1 /* 2 * Virtio Support 3 * 4 * Copyright IBM, Corp. 2007 5 * 6 * Authors: 7 * Anthony Liguori <aliguori@us.ibm.com> 8 * 9 * This work is licensed under the terms of the GNU GPL, version 2. See 10 * the COPYING file in the top-level directory. 11 * 12 */ 13 14 #include "qemu/osdep.h" 15 #include "qapi/error.h" 16 #include "qemu-common.h" 17 #include "cpu.h" 18 #include "trace.h" 19 #include "exec/address-spaces.h" 20 #include "qemu/error-report.h" 21 #include "hw/virtio/virtio.h" 22 #include "qemu/atomic.h" 23 #include "hw/virtio/virtio-bus.h" 24 #include "migration/migration.h" 25 #include "hw/virtio/virtio-access.h" 26 #include "sysemu/dma.h" 27 28 /* 29 * The alignment to use between consumer and producer parts of vring. 30 * x86 pagesize again. This is the default, used by transports like PCI 31 * which don't provide a means for the guest to tell the host the alignment. 32 */ 33 #define VIRTIO_PCI_VRING_ALIGN 4096 34 35 typedef struct VRingDesc 36 { 37 uint64_t addr; 38 uint32_t len; 39 uint16_t flags; 40 uint16_t next; 41 } VRingDesc; 42 43 typedef struct VRingAvail 44 { 45 uint16_t flags; 46 uint16_t idx; 47 uint16_t ring[0]; 48 } VRingAvail; 49 50 typedef struct VRingUsedElem 51 { 52 uint32_t id; 53 uint32_t len; 54 } VRingUsedElem; 55 56 typedef struct VRingUsed 57 { 58 uint16_t flags; 59 uint16_t idx; 60 VRingUsedElem ring[0]; 61 } VRingUsed; 62 63 typedef struct VRingMemoryRegionCaches { 64 struct rcu_head rcu; 65 MemoryRegionCache desc; 66 MemoryRegionCache avail; 67 MemoryRegionCache used; 68 } VRingMemoryRegionCaches; 69 70 typedef struct VRing 71 { 72 unsigned int num; 73 unsigned int num_default; 74 unsigned int align; 75 hwaddr desc; 76 hwaddr avail; 77 hwaddr used; 78 VRingMemoryRegionCaches *caches; 79 } VRing; 80 81 struct VirtQueue 82 { 83 VRing vring; 84 85 /* Next head to pop */ 86 uint16_t last_avail_idx; 87 88 /* Last avail_idx read from VQ. */ 89 uint16_t shadow_avail_idx; 90 91 uint16_t used_idx; 92 93 /* Last used index value we have signalled on */ 94 uint16_t signalled_used; 95 96 /* Last used index value we have signalled on */ 97 bool signalled_used_valid; 98 99 /* Notification enabled? */ 100 bool notification; 101 102 uint16_t queue_index; 103 104 unsigned int inuse; 105 106 uint16_t vector; 107 VirtIOHandleOutput handle_output; 108 VirtIOHandleAIOOutput handle_aio_output; 109 VirtIODevice *vdev; 110 EventNotifier guest_notifier; 111 EventNotifier host_notifier; 112 QLIST_ENTRY(VirtQueue) node; 113 }; 114 115 static void virtio_free_region_cache(VRingMemoryRegionCaches *caches) 116 { 117 if (!caches) { 118 return; 119 } 120 121 address_space_cache_destroy(&caches->desc); 122 address_space_cache_destroy(&caches->avail); 123 address_space_cache_destroy(&caches->used); 124 g_free(caches); 125 } 126 127 static void virtio_init_region_cache(VirtIODevice *vdev, int n) 128 { 129 VirtQueue *vq = &vdev->vq[n]; 130 VRingMemoryRegionCaches *old = vq->vring.caches; 131 VRingMemoryRegionCaches *new; 132 hwaddr addr, size; 133 int event_size; 134 135 event_size = virtio_vdev_has_feature(vq->vdev, VIRTIO_RING_F_EVENT_IDX) ? 2 : 0; 136 137 addr = vq->vring.desc; 138 if (!addr) { 139 return; 140 } 141 new = g_new0(VRingMemoryRegionCaches, 1); 142 size = virtio_queue_get_desc_size(vdev, n); 143 address_space_cache_init(&new->desc, vdev->dma_as, 144 addr, size, false); 145 146 size = virtio_queue_get_used_size(vdev, n) + event_size; 147 address_space_cache_init(&new->used, vdev->dma_as, 148 vq->vring.used, size, true); 149 150 size = virtio_queue_get_avail_size(vdev, n) + event_size; 151 address_space_cache_init(&new->avail, vdev->dma_as, 152 vq->vring.avail, size, false); 153 154 atomic_rcu_set(&vq->vring.caches, new); 155 if (old) { 156 call_rcu(old, virtio_free_region_cache, rcu); 157 } 158 } 159 160 /* virt queue functions */ 161 void virtio_queue_update_rings(VirtIODevice *vdev, int n) 162 { 163 VRing *vring = &vdev->vq[n].vring; 164 165 if (!vring->desc) { 166 /* not yet setup -> nothing to do */ 167 return; 168 } 169 vring->avail = vring->desc + vring->num * sizeof(VRingDesc); 170 vring->used = vring_align(vring->avail + 171 offsetof(VRingAvail, ring[vring->num]), 172 vring->align); 173 virtio_init_region_cache(vdev, n); 174 } 175 176 /* Called within rcu_read_lock(). */ 177 static void vring_desc_read(VirtIODevice *vdev, VRingDesc *desc, 178 MemoryRegionCache *cache, int i) 179 { 180 address_space_read_cached(cache, i * sizeof(VRingDesc), 181 desc, sizeof(VRingDesc)); 182 virtio_tswap64s(vdev, &desc->addr); 183 virtio_tswap32s(vdev, &desc->len); 184 virtio_tswap16s(vdev, &desc->flags); 185 virtio_tswap16s(vdev, &desc->next); 186 } 187 188 /* Called within rcu_read_lock(). */ 189 static inline uint16_t vring_avail_flags(VirtQueue *vq) 190 { 191 VRingMemoryRegionCaches *caches = atomic_rcu_read(&vq->vring.caches); 192 hwaddr pa = offsetof(VRingAvail, flags); 193 return virtio_lduw_phys_cached(vq->vdev, &caches->avail, pa); 194 } 195 196 /* Called within rcu_read_lock(). */ 197 static inline uint16_t vring_avail_idx(VirtQueue *vq) 198 { 199 VRingMemoryRegionCaches *caches = atomic_rcu_read(&vq->vring.caches); 200 hwaddr pa = offsetof(VRingAvail, idx); 201 vq->shadow_avail_idx = virtio_lduw_phys_cached(vq->vdev, &caches->avail, pa); 202 return vq->shadow_avail_idx; 203 } 204 205 /* Called within rcu_read_lock(). */ 206 static inline uint16_t vring_avail_ring(VirtQueue *vq, int i) 207 { 208 VRingMemoryRegionCaches *caches = atomic_rcu_read(&vq->vring.caches); 209 hwaddr pa = offsetof(VRingAvail, ring[i]); 210 return virtio_lduw_phys_cached(vq->vdev, &caches->avail, pa); 211 } 212 213 /* Called within rcu_read_lock(). */ 214 static inline uint16_t vring_get_used_event(VirtQueue *vq) 215 { 216 return vring_avail_ring(vq, vq->vring.num); 217 } 218 219 /* Called within rcu_read_lock(). */ 220 static inline void vring_used_write(VirtQueue *vq, VRingUsedElem *uelem, 221 int i) 222 { 223 VRingMemoryRegionCaches *caches = atomic_rcu_read(&vq->vring.caches); 224 hwaddr pa = offsetof(VRingUsed, ring[i]); 225 virtio_tswap32s(vq->vdev, &uelem->id); 226 virtio_tswap32s(vq->vdev, &uelem->len); 227 address_space_write_cached(&caches->used, pa, uelem, sizeof(VRingUsedElem)); 228 address_space_cache_invalidate(&caches->used, pa, sizeof(VRingUsedElem)); 229 } 230 231 /* Called within rcu_read_lock(). */ 232 static uint16_t vring_used_idx(VirtQueue *vq) 233 { 234 VRingMemoryRegionCaches *caches = atomic_rcu_read(&vq->vring.caches); 235 hwaddr pa = offsetof(VRingUsed, idx); 236 return virtio_lduw_phys_cached(vq->vdev, &caches->used, pa); 237 } 238 239 /* Called within rcu_read_lock(). */ 240 static inline void vring_used_idx_set(VirtQueue *vq, uint16_t val) 241 { 242 VRingMemoryRegionCaches *caches = atomic_rcu_read(&vq->vring.caches); 243 hwaddr pa = offsetof(VRingUsed, idx); 244 virtio_stw_phys_cached(vq->vdev, &caches->used, pa, val); 245 address_space_cache_invalidate(&caches->used, pa, sizeof(val)); 246 vq->used_idx = val; 247 } 248 249 /* Called within rcu_read_lock(). */ 250 static inline void vring_used_flags_set_bit(VirtQueue *vq, int mask) 251 { 252 VRingMemoryRegionCaches *caches = atomic_rcu_read(&vq->vring.caches); 253 VirtIODevice *vdev = vq->vdev; 254 hwaddr pa = offsetof(VRingUsed, flags); 255 uint16_t flags = virtio_lduw_phys_cached(vq->vdev, &caches->used, pa); 256 257 virtio_stw_phys_cached(vdev, &caches->used, pa, flags | mask); 258 address_space_cache_invalidate(&caches->used, pa, sizeof(flags)); 259 } 260 261 /* Called within rcu_read_lock(). */ 262 static inline void vring_used_flags_unset_bit(VirtQueue *vq, int mask) 263 { 264 VRingMemoryRegionCaches *caches = atomic_rcu_read(&vq->vring.caches); 265 VirtIODevice *vdev = vq->vdev; 266 hwaddr pa = offsetof(VRingUsed, flags); 267 uint16_t flags = virtio_lduw_phys_cached(vq->vdev, &caches->used, pa); 268 269 virtio_stw_phys_cached(vdev, &caches->used, pa, flags & ~mask); 270 address_space_cache_invalidate(&caches->used, pa, sizeof(flags)); 271 } 272 273 /* Called within rcu_read_lock(). */ 274 static inline void vring_set_avail_event(VirtQueue *vq, uint16_t val) 275 { 276 VRingMemoryRegionCaches *caches; 277 hwaddr pa; 278 if (!vq->notification) { 279 return; 280 } 281 282 caches = atomic_rcu_read(&vq->vring.caches); 283 pa = offsetof(VRingUsed, ring[vq->vring.num]); 284 virtio_stw_phys_cached(vq->vdev, &caches->used, pa, val); 285 } 286 287 void virtio_queue_set_notification(VirtQueue *vq, int enable) 288 { 289 vq->notification = enable; 290 291 rcu_read_lock(); 292 if (virtio_vdev_has_feature(vq->vdev, VIRTIO_RING_F_EVENT_IDX)) { 293 vring_set_avail_event(vq, vring_avail_idx(vq)); 294 } else if (enable) { 295 vring_used_flags_unset_bit(vq, VRING_USED_F_NO_NOTIFY); 296 } else { 297 vring_used_flags_set_bit(vq, VRING_USED_F_NO_NOTIFY); 298 } 299 if (enable) { 300 /* Expose avail event/used flags before caller checks the avail idx. */ 301 smp_mb(); 302 } 303 rcu_read_unlock(); 304 } 305 306 int virtio_queue_ready(VirtQueue *vq) 307 { 308 return vq->vring.avail != 0; 309 } 310 311 /* Fetch avail_idx from VQ memory only when we really need to know if 312 * guest has added some buffers. 