From: Pravin M Bathija <[email protected]>

Add support for VHOST_USER_ADD_MEM_REG, VHOST_USER_REM_MEM_REG and
VHOST_USER_GET_MAX_MEM_SLOTS. Refactor memory initialization into
common helper and add supporting functions for dynamic memory management.

Signed-off-by: Pravin M Bathija <[email protected]>
Acked-by: Fengchengwen <[email protected]>
Reviewed-by: Stephen Hemminger <[email protected]>
Acked-by: Maxime Coquelin <[email protected]>
---
 lib/vhost/vhost_user.c | 255 +++++++++++++++++++++++++++++++++++++++++
 1 file changed, 255 insertions(+)

diff --git a/lib/vhost/vhost_user.c b/lib/vhost/vhost_user.c
index 94fca8b589..522ba1db82 100644
--- a/lib/vhost/vhost_user.c
+++ b/lib/vhost/vhost_user.c
@@ -71,6 +71,9 @@ VHOST_MESSAGE_HANDLER(VHOST_USER_SET_FEATURES, 
vhost_user_set_features, false, t
 VHOST_MESSAGE_HANDLER(VHOST_USER_SET_OWNER, vhost_user_set_owner, false, true) 
\
 VHOST_MESSAGE_HANDLER(VHOST_USER_RESET_OWNER, vhost_user_reset_owner, false, 
false) \
 VHOST_MESSAGE_HANDLER(VHOST_USER_SET_MEM_TABLE, vhost_user_set_mem_table, 
true, true) \
+VHOST_MESSAGE_HANDLER(VHOST_USER_GET_MAX_MEM_SLOTS, 
vhost_user_get_max_mem_slots, false, false) \
+VHOST_MESSAGE_HANDLER(VHOST_USER_ADD_MEM_REG, vhost_user_add_mem_reg, true, 
true) \
+VHOST_MESSAGE_HANDLER(VHOST_USER_REM_MEM_REG, vhost_user_rem_mem_reg, true, 
true) \
 VHOST_MESSAGE_HANDLER(VHOST_USER_SET_LOG_BASE, vhost_user_set_log_base, true, 
true) \
 VHOST_MESSAGE_HANDLER(VHOST_USER_SET_LOG_FD, vhost_user_set_log_fd, true, 
true) \
 VHOST_MESSAGE_HANDLER(VHOST_USER_SET_VRING_NUM, vhost_user_set_vring_num, 
false, true) \
@@ -1167,6 +1170,24 @@ add_guest_pages(struct virtio_net *dev, struct 
rte_vhost_mem_region *reg,
        return 0;
 }
 
+static void
+remove_guest_pages(struct virtio_net *dev, struct rte_vhost_mem_region *reg)
+{
+       uint64_t reg_start = reg->host_user_addr;
+       uint64_t reg_end = reg_start + reg->size;
+       uint32_t i, j = 0;
+
+       for (i = 0; i < dev->nr_guest_pages; i++) {
+               if (dev->guest_pages[i].host_user_addr >= reg_start &&
+                   dev->guest_pages[i].host_user_addr < reg_end)
+                       continue;
+               if (j != i)
+                       dev->guest_pages[j] = dev->guest_pages[i];
+               j++;
+       }
+       dev->nr_guest_pages = j;
+}
+
 #ifdef RTE_LIBRTE_VHOST_DEBUG
 /* TODO: enable it only in debug mode? */
 static void
@@ -1591,6 +1612,240 @@ vhost_user_set_mem_table(struct virtio_net **pdev,
        return RTE_VHOST_MSG_RESULT_ERR;
 }
 
