]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blame - drivers/virtio/virtio_ring.c
Merge branch 'locking-core-for-linus' of git://git.kernel.org/pub/scm/linux/kernel...
[mirror_ubuntu-bionic-kernel.git] / drivers / virtio / virtio_ring.c
CommitLineData
0a8a69dd
RR
1/* Virtio ring implementation.
2 *
3 * Copyright 2007 Rusty Russell IBM Corporation
4 *
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License as published by
7 * the Free Software Foundation; either version 2 of the License, or
8 * (at your option) any later version.
9 *
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
14 *
15 * You should have received a copy of the GNU General Public License
16 * along with this program; if not, write to the Free Software
17 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
18 */
19#include <linux/virtio.h>
20#include <linux/virtio_ring.h>
e34f8725 21#include <linux/virtio_config.h>
0a8a69dd 22#include <linux/device.h>
5a0e3ad6 23#include <linux/slab.h>
b5a2c4f1 24#include <linux/module.h>
e93300b1 25#include <linux/hrtimer.h>
6abb2dd9 26#include <linux/kmemleak.h>
780bc790 27#include <linux/dma-mapping.h>
78fe3987 28#include <xen/xen.h>
0a8a69dd
RR
29
30#ifdef DEBUG
31/* For development, we want to crash whenever the ring is screwed. */
9499f5e7
RR
32#define BAD_RING(_vq, fmt, args...) \
33 do { \
34 dev_err(&(_vq)->vq.vdev->dev, \
35 "%s:"fmt, (_vq)->vq.name, ##args); \
36 BUG(); \
37 } while (0)
c5f841f1
RR
38/* Caller is supposed to guarantee no reentry. */
39#define START_USE(_vq) \
40 do { \
41 if ((_vq)->in_use) \
9499f5e7
RR
42 panic("%s:in_use = %i\n", \
43 (_vq)->vq.name, (_vq)->in_use); \
c5f841f1 44 (_vq)->in_use = __LINE__; \
9499f5e7 45 } while (0)
3a35ce7d 46#define END_USE(_vq) \
97a545ab 47 do { BUG_ON(!(_vq)->in_use); (_vq)->in_use = 0; } while(0)
0a8a69dd 48#else
9499f5e7
RR
49#define BAD_RING(_vq, fmt, args...) \
50 do { \
51 dev_err(&_vq->vq.vdev->dev, \
52 "%s:"fmt, (_vq)->vq.name, ##args); \
53 (_vq)->broken = true; \
54 } while (0)
0a8a69dd
RR
55#define START_USE(vq)
56#define END_USE(vq)
57#endif
58
780bc790
AL
59struct vring_desc_state {
60 void *data; /* Data for callback. */
61 struct vring_desc *indir_desc; /* Indirect descriptor, if any. */
62};
63
43b4f721 64struct vring_virtqueue {
0a8a69dd
RR
65 struct virtqueue vq;
66
67 /* Actual memory layout for this queue */
68 struct vring vring;
69
7b21e34f
RR
70 /* Can we use weak barriers? */
71 bool weak_barriers;
72
0a8a69dd
RR
73 /* Other side has made a mess, don't try any more. */
74 bool broken;
75
9fa29b9d
MM
76 /* Host supports indirect buffers */
77 bool indirect;
78
a5c262c5
MT
79 /* Host publishes avail event idx */
80 bool event;
81
0a8a69dd
RR
82 /* Head of free buffer list. */
83 unsigned int free_head;
84 /* Number we've added since last sync. */
85 unsigned int num_added;
86
87 /* Last used index we've seen. */
1bc4953e 88 u16 last_used_idx;
0a8a69dd 89
f277ec42
VS
90 /* Last written value to avail->flags */
91 u16 avail_flags_shadow;
92
93 /* Last written value to avail->idx in guest byte order */
94 u16 avail_idx_shadow;
95
0a8a69dd 96 /* How to notify other side. FIXME: commonalize hcalls! */
46f9c2b9 97 bool (*notify)(struct virtqueue *vq);
0a8a69dd 98
2a2d1382
AL
99 /* DMA, allocation, and size information */
100 bool we_own_ring;
101 size_t queue_size_in_bytes;
102 dma_addr_t queue_dma_addr;
103
0a8a69dd
RR
104#ifdef DEBUG
105 /* They're supposed to lock for us. */
106 unsigned int in_use;
e93300b1
RR
107
108 /* Figure out if their kicks are too delayed. */
109 bool last_add_time_valid;
110 ktime_t last_add_time;
0a8a69dd
RR
111#endif
112
780bc790
AL
113 /* Per-descriptor state. */
114 struct vring_desc_state desc_state[];
0a8a69dd
RR
115};
116
117#define to_vvq(_vq) container_of(_vq, struct vring_virtqueue, vq)
118
d26c96c8 119/*
1a937693
MT
120 * Modern virtio devices have feature bits to specify whether they need a
121 * quirk and bypass the IOMMU. If not there, just use the DMA API.
122 *
123 * If there, the interaction between virtio and DMA API is messy.
d26c96c8
AL
124 *
125 * On most systems with virtio, physical addresses match bus addresses,
126 * and it doesn't particularly matter whether we use the DMA API.
127 *
128 * On some systems, including Xen and any system with a physical device
129 * that speaks virtio behind a physical IOMMU, we must use the DMA API
130 * for virtio DMA to work at all.
131 *
132 * On other systems, including SPARC and PPC64, virtio-pci devices are
133 * enumerated as though they are behind an IOMMU, but the virtio host
134 * ignores the IOMMU, so we must either pretend that the IOMMU isn't
135 * there or somehow map everything as the identity.
136 *
137 * For the time being, we preserve historic behavior and bypass the DMA
138 * API.
1a937693
MT
139 *
140 * TODO: install a per-device DMA ops structure that does the right thing
141 * taking into account all the above quirks, and use the DMA API
142 * unconditionally on data path.
d26c96c8
AL
143 */
144
145static bool vring_use_dma_api(struct virtio_device *vdev)
146{
1a937693
MT
147 if (!virtio_has_iommu_quirk(vdev))
148 return true;
149
150 /* Otherwise, we are left to guess. */
78fe3987
AL
151 /*
152 * In theory, it's possible to have a buggy QEMU-supposed
153 * emulated Q35 IOMMU and Xen enabled at the same time. On
154 * such a configuration, virtio has never worked and will
155 * not work without an even larger kludge. Instead, enable
156 * the DMA API if we're a Xen guest, which at least allows
157 * all of the sensible Xen configurations to work correctly.
158 */
159 if (xen_domain())
160 return true;
161
d26c96c8
AL
162 return false;
163}
164
780bc790
AL
165/*
166 * The DMA ops on various arches are rather gnarly right now, and
167 * making all of the arch DMA ops work on the vring device itself
168 * is a mess. For now, we use the parent device for DMA ops.
