xref: /kvmtool/virtio/core.c (revision 2fddfdb536df0a79b23edcee5fd1aa86c985fe3b)
139d6af07SAsias He #include <linux/virtio_ring.h>
23fdf659dSSasha Levin #include <linux/types.h>
339d6af07SAsias He #include <sys/uio.h>
42caa836dSIngo Molnar 
52caa836dSIngo Molnar #include "kvm/barrier.h"
62caa836dSIngo Molnar 
739d6af07SAsias He #include "kvm/kvm.h"
839d6af07SAsias He #include "kvm/virtio.h"
939d6af07SAsias He 
103fdf659dSSasha Levin struct vring_used_elem *virt_queue__set_used_elem(struct virt_queue *queue, u32 head, u32 len)
1139d6af07SAsias He {
1239d6af07SAsias He 	struct vring_used_elem *used_elem;
13407475bfSPekka Enberg 
1494902782SSasha Levin 	used_elem	= &queue->vring.used->ring[queue->vring.used->idx % queue->vring.num];
1539d6af07SAsias He 	used_elem->id	= head;
1639d6af07SAsias He 	used_elem->len	= len;
1794902782SSasha Levin 
1894902782SSasha Levin 	/*
1994902782SSasha Levin 	 * Use wmb to assure that used elem was updated with head and len.
2094902782SSasha Levin 	 * We need a wmb here since we can't advance idx unless we're ready
2194902782SSasha Levin 	 * to pass the used element to the guest.
2294902782SSasha Levin 	 */
2394902782SSasha Levin 	wmb();
2494902782SSasha Levin 	queue->vring.used->idx++;
2594902782SSasha Levin 
2694902782SSasha Levin 	/*
2794902782SSasha Levin 	 * Use wmb to assure used idx has been increased before we signal the guest.
2894902782SSasha Levin 	 * Without a wmb here the guest may ignore the queue since it won't see
2994902782SSasha Levin 	 * an updated idx.
3094902782SSasha Levin 	 */
3194902782SSasha Levin 	wmb();
3294902782SSasha Levin 
3339d6af07SAsias He 	return used_elem;
3439d6af07SAsias He }
3539d6af07SAsias He 
36*2fddfdb5SAsias He u16 virt_queue__get_head_iov(struct virt_queue *vq, struct iovec iov[], u16 *out, u16 *in, u16 head, struct kvm *kvm)
3739d6af07SAsias He {
3839d6af07SAsias He 	struct vring_desc *desc;
39*2fddfdb5SAsias He 	u16 idx;
4039d6af07SAsias He 
41*2fddfdb5SAsias He 	idx = head;
4239d6af07SAsias He 	*out = *in = 0;
4339d6af07SAsias He 
4439d6af07SAsias He 	do {
45*2fddfdb5SAsias He 		desc			 = virt_queue__get_desc(vq, idx);
4639d6af07SAsias He 		iov[*out + *in].iov_base = guest_flat_to_host(kvm, desc->addr);
4739d6af07SAsias He 		iov[*out + *in].iov_len	 = desc->len;
4839d6af07SAsias He 		if (desc->flags & VRING_DESC_F_WRITE)
4939d6af07SAsias He 			(*in)++;
5039d6af07SAsias He 		else
5139d6af07SAsias He 			(*out)++;
5239d6af07SAsias He 		if (desc->flags & VRING_DESC_F_NEXT)
5339d6af07SAsias He 			idx = desc->next;
5439d6af07SAsias He 		else
5539d6af07SAsias He 			break;
5639d6af07SAsias He 	} while (1);
5739d6af07SAsias He 
5839d6af07SAsias He 	return head;
5939d6af07SAsias He }
607f5ffaf5SAsias He 
61*2fddfdb5SAsias He u16 virt_queue__get_iov(struct virt_queue *vq, struct iovec iov[], u16 *out, u16 *in, struct kvm *kvm)
62*2fddfdb5SAsias He {
63*2fddfdb5SAsias He 	u16 head;
64*2fddfdb5SAsias He 
65*2fddfdb5SAsias He 	head = virt_queue__pop(vq);
66*2fddfdb5SAsias He 
67*2fddfdb5SAsias He 	return virt_queue__get_head_iov(vq, iov, out, in, head, kvm);
68*2fddfdb5SAsias He }
69*2fddfdb5SAsias He 
