vhost_user_msg *msg, size_t max_payload_size) { size_t size; - int rc = vhost_user_recv_header(vu_dev, msg); + int rc = vhost_user_recv_header(fd, msg); if (rc) return rc; size = msg->header.size; if (size > max_payload_size) return -EPROTO; - return full_read(vu_dev->sock, (void *) &msg->payload, size); + return full_read(fd, &msg->payload, size); +} + +static int vhost_user_recv_resp(struct virtio_uml_device *vu_dev, + struct vhost_user_msg *msg, + size_t max_payload_size) +{ + int rc = vhost_user_recv(vu_dev->sock, msg, max_payload_size); + + if (rc) + return rc; + + if (msg->header.flags != (VHOST_USER_FLAG_REPLY | VHOST_USER_VERSION)) + return -EPROTO; + + return 0; } static int vhost_user_recv_u64(struct virtio_uml_device *vu_dev, u64 *value) { struct vhost_user_msg msg; - int rc = vhost_user_recv(vu_dev, &msg, sizeof(msg.payload.integer)); + int rc = vhost_user_recv_resp(vu_dev, &msg, + sizeof(msg.payload.integer)); if (rc) return rc; @@ -144,6 +150,21 @@ static int vhost_user_recv_u64(struct virtio_uml_device *vu_dev, return 0; } +static int vhost_user_recv_req(struct virtio_uml_device *vu_dev, + struct vhost_user_msg *msg, + size_t max_payload_size) +{ + int rc = vhost_user_recv(vu_dev->req_fd, msg, max_payload_size); + + if (rc) + return rc; + + if (msg->header.flags != VHOST_USER_VERSION) + return -EPROTO; + + return 0; +} + static int vhost_user_send(struct virtio_uml_device *vu_dev, struct vhost_user_msg *msg, int *fds, size_t num_fds) @@ -164,6 +185,16 @@ static int vhost_user_send_no_payload(struct virtio_uml_device *vu_dev, return vhost_user_send(vu_dev, &msg, NULL, 0); } +static int vhost_user_send_no_payload_fd(struct virtio_uml_device *vu_dev, + u32 request, int fd) +{ + struct vhost_user_msg msg = { + .header.request = request, + }; + + return vhost_user_send(vu_dev, &msg, &fd, 1); +} + static int vhost_user_send_u64(struct virtio_uml_device *vu_dev, u32 request, u64 value) { @@ -215,6 +246,68 @@ static int vhost_user_set_protocol_features(struct virtio_uml_device *vu_dev, protocol_features); } +static irqreturn_t vu_req_interrupt(int irq, void *data) +{ + struct virtio_uml_device *vu_dev = data; + struct { + struct vhost_user_msg msg; + u8 extra_payload[512]; + } msg; + int rc; + + rc = vhost_user_recv_req(vu_dev, &msg.msg, + sizeof(msg.msg.payload) + + sizeof(msg.extra_payload)); + + if (rc == -EAGAIN) + return IRQ_NONE; + + switch (msg.msg.header.request) { + case VHOST_USER_SLAVE_CONFIG_CHANGE_MSG: + virtio_config_changed(&vu_dev->vdev); + break; + case VHOST_USER_SLAVE_IOTLB_MSG: + /* not supported - VIRTIO_F_IOMMU_PLATFORM */ + case VHOST_USER_SLAVE_VRING_HOST_NOTIFIER_MSG: + /* not supported - VHOST_USER_PROTOCOL_F_HOST_NOTIFIER */ + default: + vu_err(vu_dev, "unexpected slave request %d\n", + msg.msg.header.request); + } + + return IRQ_HANDLED; +} + +static int vhost_user_init_slave_req(struct virtio_uml_device *vu_dev) +{ + int rc, req_fds[2]; + + rc = os_pipe(req_fds, true, true); + if (rc < 0) + return rc; + vu_dev->req_fd = req_fds[0]; + + rc = um_request_irq(VIRTIO_IRQ, vu_dev->req_fd, IRQ_READ, + vu_req_interrupt, IRQF_SHARED, + vu_dev->pdev->name, vu_dev); + if (rc) + goto error; + + rc = vhost_user_send_no_payload_fd(vu_dev, VHOST_USER_SET_SLAVE_REQ_FD, + req_fds[1]); + if (rc) + goto error; + + goto out; + +error: + os_close_file(req_fds[0]); +out: + /* Close unused write end of request fds */ + os_close_file(req_fds[1]); + return rc; +} + static int vhost_user_init(struct virtio_uml_device *vu_dev) { int rc = vhost_user_set_owner(vu_dev); @@ -233,8 +326,17 @@ static int vhost_user_init(struct virtio_uml_device *vu_dev) vu_dev->protocol_features &= VHOST_USER_SUPPORTED_PROTOCOL_F; rc = vhost_user_set_protocol_features(vu_dev, vu_dev->protocol_features); + if (rc) + return rc; } - return rc; + + if (vu_dev->protocol_features & VHOST_USER_PROTOCOL_F_SLAVE_REQ) { + rc = vhost_user_init_slave_req(vu_dev); + if (rc) + return rc; + } + + return 0; } static void vhost_user_get_config(struct virtio_uml_device *vu_dev, @@ -265,7 +367,7 @@ static void vhost_user_get_config(struct virtio_uml_device *vu_dev, goto free; } - rc = vhost_user_recv(vu_dev, msg, msg_size); + rc = vhost_user_recv_resp(vu_dev, msg, msg_size); if (rc) { vu_err(vu_dev, "receiving VHOST_USER_GET_CONFIG response failed: %d\n", @@ -719,6 +821,14 @@ static const struct virtio_config_ops virtio_uml_config_ops = { .bus_name = vu_bus_name, }; +static void vhost_user_exit(struct virtio_uml_device *vu_dev) +{ + if (vu_dev->req_fd >= 0) { + um_free_irq(VIRTIO_IRQ, vu_dev); + os_close_file(vu_dev->req_fd); + } + os_close_file(vu_dev->sock); +} static void virtio_uml_release_dev(struct device *d) { @@ -726,7 +836,7 @@ static void virtio_uml_release_dev(struct device *d) container_of(d, struct virtio_device, dev); struct virtio_uml_device *vu_dev = to_virtio_uml_device(vdev); - os_close_file(vu_dev->sock); + vhost_user_exit(vu_dev); } /* Platform device */ @@ -755,6 +865,7 @@ static int virtio_uml_probe(struct platform_device *pdev) vu_dev->vdev.id.device = pdata->virtio_device_id; vu_dev->vdev.id.vendor = VIRTIO_DEV_ANY_ID; vu_dev->pdev = pdev; + vu_dev->req_fd = -1; do { rc = os_connect_socket(pdata->socket_path); @@ -775,7 +886,7 @@ static int virtio_uml_probe(struct platform_device *pdev) return rc; error_init: - os_close_file(vu_dev->sock); + vhost_user_exit(vu_dev); return rc; }