1 /* Copyright (C) 2009 Red Hat, Inc.
2 * Author: Michael S. Tsirkin <mst@redhat.com>
4 * This work is licensed under the terms of the GNU GPL, version 2.
6 * virtio-net server in host kernel.
9 #include <linux/compat.h>
10 #include <linux/eventfd.h>
11 #include <linux/vhost.h>
12 #include <linux/virtio_net.h>
13 #include <linux/miscdevice.h>
14 #include <linux/module.h>
15 #include <linux/moduleparam.h>
16 #include <linux/mutex.h>
17 #include <linux/workqueue.h>
18 #include <linux/file.h>
19 #include <linux/slab.h>
20 #include <linux/sched/clock.h>
21 #include <linux/sched/signal.h>
22 #include <linux/vmalloc.h>
24 #include <linux/net.h>
25 #include <linux/if_packet.h>
26 #include <linux/if_arp.h>
27 #include <linux/if_tun.h>
28 #include <linux/if_macvlan.h>
29 #include <linux/if_tap.h>
30 #include <linux/if_vlan.h>
31 #include <linux/skb_array.h>
32 #include <linux/skbuff.h>
39 static int experimental_zcopytx
= 0;
40 module_param(experimental_zcopytx
, int, 0444);
41 MODULE_PARM_DESC(experimental_zcopytx
, "Enable Zero Copy TX;"
42 " 1 -Enable; 0 - Disable");
44 /* Max number of bytes transferred before requeueing the job.
45 * Using this limit prevents one virtqueue from starving others. */
46 #define VHOST_NET_WEIGHT 0x80000
48 /* Max number of packets transferred before requeueing the job.
49 * Using this limit prevents one virtqueue from starving others with small
52 #define VHOST_NET_PKT_WEIGHT 256
54 /* MAX number of TX used buffers for outstanding zerocopy */
55 #define VHOST_MAX_PEND 128
56 #define VHOST_GOODCOPY_LEN 256
59 * For transmit, used buffer len is unused; we override it to track buffer
60 * status internally; used for zerocopy tx only.
62 /* Lower device DMA failed */
63 #define VHOST_DMA_FAILED_LEN ((__force __virtio32)3)
64 /* Lower device DMA done */
65 #define VHOST_DMA_DONE_LEN ((__force __virtio32)2)
66 /* Lower device DMA in progress */
67 #define VHOST_DMA_IN_PROGRESS ((__force __virtio32)1)
69 #define VHOST_DMA_CLEAR_LEN ((__force __virtio32)0)
71 #define VHOST_DMA_IS_DONE(len) ((__force u32)(len) >= (__force u32)VHOST_DMA_DONE_LEN)
74 VHOST_NET_FEATURES
= VHOST_FEATURES
|
75 (1ULL << VHOST_NET_F_VIRTIO_NET_HDR
) |
76 (1ULL << VIRTIO_NET_F_MRG_RXBUF
) |
77 (1ULL << VIRTIO_F_IOMMU_PLATFORM
)
81 VHOST_NET_BACKEND_FEATURES
= (1ULL << VHOST_BACKEND_F_IOTLB_MSG_V2
)
90 struct vhost_net_ubuf_ref
{
91 /* refcount follows semantics similar to kref:
92 * 0: object is released
93 * 1: no outstanding ubufs
94 * >1: outstanding ubufs
97 wait_queue_head_t wait
;
98 struct vhost_virtqueue
*vq
;
101 #define VHOST_NET_BATCH 64
102 struct vhost_net_buf
{
108 struct vhost_net_virtqueue
{
109 struct vhost_virtqueue vq
;
112 /* vhost zerocopy support fields below: */
113 /* last used idx for outstanding DMA zerocopy buffers */
115 /* For TX, first used idx for DMA done zerocopy buffers
116 * For RX, number of batched heads
119 /* an array of userspace buffers info */
120 struct ubuf_info
*ubuf_info
;
121 /* Reference counting for outstanding ubufs.
122 * Protected by vq mutex. Writers must also take device mutex. */
123 struct vhost_net_ubuf_ref
*ubufs
;
124 struct ptr_ring
*rx_ring
;
125 struct vhost_net_buf rxq
;
129 struct vhost_dev dev
;
130 struct vhost_net_virtqueue vqs
[VHOST_NET_VQ_MAX
];
131 struct vhost_poll poll
[VHOST_NET_VQ_MAX
];
132 /* Number of TX recently submitted.
133 * Protected by tx vq lock. */
135 /* Number of times zerocopy TX recently failed.
136 * Protected by tx vq lock. */
137 unsigned tx_zcopy_err
;
138 /* Flush in progress. Protected by tx vq lock. */
142 static unsigned vhost_net_zcopy_mask __read_mostly
;
144 static void *vhost_net_buf_get_ptr(struct vhost_net_buf
*rxq
)
146 if (rxq
->tail
!= rxq
->head
)
147 return rxq
->queue
[rxq
->head
];
152 static int vhost_net_buf_get_size(struct vhost_net_buf
*rxq
)
154 return rxq
->tail
- rxq
->head
;
157 static int vhost_net_buf_is_empty(struct vhost_net_buf
*rxq
)
159 return rxq
->tail
== rxq
->head
;
162 static void *vhost_net_buf_consume(struct vhost_net_buf
*rxq
)
164 void *ret
= vhost_net_buf_get_ptr(rxq
);
169 static int vhost_net_buf_produce(struct vhost_net_virtqueue
*nvq
)
171 struct vhost_net_buf
*rxq
= &nvq
->rxq
;
174 rxq
->tail
= ptr_ring_consume_batched(nvq
->rx_ring
, rxq
->queue
,
179 static void vhost_net_buf_unproduce(struct vhost_net_virtqueue
*nvq
)
181 struct vhost_net_buf
*rxq
= &nvq
->rxq
;
183 if (nvq
->rx_ring
&& !vhost_net_buf_is_empty(rxq
)) {
184 ptr_ring_unconsume(nvq
->rx_ring
, rxq
->queue