169 */
75bfa81b 170static inline struct device *vring_dma_dev(const struct vring_virtqueue *vq)
780bc790
AL
171{
172 return vq->vq.vdev->dev.parent;
173}
174
175/* Map one sg entry. */
176static dma_addr_t vring_map_one_sg(const struct vring_virtqueue *vq,
177 struct scatterlist *sg,
178 enum dma_data_direction direction)
179{
180 if (!vring_use_dma_api(vq->vq.vdev))
181 return (dma_addr_t)sg_phys(sg);
182
183 /*
184 * We can't use dma_map_sg, because we don't use scatterlists in
185 * the way it expects (we don't guarantee that the scatterlist
186 * will exist for the lifetime of the mapping).
187 */
188 return dma_map_page(vring_dma_dev(vq),
189 sg_page(sg), sg->offset, sg->length,
190 direction);
191}
192
193static dma_addr_t vring_map_single(const struct vring_virtqueue *vq,
194 void *cpu_addr, size_t size,
195 enum dma_data_direction direction)
196{
197 if (!vring_use_dma_api(vq->vq.vdev))
198 return (dma_addr_t)virt_to_phys(cpu_addr);
199
200 return dma_map_single(vring_dma_dev(vq),
201 cpu_addr, size, direction);
202}
203
204static void vring_unmap_one(const struct vring_virtqueue *vq,
205 struct vring_desc *desc)
206{
207 u16 flags;
208
209 if (!vring_use_dma_api(vq->vq.vdev))
210 return;
211
212 flags = virtio16_to_cpu(vq->vq.vdev, desc->flags);
213
214 if (flags & VRING_DESC_F_INDIRECT) {
215 dma_unmap_single(vring_dma_dev(vq),
216 virtio64_to_cpu(vq->vq.vdev, desc->addr),
217 virtio32_to_cpu(vq->vq.vdev, desc->len),
218 (flags & VRING_DESC_F_WRITE) ?
219 DMA_FROM_DEVICE : DMA_TO_DEVICE);
220 } else {
221 dma_unmap_page(vring_dma_dev(vq),
222 virtio64_to_cpu(vq->vq.vdev, desc->addr),
223 virtio32_to_cpu(vq->vq.vdev, desc->len),
224 (flags & VRING_DESC_F_WRITE) ?
225 DMA_FROM_DEVICE : DMA_TO_DEVICE);
226 }
227}
228
229static int vring_mapping_error(const struct vring_virtqueue *vq,
230 dma_addr_t addr)
231{
232 if (!vring_use_dma_api(vq->vq.vdev))
233 return 0;
234
235 return dma_mapping_error(vring_dma_dev(vq), addr);
236}
237
00e6f3d9
MT
238static struct vring_desc *alloc_indirect(struct virtqueue *_vq,
239 unsigned int total_sg, gfp_t gfp)
9fa29b9d
MM
240{
241 struct vring_desc *desc;
b25bd251 242 unsigned int i;
9fa29b9d 243
b92b1b89
WD
244 /*
245 * We require lowmem mappings for the descriptors because
246 * otherwise virt_to_phys will give us bogus addresses in the
247 * virtqueue.
248 */
82107539 249 gfp &= ~__GFP_HIGHMEM;
b92b1b89 250
13816c76 251 desc = kmalloc(total_sg * sizeof(struct vring_desc), gfp);
9fa29b9d 252 if (!desc)
b25bd251 253 return NULL;
9fa29b9d 254
b25bd251 255 for (i = 0; i < total_sg; i++)
00e6f3d9 256 desc[i].next = cpu_to_virtio16(_vq->vdev, i + 1);
b25bd251 257 return desc;
9fa29b9d
MM
258}
259
13816c76
RR
260static inline int virtqueue_add(struct virtqueue *_vq,
261 struct scatterlist *sgs[],
eeebf9b1 262 unsigned int total_sg,
13816c76
RR
263 unsigned int out_sgs,
264 unsigned int in_sgs,
265 void *data,
5a08b04f 266 void *ctx,
13816c76 267 gfp_t gfp)
0a8a69dd
RR
268{
269 struct vring_virtqueue *vq = to_vvq(_vq);
13816c76 270 struct scatterlist *sg;
b25bd251 271 struct vring_desc *desc;
780bc790 272 unsigned int i, n, avail, descs_used, uninitialized_var(prev), err_idx;
1fe9b6fe 273 int head;
b25bd251 274 bool indirect;
0a8a69dd 275
9fa29b9d
MM
276 START_USE(vq);
277
0a8a69dd 278 BUG_ON(data == NULL);
5a08b04f 279 BUG_ON(ctx && vq->indirect);
9fa29b9d 280
70670444
RR
281 if (unlikely(vq->broken)) {
282 END_USE(vq);
283 return -EIO;
284 }
285
e93300b1
RR
286#ifdef DEBUG
287 {
288 ktime_t now = ktime_get();
289
290 /* No kick or get, with .1 second between? Warn. */
291 if (vq->last_add_time_valid)
292 WARN_ON(ktime_to_ms(ktime_sub(now, vq->last_add_time))
293 > 100);
294 vq->last_add_time = now;
295 vq->last_add_time_valid = true;
296 }
297#endif
298
b25bd251
RR
299 BUG_ON(total_sg > vq->vring.num);
300 BUG_ON(total_sg == 0);
301
302 head = vq->free_head;
303
9fa29b9d
MM
304 /* If the host supports indirect descriptor tables, and we have multiple
305 * buffers, then go indirect. FIXME: tune this threshold */
b25bd251 306 if (vq->indirect && total_sg > 1 && vq->vq.num_free)
00e6f3d9 307 desc = alloc_indirect(_vq, total_sg, gfp);
b25bd251
RR
308 else
309 desc = NULL;
310
311 if (desc) {
312 /* Use a single buffer which doesn't continue */
780bc790 313 indirect = true;
b25bd251
RR
314 /* Set up rest to use this indirect table. */
315 i = 0;
316 descs_used = 1;
b25bd251 317 } else {
780bc790 318 indirect = false;
b25bd251
RR
319 desc = vq->vring.desc;
320 i = head;
321 descs_used = total_sg;
9fa29b9d
MM
322 }
323
b25bd251 324 if (vq->vq.num_free < descs_used) {
0a8a69dd 325 pr_debug("Can't add buf len %i - avail = %i\n",
b25bd251 326 descs_used, vq->vq.num_free);
44653eae
RR
327 /* FIXME: for historical reasons, we force a notify here if
328 * there are outgoing parts to the buffer. Presumably the
329 * host should service the ring ASAP. */
13816c76 330 if (out_sgs)
44653eae 331 vq->notify(&vq->vq);
58625edf
WY
332 if (indirect)
333 kfree(desc);
0a8a69dd
RR
334 END_USE(vq);
335 return -ENOSPC;
336 }
337
13816c76 338 for (n = 0; n < out_sgs; n++) {
eeebf9b1 339 for (sg = sgs[n]; sg; sg = sg_next(sg)) {
780bc790
AL
340 dma_addr_t addr = vring_map_one_sg(vq, sg, DMA_TO_DEVICE);
341 if (vring_mapping_error(vq, addr))
342 goto unmap_release;