313 * Called within rcu_read_lock(). */ 314 static int virtio_queue_empty_rcu(VirtQueue *vq) 315 { 316 if (vq->shadow_avail_idx != vq->last_avail_idx) { 317 return 0; 318 } 319 320 return vring_avail_idx(vq) == vq->last_avail_idx; 321 } 322 323 int virtio_queue_empty(VirtQueue *vq) 324 { 325 bool empty; 326 327 if (vq->shadow_avail_idx != vq->last_avail_idx) { 328 return 0; 329 } 330 331 rcu_read_lock(); 332 empty = vring_avail_idx(vq) == vq->last_avail_idx; 333 rcu_read_unlock(); 334 return empty; 335 } 336 337 static void virtqueue_unmap_sg(VirtQueue *vq, const VirtQueueElement *elem, 338 unsigned int len) 339 { 340 AddressSpace *dma_as = vq->vdev->dma_as; 341 unsigned int offset; 342 int i; 343 344 offset = 0; 345 for (i = 0; i < elem->in_num; i++) { 346 size_t size = MIN(len - offset, elem->in_sg[i].iov_len); 347 348 dma_memory_unmap(dma_as, elem->in_sg[i].iov_base, 349 elem->in_sg[i].iov_len, 350 DMA_DIRECTION_FROM_DEVICE, size); 351 352 offset += size; 353 } 354 355 for (i = 0; i < elem->out_num; i++) 356 dma_memory_unmap(dma_as, elem->out_sg[i].iov_base, 357 elem->out_sg[i].iov_len, 358 DMA_DIRECTION_TO_DEVICE, 359 elem->out_sg[i].iov_len); 360 } 361 362 /* virtqueue_detach_element: 363 * @vq: The #VirtQueue 364 * @elem: The #VirtQueueElement 365 * @len: number of bytes written 366 * 367 * Detach the element from the virtqueue. This function is suitable for device 368 * reset or other situations where a #VirtQueueElement is simply freed and will 369 * not be pushed or discarded. 370 */ 371 void virtqueue_detach_element(VirtQueue *vq, const VirtQueueElement *elem, 372 unsigned int len) 373 { 374 vq->inuse--; 375 virtqueue_unmap_sg(vq, elem, len); 376 } 377 378 /* virtqueue_unpop: 379 * @vq: The #VirtQueue 380 * @elem: The #VirtQueueElement 381 * @len: number of bytes written 382 * 383 * Pretend the most recent element wasn't popped from the virtqueue. The next 384 * call to virtqueue_pop() will refetch the element. 385 */ 386 void virtqueue_unpop(VirtQueue *vq, const VirtQueueElement *elem, 387 unsigned int len) 388 { 389 vq->last_avail_idx--; 390 virtqueue_detach_element(vq, elem, len); 391 } 392 393 /* virtqueue_rewind: 394 * @vq: The #VirtQueue 395 * @num: Number of elements to push back 396 * 397 * Pretend that elements weren't popped from the virtqueue. The next 398 * virtqueue_pop() will refetch the oldest element. 399 * 400 * Use virtqueue_unpop() instead if you have a VirtQueueElement. 401 * 402 * Returns: true on success, false if @num is greater than the number of in use 403 * elements. 404 */ 405 bool virtqueue_rewind(VirtQueue *vq, unsigned int num) 406 { 407 if (num > vq->inuse) { 408 return false; 409 } 410 vq->last_avail_idx -= num; 411 vq->inuse -= num; 412 return true; 413 } 414 415 /* Called within rcu_read_lock(). */ 416 void virtqueue_fill(VirtQueue *vq, const VirtQueueElement *elem, 417 unsigned int len, unsigned int idx) 418 { 419 VRingUsedElem uelem; 420 421 trace_virtqueue_fill(vq, elem, len, idx); 422 423 virtqueue_unmap_sg(vq, elem, len); 424 425 if (unlikely(vq->vdev->broken)) { 426 return; 427 } 428 429 idx = (idx + vq->used_idx) % vq->vring.num; 430 431 uelem.id = elem->index; 432 uelem.len = len; 433 vring_used_write(vq, &uelem, idx); 434 } 435 436 /* Called within rcu_read_lock(). */ 437 void virtqueue_flush(VirtQueue *vq, unsigned int count) 438 { 439 uint16_t old, new; 440 441 if (unlikely(vq->vdev->broken)) { 442 vq->inuse -= count; 443 return; 444 } 445 446 /* Make sure buffer is written before we update index. */ 447 smp_wmb(); 448 trace_virtqueue_flush(vq, count); 449 old = vq->used_idx; 450 new = old + count; 451 vring_used_idx_set(vq, new); 452 vq->inuse -= count; 453 if (unlikely((int16_t)(new - vq->signalled_used) < (uint16_t)(new - old))) 454 vq->signalled_used_valid = false; 455 } 456 457 void virtqueue_push(VirtQueue *vq, const VirtQueueElement *elem, 458 unsigned int len) 459 { 460 rcu_read_lock(); 461 virtqueue_fill(vq, elem, len, 0); 462 virtqueue_flush(vq, 1); 463 rcu_read_unlock(); 464 } 465 466 /* Called within rcu_read_lock(). */ 467 static int virtqueue_num_heads(VirtQueue *vq, unsigned int idx) 468 { 469 uint16_t num_heads = vring_avail_idx(vq) - idx; 470 471 /* Check it isn't doing very strange things with descriptor numbers. */ 472 if (num_heads > vq->vring.num) { 473 virtio_error(vq->vdev, "Guest moved used index from %u to %u", 474 idx, vq->shadow_avail_idx); 475 return -EINVAL; 476 } 477 /* On success, callers read a descriptor at vq->last_avail_idx. 478 * Make sure descriptor read does not bypass avail index read. */ 479 if (num_heads) { 480 smp_rmb(); 481 } 482 483 return num_heads; 484 } 485 486 /* Called within rcu_read_lock(). */ 487 static bool virtqueue_get_head(VirtQueue *vq, unsigned int idx, 488 unsigned int *head) 489 { 490 /* Grab the next descriptor number they're advertising, and increment 491 * the index we've seen. */ 492 *head = vring_avail_ring(vq, idx % vq->vring.num); 493 494 /* If their number is silly, that's a fatal mistake. */ 495 if (*head >= vq->vring.num) { 496 virtio_error(vq->vdev, "Guest says index %u is available", *head); 497 return false; 498 } 499 500 return true; 501 } 502 503 enum { 504 VIRTQUEUE_READ_DESC_ERROR = -1, 505 VIRTQUEUE_READ_DESC_DONE = 0, /* end of chain */ 506 VIRTQUEUE_READ_DESC_MORE = 1, /* more buffers in chain */ 507 }; 508 509 static int virtqueue_read_next_desc(VirtIODevice *vdev, VRingDesc *desc, 510 MemoryRegionCache *desc_cache, unsigned int max, 511 unsigned int *next) 512 { 513 /* If this descriptor says it doesn't chain, we're done. */ 514 if (!(desc->flags & VRING_DESC_F_NEXT)) { 515 return VIRTQUEUE_READ_DESC_DONE; 516 } 517 518 /* Check they're not leading us off end of descriptors. */ 519 *next = desc->next; 520 /* Make sure compiler knows to grab that: we don't want it changing! */ 521 smp_wmb(); 522 523 if (*next >= max) { 524 virtio_error(vdev, "Desc next is %u", *next); 525 return VIRTQUEUE_READ_DESC_ERROR; 526 } 527 528 vring_desc_read(vdev, desc, desc_cache, *next); 529 return VIRTQUEUE_READ_DESC_MORE; 530 } 531 532 void virtqueue_get_avail_bytes(VirtQueue *vq, unsigned int *in_bytes, 533 unsigned int *out_bytes, 534 unsigned max_in_bytes, unsigned max_out_bytes) 535 { 536 VirtIODevice *vdev = vq->vdev; 537 unsigned int max, idx; 538 unsigned int total_bufs, in_total, out_total; 539 VRingMemoryRegionCaches *caches; 540 MemoryRegionCache indirect_desc_cache = MEMORY_REGION_CACHE_INVALID; 541 int64_t len = 0; 542 int rc; 543 544 rcu_read_lock(); 545 idx = vq->last_avail_idx; 546 total_bufs = in_total = out_total = 0; 547 548 max = vq->vring.num; 549 caches = atomic_rcu_read(&vq->vring.caches); 550 if (caches->desc.len < max * sizeof(VRingDesc)) { 551 virtio_error(vdev, "Cannot map descriptor ring"); 552 goto err; 553 } 554 555 while ((rc = virtqueue_num_heads(vq, idx)) > 0) { 556 MemoryRegionCache *desc_cache = &caches->desc; 557 unsigned int num_bufs; 558 VRingDesc desc; 559 unsigned int i; 560 561 num_bufs = total_bufs; 562 563 if (!virtqueue_get_head(vq, idx++, &i)) { 564 goto err; 565 } 566 567 vring_desc_read(vdev, &desc, desc_cache, i); 568 569 if (desc.flags & VRING_DESC_F_INDIRECT) { 570 if (desc.len % sizeof(VRingDesc)) { 571 virtio_error(vdev, "Invalid size for indirect buffer table"); 572 goto err; 573 } 574 575 /* If we've got too many, that implies a descriptor loop. */ 576 if (num_bufs >= max) { 577 virtio_error(vdev, "Looped descriptor"); 578 goto err; 579 } 580 581 /* loop over the indirect descriptor table */ 582 len = address_space_cache_init(&indirect_desc_cache, 583 vdev->dma_as, 584 desc.addr, desc.len, false); 585 desc_cache = &indirect_desc_cache; 586 if (len < desc.len) { 587 virtio_error(vdev, "Cannot map indirect buffer"); 588 goto err; 589 } 590 591 max = desc.len / sizeof(VRingDesc); 592 num_bufs = i = 0; 593 vring_desc_read(vdev, &desc, desc_cache, i); 594 } 595 596 do { 597 /* If we've got too many, that implies a descriptor loop. */ 598 if (++num_bufs > max) { 599 virtio_error(vdev, "Looped descriptor"); 600 goto err; 601 } 602 603 if (desc.flags & VRING_DESC_F_WRITE) { 604 in_total += desc.len; 605 } else { 606 out_total += desc.len; 607 } 608 if (in_total >= max_in_bytes && out_total >= max_out_bytes) { 609 goto done; 610 } 611 612 rc = virtqueue_read_next_desc(vdev, &desc, desc_cache, max, &i); 613 } while (rc == VIRTQUEUE_READ_DESC_MORE); 614 615 if (rc == VIRTQUEUE_READ_DESC_ERROR) { 616 goto err; 617 } 618 619 if (desc_cache == &indirect_desc_cache) { 620 address_space_cache_destroy(&indirect_desc_cache); 621 total_bufs++; 622 } else { 623 total_bufs = num_bufs; 624 } 625 } 626 627 if (rc < 0) { 628 goto err; 629 } 630 631 done: 632 address_space_cache_destroy(&indirect_desc_cache); 633 if (in_bytes) { 634 *in_bytes = in_total; 635 } 636 if (out_bytes) { 637 *out_bytes = out_total; 638 } 639 rcu_read_unlock(); 640 return; 641 642 err: 643 in_total = out_total = 0; 644 goto done; 645 } 646 647 int virtqueue_avail_bytes(VirtQueue *vq, unsigned int in_bytes, 648 unsigned int out_bytes) 649 { 650 unsigned int in_total, out_total; 651 652 virtqueue_get_avail_bytes(vq, &in_total, &out_total, in_bytes, out_bytes); 653 return in_bytes <= in_total && out_bytes <= out_total; 654 } 655 656 static bool virtqueue_map_desc(VirtIODevice *vdev, unsigned int *p_num_sg, 657 hwaddr *addr, struct iovec *iov, 658 unsigned int max_num_sg, bool is_write, 659 hwaddr pa, size_t sz) 660 { 661 bool ok = false; 662 unsigned num_sg = *p_num_sg; 663 assert(num_sg <= max_num_sg); 664 665 if (!sz) { 666 virtio_error(vdev, "virtio: zero sized buffers are not allowed"); 667 goto out; 668 } 669 670 while (sz) { 671 hwaddr len = sz; 672 673 if (num_sg == max_num_sg) { 674 virtio_error(vdev, "virtio: too many write descriptors in " 675 "indirect table"); 676 goto out; 677 } 678 679 iov[num_sg].iov_base = dma_memory_map(vdev->dma_as, pa, &len, 680 is_write ? 