+ rxq
->head
,
185 vhost_net_buf_get_size(rxq
),
187 rxq
->head
= rxq
->tail
= 0;
191 static int vhost_net_buf_peek_len(void *ptr
)
193 if (tun_is_xdp_frame(ptr
)) {
194 struct xdp_frame
*xdpf
= tun_ptr_to_xdp(ptr
);
199 return __skb_array_len_with_tag(ptr
);
202 static int vhost_net_buf_peek(struct vhost_net_virtqueue
*nvq
)
204 struct vhost_net_buf
*rxq
= &nvq
->rxq
;
206 if (!vhost_net_buf_is_empty(rxq
))
209 if (!vhost_net_buf_produce(nvq
))
213 return vhost_net_buf_peek_len(vhost_net_buf_get_ptr(rxq
));
216 static void vhost_net_buf_init(struct vhost_net_buf
*rxq
)
218 rxq
->head
= rxq
->tail
= 0;
221 static void vhost_net_enable_zcopy(int vq
)
223 vhost_net_zcopy_mask
|= 0x1 << vq
;
226 static struct vhost_net_ubuf_ref
*
227 vhost_net_ubuf_alloc(struct vhost_virtqueue
*vq
, bool zcopy
)
229 struct vhost_net_ubuf_ref
*ubufs
;
230 /* No zero copy backend? Nothing to count. */
233 ubufs
= kmalloc(sizeof(*ubufs
), GFP_KERNEL
);
235 return ERR_PTR(-ENOMEM
);
236 atomic_set(&ubufs
->refcount
, 1);
237 init_waitqueue_head(&ubufs
->wait
);
242 static int vhost_net_ubuf_put(struct vhost_net_ubuf_ref
*ubufs
)
244 int r
= atomic_sub_return(1, &ubufs
->refcount
);
246 wake_up(&ubufs
->wait
);
250 static void vhost_net_ubuf_put_and_wait(struct vhost_net_ubuf_ref
*ubufs
)
252 vhost_net_ubuf_put(ubufs
);
253 wait_event(ubufs
->wait
, !atomic_read(&ubufs
->refcount
));
256 static void vhost_net_ubuf_put_wait_and_free(struct vhost_net_ubuf_ref
*ubufs
)
258 vhost_net_ubuf_put_and_wait(ubufs
);
262 static void vhost_net_clear_ubuf_info(struct vhost_net
*n
)
266 for (i
= 0; i
< VHOST_NET_VQ_MAX
; ++i
) {
267 kfree(n
->vqs
[i
].ubuf_info
);
268 n
->vqs
[i
].ubuf_info
= NULL
;
272 static int vhost_net_set_ubuf_info(struct vhost_net
*n
)
277 for (i
= 0; i
< VHOST_NET_VQ_MAX
; ++i
) {
278 zcopy
= vhost_net_zcopy_mask
& (0x1 << i
);
281 n
->vqs
[i
].ubuf_info
=
282 kmalloc_array(UIO_MAXIOV
,
283 sizeof(*n
->vqs
[i
].ubuf_info
),
285 if (!n
->vqs
[i
].ubuf_info
)
291 vhost_net_clear_ubuf_info(n
);
295 static void vhost_net_vq_reset(struct vhost_net
*n
)
299 vhost_net_clear_ubuf_info(n
);
301 for (i
= 0; i
< VHOST_NET_VQ_MAX
; i
++) {
302 n
->vqs
[i
].done_idx
= 0;
303 n
->vqs
[i
].upend_idx
= 0;
304 n
->vqs
[i
].ubufs
= NULL
;
305 n
->vqs
[i
].vhost_hlen
= 0;
306 n
->vqs
[i
].sock_hlen
= 0;
307 vhost_net_buf_init(&n
->vqs
[i
].rxq
);
312 static void vhost_net_tx_packet(struct vhost_net
*net
)
315 if (net
->tx_packets
< 1024)
318 net
->tx_zcopy_err
= 0;
321 static void vhost_net_tx_err(struct vhost_net
*net
)
326 static bool vhost_net_tx_select_zcopy(struct vhost_net
*net
)
328 /* TX flush waits for outstanding DMAs to be done.
329 * Don't start new DMAs.
331 return !net
->tx_flush
&&
332 net
->tx_packets
/ 64 >= net
->tx_zcopy_err
;
335 static bool vhost_sock_zcopy(struct socket
*sock
)
337 return unlikely(experimental_zcopytx
) &&
338 sock_flag(sock
->sk
, SOCK_ZEROCOPY
);
341 /* In case of DMA done not in order in lower device driver for some reason.
342 * upend_idx is used to track end of used idx, done_idx is used to track head
343 * of used idx. Once lower device DMA done contiguously, we will signal KVM
346 static void vhost_zerocopy_signal_used(struct vhost_net
*net
,
347 struct vhost_virtqueue
*vq
)
349 struct vhost_net_virtqueue
*nvq
=
350 container_of(vq
, struct vhost_net_virtqueue
, vq
);
354 for (i
= nvq
->done_idx
; i
!= nvq
->upend_idx
; i
= (i
+ 1) % UIO_MAXIOV
) {
355 if (vq
->heads
[i
].len
== VHOST_DMA_FAILED_LEN
)
356 vhost_net_tx_err(net
);
357 if (VHOST_DMA_IS_DONE(vq
->heads
[i
].len
)) {
358 vq
->heads
[i
].len
= VHOST_DMA_CLEAR_LEN
;
364 add
= min(UIO_MAXIOV
- nvq
->done_idx
, j
);
365 vhost_add_used_and_signal_n(vq
->dev
, vq
,
366 &vq
->heads
[nvq
->done_idx
], add
);
367 nvq
->done_idx
= (nvq
->done_idx
+ add
) % UIO_MAXIOV
;
372 static void vhost_zerocopy_callback(struct ubuf_info
*ubuf
, bool success
)
374 struct vhost_net_ubuf_ref
*ubufs
= ubuf
->ctx
;
375 struct vhost_virtqueue
*vq
= ubufs
->vq
;
380 /* set len to mark this desc buffers done DMA */
381 vq
->heads
[ubuf
->desc
].len
= success
?
382 VHOST_DMA_DONE_LEN
: VHOST_DMA_FAILED_LEN
;
383 cnt
= vhost_net_ubuf_put(ubufs
);
386 * Trigger polling thread if guest stopped submitting new buffers:
387 * in this case, the refcount after decrement will eventually reach 1.
388 * We also trigger polling periodically after each 16 packets
389 * (the value 16 here is more or less arbitrary, it's tuned to trigger
390 * less than 10% of times).