+
+static int
+vhost_user_get_max_mem_slots(struct virtio_net **pdev __rte_unused,
+                       struct vhu_msg_context *ctx,
+                       int main_fd __rte_unused)
+{
+       uint32_t max_mem_slots = VHOST_MEMORY_MAX_NREGIONS;
+
+       ctx->msg.payload.u64 = max_mem_slots;
+       ctx->msg.size = sizeof(ctx->msg.payload.u64);
+       ctx->fd_num = 0;
+
+       return RTE_VHOST_MSG_RESULT_REPLY;
+}
+
+/*
+ * Invalidate and re-translate all vring addresses after the memory table
+ * has been modified (add/remove region).
+ *
+ * translate_ring_addresses() may call numa_realloc(), which can reallocate
+ * the device structure.  The updated pointer is written back through *pdev
+ * so callers must refresh their local "dev" afterwards: dev = *pdev.
+ */
+static void
+vhost_user_invalidate_vrings(struct virtio_net **pdev)
+{
+       struct virtio_net *dev = *pdev;
+       uint32_t i;
+
+       for (i = 0; i < dev->nr_vring; i++) {
+               struct vhost_virtqueue *vq = dev->virtqueue[i];
+
+               if (!vq)
+                       continue;
+
+               if (vq->desc || vq->avail || vq->used) {
+                       vq_assert_lock(dev, vq);
+
+                       vring_invalidate(dev, vq);
+
+                       translate_ring_addresses(&dev, &vq);
+               }
+       }
+
+       *pdev = dev;
+}
+
+/*
+ * Macro wrapper that performs the compile-time lock assertion with the
+ * correct message ID at the call site, then calls the implementation.
+ */
+#define dev_invalidate_vrings(pdev, id) do { \
+       static_assert(id ## _LOCK_ALL_QPS, \
+               #id " handler is not declared as locking all queue pairs"); \
+       vhost_user_invalidate_vrings(pdev); \
+} while (0)
+
+static int
+vhost_user_add_mem_reg(struct virtio_net **pdev,
+                       struct vhu_msg_context *ctx,
+                       int main_fd __rte_unused)
+{
+       struct VhostUserMemoryRegion *region = &ctx->msg.payload.memreg.region;
+       struct virtio_net *dev = *pdev;
+       uint32_t i;
+
+       /* convert first region add to normal memory table set */
+       if (dev->mem == NULL) {
+               if (vhost_user_initialize_memory(pdev) < 0)
+                       goto close_msg_fds;
+       }
+
+       /* make sure new region will fit */
+       if (dev->mem->nregions >= VHOST_MEMORY_MAX_NREGIONS) {
+               VHOST_CONFIG_LOG(dev->ifname, ERR, "too many memory regions 
already (%u)",
+                                                                       
dev->mem->nregions);
+               goto close_msg_fds;
+       }
+
+       /* make sure supplied memory fd present */
+       if (ctx->fd_num != 1) {
+               VHOST_CONFIG_LOG(dev->ifname, ERR, "fd count makes no sense 
(%u)", ctx->fd_num);
+               goto close_msg_fds;
+       }
+
+       /* Make sure no overlap in guest virtual address space */
+       for (i = 0; i < dev->mem->nregions; i++) {
+               struct rte_vhost_mem_region *cur = &dev->mem->regions[i];
+               uint64_t cur_start = cur->guest_user_addr;
+               uint64_t cur_end = cur_start + cur->size - 1;
+               uint64_t new_start = region->userspace_addr;
+               uint64_t new_end = new_start + region->memory_size - 1;
+
+               if (new_end >= cur_start && new_start <= cur_end) {
+                       VHOST_CONFIG_LOG(dev->ifname, ERR,
+                               "requested memory region overlaps with another 
region");
+                       VHOST_CONFIG_LOG(dev->ifname, ERR,
+                               "\tRequested region address:0x%" PRIx64,
+                               region->userspace_addr);
+                       VHOST_CONFIG_LOG(dev->ifname, ERR,
+                               "\tRequested region size:0x%" PRIx64,
+                               region->memory_size);
+                       VHOST_CONFIG_LOG(dev->ifname, ERR,
+                               "\tOverlapping region address:0x%" PRIx64,
+                               cur->guest_user_addr);
+                       VHOST_CONFIG_LOG(dev->ifname, ERR,
+                               "\tOverlapping region size:0x%" PRIx64,
+                               cur->size);
+                       goto close_msg_fds;
+               }
+       }
+
+       /* New region goes at the end of the contiguous array */
+       struct rte_vhost_mem_region *reg = 
&dev->mem->regions[dev->mem->nregions];
+
+       reg->guest_phys_addr = region->guest_phys_addr;
+       reg->guest_user_addr = region->userspace_addr;
+       reg->size            = region->memory_size;
+       reg->fd              = ctx->fds[0];
+       ctx->fds[0]          = -1;
+
+       if (vhost_user_mmap_region(dev, reg, region->mmap_offset) < 0) {
