1 /* Copyright (C) 2009 Red Hat, Inc.
2 * Author: Michael S. Tsirkin <mst@redhat.com>
4 * This work is licensed under the terms of the GNU GPL, version 2.
6 * virtio-net server in host kernel.
9 #include <linux/compat.h>
10 #include <linux/eventfd.h>
11 #include <linux/vhost.h>
12 #include <linux/virtio_net.h>
13 #include <linux/miscdevice.h>
14 #include <linux/module.h>
15 #include <linux/moduleparam.h>
16 #include <linux/mutex.h>
17 #include <linux/workqueue.h>
18 #include <linux/file.h>
19 #include <linux/slab.h>
20 #include <linux/sched/clock.h>
21 #include <linux/sched/signal.h>
22 #include <linux/vmalloc.h>
24 #include <linux/net.h>
25 #include <linux/if_packet.h>
26 #include <linux/if_arp.h>
27 #include <linux/if_tun.h>
28 #include <linux/if_macvlan.h>
29 #include <linux/if_tap.h>
30 #include <linux/if_vlan.h>
31 #include <linux/skb_array.h>
32 #include <linux/skbuff.h>
38 static int experimental_zcopytx
= 1;
39 module_param(experimental_zcopytx
, int, 0444);
40 MODULE_PARM_DESC(experimental_zcopytx
, "Enable Zero Copy TX;"
41 " 1 -Enable; 0 - Disable");
43 /* Max number of bytes transferred before requeueing the job.
44 * Using this limit prevents one virtqueue from starving others. */
45 #define VHOST_NET_WEIGHT 0x80000
47 /* Max number of packets transferred before requeueing the job.
48 * Using this limit prevents one virtqueue from starving others with small
51 #define VHOST_NET_PKT_WEIGHT 256
53 /* MAX number of TX used buffers for outstanding zerocopy */
54 #define VHOST_MAX_PEND 128
55 #define VHOST_GOODCOPY_LEN 256
58 * For transmit, used buffer len is unused; we override it to track buffer
59 * status internally; used for zerocopy tx only.
61 /* Lower device DMA failed */
62 #define VHOST_DMA_FAILED_LEN ((__force __virtio32)3)
63 /* Lower device DMA done */
64 #define VHOST_DMA_DONE_LEN ((__force __virtio32)2)
65 /* Lower device DMA in progress */
66 #define VHOST_DMA_IN_PROGRESS ((__force __virtio32)1)
68 #define VHOST_DMA_CLEAR_LEN ((__force __virtio32)0)
70 #define VHOST_DMA_IS_DONE(len) ((__force u32)(len) >= (__force u32)VHOST_DMA_DONE_LEN)
73 VHOST_NET_FEATURES
= VHOST_FEATURES
|
74 (1ULL << VHOST_NET_F_VIRTIO_NET_HDR
) |
75 (1ULL << VIRTIO_NET_F_MRG_RXBUF
) |
76 (1ULL << VIRTIO_F_IOMMU_PLATFORM
)
85 struct vhost_net_ubuf_ref
{
86 /* refcount follows semantics similar to kref:
87 * 0: object is released
88 * 1: no outstanding ubufs
89 * >1: outstanding ubufs
92 wait_queue_head_t wait
;
93 struct vhost_virtqueue
*vq
;
96 #define VHOST_RX_BATCH 64
97 struct vhost_net_buf
{
98 struct sk_buff
**queue
;
103 struct vhost_net_virtqueue
{
104 struct vhost_virtqueue vq
;
107 /* vhost zerocopy support fields below: */
108 /* last used idx for outstanding DMA zerocopy buffers */
110 /* first used idx for DMA done zerocopy buffers */
112 /* an array of userspace buffers info */
113 struct ubuf_info
*ubuf_info
;
114 /* Reference counting for outstanding ubufs.
115 * Protected by vq mutex. Writers must also take device mutex. */
116 struct vhost_net_ubuf_ref
*ubufs
;
117 struct skb_array
*rx_array
;
118 struct vhost_net_buf rxq
;
122 struct vhost_dev dev
;
123 struct vhost_net_virtqueue vqs
[VHOST_NET_VQ_MAX
];
124 struct vhost_poll poll
[VHOST_NET_VQ_MAX
];
125 /* Number of TX recently submitted.
126 * Protected by tx vq lock. */
128 /* Number of times zerocopy TX recently failed.