681 DMA_DIRECTION_FROM_DEVICE : 682 DMA_DIRECTION_TO_DEVICE); 683 if (!iov[num_sg].iov_base) { 684 virtio_error(vdev, "virtio: bogus descriptor or out of resources"); 685 goto out; 686 } 687 688 iov[num_sg].iov_len = len; 689 addr[num_sg] = pa; 690 691 sz -= len; 692 pa += len; 693 num_sg++; 694 } 695 ok = true; 696 697 out: 698 *p_num_sg = num_sg; 699 return ok; 700 } 701 702 /* Only used by error code paths before we have a VirtQueueElement (therefore 703 * virtqueue_unmap_sg() can't be used). Assumes buffers weren't written to 704 * yet. 705 */ 706 static void virtqueue_undo_map_desc(unsigned int out_num, unsigned int in_num, 707 struct iovec *iov) 708 { 709 unsigned int i; 710 711 for (i = 0; i < out_num + in_num; i++) { 712 int is_write = i >= out_num; 713 714 cpu_physical_memory_unmap(iov->iov_base, iov->iov_len, is_write, 0); 715 iov++; 716 } 717 } 718 719 static void virtqueue_map_iovec(VirtIODevice *vdev, struct iovec *sg, 720 hwaddr *addr, unsigned int *num_sg, 721 int is_write) 722 { 723 unsigned int i; 724 hwaddr len; 725 726 for (i = 0; i < *num_sg; i++) { 727 len = sg[i].iov_len; 728 sg[i].iov_base = dma_memory_map(vdev->dma_as, 729 addr[i], &len, is_write ? 730 DMA_DIRECTION_FROM_DEVICE : 731 DMA_DIRECTION_TO_DEVICE); 732 if (!sg[i].iov_base) { 733 error_report("virtio: error trying to map MMIO memory"); 734 exit(1); 735 } 736 if (len != sg[i].iov_len) { 737 error_report("virtio: unexpected memory split"); 738 exit(1); 739 } 740 } 741 } 742 743 void virtqueue_map(VirtIODevice *vdev, VirtQueueElement *elem) 744 { 745 virtqueue_map_iovec(vdev, elem->in_sg, elem->in_addr, &elem->in_num, 1); 746 virtqueue_map_iovec(vdev, elem->out_sg, elem->out_addr, &elem->out_num, 0); 747 } 748 749 static void *virtqueue_alloc_element(size_t sz, unsigned out_num, unsigned in_num) 750 { 751 VirtQueueElement *elem; 752 size_t in_addr_ofs = QEMU_ALIGN_UP(sz, __alignof__(elem->in_addr[0])); 753 size_t out_addr_ofs = in_addr_ofs + in_num * sizeof(elem->in_addr[0]); 754 size_t out_addr_end = out_addr_ofs + out_num * sizeof(elem->out_addr[0]); 755 size_t in_sg_ofs = QEMU_ALIGN_UP(out_addr_end, __alignof__(elem->in_sg[0])); 756 size_t out_sg_ofs = in_sg_ofs + in_num * sizeof(elem->in_sg[0]); 757 size_t out_sg_end = out_sg_ofs + out_num * sizeof(elem->out_sg[0]); 758 759 assert(sz >= sizeof(VirtQueueElement)); 760 elem = g_malloc(out_sg_end); 761 elem->out_num = out_num; 762 elem->in_num = in_num; 763 elem->in_addr = (void *)elem + in_addr_ofs; 764 elem->out_addr = (void *)elem + out_addr_ofs; 765 elem->in_sg = (void *)elem + in_sg_ofs; 766 elem->out_sg = (void *)elem + out_sg_ofs; 767 return elem; 768 } 769 770 void *virtqueue_pop(VirtQueue *vq, size_t sz) 771 { 772 unsigned int i, head, max; 773 VRingMemoryRegionCaches *caches; 774 MemoryRegionCache indirect_desc_cache = MEMORY_REGION_CACHE_INVALID; 775 MemoryRegionCache *desc_cache; 776 int64_t len; 777 VirtIODevice *vdev = vq->vdev; 778 VirtQueueElement *elem = NULL; 779 unsigned out_num, in_num; 780 hwaddr addr[VIRTQUEUE_MAX_SIZE]; 781 struct iovec iov[VIRTQUEUE_MAX_SIZE]; 782 VRingDesc desc; 783 int rc; 784 785 if (unlikely(vdev->broken)) { 786 return NULL; 787 } 788 rcu_read_lock(); 789 if (virtio_queue_empty_rcu(vq)) { 790 goto done; 791 } 792 /* Needed after virtio_queue_empty(), see comment in 793 * virtqueue_num_heads(). */ 794 smp_rmb(); 795 796 /* When we start there are none of either input nor output. */ 797 out_num = in_num = 0; 798 799 max = vq->vring.num; 800 801 if (vq->inuse >= vq->vring.num) { 802 virtio_error(vdev, "Virtqueue size exceeded"); 803 goto done; 804 } 805 806 if (!virtqueue_get_head(vq, vq->last_avail_idx++, &head)) { 807 goto done; 808 } 809 810 if (virtio_vdev_has_feature(vdev, VIRTIO_RING_F_EVENT_IDX)) { 811 vring_set_avail_event(vq, vq->last_avail_idx); 812 } 813 814 i = head; 815 816 caches = atomic_rcu_read(&vq->vring.caches); 817 if (caches->desc.len < max * sizeof(VRingDesc)) { 818 virtio_error(vdev, "Cannot map descriptor ring"); 819 goto done; 820 } 821 822 desc_cache = &caches->desc; 823 vring_desc_read(vdev, &desc, desc_cache, i); 824 if (desc.flags & VRING_DESC_F_INDIRECT) { 825 if (desc.len % sizeof(VRingDesc)) { 826 virtio_error(vdev, "Invalid size for indirect buffer table"); 827 goto done; 828 } 829 830 /* loop over the indirect descriptor table */ 831 len = address_space_cache_init(&indirect_desc_cache, vdev->dma_as, 832 desc.addr, desc.len, false); 833 desc_cache = &indirect_desc_cache; 834 if (len < desc.len) { 835 virtio_error(vdev, "Cannot map indirect buffer"); 836 goto done; 837 } 838 839 max = desc.len / sizeof(VRingDesc); 840 i = 0; 841 vring_desc_read(vdev, &desc, desc_cache, i); 842 } 843 844 /* Collect all the descriptors */ 845 do { 846 bool map_ok; 847 848 if (desc.flags & VRING_DESC_F_WRITE) { 849 map_ok = virtqueue_map_desc(vdev, &in_num, addr + out_num, 850 iov + out_num, 851 VIRTQUEUE_MAX_SIZE - out_num, true, 852 desc.addr, desc.len); 853 } else { 854 if (in_num) { 855 virtio_error(vdev, "Incorrect order for descriptors"); 856 goto err_undo_map; 857 } 858 map_ok = virtqueue_map_desc(vdev, &out_num, addr, iov, 859 VIRTQUEUE_MAX_SIZE, false, 860 desc.addr, desc.len); 861 } 862 if (!map_ok) { 863 goto err_undo_map; 864 } 865 866 /* If we've got too many, that implies a descriptor loop. */ 867 if ((in_num + out_num) > max) { 868 virtio_error(vdev, "Looped descriptor"); 869 goto err_undo_map; 870 } 871 872 rc = virtqueue_read_next_desc(vdev, &desc, desc_cache, max, &i); 873 } while (rc == VIRTQUEUE_READ_DESC_MORE); 874 875 if (rc == VIRTQUEUE_READ_DESC_ERROR) { 876 goto err_undo_map; 877 } 878 879 /* Now copy what we have collected and mapped */ 880 elem = virtqueue_alloc_element(sz, out_num, in_num); 881 elem->index = head; 882 for (i = 0; i < out_num; i++) { 883 elem->out_addr[i] = addr[i]; 884 elem->out_sg[i] = iov[i]; 885 } 886 for (i = 0; i < in_num; i++) { 887 elem->in_addr[i] = addr[out_num + i]; 888 elem->in_sg[i] = iov[out_num + i]; 889 } 890 891 vq->inuse++; 892 893 trace_virtqueue_pop(vq, elem, elem->in_num, elem->out_num); 894 done: 895 address_space_cache_destroy(&indirect_desc_cache); 896 rcu_read_unlock(); 897 898 return elem; 899 900 err_undo_map: 901 virtqueue_undo_map_desc(out_num, in_num, iov); 902 goto done; 903 } 904 905 /* virtqueue_drop_all: 906 * @vq: The #VirtQueue 907 * Drops all queued buffers and indicates them to the guest 908 * as if they are done. Useful when buffers can not be 909 * processed but must be returned to the guest. 910 */ 911 unsigned int virtqueue_drop_all(VirtQueue *vq) 912 { 913 unsigned int dropped = 0; 914 VirtQueueElement elem = {}; 915 VirtIODevice *vdev = vq->vdev; 916 bool fEventIdx = virtio_vdev_has_feature(vdev, VIRTIO_RING_F_EVENT_IDX); 917 918 if (unlikely(vdev->broken)) { 919 return 0; 920 } 921 922 while (!virtio_queue_empty(vq) && vq->inuse < vq->vring.num) { 923 /* works similar to virtqueue_pop but does not map buffers 924 * and does not allocate any memory */ 925 smp_rmb(); 926 if (!virtqueue_get_head(vq, vq->last_avail_idx, &elem.index)) { 927 break; 928 } 929 vq->inuse++; 930 vq->last_avail_idx++; 931 if (fEventIdx) { 932 vring_set_avail_event(vq, vq->last_avail_idx); 933 } 934 /* immediately push the element, nothing to unmap 935 * as both in_num and out_num are set to 0 */ 936 virtqueue_push(vq, &elem, 0); 937 dropped++; 938 } 939 940 return dropped; 941 } 942 943 /* Reading and writing a structure directly to QEMUFile is *awful*, but 944 * it is what QEMU has always done by mistake. We can change it sooner 945 * or later by bumping the version number of the affected vm states. 946 * In the meanwhile, since the in-memory layout of VirtQueueElement 947 * has changed, we need to marshal to and from the layout that was 948 * used before the change. 949 */ 950 typedef struct VirtQueueElementOld { 951 unsigned int index; 952 unsigned int out_num; 953 unsigned int in_num; 954 hwaddr in_addr[VIRTQUEUE_MAX_SIZE]; 955 hwaddr out_addr[VIRTQUEUE_MAX_SIZE]; 956 struct iovec in_sg[VIRTQUEUE_MAX_SIZE]; 957 struct iovec out_sg[VIRTQUEUE_MAX_SIZE]; 958 } VirtQueueElementOld; 959 960 void *qemu_get_virtqueue_element(VirtIODevice *vdev, QEMUFile *f, size_t sz) 961 { 962 VirtQueueElement *elem; 963 VirtQueueElementOld data; 964 int i; 965 966 qemu_get_buffer(f, (uint8_t *)&data, sizeof(VirtQueueElementOld)); 967 968 /* TODO: teach all callers that this can fail, and return failure instead 969 * of asserting here. 970 * When we do, we might be able to re-enable NDEBUG below. 