mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git
synced 2024-12-29 09:12:07 +00:00
4aca98a8a1
- Constify an unmodified structure used in linking vfio and kvm. (Christophe JAILLET) - Add ID for an additional hardware SKU supported by the nvgrace-gpu vfio-pci variant driver. (Ankit Agrawal) - Fix incorrect signed cast in QAT vfio-pci variant driver, negating test in check_add_overflow(), though still caught by later tests. (Giovanni Cabiddu) - Additional debugfs attributes exposed in hisi_acc vfio-pci variant driver for migration debugging. (Longfang Liu) - Migration support is added to the virtio vfio-pci variant driver, becoming the primary feature of the driver while retaining emulation of virtio legacy support as a secondary option. (Yishai Hadas) - Fixes to a few unwind flows in the mlx5 vfio-pci driver discovered through reviews of the virtio variant driver. (Yishai Hadas) - Fix an unlikely issue where a PCI device exposed to userspace with an unknown capability at the base of the extended capability chain can overflow an array index. (Avihai Horon) -----BEGIN PGP SIGNATURE----- iQJPBAABCAA5FiEEQvbATlQL0amee4qQI5ubbjuwiyIFAmdE2SEbHGFsZXgud2ls bGlhbXNvbkByZWRoYXQuY29tAAoJECObm247sIsiXa8P/ikuJ33L7sHnLJErYzHB j2IPNY224LQrpXY+Rnfe4HVCcaSGO7Azeh95DYBFl7ZJ9QJxZbFhUt7Fl8jiKEOj k5ag0e+SP4+5tMp2lZBehTa+xlZQLJ4QXMRxWF2kpfXyX7v6JaNKZhXWJ6lPvbrL zco911Qr1Y5Kqc/kdgX6HGfNusoScj9d0leHNIrka2FFJnq3qZqGtmRKWe9V9zP3 Ke5idU1vYNNBDbOz51D6hZbxZLGxIkblG15sw7LNE3O1lhWznfG+gkJm7u7curlj CrwR4XvXkgAtglsi8KOJHW84s4BO87UgAde3RUUXgXFcfkTQDSOGQuYVDVSKgFOs eJCagrpz0p5jlS6LfrUyHU9FhK1sbDQdb8iJQRUUPVlR9U0kfxFbyv3HX7JmGoWw csOr8Eh2dXmC4EWan9rscw2lxYdoeSmJW0qLhhcGylO7kUGxXRm8vP+MVenkfINX 9OPtsOsFhU7HDl54UsujBA5x8h03HIWmHz3rx8NllxL1E8cfhXivKUViuV8jCXB3 6rVT5mn2VHnXICiWZFXVmjZgrAK3mBfA+6ugi/nbWVdnn8VMomLuB/Df+62wSPSV ICApuWFBhSuSVmQcJ6fsCX6a8x+E2bZDPw9xqZP7krPUdP1j5rJofgZ7wkdYToRv HN0p5NcNwnoW2aM5chN9Ons1 =nTtY -----END PGP SIGNATURE----- Merge tag 'vfio-v6.13-rc1' of https://github.com/awilliam/linux-vfio Pull VFIO updates from Alex Williamson: - Constify an unmodified structure used in linking vfio and kvm (Christophe JAILLET) - Add ID for an additional hardware SKU supported by the nvgrace-gpu vfio-pci variant driver (Ankit Agrawal) - Fix incorrect signed cast in QAT vfio-pci variant driver, negating test in check_add_overflow(), though still caught by later tests (Giovanni Cabiddu) - Additional debugfs attributes exposed in hisi_acc vfio-pci variant driver for migration debugging (Longfang Liu) - Migration support is added to the virtio vfio-pci variant driver, becoming the primary feature of the driver while retaining emulation of virtio legacy support as a secondary option (Yishai Hadas) - Fixes to a few unwind flows in the mlx5 vfio-pci driver discovered through reviews of the virtio variant driver (Yishai Hadas) - Fix an unlikely issue where a PCI device exposed to userspace with an unknown capability at the base of the extended capability chain can overflow an array index (Avihai Horon) * tag 'vfio-v6.13-rc1' of https://github.com/awilliam/linux-vfio: vfio/pci: Properly hide first-in-list PCIe extended capability vfio/mlx5: Fix unwind flows in mlx5vf_pci_save/resume_device_data() vfio/mlx5: Fix an unwind issue in mlx5vf_add_migration_pages() vfio/virtio: Enable live migration once VIRTIO_PCI was configured vfio/virtio: Add PRE_COPY support for live migration vfio/virtio: Add support for the basic live migration functionality virtio-pci: Introduce APIs to execute device parts admin commands virtio: Manage device and driver capabilities via the admin commands virtio: Extend the admin command to include the result size virtio_pci: Introduce device parts access commands Documentation: add debugfs description for hisi migration hisi_acc_vfio_pci: register debugfs for hisilicon migration driver hisi_acc_vfio_pci: create subfunction for data reading hisi_acc_vfio_pci: extract public functions for container_of vfio/qat: fix overflow check in qat_vf_resume_write() vfio/nvgrace-gpu: Add a new GH200 SKU to the devid table kvm/vfio: Constify struct kvm_device_ops
1291 lines
33 KiB
C
1291 lines
33 KiB
C
// SPDX-License-Identifier: GPL-2.0-or-later
|
|
/*
|
|
* Virtio PCI driver - modern (virtio 1.0) device support
|
|
*
|
|
* This module allows virtio devices to be used over a virtual PCI device.
|
|
* This can be used with QEMU based VMMs like KVM or Xen.
