1 /* SPDX-License-Identifier: BSD-3-Clause
2 * Copyright(c) 2010-2018 Intel Corporation
5 #ifndef _VHOST_NET_CDEV_H_
6 #define _VHOST_NET_CDEV_H_
10 #include <sys/types.h>
11 #include <sys/queue.h>
13 #include <linux/vhost.h>
14 #include <linux/virtio_net.h>
15 #include <sys/socket.h>
19 #include <rte_ether.h>
20 #include <rte_rwlock.h>
21 #include <rte_malloc.h>
22 #include <rte_dmadev.h>
24 #include "rte_vhost.h"
26 #include "vdpa_driver.h"
28 #include "rte_vhost_async.h"
30 /* Used to indicate that the device is running on a data core */
31 #define VIRTIO_DEV_RUNNING ((uint32_t)1 << 0)
32 /* Used to indicate that the device is ready to operate */
33 #define VIRTIO_DEV_READY ((uint32_t)1 << 1)
34 /* Used to indicate that the built-in vhost net device backend is enabled */
35 #define VIRTIO_DEV_BUILTIN_VIRTIO_NET ((uint32_t)1 << 2)
36 /* Used to indicate that the device has its own data path and configured */
37 #define VIRTIO_DEV_VDPA_CONFIGURED ((uint32_t)1 << 3)
38 /* Used to indicate that the feature negotiation failed */
39 #define VIRTIO_DEV_FEATURES_FAILED ((uint32_t)1 << 4)
40 /* Used to indicate that the virtio_net tx code should fill TX ol_flags */
41 #define VIRTIO_DEV_LEGACY_OL_FLAGS ((uint32_t)1 << 5)
43 /* Backend value set by guest. */
44 #define VIRTIO_DEV_STOPPED -1
46 #define BUF_VECTOR_MAX 256
48 #define VHOST_LOG_CACHE_NR 32
50 #define MAX_PKT_BURST 32
52 #define VHOST_MAX_ASYNC_IT (MAX_PKT_BURST)
53 #define VHOST_MAX_ASYNC_VEC 2048
54 #define VIRTIO_MAX_RX_PKTLEN 9728U
55 #define VHOST_DMA_MAX_COPY_COMPLETE ((VIRTIO_MAX_RX_PKTLEN / RTE_MBUF_DEFAULT_DATAROOM) \
58 #define PACKED_DESC_ENQUEUE_USED_FLAG(w) \
59 ((w) ? (VRING_DESC_F_AVAIL | VRING_DESC_F_USED | VRING_DESC_F_WRITE) : \
61 #define PACKED_DESC_DEQUEUE_USED_FLAG(w) \
62 ((w) ? (VRING_DESC_F_AVAIL | VRING_DESC_F_USED) : 0x0)
63 #define PACKED_DESC_SINGLE_DEQUEUE_FLAG (VRING_DESC_F_NEXT | \
64 VRING_DESC_F_INDIRECT)
66 #define PACKED_BATCH_SIZE (RTE_CACHE_LINE_SIZE / \
67 sizeof(struct vring_packed_desc))
68 #define PACKED_BATCH_MASK (PACKED_BATCH_SIZE - 1)
70 #ifdef VHOST_GCC_UNROLL_PRAGMA
71 #define vhost_for_each_try_unroll(iter, val, size) _Pragma("GCC unroll 4") \
72 for (iter = val; iter < size; iter++)
75 #ifdef VHOST_CLANG_UNROLL_PRAGMA
76 #define vhost_for_each_try_unroll(iter, val, size) _Pragma("unroll 4") \
77 for (iter = val; iter < size; iter++)
80 #ifdef VHOST_ICC_UNROLL_PRAGMA
81 #define vhost_for_each_try_unroll(iter, val, size) _Pragma("unroll (4)") \
82 for (iter = val; iter < size; iter++)
85 #ifndef vhost_for_each_try_unroll
86 #define vhost_for_each_try_unroll(iter, val, num) \
87 for (iter = val; iter < num; iter++)
91 * Structure contains buffer address, length and descriptor index
92 * from vring to do scatter RX.
