Changes in 4.9.318 USB: new quirk for Dell Gen 2 devices ptrace/xtensa: Replace PT_SINGLESTEP with TIF_SINGLESTEP ptrace: Reimplement PTRACE_KILL by always sending SIGKILL btrfs: add "0x" prefix for unsupported optional features drm/virtio: fix NULL pointer dereference in virtio_gpu_conn_get_modes mwifiex: add mutex lock for call in mwifiex_dfs_chan_sw_work_queue b43legacy: Fix assigning negative value to unsigned variable b43: Fix assigning negative value to unsigned variable ipw2x00: Fix potential NULL dereference in libipw_xmit() ACPICA: Avoid cache flush inside virtual machines ALSA: jack: Access input_dev under mutex drm/amd/pm: fix double free in si_parse_power_table() ath9k: fix QCA9561 PA bias level media: cx25821: Fix the warning when removing the module scsi: megaraid: Fix error check return value of register_chrdev() drm/amd/pm: fix the compile warning ipv6: Don't send rs packets to the interface of ARPHRD_TUNNEL ASoC: dapm: Don't fold register value changes into notifications dma-debug: change allocation mode from GFP_NOWAIT to GFP_ATIOMIC ipmi:ssif: Check for NULL msg when handling events and messages openrisc: start CPU timer early in boot nvme-pci: fix a NULL pointer dereference in nvme_alloc_admin_tags ASoC: rt5645: Fix errorenous cleanup order media: exynos4-is: Fix compile warning rxrpc: Return an error to sendmsg if call failed eth: tg3: silence the GCC 12 array-bounds warning fs: jfs: fix possible NULL pointer dereference in dbFree() ARM: OMAP1: clock: Fix UART rate reporting algorithm fat: add ratelimit to fat*_ent_bread() ARM: versatile: Add missing of_node_put in dcscb_init ARM: dts: exynos: add atmel,24c128 fallback to Samsung EEPROM ARM: hisi: Add missing of_node_put after of_find_compatible_node PCI: Avoid pci_dev_lock() AB/BA deadlock with sriov_numvfs_store() powerpc/xics: fix refcount leak in icp_opal_init() macintosh/via-pmu: Fix build failure when CONFIG_INPUT is disabled drm: fix EDID struct for old ARM OABI format ASoC: mediatek: Fix error handling in mt8173_max98090_dev_probe x86/delay: Fix the wrong asm constraint in delay_loop() drm/mediatek: Fix mtk_cec_mask() spi: spi-ti-qspi: Fix return value handling of wait_for_completion_timeout NFC: NULL out the dev->rfkill to prevent UAF HID: hid-led: fix maximum brightness for Dream Cheeky spi: img-spfi: Fix pm_runtime_get_sync() error checking ath9k_htc: fix potential out of bounds access with invalid rxstatus->rs_keyix inotify: show inotify mask flags in proc fdinfo x86/pm: Fix false positive kmemleak report in msr_build_context() drm/msm/dsi: fix error checks and return values for DSI xmit functions drm/msm/hdmi: check return value after calling platform_get_resource_byname() drm/rockchip: vop: fix possible null-ptr-deref in vop_bind() x86/mm: Cleanup the control_va_addr_alignment() __setup handler drm/msm: return an error pointer in msm_gem_prime_get_sg_table() media: uvcvideo: Fix missing check to determine if element is found in list ASoC: mxs-saif: Fix refcount leak in mxs_saif_probe regulator: pfuze100: Fix refcount leak in pfuze_parse_regulators_dt media: exynos4-is: Change clk_disable to clk_disable_unprepare media: pvrusb2: fix array-index-out-of-bounds in pvr2_i2c_core_init Bluetooth: fix dangling sco_conn and use-after-free in sco_sock_timeout m68k: math-emu: Fix dependencies of math emulation support sctp: read sk->sk_bound_dev_if once in sctp_rcv() ASoC: wm2000: fix missing clk_disable_unprepare() on error in wm2000_anc_transition() rxrpc: Fix listen() setting the bar too high for the prealloc rings rxrpc: Don't try to resend the request if we're receiving the reply soc: qcom: smp2p: Fix missing of_node_put() in smp2p_parse_ipc soc: qcom: smsm: Fix missing of_node_put() in smsm_parse_ipc mfd: ipaq-micro: Fix error check return value of platform_get_irq() scsi: fcoe: Fix Wstringop-overflow warnings in fcoe_wwn_from_mac() drivers/base/node.c: fix compaction sysfs file leak powerpc/8xx: export 'cpm_setbrg' for modules powerpc/idle: Fix return value of __setup() handler powerpc/4xx/cpm: Fix return value of __setup() handler tty: fix deadlock caused by calling printk() under tty_port->lock Input: sparcspkr - fix refcount leak in bbc_beep_probe video: fbdev: clcdfb: Fix refcount leak in clcdfb_of_vram_setup iommu/amd: Increase timeout waiting for GA log enablement wifi: mac80211: fix use-after-free in chanctx code iwlwifi: mvm: fix assert 1F04 upon reconfig fs-writeback: writeback_sb_inodes:Recalculate 'wrote' according skipped pages ext4: fix use-after-free in ext4_rename_dir_prepare ext4: fix bug_on in ext4_writepages ext4: verify dir block before splitting it dlm: fix plock invalid read dlm: fix missing lkb refcount handling ocfs2: dlmfs: fix error handling of user_dlm_destroy_lock scsi: dc395x: Fix a missing check on list iterator scsi: ufs: qcom: Add a readl() to make sure ref_clk gets enabled drm/amdgpu/cs: make commands with 0 chunks illegal behaviour. drm/bridge: analogix_dp: Grab runtime PM reference for DP-AUX md: fix an incorrect NULL check in does_sb_need_changing md: fix an incorrect NULL check in md_reload_sb RDMA/hfi1: Fix potential integer multiplication overflow errors