mirror of
git://nv-tegra.nvidia.com/linux-nv-oot.git
synced 2025-12-22 17:25:35 +03:00
nvidia-oot: port tegra ivc-mempool driver
Using this patch we are adding support for tegra ivc-mempool driver in oot kernel. JIRA ESLC-6885 Signed-off-by: Manish Bhardwaj <mbhardwaj@nvidia.com> Change-Id: Iaaae26f581264b2d9b792bd26937da5f852dba8e Reviewed-on: https://git-master.nvidia.com/r/c/linux-nv-oot/+/2763833 Reviewed-by: Suresh Venkatachalam <skathirampat@nvidia.com> Reviewed-by: Bitan Biswas <bbiswas@nvidia.com> GVS: Gerrit_Virtual_Submit <buildbot_gerritrpt@nvidia.com>
This commit is contained in:
committed by
mobile promotions
parent
b5bfbf41b4
commit
d313ef2285
@@ -9,4 +9,5 @@ obj-m += tegra_hv.o
|
||||
obj-m += tegra_hv_pm_ctl.o
|
||||
obj-m += hvc_sysfs.o
|
||||
obj-m += ivc-cdev.o
|
||||
obj-m += userspace_ivc_mempool.o
|
||||
|
||||
|
||||
391
drivers/virt/tegra/userspace_ivc_mempool.c
Normal file
391
drivers/virt/tegra/userspace_ivc_mempool.c
Normal file
@@ -0,0 +1,391 @@
|
||||
/* SPDX-License-Identifier: GPL-2.0-only */
|
||||
/*
|
||||
* Copyright (c) 2022, NVIDIA CORPORATION & AFFILIATES. All rights reserved.
|
||||
*/
|
||||
|
||||
#include <linux/compiler.h>
|
||||
#include <linux/module.h>
|
||||
#include <linux/init.h>
|
||||
#include <linux/device.h>
|
||||
#include <linux/cdev.h>
|
||||
#include <linux/fs.h>
|
||||
#include <linux/sched.h>
|
||||
#include <linux/slab.h>
|
||||
#include <linux/mm.h>
|
||||
#include <soc/tegra/fuse.h>
|
||||
#include <soc/tegra/virt/hv-ivc.h>
|
||||
#include <uapi/linux/nvhvivc_mempool_ioctl.h>
|
||||
#include <linux/version.h>
|
||||
|
||||
#include <linux/uaccess.h>
|
||||
|
||||
#include "tegra_hv.h"
|
||||
|
||||
/* userspace ivc mempool device */
|
||||
struct ivc_mempool_dev {
|
||||
int minor;
|
||||
dev_t dev;
|
||||
struct cdev cdev;
|
||||
struct device *device;
|
||||
char name[32];
|
||||
/* config data for this mempool */
|
||||
const struct ivc_mempool *mempoolcfg;
|
||||
struct tegra_hv_ivm_cookie *mpool_cookie;
|
||||
};
|
||||
|
||||
/* maximum ivc mempool id from all ivc mempools assigned to this guest */
|
||||
static uint32_t max_mempool_id;
|
||||
|
||||
/* sysfs ivc mempool device class */
|
||||
static struct class *ivc_mempool_class;
|
||||
|
||||
/* array of all ivc mempool devices managed by this driver */
|
||||
static struct ivc_mempool_dev *ivc_mempool_dev_array;
|
||||
|
||||
/* first reserved ivc mempool device device */
|
||||
static dev_t ivc_mempool_first_cdev;
|
||||
|
||||
/* mempool configuration data for all mempools assigned to this guest */
|
||||
static const struct ivc_info_page *guest_ivc_info;
|
||||
|
||||
/* sysfs ivc mempool attributes */
|
||||