129 * Protected by tx vq lock. */
130 unsigned tx_zcopy_err
;
131 /* Flush in progress. Protected by tx vq lock. */
135 static unsigned vhost_net_zcopy_mask __read_mostly
;
137 static void *vhost_net_buf_get_ptr(struct vhost_net_buf
*rxq
)
139 if (rxq
->tail
!= rxq
->head
)
140 return rxq
->queue
[rxq
->head
];
145 static int vhost_net_buf_get_size(struct vhost_net_buf
*rxq
)
147 return rxq
->tail
- rxq
->head
;
150 static int vhost_net_buf_is_empty(struct vhost_net_buf
*rxq
)
152 return rxq
->tail
== rxq
->head
;
155 static void *vhost_net_buf_consume(struct vhost_net_buf
*rxq
)
157 void *ret
= vhost_net_buf_get_ptr(rxq
);
162 static int vhost_net_buf_produce(struct vhost_net_virtqueue
*nvq
)
164 struct vhost_net_buf
*rxq
= &nvq
->rxq
;
167 rxq
->tail
= skb_array_consume_batched(nvq
->rx_array
, rxq
->queue
,
172 static void vhost_net_buf_unproduce(struct vhost_net_virtqueue
*nvq
)
174 struct vhost_net_buf
*rxq
= &nvq
->rxq
;
176 if (nvq
->rx_array
&& !vhost_net_buf_is_empty(rxq
)) {
177 skb_array_unconsume(nvq
->rx_array
, rxq
->queue
+ rxq
->head
,
178 vhost_net_buf_get_size(rxq
));
179 rxq
->head
= rxq
->tail
= 0;
183 static int vhost_net_buf_peek(struct vhost_net_virtqueue
*nvq
)
185 struct vhost_net_buf
*rxq
= &nvq
->rxq
;
187 if (!vhost_net_buf_is_empty(rxq
))
190 if (!vhost_net_buf_produce(nvq
))
194 return __skb_array_len_with_tag(vhost_net_buf_get_ptr(rxq
));
197 static void vhost_net_buf_init(struct vhost_net_buf
*rxq
)
199 rxq
->head
= rxq
->tail
= 0;
202 static void vhost_net_enable_zcopy(int vq
)
204 vhost_net_zcopy_mask
|= 0x1 << vq
;
207 static struct vhost_net_ubuf_ref
*
208 vhost_net_ubuf_alloc(struct vhost_virtqueue
*vq
, bool zcopy
)
210 struct vhost_net_ubuf_ref
*ubufs
;
211 /* No zero copy backend? Nothing to count. */
214 ubufs
= kmalloc(sizeof(*ubufs
), GFP_KERNEL
);
216 return ERR_PTR(-ENOMEM
);
217 atomic_set(&ubufs
->refcount
, 1);
218 init_waitqueue_head(&ubufs
->wait
);
223 static int vhost_net_ubuf_put(struct vhost_net_ubuf_ref
*ubufs
)
225 int r
= atomic_sub_return(1, &ubufs
->refcount
);
227 wake_up(&ubufs
->wait
);
231 static void vhost_net_ubuf_put_and_wait(struct vhost_net_ubuf_ref
*ubufs
)
233 vhost_net_ubuf_put(ubufs
);
234 wait_event(ubufs
->wait
, !atomic_read(&ubufs
->refcount
));
237 static void vhost_net_ubuf_put_wait_and_free(struct vhost_net_ubuf_ref
*ubufs
)
239 vhost_net_ubuf_put_and_wait(ubufs
);
243 static void vhost_net_clear_ubuf_info(struct vhost_net
*n
)
247 for (i
= 0; i
< VHOST_NET_VQ_MAX
; ++i
) {
248 kfree(n
->vqs
[i
].ubuf_info
);
249 n
->vqs
[i
].ubuf_info
= NULL
;
253 static int vhost_net_set_ubuf_info(struct vhost_net
*n
)
258 for (i
= 0; i
< VHOST_NET_VQ_MAX
; ++i
) {
259 zcopy
= vhost_net_zcopy_mask
& (0x1 << i
);
262 n
->vqs
[i
].ubuf_info
= kmalloc(sizeof(*n
->vqs
[i
].ubuf_info
) *
263 UIO_MAXIOV
, GFP_KERNEL
);
264 if (!n
->vqs
[i
].ubuf_info
)
270 vhost_net_clear_ubuf_info(n
);
274 static void vhost_net_vq_reset(struct vhost_net
*n
)
278 vhost_net_clear_ubuf_info(n
);
280 for (i
= 0; i
< VHOST_NET_VQ_MAX
; i
++) {
281 n
->vqs
[i
].done_idx
= 0;
282 n
->vqs
[i
].upend_idx
= 0;
283 n
->vqs
[i
].ubufs
= NULL
;
284 n
->vqs
[i
].vhost_hlen
= 0;
285 n
->vqs
[i
].sock_hlen
= 0;
286 vhost_net_buf_init(&n
->vqs
[i
].rxq
);
291 static void vhost_net_tx_packet(struct vhost_net
*net
)
294 if (net
->tx_packets
< 1024)
297 net
->tx_zcopy_err
= 0;
300 static void vhost_net_tx_err(struct vhost_net
*net
)
305 static bool vhost_net_tx_select_zcopy(struct vhost_net
*net
)
307 /* TX flush waits for outstanding DMAs to be done.
308 * Don't start new DMAs.
310 return !net
->tx_flush
&&
311 net
->tx_packets
/ 64 >= net
->tx_zcopy_err
;
314 static bool vhost_sock_zcopy(struct socket
*sock
)
316 return unlikely(experimental_zcopytx
) &&
317 sock_flag(sock
->sk
, SOCK_ZEROCOPY
);
320 /* In case of DMA done not in order in lower device driver for some reason.
321 * upend_idx is used to track end of used idx, done_idx is used to track head
322 * of used idx. Once lower device DMA done contiguously, we will signal KVM
325 static void vhost_zerocopy_signal_used(struct vhost_net
*net
,
326 struct vhost_virtqueue
*vq
)
328 struct vhost_net_virtqueue
*nvq
=
329 container_of(vq
, struct vhost_net_virtqueue
, vq
);
333 for (i
= nvq
->done_idx
; i
!= nvq
->upend_idx
; i
= (i
+ 1) % UIO_MAXIOV
) {
334 if (vq
->heads
[i
].len
== VHOST_DMA_FAILED_LEN
)
335 vhost_net_tx_err(net
);
336 if (VHOST_DMA_IS_DONE(vq
->heads
[i
].len
)) {
337 vq
->heads
[i
].len
= VHOST_DMA_CLEAR_LEN
;
343 add
= min(UIO_MAXIOV
- nvq
->done_idx
, j
);
344 vhost_add_used_and_signal_n(vq
->dev
, vq
,
345 &vq
->heads
[nvq
->done_idx
], add
);
346 nvq
->done_idx
= (nvq
->done_idx
+ add
) % UIO_MAXIOV
;
351 static void vhost_zerocopy_callback(struct ubuf_info
*ubuf
, bool success
)
353 struct vhost_net_ubuf_ref
*ubufs
= ubuf
->ctx
;
354 struct vhost_virtqueue
*vq
= ubufs
->vq
;
359 /* set len to mark this desc buffers done DMA */
360 vq
->heads
[ubuf
->desc
].len
= success
?