392 if (cnt
<= 1 || !(cnt
% 16))
393 vhost_poll_queue(&vq
->poll
);
395 rcu_read_unlock_bh();
398 static inline unsigned long busy_clock(void)
400 return local_clock() >> 10;
403 static bool vhost_can_busy_poll(unsigned long endtime
)
405 return likely(!need_resched() && !time_after(busy_clock(), endtime
) &&
406 !signal_pending(current
));
409 static void vhost_net_disable_vq(struct vhost_net
*n
,
410 struct vhost_virtqueue
*vq
)
412 struct vhost_net_virtqueue
*nvq
=
413 container_of(vq
, struct vhost_net_virtqueue
, vq
);
414 struct vhost_poll
*poll
= n
->poll
+ (nvq
- n
->vqs
);
415 if (!vq
->private_data
)
417 vhost_poll_stop(poll
);
420 static int vhost_net_enable_vq(struct vhost_net
*n
,
421 struct vhost_virtqueue
*vq
)
423 struct vhost_net_virtqueue
*nvq
=
424 container_of(vq
, struct vhost_net_virtqueue
, vq
);
425 struct vhost_poll
*poll
= n
->poll
+ (nvq
- n
->vqs
);
428 sock
= vq
->private_data
;
432 return vhost_poll_start(poll
, sock
->file
);
435 static void vhost_net_signal_used(struct vhost_net_virtqueue
*nvq
)
437 struct vhost_virtqueue
*vq
= &nvq
->vq
;
438 struct vhost_dev
*dev
= vq
->dev
;
443 vhost_add_used_and_signal_n(dev
, vq
, vq
->heads
, nvq
->done_idx
);
447 static int vhost_net_tx_get_vq_desc(struct vhost_net
*net
,
448 struct vhost_net_virtqueue
*nvq
,
449 unsigned int *out_num
, unsigned int *in_num
,
452 struct vhost_virtqueue
*vq
= &nvq
->vq
;
453 unsigned long uninitialized_var(endtime
);
454 int r
= vhost_get_vq_desc(vq
, vq
->iov
, ARRAY_SIZE(vq
->iov
),
455 out_num
, in_num
, NULL
, NULL
);
457 if (r
== vq
->num
&& vq
->busyloop_timeout
) {
458 if (!vhost_sock_zcopy(vq
->private_data
))
459 vhost_net_signal_used(nvq
);
461 endtime
= busy_clock() + vq
->busyloop_timeout
;
462 while (vhost_can_busy_poll(endtime
)) {
463 if (vhost_has_work(vq
->dev
)) {
464 *busyloop_intr
= true;
467 if (!vhost_vq_avail_empty(vq
->dev
, vq
))
472 r
= vhost_get_vq_desc(vq
, vq
->iov
, ARRAY_SIZE(vq
->iov
),
473 out_num
, in_num
, NULL
, NULL
);
479 static bool vhost_exceeds_maxpend(struct vhost_net
*net
)
481 struct vhost_net_virtqueue
*nvq
= &net
->vqs
[VHOST_NET_VQ_TX
];
482 struct vhost_virtqueue
*vq
= &nvq
->vq
;
484 return (nvq
->upend_idx
+ UIO_MAXIOV
- nvq
->done_idx
) % UIO_MAXIOV
>
485 min_t(unsigned int, VHOST_MAX_PEND
, vq
->num
>> 2);
488 static size_t init_iov_iter(struct vhost_virtqueue
*vq
, struct iov_iter
*iter
,
489 size_t hdr_size
, int out
)
491 /* Skip header. TODO: support TSO. */
492 size_t len
= iov_length(vq
->iov
, out
);
494 iov_iter_init(iter
, WRITE
, vq
->iov
, out
, len
);
495 iov_iter_advance(iter
, hdr_size
);
497 return iov_iter_count(iter
);
500 static int get_tx_bufs(struct vhost_net
*net
,
501 struct vhost_net_virtqueue
*nvq
,
503 unsigned int *out
, unsigned int *in
,
504 size_t *len
, bool *busyloop_intr
)
506 struct vhost_virtqueue
*vq
= &nvq
->vq
;
509 ret
= vhost_net_tx_get_vq_desc(net
, nvq
, out
, in
, busyloop_intr
);
511 if (ret
< 0 || ret
== vq
->num
)
515 vq_err(vq
, "Unexpected descriptor format for TX: out %d, int %d\n",
521 *len
= init_iov_iter(vq
, &msg
->msg_iter
, nvq
->vhost_hlen
, *out
);
523 vq_err(vq
, "Unexpected header len for TX: %zd expected %zd\n",
524 *len
, nvq
->vhost_hlen
);
531 static bool tx_can_batch(struct vhost_virtqueue
*vq
, size_t total_len
)
533 return total_len
< VHOST_NET_WEIGHT
&&
534 !vhost_vq_avail_empty(vq
->dev
, vq
);
537 static void handle_tx_copy(struct vhost_net
*net
, struct socket
*sock
)
539 struct vhost_net_virtqueue
*nvq
= &net
->vqs
[VHOST_NET_VQ_TX
];
540 struct vhost_virtqueue
*vq
= &nvq
->vq
;
543 struct msghdr msg
= {
548 .msg_flags
= MSG_DONTWAIT
,
550 size_t len
, total_len
= 0;
555 bool busyloop_intr
= false;
557 head
= get_tx_bufs(net
, nvq
, &msg
, &out
, &in
, &len
,
559 /* On error, stop handling until the next kick. */
560 if (unlikely(head
< 0))
562 /* Nothing new? Wait for eventfd to tell us they refilled. */
563 if (head
== vq
->num
) {
564 if (unlikely(busyloop_intr
)) {
565 vhost_poll_queue(&vq
->poll
);
566 } else if (unlikely(vhost_enable_notify(&net
->dev
,
568 vhost_disable_notify(&net
->dev
, vq
);
574 vq
->heads
[nvq
->done_idx
].id
= cpu_to_vhost32(vq
, head
);
575 vq
->heads
[nvq
->done_idx
].len
= 0;
578 if (tx_can_batch(vq
, total_len
))
579 msg
.msg_flags
|= MSG_MORE
;
581 msg
.msg_flags
&= ~MSG_MORE
;
583 /* TODO: Check specific error and bomb out unless ENOBUFS? */
584 err
= sock
->ops
->sendmsg(sock
, &msg
, len
);
585 if (unlikely(err
< 0)) {
586 vhost_discard_vq_desc(vq
, 1);
587 vhost_net_enable_vq(net
, vq
);
591 pr_debug("Truncated TX packet: len %d != %zd\n",
593 if (++nvq
->done_idx
>= VHOST_NET_BATCH
)
594 vhost_net_signal_used(nvq
);
595 } while (likely(!vhost_exceeds_weight(vq
, ++sent_pkts
, total_len
)));
597 vhost_net_signal_used(nvq
);
600 static void handle_tx_zerocopy(struct vhost_net