343
00e6f3d9 344 desc[i].flags = cpu_to_virtio16(_vq->vdev, VRING_DESC_F_NEXT);
780bc790 345 desc[i].addr = cpu_to_virtio64(_vq->vdev, addr);
00e6f3d9 346 desc[i].len = cpu_to_virtio32(_vq->vdev, sg->length);
13816c76 347 prev = i;
00e6f3d9 348 i = virtio16_to_cpu(_vq->vdev, desc[i].next);
13816c76 349 }
0a8a69dd 350 }
13816c76 351 for (; n < (out_sgs + in_sgs); n++) {
eeebf9b1 352 for (sg = sgs[n]; sg; sg = sg_next(sg)) {
780bc790
AL
353 dma_addr_t addr = vring_map_one_sg(vq, sg, DMA_FROM_DEVICE);
354 if (vring_mapping_error(vq, addr))
355 goto unmap_release;
356
00e6f3d9 357 desc[i].flags = cpu_to_virtio16(_vq->vdev, VRING_DESC_F_NEXT | VRING_DESC_F_WRITE);
780bc790 358 desc[i].addr = cpu_to_virtio64(_vq->vdev, addr);
00e6f3d9 359 desc[i].len = cpu_to_virtio32(_vq->vdev, sg->length);
13816c76 360 prev = i;
00e6f3d9 361 i = virtio16_to_cpu(_vq->vdev, desc[i].next);
13816c76 362 }
0a8a69dd
RR
363 }
364 /* Last one doesn't continue. */
00e6f3d9 365 desc[prev].flags &= cpu_to_virtio16(_vq->vdev, ~VRING_DESC_F_NEXT);
0a8a69dd 366
780bc790
AL
367 if (indirect) {
368 /* Now that the indirect table is filled in, map it. */
369 dma_addr_t addr = vring_map_single(
370 vq, desc, total_sg * sizeof(struct vring_desc),
371 DMA_TO_DEVICE);
372 if (vring_mapping_error(vq, addr))
373 goto unmap_release;
374
375 vq->vring.desc[head].flags = cpu_to_virtio16(_vq->vdev, VRING_DESC_F_INDIRECT);
376 vq->vring.desc[head].addr = cpu_to_virtio64(_vq->vdev, addr);
377
378 vq->vring.desc[head].len = cpu_to_virtio32(_vq->vdev, total_sg * sizeof(struct vring_desc));
379 }
380
381 /* We're using some buffers from the free list. */
382 vq->vq.num_free -= descs_used;
383
0a8a69dd 384 /* Update free pointer */
b25bd251 385 if (indirect)
00e6f3d9 386 vq->free_head = virtio16_to_cpu(_vq->vdev, vq->vring.desc[head].next);
b25bd251
RR
387 else
388 vq->free_head = i;
0a8a69dd 389
780bc790
AL
390 /* Store token and indirect buffer state. */
391 vq->desc_state[head].data = data;
392 if (indirect)
393 vq->desc_state[head].indir_desc = desc;
5a08b04f
MT
394 if (ctx)
395 vq->desc_state[head].indir_desc = ctx;
0a8a69dd
RR
396
397 /* Put entry in available array (but don't update avail->idx until they
3b720b8c 398 * do sync). */
f277ec42 399 avail = vq->avail_idx_shadow & (vq->vring.num - 1);
00e6f3d9 400 vq->vring.avail->ring[avail] = cpu_to_virtio16(_vq->vdev, head);
0a8a69dd 401
ee7cd898
RR
402 /* Descriptors and available array need to be set before we expose the
403 * new available array entries. */
a9a0fef7 404 virtio_wmb(vq->weak_barriers);
f277ec42
VS
405 vq->avail_idx_shadow++;
406 vq->vring.avail->idx = cpu_to_virtio16(_vq->vdev, vq->avail_idx_shadow);
ee7cd898
RR
407 vq->num_added++;
408
5e05bf58
TH
409 pr_debug("Added buffer head %i to %p\n", head, vq);
410 END_USE(vq);
411
ee7cd898
RR
412 /* This is very unlikely, but theoretically possible. Kick
413 * just in case. */
414 if (unlikely(vq->num_added == (1 << 16) - 1))
415 virtqueue_kick(_vq);
416
98e8c6bc 417 return 0;
780bc790
AL
418
419unmap_release:
420 err_idx = i;
421 i = head;
422
423 for (n = 0; n < total_sg; n++) {
424 if (i == err_idx)
425 break;
426 vring_unmap_one(vq, &desc[i]);
c60923cb 427 i = virtio16_to_cpu(_vq->vdev, vq->vring.desc[i].next);
780bc790
AL
428 }
429
430 vq->vq.num_free += total_sg;
431
432 if (indirect)
433 kfree(desc);
434
3cc36f6e 435 END_USE(vq);
780bc790 436 return -EIO;
0a8a69dd 437}
13816c76 438
13816c76
RR
439/**
440 * virtqueue_add_sgs - expose buffers to other end
441 * @vq: the struct virtqueue we're talking about.
442 * @sgs: array of terminated scatterlists.
443 * @out_num: the number of scatterlists readable by other side
444 * @in_num: the number of scatterlists which are writable (after readable ones)
445 * @data: the token identifying the buffer.
446 * @gfp: how to do memory allocations (if necessary).
447 *
448 * Caller must ensure we don't call this with other virtqueue operations
449 * at the same time (except where noted).
450 *
70670444 451 * Returns zero or a negative error (ie. ENOSPC, ENOMEM, EIO).
13816c76
RR
452 */
453int virtqueue_add_sgs(struct virtqueue *_vq,
454 struct scatterlist *sgs[],
455 unsigned int out_sgs,
456 unsigned int in_sgs,
457 void *data,
458 gfp_t gfp)
459{
eeebf9b1 460 unsigned int i, total_sg = 0;
13816c76
RR
461
462 /* Count them first. */
eeebf9b1 463 for (i = 0; i < out_sgs + in_sgs; i++) {
13816c76
RR
464 struct scatterlist *sg;
465 for (sg = sgs[i]; sg; sg = sg_next(sg))
eeebf9b1 466 total_sg++;
13816c76 467 }
5a08b04f
MT
468 return virtqueue_add(_vq, sgs, total_sg, out_sgs, in_sgs,
469 data, NULL, gfp);
13816c76
RR
470}
471EXPORT_SYMBOL_GPL(virtqueue_add_sgs);
472
282edb36
RR
473/**
474 * virtqueue_add_outbuf - expose output buffers to other end
475 * @vq: the struct virtqueue we're talking about.
eeebf9b1
RR
476 * @sg: scatterlist (must be well-formed and terminated!)
477 * @num: the number of entries in @sg readable by other side
282edb36
RR
478 * @data: the token identifying the buffer.
479 * @gfp: how to do memory allocations (if necessary).
480 *
481 * Caller must ensure we don't call this with other virtqueue operations
482 * at the same time (except where noted).
483 *
70670444 484 * Returns zero or a negative error (ie. ENOSPC, ENOMEM, EIO).