361 VHOST_DMA_DONE_LEN
: VHOST_DMA_FAILED_LEN
;
362 cnt
= vhost_net_ubuf_put(ubufs
);
365 * Trigger polling thread if guest stopped submitting new buffers:
366 * in this case, the refcount after decrement will eventually reach 1.
367 * We also trigger polling periodically after each 16 packets
368 * (the value 16 here is more or less arbitrary, it's tuned to trigger
369 * less than 10% of times).
371 if (cnt
<= 1 || !(cnt
% 16))
372 vhost_poll_queue(&vq
->poll
);
374 rcu_read_unlock_bh();
377 static inline unsigned long busy_clock(void)
379 return local_clock() >> 10;
382 static bool vhost_can_busy_poll(unsigned long endtime
)
384 return likely(!need_resched() && !time_after(busy_clock(), endtime
) &&
385 !signal_pending(current
));
388 static void vhost_net_disable_vq(struct vhost_net
*n
,
389 struct vhost_virtqueue
*vq
)
391 struct vhost_net_virtqueue
*nvq
=
392 container_of(vq
, struct vhost_net_virtqueue
, vq
);
393 struct vhost_poll
*poll
= n
->poll
+ (nvq
- n
->vqs
);
394 if (!vq
->private_data
)
396 vhost_poll_stop(poll
);
399 static int vhost_net_enable_vq(struct vhost_net
*n
,
400 struct vhost_virtqueue
*vq
)
402 struct vhost_net_virtqueue
*nvq
=
403 container_of(vq
, struct vhost_net_virtqueue
, vq
);
404 struct vhost_poll
*poll
= n
->poll
+ (nvq
- n
->vqs
);
407 sock
= vq
->private_data
;
411 return vhost_poll_start(poll
, sock
->file
);
414 static int vhost_net_tx_get_vq_desc(struct vhost_net
*net
,
415 struct vhost_virtqueue
*vq
,
416 struct iovec iov
[], unsigned int iov_size
,
417 unsigned int *out_num
, unsigned int *in_num
,
420 unsigned long uninitialized_var(endtime
);
421 int r
= vhost_get_vq_desc(vq
, vq
->iov
, ARRAY_SIZE(vq
->iov
),
422 out_num
, in_num
, NULL
, NULL
);
424 if (r
== vq
->num
&& vq
->busyloop_timeout
) {
426 endtime
= busy_clock() + vq
->busyloop_timeout
;
427 while (vhost_can_busy_poll(endtime
)) {
428 if (vhost_has_work(vq
->dev
)) {
429 *busyloop_intr
= true;
432 if (!vhost_vq_avail_empty(vq
->dev
, vq
))
437 r
= vhost_get_vq_desc(vq
, vq
->iov
, ARRAY_SIZE(vq
->iov
),
438 out_num
, in_num
, NULL
, NULL
);
444 static bool vhost_exceeds_maxpend(struct vhost_net
*net
)
446 struct vhost_net_virtqueue
*nvq
= &net
->vqs
[VHOST_NET_VQ_TX
];
447 struct vhost_virtqueue
*vq
= &nvq
->vq
;
449 return (nvq
->upend_idx
+ UIO_MAXIOV
- nvq
->done_idx
) % UIO_MAXIOV
>
450 min_t(unsigned int, VHOST_MAX_PEND
, vq
->num
>> 2);
453 static bool vhost_exceeds_weight(int pkts
, int total_len
)
455 return total_len
>= VHOST_NET_WEIGHT
||
456 pkts
>= VHOST_NET_PKT_WEIGHT
;
459 /* Expects to be always run from workqueue - which acts as
460 * read-size critical section for our kind of RCU. */
461 static void handle_tx(struct vhost_net
*net
)
463 struct vhost_net_virtqueue
*nvq
= &net
->vqs
[VHOST_NET_VQ_TX
];
464 struct vhost_virtqueue
*vq
= &nvq
->vq
;
467 struct msghdr msg
= {
472 .msg_flags
= MSG_DONTWAIT
,
474 size_t len
, total_len
= 0;
478 struct vhost_net_ubuf_ref
*uninitialized_var(ubufs
);
479 bool zcopy
, zcopy_used
;
482 mutex_lock(&vq
->mutex
);
483 sock
= vq
->private_data
;
487 if (!vq_iotlb_prefetch(vq
))
490 vhost_disable_notify(&net
->dev
, vq
);
491 vhost_net_disable_vq(net
, vq
);
493 hdr_size
= nvq
->vhost_hlen
;
499 /* Release DMAs done buffers first */
501 vhost_zerocopy_signal_used(net
, vq
);
503 busyloop_intr
= false;
504 head
= vhost_net_tx_get_vq_desc(net
, vq
, vq
->iov
,
506 &out
, &in
, &busyloop_intr
);
507 /* On error, stop handling until the next kick. */
508 if (unlikely(head
< 0))
510 /* Nothing new? Wait for eventfd to tell us they refilled. */
511 if (head
== vq
->num
) {
512 if (unlikely(busyloop_intr
)) {
513 vhost_poll_queue(&vq
->poll
);
514 } else if (unlikely(vhost_enable_notify(&net
->dev
, vq
))) {
515 vhost_disable_notify(&net