+               VHOST_CONFIG_LOG(dev->ifname, ERR, "failed to mmap region");
+               if (reg->mmap_addr) {
+                       /* mmap succeeded but a later step (e.g. 
add_guest_pages)
+                        * failed; undo the mapping and any guest-page entries.
+                        */
+                       remove_guest_pages(dev, reg);
+                       free_mem_region(reg);
+               } else {
+                       close(reg->fd);
+                       reg->fd = -1;
+               }
+               goto close_msg_fds;
+       }
+
+       dev->mem->nregions++;
+
+       if (dev->async_copy && rte_vfio_is_enabled("vfio")) {
+               if (async_dma_map_region(dev, reg, true) < 0)
+                       goto free_new_region_no_dma;
+       }
+
+       if (dev->postcopy_listening) {
+               /*
+                * Cannot use vhost_user_postcopy_register() here because it
+                * reads ctx->msg.payload.memory (SET_MEM_TABLE layout), but
+                * ADD_MEM_REG uses the memreg payload.  Register the
+                * single new region directly instead.
+                */
+               if (vhost_user_postcopy_region_register(dev, reg) < 0)
+                       goto free_new_region;
+       }
+
+       dev_invalidate_vrings(pdev, VHOST_USER_ADD_MEM_REG);
+       dev = *pdev;
+       dump_guest_pages(dev);
+
+       /* Reply with the back-end's mapping address per vhost-user spec */
+       ctx->msg.payload.memreg.region.userspace_addr = reg->host_user_addr;
+       ctx->msg.size = sizeof(ctx->msg.payload.memreg);
+       ctx->fd_num = 0;
+
+       return RTE_VHOST_MSG_RESULT_REPLY;
+
+free_new_region:
+       if (dev->async_copy && rte_vfio_is_enabled("vfio"))
+               async_dma_map_region(dev, reg, false);
+free_new_region_no_dma:
+       remove_guest_pages(dev, reg);
+       free_mem_region(reg);
+       dev->mem->nregions--;
+close_msg_fds:
+       close_msg_fds(ctx);
+       return RTE_VHOST_MSG_RESULT_ERR;
+}
+
+static int
+vhost_user_rem_mem_reg(struct virtio_net **pdev,
+                       struct vhu_msg_context *ctx,
+                       int main_fd __rte_unused)
+{
+       struct VhostUserMemoryRegion *region = &ctx->msg.payload.memreg.region;
+       struct virtio_net *dev = *pdev;
+       uint32_t i;
+
+       if (dev->mem == NULL || dev->mem->nregions == 0) {
+               VHOST_CONFIG_LOG(dev->ifname, ERR, "no memory regions to 
remove");
+               close_msg_fds(ctx);
+               return RTE_VHOST_MSG_RESULT_ERR;
+       }
+
+       if (validate_msg_fds(dev, ctx, 0) != 0)
+               return RTE_VHOST_MSG_RESULT_ERR;
+
+       for (i = 0; i < dev->mem->nregions; i++) {
+               struct rte_vhost_mem_region *current_region = 
&dev->mem->regions[i];
+
+               /*
+                * According to the vhost-user specification:
+                * The memory region to be removed is identified by its GPA,
+                * user address and size. The mmap offset is ignored.
+                */
+               if (region->userspace_addr == current_region->guest_user_addr
+                       && region->guest_phys_addr == 
current_region->guest_phys_addr
+                       && region->memory_size == current_region->size) {
+                       if (dev->async_copy && rte_vfio_is_enabled("vfio"))
+                               async_dma_map_region(dev, current_region, 
false);
+                       remove_guest_pages(dev, current_region);
+                       free_mem_region(current_region);
+
+                       /* Compact the regions array to keep it contiguous */
+                       if (i < dev->mem->nregions - 1) {
+                               memmove(&dev->mem->regions[i],
+                                       &dev->mem->regions[i + 1],
+                                       (dev->mem->nregions - 1 - i) *
+                                       sizeof(struct rte_vhost_mem_region));
+                               memset(&dev->mem->regions[dev->mem->nregions - 
1],
+                                       0, sizeof(struct rte_vhost_mem_region));
+                       }
+
+                       dev->mem->nregions--;
+                       dev_invalidate_vrings(pdev, VHOST_USER_REM_MEM_REG);
+                       dev = *pdev;
+                       close_msg_fds(ctx);
+                       return RTE_VHOST_MSG_RESULT_OK;
+               }
+       }
+
+       VHOST_CONFIG_LOG(dev->ifname, ERR, "failed to find region");
+       close_msg_fds(ctx);
+       return RTE_VHOST_MSG_RESULT_ERR;
+}
+
 static bool
 vq_is_ready(struct virtio_net *dev, struct vhost_virtqueue *vq)
 {
-- 
2.43.0

Reply via email to