282edb36
RR
485 */
486int virtqueue_add_outbuf(struct virtqueue *vq,
eeebf9b1 487 struct scatterlist *sg, unsigned int num,
282edb36
RR
488 void *data,
489 gfp_t gfp)
490{
5a08b04f 491 return virtqueue_add(vq, &sg, num, 1, 0, data, NULL, gfp);
282edb36
RR
492}
493EXPORT_SYMBOL_GPL(virtqueue_add_outbuf);
494
495/**
496 * virtqueue_add_inbuf - expose input buffers to other end
497 * @vq: the struct virtqueue we're talking about.
eeebf9b1
RR
498 * @sg: scatterlist (must be well-formed and terminated!)
499 * @num: the number of entries in @sg writable by other side
282edb36
RR
500 * @data: the token identifying the buffer.
501 * @gfp: how to do memory allocations (if necessary).
502 *
503 * Caller must ensure we don't call this with other virtqueue operations
504 * at the same time (except where noted).
505 *
70670444 506 * Returns zero or a negative error (ie. ENOSPC, ENOMEM, EIO).
282edb36
RR
507 */
508int virtqueue_add_inbuf(struct virtqueue *vq,
eeebf9b1 509 struct scatterlist *sg, unsigned int num,
282edb36
RR
510 void *data,
511 gfp_t gfp)
512{
5a08b04f 513 return virtqueue_add(vq, &sg, num, 0, 1, data, NULL, gfp);
282edb36
RR
514}
515EXPORT_SYMBOL_GPL(virtqueue_add_inbuf);
516
5a08b04f
MT
517/**
518 * virtqueue_add_inbuf_ctx - expose input buffers to other end
519 * @vq: the struct virtqueue we're talking about.
520 * @sg: scatterlist (must be well-formed and terminated!)
521 * @num: the number of entries in @sg writable by other side
522 * @data: the token identifying the buffer.
523 * @ctx: extra context for the token
524 * @gfp: how to do memory allocations (if necessary).
525 *
526 * Caller must ensure we don't call this with other virtqueue operations
527 * at the same time (except where noted).
528 *
529 * Returns zero or a negative error (ie. ENOSPC, ENOMEM, EIO).
530 */
531int virtqueue_add_inbuf_ctx(struct virtqueue *vq,
532 struct scatterlist *sg, unsigned int num,
533 void *data,
534 void *ctx,
535 gfp_t gfp)
536{
537 return virtqueue_add(vq, &sg, num, 0, 1, data, ctx, gfp);
538}
539EXPORT_SYMBOL_GPL(virtqueue_add_inbuf_ctx);
540
5dfc1762 541/**
41f0377f 542 * virtqueue_kick_prepare - first half of split virtqueue_kick call.
5dfc1762
RR
543 * @vq: the struct virtqueue
544 *
41f0377f
RR
545 * Instead of virtqueue_kick(), you can do:
546 * if (virtqueue_kick_prepare(vq))
547 * virtqueue_notify(vq);
5dfc1762 548 *
41f0377f
RR
549 * This is sometimes useful because the virtqueue_kick_prepare() needs
550 * to be serialized, but the actual virtqueue_notify() call does not.
5dfc1762 551 */
41f0377f 552bool virtqueue_kick_prepare(struct virtqueue *_vq)
0a8a69dd
RR
553{
554 struct vring_virtqueue *vq = to_vvq(_vq);
a5c262c5 555 u16 new, old;
41f0377f
RR
556 bool needs_kick;
557
0a8a69dd 558 START_USE(vq);
a72caae2
JW
559 /* We need to expose available array entries before checking avail
560 * event. */
a9a0fef7 561 virtio_mb(vq->weak_barriers);
0a8a69dd 562
f277ec42
VS
563 old = vq->avail_idx_shadow - vq->num_added;
564 new = vq->avail_idx_shadow;
0a8a69dd
RR
565 vq->num_added = 0;
566
e93300b1
RR
567#ifdef DEBUG
568 if (vq->last_add_time_valid) {
569 WARN_ON(ktime_to_ms(ktime_sub(ktime_get(),
570 vq->last_add_time)) > 100);
571 }
572 vq->last_add_time_valid = false;
573#endif
574
41f0377f 575 if (vq->event) {
00e6f3d9 576 needs_kick = vring_need_event(virtio16_to_cpu(_vq->vdev, vring_avail_event(&vq->vring)),
41f0377f
RR
577 new, old);
578 } else {
00e6f3d9 579 needs_kick = !(vq->vring.used->flags & cpu_to_virtio16(_vq->vdev, VRING_USED_F_NO_NOTIFY));
41f0377f 580 }
0a8a69dd 581 END_USE(vq);
41f0377f
RR
582 return needs_kick;
583}
584EXPORT_SYMBOL_GPL(virtqueue_kick_prepare);
585
586/**
587 * virtqueue_notify - second half of split virtqueue_kick call.
588 * @vq: the struct virtqueue
589 *
590 * This does not need to be serialized.
5b1bf7cb
HG
591 *
592 * Returns false if host notify failed or queue is broken, otherwise true.
41f0377f 593 */
5b1bf7cb 594bool virtqueue_notify(struct virtqueue *_vq)
41f0377f
RR
595{
596 struct vring_virtqueue *vq = to_vvq(_vq);
597
5b1bf7cb
HG
598 if (unlikely(vq->broken))
599 return false;
600
41f0377f 601 /* Prod other side to tell it about changes. */
2342d6a6 602 if (!vq->notify(_vq)) {
5b1bf7cb
HG
603 vq->broken = true;
604 return false;
605 }
606 return true;
41f0377f
RR
607}
608EXPORT_SYMBOL_GPL(virtqueue_notify);
609
610/**
611 * virtqueue_kick - update after add_buf
612 * @vq: the struct virtqueue
613 *
b3087e48 614 * After one or more virtqueue_add_* calls, invoke this to kick
41f0377f
RR
615 * the other side.
616 *
617 * Caller must ensure we don't call this with other virtqueue
618 * operations at the same time (except where noted).
5b1bf7cb
HG
619 *
620 * Returns false if kick failed, otherwise true.