irqchip/armada-370-xp: Do not touch Performance Counter Overflow on A375, A38x, A39x irqchip: irq-xtensa-mx: fix initial IRQ affinity mac80211: upgrade passive scan to active scan on DFS channels after beacon rx um: chan_user: Fix winch_tramp() return value um: Fix out-of-bounds read in LDT setup iommu/msm: Fix an incorrect NULL check on list iterator nodemask.h: fix compilation error with GCC12 hugetlb: fix huge_pmd_unshare address update rtl818x: Prevent using not initialized queues ASoC: rt5514: Fix event generation for "DSP Voice Wake Up" control carl9170: tx: fix an incorrect use of list iterator gma500: fix an incorrect NULL check on list iterator docs/conf.py: Cope with removal of language=None in Sphinx 5.0.0 dt-bindings: gpio: altera: correct interrupt-cells RDMA/rxe: Generate a completion for unsupported/invalid opcode MIPS: IP27: Remove incorrect `cpu_has_fpu' override netfilter: nf_tables: disallow non-stateful expression in sets earlier pcmcia: db1xxx_ss: restrict to MIPS_DB1XXX boards staging: greybus: codecs: fix type confusion of list iterator variable usb: usbip: fix a refcount leak in stub_probe() usb: usbip: add missing device lock on tweak configuration cmd USB: storage: karma: fix rio_karma_init return pwm: lp3943: Fix duty calculation in case period was clamped rpmsg: qcom_smd: Fix irq_of_parse_and_map() return value rtc: mt6397: check return value after calling platform_get_resource() serial: meson: acquire port->lock in startup() serial: digicolor-usart: Don't allow CS5-6 serial: txx9: Don't allow CS5-6 serial: sh-sci: Don't allow CS5-6 serial: st-asc: Sanitize CSIZE and correct PARENB for CS7 firmware: dmi-sysfs: Fix memory leak in dmi_sysfs_register_handle clocksource/drivers/oxnas-rps: Fix irq_of_parse_and_map() return value net: ethernet: mtk_eth_soc: out of bounds read in mtk_hwlro_get_fdir_entry() modpost: fix removing numeric suffixes jffs2: fix memory leak in jffs2_do_fill_super tcp: tcp_rtx_synack() can be called from process context tracing: Avoid adding tracer option before update_tracer_options i2c: cadence: Increase timeout per message if necessary m68knommu: set ZERO_PAGE() to the allocated zeroed page m68knommu: fix undefined reference to `_init_sp' video: fbdev: pxa3xx-gcu: release the resources correctly in pxa3xx_gcu_probe/remove() net: fix nla_strcmp to handle more then one trailing null character ata: pata_octeon_cf: Fix refcount leak in octeon_cf_probe net/mlx4_en: Fix wrong return value on ioctl EEPROM query failure SUNRPC: Fix the calculation of xdr->end in xdr_get_next_encode_buffer() net: xfrm: unexport __init-annotated xfrm4_protocol_init() net: altera: Fix refcount leak in altera_tse_mdio_create iio: dummy: iio_simple_dummy: check the return value of kstrdup() lkdtm/usercopy: Expand size of "out of frame" object tty: synclink_gt: Fix null-pointer-dereference in slgt_clean() tty: Fix a possible resource leak in icom_probe drivers: staging: rtl8192e: Fix deadlock in rtllib_beacons_stop() USB: host: isp116x: check return value after calling platform_get_resource() drivers: tty: serial: Fix deadlock in sa1100_set_termios() drivers: usb: host: Fix deadlock in oxu_bus_suspend() USB: hcd-pci: Fully suspend across freeze/thaw cycle usb: dwc2: gadget: don't reset gadget's driver->bus misc: rtsx: set NULL intfdata when probe fails clocksource/drivers/sp804: Avoid error on multiple instances staging: rtl8712: fix uninit-value in r871xu_drv_init() serial: msm_serial: disable interrupts in __msm_console_write() md: protect md_unregister_thread from reentrancy Revert "net: af_key: add check for pfkey_broadcast in function pfkey_process" drm/radeon: fix a possible null pointer dereference modpost: fix undefined behavior of is_arm_mapping_symbol() nodemask: Fix return values to be unsigned vringh: Fix loop descriptors check in the indirect cases ALSA: hda/conexant - Fix loopback issue with CX20632 cifs: return errors during session setup during reconnects ata: libata-transport: fix {dma|pio|xfer}_mode sysfs files nfc: st21nfca: fix incorrect validating logic in EVT_TRANSACTION nfc: st21nfca: fix memory leaks in EVT_TRANSACTION handling Input: bcm5974 - set missing URB_NO_TRANSFER_DMA_MAP urb flag powerpc/32: Fix overread/overwrite of thread_struct via ptrace mtd: cfi_cmdset_0002: Move and rename chip_check/chip_ready/chip_good_for_write mtd: cfi_cmdset_0002: Use chip_ready() for write on S29GL064N PCI: qcom: Fix unbalanced PHY init on probe errors tcp: fix tcp_mtup_probe_success vs wrong snd_cwnd Linux 4.9.318 Signed-off-by: Greg Kroah-Hartman <gregkh@google.com> Change-Id: I2028f3dcd422886bf997ec7e1d2ae86515f1bfb9
1045 lines
28 KiB
C
1045 lines
28 KiB
C
/*
|
|
* Helpers for the host side of a virtio ring.
|
|
*
|
|
* Since these may be in userspace, we use (inline) accessors.
|
|
*/
|
|
#include <linux/module.h>
|
|
#include <linux/vringh.h>
|
|
#include <linux/virtio_ring.h>
|
|
#include <linux/kernel.h>
|
|
#include <linux/ratelimit.h>
|
|
#include <linux/uaccess.h>
|
|
#include <linux/slab.h>
|
|
#include <linux/export.h>
|
|
#include <uapi/linux/virtio_config.h>
|
|
|
|
static __printf(1,2) __cold void vringh_bad(const char *fmt, ...)