/* mempool id */
|
||||
static ssize_t id_show(struct device *dev,
|
||||
struct device_attribute *attr, char *buf)
|
||||
{
|
||||
struct ivc_mempool_dev *mempooldev = dev_get_drvdata(dev);
|
||||
|
||||
return snprintf(buf, PAGE_SIZE, "%d\n",
|
||||
mempooldev->mempoolcfg->id);
|
||||
}
|
||||
/* mempool size */
|
||||
static ssize_t size_show(struct device *dev,
|
||||
struct device_attribute *attr, char *buf)
|
||||
{
|
||||
struct ivc_mempool_dev *mempooldev = dev_get_drvdata(dev);
|
||||
|
||||
return snprintf(buf, PAGE_SIZE, "%llu\n",
|
||||
mempooldev->mempoolcfg->size);
|
||||
}
|
||||
/* peer guest id */
|
||||
static ssize_t peer_show(struct device *dev,
|
||||
struct device_attribute *attr, char *buf)
|
||||
{
|
||||
struct ivc_mempool_dev *mempooldev = dev_get_drvdata(dev);
|
||||
|
||||
return snprintf(buf, PAGE_SIZE, "%d\n",
|
||||
mempooldev->mempoolcfg->peer_vmid);
|
||||
}
|
||||
static DEVICE_ATTR_RO(id);
|
||||
static DEVICE_ATTR_RO(size);
|
||||
static DEVICE_ATTR_RO(peer);
|
||||
static struct attribute *ivc_mempool_attrs[] = {
|
||||
&dev_attr_id.attr,
|
||||
&dev_attr_size.attr,
|
||||
&dev_attr_peer.attr,
|
||||
NULL,
|
||||
};
|
||||
ATTRIBUTE_GROUPS(ivc_mempool);
|
||||
/* end of sysfs properties */
|
||||
|
||||
|
||||
static int ivc_mempool_open(struct inode *inode, struct file *filp)
|
||||
{
|
||||
|
||||
struct tegra_hv_ivm_cookie *mpool_cookie;
|
||||
struct ivc_mempool_dev *mempool_dev =
|
||||
container_of(inode->i_cdev, struct ivc_mempool_dev, cdev);
|
||||
|
||||
/* Reserve the ivc mempool to prevent a userspace client from
|
||||
* incorrectly opening a mempool assigned to a kernel driver and
|
||||
* provide exclusive access to the pool
|
||||
*/
|
||||
mpool_cookie = tegra_hv_mempool_reserve(mempool_dev->minor);
|
||||
if (IS_ERR(mpool_cookie))
|
||||
return PTR_ERR(mpool_cookie);
|
||||
|
||||
mempool_dev->mpool_cookie = mpool_cookie;
|
||||
|
||||
filp->private_data = mempool_dev;
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int ivc_mempool_release(struct inode *inode, struct file *filp)
|
||||
{
|
||||
int ret;
|
||||
struct ivc_mempool_dev *mempooldev = filp->private_data;
|
||||
|
||||
if (WARN_ON(!((mempooldev != NULL) &&
|
||||
(mempooldev->mpool_cookie != NULL))))
|
||||
return -EFAULT;
|
||||
|
||||
/* Unreserve the mempool */
|
||||
ret = tegra_hv_mempool_unreserve(mempooldev->mpool_cookie);
|
||||
if (ret < 0)
|
||||
pr_err("user_ivc_mempool: ### unable to release mempool\n");
|
||||
|
||||
mempooldev->mpool_cookie = NULL;
|
||||
filp->private_data = NULL;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static ssize_t ivc_mempool_read(struct file *filp, char __user *buf,