41f0377f 621 */
5b1bf7cb 622bool virtqueue_kick(struct virtqueue *vq)
41f0377f
RR
623{
624 if (virtqueue_kick_prepare(vq))
5b1bf7cb
HG
625 return virtqueue_notify(vq);
626 return true;
0a8a69dd 627}
7c5e9ed0 628EXPORT_SYMBOL_GPL(virtqueue_kick);
0a8a69dd 629
5a08b04f
MT
630static void detach_buf(struct vring_virtqueue *vq, unsigned int head,
631 void **ctx)
0a8a69dd 632{
780bc790 633 unsigned int i, j;
c60923cb 634 __virtio16 nextflag = cpu_to_virtio16(vq->vq.vdev, VRING_DESC_F_NEXT);
0a8a69dd
RR
635
636 /* Clear data ptr. */
780bc790 637 vq->desc_state[head].data = NULL;
0a8a69dd 638
780bc790 639 /* Put back on free list: unmap first-level descriptors and find end */
0a8a69dd 640 i = head;
9fa29b9d 641
780bc790
AL
642 while (vq->vring.desc[i].flags & nextflag) {
643 vring_unmap_one(vq, &vq->vring.desc[i]);
00e6f3d9 644 i = virtio16_to_cpu(vq->vq.vdev, vq->vring.desc[i].next);
06ca287d 645 vq->vq.num_free++;
0a8a69dd
RR
646 }
647
780bc790 648 vring_unmap_one(vq, &vq->vring.desc[i]);
00e6f3d9 649 vq->vring.desc[i].next = cpu_to_virtio16(vq->vq.vdev, vq->free_head);
0a8a69dd 650 vq->free_head = head;
780bc790 651
0a8a69dd 652 /* Plus final descriptor */
06ca287d 653 vq->vq.num_free++;
780bc790 654
5a08b04f 655 if (vq->indirect) {
780bc790 656 struct vring_desc *indir_desc = vq->desc_state[head].indir_desc;
5a08b04f
MT
657 u32 len;
658
659 /* Free the indirect table, if any, now that it's unmapped. */
660 if (!indir_desc)
661 return;
662
663 len = virtio32_to_cpu(vq->vq.vdev, vq->vring.desc[head].len);
780bc790
AL
664
665 BUG_ON(!(vq->vring.desc[head].flags &
666 cpu_to_virtio16(vq->vq.vdev, VRING_DESC_F_INDIRECT)));
667 BUG_ON(len == 0 || len % sizeof(struct vring_desc));
668
669 for (j = 0; j < len / sizeof(struct vring_desc); j++)
670 vring_unmap_one(vq, &indir_desc[j]);
671
5a08b04f 672 kfree(indir_desc);
780bc790 673 vq->desc_state[head].indir_desc = NULL;
5a08b04f
MT
674 } else if (ctx) {
675 *ctx = vq->desc_state[head].indir_desc;
780bc790 676 }
0a8a69dd
RR
677}
678
0a8a69dd
RR
679static inline bool more_used(const struct vring_virtqueue *vq)
680{
00e6f3d9 681 return vq->last_used_idx != virtio16_to_cpu(vq->vq.vdev, vq->vring.used->idx);
0a8a69dd
RR
682}
683
5dfc1762
RR
684/**
685 * virtqueue_get_buf - get the next used buffer
686 * @vq: the struct virtqueue we're talking about.
687 * @len: the length written into the buffer
688 *
0c7eaf59 689 * If the device wrote data into the buffer, @len will be set to the
5dfc1762
RR
690 * amount written. This means you don't need to clear the buffer
691 * beforehand to ensure there's no data leakage in the case of short
692 * writes.
693 *
694 * Caller must ensure we don't call this with other virtqueue
695 * operations at the same time (except where noted).
696 *
697 * Returns NULL if there are no used buffers, or the "data" token
b3087e48 698 * handed to virtqueue_add_*().
5dfc1762 699 */
5a08b04f
MT
700void *virtqueue_get_buf_ctx(struct virtqueue *_vq, unsigned int *len,
701 void **ctx)
0a8a69dd
RR
702{
703 struct vring_virtqueue *vq = to_vvq(_vq);
704 void *ret;
705 unsigned int i;
3b720b8c 706 u16 last_used;
0a8a69dd
RR
707
708 START_USE(vq);
709
5ef82752
RR
710 if (unlikely(vq->broken)) {
711 END_USE(vq);
712 return NULL;
713 }
714
0a8a69dd
RR
715 if (!more_used(vq)) {
716 pr_debug("No more buffers in queue\n");
717 END_USE(vq);
718 return NULL;
719 }
720
2d61ba95 721 /* Only get used array entries after they have been exposed by host. */
a9a0fef7 722 virtio_rmb(vq->weak_barriers);
2d61ba95 723
3b720b8c 724 last_used = (vq->last_used_idx & (vq->vring.num - 1));
00e6f3d9
MT
725 i = virtio32_to_cpu(_vq->vdev, vq->vring.used->ring[last_used].id);
726 *len = virtio32_to_cpu(_vq->vdev, vq->vring.used->ring[last_used].len);
0a8a69dd
RR
727
728 if (unlikely(i >= vq->vring.num)) {
729 BAD_RING(vq, "id %u out of range\n", i);
730 return NULL;
731 }
780bc790 732 if (unlikely(!vq->desc_state[i].data)) {
0a8a69dd
RR
733 BAD_RING(vq, "id %u is not a head!\n", i);
734 return NULL;
735 }
736
737 /* detach_buf clears data, so grab it now. */
780bc790 738 ret = vq->desc_state[i].data;
5a08b04f 739 detach_buf(vq, i, ctx);
0a8a69dd 740 vq->last_used_idx++;
a5c262c5
MT
741 /* If we expect an interrupt for the next entry, tell host
742 * by writing event index and flush out the write before
743 * the read in the next get_buf call. */
788e5b3a
MT
744 if (!(vq->avail_flags_shadow & VRING_AVAIL_F_NO_INTERRUPT))
745 virtio_store_mb(vq->weak_barriers,
746 &vring_used_event(&vq->vring),
747 cpu_to_virtio16(_vq->vdev, vq->last_used_idx));
a5c262c5 748
e93300b1
RR
749#ifdef DEBUG
750 vq->last_add_time_valid = false;
751#endif
752
0a8a69dd
RR
753 END_USE(vq);
754 return ret;
755}
5a08b04f 756EXPORT_SYMBOL_GPL(virtqueue_get_buf_ctx);
0a8a69dd 757
5a08b04f
MT
758void *virtqueue_get_buf(struct virtqueue *_vq, unsigned int *len)
759{
760 return virtqueue_get_buf_ctx(_vq, len, NULL);
761}
762EXPORT_SYMBOL_GPL(virtqueue_get_buf);
5dfc1762
RR
763/**
764 * virtqueue_disable_cb - disable callbacks
765 * @vq: the struct virtqueue we're talking about.
766 *
767 * Note that this is not necessarily synchronous, hence unreliable and only
768 * useful as an optimization.
769 *
770 * Unlike other operations, this need not be serialized.
771 */
7c5e9ed0 772void virtqueue_disable_cb(struct virtqueue *_vq)
18445c4d
RR
773{
774 struct vring_virtqueue *vq = to_vvq(_vq);
775
f277ec42
VS
776 if (!(vq->avail_flags_shadow & VRING_AVAIL_F_NO_INTERRUPT)) {
777 vq->avail_flags_shadow |= VRING_AVAIL_F_NO_INTERRUPT;
0ea1e4a6
LP
778 if (!vq->event)
779 vq->vring.avail->flags = cpu_to_virtio16(_vq->vdev, vq->avail_flags_shadow);
f277ec42
VS
780 }
781
18445c4d 782}
7c5e9ed0 783EXPORT_SYMBOL_GPL(virtqueue_disable_cb);
18445c4d 784
5dfc1762 785/**
cc229884 786 * virtqueue_enable_cb_prepare - restart callbacks after disable_cb
5dfc1762
RR
787 * @vq: the struct virtqueue we're talking about.