|
|
*
|
|
* Copyright IBM Corp. 2007
|
|
* Copyright Red Hat, Inc. 2014
|
|
*
|
|
* Authors:
|
|
* Anthony Liguori <aliguori@us.ibm.com>
|
|
* Rusty Russell <rusty@rustcorp.com.au>
|
|
* Michael S. Tsirkin <mst@redhat.com>
|
|
*/
|
|
|
|
#include <linux/delay.h>
|
|
#include <linux/virtio_pci_admin.h>
|
|
#define VIRTIO_PCI_NO_LEGACY
|
|
#define VIRTIO_RING_NO_LEGACY
|
|
#include "virtio_pci_common.h"
|
|
|
|
#define VIRTIO_AVQ_SGS_MAX 4
|
|
|
|
static u64 vp_get_features(struct virtio_device *vdev)
|
|
{
|
|
struct virtio_pci_device *vp_dev = to_vp_device(vdev);
|
|
|
|
return vp_modern_get_features(&vp_dev->mdev);
|
|
}
|
|
|
|
static int vp_avq_index(struct virtio_device *vdev, u16 *index, u16 *num)
|
|
{
|
|
struct virtio_pci_device *vp_dev = to_vp_device(vdev);
|
|
|
|
*num = 0;
|
|
if (!virtio_has_feature(vdev, VIRTIO_F_ADMIN_VQ))
|
|
return 0;
|
|
|
|
*num = vp_modern_avq_num(&vp_dev->mdev);
|
|
if (!(*num))
|
|
return -EINVAL;
|
|
*index = vp_modern_avq_index(&vp_dev->mdev);
|
|
return 0;
|
|
}
|
|
|
|
void vp_modern_avq_done(struct virtqueue *vq)
|
|
{
|
|
struct virtio_pci_device *vp_dev = to_vp_device(vq->vdev);
|
|
struct virtio_pci_admin_vq *admin_vq = &vp_dev->admin_vq;
|
|
struct virtio_admin_cmd *cmd;
|
|
unsigned long flags;
|
|
unsigned int len;
|
|
|
|
spin_lock_irqsave(&admin_vq->lock, flags);
|
|
do {
|
|
virtqueue_disable_cb(vq);
|
|
while ((cmd = virtqueue_get_buf(vq, &len))) {
|
|
cmd->result_sg_size = len;
|
|
complete(&cmd->completion);
|
|
}
|
|
} while (!virtqueue_enable_cb(vq));
|
|
spin_unlock_irqrestore(&admin_vq->lock, flags);
|
|
}
|
|
|
|
static int virtqueue_exec_admin_cmd(struct virtio_pci_admin_vq *admin_vq,
|
|
u16 opcode,
|
|
struct scatterlist **sgs,
|
|
unsigned int out_num,
|
|
unsigned int in_num,
|
|
struct virtio_admin_cmd *cmd)
|
|
{
|
|
struct virtqueue *vq;
|
|
unsigned long flags;
|
|
int ret;
|
|
|
|
vq = admin_vq->info->vq;
|
|
if (!vq)
|
|
return -EIO;
|
|
|
|
if (opcode != VIRTIO_ADMIN_CMD_LIST_QUERY &&
|
|
opcode != VIRTIO_ADMIN_CMD_LIST_USE &&
|
|
!((1ULL << opcode) & admin_vq->supported_cmds))
|
|
return -EOPNOTSUPP;
|
|
|
|
init_completion(&cmd->completion);
|
|
|
|
again:
|
|
if (virtqueue_is_broken(vq))
|
|
return -EIO;
|
|
|
|
spin_lock_irqsave(&admin_vq->lock, flags);
|
|
ret = virtqueue_add_sgs(vq, sgs, out_num, in_num, cmd, GFP_KERNEL);
|
|
if (ret < 0) {
|
|
if (ret == -ENOSPC) {
|
|
spin_unlock_irqrestore(&admin_vq->lock, flags);
|
|
cpu_relax();
|
|
goto again;
|
|
}
|
|
goto unlock_err;
|
|
}
|
|
if (!virtqueue_kick(vq))
|
|
goto unlock_err;
|
|
spin_unlock_irqrestore(&admin_vq->lock, flags);
|
|
|
|
wait_for_completion(&cmd->completion);
|
|
|
|
return cmd->ret;
|
|
|
|
unlock_err:
|
|
spin_unlock_irqrestore(&admin_vq->lock, flags);
|
|
return -EIO;
|
|
}
|
|
|
|
int vp_modern_admin_cmd_exec(struct virtio_device *vdev,
|
|
struct virtio_admin_cmd *cmd)
|
|
{
|
|
struct scatterlist *sgs[VIRTIO_AVQ_SGS_MAX], hdr, stat;
|
|
struct virtio_pci_device *vp_dev = to_vp_device(vdev);
|
|
struct virtio_admin_cmd_status *va_status;
|
|
unsigned int out_num = 0, in_num = 0;
|
|
struct virtio_admin_cmd_hdr *va_hdr;
|
|
u16 status;
|
|
int ret;
|
|
|
|
if (!virtio_has_feature(vdev, VIRTIO_F_ADMIN_VQ))
|
|
return -EOPNOTSUPP;
|
|
|
|
va_status = kzalloc(sizeof(*va_status), GFP_KERNEL);
|
|
if (!va_status)
|
|
return -ENOMEM;
|
|
|
|
va_hdr = kzalloc(sizeof(*va_hdr), GFP_KERNEL);
|
|
if (!va_hdr) {
|
|
ret = -ENOMEM;
|
|
goto err_alloc;
|
|
}
|
|
|
|
va_hdr->opcode = cmd->opcode;
|
|
va_hdr->group_type = cmd->group_type;
|
|
va_hdr->group_member_id = cmd->group_member_id;
|
|
|
|
/* Add header */
|
|
sg_init_one(&hdr, va_hdr, sizeof(*va_hdr));
|
|
sgs[out_num] = &hdr;
|
|
out_num++;
|
|
|
|
if (cmd->data_sg) {
|
|
sgs[out_num] = cmd->data_sg;
|
|
out_num++;
|
|
}
|
|
|
|
/* Add return status */
|
|
sg_init_one(&stat, va_status, sizeof(*va_status));
|
|
sgs[out_num + in_num] = &stat;
|
|
in_num++;
|
|
|
|
if (cmd->result_sg) {
|
|
sgs[out_num + in_num] = cmd->result_sg;
|
|
in_num++;
|
|
}
|
|
|
|
ret = virtqueue_exec_admin_cmd(&vp_dev->admin_vq,
|
|
le16_to_cpu(cmd->opcode),
|
|
sgs, out_num, in_num, cmd);
|
|
if (ret) {
|
|
dev_err(&vdev->dev,
|
|
"Failed to execute command on admin vq: %d\n.", ret);
|
|
goto err_cmd_exec;
|
|
}
|
|
|
|
status = le16_to_cpu(va_status->status);
|
|
if (status != VIRTIO_ADMIN_STATUS_OK) {
|
|
dev_err(&vdev->dev,
|
|
"admin command error: status(%#x) qualifier(%#x)\n",
|
|
status, le16_to_cpu(va_status->status_qualifier));
|
|
ret = -status;
|
|
}
|
|
|
|
err_cmd_exec:
|
|
kfree(va_hdr);
|
|
err_alloc:
|
|
kfree(va_status);
|
|
return ret;
|
|
}
|
|
|
|
static void virtio_pci_admin_cmd_list_init(struct virtio_device *virtio_dev)
|
|
{
|
|
struct virtio_pci_device *vp_dev = to_vp_device(virtio_dev);
|
|
struct virtio_admin_cmd cmd = {};
|
|
struct scatterlist result_sg;
|
|
struct scatterlist data_sg;
|
|
__le64 *data;
|
|
int ret;
|
|
|
|
data = kzalloc(sizeof(*data), GFP_KERNEL);
|
|
if (!data)
|
|
return;
|
|
|
|
sg_init_one(&result_sg, data, sizeof(*data));
|
|
cmd.opcode = cpu_to_le16(VIRTIO_ADMIN_CMD_LIST_QUERY);
|
|
cmd.group_type = cpu_to_le16(VIRTIO_ADMIN_GROUP_TYPE_SRIOV);
|
|
cmd.result_sg = &result_sg;
|
|
|
|
ret = vp_modern_admin_cmd_exec(virtio_dev, &cmd);
|
|
if (ret)
|
|
goto end;
|
|
|
|
*data &= cpu_to_le64(VIRTIO_ADMIN_CMD_BITMAP);
|
|
sg_init_one(&data_sg, data, sizeof(*data));
|
|
cmd.opcode = cpu_to_le16(VIRTIO_ADMIN_CMD_LIST_USE);
|
|
cmd.data_sg = &data_sg;
|
|
cmd.result_sg = NULL;
|
|
|
|
ret = vp_modern_admin_cmd_exec(virtio_dev, &cmd);
|
|
if (ret)
|
|
goto end;
|
|
|
|
vp_dev->admin_vq.supported_cmds = le64_to_cpu(*data);
|
|
end:
|
|
kfree(data);
|
|
}
|
|
|
|
static void
|
|
virtio_pci_admin_cmd_dev_parts_objects_enable(struct virtio_device *virtio_dev)
|
|
{
|
|
struct virtio_pci_device *vp_dev = to_vp_device(virtio_dev);
|
|
struct virtio_admin_cmd_cap_get_data *get_data;
|
|
struct virtio_admin_cmd_cap_set_data *set_data;
|
|
struct virtio_dev_parts_cap *result;
|
|
struct virtio_admin_cmd cmd = {};
|
|
struct scatterlist result_sg;
|
|
struct scatterlist data_sg;
|
|
u8 resource_objects_limit;
|
|
u16 set_data_size;
|
|
int ret;
|
|
|
|
get_data = kzalloc(sizeof(*get_data), GFP_KERNEL);
|
|
if (!get_data)
|
|
return;
|
|
|
|
result = kzalloc(sizeof(*result), GFP_KERNEL);
|
|
if (!result)
|
|
goto end;
|
|
|
|
get_data->id = cpu_to_le16(VIRTIO_DEV_PARTS_CAP);
|
|
sg_init_one(&data_sg, get_data, sizeof(*get_data));
|
|
sg_init_one(&result_sg, result, sizeof(*result));
|
|
cmd.opcode = cpu_to_le16(VIRTIO_ADMIN_CMD_DEVICE_CAP_GET);
|
|
cmd.group_type = cpu_to_le16(VIRTIO_ADMIN_GROUP_TYPE_SRIOV);
|
|
cmd.data_sg = &data_sg;
|
|
cmd.result_sg = &result_sg;
|
|
ret = vp_modern_admin_cmd_exec(virtio_dev, &cmd);
|
|
if (ret)
|
|
goto err_get;
|
|
|
|
set_data_size = sizeof(*set_data) + sizeof(*result);
|
|
set_data = kzalloc(set_data_size, GFP_KERNEL);
|
|
if (!set_data)
|
|
goto err_get;
|
|
|
|
set_data->id = cpu_to_le16(VIRTIO_DEV_PARTS_CAP);
|
|
|
|
/* Set the limit to the minimum value between the GET and SET values
|
|
* supported by the device. Since the obj_id for VIRTIO_DEV_PARTS_CAP
|
|
* is a globally unique value per PF, there is no possibility of
|
|
* overlap between GET and SET operations.