->dev
, vq
);
521 vq_err(vq
, "Unexpected descriptor format for TX: "
522 "out %d, int %d\n", out
, in
);
525 /* Skip header. TODO: support TSO. */
526 len
= iov_length(vq
->iov
, out
);
527 iov_iter_init(&msg
.msg_iter
, WRITE
, vq
->iov
, out
, len
);
528 iov_iter_advance(&msg
.msg_iter
, hdr_size
);
530 if (!msg_data_left(&msg
)) {
531 vq_err(vq
, "Unexpected header len for TX: "
532 "%zd expected %zd\n",
536 len
= msg_data_left(&msg
);
538 zcopy_used
= zcopy
&& len
>= VHOST_GOODCOPY_LEN
539 && !vhost_exceeds_maxpend(net
)
540 && vhost_net_tx_select_zcopy(net
);
542 /* use msg_control to pass vhost zerocopy ubuf info to skb */
544 struct ubuf_info
*ubuf
;
545 ubuf
= nvq
->ubuf_info
+ nvq
->upend_idx
;
547 vq
->heads
[nvq
->upend_idx
].id
= cpu_to_vhost32(vq
, head
);
548 vq
->heads
[nvq
->upend_idx
].len
= VHOST_DMA_IN_PROGRESS
;
549 ubuf
->callback
= vhost_zerocopy_callback
;
550 ubuf
->ctx
= nvq
->ubufs
;
551 ubuf
->desc
= nvq
->upend_idx
;
552 refcount_set(&ubuf
->refcnt
, 1);
553 msg
.msg_control
= ubuf
;
554 msg
.msg_controllen
= sizeof(ubuf
);
556 atomic_inc(&ubufs
->refcount
);
557 nvq
->upend_idx
= (nvq
->upend_idx
+ 1) % UIO_MAXIOV
;
559 msg
.msg_control
= NULL
;
563 if (total_len
< VHOST_NET_WEIGHT
&&
564 !vhost_vq_avail_empty(&net
->dev
, vq
) &&
565 likely(!vhost_exceeds_maxpend(net
))) {
566 msg
.msg_flags
|= MSG_MORE
;
568 msg
.msg_flags
&= ~MSG_MORE
;
571 /* TODO: Check specific error and bomb out unless ENOBUFS? */
572 err
= sock
->ops
->sendmsg(sock
, &msg
, len
);
573 if (unlikely(err
< 0)) {
575 vhost_net_ubuf_put(ubufs
);
576 nvq
->upend_idx
= ((unsigned)nvq
->upend_idx
- 1)
579 vhost_discard_vq_desc(vq
, 1);
580 vhost_net_enable_vq(net
, vq
);
584 pr_debug("Truncated TX packet: "
585 " len %d != %zd\n", err
, len
);
587 vhost_add_used_and_signal(&net
->dev
, vq
, head
, 0);
589 vhost_zerocopy_signal_used(net
, vq
);
590 vhost_net_tx_packet(net
);
591 if (unlikely(vhost_exceeds_weight(++sent_pkts
, total_len
))) {
592 vhost_poll_queue(&vq
->poll
);
597 mutex_unlock(&vq
->mutex
);
600 static int peek_head_len(struct vhost_net_virtqueue
*rvq
, struct sock
*sk
)
602 struct sk_buff
*head
;
607 return vhost_net_buf_peek(rvq
);
609 spin_lock_irqsave(&sk
->sk_receive_queue
.lock
, flags
);
610 head
= skb_peek(&sk
->sk_receive_queue
);
613 if (skb_vlan_tag_present(head
))
617 spin_unlock_irqrestore(&sk
->sk_receive_queue
.lock
, flags
);
621 static int sk_has_rx_data(struct sock
*sk
)
623 struct socket
*sock
= sk
->sk_socket
;
625 if (sock
->ops
->peek_len
)
626 return sock
->ops
->peek_len(sock
);
628 return skb_queue_empty(&sk
->sk_receive_queue
);
631 static int vhost_net_rx_peek_head_len(struct vhost_net
*net
, struct sock
*sk
)
633 struct vhost_net_virtqueue
*rvq
= &net
->vqs
[VHOST_NET_VQ_RX
];
634 struct vhost_net_virtqueue
*nvq
= &net
->vqs
[VHOST_NET_VQ_TX
];
635 struct vhost_virtqueue
*vq
= &nvq
->vq
;
636 unsigned long uninitialized_var(endtime
);
637 int len
= peek_head_len(rvq
, sk
);
639 if (!len
&& vq
->busyloop_timeout
) {
640 /* Both tx vq and rx socket were polled here */
641 mutex_lock_nested(&vq
->mutex
, 1);
642 vhost_disable_notify(&net
->dev
, vq
);
645 endtime
= busy_clock() + vq
->busyloop_timeout
;
647 while (vhost_can_busy_poll(endtime
) &&
648 !vhost_has_work(&net
->dev
) &&
649 !sk_has_rx_data(sk
) &&
650 vhost_vq_avail_empty(&net
->dev
, vq
))
655 if (!vhost_vq_avail_empty(&net
->dev
, vq
))
656 vhost_poll_queue(&vq
->poll
);
657 else if (unlikely(vhost_enable_notify(&net
->dev
, vq
))) {
658 vhost_disable_notify(&net
->dev
, vq
);
659 vhost_poll_queue(&vq
->poll
);
662 mutex_unlock(&vq
->mutex
);
664 len
= peek_head_len(rvq
, sk
);
670 /* This is a multi-buffer version of vhost_get_desc, that works if
671 * vq has read descriptors only.