|
||||
size_t count, loff_t *ppos)
|
||||
{
|
||||
struct ivc_mempool_dev *mempooldev = filp->private_data;
|
||||
|
||||
if (WARN_ON(!((mempooldev != NULL) &&
|
||||
(mempooldev->mpool_cookie != NULL))))
|
||||
return -EFAULT;
|
||||
|
||||
/* ivc mempool read operation not exposed to client */
|
||||
dev_err(mempooldev->device, "read() syscall not supported\n");
|
||||
return -ENOTSUPP;
|
||||
}
|
||||
|
||||
static ssize_t ivc_mempool_write(struct file *filp,
|
||||
const char __user *buf, size_t count, loff_t *pos)
|
||||
{
|
||||
struct ivc_mempool_dev *mempooldev = filp->private_data;
|
||||
|
||||
if (WARN_ON(!((mempooldev != NULL) &&
|
||||
(mempooldev->mpool_cookie != NULL))))
|
||||
return -EFAULT;
|
||||
|
||||
/* ivc mempool write operation not exposed to client */
|
||||
dev_err(mempooldev->device, "write() syscall not supported\n");
|
||||
return -ENOTSUPP;
|
||||
}
|
||||
|
||||
static int ivc_mempool_mmap(struct file *filp, struct vm_area_struct *vma)
|
||||
{
|
||||
struct ivc_mempool_dev *mempooldev = filp->private_data;
|
||||
uint64_t map_region_sz;
|
||||
unsigned long mpool_ipa_pfn;
|
||||
int ret = -EFAULT;
|
||||
|
||||
if (WARN_ON(!((mempooldev != NULL) &&
|
||||
(mempooldev->mpool_cookie != NULL))))
|
||||
return -EFAULT;
|
||||
|
||||
/* fail if userspace attempts to partially map the mempool */
|
||||
map_region_sz = vma->vm_end - vma->vm_start;
|
||||
|
||||
if (((vma->vm_pgoff == 0) &&
|
||||
(map_region_sz == mempooldev->mempoolcfg->size))) {
|
||||
|
||||
mpool_ipa_pfn =
|
||||
(mempooldev->mempoolcfg->pa >> PAGE_SHIFT);
|
||||
|
||||
if (remap_pfn_range(vma, vma->vm_start,
|
||||
mpool_ipa_pfn,
|
||||
map_region_sz,
|
||||
vma->vm_page_prot)) {
|
||||
ret = -EAGAIN;
|
||||
} else {
|
||||
/* success! */
|
||||
ret = 0;
|
||||
}
|
||||
}
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
static long ivc_mempool_dev_ioctl(struct file *filp, unsigned int cmd,
|
||||
unsigned long arg)
|
||||
{
|
||||
struct ivc_mempool_dev *mempooldev = filp->private_data;
|
||||
long ret = 0;
|
||||
|
||||
/* validate the cmd */
|
||||
if (_IOC_TYPE(cmd) != TEGRA_MPLUSERSPACE_IOCTL_MAGIC) {
|
||||
ret = -ENOTTY;
|
||||
} else if (_IOC_NR(cmd) > TEGRA_MPLUSERSPACE_IOCTL_NUMBER_MAX) {
|
||||
ret = -ENOTTY;
|
||||
} else {
|
||||
switch (cmd) {
|
||||
|
||||
case TEGRA_MPLUSERSPACE_IOCTL_GET_INFO:
|
||||
if (copy_to_user((void __user *) arg,
|
||||
mempooldev->mempoolcfg,
|
||||
sizeof(*mempooldev->mempoolcfg))) {
|
||||
ret = -EFAULT;
|
||||
}
|
||||
break;
|
||||
default:
|
||||
/* The ioctl cmd number was validated against
|
||||
* TEGRA_MPLUSERSPACE_IOCTL_NUMBER_MAX so execution
|
||||
* should * never get here.