|
|
*/
|
|
resource_objects_limit = min(result->get_parts_resource_objects_limit,
|
|
result->set_parts_resource_objects_limit);
|
|
result->get_parts_resource_objects_limit = resource_objects_limit;
|
|
result->set_parts_resource_objects_limit = resource_objects_limit;
|
|
memcpy(set_data->cap_specific_data, result, sizeof(*result));
|
|
sg_init_one(&data_sg, set_data, set_data_size);
|
|
cmd.data_sg = &data_sg;
|
|
cmd.result_sg = NULL;
|
|
cmd.opcode = cpu_to_le16(VIRTIO_ADMIN_CMD_DRIVER_CAP_SET);
|
|
ret = vp_modern_admin_cmd_exec(virtio_dev, &cmd);
|
|
if (ret)
|
|
goto err_set;
|
|
|
|
/* Allocate IDR to manage the dev caps objects */
|
|
ida_init(&vp_dev->admin_vq.dev_parts_ida);
|
|
vp_dev->admin_vq.max_dev_parts_objects = resource_objects_limit;
|
|
|
|
err_set:
|
|
kfree(set_data);
|
|
err_get:
|
|
kfree(result);
|
|
end:
|
|
kfree(get_data);
|
|
}
|
|
|
|
static void virtio_pci_admin_cmd_cap_init(struct virtio_device *virtio_dev)
|
|
{
|
|
struct virtio_pci_device *vp_dev = to_vp_device(virtio_dev);
|
|
struct virtio_admin_cmd_query_cap_id_result *data;
|
|
struct virtio_admin_cmd cmd = {};
|
|
struct scatterlist result_sg;
|
|
int ret;
|
|
|
|
data = kzalloc(sizeof(*data), GFP_KERNEL);
|
|
if (!data)
|
|
return;
|
|
|
|
sg_init_one(&result_sg, data, sizeof(*data));
|
|
cmd.opcode = cpu_to_le16(VIRTIO_ADMIN_CMD_CAP_ID_LIST_QUERY);
|
|
cmd.group_type = cpu_to_le16(VIRTIO_ADMIN_GROUP_TYPE_SRIOV);
|
|
cmd.result_sg = &result_sg;
|
|
|
|
ret = vp_modern_admin_cmd_exec(virtio_dev, &cmd);
|
|
if (ret)
|
|
goto end;
|
|
|
|
/* Max number of caps fits into a single u64 */
|
|
BUILD_BUG_ON(sizeof(data->supported_caps) > sizeof(u64));
|
|
|
|
vp_dev->admin_vq.supported_caps = le64_to_cpu(data->supported_caps[0]);
|
|
|
|
if (!(vp_dev->admin_vq.supported_caps & (1 << VIRTIO_DEV_PARTS_CAP)))
|
|
goto end;
|
|
|
|
virtio_pci_admin_cmd_dev_parts_objects_enable(virtio_dev);
|
|
end:
|
|
kfree(data);
|
|
}
|
|
|
|
static void vp_modern_avq_activate(struct virtio_device *vdev)
|
|
{
|
|
if (!virtio_has_feature(vdev, VIRTIO_F_ADMIN_VQ))
|
|
return;
|
|
|
|
virtio_pci_admin_cmd_list_init(vdev);
|
|
virtio_pci_admin_cmd_cap_init(vdev);
|
|
}
|
|
|
|
static void vp_modern_avq_cleanup(struct virtio_device *vdev)
|
|
{
|
|
struct virtio_pci_device *vp_dev = to_vp_device(vdev);
|
|
struct virtio_admin_cmd *cmd;
|
|
struct virtqueue *vq;
|
|
|
|
if (!virtio_has_feature(vdev, VIRTIO_F_ADMIN_VQ))
|
|
return;
|
|
|
|
vq = vp_dev->admin_vq.info->vq;
|
|
if (!vq)
|
|
return;
|
|
|
|
while ((cmd = virtqueue_detach_unused_buf(vq))) {
|
|
cmd->ret = -EIO;
|
|
complete(&cmd->completion);
|
|
}
|
|
}
|
|
|
|
static void vp_transport_features(struct virtio_device *vdev, u64 features)
|
|
{
|
|
struct virtio_pci_device *vp_dev = to_vp_device(vdev);
|
|
struct pci_dev *pci_dev = vp_dev->pci_dev;
|
|
|
|
if ((features & BIT_ULL(VIRTIO_F_SR_IOV)) &&
|
|
pci_find_ext_capability(pci_dev, PCI_EXT_CAP_ID_SRIOV))
|
|
__virtio_set_bit(vdev, VIRTIO_F_SR_IOV);
|
|
|
|
if (features & BIT_ULL(VIRTIO_F_RING_RESET))
|
|
__virtio_set_bit(vdev, VIRTIO_F_RING_RESET);
|
|
|
|
if (features & BIT_ULL(VIRTIO_F_ADMIN_VQ))
|
|
__virtio_set_bit(vdev, VIRTIO_F_ADMIN_VQ);
|
|
}
|
|
|
|
static int __vp_check_common_size_one_feature(struct virtio_device *vdev, u32 fbit,
|
|
u32 offset, const char *fname)
|
|
{
|
|
struct virtio_pci_device *vp_dev = to_vp_device(vdev);
|
|
|
|
if (!__virtio_test_bit(vdev, fbit))
|
|
return 0;
|
|
|
|
if (likely(vp_dev->mdev.common_len >= offset))
|
|
return 0;
|
|
|
|
dev_err(&vdev->dev,
|
|
"virtio: common cfg size(%zu) does not match the feature %s\n",
|
|
vp_dev->mdev.common_len, fname);
|
|
|
|
return -EINVAL;
|
|
}
|
|
|
|
#define vp_check_common_size_one_feature(vdev, fbit, field) \
|
|
__vp_check_common_size_one_feature(vdev, fbit, \
|
|
offsetofend(struct virtio_pci_modern_common_cfg, field), #fbit)
|
|
|
|
static int vp_check_common_size(struct virtio_device *vdev)
|
|
{
|
|
if (vp_check_common_size_one_feature(vdev, VIRTIO_F_NOTIF_CONFIG_DATA, queue_notify_data))
|
|
return -EINVAL;
|
|
|
|
if (vp_check_common_size_one_feature(vdev, VIRTIO_F_RING_RESET, queue_reset))
|
|
return -EINVAL;
|
|
|
|
if (vp_check_common_size_one_feature(vdev, VIRTIO_F_ADMIN_VQ, admin_queue_num))
|
|
return -EINVAL;
|
|
|
|
return 0;
|
|
}
|
|
|
|
/* virtio config->finalize_features() implementation */
|
|
static int vp_finalize_features(struct virtio_device *vdev)
|
|
{
|
|
struct virtio_pci_device *vp_dev = to_vp_device(vdev);
|
|
u64 features = vdev->features;
|
|
|
|
/* Give virtio_ring a chance to accept features. */
|
|
vring_transport_features(vdev);
|
|
|
|
/* Give virtio_pci a chance to accept features. */
|
|
vp_transport_features(vdev, features);
|
|
|
|
if (!__virtio_test_bit(vdev, VIRTIO_F_VERSION_1)) {
|
|
dev_err(&vdev->dev, "virtio: device uses modern interface "
|
|
"but does not have VIRTIO_F_VERSION_1\n");
|
|
return -EINVAL;
|
|
}
|
|
|
|
if (vp_check_common_size(vdev))
|
|
return -EINVAL;
|
|
|
|
vp_modern_set_features(&vp_dev->mdev, vdev->features);