672 * @vq - the relevant virtqueue
673 * @datalen - data length we'll be reading
674 * @iovcount - returned count of io vectors we fill
676 * @log_num - log offset
677 * @quota - headcount quota, 1 for big buffer
678 * returns number of buffer heads allocated, negative on error
680 static int get_rx_bufs(struct vhost_virtqueue
*vq
,
681 struct vring_used_elem
*heads
,
684 struct vhost_log
*log
,
688 unsigned int out
, in
;
693 /* len is always initialized before use since we are always called with
696 u32
uninitialized_var(len
);
698 while (datalen
> 0 && headcount
< quota
) {
699 if (unlikely(seg
>= UIO_MAXIOV
)) {
703 r
= vhost_get_vq_desc(vq
, vq
->iov
+ seg
,
704 ARRAY_SIZE(vq
->iov
) - seg
, &out
,
714 if (unlikely(out
|| in
<= 0)) {
715 vq_err(vq
, "unexpected descriptor format for RX: "
716 "out %d, in %d\n", out
, in
);
724 heads
[headcount
].id
= cpu_to_vhost32(vq
, d
);
725 len
= iov_length(vq
->iov
+ seg
, in
);
726 heads
[headcount
].len
= cpu_to_vhost32(vq
, len
);
731 heads
[headcount
- 1].len
= cpu_to_vhost32(vq
, len
+ datalen
);
737 if (unlikely(datalen
> 0)) {
743 vhost_discard_vq_desc(vq
, headcount
);
747 /* Expects to be always run from workqueue - which acts as
748 * read-size critical section for our kind of RCU. */
749 static void handle_rx(struct vhost_net
*net
)
751 struct vhost_net_virtqueue
*nvq
= &net
->vqs
[VHOST_NET_VQ_RX
];
752 struct vhost_virtqueue
*vq
= &nvq
->vq
;
753 unsigned uninitialized_var(in
), log
;
754 struct vhost_log
*vq_log
;
755 struct msghdr msg
= {
758 .msg_control
= NULL
, /* FIXME: get and handle RX aux data. */
760 .msg_flags
= MSG_DONTWAIT
,
762 struct virtio_net_hdr hdr
= {
764 .gso_type
= VIRTIO_NET_HDR_GSO_NONE
766 size_t total_len
= 0;
769 size_t vhost_hlen
, sock_hlen
;
770 size_t vhost_len
, sock_len
;
772 struct iov_iter fixup
;
773 __virtio16 num_buffers
;
776 mutex_lock_nested(&vq
->mutex
, 0);
777 sock
= vq
->private_data
;
781 if (!vq_iotlb_prefetch(vq
))
784 vhost_disable_notify(&net
->dev
, vq
);
785 vhost_net_disable_vq(net
, vq
);
787 vhost_hlen
= nvq
->vhost_hlen
;
788 sock_hlen
= nvq
->sock_hlen
;
790 vq_log
= unlikely(vhost_has_feature(vq
, VHOST_F_LOG_ALL
)) ?
792 mergeable
= vhost_has_feature(vq
, VIRTIO_NET_F_MRG_RXBUF
);
794 while ((sock_len
= vhost_net_rx_peek_head_len(net
, sock
->sk
))) {
795 sock_len
+= sock_hlen
;
796 vhost_len
= sock_len
+ vhost_hlen
;
797 headcount
= get_rx_bufs(vq
, vq
->heads
, vhost_len
,
799 likely(mergeable
) ? UIO_MAXIOV
: 1);
800 /* On error, stop handling until the next kick. */
801 if (unlikely(headcount
< 0))
803 /* OK, now we need to know about added descriptors. */
805 if (unlikely(vhost_enable_notify(&net
->dev
, vq
))) {
806 /* They have slipped one in as we were
807 * doing that: check again. */
808 vhost_disable_notify(&net
->dev
, vq
);
811 /* Nothing new? Wait for eventfd to tell us
816 msg
.msg_control
= vhost_net_buf_consume(&nvq
->rxq
);
817 /* On overrun, truncate and discard */
818 if (unlikely(headcount
> UIO_MAXIOV
)) {
819 iov_iter_init(&msg
.msg_iter
, READ
, vq
->iov
, 1, 1);
820 err
= sock
->ops
->recvmsg(sock
, &msg
,
821 1, MSG_DONTWAIT
| MSG_TRUNC
);
822 pr_debug("Discarded rx packet: len %zd\n", sock_len
);
825 /* We don't need to be notified again. */
826 iov_iter_init(&msg
.msg_iter
, READ
, vq
->iov
, in
, vhost_len
);
827 fixup
= msg
.msg_iter
;
828 if (unlikely((vhost_hlen
))) {
829 /* We will supply the header ourselves
832 iov_iter_advance(&msg
.msg_iter
, vhost_hlen
);
834 err
= sock
->ops
->recvmsg(sock
, &msg
,
835 sock_len
, MSG_DONTWAIT
| MSG_TRUNC
);
836 /* Userspace might have consumed the packet meanwhile:
837 * it's not supposed to do this usually, but might be hard
838 * to prevent. Discard data we got (if any) and keep going. */
839 if (unlikely(err
!= sock_len
)) {
840 pr_debug("Discarded rx packet: "
841 " len %d, expected %zd\n", err
, sock_len
);
842 vhost_discard_vq_desc(vq
, headcount
);
845 /* Supply virtio_net_hdr if VHOST_NET_F_VIRTIO_NET_HDR */
846 if (unlikely(vhost_hlen
)) {
847 if (copy_to_iter(&hdr
, sizeof(hdr
),
848 &fixup
) != sizeof(hdr
)) {
849 vq_err(vq
, "Unable to write vnet_hdr "