|
|
{
|
|
static DEFINE_RATELIMIT_STATE(vringh_rs,
|
|
DEFAULT_RATELIMIT_INTERVAL,
|
|
DEFAULT_RATELIMIT_BURST);
|
|
if (__ratelimit(&vringh_rs)) {
|
|
va_list ap;
|
|
va_start(ap, fmt);
|
|
printk(KERN_NOTICE "vringh:");
|
|
vprintk(fmt, ap);
|
|
va_end(ap);
|
|
}
|
|
}
|
|
|
|
/* Returns vring->num if empty, -ve on error. */
|
|
static inline int __vringh_get_head(const struct vringh *vrh,
|
|
int (*getu16)(const struct vringh *vrh,
|
|
u16 *val, const __virtio16 *p),
|
|
u16 *last_avail_idx)
|
|
{
|
|
u16 avail_idx, i, head;
|
|
int err;
|
|
|
|
err = getu16(vrh, &avail_idx, &vrh->vring.avail->idx);
|
|
if (err) {
|
|
vringh_bad("Failed to access avail idx at %p",
|
|
&vrh->vring.avail->idx);
|
|
return err;
|
|
}
|
|
|
|
if (*last_avail_idx == avail_idx)
|
|
return vrh->vring.num;
|
|
|
|
/* Only get avail ring entries after they have been exposed by guest. */
|
|
virtio_rmb(vrh->weak_barriers);
|
|
|
|
i = *last_avail_idx & (vrh->vring.num - 1);
|
|
|
|
err = getu16(vrh, &head, &vrh->vring.avail->ring[i]);
|
|
if (err) {
|
|
vringh_bad("Failed to read head: idx %d address %p",
|
|
*last_avail_idx, &vrh->vring.avail->ring[i]);
|
|
return err;
|
|
}
|
|
|
|
if (head >= vrh->vring.num) {
|
|
vringh_bad("Guest says index %u > %u is available",
|
|
head, vrh->vring.num);
|
|
return -EINVAL;
|
|
}
|
|
|
|
(*last_avail_idx)++;
|
|
return head;
|
|
}
|
|
|
|
/* Copy some bytes to/from the iovec. Returns num copied. */
|
|
static inline ssize_t vringh_iov_xfer(struct vringh_kiov *iov,
|
|
void *ptr, size_t len,
|
|
int (*xfer)(void *addr, void *ptr,
|
|
size_t len))
|
|
{
|
|
int err, done = 0;
|
|
|
|
while (len && iov->i < iov->used) {
|
|
size_t partlen;
|
|
|
|
partlen = min(iov->iov[iov->i].iov_len, len);
|
|
err = xfer(iov->iov[iov->i].iov_base, ptr, partlen);
|
|
if (err)
|
|
return err;
|
|
done += partlen;
|
|
len -= partlen;
|
|
ptr += partlen;
|
|
iov->consumed += partlen;
|
|
iov->iov[iov->i].iov_len -= partlen;
|
|
iov->iov[iov->i].iov_base += partlen;
|
|
|
|
if (!iov->iov[iov->i].iov_len) {
|
|
/* Fix up old iov element then increment. */
|
|
iov->iov[iov->i].iov_len = iov->consumed;
|
|
iov->iov[iov->i].iov_base -= iov->consumed;
|
|
|
|
iov->consumed = 0;
|
|
iov->i++;
|
|
}
|
|
}
|
|
return done;
|
|
}
|
|
|
|
/* May reduce *len if range is shorter. */
|
|
static inline bool range_check(struct vringh *vrh, u64 addr, size_t *len,
|
|
struct vringh_range *range,
|
|
bool (*getrange)(struct vringh *,
|
|
u64, struct vringh_range *))
|
|
{
|
|
if (addr < range->start || addr > range->end_incl) {
|
|
if (!getrange(vrh, addr, range))
|
|
return false;
|
|
}
|
|
BUG_ON(addr < range->start || addr > range->end_incl);
|
|
|
|
/* To end of memory? */
|
|
if (unlikely(addr + *len == 0)) {
|
|
if (range->end_incl == -1ULL)
|
|
return true;
|
|
goto truncate;
|
|
}
|
|
|
|
/* Otherwise, don't wrap. */
|
|
if (addr + *len < addr) {
|
|
vringh_bad("Wrapping descriptor %zu@0x%llx",
|
|
*len, (unsigned long long)addr);
|
|
return false;
|
|
}
|
|
|
|
if (unlikely(addr + *len - 1 > range->end_incl))
|
|
goto truncate;
|
|
return true;
|
|
|
|
truncate:
|
|
*len = range->end_incl + 1 - addr;
|
|
return true;
|
|
}
|
|
|
|
static inline bool no_range_check(struct vringh *vrh, u64 addr, size_t *len,
|
|
struct vringh_range *range,
|
|
bool (*getrange)(struct vringh *,
|
|
u64, struct vringh_range *))
|
|
{
|
|
return true;
|
|
}
|
|
|
|
/* No reason for this code to be inline. */
|
|
static int move_to_indirect(const struct vringh *vrh,
|
|
int *up_next, u16 *i, void *addr,
|
|
const struct vring_desc *desc,
|
|
struct vring_desc **descs, int *desc_max)
|
|
{
|
|
u32 len;
|
|
|
|
/* Indirect tables can't have indirect. */
|
|
if (*up_next != -1) {
|
|
vringh_bad("Multilevel indirect %u->%u", *up_next, *i);
|
|
return -EINVAL;
|
|
}
|
|
|
|
len = vringh32_to_cpu(vrh, desc->len);
|
|
if (unlikely(len % sizeof(struct vring_desc))) {
|
|
vringh_bad("Strange indirect len %u", desc->len);
|
|
return -EINVAL;
|
|
}
|
|
|
|
/* We will check this when we follow it! */
|
|
if (desc->flags & cpu_to_vringh16(vrh, VRING_DESC_F_NEXT))
|
|
*up_next = vringh16_to_cpu(vrh, desc->next);
|
|
else
|
|
*up_next = -2;
|
|
*descs = addr;
|
|
*desc_max = len / sizeof(struct vring_desc);
|
|
|
|
/* Now, start at the first indirect. */
|
|
*i = 0;
|
|
return 0;
|
|
}
|
|
|
|
static int resize_iovec(struct vringh_kiov *iov, gfp_t gfp)
|
|
{
|
|
struct kvec *new;
|
|
unsigned int flag, new_num = (iov->max_num & ~VRINGH_IOV_ALLOCATED) * 2;
|
|
|
|
if (new_num < 8)
|
|
new_num = 8;
|
|
|
|
flag = (iov->max_num & VRINGH_IOV_ALLOCATED);
|
|
if (flag)
|
|
new = krealloc(iov->iov, new_num * sizeof(struct iovec), gfp);
|
|
else {
|
|
new = kmalloc(new_num * sizeof(struct iovec), gfp);
|
|
if (new) {
|
|
memcpy(new, iov->iov,
|
|
iov->max_num * sizeof(struct iovec));
|
|
flag = VRINGH_IOV_ALLOCATED;
|
|
}
|
|
}
|
|
if (!new)
|
|
return -ENOMEM;
|
|
iov->iov = new;
|
|
iov->max_num = (new_num | flag);
|
|
return 0;
|
|
}
|
|
|
|
static u16 __cold return_from_indirect(const struct vringh *vrh, int *up_next,
|
|
struct vring_desc **descs, int *desc_max)