|
|
|
|
return 0;
|
|
}
|
|
|
|
/* virtio config->get() implementation */
|
|
static void vp_get(struct virtio_device *vdev, unsigned int offset,
|
|
void *buf, unsigned int len)
|
|
{
|
|
struct virtio_pci_device *vp_dev = to_vp_device(vdev);
|
|
struct virtio_pci_modern_device *mdev = &vp_dev->mdev;
|
|
void __iomem *device = mdev->device;
|
|
u8 b;
|
|
__le16 w;
|
|
__le32 l;
|
|
|
|
BUG_ON(offset + len > mdev->device_len);
|
|
|
|
switch (len) {
|
|
case 1:
|
|
b = ioread8(device + offset);
|
|
memcpy(buf, &b, sizeof b);
|
|
break;
|
|
case 2:
|
|
w = cpu_to_le16(ioread16(device + offset));
|
|
memcpy(buf, &w, sizeof w);
|
|
break;
|
|
case 4:
|
|
l = cpu_to_le32(ioread32(device + offset));
|
|
memcpy(buf, &l, sizeof l);
|
|
break;
|
|
case 8:
|
|
l = cpu_to_le32(ioread32(device + offset));
|
|
memcpy(buf, &l, sizeof l);
|
|
l = cpu_to_le32(ioread32(device + offset + sizeof l));
|
|
memcpy(buf + sizeof l, &l, sizeof l);
|
|
break;
|
|
default:
|
|
BUG();
|
|
}
|
|
}
|
|
|
|
/* the config->set() implementation. it's symmetric to the config->get()
|
|
* implementation */
|
|
static void vp_set(struct virtio_device *vdev, unsigned int offset,
|
|
const void *buf, unsigned int len)
|
|
{
|
|
struct virtio_pci_device *vp_dev = to_vp_device(vdev);
|
|
struct virtio_pci_modern_device *mdev = &vp_dev->mdev;
|
|
void __iomem *device = mdev->device;
|
|
u8 b;
|
|
__le16 w;
|
|
__le32 l;
|
|
|
|
BUG_ON(offset + len > mdev->device_len);
|
|
|
|
switch (len) {
|
|
case 1:
|
|
memcpy(&b, buf, sizeof b);
|
|
iowrite8(b, device + offset);
|
|
break;
|
|
case 2:
|
|
memcpy(&w, buf, sizeof w);
|
|
iowrite16(le16_to_cpu(w), device + offset);
|
|
break;
|
|
case 4:
|
|
memcpy(&l, buf, sizeof l);
|
|
iowrite32(le32_to_cpu(l), device + offset);
|
|
break;
|
|
case 8:
|
|
memcpy(&l, buf, sizeof l);
|
|
iowrite32(le32_to_cpu(l), device + offset);
|
|
memcpy(&l, buf + sizeof l, sizeof l);
|
|
iowrite32(le32_to_cpu(l), device + offset + sizeof l);
|
|
break;
|
|
default:
|
|
BUG();
|
|
}
|
|
}
|
|
|
|
static u32 vp_generation(struct virtio_device *vdev)
|
|
{
|
|
struct virtio_pci_device *vp_dev = to_vp_device(vdev);
|
|
|
|
return vp_modern_generation(&vp_dev->mdev);
|
|
}
|
|
|
|
/* config->{get,set}_status() implementations */
|
|
static u8 vp_get_status(struct virtio_device *vdev)
|
|
{
|
|
struct virtio_pci_device *vp_dev = to_vp_device(vdev);
|
|
|
|
return vp_modern_get_status(&vp_dev->mdev);
|
|
}
|
|
|
|
static void vp_set_status(struct virtio_device *vdev, u8 status)
|
|
{
|
|
struct virtio_pci_device *vp_dev = to_vp_device(vdev);
|
|
|
|
/* We should never be setting status to 0. */
|
|
BUG_ON(status == 0);
|
|
vp_modern_set_status(&vp_dev->mdev, status);
|
|
if (status & VIRTIO_CONFIG_S_DRIVER_OK)
|
|
vp_modern_avq_activate(vdev);
|
|
}
|
|
|
|
static void vp_reset(struct virtio_device *vdev)
|
|
{
|
|
struct virtio_pci_device *vp_dev = to_vp_device(vdev);
|
|
struct virtio_pci_modern_device *mdev = &vp_dev->mdev;
|
|
|
|
/* 0 status means a reset. */
|
|
vp_modern_set_status(mdev, 0);
|
|
/* After writing 0 to device_status, the driver MUST wait for a read of
|
|
* device_status to return 0 before reinitializing the device.
|
|
* This will flush out the status write, and flush in device writes,
|
|
* including MSI-X interrupts, if any.
|
|
*/
|
|
while (vp_modern_get_status(mdev))
|
|
msleep(1);
|
|
|
|
vp_modern_avq_cleanup(vdev);
|
|
|
|
/* Flush pending VQ/configuration callbacks. */
|
|
vp_synchronize_vectors(vdev);
|
|
}
|
|
|
|
static int vp_active_vq(struct virtqueue *vq, u16 msix_vec)
|
|
{
|
|
struct virtio_pci_device *vp_dev = to_vp_device(vq->vdev);
|
|
struct virtio_pci_modern_device *mdev = &vp_dev->mdev;
|
|
unsigned long index;
|
|
|
|
index = vq->index;
|
|
|
|
/* activate the queue */
|
|
vp_modern_set_queue_size(mdev, index, virtqueue_get_vring_size(vq));
|
|
vp_modern_queue_address(mdev, index, virtqueue_get_desc_addr(vq),
|
|
virtqueue_get_avail_addr(vq),
|
|
virtqueue_get_used_addr(vq));
|
|
|
|
if (msix_vec != VIRTIO_MSI_NO_VECTOR) {
|
|
msix_vec = vp_modern_queue_vector(mdev, index, msix_vec);
|
|
if (msix_vec == VIRTIO_MSI_NO_VECTOR)
|
|
return -EBUSY;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int vp_modern_disable_vq_and_reset(struct virtqueue *vq)
|
|
{
|
|
struct virtio_pci_device *vp_dev = to_vp_device(vq->vdev);
|
|
struct virtio_pci_modern_device *mdev = &vp_dev->mdev;
|
|
struct virtio_pci_vq_info *info;
|
|
unsigned long flags;
|
|
|
|
if (!virtio_has_feature(vq->vdev, VIRTIO_F_RING_RESET))
|
|
return -ENOENT;
|
|
|
|
vp_modern_set_queue_reset(mdev, vq->index);
|
|
|
|
info = vp_dev->vqs[vq->index];
|
|
|
|
/* delete vq from irq handler */
|
|
spin_lock_irqsave(&vp_dev->lock, flags);
|
|
list_del(&info->node);
|
|
spin_unlock_irqrestore(&vp_dev->lock, flags);
|
|
|
|
INIT_LIST_HEAD(&info->node);
|
|
|
|
#ifdef CONFIG_VIRTIO_HARDEN_NOTIFICATION
|
|
__virtqueue_break(vq);
|
|
#endif
|
|
|
|
/* For the case where vq has an exclusive irq, call synchronize_irq() to
|
|
* wait for completion.