850 "at addr %p\n", vq
->iov
->iov_base
);
854 /* Header came from socket; we'll need to patch
855 * ->num_buffers over if VIRTIO_NET_F_MRG_RXBUF
857 iov_iter_advance(&fixup
, sizeof(hdr
));
859 /* TODO: Should check and handle checksum. */
861 num_buffers
= cpu_to_vhost16(vq
, headcount
);
862 if (likely(mergeable
) &&
863 copy_to_iter(&num_buffers
, sizeof num_buffers
,
864 &fixup
) != sizeof num_buffers
) {
865 vq_err(vq
, "Failed num_buffers write");
866 vhost_discard_vq_desc(vq
, headcount
);
869 vhost_add_used_and_signal_n(&net
->dev
, vq
, vq
->heads
,
871 if (unlikely(vq_log
))
872 vhost_log_write(vq
, vq_log
, log
, vhost_len
,
874 total_len
+= vhost_len
;
875 if (unlikely(vhost_exceeds_weight(++recv_pkts
, total_len
))) {
876 vhost_poll_queue(&vq
->poll
);
880 vhost_net_enable_vq(net
, vq
);
882 mutex_unlock(&vq
->mutex
);
885 static void handle_tx_kick(struct vhost_work
*work
)
887 struct vhost_virtqueue
*vq
= container_of(work
, struct vhost_virtqueue
,
889 struct vhost_net
*net
= container_of(vq
->dev
, struct vhost_net
, dev
);
894 static void handle_rx_kick(struct vhost_work
*work
)
896 struct vhost_virtqueue
*vq
= container_of(work
, struct vhost_virtqueue
,
898 struct vhost_net
*net
= container_of(vq
->dev
, struct vhost_net
, dev
);
903 static void handle_tx_net(struct vhost_work
*work
)
905 struct vhost_net
*net
= container_of(work
, struct vhost_net
,
906 poll
[VHOST_NET_VQ_TX
].work
);
910 static void handle_rx_net(struct vhost_work
*work
)
912 struct vhost_net
*net
= container_of(work
, struct vhost_net
,
913 poll
[VHOST_NET_VQ_RX
].work
);
917 static int vhost_net_open(struct inode
*inode
, struct file
*f
)
920 struct vhost_dev
*dev
;
921 struct vhost_virtqueue
**vqs
;
922 struct sk_buff
**queue
;
925 n
= kvmalloc(sizeof *n
, GFP_KERNEL
| __GFP_RETRY_MAYFAIL
);
928 vqs
= kmalloc(VHOST_NET_VQ_MAX
* sizeof(*vqs
), GFP_KERNEL
);
934 queue
= kmalloc_array(VHOST_RX_BATCH
, sizeof(struct sk_buff
*),
941 n
->vqs
[VHOST_NET_VQ_RX
].rxq
.queue
= queue
;
944 vqs
[VHOST_NET_VQ_TX
] = &n
->vqs
[VHOST_NET_VQ_TX
].vq
;
945 vqs
[VHOST_NET_VQ_RX
] = &n
->vqs
[VHOST_NET_VQ_RX
].vq
;
946 n
->vqs
[VHOST_NET_VQ_TX
].vq
.handle_kick
= handle_tx_kick
;
947 n
->vqs
[VHOST_NET_VQ_RX
].vq
.handle_kick
= handle_rx_kick
;
948 for (i
= 0; i
< VHOST_NET_VQ_MAX
; i
++) {
949 n
->vqs
[i
].ubufs
= NULL
;
950 n
->vqs
[i
].ubuf_info
= NULL
;
951 n
->vqs
[i
].upend_idx
= 0;
952 n
->vqs
[i
].done_idx
= 0;
953 n
->vqs
[i
].vhost_hlen
= 0;
954 n
->vqs
[i
].sock_hlen
= 0;
955 vhost_net_buf_init(&n
->vqs
[i
].rxq
);
957 vhost_dev_init(dev
, vqs
, VHOST_NET_VQ_MAX
);
959 vhost_poll_init(n
->poll
+ VHOST_NET_VQ_TX
, handle_tx_net
, POLLOUT
, dev
);
960 vhost_poll_init(n
->poll
+ VHOST_NET_VQ_RX
, handle_rx_net
, POLLIN
, dev
);
967 static struct socket
*vhost_net_stop_vq(struct vhost_net
*n
,
968 struct vhost_virtqueue
*vq
)
971 struct vhost_net_virtqueue
*nvq
=
972 container_of(vq
, struct vhost_net_virtqueue
, vq
);
974 mutex_lock(&vq
->mutex
);
975 sock
= vq
->private_data
;
976 vhost_net_disable_vq(n
, vq
);
977 vq
->private_data
= NULL
;
978 vhost_net_buf_unproduce(nvq
);
979 mutex_unlock(&vq
->mutex
);
983 static void vhost_net_stop(struct vhost_net
*n
, struct socket
**tx_sock
,
984 struct socket
**rx_sock
)
986 *tx_sock
= vhost_net_stop_vq(n
, &n
->vqs
[VHOST_NET_VQ_TX
].vq
);
987 *rx_sock
= vhost_net_stop_vq(n
, &n
->vqs
[VHOST_NET_VQ_RX
].vq
);
990 static void vhost_net_flush_vq(struct vhost_net
*n
, int index
)
992 vhost_poll_flush(n
->poll
+ index
);
993 vhost_poll_flush(&n
->vqs
[index
].vq
.poll
);
996 static void vhost_net_flush(struct vhost_net
*n
)
998 vhost_net_flush_vq(n
, VHOST_NET_VQ_TX
);
999 vhost_net_flush_vq(n
, VHOST_NET_VQ_RX
);
1000 if (n
->vqs
[VHOST_NET_VQ_TX
].ubufs
) {
1001 mutex_lock(&n
->vqs
[VHOST_NET_VQ_TX
].vq
.mutex
);
1003 mutex_unlock(&n
->vqs
[VHOST_NET_VQ_TX
].vq
.mutex
);
1004 /* Wait for all lower device DMAs done. */
1005 vhost_net_ubuf_put_and_wait(n
->vqs
[VHOST_NET_VQ_TX
].ubufs
);
1006 mutex_lock(&n
->vqs
[VHOST_NET_VQ_TX
].vq
.mutex
);
1007 n
->tx_flush
= false;
1008 atomic_set(&n
->vqs
[VHOST_NET_VQ_TX
].ubufs
->refcount
, 1);