102 * Structure contains the info for each batched memory copy.
104 struct batch_copy_elem {
112 * Structure that contains the info for batched dirty logging.
114 struct log_cache_entry {
119 struct vring_used_elem_packed {
138 struct vhost_iov_iter {
139 /** pointer to the iovec array */
140 struct vhost_iovec *iov;
141 /** number of iovec in this iterator */
142 unsigned long nr_segs;
145 struct async_dma_vchan_info {
146 /* circular array to track if packet copy completes */
147 bool **pkts_cmpl_flag_addr;
149 /* max elements in 'pkts_cmpl_flag_addr' */
151 /* ring index mask for 'pkts_cmpl_flag_addr' */
155 * DMA virtual channel lock. Although it is able to bind DMA
156 * virtual channels to data plane threads, vhost control plane
157 * thread could call data plane functions too, thus causing
158 * DMA device contention.
160 * For example, in VM exit case, vhost control plane thread needs
161 * to clear in-flight packets before disable vring, but there could
162 * be anotther data plane thread is enqueuing packets to the same
163 * vring with the same DMA virtual channel. As dmadev PMD functions
164 * are lock-free, the control plane and data plane threads could
165 * operate the same DMA virtual channel at the same time.
167 rte_spinlock_t dma_lock;
170 struct async_dma_info {
171 struct async_dma_vchan_info *vchans;
172 /* number of registered virtual channels */
176 extern struct async_dma_info dma_copy_track[RTE_DMADEV_DEFAULT_MAX];
179 * inflight async packet information
181 struct async_inflight_info {
182 struct rte_mbuf *mbuf;
183 uint16_t descs; /* num of descs inflight */
184 uint16_t nr_buffers; /* num of buffers inflight for packed ring */
188 struct vhost_iov_iter iov_iter[VHOST_MAX_ASYNC_IT];
189 struct vhost_iovec iovec[VHOST_MAX_ASYNC_VEC];
193 /* data transfer status */
194 struct async_inflight_info *pkts_info;
196 * Packet reorder array. "true" indicates that DMA device
197 * completes all copies for the packet.
199 * Note that this array could be written by multiple threads
200 * simultaneously. For example, in the case of thread0 and
201 * thread1 RX packets from NIC and then enqueue packets to
202 * vring0 and vring1 with own DMA device DMA0 and DMA1, it's
203 * possible for thread0 to get completed copies belonging to
204 * vring1 from DMA0, while thread0 is calling rte_vhost_poll
205 * _enqueue_completed() for vring0 and thread1 is calling
206 * rte_vhost_submit_enqueue_burst() for vring1. In this case,
207 * vq->access_lock cannot protect pkts_cmpl_flag of vring1.
209 * However, since offloading is per-packet basis, each packet
210 * flag will only be written by one thread. And single byte
211 * write is atomic, so no lock for pkts_cmpl_flag is needed.
213 bool *pkts_cmpl_flag;
215 uint16_t pkts_inflight_n;
217 struct vring_used_elem *descs_split;
218 struct vring_used_elem_packed *buffers_packed;
221 uint16_t desc_idx_split;
222 uint16_t buffer_idx_packed;
225 uint16_t last_desc_idx_split;
226 uint16_t last_buffer_idx_packed;
231 * Structure contains variables relevant to RX/TX virtqueues.