|
|
{
|
|
u16 i = *up_next;
|
|
|
|
*up_next = -1;
|
|
*descs = vrh->vring.desc;
|
|
*desc_max = vrh->vring.num;
|
|
return i;
|
|
}
|
|
|
|
static int slow_copy(struct vringh *vrh, void *dst, const void *src,
|
|
bool (*rcheck)(struct vringh *vrh, u64 addr, size_t *len,
|
|
struct vringh_range *range,
|
|
bool (*getrange)(struct vringh *vrh,
|
|
u64,
|
|
struct vringh_range *)),
|
|
bool (*getrange)(struct vringh *vrh,
|
|
u64 addr,
|
|
struct vringh_range *r),
|
|
struct vringh_range *range,
|
|
int (*copy)(void *dst, const void *src, size_t len))
|
|
{
|
|
size_t part, len = sizeof(struct vring_desc);
|
|
|
|
do {
|
|
u64 addr;
|
|
int err;
|
|
|
|
part = len;
|
|
addr = (u64)(unsigned long)src - range->offset;
|
|
|
|
if (!rcheck(vrh, addr, &part, range, getrange))
|
|
return -EINVAL;
|
|
|
|
err = copy(dst, src, part);
|
|
if (err)
|
|
return err;
|
|
|
|
dst += part;
|
|
src += part;
|
|
len -= part;
|
|
} while (len);
|
|
return 0;
|
|
}
|
|
|
|
static inline int
|
|
__vringh_iov(struct vringh *vrh, u16 i,
|
|
struct vringh_kiov *riov,
|
|
struct vringh_kiov *wiov,
|
|
bool (*rcheck)(struct vringh *vrh, u64 addr, size_t *len,
|
|
struct vringh_range *range,
|
|
bool (*getrange)(struct vringh *, u64,
|
|
struct vringh_range *)),
|
|
bool (*getrange)(struct vringh *, u64, struct vringh_range *),
|
|
gfp_t gfp,
|
|
int (*copy)(void *dst, const void *src, size_t len))
|
|
{
|
|
int err, count = 0, indirect_count = 0, up_next, desc_max;
|
|
struct vring_desc desc, *descs;
|
|
struct vringh_range range = { -1ULL, 0 }, slowrange;
|
|
bool slow = false;
|
|
|
|
/* We start traversing vring's descriptor table. */
|
|
descs = vrh->vring.desc;
|
|
desc_max = vrh->vring.num;
|
|
up_next = -1;
|
|
|
|
/* You must want something! */
|
|
if (WARN_ON(!riov && !wiov))
|
|
return -EINVAL;
|
|
|
|
if (riov)
|
|
riov->i = riov->used = 0;
|
|
if (wiov)
|
|
wiov->i = wiov->used = 0;
|
|
|
|
for (;;) {
|
|
void *addr;
|
|
struct vringh_kiov *iov;
|
|
size_t len;
|
|
|
|
if (unlikely(slow))
|
|
err = slow_copy(vrh, &desc, &descs[i], rcheck, getrange,
|
|
&slowrange, copy);
|
|
else
|
|
err = copy(&desc, &descs[i], sizeof(desc));
|
|
if (unlikely(err))
|
|
goto fail;
|
|
|
|
if (unlikely(desc.flags &
|
|
cpu_to_vringh16(vrh, VRING_DESC_F_INDIRECT))) {
|
|
u64 a = vringh64_to_cpu(vrh, desc.addr);
|
|
|
|
/* Make sure it's OK, and get offset. */
|
|
len = vringh32_to_cpu(vrh, desc.len);
|
|
if (!rcheck(vrh, a, &len, &range, getrange)) {
|
|
err = -EINVAL;
|
|
goto fail;
|
|
}
|
|
|
|
if (unlikely(len != vringh32_to_cpu(vrh, desc.len))) {
|
|
slow = true;
|
|
/* We need to save this range to use offset */
|
|
slowrange = range;
|
|
}
|
|
|
|
addr = (void *)(long)(a + range.offset);
|
|
err = move_to_indirect(vrh, &up_next, &i, addr, &desc,
|
|
&descs, &desc_max);
|
|
if (err)
|
|
goto fail;
|
|
continue;
|
|
}
|
|
|
|
if (up_next == -1)
|
|
count++;
|
|
else
|
|
indirect_count++;
|
|
|
|
if (count > vrh->vring.num || indirect_count > desc_max) {
|
|
vringh_bad("Descriptor loop in %p", descs);
|
|
err = -ELOOP;
|
|
goto fail;
|
|
}
|
|
|
|
if (desc.flags & cpu_to_vringh16(vrh, VRING_DESC_F_WRITE))
|
|
iov = wiov;
|
|
else {
|
|
iov = riov;
|
|
if (unlikely(wiov && wiov->used)) {
|
|
vringh_bad("Readable desc %p after writable",
|
|
&descs[i]);
|
|
err = -EINVAL;
|
|
goto fail;
|
|
}
|
|
}
|
|
|
|
if (!iov) {
|
|
vringh_bad("Unexpected %s desc",
|
|
!wiov ? "writable" : "readable");
|
|
err = -EPROTO;
|
|
goto fail;
|
|
}
|
|
|
|
again:
|
|
/* Make sure it's OK, and get offset. */
|
|
len = vringh32_to_cpu(vrh, desc.len);
|
|
if (!rcheck(vrh, vringh64_to_cpu(vrh, desc.addr), &len, &range,
|
|
getrange)) {
|
|
err = -EINVAL;
|
|
goto fail;
|
|
}
|
|
addr = (void *)(unsigned long)(vringh64_to_cpu(vrh, desc.addr) +
|
|
range.offset);
|
|
|
|
if (unlikely(iov->used == (iov->max_num & ~VRINGH_IOV_ALLOCATED))) {
|
|
err = resize_iovec(iov, gfp);
|
|
if (err)
|
|
goto fail;
|
|
}
|
|
|
|
iov->iov[iov->used].iov_base = addr;
|
|
iov->iov[iov->used].iov_len = len;
|
|
iov->used++;
|
|
|
|
if (unlikely(len != vringh32_to_cpu(vrh, desc.len))) {
|
|
desc.len = cpu_to_vringh32(vrh,
|
|
vringh32_to_cpu(vrh, desc.len) - len);
|
|
desc.addr = cpu_to_vringh64(vrh,
|
|
vringh64_to_cpu(vrh, desc.addr) + len);
|
|
goto again;
|
|
}
|
|
|
|
if (desc.flags & cpu_to_vringh16(vrh, VRING_DESC_F_NEXT)) {
|
|
i = vringh16_to_cpu(vrh, desc.next);
|
|
} else {
|
|
/* Just in case we need to finish traversing above. */
|
|
if (unlikely(up_next > 0)) {
|
|
i = return_from_indirect(vrh, &up_next,
|
|
&descs, &desc_max);
|
|
slow = false;
|
|
indirect_count = 0;
|
|
} else
|
|
break;
|
|
}
|
|
|
|
if (i >= desc_max) {
|
|
vringh_bad("Chained index %u > %u", i, desc_max);
|
|
err = -EINVAL;
|
|
goto fail;
|
|
}
|
|
}
|
|
|
|
return 0;
|
|
|
|
fail:
|
|
return err;
|
|
}
|
|
|
|
static inline int __vringh_complete(struct vringh *vrh,
|
|
const struct vring_used_elem *used,
|
|
unsigned int num_used,
|
|
int (*putu16)(const struct vringh *vrh,
|
|
__virtio16 *p, u16 val),
|
|
int (*putused)(struct vring_used_elem *dst,
|
|