*net
, struct socket
*sock
)
602 struct vhost_net_virtqueue
*nvq
= &net
->vqs
[VHOST_NET_VQ_TX
];
603 struct vhost_virtqueue
*vq
= &nvq
->vq
;
606 struct msghdr msg
= {
611 .msg_flags
= MSG_DONTWAIT
,
613 size_t len
, total_len
= 0;
615 struct vhost_net_ubuf_ref
*uninitialized_var(ubufs
);
622 /* Release DMAs done buffers first */
623 vhost_zerocopy_signal_used(net
, vq
);
625 busyloop_intr
= false;
626 head
= get_tx_bufs(net
, nvq
, &msg
, &out
, &in
, &len
,
628 /* On error, stop handling until the next kick. */
629 if (unlikely(head
< 0))
631 /* Nothing new? Wait for eventfd to tell us they refilled. */
632 if (head
== vq
->num
) {
633 if (unlikely(busyloop_intr
)) {
634 vhost_poll_queue(&vq
->poll
);
635 } else if (unlikely(vhost_enable_notify(&net
->dev
, vq
))) {
636 vhost_disable_notify(&net
->dev
, vq
);
642 zcopy_used
= len
>= VHOST_GOODCOPY_LEN
643 && !vhost_exceeds_maxpend(net
)
644 && vhost_net_tx_select_zcopy(net
);
646 /* use msg_control to pass vhost zerocopy ubuf info to skb */
648 struct ubuf_info
*ubuf
;
649 ubuf
= nvq
->ubuf_info
+ nvq
->upend_idx
;
651 vq
->heads
[nvq
->upend_idx
].id
= cpu_to_vhost32(vq
, head
);
652 vq
->heads
[nvq
->upend_idx
].len
= VHOST_DMA_IN_PROGRESS
;
653 ubuf
->callback
= vhost_zerocopy_callback
;
654 ubuf
->ctx
= nvq
->ubufs
;
655 ubuf
->desc
= nvq
->upend_idx
;
656 refcount_set(&ubuf
->refcnt
, 1);
657 msg
.msg_control
= ubuf
;
658 msg
.msg_controllen
= sizeof(ubuf
);
660 atomic_inc(&ubufs
->refcount
);
661 nvq
->upend_idx
= (nvq
->upend_idx
+ 1) % UIO_MAXIOV
;
663 msg
.msg_control
= NULL
;
667 if (tx_can_batch(vq
, total_len
) &&
668 likely(!vhost_exceeds_maxpend(net
))) {
669 msg
.msg_flags
|= MSG_MORE
;
671 msg
.msg_flags
&= ~MSG_MORE
;
674 /* TODO: Check specific error and bomb out unless ENOBUFS? */
675 err
= sock
->ops
->sendmsg(sock
, &msg
, len
);
676 if (unlikely(err
< 0)) {
678 vhost_net_ubuf_put(ubufs
);
679 nvq
->upend_idx
= ((unsigned)nvq
->upend_idx
- 1)
682 vhost_discard_vq_desc(vq
, 1);
683 vhost_net_enable_vq(net
, vq
);
687 pr_debug("Truncated TX packet: "
688 " len %d != %zd\n", err
, len
);
690 vhost_add_used_and_signal(&net
->dev
, vq
, head
, 0);
692 vhost_zerocopy_signal_used(net
, vq
);
693 vhost_net_tx_packet(net
);
694 } while (likely(!vhost_exceeds_weight(vq
, ++sent_pkts
, total_len
)));
697 /* Expects to be always run from workqueue - which acts as
698 * read-size critical section for our kind of RCU. */
699 static void handle_tx(struct vhost_net
*net
)
701 struct vhost_net_virtqueue
*nvq
= &net
->vqs
[VHOST_NET_VQ_TX
];
702 struct vhost_virtqueue
*vq
= &nvq
->vq
;
705 mutex_lock(&vq
->mutex
);
706 sock
= vq
->private_data
;
710 if (!vq_iotlb_prefetch(vq
))
713 vhost_disable_notify(&net
->dev
, vq
);
714 vhost_net_disable_vq(net
, vq
);
716 if (vhost_sock_zcopy(sock
))
717 handle_tx_zerocopy(net
, sock
);
719 handle_tx_copy(net
, sock
);
722 mutex_unlock(&vq
->mutex
);
725 static int peek_head_len(struct vhost_net_virtqueue
*rvq
, struct sock
*sk
)
727 struct sk_buff
*head
;
732 return vhost_net_buf_peek(rvq
);
734 spin_lock_irqsave(&sk
->sk_receive_queue
.lock
, flags
);
735 head
= skb_peek(&sk
->sk_receive_queue
);
738 if (skb_vlan_tag_present(head
))
742 spin_unlock_irqrestore(&sk
->sk_receive_queue
.lock
, flags
);
746 static int sk_has_rx_data(struct sock
*sk
)
748 struct socket
*sock
= sk
->sk_socket
;
750 if (sock
->ops
->peek_len
)
751 return sock
->ops
->peek_len(sock
);
753 return skb_queue_empty(&sk
->sk_receive_queue
);
756 static int vhost_net_rx_peek_head_len(struct vhost_net
*net
, struct sock
*sk
,
759 struct vhost_net_virtqueue
*rnvq
= &net
->vqs
[VHOST_NET_VQ_RX
];
760 struct vhost_net_virtqueue
*tnvq
= &net
->vqs
[VHOST_NET_VQ_TX
];
761 struct vhost_virtqueue
*rvq
= &rnvq
->vq
;
762 struct vhost_virtqueue
*tvq
= &tnvq
->vq
;
763 unsigned long uninitialized_var(endtime
);
764 int len
= peek_head_len(rnvq
, sk
);
766 if (!len
&& tvq
->busyloop_timeout
) {
767 /* Flush batched heads first */
768 vhost_net_signal_used(rnvq
);
769 /* Both tx vq and rx socket were polled here */
770 mutex_lock_nested(&tvq
->mutex
, 1);
771 vhost_disable_notify(&net
->dev
, tvq
);
774 endtime
= busy_clock() + tvq
->busyloop_timeout
;
776 while (vhost_can_busy_poll(endtime
)) {
777 if (vhost_has_work(&net
->dev
)) {
778 *busyloop_intr
= true;
781 if ((sk_has_rx_data(sk
) &&
782 !vhost_vq_avail_empty(&net
->dev
, rvq
)) ||
783 !vhost_vq_avail_empty(&net
->dev
, tvq
))
790 if (!vhost_vq_avail_empty(&net
->dev
, tvq
)) {
791 vhost_poll_queue(&tvq
->poll
);
792 } else if (unlikely(vhost_enable_notify(&net
->dev
, tvq
))) {
793 vhost_disable_notify(&net
->dev
, tvq
);
794 vhost_poll_queue(&tvq
->poll
);
797 mutex_unlock(&tvq
->mutex
);
799 len
= peek_head_len(rnvq
, sk
);
805 /* This is a multi-buffer version of vhost_get_desc, that works if
806 * vq has read descriptors only.