971 */ 972 #ifdef NDEBUG 973 #error building with NDEBUG is not supported 974 #endif 975 assert(ARRAY_SIZE(data.in_addr) >= data.in_num); 976 assert(ARRAY_SIZE(data.out_addr) >= data.out_num); 977 978 elem = virtqueue_alloc_element(sz, data.out_num, data.in_num); 979 elem->index = data.index; 980 981 for (i = 0; i < elem->in_num; i++) { 982 elem->in_addr[i] = data.in_addr[i]; 983 } 984 985 for (i = 0; i < elem->out_num; i++) { 986 elem->out_addr[i] = data.out_addr[i]; 987 } 988 989 for (i = 0; i < elem->in_num; i++) { 990 /* Base is overwritten by virtqueue_map. */ 991 elem->in_sg[i].iov_base = 0; 992 elem->in_sg[i].iov_len = data.in_sg[i].iov_len; 993 } 994 995 for (i = 0; i < elem->out_num; i++) { 996 /* Base is overwritten by virtqueue_map. */ 997 elem->out_sg[i].iov_base = 0; 998 elem->out_sg[i].iov_len = data.out_sg[i].iov_len; 999 } 1000 1001 virtqueue_map(vdev, elem); 1002 return elem; 1003 } 1004 1005 void qemu_put_virtqueue_element(QEMUFile *f, VirtQueueElement *elem) 1006 { 1007 VirtQueueElementOld data; 1008 int i; 1009 1010 memset(&data, 0, sizeof(data)); 1011 data.index = elem->index; 1012 data.in_num = elem->in_num; 1013 data.out_num = elem->out_num; 1014 1015 for (i = 0; i < elem->in_num; i++) { 1016 data.in_addr[i] = elem->in_addr[i]; 1017 } 1018 1019 for (i = 0; i < elem->out_num; i++) { 1020 data.out_addr[i] = elem->out_addr[i]; 1021 } 1022 1023 for (i = 0; i < elem->in_num; i++) { 1024 /* Base is overwritten by virtqueue_map when loading. Do not 1025 * save it, as it would leak the QEMU address space layout. */ 1026 data.in_sg[i].iov_len = elem->in_sg[i].iov_len; 1027 } 1028 1029 for (i = 0; i < elem->out_num; i++) { 1030 /* Do not save iov_base as above. */ 1031 data.out_sg[i].iov_len = elem->out_sg[i].iov_len; 1032 } 1033 qemu_put_buffer(f, (uint8_t *)&data, sizeof(VirtQueueElementOld)); 1034 } 1035 1036 /* virtio device */ 1037 static void virtio_notify_vector(VirtIODevice *vdev, uint16_t vector) 1038 { 1039 BusState *qbus = qdev_get_parent_bus(DEVICE(vdev)); 1040 VirtioBusClass *k = VIRTIO_BUS_GET_CLASS(qbus); 1041 1042 if (unlikely(vdev->broken)) { 1043 return; 1044 } 1045 1046 if (k->notify) { 1047 k->notify(qbus->parent, vector); 1048 } 1049 } 1050 1051 void virtio_update_irq(VirtIODevice *vdev) 1052 { 1053 virtio_notify_vector(vdev, VIRTIO_NO_VECTOR); 1054 } 1055 1056 static int virtio_validate_features(VirtIODevice *vdev) 1057 { 1058 VirtioDeviceClass *k = VIRTIO_DEVICE_GET_CLASS(vdev); 1059 1060 if (virtio_host_has_feature(vdev, VIRTIO_F_IOMMU_PLATFORM) && 1061 !virtio_vdev_has_feature(vdev, VIRTIO_F_IOMMU_PLATFORM)) { 1062 return -EFAULT; 1063 } 1064 1065 if (k->validate_features) { 1066 return k->validate_features(vdev); 1067 } else { 1068 return 0; 1069 } 1070 } 1071 1072 int virtio_set_status(VirtIODevice *vdev, uint8_t val) 1073 { 1074 VirtioDeviceClass *k = VIRTIO_DEVICE_GET_CLASS(vdev); 1075 trace_virtio_set_status(vdev, val); 1076 1077 if (virtio_vdev_has_feature(vdev, VIRTIO_F_VERSION_1)) { 1078 if (!(vdev->status & VIRTIO_CONFIG_S_FEATURES_OK) && 1079 val & VIRTIO_CONFIG_S_FEATURES_OK) { 1080 int ret = virtio_validate_features(vdev); 1081 1082 if (ret) { 1083 return ret; 1084 } 1085 } 1086 } 1087 if (k->set_status) { 1088 k->set_status(vdev, val); 1089 } 1090 vdev->status = val; 1091 return 0; 1092 } 1093 1094 bool target_words_bigendian(void); 1095 static enum virtio_device_endian virtio_default_endian(void) 1096 { 1097 if (target_words_bigendian()) { 1098 return VIRTIO_DEVICE_ENDIAN_BIG; 1099 } else { 1100 return VIRTIO_DEVICE_ENDIAN_LITTLE; 1101 } 1102 } 1103 1104 static enum virtio_device_endian virtio_current_cpu_endian(void) 1105 { 1106 CPUClass *cc = CPU_GET_CLASS(current_cpu); 1107 1108 if (cc->virtio_is_big_endian(current_cpu)) { 1109 return VIRTIO_DEVICE_ENDIAN_BIG; 1110 } else { 1111 return VIRTIO_DEVICE_ENDIAN_LITTLE; 1112 } 1113 } 1114 1115 void virtio_reset(void *opaque) 1116 { 1117 VirtIODevice *vdev = opaque; 1118 VirtioDeviceClass *k = VIRTIO_DEVICE_GET_CLASS(vdev); 1119 int i; 1120 1121 virtio_set_status(vdev, 0); 1122 if (current_cpu) { 1123 /* Guest initiated reset */ 1124 vdev->device_endian = virtio_current_cpu_endian(); 1125 } else { 1126 /* System reset */ 1127 vdev->device_endian = virtio_default_endian(); 1128 } 1129 1130 if (k->reset) { 1131 k->reset(vdev); 1132 } 1133 1134 vdev->broken = false; 1135 vdev->guest_features = 0; 1136 vdev->queue_sel = 0; 1137 vdev->status = 0; 1138 atomic_set(&vdev->isr, 0); 1139 vdev->config_vector = VIRTIO_NO_VECTOR; 1140 virtio_notify_vector(vdev, vdev->config_vector); 1141 1142 for(i = 0; i < VIRTIO_QUEUE_MAX; i++) { 1143 vdev->vq[i].vring.desc = 0; 1144 vdev->vq[i].vring.avail = 0; 1145 vdev->vq[i].vring.used = 0; 1146 vdev->vq[i].last_avail_idx = 0; 1147 vdev->vq[i].shadow_avail_idx = 0; 1148 vdev->vq[i].used_idx = 0; 1149 virtio_queue_set_vector(vdev, i, VIRTIO_NO_VECTOR); 1150 vdev->vq[i].signalled_used = 0; 1151 vdev->vq[i].signalled_used_valid = false; 1152 vdev->vq[i].notification = true; 1153 vdev->vq[i].vring.num = vdev->vq[i].vring.num_default; 1154 vdev->vq[i].inuse = 0; 1155 } 1156 } 1157 1158 uint32_t virtio_config_readb(VirtIODevice *vdev, uint32_t addr) 1159 { 1160 VirtioDeviceClass *k = VIRTIO_DEVICE_GET_CLASS(vdev); 1161 uint8_t val; 1162 1163 if (addr + sizeof(val) > vdev->config_len) { 1164 return (uint32_t)-1; 1165 } 1166 1167 k->get_config(vdev, vdev->config); 1168 1169 val = ldub_p(vdev->config + addr); 1170 return val; 1171 } 1172 1173 uint32_t virtio_config_readw(VirtIODevice *vdev, uint32_t addr) 1174 { 1175 VirtioDeviceClass *k = VIRTIO_DEVICE_GET_CLASS(vdev); 1176 uint16_t val; 1177 1178 if (addr + sizeof(val) > vdev->config_len) { 1179 return (uint32_t)-1; 1180 } 1181 1182 k->get_config(vdev, vdev->config); 1183 1184 val = lduw_p(vdev->config + addr); 1185 return val; 1186 } 1187 1188 uint32_t virtio_config_readl(VirtIODevice *vdev, uint32_t addr) 1189 { 1190 VirtioDeviceClass *k = VIRTIO_DEVICE_GET_CLASS(vdev); 1191 uint32_t val; 1192 1193 if (addr + sizeof(val) > vdev->config_len) { 1194 return (uint32_t)-1; 1195 } 1196 1197 k->get_config(vdev, vdev->config); 1198 1199 val = ldl_p(vdev->config + addr); 1200 return val; 1201 } 1202 1203 void virtio_config_writeb(VirtIODevice *vdev, uint32_t addr, uint32_t data) 1204 { 1205 VirtioDeviceClass *k = VIRTIO_DEVICE_GET_CLASS(vdev); 1206 uint8_t val = data; 1207 1208 if (addr + sizeof(val) > vdev->config_len) { 1209 return; 1210 } 1211 1212 stb_p(vdev->config + addr, val); 1213 1214 if (k->set_config) { 1215 k->set_config(vdev, vdev->config); 1216 } 1217 } 1218 1219 void virtio_config_writew(VirtIODevice *vdev, uint32_t addr, uint32_t data) 1220 { 1221 VirtioDeviceClass *k = VIRTIO_DEVICE_GET_CLASS(vdev); 1222 uint16_t val = data; 1223 1224 if (addr + sizeof(val) > vdev->config_len) { 1225 return; 1226 } 1227 1228 stw_p(vdev->config + addr, val); 1229 1230 if (k->set_config) { 1231 k->set_config(vdev, vdev->config); 1232 } 1233 } 1234 1235 void virtio_config_writel(VirtIODevice *vdev, uint32_t addr, uint32_t data) 1236 { 1237 VirtioDeviceClass *k = VIRTIO_DEVICE_GET_CLASS(vdev); 1238 uint32_t val = data; 1239 1240 if (addr + sizeof(val) > vdev->config_len) { 1241 return; 1242 } 1243 1244 stl_p(vdev->config + addr, val); 1245 1246 if (k->set_config) { 1247 k->set_config(vdev, vdev->config); 1248 } 1249 } 1250 1251 uint32_t virtio_config_modern_readb(VirtIODevice *vdev, uint32_t addr) 1252 { 1253 VirtioDeviceClass *k = VIRTIO_DEVICE_GET_CLASS(vdev); 1254 uint8_t val; 1255 1256 if (addr + sizeof(val) > vdev->config_len) { 1257 return (uint32_t)-1; 1258 } 1259 1260 k->get_config(vdev, vdev->config); 1261 1262 val = ldub_p(vdev->config + addr); 1263 return val; 1264 } 1265 1266 uint32_t virtio_config_modern_readw(VirtIODevice *vdev, uint32_t addr) 1267 { 1268 VirtioDeviceClass *k = VIRTIO_DEVICE_GET_CLASS(vdev); 1269 uint16_t val; 1270 1271 if (addr + sizeof(val) > vdev->config_len) { 1272 return (uint32_t)-1; 1273 } 1274 1275 k->get_config(vdev, vdev->config); 1276 1277 val = lduw_le_p(vdev->config + addr); 1278 return val; 1279 } 1280 1281 uint32_t virtio_config_modern_readl(VirtIODevice *vdev, uint32_t addr) 1282 { 1283 VirtioDeviceClass *k = VIRTIO_DEVICE_GET_CLASS(vdev); 1284 uint32_t val; 1285 1286 if (addr + sizeof(val) > vdev->config_len) { 1287 return (uint32_t)-1; 1288 } 1289 1290 k->get_config(vdev, vdev->config); 1291 1292 val = ldl_le_p(vdev->config + addr); 1293 return val; 1294 } 1295 1296 void virtio_config_modern_writeb(VirtIODevice *vdev, 1297 uint32_t addr, uint32_t data) 1298 { 1299 VirtioDeviceClass *k = VIRTIO_DEVICE_GET_CLASS(vdev); 1300 uint8_t val = data; 1301 1302 if (addr + sizeof(val) > vdev->config_len) { 1303 return; 1304 } 1305 1306 stb_p(vdev->config + addr, val); 1307 1308 if (k->set_config) { 1309 k->set_config(vdev, vdev->config); 1310 } 1311 } 1312 1313 void virtio_config_modern_writew(VirtIODevice *vdev, 1314 uint32_t addr, uint32_t data) 1315 { 1316 VirtioDeviceClass *k = VIRTIO_DEVICE_GET_CLASS(vdev); 