788 *
cc229884
MT
789 * This re-enables callbacks; it returns current queue state
790 * in an opaque unsigned value. This value should be later tested by
791 * virtqueue_poll, to detect a possible race between the driver checking for
792 * more work, and enabling callbacks.
5dfc1762
RR
793 *
794 * Caller must ensure we don't call this with other virtqueue
795 * operations at the same time (except where noted).
796 */
cc229884 797unsigned virtqueue_enable_cb_prepare(struct virtqueue *_vq)
0a8a69dd
RR
798{
799 struct vring_virtqueue *vq = to_vvq(_vq);
cc229884 800 u16 last_used_idx;
0a8a69dd
RR
801
802 START_USE(vq);
0a8a69dd
RR
803
804 /* We optimistically turn back on interrupts, then check if there was
805 * more to do. */
a5c262c5
MT
806 /* Depending on the VIRTIO_RING_F_EVENT_IDX feature, we need to
807 * either clear the flags bit or point the event index at the next
808 * entry. Always do both to keep code simple. */
f277ec42
VS
809 if (vq->avail_flags_shadow & VRING_AVAIL_F_NO_INTERRUPT) {
810 vq->avail_flags_shadow &= ~VRING_AVAIL_F_NO_INTERRUPT;
0ea1e4a6
LP
811 if (!vq->event)
812 vq->vring.avail->flags = cpu_to_virtio16(_vq->vdev, vq->avail_flags_shadow);
f277ec42 813 }
00e6f3d9 814 vring_used_event(&vq->vring) = cpu_to_virtio16(_vq->vdev, last_used_idx = vq->last_used_idx);
cc229884
MT
815 END_USE(vq);
816 return last_used_idx;
817}
818EXPORT_SYMBOL_GPL(virtqueue_enable_cb_prepare);
819
820/**
821 * virtqueue_poll - query pending used buffers
822 * @vq: the struct virtqueue we're talking about.
823 * @last_used_idx: virtqueue state (from call to virtqueue_enable_cb_prepare).
824 *
825 * Returns "true" if there are pending used buffers in the queue.
826 *
827 * This does not need to be serialized.
828 */
829bool virtqueue_poll(struct virtqueue *_vq, unsigned last_used_idx)
830{
831 struct vring_virtqueue *vq = to_vvq(_vq);
832
a9a0fef7 833 virtio_mb(vq->weak_barriers);
00e6f3d9 834 return (u16)last_used_idx != virtio16_to_cpu(_vq->vdev, vq->vring.used->idx);
cc229884
MT
835}
836EXPORT_SYMBOL_GPL(virtqueue_poll);
0a8a69dd 837
cc229884
MT
838/**
839 * virtqueue_enable_cb - restart callbacks after disable_cb.
840 * @vq: the struct virtqueue we're talking about.
841 *
842 * This re-enables callbacks; it returns "false" if there are pending
843 * buffers in the queue, to detect a possible race between the driver
844 * checking for more work, and enabling callbacks.
845 *
846 * Caller must ensure we don't call this with other virtqueue
847 * operations at the same time (except where noted).
848 */
849bool virtqueue_enable_cb(struct virtqueue *_vq)
850{
851 unsigned last_used_idx = virtqueue_enable_cb_prepare(_vq);
852 return !virtqueue_poll(_vq, last_used_idx);
0a8a69dd 853}
7c5e9ed0 854EXPORT_SYMBOL_GPL(virtqueue_enable_cb);
0a8a69dd 855
5dfc1762
RR
856/**
857 * virtqueue_enable_cb_delayed - restart callbacks after disable_cb.
858 * @vq: the struct virtqueue we're talking about.
859 *
860 * This re-enables callbacks but hints to the other side to delay
861 * interrupts until most of the available buffers have been processed;
862 * it returns "false" if there are many pending buffers in the queue,
863 * to detect a possible race between the driver checking for more work,
864 * and enabling callbacks.
865 *
866 * Caller must ensure we don't call this with other virtqueue
867 * operations at the same time (except where noted).
868 */
7ab358c2
MT
869bool virtqueue_enable_cb_delayed(struct virtqueue *_vq)
870{
871 struct vring_virtqueue *vq = to_vvq(_vq);
872 u16 bufs;
873
874 START_USE(vq);
875
876 /* We optimistically turn back on interrupts, then check if there was
877 * more to do. */
878 /* Depending on the VIRTIO_RING_F_USED_EVENT_IDX feature, we need to
879 * either clear the flags bit or point the event index at the next
0ea1e4a6 880 * entry. Always update the event index to keep code simple. */
f277ec42
VS
881 if (vq->avail_flags_shadow & VRING_AVAIL_F_NO_INTERRUPT) {
882 vq->avail_flags_shadow &= ~VRING_AVAIL_F_NO_INTERRUPT;
0ea1e4a6
LP
883 if (!vq->event)
884 vq->vring.avail->flags = cpu_to_virtio16(_vq->vdev, vq->avail_flags_shadow);
f277ec42 885 }
7ab358c2 886 /* TODO: tune this threshold */
f277ec42 887 bufs = (u16)(vq->avail_idx_shadow - vq->last_used_idx) * 3 / 4;
788e5b3a
MT
888
889 virtio_store_mb(vq->weak_barriers,
890 &vring_used_event(&vq->vring),
891 cpu_to_virtio16(_vq->vdev, vq->last_used_idx + bufs));
892
00e6f3d9 893 if (unlikely((u16)(virtio16_to_cpu(_vq->vdev, vq->vring.used->idx) - vq->last_used_idx) > bufs)) {
7ab358c2
MT
894 END_USE(vq);
895 return false;
896 }
897
898 END_USE(vq);
899 return true;
900}
901EXPORT_SYMBOL_GPL(virtqueue_enable_cb_delayed);
902
5dfc1762
RR
903/**
904 * virtqueue_detach_unused_buf - detach first unused buffer
905 * @vq: the struct virtqueue we're talking about.
906 *
b3087e48 907 * Returns NULL or the "data" token handed to virtqueue_add_*().
5dfc1762
RR
908 * This is not valid on an active queue; it is useful only for device
909 * shutdown.