|
|
*
|
|
* note: We can't use disable_irq() since it conflicts with the affinity
|
|
* managed IRQ that is used by some drivers.
|
|
*/
|
|
if (vp_dev->per_vq_vectors && info->msix_vector != VIRTIO_MSI_NO_VECTOR)
|
|
synchronize_irq(pci_irq_vector(vp_dev->pci_dev, info->msix_vector));
|
|
|
|
vq->reset = true;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int vp_modern_enable_vq_after_reset(struct virtqueue *vq)
|
|
{
|
|
struct virtio_pci_device *vp_dev = to_vp_device(vq->vdev);
|
|
struct virtio_pci_modern_device *mdev = &vp_dev->mdev;
|
|
struct virtio_pci_vq_info *info;
|
|
unsigned long flags, index;
|
|
int err;
|
|
|
|
if (!vq->reset)
|
|
return -EBUSY;
|
|
|
|
index = vq->index;
|
|
info = vp_dev->vqs[index];
|
|
|
|
if (vp_modern_get_queue_reset(mdev, index))
|
|
return -EBUSY;
|
|
|
|
if (vp_modern_get_queue_enable(mdev, index))
|
|
return -EBUSY;
|
|
|
|
err = vp_active_vq(vq, info->msix_vector);
|
|
if (err)
|
|
return err;
|
|
|
|
if (vq->callback) {
|
|
spin_lock_irqsave(&vp_dev->lock, flags);
|
|
list_add(&info->node, &vp_dev->virtqueues);
|
|
spin_unlock_irqrestore(&vp_dev->lock, flags);
|
|
} else {
|
|
INIT_LIST_HEAD(&info->node);
|
|
}
|
|
|
|
#ifdef CONFIG_VIRTIO_HARDEN_NOTIFICATION
|
|
__virtqueue_unbreak(vq);
|
|
#endif
|
|
|
|
vp_modern_set_queue_enable(&vp_dev->mdev, index, true);
|
|
vq->reset = false;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static u16 vp_config_vector(struct virtio_pci_device *vp_dev, u16 vector)
|
|
{
|
|
return vp_modern_config_vector(&vp_dev->mdev, vector);
|
|
}
|
|
|
|
static bool vp_notify_with_data(struct virtqueue *vq)
|
|
{
|
|
u32 data = vring_notification_data(vq);
|
|
|
|
iowrite32(data, (void __iomem *)vq->priv);
|
|
|
|
return true;
|
|
}
|
|
|
|
static struct virtqueue *setup_vq(struct virtio_pci_device *vp_dev,
|
|
struct virtio_pci_vq_info *info,
|
|
unsigned int index,
|
|
void (*callback)(struct virtqueue *vq),
|
|
const char *name,
|
|
bool ctx,
|
|
u16 msix_vec)
|
|
{
|
|
|
|
struct virtio_pci_modern_device *mdev = &vp_dev->mdev;
|
|
bool (*notify)(struct virtqueue *vq);
|
|
struct virtqueue *vq;
|
|
bool is_avq;
|
|
u16 num;
|
|
int err;
|
|
|
|
if (__virtio_test_bit(&vp_dev->vdev, VIRTIO_F_NOTIFICATION_DATA))
|
|
notify = vp_notify_with_data;
|
|
else
|
|
notify = vp_notify;
|
|
|
|
is_avq = vp_is_avq(&vp_dev->vdev, index);
|
|
if (index >= vp_modern_get_num_queues(mdev) && !is_avq)
|
|
return ERR_PTR(-EINVAL);
|
|
|
|
num = vp_modern_get_queue_size(mdev, index);
|
|
/* Check if queue is either not available or already active. */
|
|
if (!num || vp_modern_get_queue_enable(mdev, index))
|
|
return ERR_PTR(-ENOENT);
|
|
|
|
info->msix_vector = msix_vec;
|
|
|
|
/* create the vring */
|
|
vq = vring_create_virtqueue(index, num,
|
|
SMP_CACHE_BYTES, &vp_dev->vdev,
|
|
true, true, ctx,
|
|
notify, callback, name);
|
|
if (!vq)
|
|
return ERR_PTR(-ENOMEM);
|
|
|
|
vq->num_max = num;
|
|
|
|
err = vp_active_vq(vq, msix_vec);
|
|
if (err)
|
|
goto err;
|
|
|
|
vq->priv = (void __force *)vp_modern_map_vq_notify(mdev, index, NULL);
|
|
if (!vq->priv) {
|
|
err = -ENOMEM;
|
|
goto err;
|
|
}
|
|
|
|
return vq;
|
|
|
|
err:
|
|
vring_del_virtqueue(vq);
|
|
return ERR_PTR(err);
|
|
}
|
|
|
|
static int vp_modern_find_vqs(struct virtio_device *vdev, unsigned int nvqs,
|
|
struct virtqueue *vqs[],
|
|
struct virtqueue_info vqs_info[],
|
|
struct irq_affinity *desc)
|
|
{
|
|
struct virtio_pci_device *vp_dev = to_vp_device(vdev);
|
|
struct virtqueue *vq;
|
|
int rc = vp_find_vqs(vdev, nvqs, vqs, vqs_info, desc);
|
|
|
|
if (rc)
|
|
return rc;
|
|
|
|
/* Select and activate all queues. Has to be done last: once we do
|
|
* this, there's no way to go back except reset.
|
|
*/
|
|
list_for_each_entry(vq, &vdev->vqs, list)
|
|
vp_modern_set_queue_enable(&vp_dev->mdev, vq->index, true);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static void del_vq(struct virtio_pci_vq_info *info)
|
|
{
|
|
struct virtqueue *vq = info->vq;
|
|
struct virtio_pci_device *vp_dev = to_vp_device(vq->vdev);
|
|
struct virtio_pci_modern_device *mdev = &vp_dev->mdev;
|
|
|
|
if (vp_dev->msix_enabled)
|
|
vp_modern_queue_vector(mdev, vq->index,
|
|
VIRTIO_MSI_NO_VECTOR);
|
|
|
|
if (!mdev->notify_base)
|
|
pci_iounmap(mdev->pci_dev, (void __force __iomem *)vq->priv);
|
|
|
|
vring_del_virtqueue(vq);
|
|
}
|
|
|
|
static int virtio_pci_find_shm_cap(struct pci_dev *dev, u8 required_id,
|
|
u8 *bar, u64 *offset, u64 *len)
|
|
{
|
|
int pos;
|
|
|
|
for (pos = pci_find_capability(dev, PCI_CAP_ID_VNDR); pos > 0;
|
|
pos = pci_find_next_capability(dev, pos, PCI_CAP_ID_VNDR)) {
|
|
u8 type, cap_len, id, res_bar;
|
|
u32 tmp32;
|
|
u64 res_offset, res_length;
|
|
|
|
pci_read_config_byte(dev, pos + offsetof(struct virtio_pci_cap,
|
|
cfg_type), &type);
|
|
if (type != VIRTIO_PCI_CAP_SHARED_MEMORY_CFG)
|
|
continue;
|
|
|
|
pci_read_config_byte(dev, pos + offsetof(struct virtio_pci_cap,
|
|
cap_len), &cap_len);
|
|
if (cap_len != sizeof(struct virtio_pci_cap64)) {
|
|
dev_err(&dev->dev, "%s: shm cap with bad size offset:"
|
|
" %d size: %d\n", __func__, pos, cap_len);
|
|
continue;
|
|
}
|
|
|
|
pci_read_config_byte(dev, pos + offsetof(struct virtio_pci_cap,
|
|
id), &id);
|
|
if (id != required_id)
|
|
continue;
|
|
|
|
pci_read_config_byte(dev, pos + offsetof(struct virtio_pci_cap,
|
|
bar), &res_bar);
|
|
if (res_bar >= PCI_STD_NUM_BARS)
|
|
continue;
|
|
|
|
/* Type and ID match, and the BAR value isn't reserved.