const struct vring_used_elem
|
|
*src, unsigned num))
|
|
{
|
|
struct vring_used *used_ring;
|
|
int err;
|
|
u16 used_idx, off;
|
|
|
|
used_ring = vrh->vring.used;
|
|
used_idx = vrh->last_used_idx + vrh->completed;
|
|
|
|
off = used_idx % vrh->vring.num;
|
|
|
|
/* Compiler knows num_used == 1 sometimes, hence extra check */
|
|
if (num_used > 1 && unlikely(off + num_used >= vrh->vring.num)) {
|
|
u16 part = vrh->vring.num - off;
|
|
err = putused(&used_ring->ring[off], used, part);
|
|
if (!err)
|
|
err = putused(&used_ring->ring[0], used + part,
|
|
num_used - part);
|
|
} else
|
|
err = putused(&used_ring->ring[off], used, num_used);
|
|
|
|
if (err) {
|
|
vringh_bad("Failed to write %u used entries %u at %p",
|
|
num_used, off, &used_ring->ring[off]);
|
|
return err;
|
|
}
|
|
|
|
/* Make sure buffer is written before we update index. */
|
|
virtio_wmb(vrh->weak_barriers);
|
|
|
|
err = putu16(vrh, &vrh->vring.used->idx, used_idx + num_used);
|
|
if (err) {
|
|
vringh_bad("Failed to update used index at %p",
|
|
&vrh->vring.used->idx);
|
|
return err;
|
|
}
|
|
|
|
vrh->completed += num_used;
|
|
return 0;
|
|
}
|
|
|
|
|
|
static inline int __vringh_need_notify(struct vringh *vrh,
|
|
int (*getu16)(const struct vringh *vrh,
|
|
u16 *val,
|
|
const __virtio16 *p))
|
|
{
|
|
bool notify;
|
|
u16 used_event;
|
|
int err;
|
|
|
|
/* Flush out used index update. This is paired with the
|
|
* barrier that the Guest executes when enabling
|
|
* interrupts. */
|
|
virtio_mb(vrh->weak_barriers);
|
|
|
|
/* Old-style, without event indices. */
|
|
if (!vrh->event_indices) {
|
|
u16 flags;
|
|
err = getu16(vrh, &flags, &vrh->vring.avail->flags);
|
|
if (err) {
|
|
vringh_bad("Failed to get flags at %p",
|
|
&vrh->vring.avail->flags);
|
|
return err;
|
|
}
|
|
return (!(flags & VRING_AVAIL_F_NO_INTERRUPT));
|
|
}
|
|
|
|
/* Modern: we know when other side wants to know. */
|
|
err = getu16(vrh, &used_event, &vring_used_event(&vrh->vring));
|
|
if (err) {
|
|
vringh_bad("Failed to get used event idx at %p",
|
|
&vring_used_event(&vrh->vring));
|
|
return err;
|
|
}
|
|
|
|
/* Just in case we added so many that we wrap. */
|
|
if (unlikely(vrh->completed > 0xffff))
|
|
notify = true;
|
|
else
|
|
notify = vring_need_event(used_event,
|
|
vrh->last_used_idx + vrh->completed,
|
|
vrh->last_used_idx);
|
|
|
|
vrh->last_used_idx += vrh->completed;
|
|
vrh->completed = 0;
|
|
return notify;
|
|
}
|
|
|
|
static inline bool __vringh_notify_enable(struct vringh *vrh,
|
|
int (*getu16)(const struct vringh *vrh,
|
|
u16 *val, const __virtio16 *p),
|
|
int (*putu16)(const struct vringh *vrh,
|
|
__virtio16 *p, u16 val))
|
|
{
|
|
u16 avail;
|
|
|
|
if (!vrh->event_indices) {
|
|
/* Old-school; update flags. */
|
|
if (putu16(vrh, &vrh->vring.used->flags, 0) != 0) {
|
|
vringh_bad("Clearing used flags %p",
|
|
&vrh->vring.used->flags);
|
|
return true;
|
|
}
|
|
} else {
|
|
if (putu16(vrh, &vring_avail_event(&vrh->vring),
|
|
vrh->last_avail_idx) != 0) {
|
|
vringh_bad("Updating avail event index %p",
|
|
&vring_avail_event(&vrh->vring));
|
|
return true;
|
|
}
|
|
}
|
|
|
|
/* They could have slipped one in as we were doing that: make
|
|
* sure it's written, then check again. */
|
|
virtio_mb(vrh->weak_barriers);
|
|
|
|
if (getu16(vrh, &avail, &vrh->vring.avail->idx) != 0) {
|
|
vringh_bad("Failed to check avail idx at %p",
|
|
&vrh->vring.avail->idx);
|
|
return true;
|
|
}
|
|
|
|
/* This is unlikely, so we just leave notifications enabled
|
|
* (if we're using event_indices, we'll only get one
|
|
* notification anyway). */
|
|
return avail == vrh->last_avail_idx;
|
|
}
|
|
|
|
static inline void __vringh_notify_disable(struct vringh *vrh,
|
|
int (*putu16)(const struct vringh *vrh,
|
|
__virtio16 *p, u16 val))
|
|
{
|
|
if (!vrh->event_indices) {
|
|
/* Old-school; update flags. */
|
|
if (putu16(vrh, &vrh->vring.used->flags,
|
|
VRING_USED_F_NO_NOTIFY)) {
|
|
vringh_bad("Setting used flags %p",
|
|
&vrh->vring.used->flags);
|
|
}
|
|
}
|
|
}
|
|
|
|
/* Userspace access helpers: in this case, addresses are really userspace. */
|
|
static inline int getu16_user(const struct vringh *vrh, u16 *val, const __virtio16 *p)
|
|
{
|
|
__virtio16 v = 0;
|
|
int rc = get_user(v, (__force __virtio16 __user *)p);
|
|
*val = vringh16_to_cpu(vrh, v);
|
|
return rc;
|
|
}
|
|
|
|
static inline int putu16_user(const struct vringh *vrh, __virtio16 *p, u16 val)
|
|
{
|
|
__virtio16 v = cpu_to_vringh16(vrh, val);
|
|
return put_user(v, (__force __virtio16 __user *)p);
|
|
}
|
|
|
|
static inline int copydesc_user(void *dst, const void *src, size_t len)
|
|
{
|
|
return copy_from_user(dst, (__force void __user *)src, len) ?
|
|
-EFAULT : 0;
|
|
}
|
|
|
|
static inline int putused_user(struct vring_used_elem *dst,
|
|
const struct vring_used_elem *src,
|
|
unsigned int num)
|
|
{
|
|
return copy_to_user((__force void __user *)dst, src,
|
|
sizeof(*dst) * num) ? -EFAULT : 0;
|
|
}
|
|
|
|
static inline int xfer_from_user(void *src, void *dst, size_t len)
|
|
{
|
|
return copy_from_user(dst, (__force void __user *)src, len) ?