7008861bcfSAneesh Kumar K.V /* in and out are relative to guest */
7108861bcfSAneesh Kumar K.V u16 virt_queue__get_inout_iov(struct kvm *kvm, struct virt_queue *queue,
7208861bcfSAneesh Kumar K.V 			      struct iovec in_iov[], struct iovec out_iov[],
7308861bcfSAneesh Kumar K.V 			      u16 *in, u16 *out)
7408861bcfSAneesh Kumar K.V {
7508861bcfSAneesh Kumar K.V 	struct vring_desc *desc;
76*2fddfdb5SAsias He 	u16 head, idx;
7708861bcfSAneesh Kumar K.V 
7808861bcfSAneesh Kumar K.V 	idx = head = virt_queue__pop(queue);
7908861bcfSAneesh Kumar K.V 	*out = *in = 0;
8008861bcfSAneesh Kumar K.V 	do {
8108861bcfSAneesh Kumar K.V 		desc = virt_queue__get_desc(queue, idx);
8208861bcfSAneesh Kumar K.V 		if (desc->flags & VRING_DESC_F_WRITE) {
8308861bcfSAneesh Kumar K.V 			in_iov[*in].iov_base = guest_flat_to_host(kvm,
8408861bcfSAneesh Kumar K.V 								  desc->addr);
8508861bcfSAneesh Kumar K.V 			in_iov[*in].iov_len = desc->len;
8608861bcfSAneesh Kumar K.V 			(*in)++;
8708861bcfSAneesh Kumar K.V 		} else {
8808861bcfSAneesh Kumar K.V 			out_iov[*out].iov_base = guest_flat_to_host(kvm,
8908861bcfSAneesh Kumar K.V 								    desc->addr);
9008861bcfSAneesh Kumar K.V 			out_iov[*out].iov_len = desc->len;
9108861bcfSAneesh Kumar K.V 			(*out)++;
9208861bcfSAneesh Kumar K.V 		}
9308861bcfSAneesh Kumar K.V 		if (desc->flags & VRING_DESC_F_NEXT)
9408861bcfSAneesh Kumar K.V 			idx = desc->next;
9508861bcfSAneesh Kumar K.V 		else
9608861bcfSAneesh Kumar K.V 			break;
9708861bcfSAneesh Kumar K.V 	} while (1);
98*2fddfdb5SAsias He 
9908861bcfSAneesh Kumar K.V 	return head;
10008861bcfSAneesh Kumar K.V }
10108861bcfSAneesh Kumar K.V 
102c3a79fa1SSasha Levin int virtio__get_dev_specific_field(int offset, bool msix, bool features_hi, u32 *config_off)
103c3a79fa1SSasha Levin {
104c3a79fa1SSasha Levin 	if (msix) {
105c3a79fa1SSasha Levin 		if (offset < 4)
106c3a79fa1SSasha Levin 			return VIRTIO_PCI_O_MSIX;
107c3a79fa1SSasha Levin 		else
108c3a79fa1SSasha Levin 			offset -= 4;
109c3a79fa1SSasha Levin 	}
110c3a79fa1SSasha Levin 
111c3a79fa1SSasha Levin 	if (features_hi) {
112c3a79fa1SSasha Levin 		if (offset < 4)
113c3a79fa1SSasha Levin 			return VIRTIO_PCI_O_FEATURES;
114c3a79fa1SSasha Levin 		else
115c3a79fa1SSasha Levin 			offset -= 4;
116c3a79fa1SSasha Levin 	}
117c3a79fa1SSasha Levin 
118c3a79fa1SSasha Levin 	*config_off = offset;
119c3a79fa1SSasha Levin 
120c3a79fa1SSasha Levin 	return VIRTIO_PCI_O_CONFIG;
121c3a79fa1SSasha Levin }
12251b1454fSAsias He 
12351b1454fSAsias He bool virtio_queue__should_signal(struct virt_queue *vq)
12451b1454fSAsias He {
12551b1454fSAsias He 	u16 old_idx, new_idx, event_idx;
12651b1454fSAsias He 
12751b1454fSAsias He 	old_idx		= vq->last_used_signalled;
12851b1454fSAsias He 	new_idx		= vq->vring.used->idx;
12951b1454fSAsias He 	event_idx	= vring_used_event(&vq->vring);
13051b1454fSAsias He 
13151b1454fSAsias He 	if (vring_need_event(event_idx, new_idx, old_idx)) {
13251b1454fSAsias He 		vq->last_used_signalled = new_idx;
13351b1454fSAsias He 		return true;
13451b1454fSAsias He 	}
13551b1454fSAsias He 
13651b1454fSAsias He 	return false;
13751b1454fSAsias He }
138