233 struct vhost_virtqueue {
235 struct vring_desc *desc;
236 struct vring_packed_desc *desc_packed;
239 struct vring_avail *avail;
240 struct vring_packed_desc_event *driver_event;
243 struct vring_used *used;
244 struct vring_packed_desc_event *device_event;
248 uint16_t last_avail_idx;
249 uint16_t last_used_idx;
250 /* Last used index we notify to front end. */
251 uint16_t signalled_used;
252 bool signalled_used_valid;
253 #define VIRTIO_INVALID_EVENTFD (-1)
254 #define VIRTIO_UNINITIALIZED_EVENTFD (-2)
260 rte_spinlock_t access_lock;
264 struct vring_used_elem *shadow_used_split;
265 struct vring_used_elem_packed *shadow_used_packed;
267 uint16_t shadow_used_idx;
268 /* Record packed ring enqueue latest desc cache aligned index */
269 uint16_t shadow_aligned_idx;
270 /* Record packed ring first dequeue desc index */
271 uint16_t shadow_last_used_idx;
273 uint16_t batch_copy_nb_elems;
274 struct batch_copy_elem *batch_copy_elems;
276 bool used_wrap_counter;
277 bool avail_wrap_counter;
279 /* Physical address of used ring, for logging */
280 uint16_t log_cache_nb_elem;
281 uint64_t log_guest_addr;
282 struct log_cache_entry *log_cache;
284 rte_rwlock_t iotlb_lock;
285 rte_rwlock_t iotlb_pending_lock;
286 struct rte_mempool *iotlb_pool;
287 TAILQ_HEAD(, vhost_iotlb_entry) iotlb_list;
288 TAILQ_HEAD(, vhost_iotlb_entry) iotlb_pending_list;
291 /* Used to notify the guest (trigger interrupt) */
293 /* Currently unused as polling mode is enabled */
296 /* inflight share memory info */
298 struct rte_vhost_inflight_info_split *inflight_split;
299 struct rte_vhost_inflight_info_packed *inflight_packed;
301 struct rte_vhost_resubmit_info *resubmit_inflight;
302 uint64_t global_counter;
304 struct vhost_async *async;
307 #define VIRTIO_UNINITIALIZED_NOTIF (-1)
309 struct vhost_vring_addr ring_addrs;
310 } __rte_cache_aligned;
312 /* Virtio device status as per Virtio specification */
313 #define VIRTIO_DEVICE_STATUS_RESET 0x00
314 #define VIRTIO_DEVICE_STATUS_ACK 0x01
315 #define VIRTIO_DEVICE_STATUS_DRIVER 0x02
316 #define VIRTIO_DEVICE_STATUS_DRIVER_OK 0x04
317 #define VIRTIO_DEVICE_STATUS_FEATURES_OK 0x08
318 #define VIRTIO_DEVICE_STATUS_DEV_NEED_RESET 0x40
319 #define VIRTIO_DEVICE_STATUS_FAILED 0x80
321 #define VHOST_MAX_VRING 0x100
322 #define VHOST_MAX_QUEUE_PAIRS 0x80
324 /* Declare IOMMU related bits for older kernels */
325 #ifndef VIRTIO_F_IOMMU_PLATFORM
327 #define VIRTIO_F_IOMMU_PLATFORM 33
329 struct vhost_iotlb_msg {
333 #define VHOST_ACCESS_RO 0x1
334 #define VHOST_ACCESS_WO 0x2
335 #define VHOST_ACCESS_RW 0x3
337 #define VHOST_IOTLB_MISS 1
338 #define VHOST_IOTLB_UPDATE 2
339 #define VHOST_IOTLB_INVALIDATE 3
340 #define VHOST_IOTLB_ACCESS_FAIL 4
344 #define VHOST_IOTLB_MSG 0x1
349 struct vhost_iotlb_msg iotlb;
356 * Define virtio 1.0 for older kernels
358 #ifndef VIRTIO_F_VERSION_1
359 #define VIRTIO_F_VERSION_1 32
362 /* Declare packed ring related bits for older kernels */
363 #ifndef VIRTIO_F_RING_PACKED
365 #define VIRTIO_F_RING_PACKED 34
367 struct vring_packed_desc {
374 struct vring_packed_desc_event {
381 * Declare below packed ring defines unconditionally
382 * as Kernel header might use different names.