807 * @vq - the relevant virtqueue
808 * @datalen - data length we'll be reading
809 * @iovcount - returned count of io vectors we fill
811 * @log_num - log offset
812 * @quota - headcount quota, 1 for big buffer
813 * returns number of buffer heads allocated, negative on error
815 static int get_rx_bufs(struct vhost_virtqueue
*vq
,
816 struct vring_used_elem
*heads
,
819 struct vhost_log
*log
,
823 unsigned int out
, in
;
828 /* len is always initialized before use since we are always called with
831 u32
uninitialized_var(len
);
833 while (datalen
> 0 && headcount
< quota
) {
834 if (unlikely(seg
>= UIO_MAXIOV
)) {
838 r
= vhost_get_vq_desc(vq
, vq
->iov
+ seg
,
839 ARRAY_SIZE(vq
->iov
) - seg
, &out
,
849 if (unlikely(out
|| in
<= 0)) {
850 vq_err(vq
, "unexpected descriptor format for RX: "
851 "out %d, in %d\n", out
, in
);
859 heads
[headcount
].id
= cpu_to_vhost32(vq
, d
);
860 len
= iov_length(vq
->iov
+ seg
, in
);
861 heads
[headcount
].len
= cpu_to_vhost32(vq
, len
);
866 heads
[headcount
- 1].len
= cpu_to_vhost32(vq
, len
+ datalen
);
872 if (unlikely(datalen
> 0)) {
878 vhost_discard_vq_desc(vq
, headcount
);
882 /* Expects to be always run from workqueue - which acts as
883 * read-size critical section for our kind of RCU. */
884 static void handle_rx(struct vhost_net
*net
)
886 struct vhost_net_virtqueue
*nvq
= &net
->vqs
[VHOST_NET_VQ_RX
];
887 struct vhost_virtqueue
*vq
= &nvq
->vq
;
888 unsigned uninitialized_var(in
), log
;
889 struct vhost_log
*vq_log
;
890 struct msghdr msg
= {
893 .msg_control
= NULL
, /* FIXME: get and handle RX aux data. */
895 .msg_flags
= MSG_DONTWAIT
,
897 struct virtio_net_hdr hdr
= {
899 .gso_type
= VIRTIO_NET_HDR_GSO_NONE
901 size_t total_len
= 0;
904 size_t vhost_hlen
, sock_hlen
;
905 size_t vhost_len
, sock_len
;
906 bool busyloop_intr
= false;
908 struct iov_iter fixup
;
909 __virtio16 num_buffers
;
912 mutex_lock_nested(&vq
->mutex
, 0);
913 sock
= vq
->private_data
;
917 if (!vq_iotlb_prefetch(vq
))
920 vhost_disable_notify(&net
->dev
, vq
);
921 vhost_net_disable_vq(net
, vq
);
923 vhost_hlen
= nvq
->vhost_hlen
;
924 sock_hlen
= nvq
->sock_hlen
;
926 vq_log
= unlikely(vhost_has_feature(vq
, VHOST_F_LOG_ALL
)) ?
928 mergeable
= vhost_has_feature(vq
, VIRTIO_NET_F_MRG_RXBUF
);
931 sock_len
= vhost_net_rx_peek_head_len(net
, sock
->sk
,
935 sock_len
+= sock_hlen
;
936 vhost_len
= sock_len
+ vhost_hlen
;
937 headcount
= get_rx_bufs(vq
, vq
->heads
+ nvq
->done_idx
,
938 vhost_len
, &in
, vq_log
, &log
,
939 likely(mergeable
) ? UIO_MAXIOV
: 1);
940 /* On error, stop handling until the next kick. */
941 if (unlikely(headcount
< 0))
943 /* OK, now we need to know about added descriptors. */
945 if (unlikely(busyloop_intr
)) {
946 vhost_poll_queue(&vq
->poll
);
947 } else if (unlikely(vhost_enable_notify(&net
->dev
, vq
))) {
948 /* They have slipped one in as we were
949 * doing that: check again. */
950 vhost_disable_notify(&net
->dev
, vq
);
953 /* Nothing new? Wait for eventfd to tell us
957 busyloop_intr
= false;
959 msg
.msg_control
= vhost_net_buf_consume(&nvq
->rxq
);
960 /* On overrun, truncate and discard */
961 if (unlikely(headcount
> UIO_MAXIOV
)) {
962 iov_iter_init(&msg
.msg_iter
, READ
, vq
->iov
, 1, 1);
963 err
= sock
->ops
->recvmsg(sock
, &msg
,
964 1, MSG_DONTWAIT
| MSG_TRUNC
);
965 pr_debug("Discarded rx packet: len %zd\n", sock_len
);
968 /* We don't need to be notified again. */
969 iov_iter_init(&msg
.msg_iter
, READ
, vq
->iov
, in
, vhost_len
);
970 fixup
= msg
.msg_iter
;
971 if (unlikely((vhost_hlen
))) {
972 /* We will supply the header ourselves
975 iov_iter_advance(&msg
.msg_iter
, vhost_hlen
);
977 err
= sock
->ops
->recvmsg(sock
, &msg
,
978 sock_len
, MSG_DONTWAIT
| MSG_TRUNC
);
979 /* Userspace might have consumed the packet meanwhile:
980 * it's not supposed to do this usually, but might be hard
981 * to prevent. Discard data we got (if any) and keep going. */
982 if (unlikely(err
!= sock_len
)) {
983 pr_debug("Discarded rx packet: "
984 " len %d, expected %zd\n", err
, sock_len
);
985 vhost_discard_vq_desc(vq
, headcount
);
988 /* Supply virtio_net_hdr if VHOST_NET_F_VIRTIO_NET_HDR */
989 if (unlikely(vhost_hlen
)) {
990 if (copy_to_iter(&hdr
, sizeof(hdr
),
991 &fixup
) != sizeof(hdr
)) {
992 vq_err(vq
, "Unable to write vnet_hdr "
993 "at addr %p\n", vq
->iov
->iov_base
);
997 /* Header came from socket; we'll need to patch