|
|
-EFAULT : 0;
|
|
}
|
|
|
|
static inline int xfer_to_user(void *dst, void *src, size_t len)
|
|
{
|
|
return copy_to_user((__force void __user *)dst, src, len) ?
|
|
-EFAULT : 0;
|
|
}
|
|
|
|
/**
|
|
* vringh_init_user - initialize a vringh for a userspace vring.
|
|
* @vrh: the vringh to initialize.
|
|
* @features: the feature bits for this ring.
|
|
* @num: the number of elements.
|
|
* @weak_barriers: true if we only need memory barriers, not I/O.
|
|
* @desc: the userpace descriptor pointer.
|
|
* @avail: the userpace avail pointer.
|
|
* @used: the userpace used pointer.
|
|
*
|
|
* Returns an error if num is invalid: you should check pointers
|
|
* yourself!
|
|
*/
|
|
int vringh_init_user(struct vringh *vrh, u64 features,
|
|
unsigned int num, bool weak_barriers,
|
|
struct vring_desc __user *desc,
|
|
struct vring_avail __user *avail,
|
|
struct vring_used __user *used)
|
|
{
|
|
/* Sane power of 2 please! */
|
|
if (!num || num > 0xffff || (num & (num - 1))) {
|
|
vringh_bad("Bad ring size %u", num);
|
|
return -EINVAL;
|
|
}
|
|
|
|
vrh->little_endian = (features & (1ULL << VIRTIO_F_VERSION_1));
|
|
vrh->event_indices = (features & (1 << VIRTIO_RING_F_EVENT_IDX));
|
|
vrh->weak_barriers = weak_barriers;
|
|
vrh->completed = 0;
|
|
vrh->last_avail_idx = 0;
|
|
vrh->last_used_idx = 0;
|
|
vrh->vring.num = num;
|
|
/* vring expects kernel addresses, but only used via accessors. */
|
|
vrh->vring.desc = (__force struct vring_desc *)desc;
|
|
vrh->vring.avail = (__force struct vring_avail *)avail;
|
|
vrh->vring.used = (__force struct vring_used *)used;
|
|
return 0;
|
|
}
|
|
EXPORT_SYMBOL(vringh_init_user);
|
|
|
|
/**
|
|
* vringh_getdesc_user - get next available descriptor from userspace ring.
|
|
* @vrh: the userspace vring.
|
|
* @riov: where to put the readable descriptors (or NULL)
|
|
* @wiov: where to put the writable descriptors (or NULL)
|
|
* @getrange: function to call to check ranges.
|
|
* @head: head index we received, for passing to vringh_complete_user().
|
|
*
|
|
* Returns 0 if there was no descriptor, 1 if there was, or -errno.
|
|
*
|
|
* Note that on error return, you can tell the difference between an
|
|
* invalid ring and a single invalid descriptor: in the former case,
|
|
* *head will be vrh->vring.num. You may be able to ignore an invalid
|
|
* descriptor, but there's not much you can do with an invalid ring.
|
|
*
|
|
* Note that you may need to clean up riov and wiov, even on error!
|
|
*/
|
|
int vringh_getdesc_user(struct vringh *vrh,
|
|
struct vringh_iov *riov,
|
|
struct vringh_iov *wiov,
|
|
bool (*getrange)(struct vringh *vrh,
|
|
u64 addr, struct vringh_range *r),
|
|
u16 *head)
|
|
{
|
|
int err;
|
|
|
|
*head = vrh->vring.num;
|
|
err = __vringh_get_head(vrh, getu16_user, &vrh->last_avail_idx);
|
|
if (err < 0)
|
|
return err;
|
|
|
|
/* Empty... */
|
|
if (err == vrh->vring.num)
|
|
return 0;
|
|
|
|
/* We need the layouts to be the identical for this to work */
|
|
BUILD_BUG_ON(sizeof(struct vringh_kiov) != sizeof(struct vringh_iov));
|
|
BUILD_BUG_ON(offsetof(struct vringh_kiov, iov) !=
|
|
offsetof(struct vringh_iov, iov));
|
|
BUILD_BUG_ON(offsetof(struct vringh_kiov, i) !=
|
|
offsetof(struct vringh_iov, i));
|
|
BUILD_BUG_ON(offsetof(struct vringh_kiov, used) !=
|
|
offsetof(struct vringh_iov, used));
|
|
BUILD_BUG_ON(offsetof(struct vringh_kiov, max_num) !=
|
|
offsetof(struct vringh_iov, max_num));
|
|
BUILD_BUG_ON(sizeof(struct iovec) != sizeof(struct kvec));
|
|
BUILD_BUG_ON(offsetof(struct iovec, iov_base) !=
|
|
offsetof(struct kvec, iov_base));
|
|
BUILD_BUG_ON(offsetof(struct iovec, iov_len) !=
|
|
offsetof(struct kvec, iov_len));
|
|
BUILD_BUG_ON(sizeof(((struct iovec *)NULL)->iov_base)
|
|
!= sizeof(((struct kvec *)NULL)->iov_base));
|
|
BUILD_BUG_ON(sizeof(((struct iovec *)NULL)->iov_len)
|
|
!= sizeof(((struct kvec *)NULL)->iov_len));
|
|
|
|
*head = err;
|
|
err = __vringh_iov(vrh, *head, (struct vringh_kiov *)riov,
|
|
(struct vringh_kiov *)wiov,
|
|
range_check, getrange, GFP_KERNEL, copydesc_user);
|
|
if (err)
|
|
return err;
|
|
|
|
return 1;
|
|
}
|
|
EXPORT_SYMBOL(vringh_getdesc_user);
|
|
|
|
/**
|
|
* vringh_iov_pull_user - copy bytes from vring_iov.
|
|
* @riov: the riov as passed to vringh_getdesc_user() (updated as we consume)
|
|
* @dst: the place to copy.
|
|
* @len: the maximum length to copy.
|
|
*
|
|
* Returns the bytes copied <= len or a negative errno.
|
|
*/
|
|
ssize_t vringh_iov_pull_user(struct vringh_iov *riov, void *dst, size_t len)
|
|
{
|
|
return vringh_iov_xfer((struct vringh_kiov *)riov,
|
|
dst, len, xfer_from_user);
|
|
}
|
|
EXPORT_SYMBOL(vringh_iov_pull_user);
|
|
|
|
/**
|
|
* vringh_iov_push_user - copy bytes into vring_iov.
|
|
* @wiov: the wiov as passed to vringh_getdesc_user() (updated as we consume)
|
|
* @dst: the place to copy.
|
|
* @len: the maximum length to copy.