384 #define VRING_DESC_F_AVAIL (1ULL << 7)
385 #define VRING_DESC_F_USED (1ULL << 15)
387 #define VRING_EVENT_F_ENABLE 0x0
388 #define VRING_EVENT_F_DISABLE 0x1
389 #define VRING_EVENT_F_DESC 0x2
392 * Available and used descs are in same order
394 #ifndef VIRTIO_F_IN_ORDER
395 #define VIRTIO_F_IN_ORDER 35
398 /* Features supported by this builtin vhost-user net driver. */
399 #define VIRTIO_NET_SUPPORTED_FEATURES ((1ULL << VIRTIO_NET_F_MRG_RXBUF) | \
400 (1ULL << VIRTIO_F_ANY_LAYOUT) | \
401 (1ULL << VIRTIO_NET_F_CTRL_VQ) | \
402 (1ULL << VIRTIO_NET_F_CTRL_RX) | \
403 (1ULL << VIRTIO_NET_F_GUEST_ANNOUNCE) | \
404 (1ULL << VIRTIO_NET_F_MQ) | \
405 (1ULL << VIRTIO_F_VERSION_1) | \
406 (1ULL << VHOST_F_LOG_ALL) | \
407 (1ULL << VHOST_USER_F_PROTOCOL_FEATURES) | \
408 (1ULL << VIRTIO_NET_F_GSO) | \
409 (1ULL << VIRTIO_NET_F_HOST_TSO4) | \
410 (1ULL << VIRTIO_NET_F_HOST_TSO6) | \
411 (1ULL << VIRTIO_NET_F_HOST_UFO) | \
412 (1ULL << VIRTIO_NET_F_HOST_ECN) | \
413 (1ULL << VIRTIO_NET_F_CSUM) | \
414 (1ULL << VIRTIO_NET_F_GUEST_CSUM) | \
415 (1ULL << VIRTIO_NET_F_GUEST_TSO4) | \
416 (1ULL << VIRTIO_NET_F_GUEST_TSO6) | \
417 (1ULL << VIRTIO_NET_F_GUEST_UFO) | \
418 (1ULL << VIRTIO_NET_F_GUEST_ECN) | \
419 (1ULL << VIRTIO_RING_F_INDIRECT_DESC) | \
420 (1ULL << VIRTIO_RING_F_EVENT_IDX) | \
421 (1ULL << VIRTIO_NET_F_MTU) | \
422 (1ULL << VIRTIO_F_IN_ORDER) | \
423 (1ULL << VIRTIO_F_IOMMU_PLATFORM) | \
424 (1ULL << VIRTIO_F_RING_PACKED))
428 uint64_t guest_phys_addr;
429 uint64_t host_phys_addr;
433 struct inflight_mem_info {
440 * Device structure contains all configuration information relating
444 /* Frontend (QEMU) memory and memory region information */
445 struct rte_vhost_memory *mem;
447 uint64_t protocol_features;
451 /* to tell if we need broadcast rarp packet */
452 int16_t broadcast_rarp;
458 struct vhost_virtqueue *virtqueue[VHOST_MAX_QUEUE_PAIRS * 2];
459 struct inflight_mem_info *inflight_info;
460 #define IF_NAME_SZ (PATH_MAX > IFNAMSIZ ? PATH_MAX : IFNAMSIZ)
461 char ifname[IF_NAME_SZ];
465 struct rte_ether_addr mac;
469 struct rte_vhost_device_ops const *notify_ops;
471 uint32_t nr_guest_pages;
472 uint32_t max_guest_pages;
473 struct guest_page *guest_pages;
476 rte_spinlock_t slave_req_lock;
479 int postcopy_listening;
481 struct rte_vdpa_device *vdpa_dev;
483 /* context data for the external message handlers */
485 /* pre and post vhost user message handlers for the device */
486 struct rte_vhost_user_extern_ops extern_ops;
487 } __rte_cache_aligned;
489 static __rte_always_inline bool
490 vq_is_packed(struct virtio_net *dev)
492 return dev->features & (1ull << VIRTIO_F_RING_PACKED);
496 desc_is_avail(struct vring_packed_desc *desc, bool wrap_counter)
498 uint16_t flags = __atomic_load_n(&desc->flags, __ATOMIC_ACQUIRE);
500 return wrap_counter == !!(flags & VRING_DESC_F_AVAIL) &&
501 wrap_counter != !!(flags & VRING_DESC_F_USED);
505 vq_inc_last_used_packed(struct vhost_virtqueue *vq, uint16_t num)
507 vq->last_used_idx += num;
508 if (vq->last_used_idx >= vq->size) {
509 vq->used_wrap_counter ^= 1;