998 * ->num_buffers over if VIRTIO_NET_F_MRG_RXBUF
1000 iov_iter_advance(&fixup
, sizeof(hdr
));
1002 /* TODO: Should check and handle checksum. */
1004 num_buffers
= cpu_to_vhost16(vq
, headcount
);
1005 if (likely(mergeable
) &&
1006 copy_to_iter(&num_buffers
, sizeof num_buffers
,
1007 &fixup
) != sizeof num_buffers
) {
1008 vq_err(vq
, "Failed num_buffers write");
1009 vhost_discard_vq_desc(vq
, headcount
);
1012 nvq
->done_idx
+= headcount
;
1013 if (nvq
->done_idx
> VHOST_NET_BATCH
)
1014 vhost_net_signal_used(nvq
);
1015 if (unlikely(vq_log
))
1016 vhost_log_write(vq
, vq_log
, log
, vhost_len
,
1018 total_len
+= vhost_len
;
1019 } while (likely(!vhost_exceeds_weight(vq
, ++recv_pkts
, total_len
)));
1021 if (unlikely(busyloop_intr
))
1022 vhost_poll_queue(&vq
->poll
);
1024 vhost_net_enable_vq(net
, vq
);
1026 vhost_net_signal_used(nvq
);
1027 mutex_unlock(&vq
->mutex
);
1030 static void handle_tx_kick(struct vhost_work
*work
)
1032 struct vhost_virtqueue
*vq
= container_of(work
, struct vhost_virtqueue
,
1034 struct vhost_net
*net
= container_of(vq
->dev
, struct vhost_net
, dev
);
1039 static void handle_rx_kick(struct vhost_work
*work
)
1041 struct vhost_virtqueue
*vq
= container_of(work
, struct vhost_virtqueue
,
1043 struct vhost_net
*net
= container_of(vq
->dev
, struct vhost_net
, dev
);
1048 static void handle_tx_net(struct vhost_work
*work
)
1050 struct vhost_net
*net
= container_of(work
, struct vhost_net
,
1051 poll
[VHOST_NET_VQ_TX
].work
);
1055 static void handle_rx_net(struct vhost_work
*work
)
1057 struct vhost_net
*net
= container_of(work
, struct vhost_net
,
1058 poll
[VHOST_NET_VQ_RX
].work
);
1062 static int vhost_net_open(struct inode
*inode
, struct file
*f
)
1064 struct vhost_net
*n
;
1065 struct vhost_dev
*dev
;
1066 struct vhost_virtqueue
**vqs
;
1070 n
= kvmalloc(sizeof *n
, GFP_KERNEL
| __GFP_RETRY_MAYFAIL
);
1073 vqs
= kmalloc_array(VHOST_NET_VQ_MAX
, sizeof(*vqs
), GFP_KERNEL
);
1079 queue
= kmalloc_array(VHOST_NET_BATCH
, sizeof(void *),
1086 n
->vqs
[VHOST_NET_VQ_RX
].rxq
.queue
= queue
;
1089 vqs
[VHOST_NET_VQ_TX
] = &n
->vqs
[VHOST_NET_VQ_TX
].vq
;
1090 vqs
[VHOST_NET_VQ_RX
] = &n
->vqs
[VHOST_NET_VQ_RX
].vq
;
1091 n
->vqs
[VHOST_NET_VQ_TX
].vq
.handle_kick
= handle_tx_kick
;
1092 n
->vqs
[VHOST_NET_VQ_RX
].vq
.handle_kick
= handle_rx_kick
;
1093 for (i
= 0; i
< VHOST_NET_VQ_MAX
; i
++) {
1094 n
->vqs
[i
].ubufs
= NULL
;
1095 n
->vqs
[i
].ubuf_info
= NULL
;
1096 n
->vqs
[i
].upend_idx
= 0;
1097 n
->vqs
[i
].done_idx
= 0;
1098 n
->vqs
[i
].vhost_hlen
= 0;
1099 n
->vqs
[i
].sock_hlen
= 0;
1100 n
->vqs
[i
].rx_ring
= NULL
;
1101 vhost_net_buf_init(&n
->vqs
[i
].rxq
);
1103 vhost_dev_init(dev
, vqs
, VHOST_NET_VQ_MAX
,
1104 UIO_MAXIOV
+ VHOST_NET_BATCH
,
1105 VHOST_NET_PKT_WEIGHT
, VHOST_NET_WEIGHT
);
1107 vhost_poll_init(n
->poll
+ VHOST_NET_VQ_TX
, handle_tx_net
, EPOLLOUT
, dev
);
1108 vhost_poll_init(n
->poll
+ VHOST_NET_VQ_RX
, handle_rx_net
, EPOLLIN
, dev
);
1110 f
->private_data
= n
;
1115 static struct socket
*vhost_net_stop_vq(struct vhost_net
*n
,
1116 struct vhost_virtqueue
*vq
)
1118 struct socket
*sock
;
1119 struct vhost_net_virtqueue
*nvq
=
1120 container_of(vq
, struct vhost_net_virtqueue
, vq
);
1122 mutex_lock(&vq
->mutex
);
1123 sock
= vq
->private_data
;
1124 vhost_net_disable_vq(n
, vq
);
1125 vq
->private_data
= NULL
;
1126 vhost_net_buf_unproduce(nvq
);
1127 nvq
->rx_ring
= NULL
;
1128 mutex_unlock(&vq
->mutex
);
1132 static void vhost_net_stop(struct vhost_net
*n
, struct socket
**tx_sock
,
1133 struct socket
**rx_sock
)
1135 *tx_sock
= vhost_net_stop_vq(n
, &n
->vqs
[VHOST_NET_VQ_TX
].vq
);
1136 *rx_sock
= vhost_net_stop_vq(n
, &n
->vqs
[VHOST_NET_VQ_RX
].vq
);
1139 static void vhost_net_flush_vq(struct vhost_net
*n
, int index
)
1141 vhost_poll_flush(n
->poll
+ index
);
1142 vhost_poll_flush(&n
->vqs
[index
].vq
.poll
);
1145 static void vhost_net_flush(struct vhost_net
*n
)
1147 vhost_net_flush_vq(n
, VHOST_NET_VQ_TX
);
1148 vhost_net_flush_vq(n
, VHOST_NET_VQ_RX
);
1149 if (n
->vqs
[VHOST_NET_VQ_TX
].ubufs
) {
1150 mutex_lock(&n
->vqs
[VHOST_NET_VQ_TX
].vq
.mutex
);
1152 mutex_unlock(&n
->vqs
[VHOST_NET_VQ_TX
].vq
.mutex
);
1153 /* Wait for all lower device DMAs done. */
1154 vhost_net_ubuf_put_and_wait(n
->vqs
[VHOST_NET_VQ_TX
].ubufs
);
1155 mutex_lock(&n
->vqs
[VHOST_NET_VQ_TX
].vq
.mutex
);
1156 n
->tx_flush