|
||||
*/
|
||||
ret = -ENOTTY;
|
||||
}
|
||||
}
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
static const struct file_operations ivc_mempool_fops = {
|
||||
.owner = THIS_MODULE,
|
||||
.open = ivc_mempool_open,
|
||||
.release = ivc_mempool_release,
|
||||
.read = ivc_mempool_read,
|
||||
.write = ivc_mempool_write,
|
||||
.unlocked_ioctl = ivc_mempool_dev_ioctl,
|
||||
.mmap = ivc_mempool_mmap,
|
||||
};
|
||||
|
||||
|
||||
static int __init add_ivc_mempool_dev(struct ivc_mempool_dev *mempooldev,
|
||||
const struct ivc_mempool *mempoolcfg)
|
||||
{
|
||||
int ret;
|
||||
|
||||
/* TODO - validate mempool data */
|
||||
mempooldev->mempoolcfg = mempoolcfg;
|
||||
mempooldev->minor = mempooldev->mempoolcfg->id;
|
||||
mempooldev->dev = MKDEV(MAJOR(ivc_mempool_first_cdev),
|
||||
mempooldev->minor);
|
||||
|
||||
/* register/add device */
|
||||
cdev_init(&mempooldev->cdev, &ivc_mempool_fops);
|
||||
ret = cdev_add(&mempooldev->cdev, mempooldev->dev, 1);
|
||||
if (ret != 0) {
|
||||
pr_err("user_ivc_mempool: ### device add failed\n");
|
||||
return ret;
|
||||
}
|
||||
|
||||
ret = snprintf(mempooldev->name, sizeof(mempooldev->name) - 1,
|
||||
"uivcmpool%d", mempooldev->mempoolcfg->id);
|
||||
if (ret < 0) {
|
||||
pr_err("user_ivc_mempool: ### snprintf failed\n");
|
||||
return -ENOMEM;
|
||||
}
|
||||
|
||||
mempooldev->device = device_create(ivc_mempool_class, NULL,
|
||||
mempooldev->dev, mempooldev, mempooldev->name);
|
||||
if (IS_ERR(mempooldev->device)) {
|
||||
pr_err("user_ivc_mempool: ### device create failed for %s\n",
|
||||
mempooldev->name);
|
||||
return PTR_ERR(mempooldev->device);
|
||||
}
|
||||
|
||||
dev_set_drvdata(mempooldev->device, mempooldev);
|
||||
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int __init setup_ivc_mempool(void)
|
||||
{
|
||||
const struct ivc_mempool *ivc_info_mpool_array;
|
||||
const struct ivc_mempool *mempoolcfg;
|
||||
struct ivc_mempool_dev *mempooldev;
|
||||
uint32_t i;
|
||||
int result;
|
||||
|
||||
/* extract the mempool data for this guest from the ivc info page */
|
||||
ivc_info_mpool_array = ivc_info_mempool_array(guest_ivc_info);
|
||||
|
||||
/* device minor number = mempool id. Allocate a range of devices
|
||||
* from (0 .. mempool id(max))
|
||||
*/
|
||||
max_mempool_id = 0;
|
||||
for (i = 0; i < guest_ivc_info->nr_mempools; i++) {
|
||||
mempoolcfg = &ivc_info_mpool_array[i];
|
||||
if (mempoolcfg->id > max_mempool_id)
|
||||
max_mempool_id = mempoolcfg->id;
|
||||
}
|
||||
|
||||
result = alloc_chrdev_region(&ivc_mempool_first_cdev, 0, max_mempool_id,
|
||||
"ivc_mempool");
|
||||
if (result < 0) {
|
||||
pr_err("user_ivc_mempool: ### alloc_chrdev_region() failed\n");
|
||||
return result;
|
||||
}
|
||||
|
||||
/* register ivc_user class with sysfs */
|
||||
ivc_mempool_class = class_create(THIS_MODULE, "tegra_uivc_mpool");
|
||||
if (IS_ERR(ivc_mempool_class)) {
|
||||
pr_err("user_ivc_mempool: ### failed create sysfs class: %ld\n",
|
||||
PTR_ERR(ivc_mempool_class));
|
||||
return PTR_ERR(ivc_mempool_class);
|
||||
}
|
||||
ivc_mempool_class->dev_groups = ivc_mempool_groups;
|
||||
|
||||
/* allocate array to hold all ivc channels */