510 vq->last_used_idx -= vq->size;
515 vq_inc_last_avail_packed(struct vhost_virtqueue *vq, uint16_t num)
517 vq->last_avail_idx += num;
518 if (vq->last_avail_idx >= vq->size) {
519 vq->avail_wrap_counter ^= 1;
520 vq->last_avail_idx -= vq->size;
524 void __vhost_log_cache_write(struct virtio_net *dev,
525 struct vhost_virtqueue *vq,
526 uint64_t addr, uint64_t len);
527 void __vhost_log_cache_write_iova(struct virtio_net *dev,
528 struct vhost_virtqueue *vq,
529 uint64_t iova, uint64_t len);
530 void __vhost_log_cache_sync(struct virtio_net *dev,
531 struct vhost_virtqueue *vq);
532 void __vhost_log_write(struct virtio_net *dev, uint64_t addr, uint64_t len);
533 void __vhost_log_write_iova(struct virtio_net *dev, struct vhost_virtqueue *vq,
534 uint64_t iova, uint64_t len);
536 static __rte_always_inline void
537 vhost_log_write(struct virtio_net *dev, uint64_t addr, uint64_t len)
539 if (unlikely(dev->features & (1ULL << VHOST_F_LOG_ALL)))
540 __vhost_log_write(dev, addr, len);
543 static __rte_always_inline void
544 vhost_log_cache_sync(struct virtio_net *dev, struct vhost_virtqueue *vq)
546 if (unlikely(dev->features & (1ULL << VHOST_F_LOG_ALL)))
547 __vhost_log_cache_sync(dev, vq);
550 static __rte_always_inline void
551 vhost_log_cache_write(struct virtio_net *dev, struct vhost_virtqueue *vq,
552 uint64_t addr, uint64_t len)
554 if (unlikely(dev->features & (1ULL << VHOST_F_LOG_ALL)))
555 __vhost_log_cache_write(dev, vq, addr, len);
558 static __rte_always_inline void
559 vhost_log_cache_used_vring(struct virtio_net *dev, struct vhost_virtqueue *vq,
560 uint64_t offset, uint64_t len)
562 if (unlikely(dev->features & (1ULL << VHOST_F_LOG_ALL))) {
563 if (unlikely(vq->log_guest_addr == 0))
565 __vhost_log_cache_write(dev, vq, vq->log_guest_addr + offset,
570 static __rte_always_inline void
571 vhost_log_used_vring(struct virtio_net *dev, struct vhost_virtqueue *vq,
572 uint64_t offset, uint64_t len)
574 if (unlikely(dev->features & (1ULL << VHOST_F_LOG_ALL))) {
575 if (unlikely(vq->log_guest_addr == 0))
577 __vhost_log_write(dev, vq->log_guest_addr + offset, len);
581 static __rte_always_inline void
582 vhost_log_cache_write_iova(struct virtio_net *dev, struct vhost_virtqueue *vq,
583 uint64_t iova, uint64_t len)
585 if (likely(!(dev->features & (1ULL << VHOST_F_LOG_ALL))))
588 if (dev->features & (1ULL << VIRTIO_F_IOMMU_PLATFORM))
589 __vhost_log_cache_write_iova(dev, vq, iova, len);
591 __vhost_log_cache_write(dev, vq, iova, len);
594 static __rte_always_inline void
595 vhost_log_write_iova(struct virtio_net *dev, struct vhost_virtqueue *vq,
596 uint64_t iova, uint64_t len)
598 if (likely(!(dev->features & (1ULL << VHOST_F_LOG_ALL))))
601 if (dev->features & (1ULL << VIRTIO_F_IOMMU_PLATFORM))
602 __vhost_log_write_iova(dev, vq, iova, len);
604 __vhost_log_write(dev, iova, len);
607 extern int vhost_config_log_level;
608 extern int vhost_data_log_level;
610 #define VHOST_LOG_CONFIG(level, fmt, args...) \
611 rte_log(RTE_LOG_ ## level, vhost_config_log_level, \
612 "VHOST_CONFIG: " fmt, ##args)