= false;
1157 atomic_set(&n
->vqs
[VHOST_NET_VQ_TX
].ubufs
->refcount
, 1);
1158 mutex_unlock(&n
->vqs
[VHOST_NET_VQ_TX
].vq
.mutex
);
1162 static int vhost_net_release(struct inode
*inode
, struct file
*f
)
1164 struct vhost_net
*n
= f
->private_data
;
1165 struct socket
*tx_sock
;
1166 struct socket
*rx_sock
;
1168 vhost_net_stop(n
, &tx_sock
, &rx_sock
);
1170 vhost_dev_stop(&n
->dev
);
1171 vhost_dev_cleanup(&n
->dev
);
1172 vhost_net_vq_reset(n
);
1174 sockfd_put(tx_sock
);
1176 sockfd_put(rx_sock
);
1177 /* Make sure no callbacks are outstanding */
1178 synchronize_rcu_bh();
1179 /* We do an extra flush before freeing memory,
1180 * since jobs can re-queue themselves. */
1182 kfree(n
->vqs
[VHOST_NET_VQ_RX
].rxq
.queue
);
1188 static struct socket
*get_raw_socket(int fd
)
1191 struct socket
*sock
= sockfd_lookup(fd
, &r
);
1194 return ERR_PTR(-ENOTSOCK
);
1196 /* Parameter checking */
1197 if (sock
->sk
->sk_type
!= SOCK_RAW
) {
1198 r
= -ESOCKTNOSUPPORT
;
1202 if (sock
->sk
->sk_family
!= AF_PACKET
) {
1212 static struct ptr_ring
*get_tap_ptr_ring(int fd
)
1214 struct ptr_ring
*ring
;
1215 struct file
*file
= fget(fd
);
1219 ring
= tun_get_tx_ring(file
);
1222 ring
= tap_get_ptr_ring(file
);
1231 static struct socket
*get_tap_socket(int fd
)
1233 struct file
*file
= fget(fd
);
1234 struct socket
*sock
;
1237 return ERR_PTR(-EBADF
);
1238 sock
= tun_get_socket(file
);
1241 sock
= tap_get_socket(file
);
1247 static struct socket
*get_socket(int fd
)
1249 struct socket
*sock
;
1251 /* special case to disable backend */
1254 sock
= get_raw_socket(fd
);
1257 sock
= get_tap_socket(fd
);
1260 return ERR_PTR(-ENOTSOCK
);
1263 static long vhost_net_set_backend(struct vhost_net
*n
, unsigned index
, int fd
)
1265 struct socket
*sock
, *oldsock
;
1266 struct vhost_virtqueue
*vq
;
1267 struct vhost_net_virtqueue
*nvq
;
1268 struct vhost_net_ubuf_ref
*ubufs
, *oldubufs
= NULL
;
1271 mutex_lock(&n
->dev
.mutex
);
1272 r
= vhost_dev_check_owner(&n
->dev
);
1276 if (index
>= VHOST_NET_VQ_MAX
) {
1280 vq
= &n
->vqs
[index
].vq
;
1281 nvq
= &n
->vqs
[index
];
1282 mutex_lock(&vq
->mutex
);
1284 /* Verify that ring has been setup correctly. */
1285 if (!vhost_vq_access_ok(vq
)) {
1289 sock
= get_socket(fd
);
1295 /* start polling new socket */
1296 oldsock
= vq
->private_data
;
1297 if (sock
!= oldsock
) {
1298 ubufs
= vhost_net_ubuf_alloc(vq
,
1299 sock
&& vhost_sock_zcopy(sock
));
1300 if (IS_ERR(ubufs
)) {
1305 vhost_net_disable_vq(n
, vq
);
1306 vq
->private_data
= sock
;
1307 vhost_net_buf_unproduce(nvq
);
1308 r
= vhost_vq_init_access(vq
);
1311 r
= vhost_net_enable_vq(n
, vq
);
1314 if (index
== VHOST_NET_VQ_RX
)
1315 nvq
->rx_ring
= get_tap_ptr_ring(fd
);
1317 oldubufs
= nvq
->ubufs
;
1321 n
->tx_zcopy_err
= 0;
1322 n
->tx_flush
= false;
1325 mutex_unlock(&vq
->mutex
);
1328 vhost_net_ubuf_put_wait_and_free(oldubufs
);
1329 mutex_lock(&vq
->mutex
);
1330 vhost_zerocopy_signal_used(n
, vq
);
1331 mutex_unlock(&vq
->mutex
);
1335 vhost_net_flush_vq(n
, index
);
1336 sockfd_put(oldsock
);
1339 mutex_unlock(&n
->dev
.mutex
);
1343 vq
->private_data
= oldsock
;
1344 vhost_net_enable_vq(n
, vq
);
1346 vhost_net_ubuf_put_wait_and_free(ubufs
);
1351 mutex_unlock(&vq
->mutex
);
1353 mutex_unlock(&n
->dev
.mutex
);
1357 static long vhost_net_reset_owner(struct vhost_net
*n
)
1359 struct socket
*tx_sock
= NULL
;
1360 struct socket
*rx_sock
= NULL
;
1362 struct vhost_umem
*umem
;
1364 mutex_lock(&n
->dev
.mutex
);
1365 err
= vhost_dev_check_owner(&n
->dev
);
1368 umem
= vhost_dev_reset_owner_prepare();
1373 vhost_net_stop(n
, &tx_sock
, &rx_sock
);
1375 vhost_dev_stop(&n
->dev
);
1376 vhost_dev_reset_owner(&n
->dev
, umem
);
1377 vhost_net_vq_reset(n
);
1379 mutex_unlock(&n
->dev
.mutex
);
1381 sockfd_put(tx_sock
);
1383 sockfd_put(rx_sock
);
1387 static int vhost_net_set_backend_features(struct vhost_net
*n
, u64 features
)
1391 mutex_lock(&n
->dev
.mutex
);
1392 for (i
= 0; i
< VHOST_NET_VQ_MAX
; ++i
) {
1393 mutex_lock(&n
->vqs
[i
].vq
.mutex
);
1394 n
->vqs
[i
].vq
.acked_backend_features
= features
;
1395 mutex_unlock(&n
->vqs
[i
].vq
.mutex
);
1397 mutex_unlock(&n
->dev
.mutex
);
1402 static int vhost_net_set_features(struct vhost_net
*n
, u64 features
)
1404 size_t vhost_hlen
, sock_hlen
, hdr_len
;
1407 hdr_len
= (features
& ((1ULL << VIRTIO_NET_F_MRG_RXBUF
) |
1408 (1ULL << VIRTIO_F_VERSION_1
))) ?