|
||||
ivc_mempool_dev_array = kcalloc(guest_ivc_info->nr_mempools,
|
||||
sizeof(struct ivc_mempool_dev), GFP_KERNEL);
|
||||
if (!ivc_mempool_dev_array) {
|
||||
pr_err("user_ivc_mempool: ### device array alloc failure\n");
|
||||
return -ENOMEM;
|
||||
}
|
||||
|
||||
/* Add device for each ivc mempool */
|
||||
for (i = 0; i < guest_ivc_info->nr_mempools; i++) {
|
||||
mempooldev = &ivc_mempool_dev_array[i];
|
||||
mempoolcfg = &ivc_info_mpool_array[i];
|
||||
result = add_ivc_mempool_dev(mempooldev, mempoolcfg);
|
||||
if (result != 0)
|
||||
return result;
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static void __init cleanup_ivc_mempool(void)
|
||||
{
|
||||
uint32_t i;
|
||||
|
||||
if (ivc_mempool_dev_array) {
|
||||
for (i = 0; i < guest_ivc_info->nr_mempools; i++) {
|
||||
struct ivc_mempool_dev *ivcmempooldev =
|
||||
&ivc_mempool_dev_array[i];
|
||||
if (ivcmempooldev->device) {
|
||||
cdev_del(&ivcmempooldev->cdev);
|
||||
device_del(ivcmempooldev->device);
|
||||
}
|
||||
}
|
||||
kfree(ivc_mempool_dev_array);
|
||||
ivc_mempool_dev_array = NULL;
|
||||
}
|
||||
|
||||
if (!IS_ERR_OR_NULL(ivc_mempool_class)) {
|
||||
class_destroy(ivc_mempool_class);
|
||||
ivc_mempool_class = NULL;
|
||||
}
|
||||
|
||||
if (ivc_mempool_first_cdev) {
|
||||
unregister_chrdev_region(ivc_mempool_first_cdev,
|
||||
max_mempool_id);
|
||||
ivc_mempool_first_cdev = 0;
|
||||
}
|
||||
}
|
||||
|
||||
static int __init userspace_ivc_mempool_init(void)
|
||||
{
|
||||
int result;
|
||||
|
||||
if (is_tegra_hypervisor_mode() == false) {
|
||||
pr_info("user_ivc_mempool: hypervisor not present\n");
|
||||
/*retunring success in case of native kernel otherwise
|
||||
systemd-modules-load service will failed.*/
|
||||
return 0;
|
||||
}
|
||||
|
||||
/* get ivc configuration data for this guest */
|
||||
guest_ivc_info = tegra_hv_get_ivc_info();
|
||||
if (IS_ERR(guest_ivc_info)) {
|
||||
pr_err("user_ivc_mempool: ### failed hyp get ivc info\n");
|
||||
return -ENODEV;
|
||||
}
|
||||
|
||||
result = setup_ivc_mempool();
|
||||
if (result != 0)
|
||||
cleanup_ivc_mempool();
|
||||
|
||||
return result;
|
||||
}
|
||||
module_init(userspace_ivc_mempool_init);
|
||||
|
||||
MODULE_LICENSE("GPL");
|
||||
22
include/uapi/linux/nvhvivc_mempool_ioctl.h
Normal file
22
include/uapi/linux/nvhvivc_mempool_ioctl.h
Normal file
@@ -0,0 +1,22 @@
|
||||
/* SPDX-License-Identifier: GPL-2.0-only */
|
||||
/*
|
||||
* Copyright (c) 2022, NVIDIA CORPORATION & AFFILIATES. All rights reserved.
|
||||
*/
|
||||
#ifndef __UAPI_NVHVIVC_MEMPOOL_IOCTL_H__
|
||||
#define __UAPI_NVHVIVC_MEMPOOL_IOCTL_H__
|
||||
|
||||
#include <linux/ioctl.h>
|
||||
|
||||
/* ivc mempool IOCTL magic number */
|
||||
#define TEGRA_MPLUSERSPACE_IOCTL_MAGIC 0xA6
|
||||
|
||||
|
||||
/* IOCTL definitions */
|
||||
|
||||
/* query ivc mempool configuration data */
|
||||
#define TEGRA_MPLUSERSPACE_IOCTL_GET_INFO \
|
||||
_IOR(TEGRA_MPLUSERSPACE_IOCTL_MAGIC, 1, struct ivc_mempool)
|
||||
|
||||
#define TEGRA_MPLUSERSPACE_IOCTL_NUMBER_MAX 1
|
||||
|
||||
#endif /* __UAPI_NVHVIVC_MEMPOOL_IOCTL_H__ */
|
||||
Reference in New Issue
Block a user