614 #define VHOST_LOG_DATA(level, fmt, args...) \
615 (void)((RTE_LOG_ ## level <= RTE_LOG_DP_LEVEL) ? \
616 rte_log(RTE_LOG_ ## level, vhost_data_log_level, \
617 "VHOST_DATA : " fmt, ##args) : \
620 #ifdef RTE_LIBRTE_VHOST_DEBUG
621 #define VHOST_MAX_PRINT_BUFF 6072
622 #define PRINT_PACKET(device, addr, size, header) do { \
623 char *pkt_addr = (char *)(addr); \
624 unsigned int index; \
625 char packet[VHOST_MAX_PRINT_BUFF]; \
628 snprintf(packet, VHOST_MAX_PRINT_BUFF, "(%d) Header size %d: ", (device->vid), (size)); \
630 snprintf(packet, VHOST_MAX_PRINT_BUFF, "(%d) Packet size %d: ", (device->vid), (size)); \
631 for (index = 0; index < (size); index++) { \
632 snprintf(packet + strnlen(packet, VHOST_MAX_PRINT_BUFF), VHOST_MAX_PRINT_BUFF - strnlen(packet, VHOST_MAX_PRINT_BUFF), \
633 "%02hhx ", pkt_addr[index]); \
635 snprintf(packet + strnlen(packet, VHOST_MAX_PRINT_BUFF), VHOST_MAX_PRINT_BUFF - strnlen(packet, VHOST_MAX_PRINT_BUFF), "\n"); \
637 VHOST_LOG_DATA(DEBUG, "%s", packet); \
640 #define PRINT_PACKET(device, addr, size, header) do {} while (0)
643 extern struct virtio_net *vhost_devices[RTE_MAX_VHOST_DEVICE];
645 #define VHOST_BINARY_SEARCH_THRESH 256
647 static __rte_always_inline int guest_page_addrcmp(const void *p1,
650 const struct guest_page *page1 = (const struct guest_page *)p1;
651 const struct guest_page *page2 = (const struct guest_page *)p2;
653 if (page1->guest_phys_addr > page2->guest_phys_addr)
655 if (page1->guest_phys_addr < page2->guest_phys_addr)
661 static __rte_always_inline int guest_page_rangecmp(const void *p1, const void *p2)
663 const struct guest_page *page1 = (const struct guest_page *)p1;
664 const struct guest_page *page2 = (const struct guest_page *)p2;
666 if (page1->guest_phys_addr >= page2->guest_phys_addr) {
667 if (page1->guest_phys_addr < page2->guest_phys_addr + page2->size)
675 static __rte_always_inline rte_iova_t
676 gpa_to_first_hpa(struct virtio_net *dev, uint64_t gpa,
677 uint64_t gpa_size, uint64_t *hpa_size)
680 struct guest_page *page;
681 struct guest_page key;
683 *hpa_size = gpa_size;
684 if (dev->nr_guest_pages >= VHOST_BINARY_SEARCH_THRESH) {
685 key.guest_phys_addr = gpa;
686 page = bsearch(&key, dev->guest_pages, dev->nr_guest_pages,
687 sizeof(struct guest_page), guest_page_rangecmp);
689 if (gpa + gpa_size <=
690 page->guest_phys_addr + page->size) {
691 return gpa - page->guest_phys_addr +
692 page->host_phys_addr;
693 } else if (gpa < page->guest_phys_addr +
695 *hpa_size = page->guest_phys_addr +
697 return gpa - page->guest_phys_addr +
698 page->host_phys_addr;
702 for (i = 0; i < dev->nr_guest_pages; i++) {
703 page = &dev->guest_pages[i];
705 if (gpa >= page->guest_phys_addr) {
706 if (gpa + gpa_size <=
707 page->guest_phys_addr + page->size) {
708 return gpa - page->guest_phys_addr +
709 page->host_phys_addr;
710 } else if (gpa < page->guest_phys_addr +
712 *hpa_size = page->guest_phys_addr +
714 return gpa - page->guest_phys_addr +
715 page->host_phys_addr;
725 /* Convert guest physical address to host physical address */