|
|
*
|
|
* Returns the bytes copied <= len or a negative errno.
|
|
*/
|
|
ssize_t vringh_iov_push_user(struct vringh_iov *wiov,
|
|
const void *src, size_t len)
|
|
{
|
|
return vringh_iov_xfer((struct vringh_kiov *)wiov,
|
|
(void *)src, len, xfer_to_user);
|
|
}
|
|
EXPORT_SYMBOL(vringh_iov_push_user);
|
|
|
|
/**
|
|
* vringh_abandon_user - we've decided not to handle the descriptor(s).
|
|
* @vrh: the vring.
|
|
* @num: the number of descriptors to put back (ie. num
|
|
* vringh_get_user() to undo).
|
|
*
|
|
* The next vringh_get_user() will return the old descriptor(s) again.
|
|
*/
|
|
void vringh_abandon_user(struct vringh *vrh, unsigned int num)
|
|
{
|
|
/* We only update vring_avail_event(vr) when we want to be notified,
|
|
* so we haven't changed that yet. */
|
|
vrh->last_avail_idx -= num;
|
|
}
|
|
EXPORT_SYMBOL(vringh_abandon_user);
|
|
|
|
/**
|
|
* vringh_complete_user - we've finished with descriptor, publish it.
|
|
* @vrh: the vring.
|
|
* @head: the head as filled in by vringh_getdesc_user.
|
|
* @len: the length of data we have written.
|
|
*
|
|
* You should check vringh_need_notify_user() after one or more calls
|
|
* to this function.
|
|
*/
|
|
int vringh_complete_user(struct vringh *vrh, u16 head, u32 len)
|
|
{
|
|
struct vring_used_elem used;
|
|
|
|
used.id = cpu_to_vringh32(vrh, head);
|
|
used.len = cpu_to_vringh32(vrh, len);
|
|
return __vringh_complete(vrh, &used, 1, putu16_user, putused_user);
|
|
}
|
|
EXPORT_SYMBOL(vringh_complete_user);
|
|
|
|
/**
|
|
* vringh_complete_multi_user - we've finished with many descriptors.
|
|
* @vrh: the vring.
|
|
* @used: the head, length pairs.
|
|
* @num_used: the number of used elements.
|
|
*
|
|
* You should check vringh_need_notify_user() after one or more calls
|
|
* to this function.
|
|
*/
|
|
int vringh_complete_multi_user(struct vringh *vrh,
|
|
const struct vring_used_elem used[],
|
|
unsigned num_used)
|
|
{
|
|
return __vringh_complete(vrh, used, num_used,
|
|
putu16_user, putused_user);
|
|
}
|
|
EXPORT_SYMBOL(vringh_complete_multi_user);
|
|
|
|
/**
|
|
* vringh_notify_enable_user - we want to know if something changes.
|
|
* @vrh: the vring.
|
|
*
|
|
* This always enables notifications, but returns false if there are
|
|
* now more buffers available in the vring.
|
|
*/
|
|
bool vringh_notify_enable_user(struct vringh *vrh)
|
|
{
|
|
return __vringh_notify_enable(vrh, getu16_user, putu16_user);
|
|
}
|
|
EXPORT_SYMBOL(vringh_notify_enable_user);
|
|
|
|
/**
|
|
* vringh_notify_disable_user - don't tell us if something changes.
|
|
* @vrh: the vring.
|
|
*
|
|
* This is our normal running state: we disable and then only enable when
|
|
* we're going to sleep.
|
|
*/
|
|
void vringh_notify_disable_user(struct vringh *vrh)
|
|
{
|
|
__vringh_notify_disable(vrh, putu16_user);
|
|
}
|
|
EXPORT_SYMBOL(vringh_notify_disable_user);
|
|
|
|
/**
|
|
* vringh_need_notify_user - must we tell the other side about used buffers?
|
|
* @vrh: the vring we've called vringh_complete_user() on.
|
|
*
|
|
* Returns -errno or 0 if we don't need to tell the other side, 1 if we do.
|
|
*/
|
|
int vringh_need_notify_user(struct vringh *vrh)
|
|
{
|
|
return __vringh_need_notify(vrh, getu16_user);
|
|
}
|
|
EXPORT_SYMBOL(vringh_need_notify_user);
|
|
|
|
/* Kernelspace access helpers. */
|
|
static inline int getu16_kern(const struct vringh *vrh,
|
|
u16 *val, const __virtio16 *p)
|
|
{
|
|
*val = vringh16_to_cpu(vrh, ACCESS_ONCE(*p));
|
|
return 0;
|
|
}
|
|
|
|
static inline int putu16_kern(const struct vringh *vrh, __virtio16 *p, u16 val)
|
|
{
|
|
ACCESS_ONCE(*p) = cpu_to_vringh16(vrh, val);
|
|
return 0;
|
|
}
|
|
|
|
static inline int copydesc_kern(void *dst, const void *src, size_t len)
|
|
{
|
|
memcpy(dst, src, len);
|
|
return 0;
|
|
}
|
|
|
|
static inline int putused_kern(struct vring_used_elem *dst,
|
|
const struct vring_used_elem *src,
|
|
unsigned int num)
|
|
{
|
|
memcpy(dst, src, num * sizeof(*dst));
|
|
return 0;
|
|
}
|
|
|
|
static inline int xfer_kern(void *src, void *dst, size_t len)
|
|
{
|
|
memcpy(dst, src, len);
|
|
return 0;
|
|
}
|
|
|
|
/**
|
|
* vringh_init_kern - initialize a vringh for a kernelspace vring.
|
|
* @vrh: the vringh to initialize.
|
|
* @features: the feature bits for this ring.
|
|
* @num: the number of elements.
|
|
* @weak_barriers: true if we only need memory barriers, not I/O.
|
|
* @desc: the userpace descriptor pointer.
|
|
* @avail: the userpace avail pointer.
|
|
* @used: the userpace used pointer.
|
|
*
|
|
* Returns an error if num is invalid.
|
|
*/
|
|
int vringh_init_kern(struct vringh *vrh, u64 features,
|
|
unsigned int num, bool weak_barriers,
|
|
struct vring_desc *desc,
|
|
struct vring_avail *avail,
|
|
struct vring_used *used)
|
|
{
|
|
/* Sane power of 2 please! */
|
|
if (!num || num > 0xffff || (num & (num - 1))) {
|
|
vringh_bad("Bad ring size %u", num);
|
|
return -EINVAL;
|
|
}
|
|
|
|
vrh->little_endian = (features & (1ULL << VIRTIO_F_VERSION_1));
|
|
vrh->event_indices = (features & (1 << VIRTIO_RING_F_EVENT_IDX));
|
|
vrh->weak_barriers = weak_barriers;
|
|
vrh->completed = 0;
|
|
vrh->last_avail_idx = 0;
|
|
vrh->last_used_idx = 0;
|
|
vrh->vring.num = num;
|
|
vrh->vring.desc = desc;
|
|
vrh->vring.avail = avail;
|
|
vrh->vring.used = used;
|
|
return 0;
|
|
}
|
|
EXPORT_SYMBOL(vringh_init_kern);
|
|
|
|
/**
|
|
* vringh_getdesc_kern - get next available descriptor from kernelspace ring.