1009 mutex_unlock(&n
->vqs
[VHOST_NET_VQ_TX
].vq
.mutex
);
1013 static int vhost_net_release(struct inode
*inode
, struct file
*f
)
1015 struct vhost_net
*n
= f
->private_data
;
1016 struct socket
*tx_sock
;
1017 struct socket
*rx_sock
;
1019 vhost_net_stop(n
, &tx_sock
, &rx_sock
);
1021 vhost_dev_stop(&n
->dev
);
1022 vhost_dev_cleanup(&n
->dev
, false);
1023 vhost_net_vq_reset(n
);
1025 sockfd_put(tx_sock
);
1027 sockfd_put(rx_sock
);
1028 /* Make sure no callbacks are outstanding */
1029 synchronize_rcu_bh();
1030 /* We do an extra flush before freeing memory,
1031 * since jobs can re-queue themselves. */
1033 kfree(n
->vqs
[VHOST_NET_VQ_RX
].rxq
.queue
);
1039 static struct socket
*get_raw_socket(int fd
)
1042 struct sockaddr_ll sa
;
1043 char buf
[MAX_ADDR_LEN
];
1045 int uaddr_len
= sizeof uaddr
, r
;
1046 struct socket
*sock
= sockfd_lookup(fd
, &r
);
1049 return ERR_PTR(-ENOTSOCK
);
1051 /* Parameter checking */
1052 if (sock
->sk
->sk_type
!= SOCK_RAW
) {
1053 r
= -ESOCKTNOSUPPORT
;
1057 r
= sock
->ops
->getname(sock
, (struct sockaddr
*)&uaddr
.sa
,
1062 if (uaddr
.sa
.sll_family
!= AF_PACKET
) {
1072 static struct skb_array
*get_tap_skb_array(int fd
)
1074 struct skb_array
*array
;
1075 struct file
*file
= fget(fd
);
1079 array
= tun_get_skb_array(file
);
1082 array
= tap_get_skb_array(file
);
1091 static struct socket
*get_tap_socket(int fd
)
1093 struct file
*file
= fget(fd
);
1094 struct socket
*sock
;
1097 return ERR_PTR(-EBADF
);
1098 sock
= tun_get_socket(file
);
1101 sock
= tap_get_socket(file
);
1107 static struct socket
*get_socket(int fd
)
1109 struct socket
*sock
;
1111 /* special case to disable backend */
1114 sock
= get_raw_socket(fd
);
1117 sock
= get_tap_socket(fd
);
1120 return ERR_PTR(-ENOTSOCK
);
1123 static long vhost_net_set_backend(struct vhost_net
*n
, unsigned index
, int fd
)
1125 struct socket
*sock
, *oldsock
;
1126 struct vhost_virtqueue
*vq
;
1127 struct vhost_net_virtqueue
*nvq
;
1128 struct vhost_net_ubuf_ref
*ubufs
, *oldubufs
= NULL
;
1131 mutex_lock(&n
->dev
.mutex
);
1132 r
= vhost_dev_check_owner(&n
->dev
);
1136 if (index
>= VHOST_NET_VQ_MAX
) {
1140 vq
= &n
->vqs
[index
].vq
;
1141 nvq
= &n
->vqs
[index
];
1142 mutex_lock(&vq
->mutex
);
1144 /* Verify that ring has been setup correctly. */
1145 if (!vhost_vq_access_ok(vq
)) {
1149 sock
= get_socket(fd
);
1155 /* start polling new socket */
1156 oldsock
= vq
->private_data
;
1157 if (sock
!= oldsock
) {
1158 ubufs
= vhost_net_ubuf_alloc(vq
,
1159 sock
&& vhost_sock_zcopy(sock
));
1160 if (IS_ERR(ubufs
)) {
1165 vhost_net_disable_vq(n
, vq
);
1166 vq
->private_data
= sock
;
1167 vhost_net_buf_unproduce(nvq
);
1168 if (index
== VHOST_NET_VQ_RX
)
1169 nvq
->rx_array
= get_tap_skb_array(fd
);
1170 r
= vhost_vq_init_access(vq
);
1173 r
= vhost_net_enable_vq(n
, vq
);
1177 oldubufs
= nvq
->ubufs
;
1181 n
->tx_zcopy_err
= 0;
1182 n
->tx_flush
= false;
1185 mutex_unlock(&vq
->mutex
);
1188 vhost_net_ubuf_put_wait_and_free(oldubufs
);
1189 mutex_lock(&vq
->mutex
);
1190 vhost_zerocopy_signal_used(n
, vq
);
1191 mutex_unlock(&vq
->mutex
);
1195 vhost_net_flush_vq(n
, index
);
1196 sockfd_put(oldsock
);
1199 mutex_unlock(&n
->dev
.mutex
);
1203 vq
->private_data
= oldsock
;
1204 vhost_net_enable_vq(n
, vq
);
1206 vhost_net_ubuf_put_wait_and_free(ubufs
);
1211 mutex_unlock(&vq
->mutex
);
1213 mutex_unlock(&n
->dev
.mutex
);
1217 static long vhost_net_reset_owner(struct vhost_net
*n
)
1219 struct socket
*tx_sock
= NULL
;
1220 struct socket
*rx_sock
= NULL
;
1222 struct vhost_umem
*umem
;
1224 mutex_lock(&n
->dev
.mutex
);
1225 err
= vhost_dev_check_owner(&n
->dev
);
1228 umem
= vhost_dev_reset_owner_prepare();
1233 vhost_net_stop(n
, &tx_sock
, &rx_sock
);
1235 vhost_dev_stop(&n
->dev
);
1236 vhost_dev_reset_owner(&n
->dev
, umem
);
1237 vhost_net_vq_reset(n
);
1239 mutex_unlock(&n
->dev
.mutex
);
1241 sockfd_put(tx_sock
);
1243 sockfd_put(rx_sock
);
1247 static int vhost_net_set_features(struct vhost_net
*n
, u64 features
)
1249 size_t vhost_hlen
, sock_hlen
, hdr_len
;
1252 hdr_len
= (features
& ((1ULL << VIRTIO_NET_F_MRG_RXBUF
) |
1253 (1ULL << VIRTIO_F_VERSION_1
))) ?