|
|
* Looks good.
|
|
*/
|
|
|
|
/* Read the lower 32bit of length and offset */
|
|
pci_read_config_dword(dev, pos + offsetof(struct virtio_pci_cap,
|
|
offset), &tmp32);
|
|
res_offset = tmp32;
|
|
pci_read_config_dword(dev, pos + offsetof(struct virtio_pci_cap,
|
|
length), &tmp32);
|
|
res_length = tmp32;
|
|
|
|
/* and now the top half */
|
|
pci_read_config_dword(dev,
|
|
pos + offsetof(struct virtio_pci_cap64,
|
|
offset_hi), &tmp32);
|
|
res_offset |= ((u64)tmp32) << 32;
|
|
pci_read_config_dword(dev,
|
|
pos + offsetof(struct virtio_pci_cap64,
|
|
length_hi), &tmp32);
|
|
res_length |= ((u64)tmp32) << 32;
|
|
|
|
*bar = res_bar;
|
|
*offset = res_offset;
|
|
*len = res_length;
|
|
|
|
return pos;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
static bool vp_get_shm_region(struct virtio_device *vdev,
|
|
struct virtio_shm_region *region, u8 id)
|
|
{
|
|
struct virtio_pci_device *vp_dev = to_vp_device(vdev);
|
|
struct pci_dev *pci_dev = vp_dev->pci_dev;
|
|
u8 bar;
|
|
u64 offset, len;
|
|
phys_addr_t phys_addr;
|
|
size_t bar_len;
|
|
|
|
if (!virtio_pci_find_shm_cap(pci_dev, id, &bar, &offset, &len))
|
|
return false;
|
|
|
|
phys_addr = pci_resource_start(pci_dev, bar);
|
|
bar_len = pci_resource_len(pci_dev, bar);
|
|
|
|
if ((offset + len) < offset) {
|
|
dev_err(&pci_dev->dev, "%s: cap offset+len overflow detected\n",
|
|
__func__);
|
|
return false;
|
|
}
|
|
|
|
if (offset + len > bar_len) {
|
|
dev_err(&pci_dev->dev, "%s: bar shorter than cap offset+len\n",
|
|
__func__);
|
|
return false;
|
|
}
|
|
|
|
region->len = len;
|
|
region->addr = (u64) phys_addr + offset;
|
|
|
|
return true;
|
|
}
|
|
|
|
/*
|
|
* virtio_pci_admin_has_dev_parts - Checks whether the device parts
|
|
* functionality is supported
|
|
* @pdev: VF pci_dev
|
|
*
|
|
* Returns true on success.
|
|
*/
|
|
bool virtio_pci_admin_has_dev_parts(struct pci_dev *pdev)
|
|
{
|
|
struct virtio_device *virtio_dev = virtio_pci_vf_get_pf_dev(pdev);
|
|
struct virtio_pci_device *vp_dev;
|
|
|
|
if (!virtio_dev)
|
|
return false;
|
|
|
|
if (!virtio_has_feature(virtio_dev, VIRTIO_F_ADMIN_VQ))
|
|
return false;
|
|
|
|
vp_dev = to_vp_device(virtio_dev);
|
|
|
|
if (!((vp_dev->admin_vq.supported_cmds & VIRTIO_DEV_PARTS_ADMIN_CMD_BITMAP) ==
|
|
VIRTIO_DEV_PARTS_ADMIN_CMD_BITMAP))
|
|
return false;
|
|
|
|
return vp_dev->admin_vq.max_dev_parts_objects;
|
|
}
|
|
EXPORT_SYMBOL_GPL(virtio_pci_admin_has_dev_parts);
|
|
|
|
/*
|
|
* virtio_pci_admin_mode_set - Sets the mode of a member device
|
|
* @pdev: VF pci_dev
|
|
* @flags: device mode's flags
|
|
*
|
|
* Note: caller must serialize access for the given device.
|
|
* Returns 0 on success, or negative on failure.
|
|
*/
|
|
int virtio_pci_admin_mode_set(struct pci_dev *pdev, u8 flags)
|
|
{
|
|
struct virtio_device *virtio_dev = virtio_pci_vf_get_pf_dev(pdev);
|
|
struct virtio_admin_cmd_dev_mode_set_data *data;
|
|
struct virtio_admin_cmd cmd = {};
|
|
struct scatterlist data_sg;
|
|
int vf_id;
|
|
int ret;
|
|
|
|
if (!virtio_dev)
|
|
return -ENODEV;
|
|
|
|
vf_id = pci_iov_vf_id(pdev);
|
|
if (vf_id < 0)
|
|
return vf_id;
|
|
|
|
data = kzalloc(sizeof(*data), GFP_KERNEL);
|
|
if (!data)
|
|
return -ENOMEM;
|
|
|
|
data->flags = flags;
|
|
sg_init_one(&data_sg, data, sizeof(*data));
|
|
cmd.opcode = cpu_to_le16(VIRTIO_ADMIN_CMD_DEV_MODE_SET);
|
|
cmd.group_type = cpu_to_le16(VIRTIO_ADMIN_GROUP_TYPE_SRIOV);
|
|
cmd.group_member_id = cpu_to_le64(vf_id + 1);
|
|
cmd.data_sg = &data_sg;
|
|
ret = vp_modern_admin_cmd_exec(virtio_dev, &cmd);
|
|
|
|
kfree(data);
|
|
return ret;
|
|
}
|
|
EXPORT_SYMBOL_GPL(virtio_pci_admin_mode_set);
|
|
|
|
/*
|
|
* virtio_pci_admin_obj_create - Creates an object for a given type and operation,
|
|
* following the max objects that can be created for that request.
|
|
* @pdev: VF pci_dev
|
|
* @obj_type: Object type
|
|
* @operation_type: Operation type
|
|
* @obj_id: Output unique object id
|
|
*
|
|
* Note: caller must serialize access for the given device.
|
|
* Returns 0 on success, or negative on failure.