1317 uint16_t val = data; 1318 1319 if (addr + sizeof(val) > vdev->config_len) { 1320 return; 1321 } 1322 1323 stw_le_p(vdev->config + addr, val); 1324 1325 if (k->set_config) { 1326 k->set_config(vdev, vdev->config); 1327 } 1328 } 1329 1330 void virtio_config_modern_writel(VirtIODevice *vdev, 1331 uint32_t addr, uint32_t data) 1332 { 1333 VirtioDeviceClass *k = VIRTIO_DEVICE_GET_CLASS(vdev); 1334 uint32_t val = data; 1335 1336 if (addr + sizeof(val) > vdev->config_len) { 1337 return; 1338 } 1339 1340 stl_le_p(vdev->config + addr, val); 1341 1342 if (k->set_config) { 1343 k->set_config(vdev, vdev->config); 1344 } 1345 } 1346 1347 void virtio_queue_set_addr(VirtIODevice *vdev, int n, hwaddr addr) 1348 { 1349 vdev->vq[n].vring.desc = addr; 1350 virtio_queue_update_rings(vdev, n); 1351 } 1352 1353 hwaddr virtio_queue_get_addr(VirtIODevice *vdev, int n) 1354 { 1355 return vdev->vq[n].vring.desc; 1356 } 1357 1358 void virtio_queue_set_rings(VirtIODevice *vdev, int n, hwaddr desc, 1359 hwaddr avail, hwaddr used) 1360 { 1361 vdev->vq[n].vring.desc = desc; 1362 vdev->vq[n].vring.avail = avail; 1363 vdev->vq[n].vring.used = used; 1364 virtio_init_region_cache(vdev, n); 1365 } 1366 1367 void virtio_queue_set_num(VirtIODevice *vdev, int n, int num) 1368 { 1369 /* Don't allow guest to flip queue between existent and 1370 * nonexistent states, or to set it to an invalid size. 1371 */ 1372 if (!!num != !!vdev->vq[n].vring.num || 1373 num > VIRTQUEUE_MAX_SIZE || 1374 num < 0) { 1375 return; 1376 } 1377 vdev->vq[n].vring.num = num; 1378 } 1379 1380 VirtQueue *virtio_vector_first_queue(VirtIODevice *vdev, uint16_t vector) 1381 { 1382 return QLIST_FIRST(&vdev->vector_queues[vector]); 1383 } 1384 1385 VirtQueue *virtio_vector_next_queue(VirtQueue *vq) 1386 { 1387 return QLIST_NEXT(vq, node); 1388 } 1389 1390 int virtio_queue_get_num(VirtIODevice *vdev, int n) 1391 { 1392 return vdev->vq[n].vring.num; 1393 } 1394 1395 int virtio_queue_get_max_num(VirtIODevice *vdev, int n) 1396 { 1397 return vdev->vq[n].vring.num_default; 1398 } 1399 1400 int virtio_get_num_queues(VirtIODevice *vdev) 1401 { 1402 int i; 1403 1404 for (i = 0; i < VIRTIO_QUEUE_MAX; i++) { 1405 if (!virtio_queue_get_num(vdev, i)) { 1406 break; 1407 } 1408 } 1409 1410 return i; 1411 } 1412 1413 void virtio_queue_set_align(VirtIODevice *vdev, int n, int align) 1414 { 1415 BusState *qbus = qdev_get_parent_bus(DEVICE(vdev)); 1416 VirtioBusClass *k = VIRTIO_BUS_GET_CLASS(qbus); 1417 1418 /* virtio-1 compliant devices cannot change the alignment */ 1419 if (virtio_vdev_has_feature(vdev, VIRTIO_F_VERSION_1)) { 1420 error_report("tried to modify queue alignment for virtio-1 device"); 1421 return; 1422 } 1423 /* Check that the transport told us it was going to do this 1424 * (so a buggy transport will immediately assert rather than 1425 * silently failing to migrate this state) 1426 */ 1427 assert(k->has_variable_vring_alignment); 1428 1429 vdev->vq[n].vring.align = align; 1430 virtio_queue_update_rings(vdev, n); 1431 } 1432 1433 static bool virtio_queue_notify_aio_vq(VirtQueue *vq) 1434 { 1435 if (vq->vring.desc && vq->handle_aio_output) { 1436 VirtIODevice *vdev = vq->vdev; 1437 1438 trace_virtio_queue_notify(vdev, vq - vdev->vq, vq); 1439 return vq->handle_aio_output(vdev, vq); 1440 } 1441 1442 return false; 1443 } 1444 1445 static void virtio_queue_notify_vq(VirtQueue *vq) 1446 { 1447 if (vq->vring.desc && vq->handle_output) { 1448 VirtIODevice *vdev = vq->vdev; 1449 1450 if (unlikely(vdev->broken)) { 1451 return; 1452 } 1453 1454 trace_virtio_queue_notify(vdev, vq - vdev->vq, vq); 1455 vq->handle_output(vdev, vq); 1456 } 1457 } 1458 1459 void virtio_queue_notify(VirtIODevice *vdev, int n) 1460 { 1461 virtio_queue_notify_vq(&vdev->vq[n]); 1462 } 1463 1464 uint16_t virtio_queue_vector(VirtIODevice *vdev, int n) 1465 { 1466 return n < VIRTIO_QUEUE_MAX ? vdev->vq[n].vector : 1467 VIRTIO_NO_VECTOR; 1468 } 1469 1470 void virtio_queue_set_vector(VirtIODevice *vdev, int n, uint16_t vector) 1471 { 1472 VirtQueue *vq = &vdev->vq[n]; 1473 1474 if (n < VIRTIO_QUEUE_MAX) { 1475 if (vdev->vector_queues && 1476 vdev->vq[n].vector != VIRTIO_NO_VECTOR) { 1477 QLIST_REMOVE(vq, node); 1478 } 1479 vdev->vq[n].vector = vector; 1480 if (vdev->vector_queues && 1481 vector != VIRTIO_NO_VECTOR) { 1482 QLIST_INSERT_HEAD(&vdev->vector_queues[vector], vq, node); 1483 } 1484 } 1485 } 1486 1487 VirtQueue *virtio_add_queue(VirtIODevice *vdev, int queue_size, 1488 VirtIOHandleOutput handle_output) 1489 { 1490 int i; 1491 1492 for (i = 0; i < VIRTIO_QUEUE_MAX; i++) { 1493 if (vdev->vq[i].vring.num == 0) 1494 break; 1495 } 1496 1497 if (i == VIRTIO_QUEUE_MAX || queue_size > VIRTQUEUE_MAX_SIZE) 1498 abort(); 1499 1500 vdev->vq[i].vring.num = queue_size; 1501 vdev->vq[i].vring.num_default = queue_size; 1502 vdev->vq[i].vring.align = VIRTIO_PCI_VRING_ALIGN; 1503 vdev->vq[i].handle_output = handle_output; 1504 vdev->vq[i].handle_aio_output = NULL; 1505 1506 return &vdev->vq[i]; 1507 } 1508 1509 void virtio_del_queue(VirtIODevice *vdev, int n) 1510 { 1511 if (n < 0 || n >= VIRTIO_QUEUE_MAX) { 1512 abort(); 1513 } 1514 1515 vdev->vq[n].vring.num = 0; 1516 vdev->vq[n].vring.num_default = 0; 1517 } 1518 1519 static void virtio_set_isr(VirtIODevice *vdev, int value) 1520 { 1521 uint8_t old = atomic_read(&vdev->isr); 1522 1523 /* Do not write ISR if it does not change, so that its cacheline remains 1524 * shared in the common case where the guest does not read it. 1525 */ 1526 if ((old & value) != value) { 1527 atomic_or(&vdev->isr, value); 1528 } 1529 } 1530 1531 /* Called within rcu_read_lock(). */ 1532 static bool virtio_should_notify(VirtIODevice *vdev, VirtQueue *vq) 1533 { 1534 uint16_t old, new; 1535 bool v; 1536 /* We need to expose used array entries before checking used event. */ 1537 smp_mb(); 1538 /* Always notify when queue is empty (when feature acknowledge) */ 1539 if (virtio_vdev_has_feature(vdev, VIRTIO_F_NOTIFY_ON_EMPTY) && 1540 !vq->inuse && virtio_queue_empty(vq)) { 1541 return true; 1542 } 1543 1544 if (!virtio_vdev_has_feature(vdev, VIRTIO_RING_F_EVENT_IDX)) { 1545 return !(vring_avail_flags(vq) & VRING_AVAIL_F_NO_INTERRUPT); 1546 } 1547 1548 v = vq->signalled_used_valid; 1549 vq->signalled_used_valid = true; 1550 old = vq->signalled_used; 1551 new = vq->signalled_used = vq->used_idx; 1552 return !v || vring_need_event(vring_get_used_event(vq), new, old); 1553 } 1554 1555 void virtio_notify_irqfd(VirtIODevice *vdev, VirtQueue *vq) 1556 { 1557 bool should_notify; 1558 rcu_read_lock(); 1559 should_notify = virtio_should_notify(vdev, vq); 1560 rcu_read_unlock(); 1561 1562 if (!should_notify) { 1563 return; 1564 } 1565 1566 trace_virtio_notify_irqfd(vdev, vq); 1567 1568 /* 1569 * virtio spec 1.0 says ISR bit 0 should be ignored with MSI, but 1570 * windows drivers included in virtio-win 1.8.0 (circa 2015) are 1571 * incorrectly polling this bit during crashdump and hibernation 1572 * in MSI mode, causing a hang if this bit is never updated. 1573 * Recent releases of Windows do not really shut down, but rather 1574 * log out and hibernate to make the next startup faster. Hence, 1575 * this manifested as a more serious hang during shutdown with 1576 * 1577 * Next driver release from 2016 fixed this problem, so working around it 1578 * is not a must, but it's easy to do so let's do it here. 1579 * 1580 * Note: it's safe to update ISR from any thread as it was switched 1581 * to an atomic operation. 1582 */ 1583 virtio_set_isr(vq->vdev, 0x1); 1584 event_notifier_set(&vq->guest_notifier); 1585 } 1586 1587 static void virtio_irq(VirtQueue *vq) 1588 { 1589 virtio_set_isr(vq->vdev, 0x1); 1590 virtio_notify_vector(vq->vdev, vq->vector); 1591 } 1592 1593 void virtio_notify(VirtIODevice *vdev, VirtQueue *vq) 1594 { 1595 bool should_notify; 1596 rcu_read_lock(); 1597 should_notify = virtio_should_notify(vdev, vq); 1598 rcu_read_unlock(); 1599 1600 if (!should_notify) { 1601 return; 1602 } 1603 1604 trace_virtio_notify(vdev, vq); 1605 virtio_irq(vq); 1606 } 1607 1608 void virtio_notify_config(VirtIODevice *vdev) 1609 { 1610 if (!