1254 sizeof(struct virtio_net_hdr_mrg_rxbuf
) :
1255 sizeof(struct virtio_net_hdr
);
1256 if (features
& (1 << VHOST_NET_F_VIRTIO_NET_HDR
)) {
1257 /* vhost provides vnet_hdr */
1258 vhost_hlen
= hdr_len
;
1261 /* socket provides vnet_hdr */
1263 sock_hlen
= hdr_len
;
1265 mutex_lock(&n
->dev
.mutex
);
1266 if ((features
& (1 << VHOST_F_LOG_ALL
)) &&
1267 !vhost_log_access_ok(&n
->dev
))
1270 if ((features
& (1ULL << VIRTIO_F_IOMMU_PLATFORM
))) {
1271 if (vhost_init_device_iotlb(&n
->dev
, true))
1275 for (i
= 0; i
< VHOST_NET_VQ_MAX
; ++i
) {
1276 mutex_lock(&n
->vqs
[i
].vq
.mutex
);
1277 n
->vqs
[i
].vq
.acked_features
= features
;
1278 n
->vqs
[i
].vhost_hlen
= vhost_hlen
;
1279 n
->vqs
[i
].sock_hlen
= sock_hlen
;
1280 mutex_unlock(&n
->vqs
[i
].vq
.mutex
);
1282 mutex_unlock(&n
->dev
.mutex
);
1286 mutex_unlock(&n
->dev
.mutex
);
1290 static long vhost_net_set_owner(struct vhost_net
*n
)
1294 mutex_lock(&n
->dev
.mutex
);
1295 if (vhost_dev_has_owner(&n
->dev
)) {
1299 r
= vhost_net_set_ubuf_info(n
);
1302 r
= vhost_dev_set_owner(&n
->dev
);
1304 vhost_net_clear_ubuf_info(n
);
1307 mutex_unlock(&n
->dev
.mutex
);
1311 static long vhost_net_ioctl(struct file
*f
, unsigned int ioctl
,
1314 struct vhost_net
*n
= f
->private_data
;
1315 void __user
*argp
= (void __user
*)arg
;
1316 u64 __user
*featurep
= argp
;
1317 struct vhost_vring_file backend
;
1322 case VHOST_NET_SET_BACKEND
:
1323 if (copy_from_user(&backend
, argp
, sizeof backend
))
1325 return vhost_net_set_backend(n
, backend
.index
, backend
.fd
);
1326 case VHOST_GET_FEATURES
:
1327 features
= VHOST_NET_FEATURES
;
1328 if (copy_to_user(featurep
, &features
, sizeof features
))
1331 case VHOST_SET_FEATURES
:
1332 if (copy_from_user(&features
, featurep
, sizeof features
))
1334 if (features
& ~VHOST_NET_FEATURES
)
1336 return vhost_net_set_features(n
, features
);
1337 case VHOST_RESET_OWNER
:
1338 return vhost_net_reset_owner(n
);
1339 case VHOST_SET_OWNER
:
1340 return vhost_net_set_owner(n
);
1342 mutex_lock(&n
->dev
.mutex
);
1343 r
= vhost_dev_ioctl(&n
->dev
, ioctl
, argp
);
1344 if (r
== -ENOIOCTLCMD
)
1345 r
= vhost_vring_ioctl(&n
->dev
, ioctl
, argp
);
1348 mutex_unlock(&n
->dev
.mutex
);
1353 #ifdef CONFIG_COMPAT
1354 static long vhost_net_compat_ioctl(struct file
*f
, unsigned int ioctl
,
1357 return vhost_net_ioctl(f
, ioctl
, (unsigned long)compat_ptr(arg
));
1361 static ssize_t
vhost_net_chr_read_iter(struct kiocb
*iocb
, struct iov_iter
*to
)
1363 struct file
*file
= iocb
->ki_filp
;
1364 struct vhost_net
*n
= file
->private_data
;
1365 struct vhost_dev
*dev
= &n
->dev
;
1366 int noblock
= file
->f_flags
& O_NONBLOCK
;
1368 return vhost_chr_read_iter(dev
, to
, noblock
);
1371 static ssize_t
vhost_net_chr_write_iter(struct kiocb
*iocb
,
1372 struct iov_iter
*from
)
1374 struct file
*file
= iocb
->ki_filp
;
1375 struct vhost_net
*n
= file
->private_data
;
1376 struct vhost_dev
*dev
= &n
->dev
;
1378 return vhost_chr_write_iter(dev
, from
);
1381 static unsigned int vhost_net_chr_poll(struct file
*file
, poll_table
*wait
)
1383 struct vhost_net
*n
= file
->private_data
;
1384 struct vhost_dev
*dev
= &n
->dev
;
1386 return vhost_chr_poll(file
, dev
, wait
);
1389 static const struct file_operations vhost_net_fops
= {
1390 .owner
= THIS_MODULE
,
1391 .release
= vhost_net_release
,
1392 .read_iter
= vhost_net_chr_read_iter
,
1393 .write_iter
= vhost_net_chr_write_iter
,
1394 .poll
= vhost_net_chr_poll
,
1395 .unlocked_ioctl
= vhost_net_ioctl
,
1396 #ifdef CONFIG_COMPAT
1397 .compat_ioctl
= vhost_net_compat_ioctl
,
1399 .open
= vhost_net_open
,
1400 .llseek
= noop_llseek
,
1403 static struct miscdevice vhost_net_misc
= {
1404 .minor
= VHOST_NET_MINOR
,
1405 .name
= "vhost-net",
1406 .fops
= &vhost_net_fops
,
1409 static int vhost_net_init(void)
1411 if (experimental_zcopytx
)
1412 vhost_net_enable_zcopy(VHOST_NET_VQ_TX
);
1413 return misc_register(&vhost_net_misc
);
1415 module_init(vhost_net_init
);
1417 static void vhost_net_exit(void)
1419 misc_deregister(&vhost_net_misc
);
1421 module_exit(vhost_net_exit
);
1423 MODULE_VERSION("0.0.1");
1424 MODULE_LICENSE("GPL v2");
1425 MODULE_AUTHOR("Michael S. Tsirkin");
1426 MODULE_DESCRIPTION("Host kernel accelerator for virtio net");
1427 MODULE_ALIAS_MISCDEV(VHOST_NET_MINOR
);
1428 MODULE_ALIAS("devname:vhost-net");