|
|
*/
|
|
int virtio_pci_admin_obj_create(struct pci_dev *pdev, u16 obj_type, u8 operation_type,
|
|
u32 *obj_id)
|
|
{
|
|
struct virtio_device *virtio_dev = virtio_pci_vf_get_pf_dev(pdev);
|
|
u16 data_size = sizeof(struct virtio_admin_cmd_resource_obj_create_data);
|
|
struct virtio_admin_cmd_resource_obj_create_data *obj_create_data;
|
|
struct virtio_resource_obj_dev_parts obj_dev_parts = {};
|
|
struct virtio_pci_admin_vq *avq;
|
|
struct virtio_admin_cmd cmd = {};
|
|
struct scatterlist data_sg;
|
|
void *data;
|
|
int id = -1;
|
|
int vf_id;
|
|
int ret;
|
|
|
|
if (!virtio_dev)
|
|
return -ENODEV;
|
|
|
|
vf_id = pci_iov_vf_id(pdev);
|
|
if (vf_id < 0)
|
|
return vf_id;
|
|
|
|
if (obj_type != VIRTIO_RESOURCE_OBJ_DEV_PARTS)
|
|
return -EOPNOTSUPP;
|
|
|
|
if (operation_type != VIRTIO_RESOURCE_OBJ_DEV_PARTS_TYPE_GET &&
|
|
operation_type != VIRTIO_RESOURCE_OBJ_DEV_PARTS_TYPE_SET)
|
|
return -EINVAL;
|
|
|
|
avq = &to_vp_device(virtio_dev)->admin_vq;
|
|
if (!avq->max_dev_parts_objects)
|
|
return -EOPNOTSUPP;
|
|
|
|
id = ida_alloc_range(&avq->dev_parts_ida, 0,
|
|
avq->max_dev_parts_objects - 1, GFP_KERNEL);
|
|
if (id < 0)
|
|
return id;
|
|
|
|
*obj_id = id;
|
|
data_size += sizeof(obj_dev_parts);
|
|
data = kzalloc(data_size, GFP_KERNEL);
|
|
if (!data) {
|
|
ret = -ENOMEM;
|
|
goto end;
|
|
}
|
|
|
|
obj_create_data = data;
|
|
obj_create_data->hdr.type = cpu_to_le16(obj_type);
|
|
obj_create_data->hdr.id = cpu_to_le32(*obj_id);
|
|
obj_dev_parts.type = operation_type;
|
|
memcpy(obj_create_data->resource_obj_specific_data, &obj_dev_parts,
|
|
sizeof(obj_dev_parts));
|
|
sg_init_one(&data_sg, data, data_size);
|
|
cmd.opcode = cpu_to_le16(VIRTIO_ADMIN_CMD_RESOURCE_OBJ_CREATE);
|
|
cmd.group_type = cpu_to_le16(VIRTIO_ADMIN_GROUP_TYPE_SRIOV);
|
|
cmd.group_member_id = cpu_to_le64(vf_id + 1);
|
|
cmd.data_sg = &data_sg;
|
|
ret = vp_modern_admin_cmd_exec(virtio_dev, &cmd);
|
|
|
|
kfree(data);
|
|
end:
|
|
if (ret)
|
|
ida_free(&avq->dev_parts_ida, id);
|
|
|
|
return ret;
|
|
}
|
|
EXPORT_SYMBOL_GPL(virtio_pci_admin_obj_create);
|
|
|
|
/*
|
|
* virtio_pci_admin_obj_destroy - Destroys an object of a given type and id
|
|
* @pdev: VF pci_dev
|
|
* @obj_type: Object type
|
|
* @id: Object id
|
|
*
|
|
* Note: caller must serialize access for the given device.
|
|
* Returns 0 on success, or negative on failure.
|
|
*/
|
|
int virtio_pci_admin_obj_destroy(struct pci_dev *pdev, u16 obj_type, u32 id)
|
|
{
|
|
struct virtio_device *virtio_dev = virtio_pci_vf_get_pf_dev(pdev);
|
|
struct virtio_admin_cmd_resource_obj_cmd_hdr *data;
|
|
struct virtio_pci_device *vp_dev;
|
|
struct virtio_admin_cmd cmd = {};
|
|
struct scatterlist data_sg;
|
|
int vf_id;
|
|
int ret;
|
|
|
|
if (!virtio_dev)
|
|
return -ENODEV;
|
|
|
|
vf_id = pci_iov_vf_id(pdev);
|
|
if (vf_id < 0)
|
|
return vf_id;
|
|
|
|
if (obj_type != VIRTIO_RESOURCE_OBJ_DEV_PARTS)
|
|
return -EINVAL;
|
|
|
|
data = kzalloc(sizeof(*data), GFP_KERNEL);
|
|
if (!data)
|
|
return -ENOMEM;
|
|
|
|
data->type = cpu_to_le16(obj_type);
|
|
data->id = cpu_to_le32(id);
|
|
sg_init_one(&data_sg, data, sizeof(*data));
|
|
cmd.opcode = cpu_to_le16(VIRTIO_ADMIN_CMD_RESOURCE_OBJ_DESTROY);
|
|
cmd.group_type = cpu_to_le16(VIRTIO_ADMIN_GROUP_TYPE_SRIOV);
|
|
cmd.group_member_id = cpu_to_le64(vf_id + 1);
|
|
cmd.data_sg = &data_sg;
|
|
ret = vp_modern_admin_cmd_exec(virtio_dev, &cmd);
|
|
if (!ret) {
|
|
vp_dev = to_vp_device(virtio_dev);
|
|
ida_free(&vp_dev->admin_vq.dev_parts_ida, id);
|
|
}
|
|
|
|
kfree(data);
|
|
return ret;
|
|
}
|
|
EXPORT_SYMBOL_GPL(virtio_pci_admin_obj_destroy);
|
|
|
|
/*
|
|
* virtio_pci_admin_dev_parts_metadata_get - Gets the metadata of the device parts
|
|
* identified by the below attributes.
|
|
* @pdev: VF pci_dev
|
|
* @obj_type: Object type
|
|
* @id: Object id
|
|
* @metadata_type: Metadata type
|
|
* @out: Upon success holds the output for 'metadata type size'
|
|
*
|
|
* Note: caller must serialize access for the given device.
|
|
* Returns 0 on success, or negative on failure.
|
|
*/
|
|
int virtio_pci_admin_dev_parts_metadata_get(struct pci_dev *pdev, u16 obj_type,
|
|
u32 id, u8 metadata_type, u32 *out)
|
|
{
|
|
struct virtio_device *virtio_dev = virtio_pci_vf_get_pf_dev(pdev);
|
|
struct virtio_admin_cmd_dev_parts_metadata_result *result;
|
|
struct virtio_admin_cmd_dev_parts_metadata_data *data;
|
|
struct scatterlist data_sg, result_sg;
|
|
struct virtio_admin_cmd cmd = {};
|
|
int vf_id;
|
|
int ret;
|
|
|
|
if (!virtio_dev)
|
|
return -ENODEV;
|
|
|
|
if (metadata_type != VIRTIO_ADMIN_CMD_DEV_PARTS_METADATA_TYPE_SIZE)
|
|
return -EOPNOTSUPP;
|
|
|
|
vf_id = pci_iov_vf_id(pdev);
|
|
if (vf_id < 0)
|
|
return vf_id;
|
|
|
|
data = kzalloc(sizeof(*data), GFP_KERNEL);
|
|
if (!data)
|
|
return -ENOMEM;
|
|
|
|
result = kzalloc(sizeof(*result), GFP_KERNEL);
|
|
if (!result) {
|
|
ret = -ENOMEM;
|
|
goto end;
|
|
}
|
|
|
|
data->hdr.type = cpu_to_le16(obj_type);
|
|
data->hdr.id = cpu_to_le32(id);
|
|
data->type = metadata_type;
|
|
sg_init_one(&data_sg, data, sizeof(*data));
|
|
sg_init_one(&result_sg, result, sizeof(*result));
|
|
cmd.opcode = cpu_to_le16(VIRTIO_ADMIN_CMD_DEV_PARTS_METADATA_GET);
|
|
cmd.group_type = cpu_to_le16(VIRTIO_ADMIN_GROUP_TYPE_SRIOV);
|
|
cmd.group_member_id = cpu_to_le64(vf_id + 1);
|
|
cmd.data_sg = &data_sg;
|
|
cmd.result_sg = &result_sg;
|
|
ret = vp_modern_admin_cmd_exec(virtio_dev, &cmd);
|
|
if (!ret)
|
|
*out = le32_to_cpu(result->parts_size.size);
|
|
|
|
kfree(result);
|
|
end:
|
|
kfree(data);
|
|
return ret;
|
|
}
|
|
EXPORT_SYMBOL_GPL(virtio_pci_admin_dev_parts_metadata_get);
|
|
|
|
/*
|
|
* virtio_pci_admin_dev_parts_get - Gets the device parts identified by the below attributes.