(vdev->status & VIRTIO_CONFIG_S_DRIVER_OK)) 1611 return; 1612 1613 virtio_set_isr(vdev, 0x3); 1614 vdev->generation++; 1615 virtio_notify_vector(vdev, vdev->config_vector); 1616 } 1617 1618 static bool virtio_device_endian_needed(void *opaque) 1619 { 1620 VirtIODevice *vdev = opaque; 1621 1622 assert(vdev->device_endian != VIRTIO_DEVICE_ENDIAN_UNKNOWN); 1623 if (!virtio_vdev_has_feature(vdev, VIRTIO_F_VERSION_1)) { 1624 return vdev->device_endian != virtio_default_endian(); 1625 } 1626 /* Devices conforming to VIRTIO 1.0 or later are always LE. */ 1627 return vdev->device_endian != VIRTIO_DEVICE_ENDIAN_LITTLE; 1628 } 1629 1630 static bool virtio_64bit_features_needed(void *opaque) 1631 { 1632 VirtIODevice *vdev = opaque; 1633 1634 return (vdev->host_features >> 32) != 0; 1635 } 1636 1637 static bool virtio_virtqueue_needed(void *opaque) 1638 { 1639 VirtIODevice *vdev = opaque; 1640 1641 return virtio_host_has_feature(vdev, VIRTIO_F_VERSION_1); 1642 } 1643 1644 static bool virtio_ringsize_needed(void *opaque) 1645 { 1646 VirtIODevice *vdev = opaque; 1647 int i; 1648 1649 for (i = 0; i < VIRTIO_QUEUE_MAX; i++) { 1650 if (vdev->vq[i].vring.num != vdev->vq[i].vring.num_default) { 1651 return true; 1652 } 1653 } 1654 return false; 1655 } 1656 1657 static bool virtio_extra_state_needed(void *opaque) 1658 { 1659 VirtIODevice *vdev = opaque; 1660 BusState *qbus = qdev_get_parent_bus(DEVICE(vdev)); 1661 VirtioBusClass *k = VIRTIO_BUS_GET_CLASS(qbus); 1662 1663 return k->has_extra_state && 1664 k->has_extra_state(qbus->parent); 1665 } 1666 1667 static bool virtio_broken_needed(void *opaque) 1668 { 1669 VirtIODevice *vdev = opaque; 1670 1671 return vdev->broken; 1672 } 1673 1674 static const VMStateDescription vmstate_virtqueue = { 1675 .name = "virtqueue_state", 1676 .version_id = 1, 1677 .minimum_version_id = 1, 1678 .fields = (VMStateField[]) { 1679 VMSTATE_UINT64(vring.avail, struct VirtQueue), 1680 VMSTATE_UINT64(vring.used, struct VirtQueue), 1681 VMSTATE_END_OF_LIST() 1682 } 1683 }; 1684 1685 static const VMStateDescription vmstate_virtio_virtqueues = { 1686 .name = "virtio/virtqueues", 1687 .version_id = 1, 1688 .minimum_version_id = 1, 1689 .needed = &virtio_virtqueue_needed, 1690 .fields = (VMStateField[]) { 1691 VMSTATE_STRUCT_VARRAY_POINTER_KNOWN(vq, struct VirtIODevice, 1692 VIRTIO_QUEUE_MAX, 0, vmstate_virtqueue, VirtQueue), 1693 VMSTATE_END_OF_LIST() 1694 } 1695 }; 1696 1697 static const VMStateDescription vmstate_ringsize = { 1698 .name = "ringsize_state", 1699 .version_id = 1, 1700 .minimum_version_id = 1, 1701 .fields = (VMStateField[]) { 1702 VMSTATE_UINT32(vring.num_default, struct VirtQueue), 1703 VMSTATE_END_OF_LIST() 1704 } 1705 }; 1706 1707 static const VMStateDescription vmstate_virtio_ringsize = { 1708 .name = "virtio/ringsize", 1709 .version_id = 1, 1710 .minimum_version_id = 1, 1711 .needed = &virtio_ringsize_needed, 1712 .fields = (VMStateField[]) { 1713 VMSTATE_STRUCT_VARRAY_POINTER_KNOWN(vq, struct VirtIODevice, 1714 VIRTIO_QUEUE_MAX, 0, vmstate_ringsize, VirtQueue), 1715 VMSTATE_END_OF_LIST() 1716 } 1717 }; 1718 1719 static int get_extra_state(QEMUFile *f, void *pv, size_t size, 1720 VMStateField *field) 1721 { 1722 VirtIODevice *vdev = pv; 1723 BusState *qbus = qdev_get_parent_bus(DEVICE(vdev)); 1724 VirtioBusClass *k = VIRTIO_BUS_GET_CLASS(qbus); 1725 1726 if (!k->load_extra_state) { 1727 return -1; 1728 } else { 1729 return k->load_extra_state(qbus->parent, f); 1730 } 1731 } 1732 1733 static int put_extra_state(QEMUFile *f, void *pv, size_t size, 1734 VMStateField *field, QJSON *vmdesc) 1735 { 1736 VirtIODevice *vdev = pv; 1737 BusState *qbus = qdev_get_parent_bus(DEVICE(vdev)); 1738 VirtioBusClass *k = VIRTIO_BUS_GET_CLASS(qbus); 1739 1740 k->save_extra_state(qbus->parent, f); 1741 return 0; 1742 } 1743 1744 static const VMStateInfo vmstate_info_extra_state = { 1745 .name = "virtqueue_extra_state", 1746 .get = get_extra_state, 1747 .put = put_extra_state, 1748 }; 1749 1750 static const VMStateDescription vmstate_virtio_extra_state = { 1751 .name = "virtio/extra_state", 1752 .version_id = 1, 1753 .minimum_version_id = 1, 1754 .needed = &virtio_extra_state_needed, 1755 .fields = (VMStateField[]) { 1756 { 1757 .name = "extra_state", 1758 .version_id = 0, 1759 .field_exists = NULL, 1760 .size = 0, 1761 .info = &vmstate_info_extra_state, 1762 .flags = VMS_SINGLE, 1763 .offset = 0, 1764 }, 1765 VMSTATE_END_OF_LIST() 1766 } 1767 }; 1768 1769 static const VMStateDescription vmstate_virtio_device_endian = { 1770 .name = "virtio/device_endian", 1771 .version_id = 1, 1772 .minimum_version_id = 1, 1773 .needed = &virtio_device_endian_needed, 1774 .fields = (VMStateField[]) { 1775 VMSTATE_UINT8(device_endian, VirtIODevice), 1776 VMSTATE_END_OF_LIST() 1777 } 1778 }; 1779 1780 static const VMStateDescription vmstate_virtio_64bit_features = { 1781 .name = "virtio/64bit_features", 1782 .version_id = 1, 1783 .minimum_version_id = 1, 1784 .needed = &virtio_64bit_features_needed, 1785 .fields = (VMStateField[]) { 1786 VMSTATE_UINT64(guest_features, VirtIODevice), 1787 VMSTATE_END_OF_LIST() 1788 } 1789 }; 1790 1791 static const VMStateDescription vmstate_virtio_broken = { 1792 .name = "virtio/broken", 1793 .version_id = 1, 1794 .minimum_version_id = 1, 1795 .needed = &virtio_broken_needed, 1796 .fields = (VMStateField[]) { 1797 VMSTATE_BOOL(broken, VirtIODevice), 1798 VMSTATE_END_OF_LIST() 1799 } 1800 }; 1801 1802 static const VMStateDescription vmstate_virtio = { 1803 .name = "virtio", 1804 .version_id = 1, 1805 .minimum_version_id = 1, 1806 .minimum_version_id_old = 1, 1807 .fields = (VMStateField[]) { 1808 VMSTATE_END_OF_LIST() 1809 }, 1810 .subsections = (const VMStateDescription*[]) { 1811 &vmstate_virtio_device_endian, 1812 &vmstate_virtio_64bit_features, 1813 &vmstate_virtio_virtqueues, 1814 &vmstate_virtio_ringsize, 1815 &vmstate_virtio_broken, 1816 &vmstate_virtio_extra_state, 1817 NULL 1818 } 1819 }; 1820 1821 void virtio_save(VirtIODevice *vdev, QEMUFile *f) 1822 { 1823 BusState *qbus = qdev_get_parent_bus(DEVICE(vdev)); 1824 VirtioBusClass *k = VIRTIO_BUS_GET_CLASS(qbus); 1825 VirtioDeviceClass *vdc = VIRTIO_DEVICE_GET_CLASS(vdev); 1826 uint32_t guest_features_lo = (vdev->guest_features & 0xffffffff); 1827 int i; 1828 1829 if (k->save_config) { 1830 k->save_config(qbus->parent, f); 1831 } 1832 1833 qemu_put_8s(f, &vdev->status); 1834 qemu_put_8s(f, &vdev->isr); 1835 qemu_put_be16s(f, &vdev->queue_sel); 1836 qemu_put_be32s(f, &guest_features_lo); 1837 qemu_put_be32(f, vdev->config_len); 1838 qemu_put_buffer(f, vdev->config, vdev->config_len); 1839 1840 for (i = 0; i < VIRTIO_QUEUE_MAX; i++) { 1841 if (vdev->vq[i].vring.num == 0) 1842 break; 1843 } 1844 1845 qemu_put_be32(f, i); 1846 1847 for (i = 0; i < VIRTIO_QUEUE_MAX; i++) { 1848 if (vdev->vq[i].vring.num == 0) 1849 break; 1850 1851 qemu_put_be32(f, vdev->vq[i].vring.num); 1852 if (k->has_variable_vring_alignment) { 1853 qemu_put_be32(f, vdev->vq[i].vring.align); 1854 } 1855 /* XXX virtio-1 devices */ 1856 qemu_put_be64(f, vdev->vq[i].vring.desc); 1857 qemu_put_be16s(f, &vdev->vq[i].last_avail_idx); 1858 if (k->save_queue) { 1859 k->save_queue(qbus->parent, i, f); 1860 } 1861 } 1862 1863 if (vdc->save != NULL) { 1864 vdc->save(vdev, f); 1865 } 1866 1867 if (vdc->vmsd) { 1868 vmstate_save_state(f, vdc->vmsd, vdev, NULL); 1869 } 1870 1871 /* Subsections */ 1872 vmstate_save_state(f, &vmstate_virtio, vdev, NULL); 1873 } 1874 1875 /* A wrapper for use as a VMState .put function */ 1876 static int virtio_device_put(QEMUFile *f, void *opaque, size_t size, 1877 VMStateField *field, QJSON *vmdesc) 1878 { 1879 virtio_save(VIRTIO_DEVICE(opaque), f); 1880 1881 return 0; 1882 } 1883 1884 /* A wrapper for use as a VMState .get function */ 1885 static int virtio_device_get(QEMUFile *f, void *opaque, size_t size, 1886 VMStateField *field) 1887 { 1888 VirtIODevice *vdev = VIRTIO_DEVICE(opaque); 1889 DeviceClass *dc = DEVICE_CLASS(VIRTIO_DEVICE_GET_CLASS(vdev)); 1890 1891 return virtio_load(vdev, f, dc->vmsd->version_id); 1892 } 1893 1894 const VMStateInfo virtio_vmstate_info = { 1895 .name = "virtio", 1896 .get = virtio_device_get, 1897 .put = virtio_device_put, 1898 }; 1899 1900 static int virtio_set_features_nocheck(VirtIODevice *vdev, uint64_t val) 1901 { 1902 VirtioDeviceClass *k = VIRTIO_DEVICE_GET_CLASS(vdev); 1903 bool bad = (val & ~(vdev->host_features)) != 0; 1904 1905 val &= vdev->host_features; 1906 if (k->set_features) { 1907 k->set_features(vdev, val); 1908 } 1909 vdev->guest_features = val; 1910 return bad ? -1 : 0; 1911 } 1912 1913 int virtio_set_features(VirtIODevice *vdev, uint64_t val) 1914 { 1915 /* 1916 * The driver must not attempt to set features after feature negotiation 1917 * has finished. 1918 */ 1919 if (vdev->status & VIRTIO_CONFIG_S_FEATURES_OK) { 1920 return -EINVAL; 1921 } 1922 return virtio_set_features_nocheck(vdev, val); 1923 } 1924 1925 int virtio_load(VirtIODevice *vdev, QEMUFile *f, int version_id) 1926 { 1927 int i, ret; 1928 int32_t config_len; 1929 uint32_t num; 1930 uint32_t features; 1931 BusState *qbus = qdev_get_parent_bus(DEVICE(vdev)); 1932 VirtioBusClass *k = VIRTIO_BUS_GET_CLASS(qbus); 1933 VirtioDeviceClass *vdc = VIRTIO_DEVICE_GET_CLASS(vdev); 1934 1935 /* 1936 * We poison the endianness to ensure it does not get used before 1937 * subsections have been loaded. 1938 */ 1939 vdev->device_endian = VIRTIO_DEVICE_ENDIAN_UNKNOWN; 1940 1941 if (k->load_config) { 1942 ret = k->load_config(qbus->parent, f); 1943 if (ret) 1944 return ret; 1945 } 1946 1947 qemu_get_8s(f, &vdev->status); 1948 qemu_get_8s(f, &vdev->isr); 1949 qemu_get_be16s(f, &vdev->queue_sel); 1950 if (vdev->queue_sel >= VIRTIO_QUEUE_MAX) { 1951 return -1; 1952 } 1953 qemu_get_be32s(f, &features); 1954 1955 /* 1956 * Temporarily set guest_features low bits - needed by 1957 * virtio net load code testing for VIRTIO_NET_F_CTRL_GUEST_OFFLOADS 1958 * VIRTIO_NET_F_GUEST_ANNOUNCE and VIRTIO_NET_F_CTRL_VQ. 1959 * 1960 * Note: devices should always test host features in future - don't create 1961 * new dependencies like this. 1962 */ 1963 vdev->guest_features = features; 1964 1965 config_len = qemu_get_be32(f); 1966 1967 /* 1968 * There are cases where the incoming config can be bigger or smaller 1969 * than what we have; so load what we have space for, and skip 1970 * any excess that's in the stream. 