910 */
7c5e9ed0 911void *virtqueue_detach_unused_buf(struct virtqueue *_vq)
c021eac4
SM
912{
913 struct vring_virtqueue *vq = to_vvq(_vq);
914 unsigned int i;
915 void *buf;
916
917 START_USE(vq);
918
919 for (i = 0; i < vq->vring.num; i++) {
780bc790 920 if (!vq->desc_state[i].data)
c021eac4
SM
921 continue;
922 /* detach_buf clears data, so grab it now. */
780bc790 923 buf = vq->desc_state[i].data;
5a08b04f 924 detach_buf(vq, i, NULL);
f277ec42
VS
925 vq->avail_idx_shadow--;
926 vq->vring.avail->idx = cpu_to_virtio16(_vq->vdev, vq->avail_idx_shadow);
c021eac4
SM
927 END_USE(vq);
928 return buf;
929 }
930 /* That should have freed everything. */
06ca287d 931 BUG_ON(vq->vq.num_free != vq->vring.num);
c021eac4
SM
932
933 END_USE(vq);
934 return NULL;
935}
7c5e9ed0 936EXPORT_SYMBOL_GPL(virtqueue_detach_unused_buf);
c021eac4 937
0a8a69dd
RR
938irqreturn_t vring_interrupt(int irq, void *_vq)
939{
940 struct vring_virtqueue *vq = to_vvq(_vq);
941
942 if (!more_used(vq)) {
943 pr_debug("virtqueue interrupt with no work for %p\n", vq);
944 return IRQ_NONE;
945 }
946
947 if (unlikely(vq->broken))
948 return IRQ_HANDLED;
949
950 pr_debug("virtqueue callback for %p (%p)\n", vq, vq->vq.callback);
18445c4d
RR
951 if (vq->vq.callback)
952 vq->vq.callback(&vq->vq);
0a8a69dd
RR
953
954 return IRQ_HANDLED;
955}
c6fd4701 956EXPORT_SYMBOL_GPL(vring_interrupt);
0a8a69dd 957
2a2d1382
AL
958struct virtqueue *__vring_new_virtqueue(unsigned int index,
959 struct vring vring,
960 struct virtio_device *vdev,
961 bool weak_barriers,
f94682dd 962 bool context,
2a2d1382
AL
963 bool (*notify)(struct virtqueue *),
964 void (*callback)(struct virtqueue *),
965 const char *name)
0a8a69dd 966{
0a8a69dd 967 unsigned int i;
2a2d1382 968 struct vring_virtqueue *vq;
0a8a69dd 969
2a2d1382 970 vq = kmalloc(sizeof(*vq) + vring.num * sizeof(struct vring_desc_state),
780bc790 971 GFP_KERNEL);
0a8a69dd
RR
972 if (!vq)
973 return NULL;
974
2a2d1382 975 vq->vring = vring;
0a8a69dd
RR
976 vq->vq.callback = callback;
977 vq->vq.vdev = vdev;
9499f5e7 978 vq->vq.name = name;
2a2d1382 979 vq->vq.num_free = vring.num;
06ca287d 980 vq->vq.index = index;
2a2d1382
AL
981 vq->we_own_ring = false;
982 vq->queue_dma_addr = 0;
983 vq->queue_size_in_bytes = 0;
0a8a69dd 984 vq->notify = notify;
7b21e34f 985 vq->weak_barriers = weak_barriers;
0a8a69dd
RR
986 vq->broken = false;
987 vq->last_used_idx = 0;
f277ec42
VS
988 vq->avail_flags_shadow = 0;
989 vq->avail_idx_shadow = 0;
0a8a69dd 990 vq->num_added = 0;
9499f5e7 991 list_add_tail(&vq->vq.list, &vdev->vqs);
0a8a69dd
RR
992#ifdef DEBUG
993 vq->in_use = false;
e93300b1 994 vq->last_add_time_valid = false;
0a8a69dd
RR
995#endif
996
5a08b04f
MT
997 vq->indirect = virtio_has_feature(vdev, VIRTIO_RING_F_INDIRECT_DESC) &&
998 !context;
a5c262c5 999 vq->event = virtio_has_feature(vdev, VIRTIO_RING_F_EVENT_IDX);
9fa29b9d 1000
0a8a69dd 1001 /* No callback? Tell other side not to bother us. */
f277ec42
VS
1002 if (!callback) {
1003 vq->avail_flags_shadow |= VRING_AVAIL_F_NO_INTERRUPT;
0ea1e4a6
LP
1004 if (!vq->event)
1005 vq->vring.avail->flags = cpu_to_virtio16(vdev, vq->avail_flags_shadow);
f277ec42 1006 }
0a8a69dd
RR
1007
1008 /* Put everything in free lists. */
0a8a69dd 1009 vq->free_head = 0;
2a2d1382 1010 for (i = 0; i < vring.num-1; i++)
00e6f3d9 1011 vq->vring.desc[i].next = cpu_to_virtio16(vdev, i + 1);
2a2d1382 1012 memset(vq->desc_state, 0, vring.num * sizeof(struct vring_desc_state));
0a8a69dd
RR
1013
1014 return &vq->vq;
1015}
2a2d1382
AL
1016EXPORT_SYMBOL_GPL(__vring_new_virtqueue);
1017
1018static void *vring_alloc_queue(struct virtio_device *vdev, size_t size,
1019 dma_addr_t *dma_handle, gfp_t flag)
1020{
1021 if (vring_use_dma_api(vdev)) {
1022 return dma_alloc_coherent(vdev->dev.parent, size,
1023 dma_handle, flag);
1024 } else {
1025 void *queue = alloc_pages_exact(PAGE_ALIGN(size), flag);
1026 if (queue) {
1027 phys_addr_t phys_addr = virt_to_phys(queue);
1028 *dma_handle = (dma_addr_t)phys_addr;
1029
1030 /*
1031 * Sanity check: make sure we dind't truncate
1032 * the address. The only arches I can find that
1033 * have 64-bit phys_addr_t but 32-bit dma_addr_t
1034 * are certain non-highmem MIPS and x86
1035 * configurations, but these configurations
1036 * should never allocate physical pages above 32
1037 * bits, so this is fine. Just in case, throw a
1038 * warning and abort if we end up with an
1039 * unrepresentable address.