|
|
* @pdev: VF pci_dev
|
|
* @obj_type: Object type
|
|
* @id: Object id
|
|
* @get_type: Get type
|
|
* @res_sg: Upon success holds the output result data
|
|
* @res_size: Upon success holds the output result size
|
|
*
|
|
* Note: caller must serialize access for the given device.
|
|
* Returns 0 on success, or negative on failure.
|
|
*/
|
|
int virtio_pci_admin_dev_parts_get(struct pci_dev *pdev, u16 obj_type, u32 id,
|
|
u8 get_type, struct scatterlist *res_sg,
|
|
u32 *res_size)
|
|
{
|
|
struct virtio_device *virtio_dev = virtio_pci_vf_get_pf_dev(pdev);
|
|
struct virtio_admin_cmd_dev_parts_get_data *data;
|
|
struct scatterlist data_sg;
|
|
struct virtio_admin_cmd cmd = {};
|
|
int vf_id;
|
|
int ret;
|
|
|
|
if (!virtio_dev)
|
|
return -ENODEV;
|
|
|
|
if (get_type != VIRTIO_ADMIN_CMD_DEV_PARTS_GET_TYPE_ALL)
|
|
return -EOPNOTSUPP;
|
|
|
|
vf_id = pci_iov_vf_id(pdev);
|
|
if (vf_id < 0)
|
|
return vf_id;
|
|
|
|
data = kzalloc(sizeof(*data), GFP_KERNEL);
|
|
if (!data)
|
|
return -ENOMEM;
|
|
|
|
data->hdr.type = cpu_to_le16(obj_type);
|
|
data->hdr.id = cpu_to_le32(id);
|
|
data->type = get_type;
|
|
sg_init_one(&data_sg, data, sizeof(*data));
|
|
cmd.opcode = cpu_to_le16(VIRTIO_ADMIN_CMD_DEV_PARTS_GET);
|
|
cmd.group_type = cpu_to_le16(VIRTIO_ADMIN_GROUP_TYPE_SRIOV);
|
|
cmd.group_member_id = cpu_to_le64(vf_id + 1);
|
|
cmd.data_sg = &data_sg;
|
|
cmd.result_sg = res_sg;
|
|
ret = vp_modern_admin_cmd_exec(virtio_dev, &cmd);
|
|
if (!ret)
|
|
*res_size = cmd.result_sg_size;
|
|
|
|
kfree(data);
|
|
return ret;
|
|
}
|
|
EXPORT_SYMBOL_GPL(virtio_pci_admin_dev_parts_get);
|
|
|
|
/*
|
|
* virtio_pci_admin_dev_parts_set - Sets the device parts identified by the below attributes.
|
|
* @pdev: VF pci_dev
|
|
* @data_sg: The device parts data, its layout follows struct virtio_admin_cmd_dev_parts_set_data
|
|
*
|
|
* Note: caller must serialize access for the given device.
|
|
* Returns 0 on success, or negative on failure.
|
|
*/
|
|
int virtio_pci_admin_dev_parts_set(struct pci_dev *pdev, struct scatterlist *data_sg)
|
|
{
|
|
struct virtio_device *virtio_dev = virtio_pci_vf_get_pf_dev(pdev);
|
|
struct virtio_admin_cmd cmd = {};
|
|
int vf_id;
|
|
|
|
if (!virtio_dev)
|
|
return -ENODEV;
|
|
|
|
vf_id = pci_iov_vf_id(pdev);
|
|
if (vf_id < 0)
|
|
return vf_id;
|
|
|
|
cmd.opcode = cpu_to_le16(VIRTIO_ADMIN_CMD_DEV_PARTS_SET);
|
|
cmd.group_type = cpu_to_le16(VIRTIO_ADMIN_GROUP_TYPE_SRIOV);
|
|
cmd.group_member_id = cpu_to_le64(vf_id + 1);
|
|
cmd.data_sg = data_sg;
|
|
return vp_modern_admin_cmd_exec(virtio_dev, &cmd);
|
|
}
|
|
EXPORT_SYMBOL_GPL(virtio_pci_admin_dev_parts_set);
|
|
|
|
static const struct virtio_config_ops virtio_pci_config_nodev_ops = {
|
|
.get = NULL,
|
|
.set = NULL,
|
|
.generation = vp_generation,
|
|
.get_status = vp_get_status,
|
|
.set_status = vp_set_status,
|
|
.reset = vp_reset,
|
|
.find_vqs = vp_modern_find_vqs,
|
|
.del_vqs = vp_del_vqs,
|
|
.synchronize_cbs = vp_synchronize_vectors,
|
|
.get_features = vp_get_features,
|
|
.finalize_features = vp_finalize_features,
|
|
.bus_name = vp_bus_name,
|
|
.set_vq_affinity = vp_set_vq_affinity,
|
|
.get_vq_affinity = vp_get_vq_affinity,
|
|
.get_shm_region = vp_get_shm_region,
|
|
.disable_vq_and_reset = vp_modern_disable_vq_and_reset,
|
|
.enable_vq_after_reset = vp_modern_enable_vq_after_reset,
|
|
};
|
|
|
|
static const struct virtio_config_ops virtio_pci_config_ops = {
|
|
.get = vp_get,
|
|
.set = vp_set,
|
|
.generation = vp_generation,
|
|
.get_status = vp_get_status,
|
|
.set_status = vp_set_status,
|
|
.reset = vp_reset,
|
|
.find_vqs = vp_modern_find_vqs,
|
|
.del_vqs = vp_del_vqs,
|
|
.synchronize_cbs = vp_synchronize_vectors,
|
|
.get_features = vp_get_features,
|
|
.finalize_features = vp_finalize_features,
|
|
.bus_name = vp_bus_name,
|
|
.set_vq_affinity = vp_set_vq_affinity,
|
|
.get_vq_affinity = vp_get_vq_affinity,
|
|
.get_shm_region = vp_get_shm_region,
|
|
.disable_vq_and_reset = vp_modern_disable_vq_and_reset,
|
|
.enable_vq_after_reset = vp_modern_enable_vq_after_reset,
|
|
};
|
|
|
|
/* the PCI probing function */
|
|
int virtio_pci_modern_probe(struct virtio_pci_device *vp_dev)
|
|
{
|
|
struct virtio_pci_modern_device *mdev = &vp_dev->mdev;
|
|
struct pci_dev *pci_dev = vp_dev->pci_dev;
|
|
int err;
|
|
|
|
mdev->pci_dev = pci_dev;
|
|
|
|
err = vp_modern_probe(mdev);
|
|
if (err)
|
|
return err;
|
|
|
|
if (mdev->device)
|
|
vp_dev->vdev.config = &virtio_pci_config_ops;
|
|
else
|
|
vp_dev->vdev.config = &virtio_pci_config_nodev_ops;
|
|
|
|
vp_dev->config_vector = vp_config_vector;
|
|
vp_dev->setup_vq = setup_vq;
|
|
vp_dev->del_vq = del_vq;
|
|
vp_dev->avq_index = vp_avq_index;
|
|
vp_dev->isr = mdev->isr;
|
|
vp_dev->vdev.id = mdev->id;
|
|
|
|
spin_lock_init(&vp_dev->admin_vq.lock);
|
|
return 0;
|
|
}
|
|
|
|
void virtio_pci_modern_remove(struct virtio_pci_device *vp_dev)
|
|
{
|
|
struct virtio_pci_modern_device *mdev = &vp_dev->mdev;
|
|
|
|
vp_modern_remove(mdev);
|
|
}
|