1971 */ 1972 qemu_get_buffer(f, vdev->config, MIN(config_len, vdev->config_len)); 1973 1974 while (config_len > vdev->config_len) { 1975 qemu_get_byte(f); 1976 config_len--; 1977 } 1978 1979 num = qemu_get_be32(f); 1980 1981 if (num > VIRTIO_QUEUE_MAX) { 1982 error_report("Invalid number of virtqueues: 0x%x", num); 1983 return -1; 1984 } 1985 1986 for (i = 0; i < num; i++) { 1987 vdev->vq[i].vring.num = qemu_get_be32(f); 1988 if (k->has_variable_vring_alignment) { 1989 vdev->vq[i].vring.align = qemu_get_be32(f); 1990 } 1991 vdev->vq[i].vring.desc = qemu_get_be64(f); 1992 qemu_get_be16s(f, &vdev->vq[i].last_avail_idx); 1993 vdev->vq[i].signalled_used_valid = false; 1994 vdev->vq[i].notification = true; 1995 1996 if (vdev->vq[i].vring.desc) { 1997 /* XXX virtio-1 devices */ 1998 virtio_queue_update_rings(vdev, i); 1999 } else if (vdev->vq[i].last_avail_idx) { 2000 error_report("VQ %d address 0x0 " 2001 "inconsistent with Host index 0x%x", 2002 i, vdev->vq[i].last_avail_idx); 2003 return -1; 2004 } 2005 if (k->load_queue) { 2006 ret = k->load_queue(qbus->parent, i, f); 2007 if (ret) 2008 return ret; 2009 } 2010 } 2011 2012 virtio_notify_vector(vdev, VIRTIO_NO_VECTOR); 2013 2014 if (vdc->load != NULL) { 2015 ret = vdc->load(vdev, f, version_id); 2016 if (ret) { 2017 return ret; 2018 } 2019 } 2020 2021 if (vdc->vmsd) { 2022 ret = vmstate_load_state(f, vdc->vmsd, vdev, version_id); 2023 if (ret) { 2024 return ret; 2025 } 2026 } 2027 2028 /* Subsections */ 2029 ret = vmstate_load_state(f, &vmstate_virtio, vdev, 1); 2030 if (ret) { 2031 return ret; 2032 } 2033 2034 if (vdev->device_endian == VIRTIO_DEVICE_ENDIAN_UNKNOWN) { 2035 vdev->device_endian = virtio_default_endian(); 2036 } 2037 2038 if (virtio_64bit_features_needed(vdev)) { 2039 /* 2040 * Subsection load filled vdev->guest_features. Run them 2041 * through virtio_set_features to sanity-check them against 2042 * host_features. 2043 */ 2044 uint64_t features64 = vdev->guest_features; 2045 if (virtio_set_features_nocheck(vdev, features64) < 0) { 2046 error_report("Features 0x%" PRIx64 " unsupported. " 2047 "Allowed features: 0x%" PRIx64, 2048 features64, vdev->host_features); 2049 return -1; 2050 } 2051 } else { 2052 if (virtio_set_features_nocheck(vdev, features) < 0) { 2053 error_report("Features 0x%x unsupported. " 2054 "Allowed features: 0x%" PRIx64, 2055 features, vdev->host_features); 2056 return -1; 2057 } 2058 } 2059 2060 rcu_read_lock(); 2061 for (i = 0; i < num; i++) { 2062 if (vdev->vq[i].vring.desc) { 2063 uint16_t nheads; 2064 nheads = vring_avail_idx(&vdev->vq[i]) - vdev->vq[i].last_avail_idx; 2065 /* Check it isn't doing strange things with descriptor numbers. */ 2066 if (nheads > vdev->vq[i].vring.num) { 2067 error_report("VQ %d size 0x%x Guest index 0x%x " 2068 "inconsistent with Host index 0x%x: delta 0x%x", 2069 i, vdev->vq[i].vring.num, 2070 vring_avail_idx(&vdev->vq[i]), 2071 vdev->vq[i].last_avail_idx, nheads); 2072 return -1; 2073 } 2074 vdev->vq[i].used_idx = vring_used_idx(&vdev->vq[i]); 2075 vdev->vq[i].shadow_avail_idx = vring_avail_idx(&vdev->vq[i]); 2076 2077 /* 2078 * Some devices migrate VirtQueueElements that have been popped 2079 * from the avail ring but not yet returned to the used ring. 2080 * Since max ring size < UINT16_MAX it's safe to use modulo 2081 * UINT16_MAX + 1 subtraction. 2082 */ 2083 vdev->vq[i].inuse = (uint16_t)(vdev->vq[i].last_avail_idx - 2084 vdev->vq[i].used_idx); 2085 if (vdev->vq[i].inuse > vdev->vq[i].vring.num) { 2086 error_report("VQ %d size 0x%x < last_avail_idx 0x%x - " 2087 "used_idx 0x%x", 2088 i, vdev->vq[i].vring.num, 2089 vdev->vq[i].last_avail_idx, 2090 vdev->vq[i].used_idx); 2091 return -1; 2092 } 2093 } 2094 } 2095 rcu_read_unlock(); 2096 2097 return 0; 2098 } 2099 2100 void virtio_cleanup(VirtIODevice *vdev) 2101 { 2102 qemu_del_vm_change_state_handler(vdev->vmstate); 2103 } 2104 2105 static void virtio_vmstate_change(void *opaque, int running, RunState state) 2106 { 2107 VirtIODevice *vdev = opaque; 2108 BusState *qbus = qdev_get_parent_bus(DEVICE(vdev)); 2109 VirtioBusClass *k = VIRTIO_BUS_GET_CLASS(qbus); 2110 bool backend_run = running && (vdev->status & VIRTIO_CONFIG_S_DRIVER_OK); 2111 vdev->vm_running = running; 2112 2113 if (backend_run) { 2114 virtio_set_status(vdev, vdev->status); 2115 } 2116 2117 if (k->vmstate_change) { 2118 k->vmstate_change(qbus->parent, backend_run); 2119 } 2120 2121 if (!backend_run) { 2122 virtio_set_status(vdev, vdev->status); 2123 } 2124 } 2125 2126 void virtio_instance_init_common(Object *proxy_obj, void *data, 2127 size_t vdev_size, const char *vdev_name) 2128 { 2129 DeviceState *vdev = data; 2130 2131 object_initialize(vdev, vdev_size, vdev_name); 2132 object_property_add_child(proxy_obj, "virtio-backend", OBJECT(vdev), NULL); 2133 object_unref(OBJECT(vdev)); 2134 qdev_alias_all_properties(vdev, proxy_obj); 2135 } 2136 2137 void virtio_init(VirtIODevice *vdev, const char *name, 2138 uint16_t device_id, size_t config_size) 2139 { 2140 BusState *qbus = qdev_get_parent_bus(DEVICE(vdev)); 2141 VirtioBusClass *k = VIRTIO_BUS_GET_CLASS(qbus); 2142 int i; 2143 int nvectors = k->query_nvectors ? k->query_nvectors(qbus->parent) : 0; 2144 2145 if (nvectors) { 2146 vdev->vector_queues = 2147 g_malloc0(sizeof(*vdev->vector_queues) * nvectors); 2148 } 2149 2150 vdev->device_id = device_id; 2151 vdev->status = 0; 2152 atomic_set(&vdev->isr, 0); 2153 vdev->queue_sel = 0; 2154 vdev->config_vector = VIRTIO_NO_VECTOR; 2155 vdev->vq = g_malloc0(sizeof(VirtQueue) * VIRTIO_QUEUE_MAX); 2156 vdev->vm_running = runstate_is_running(); 2157 vdev->broken = false; 2158 for (i = 0; i < VIRTIO_QUEUE_MAX; i++) { 2159 vdev->vq[i].vector = VIRTIO_NO_VECTOR; 2160 vdev->vq[i].vdev = vdev; 2161 vdev->vq[i].queue_index = i; 2162 } 2163 2164 vdev->name = name; 2165 vdev->config_len = config_size; 2166 if (vdev->config_len) { 2167 vdev->config = g_malloc0(config_size); 2168 } else { 2169 vdev->config = NULL; 2170 } 2171 vdev->vmstate = qemu_add_vm_change_state_handler(virtio_vmstate_change, 2172 vdev); 2173 vdev->device_endian = virtio_default_endian(); 2174 vdev->use_guest_notifier_mask = true; 2175 } 2176 2177 hwaddr virtio_queue_get_desc_addr(VirtIODevice *vdev, int n) 2178 { 2179 return vdev->vq[n].vring.desc; 2180 } 2181 2182 hwaddr virtio_queue_get_avail_addr(VirtIODevice *vdev, int n) 2183 { 2184 return vdev->vq[n].vring.avail; 2185 } 2186 2187 hwaddr virtio_queue_get_used_addr(VirtIODevice *vdev, int n) 2188 { 2189 return vdev->vq[n].vring.used; 2190 } 2191 2192 hwaddr virtio_queue_get_desc_size(VirtIODevice *vdev, int n) 2193 { 2194 return sizeof(VRingDesc) * vdev->vq[n].vring.num; 2195 } 2196 2197 hwaddr virtio_queue_get_avail_size(VirtIODevice *vdev, int n) 2198 { 2199 return offsetof(VRingAvail, ring) + 2200 sizeof(uint16_t) * vdev->vq[n].vring.num; 2201 } 2202 2203 hwaddr virtio_queue_get_used_size(VirtIODevice *vdev, int n) 2204 { 2205 return offsetof(VRingUsed, ring) + 2206 sizeof(VRingUsedElem) * vdev->vq[n].vring.num; 2207 } 2208 2209 uint16_t virtio_queue_get_last_avail_idx(VirtIODevice *vdev, int n) 2210 { 2211 return vdev->vq[n].last_avail_idx; 2212 } 2213 2214 void virtio_queue_set_last_avail_idx(VirtIODevice *vdev, int n, uint16_t idx) 2215 { 2216 vdev->vq[n].last_avail_idx = idx; 2217 vdev->vq[n].shadow_avail_idx = idx; 2218 } 2219 2220 void virtio_queue_update_used_idx(VirtIODevice *vdev, int n) 2221 { 2222 rcu_read_lock(); 2223 if (vdev->vq[n].vring.desc) { 2224 vdev->vq[n].used_idx = vring_used_idx(&vdev->vq[n]); 2225 } 2226 rcu_read_unlock(); 2227 } 2228 2229 void virtio_queue_invalidate_signalled_used(VirtIODevice *vdev, int n) 2230 { 2231 vdev->vq[n].signalled_used_valid = false; 2232 } 2233 2234 VirtQueue *virtio_get_queue(VirtIODevice *vdev, int n) 2235 { 2236 return vdev->vq + n; 2237 } 2238 2239 uint16_t virtio_get_queue_index(VirtQueue *vq) 2240 { 2241 return vq->queue_index; 2242 } 2243 2244 static void virtio_queue_guest_notifier_read(EventNotifier *n) 2245 { 2246 VirtQueue *vq = container_of(n, VirtQueue, guest_notifier); 2247 if (event_notifier_test_and_clear(n)) { 2248 virtio_irq(vq); 2249 } 2250 } 2251 2252 void virtio_queue_set_guest_notifier_fd_handler(VirtQueue *vq, bool assign, 2253 bool with_irqfd) 2254 { 2255 if (assign && !with_irqfd) { 2256 event_notifier_set_handler(&vq->guest_notifier, 2257 virtio_queue_guest_notifier_read); 2258 } else { 2259 event_notifier_set_handler(&vq->guest_notifier, NULL); 2260 } 2261 if (!assign) { 2262 /* Test and clear notifier before closing it, 2263 * in case poll callback didn't have time to run. */ 2264 virtio_queue_guest_notifier_read(&vq->guest_notifier); 2265 } 2266 } 2267 2268 EventNotifier *virtio_queue_get_guest_notifier(VirtQueue *vq) 2269 { 2270 return &vq->guest_notifier; 2271 } 2272 2273 static void virtio_queue_host_notifier_aio_read(EventNotifier *n) 2274 { 2275 VirtQueue *vq = container_of(n, VirtQueue, host_notifier); 