|
|
* @vrh: the kernelspace vring.
|
|
* @riov: where to put the readable descriptors (or NULL)
|
|
* @wiov: where to put the writable descriptors (or NULL)
|
|
* @head: head index we received, for passing to vringh_complete_kern().
|
|
* @gfp: flags for allocating larger riov/wiov.
|
|
*
|
|
* Returns 0 if there was no descriptor, 1 if there was, or -errno.
|
|
*
|
|
* Note that on error return, you can tell the difference between an
|
|
* invalid ring and a single invalid descriptor: in the former case,
|
|
* *head will be vrh->vring.num. You may be able to ignore an invalid
|
|
* descriptor, but there's not much you can do with an invalid ring.
|
|
*
|
|
* Note that you may need to clean up riov and wiov, even on error!
|
|
*/
|
|
int vringh_getdesc_kern(struct vringh *vrh,
|
|
struct vringh_kiov *riov,
|
|
struct vringh_kiov *wiov,
|
|
u16 *head,
|
|
gfp_t gfp)
|
|
{
|
|
int err;
|
|
|
|
err = __vringh_get_head(vrh, getu16_kern, &vrh->last_avail_idx);
|
|
if (err < 0)
|
|
return err;
|
|
|
|
/* Empty... */
|
|
if (err == vrh->vring.num)
|
|
return 0;
|
|
|
|
*head = err;
|
|
err = __vringh_iov(vrh, *head, riov, wiov, no_range_check, NULL,
|
|
gfp, copydesc_kern);
|
|
if (err)
|
|
return err;
|
|
|
|
return 1;
|
|
}
|
|
EXPORT_SYMBOL(vringh_getdesc_kern);
|
|
|
|
/**
|
|
* vringh_iov_pull_kern - copy bytes from vring_iov.
|
|
* @riov: the riov as passed to vringh_getdesc_kern() (updated as we consume)
|
|
* @dst: the place to copy.
|
|
* @len: the maximum length to copy.
|
|
*
|
|
* Returns the bytes copied <= len or a negative errno.
|
|
*/
|
|
ssize_t vringh_iov_pull_kern(struct vringh_kiov *riov, void *dst, size_t len)
|
|
{
|
|
return vringh_iov_xfer(riov, dst, len, xfer_kern);
|
|
}
|
|
EXPORT_SYMBOL(vringh_iov_pull_kern);
|
|
|
|
/**
|
|
* vringh_iov_push_kern - copy bytes into vring_iov.
|
|
* @wiov: the wiov as passed to vringh_getdesc_kern() (updated as we consume)
|
|
* @dst: the place to copy.
|
|
* @len: the maximum length to copy.
|
|
*
|
|
* Returns the bytes copied <= len or a negative errno.
|
|
*/
|
|
ssize_t vringh_iov_push_kern(struct vringh_kiov *wiov,
|
|
const void *src, size_t len)
|
|
{
|
|
return vringh_iov_xfer(wiov, (void *)src, len, xfer_kern);
|
|
}
|
|
EXPORT_SYMBOL(vringh_iov_push_kern);
|
|
|
|
/**
|
|
* vringh_abandon_kern - we've decided not to handle the descriptor(s).
|
|
* @vrh: the vring.
|
|
* @num: the number of descriptors to put back (ie. num
|
|
* vringh_get_kern() to undo).
|
|
*
|
|
* The next vringh_get_kern() will return the old descriptor(s) again.
|
|
*/
|
|
void vringh_abandon_kern(struct vringh *vrh, unsigned int num)
|
|
{
|
|
/* We only update vring_avail_event(vr) when we want to be notified,
|
|
* so we haven't changed that yet. */
|
|
vrh->last_avail_idx -= num;
|
|
}
|
|
EXPORT_SYMBOL(vringh_abandon_kern);
|
|
|
|
/**
|
|
* vringh_complete_kern - we've finished with descriptor, publish it.
|
|
* @vrh: the vring.
|
|
* @head: the head as filled in by vringh_getdesc_kern.
|
|
* @len: the length of data we have written.
|
|
*
|
|
* You should check vringh_need_notify_kern() after one or more calls
|
|
* to this function.
|
|
*/
|
|
int vringh_complete_kern(struct vringh *vrh, u16 head, u32 len)
|
|
{
|
|
struct vring_used_elem used;
|
|
|
|
used.id = cpu_to_vringh32(vrh, head);
|
|
used.len = cpu_to_vringh32(vrh, len);
|
|
|
|
return __vringh_complete(vrh, &used, 1, putu16_kern, putused_kern);
|
|
}
|
|
EXPORT_SYMBOL(vringh_complete_kern);
|
|
|
|
/**
|
|
* vringh_notify_enable_kern - we want to know if something changes.
|
|
* @vrh: the vring.
|
|
*
|
|
* This always enables notifications, but returns false if there are
|
|
* now more buffers available in the vring.
|
|
*/
|
|
bool vringh_notify_enable_kern(struct vringh *vrh)
|
|
{
|
|
return __vringh_notify_enable(vrh, getu16_kern, putu16_kern);
|
|
}
|
|
EXPORT_SYMBOL(vringh_notify_enable_kern);
|
|
|
|
/**
|
|
* vringh_notify_disable_kern - don't tell us if something changes.
|
|
* @vrh: the vring.
|
|
*
|
|
* This is our normal running state: we disable and then only enable when
|
|
* we're going to sleep.
|
|
*/
|
|
void vringh_notify_disable_kern(struct vringh *vrh)
|
|
{
|
|
__vringh_notify_disable(vrh, putu16_kern);
|
|
}
|
|
EXPORT_SYMBOL(vringh_notify_disable_kern);
|
|
|
|
/**
|
|
* vringh_need_notify_kern - must we tell the other side about used buffers?
|
|
* @vrh: the vring we've called vringh_complete_kern() on.
|
|
*
|
|
* Returns -errno or 0 if we don't need to tell the other side, 1 if we do.
|
|
*/
|
|
int vringh_need_notify_kern(struct vringh *vrh)
|
|
{
|
|
return __vringh_need_notify(vrh, getu16_kern);
|
|
}
|
|
EXPORT_SYMBOL(vringh_need_notify_kern);
|
|
|
|
MODULE_LICENSE("GPL");
|