1409 sizeof(struct virtio_net_hdr_mrg_rxbuf
) :
1410 sizeof(struct virtio_net_hdr
);
1411 if (features
& (1 << VHOST_NET_F_VIRTIO_NET_HDR
)) {
1412 /* vhost provides vnet_hdr */
1413 vhost_hlen
= hdr_len
;
1416 /* socket provides vnet_hdr */
1418 sock_hlen
= hdr_len
;
1420 mutex_lock(&n
->dev
.mutex
);
1421 if ((features
& (1 << VHOST_F_LOG_ALL
)) &&
1422 !vhost_log_access_ok(&n
->dev
))
1425 if ((features
& (1ULL << VIRTIO_F_IOMMU_PLATFORM
))) {
1426 if (vhost_init_device_iotlb(&n
->dev
, true))
1430 for (i
= 0; i
< VHOST_NET_VQ_MAX
; ++i
) {
1431 mutex_lock(&n
->vqs
[i
].vq
.mutex
);
1432 n
->vqs
[i
].vq
.acked_features
= features
;
1433 n
->vqs
[i
].vhost_hlen
= vhost_hlen
;
1434 n
->vqs
[i
].sock_hlen
= sock_hlen
;
1435 mutex_unlock(&n
->vqs
[i
].vq
.mutex
);
1437 mutex_unlock(&n
->dev
.mutex
);
1441 mutex_unlock(&n
->dev
.mutex
);
1445 static long vhost_net_set_owner(struct vhost_net
*n
)
1449 mutex_lock(&n
->dev
.mutex
);
1450 if (vhost_dev_has_owner(&n
->dev
)) {
1454 r
= vhost_net_set_ubuf_info(n
);
1457 r
= vhost_dev_set_owner(&n
->dev
);
1459 vhost_net_clear_ubuf_info(n
);
1462 mutex_unlock(&n
->dev
.mutex
);
1466 static long vhost_net_ioctl(struct file
*f
, unsigned int ioctl
,
1469 struct vhost_net
*n
= f
->private_data
;
1470 void __user
*argp
= (void __user
*)arg
;
1471 u64 __user
*featurep
= argp
;
1472 struct vhost_vring_file backend
;
1477 case VHOST_NET_SET_BACKEND
:
1478 if (copy_from_user(&backend
, argp
, sizeof backend
))
1480 return vhost_net_set_backend(n
, backend
.index
, backend
.fd
);
1481 case VHOST_GET_FEATURES
:
1482 features
= VHOST_NET_FEATURES
;
1483 if (copy_to_user(featurep
, &features
, sizeof features
))
1486 case VHOST_SET_FEATURES
:
1487 if (copy_from_user(&features
, featurep
, sizeof features
))
1489 if (features
& ~VHOST_NET_FEATURES
)
1491 return vhost_net_set_features(n
, features
);
1492 case VHOST_GET_BACKEND_FEATURES
:
1493 features
= VHOST_NET_BACKEND_FEATURES
;
1494 if (copy_to_user(featurep
, &features
, sizeof(features
)))
1497 case VHOST_SET_BACKEND_FEATURES
:
1498 if (copy_from_user(&features
, featurep
, sizeof(features
)))
1500 if (features
& ~VHOST_NET_BACKEND_FEATURES
)
1502 return vhost_net_set_backend_features(n
, features
);
1503 case VHOST_RESET_OWNER
:
1504 return vhost_net_reset_owner(n
);
1505 case VHOST_SET_OWNER
:
1506 return vhost_net_set_owner(n
);
1508 mutex_lock(&n
->dev
.mutex
);
1509 r
= vhost_dev_ioctl(&n
->dev
, ioctl
, argp
);
1510 if (r
== -ENOIOCTLCMD
)
1511 r
= vhost_vring_ioctl(&n
->dev
, ioctl
, argp
);
1514 mutex_unlock(&n
->dev
.mutex
);
1519 #ifdef CONFIG_COMPAT
1520 static long vhost_net_compat_ioctl(struct file
*f
, unsigned int ioctl
,
1523 return vhost_net_ioctl(f
, ioctl
, (unsigned long)compat_ptr(arg
));
1527 static ssize_t
vhost_net_chr_read_iter(struct kiocb
*iocb
, struct iov_iter
*to
)
1529 struct file
*file
= iocb
->ki_filp
;
1530 struct vhost_net
*n
= file
->private_data
;
1531 struct vhost_dev
*dev
= &n
->dev
;
1532 int noblock
= file
->f_flags
& O_NONBLOCK
;
1534 return vhost_chr_read_iter(dev
, to
, noblock
);
1537 static ssize_t
vhost_net_chr_write_iter(struct kiocb
*iocb
,
1538 struct iov_iter
*from
)
1540 struct file
*file
= iocb
->ki_filp
;
1541 struct vhost_net
*n
= file
->private_data
;
1542 struct vhost_dev
*dev
= &n
->dev
;
1544 return vhost_chr_write_iter(dev
, from
);
1547 static __poll_t
vhost_net_chr_poll(struct file
*file
, poll_table
*wait
)
1549 struct vhost_net
*n
= file
->private_data
;
1550 struct vhost_dev
*dev
= &n
->dev
;
1552 return vhost_chr_poll(file
, dev
, wait
);
1555 static const struct file_operations vhost_net_fops
= {
1556 .owner
= THIS_MODULE
,
1557 .release
= vhost_net_release
,
1558 .read_iter
= vhost_net_chr_read_iter
,
1559 .write_iter
= vhost_net_chr_write_iter
,
1560 .poll
= vhost_net_chr_poll
,
1561 .unlocked_ioctl
= vhost_net_ioctl
,
1562 #ifdef CONFIG_COMPAT
1563 .compat_ioctl
= vhost_net_compat_ioctl
,
1565 .open
= vhost_net_open
,
1566 .llseek
= noop_llseek
,
1569 static struct miscdevice vhost_net_misc
= {
1570 .minor
= VHOST_NET_MINOR
,
1571 .name
= "vhost-net",
1572 .fops
= &vhost_net_fops
,
1575 static int vhost_net_init(void)
1577 if (experimental_zcopytx
)
1578 vhost_net_enable_zcopy(VHOST_NET_VQ_TX
);
1579 return misc_register(&vhost_net_misc
);
1581 module_init(vhost_net_init
);
1583 static void vhost_net_exit(void)
1585 misc_deregister(&vhost_net_misc
);
1587 module_exit(vhost_net_exit
);
1589 MODULE_VERSION("0.0.1");
1590 MODULE_LICENSE("GPL v2");
1591 MODULE_AUTHOR("Michael S. Tsirkin");
1592 MODULE_DESCRIPTION("Host kernel accelerator for virtio net");
1593 MODULE_ALIAS_MISCDEV(VHOST_NET_MINOR
);
1594 MODULE_ALIAS("devname:vhost-net");