2276 if (event_notifier_test_and_clear(n)) { 2277 virtio_queue_notify_aio_vq(vq); 2278 } 2279 } 2280 2281 static void virtio_queue_host_notifier_aio_poll_begin(EventNotifier *n) 2282 { 2283 VirtQueue *vq = container_of(n, VirtQueue, host_notifier); 2284 2285 virtio_queue_set_notification(vq, 0); 2286 } 2287 2288 static bool virtio_queue_host_notifier_aio_poll(void *opaque) 2289 { 2290 EventNotifier *n = opaque; 2291 VirtQueue *vq = container_of(n, VirtQueue, host_notifier); 2292 bool progress; 2293 2294 if (virtio_queue_empty(vq)) { 2295 return false; 2296 } 2297 2298 progress = virtio_queue_notify_aio_vq(vq); 2299 2300 /* In case the handler function re-enabled notifications */ 2301 virtio_queue_set_notification(vq, 0); 2302 return progress; 2303 } 2304 2305 static void virtio_queue_host_notifier_aio_poll_end(EventNotifier *n) 2306 { 2307 VirtQueue *vq = container_of(n, VirtQueue, host_notifier); 2308 2309 /* Caller polls once more after this to catch requests that race with us */ 2310 virtio_queue_set_notification(vq, 1); 2311 } 2312 2313 void virtio_queue_aio_set_host_notifier_handler(VirtQueue *vq, AioContext *ctx, 2314 VirtIOHandleAIOOutput handle_output) 2315 { 2316 if (handle_output) { 2317 vq->handle_aio_output = handle_output; 2318 aio_set_event_notifier(ctx, &vq->host_notifier, true, 2319 virtio_queue_host_notifier_aio_read, 2320 virtio_queue_host_notifier_aio_poll); 2321 aio_set_event_notifier_poll(ctx, &vq->host_notifier, 2322 virtio_queue_host_notifier_aio_poll_begin, 2323 virtio_queue_host_notifier_aio_poll_end); 2324 } else { 2325 aio_set_event_notifier(ctx, &vq->host_notifier, true, NULL, NULL); 2326 /* Test and clear notifier before after disabling event, 2327 * in case poll callback didn't have time to run. */ 2328 virtio_queue_host_notifier_aio_read(&vq->host_notifier); 2329 vq->handle_aio_output = NULL; 2330 } 2331 } 2332 2333 void virtio_queue_host_notifier_read(EventNotifier *n) 2334 { 2335 VirtQueue *vq = container_of(n, VirtQueue, host_notifier); 2336 if (event_notifier_test_and_clear(n)) { 2337 virtio_queue_notify_vq(vq); 2338 } 2339 } 2340 2341 EventNotifier *virtio_queue_get_host_notifier(VirtQueue *vq) 2342 { 2343 return &vq->host_notifier; 2344 } 2345 2346 void virtio_device_set_child_bus_name(VirtIODevice *vdev, char *bus_name) 2347 { 2348 g_free(vdev->bus_name); 2349 vdev->bus_name = g_strdup(bus_name); 2350 } 2351 2352 void GCC_FMT_ATTR(2, 3) virtio_error(VirtIODevice *vdev, const char *fmt, ...) 2353 { 2354 va_list ap; 2355 2356 va_start(ap, fmt); 2357 error_vreport(fmt, ap); 2358 va_end(ap); 2359 2360 vdev->broken = true; 2361 2362 if (virtio_vdev_has_feature(vdev, VIRTIO_F_VERSION_1)) { 2363 virtio_set_status(vdev, vdev->status | VIRTIO_CONFIG_S_NEEDS_RESET); 2364 virtio_notify_config(vdev); 2365 } 2366 } 2367 2368 static void virtio_memory_listener_commit(MemoryListener *listener) 2369 { 2370 VirtIODevice *vdev = container_of(listener, VirtIODevice, listener); 2371 int i; 2372 2373 for (i = 0; i < VIRTIO_QUEUE_MAX; i++) { 2374 if (vdev->vq[i].vring.num == 0) { 2375 break; 2376 } 2377 virtio_init_region_cache(vdev, i); 2378 } 2379 } 2380 2381 static void virtio_device_realize(DeviceState *dev, Error **errp) 2382 { 2383 VirtIODevice *vdev = VIRTIO_DEVICE(dev); 2384 VirtioDeviceClass *vdc = VIRTIO_DEVICE_GET_CLASS(dev); 2385 Error *err = NULL; 2386 2387 /* Devices should either use vmsd or the load/save methods */ 2388 assert(!vdc->vmsd || !vdc->load); 2389 2390 if (vdc->realize != NULL) { 2391 vdc->realize(dev, &err); 2392 if (err != NULL) { 2393 error_propagate(errp, err); 2394 return; 2395 } 2396 } 2397 2398 virtio_bus_device_plugged(vdev, &err); 2399 if (err != NULL) { 2400 error_propagate(errp, err); 2401 return; 2402 } 2403 2404 vdev->listener.commit = virtio_memory_listener_commit; 2405 memory_listener_register(&vdev->listener, vdev->dma_as); 2406 } 2407 2408 static void virtio_device_unrealize(DeviceState *dev, Error **errp) 2409 { 2410 VirtIODevice *vdev = VIRTIO_DEVICE(dev); 2411 VirtioDeviceClass *vdc = VIRTIO_DEVICE_GET_CLASS(dev); 2412 Error *err = NULL; 2413 2414 virtio_bus_device_unplugged(vdev); 2415 2416 if (vdc->unrealize != NULL) { 2417 vdc->unrealize(dev, &err); 2418 if (err != NULL) { 2419 error_propagate(errp, err); 2420 return; 2421 } 2422 } 2423 2424 g_free(vdev->bus_name); 2425 vdev->bus_name = NULL; 2426 } 2427 2428 static void virtio_device_free_virtqueues(VirtIODevice *vdev) 2429 { 2430 int i; 2431 if (!vdev->vq) { 2432 return; 2433 } 2434 2435 for (i = 0; i < VIRTIO_QUEUE_MAX; i++) { 2436 VRingMemoryRegionCaches *caches; 2437 if (vdev->vq[i].vring.num == 0) { 2438 break; 2439 } 2440 caches = atomic_read(&vdev->vq[i].vring.caches); 2441 atomic_set(&vdev->vq[i].vring.caches, NULL); 2442 virtio_free_region_cache(caches); 2443 } 2444 g_free(vdev->vq); 2445 } 2446 2447 static void virtio_device_instance_finalize(Object *obj) 2448 { 2449 VirtIODevice *vdev = VIRTIO_DEVICE(obj); 2450 2451 memory_listener_unregister(&vdev->listener); 2452 virtio_device_free_virtqueues(vdev); 2453 2454 g_free(vdev->config); 2455 g_free(vdev->vector_queues); 2456 } 2457 2458 static Property virtio_properties[] = { 2459 DEFINE_VIRTIO_COMMON_FEATURES(VirtIODevice, host_features), 2460 DEFINE_PROP_END_OF_LIST(), 2461 }; 2462 2463 static int virtio_device_start_ioeventfd_impl(VirtIODevice *vdev) 2464 { 2465 VirtioBusState *qbus = VIRTIO_BUS(qdev_get_parent_bus(DEVICE(vdev))); 2466 int n, r, err; 2467 2468 for (n = 0; n < VIRTIO_QUEUE_MAX; n++) { 2469 VirtQueue *vq = &vdev->vq[n]; 2470 if (!virtio_queue_get_num(vdev, n)) { 2471 continue; 2472 } 2473 r = virtio_bus_set_host_notifier(qbus, n, true); 2474 if (r < 0) { 2475 err = r; 2476 goto assign_error; 2477 } 2478 event_notifier_set_handler(&vq->host_notifier, 2479 virtio_queue_host_notifier_read); 2480 } 2481 2482 for (n = 0; n < VIRTIO_QUEUE_MAX; n++) { 2483 /* Kick right away to begin processing requests already in vring */ 2484 VirtQueue *vq = &vdev->vq[n]; 2485 if (!vq->vring.num) { 2486 continue; 2487 } 2488 event_notifier_set(&vq->host_notifier); 2489 } 2490 return 0; 2491 2492 assign_error: 2493 while (--n >= 0) { 2494 VirtQueue *vq = &vdev->vq[n]; 2495 if (!virtio_queue_get_num(vdev, n)) { 2496 continue; 2497 } 2498 2499 event_notifier_set_handler(&vq->host_notifier, NULL); 2500 r = virtio_bus_set_host_notifier(qbus, n, false); 2501 assert(r >= 0); 2502 } 2503 return err; 2504 } 2505 2506 int virtio_device_start_ioeventfd(VirtIODevice *vdev) 2507 { 2508 BusState *qbus = qdev_get_parent_bus(DEVICE(vdev)); 2509 VirtioBusState *vbus = VIRTIO_BUS(qbus); 2510 2511 return virtio_bus_start_ioeventfd(vbus); 2512 } 2513 2514 static void virtio_device_stop_ioeventfd_impl(VirtIODevice *vdev) 2515 { 2516 VirtioBusState *qbus = VIRTIO_BUS(qdev_get_parent_bus(DEVICE(vdev))); 2517 int n, r; 2518 2519 for (n = 0; n < VIRTIO_QUEUE_MAX; n++) { 2520 VirtQueue *vq = &vdev->vq[n]; 2521 2522 if (!virtio_queue_get_num(vdev, n)) { 2523 continue; 2524 } 2525 event_notifier_set_handler(&vq->host_notifier, NULL); 2526 r = virtio_bus_set_host_notifier(qbus, n, false); 2527 assert(r >= 0); 2528 } 2529 } 2530 2531 void virtio_device_stop_ioeventfd(VirtIODevice *vdev) 2532 { 2533 BusState *qbus = qdev_get_parent_bus(DEVICE(vdev)); 2534 VirtioBusState *vbus = VIRTIO_BUS(qbus); 2535 2536 virtio_bus_stop_ioeventfd(vbus); 2537 } 2538 2539 int virtio_device_grab_ioeventfd(VirtIODevice *vdev) 2540 { 2541 BusState *qbus = qdev_get_parent_bus(DEVICE(vdev)); 2542 VirtioBusState *vbus = VIRTIO_BUS(qbus); 2543 2544 return virtio_bus_grab_ioeventfd(vbus); 2545 } 2546 2547 void virtio_device_release_ioeventfd(VirtIODevice *vdev) 2548 { 2549 BusState *qbus = qdev_get_parent_bus(DEVICE(vdev)); 2550 VirtioBusState *vbus = VIRTIO_BUS(qbus); 2551 2552 virtio_bus_release_ioeventfd(vbus); 2553 } 2554 2555 static void virtio_device_class_init(ObjectClass *klass, void *data) 2556 { 2557 /* Set the default value here. */ 2558 VirtioDeviceClass *vdc = VIRTIO_DEVICE_CLASS(klass); 2559 DeviceClass *dc = DEVICE_CLASS(klass); 2560 2561 dc->realize = virtio_device_realize; 2562 dc->unrealize = virtio_device_unrealize; 2563 dc->bus_type = TYPE_VIRTIO_BUS; 2564 dc->props = virtio_properties; 2565 vdc->start_ioeventfd = virtio_device_start_ioeventfd_impl; 2566 vdc->stop_ioeventfd = virtio_device_stop_ioeventfd_impl; 2567 2568 vdc->legacy_features |= VIRTIO_LEGACY_FEATURES; 2569 } 2570 2571 bool virtio_device_ioeventfd_enabled(VirtIODevice *vdev) 2572 { 2573 BusState *qbus = qdev_get_parent_bus(DEVICE(vdev)); 2574 VirtioBusState *vbus = VIRTIO_BUS(qbus); 2575 2576 return virtio_bus_ioeventfd_enabled(vbus); 2577 } 2578 2579 static const TypeInfo virtio_device_info = { 2580 .name = TYPE_VIRTIO_DEVICE, 2581 .parent = TYPE_DEVICE, 2582 .instance_size = sizeof(VirtIODevice), 2583 .class_init = virtio_device_class_init, 2584 .instance_finalize = virtio_device_instance_finalize, 2585 .abstract = true, 2586 .class_size = sizeof(VirtioDeviceClass), 2587 }; 2588 2589 static void virtio_register_types(void) 2590 { 2591 type_register_static(&virtio_device_info); 2592 } 2593 2594 type_init(virtio_register_types) 2595