1040 */
1041 if (WARN_ON_ONCE(*dma_handle != phys_addr)) {
1042 free_pages_exact(queue, PAGE_ALIGN(size));
1043 return NULL;
1044 }
1045 }
1046 return queue;
1047 }
1048}
1049
1050static void vring_free_queue(struct virtio_device *vdev, size_t size,
1051 void *queue, dma_addr_t dma_handle)
1052{
1053 if (vring_use_dma_api(vdev)) {
1054 dma_free_coherent(vdev->dev.parent, size, queue, dma_handle);
1055 } else {
1056 free_pages_exact(queue, PAGE_ALIGN(size));
1057 }
1058}
1059
1060struct virtqueue *vring_create_virtqueue(
1061 unsigned int index,
1062 unsigned int num,
1063 unsigned int vring_align,
1064 struct virtio_device *vdev,
1065 bool weak_barriers,
1066 bool may_reduce_num,
f94682dd 1067 bool context,
2a2d1382
AL
1068 bool (*notify)(struct virtqueue *),
1069 void (*callback)(struct virtqueue *),
1070 const char *name)
1071{
1072 struct virtqueue *vq;
e00f7bd2 1073 void *queue = NULL;
2a2d1382
AL
1074 dma_addr_t dma_addr;
1075 size_t queue_size_in_bytes;
1076 struct vring vring;
1077
1078 /* We assume num is a power of 2. */
1079 if (num & (num - 1)) {
1080 dev_warn(&vdev->dev, "Bad virtqueue length %u\n", num);
1081 return NULL;
1082 }
1083
1084 /* TODO: allocate each queue chunk individually */
1085 for (; num && vring_size(num, vring_align) > PAGE_SIZE; num /= 2) {
1086 queue = vring_alloc_queue(vdev, vring_size(num, vring_align),
1087 &dma_addr,
1088 GFP_KERNEL|__GFP_NOWARN|__GFP_ZERO);
1089 if (queue)
1090 break;
1091 }
1092
1093 if (!num)
1094 return NULL;
1095
1096 if (!queue) {
1097 /* Try to get a single page. You are my only hope! */
1098 queue = vring_alloc_queue(vdev, vring_size(num, vring_align),
1099 &dma_addr, GFP_KERNEL|__GFP_ZERO);
1100 }
1101 if (!queue)
1102 return NULL;
1103
1104 queue_size_in_bytes = vring_size(num, vring_align);
1105 vring_init(&vring, num, queue, vring_align);
1106
f94682dd 1107 vq = __vring_new_virtqueue(index, vring, vdev, weak_barriers, context,
2a2d1382
AL
1108 notify, callback, name);
1109 if (!vq) {
1110 vring_free_queue(vdev, queue_size_in_bytes, queue,
1111 dma_addr);
1112 return NULL;
1113 }
1114
1115 to_vvq(vq)->queue_dma_addr = dma_addr;
1116 to_vvq(vq)->queue_size_in_bytes = queue_size_in_bytes;
1117 to_vvq(vq)->we_own_ring = true;
1118
1119 return vq;
1120}
1121EXPORT_SYMBOL_GPL(vring_create_virtqueue);
1122
1123struct virtqueue *vring_new_virtqueue(unsigned int index,
1124 unsigned int num,
1125 unsigned int vring_align,
1126 struct virtio_device *vdev,
1127 bool weak_barriers,
f94682dd 1128 bool context,
2a2d1382
AL
1129 void *pages,
1130 bool (*notify)(struct virtqueue *vq),
1131 void (*callback)(struct virtqueue *vq),
1132 const char *name)
1133{
1134 struct vring vring;
1135 vring_init(&vring, num, pages, vring_align);
f94682dd 1136 return __vring_new_virtqueue(index, vring, vdev, weak_barriers, context,
2a2d1382
AL
1137 notify, callback, name);
1138}
c6fd4701 1139EXPORT_SYMBOL_GPL(vring_new_virtqueue);
0a8a69dd 1140
2a2d1382 1141void vring_del_virtqueue(struct virtqueue *_vq)
0a8a69dd 1142{
2a2d1382
AL
1143 struct vring_virtqueue *vq = to_vvq(_vq);
1144
1145 if (vq->we_own_ring) {
1146 vring_free_queue(vq->vq.vdev, vq->queue_size_in_bytes,
1147 vq->vring.desc, vq->queue_dma_addr);
1148 }
1149 list_del(&_vq->list);
1150 kfree(vq);
0a8a69dd 1151}
c6fd4701 1152EXPORT_SYMBOL_GPL(vring_del_virtqueue);
0a8a69dd 1153
e34f8725
RR
1154/* Manipulates transport-specific feature bits. */
1155void vring_transport_features(struct virtio_device *vdev)
1156{
1157 unsigned int i;
1158
1159 for (i = VIRTIO_TRANSPORT_F_START; i < VIRTIO_TRANSPORT_F_END; i++) {
1160 switch (i) {
9fa29b9d
MM
1161 case VIRTIO_RING_F_INDIRECT_DESC:
1162 break;
a5c262c5
MT
1163 case VIRTIO_RING_F_EVENT_IDX:
1164 break;
747ae34a
MT
1165 case VIRTIO_F_VERSION_1:
1166 break;
1a937693
MT
1167 case VIRTIO_F_IOMMU_PLATFORM:
1168 break;
e34f8725
RR
1169 default:
1170 /* We don't understand this bit. */
e16e12be 1171 __virtio_clear_bit(vdev, i);
e34f8725
RR
1172 }
1173 }
1174}
1175EXPORT_SYMBOL_GPL(vring_transport_features);
1176
5dfc1762
RR
1177/**
1178 * virtqueue_get_vring_size - return the size of the virtqueue's vring
1179 * @vq: the struct virtqueue containing the vring of interest.
1180 *
1181 * Returns the size of the vring. This is mainly used for boasting to
1182 * userspace. Unlike other operations, this need not be serialized.
1183 */
8f9f4668
RJ
1184unsigned int virtqueue_get_vring_size(struct virtqueue *_vq)
1185{
1186
1187 struct vring_virtqueue *vq = to_vvq(_vq);
1188
1189 return vq->vring.num;
1190}
1191EXPORT_SYMBOL_GPL(virtqueue_get_vring_size);
1192
b3b32c94
HG
1193bool virtqueue_is_broken(struct virtqueue *_vq)
1194{
1195 struct vring_virtqueue *vq = to_vvq(_vq);
1196
1197 return vq->broken;
1198}
1199EXPORT_SYMBOL_GPL(virtqueue_is_broken);
1200
e2dcdfe9
RR
1201/*
1202 * This should prevent the device from being used, allowing drivers to
1203 * recover. You may need to grab appropriate locks to flush.
1204 */
1205void virtio_break_device(struct virtio_device *dev)
1206{
1207 struct virtqueue *_vq;
1208
1209 list_for_each_entry(_vq, &dev->vqs, list) {
1210 struct vring_virtqueue *vq = to_vvq(_vq);
1211 vq->broken = true;
1212 }
1213}
1214EXPORT_SYMBOL_GPL(virtio_break_device);
1215
2a2d1382 1216dma_addr_t virtqueue_get_desc_addr(struct virtqueue *_vq)
89062652
CH
1217{
1218 struct vring_virtqueue *vq = to_vvq(_vq);
1219
2a2d1382
AL
1220 BUG_ON(!vq->we_own_ring);
1221
1222 return vq->queue_dma_addr;
89062652 1223}
2a2d1382 1224EXPORT_SYMBOL_GPL(virtqueue_get_desc_addr);
89062652 1225
2a2d1382 1226dma_addr_t virtqueue_get_avail_addr(struct virtqueue *_vq)
89062652
CH
1227{
1228 struct vring_virtqueue *vq = to_vvq(_vq);
1229
2a2d1382
AL
1230 BUG_ON(!vq->we_own_ring);
1231
1232 return vq->queue_dma_addr +
1233 ((char *)vq->vring.avail - (char *)vq->vring.desc);
1234}
1235EXPORT_SYMBOL_GPL(virtqueue_get_avail_addr);
1236
1237dma_addr_t virtqueue_get_used_addr(struct virtqueue *_vq)
1238{
1239 struct vring_virtqueue *vq = to_vvq(_vq);
1240
1241 BUG_ON(!vq->we_own_ring);
1242
1243 return vq->queue_dma_addr +
1244 ((char *)vq->vring.used - (char *)vq->vring.desc);
1245}
1246EXPORT_SYMBOL_GPL(virtqueue_get_used_addr);
1247
1248const struct vring *virtqueue_get_vring(struct virtqueue *vq)
1249{
1250 return &to_vvq(vq)->vring;
89062652 1251}
2a2d1382 1252EXPORT_SYMBOL_GPL(virtqueue_get_vring);
89062652 1253
c6fd4701 1254MODULE_LICENSE("GPL");