726 static __rte_always_inline rte_iova_t
727 gpa_to_hpa(struct virtio_net *dev, uint64_t gpa, uint64_t size)
732 hpa = gpa_to_first_hpa(dev, gpa, size, &hpa_size);
733 return hpa_size == size ? hpa : 0;
736 static __rte_always_inline uint64_t
737 hva_to_gpa(struct virtio_net *dev, uint64_t vva, uint64_t len)
739 struct rte_vhost_mem_region *r;
742 if (unlikely(!dev || !dev->mem))
745 for (i = 0; i < dev->mem->nregions; i++) {
746 r = &dev->mem->regions[i];
748 if (vva >= r->host_user_addr &&
749 vva + len < r->host_user_addr + r->size) {
750 return r->guest_phys_addr + vva - r->host_user_addr;
756 static __rte_always_inline struct virtio_net *
759 struct virtio_net *dev = vhost_devices[vid];
761 if (unlikely(!dev)) {
762 VHOST_LOG_CONFIG(ERR,
763 "(%d) device not found.\n", vid);
769 int vhost_new_device(void);
770 void cleanup_device(struct virtio_net *dev, int destroy);
771 void reset_device(struct virtio_net *dev);
772 void vhost_destroy_device(int);
773 void vhost_destroy_device_notify(struct virtio_net *dev);
775 void cleanup_vq(struct vhost_virtqueue *vq, int destroy);
776 void cleanup_vq_inflight(struct virtio_net *dev, struct vhost_virtqueue *vq);
777 void free_vq(struct virtio_net *dev, struct vhost_virtqueue *vq);
779 int alloc_vring_queue(struct virtio_net *dev, uint32_t vring_idx);
781 void vhost_attach_vdpa_device(int vid, struct rte_vdpa_device *dev);
783 void vhost_set_ifname(int, const char *if_name, unsigned int if_len);
784 void vhost_setup_virtio_net(int vid, bool enable, bool legacy_ol_flags);
785 void vhost_enable_extbuf(int vid);
786 void vhost_enable_linearbuf(int vid);
787 int vhost_enable_guest_notification(struct virtio_net *dev,
788 struct vhost_virtqueue *vq, int enable);
790 struct rte_vhost_device_ops const *vhost_driver_callback_get(const char *path);
793 * Backend-specific cleanup.
795 * TODO: fix it; we have one backend now
797 void vhost_backend_cleanup(struct virtio_net *dev);
799 uint64_t __vhost_iova_to_vva(struct virtio_net *dev, struct vhost_virtqueue *vq,
800 uint64_t iova, uint64_t *len, uint8_t perm);
801 void *vhost_alloc_copy_ind_table(struct virtio_net *dev,
802 struct vhost_virtqueue *vq,
803 uint64_t desc_addr, uint64_t desc_len);
804 int vring_translate(struct virtio_net *dev, struct vhost_virtqueue *vq);
805 uint64_t translate_log_addr(struct virtio_net *dev, struct vhost_virtqueue *vq,
807 void vring_invalidate(struct virtio_net *dev, struct vhost_virtqueue *vq);
809 static __rte_always_inline uint64_t
810 vhost_iova_to_vva(struct virtio_net *dev, struct vhost_virtqueue *vq,
811 uint64_t iova, uint64_t *len, uint8_t perm)
813 if (!(dev->features & (1ULL << VIRTIO_F_IOMMU_PLATFORM)))
814 return rte_vhost_va_from_guest_pa(dev->mem, iova, len);
816 return __vhost_iova_to_vva(dev, vq, iova, len, perm);
819 #define vhost_avail_event(vr) \
820 (*(volatile uint16_t*)&(vr)->used->ring[(vr)->size])
821 #define vhost_used_event(vr) \
822 (*(volatile uint16_t*)&(vr)->avail->ring[(vr)->size])
825 * The following is used with VIRTIO_RING_F_EVENT_IDX.
826 * Assuming a given event_idx value from the other size, if we have
827 * just incremented index from old to new_idx, should we trigger an
830 static __rte_always_inline int
831 vhost_need_event(uint16_t event_idx, uint16_t new_idx, uint16_t old)
833 return (uint16_t)(new_idx - event_idx - 1) < (uint16_t)(new_idx - old);
836 static __rte_always_inline void
837 vhost_vring_call_split(struct virtio_net *dev, struct vhost_virtqueue *vq)
839 /* Flush used->idx update before we read avail->flags. */
840 rte_atomic_thread_fence(__ATOMIC_SEQ_CST);
842 /* Don't kick guest if we don't reach index specified by guest. */
843 if (dev->features & (1ULL << VIRTIO_RING_F_EVENT_IDX)) {
844 uint16_t old = vq->signalled_used;
845 uint16_t new = vq->last_used_idx;
846 bool signalled_used_valid = vq->signalled_used_valid;
848 vq->signalled_used = new;
849 vq->signalled_used_valid = true;
851 VHOST_LOG_DATA(DEBUG, "%s: used_event_idx=%d, old=%d, new=%d\n",
853 vhost_used_event(vq),
856 if ((vhost_need_event(vhost_used_event(vq), new, old) &&
857 (vq->callfd >= 0)) ||
858 unlikely(!signalled_used_valid)) {
859 eventfd_write(vq->callfd, (eventfd_t) 1);
860 if (dev->notify_ops->guest_notified)
861 dev->notify_ops->guest_notified(dev->vid);
864 /* Kick the guest if necessary. */
865 if (!(vq->avail->flags & VRING_AVAIL_F_NO_INTERRUPT)
866 && (vq->callfd >= 0)) {
867 eventfd_write(vq->callfd, (eventfd_t)1);
868 if (dev->notify_ops->guest_notified)
869 dev->notify_ops->guest_notified(dev->vid);
874 static __rte_always_inline void
875 vhost_vring_call_packed(struct virtio_net *dev, struct vhost_virtqueue *vq)
877 uint16_t old, new, off, off_wrap;
878 bool signalled_used_valid, kick = false;
880 /* Flush used desc update. */
881 rte_atomic_thread_fence(__ATOMIC_SEQ_CST);
883 if (!(dev->features & (1ULL << VIRTIO_RING_F_EVENT_IDX))) {
884 if (vq->driver_event->flags !=
885 VRING_EVENT_F_DISABLE)
890 old = vq->signalled_used;
891 new = vq->last_used_idx;
892 vq->signalled_used = new;
893 signalled_used_valid = vq->signalled_used_valid;
894 vq->signalled_used_valid = true;
896 if (vq->driver_event->flags != VRING_EVENT_F_DESC) {
897 if (vq->driver_event->flags != VRING_EVENT_F_DISABLE)
902 if (unlikely(!signalled_used_valid)) {
907 rte_atomic_thread_fence(__ATOMIC_ACQUIRE);
909 off_wrap = vq->driver_event->off_wrap;
910 off = off_wrap & ~(1 << 15);
915 if (vq->used_wrap_counter != off_wrap >> 15)
918 if (vhost_need_event(off, new, old))
922 eventfd_write(vq->callfd, (eventfd_t)1);
923 if (dev->notify_ops->guest_notified)
924 dev->notify_ops->guest_notified(dev->vid);
928 static __rte_always_inline void
929 free_ind_table(void *idesc)
934 static __rte_always_inline void
935 restore_mbuf(struct rte_mbuf *m)
937 uint32_t mbuf_size, priv_size;
940 priv_size = rte_pktmbuf_priv_size(m->pool);
941 mbuf_size = sizeof(struct rte_mbuf) + priv_size;
942 /* start of buffer is after mbuf structure and priv data */
944 m->buf_addr = (char *)m + mbuf_size;
945 m->buf_iova = rte_mempool_virt2iova(m) + mbuf_size;
950 static __rte_always_inline bool
951 mbuf_is_consumed(struct rte_mbuf *m)
954 if (rte_mbuf_refcnt_read(m) > 1)
962 #endif /* _VHOST_NET_CDEV_H_ */