| /* |
| * Virtio PCI Bindings |
| * |
| * Copyright IBM, Corp. 2007 |
| * Copyright (c) 2009 CodeSourcery |
| * |
| * Authors: |
| * Anthony Liguori <aliguori@us.ibm.com> |
| * Paul Brook <paul@codesourcery.com> |
| * |
| * This work is licensed under the terms of the GNU GPL, version 2. See |
| * the COPYING file in the top-level directory. |
| * |
| */ |
| |
| #include <inttypes.h> |
| |
| #include "virtio.h" |
| #include "virtio-blk.h" |
| #include "virtio-net.h" |
| #include "pci.h" |
| #include "qemu-error.h" |
| #include "msix.h" |
| #include "net.h" |
| #include "loader.h" |
| #include "kvm.h" |
| #include "blockdev.h" |
| |
| /* from Linux's linux/virtio_pci.h */ |
| |
| /* A 32-bit r/o bitmask of the features supported by the host */ |
| #define VIRTIO_PCI_HOST_FEATURES 0 |
| |
| /* A 32-bit r/w bitmask of features activated by the guest */ |
| #define VIRTIO_PCI_GUEST_FEATURES 4 |
| |
| /* A 32-bit r/w PFN for the currently selected queue */ |
| #define VIRTIO_PCI_QUEUE_PFN 8 |
| |
| /* A 16-bit r/o queue size for the currently selected queue */ |
| #define VIRTIO_PCI_QUEUE_NUM 12 |
| |
| /* A 16-bit r/w queue selector */ |
| #define VIRTIO_PCI_QUEUE_SEL 14 |
| |
| /* A 16-bit r/w queue notifier */ |
| #define VIRTIO_PCI_QUEUE_NOTIFY 16 |
| |
| /* An 8-bit device status register. */ |
| #define VIRTIO_PCI_STATUS 18 |
| |
| /* An 8-bit r/o interrupt status register. Reading the value will return the |
| * current contents of the ISR and will also clear it. This is effectively |
| * a read-and-acknowledge. */ |
| #define VIRTIO_PCI_ISR 19 |
| |
| /* MSI-X registers: only enabled if MSI-X is enabled. */ |
| /* A 16-bit vector for configuration changes. */ |
| #define VIRTIO_MSI_CONFIG_VECTOR 20 |
| /* A 16-bit vector for selected queue notifications. */ |
| #define VIRTIO_MSI_QUEUE_VECTOR 22 |
| |
| /* Config space size */ |
| #define VIRTIO_PCI_CONFIG_NOMSI 20 |
| #define VIRTIO_PCI_CONFIG_MSI 24 |
| #define VIRTIO_PCI_REGION_SIZE(dev) (msix_present(dev) ? \ |
| VIRTIO_PCI_CONFIG_MSI : \ |
| VIRTIO_PCI_CONFIG_NOMSI) |
| |
| /* The remaining space is defined by each driver as the per-driver |
| * configuration space */ |
| #define VIRTIO_PCI_CONFIG(dev) (msix_enabled(dev) ? \ |
| VIRTIO_PCI_CONFIG_MSI : \ |
| VIRTIO_PCI_CONFIG_NOMSI) |
| |
| /* Virtio ABI version, if we increment this, we break the guest driver. */ |
| #define VIRTIO_PCI_ABI_VERSION 0 |
| |
| /* How many bits to shift physical queue address written to QUEUE_PFN. |
| * 12 is historical, and due to x86 page size. */ |
| #define VIRTIO_PCI_QUEUE_ADDR_SHIFT 12 |
| |
| /* Flags track per-device state like workarounds for quirks in older guests. */ |
| #define VIRTIO_PCI_FLAG_BUS_MASTER_BUG (1 << 0) |
| |
| /* Performance improves when virtqueue kick processing is decoupled from the |
| * vcpu thread using ioeventfd for some devices. */ |
| #define VIRTIO_PCI_FLAG_USE_IOEVENTFD_BIT 1 |
| #define VIRTIO_PCI_FLAG_USE_IOEVENTFD (1 << VIRTIO_PCI_FLAG_USE_IOEVENTFD_BIT) |
| |
| /* QEMU doesn't strictly need write barriers since everything runs in |
| * lock-step. We'll leave the calls to wmb() in though to make it obvious for |
| * KVM or if kqemu gets SMP support. |
| */ |
| #define wmb() do { } while (0) |
| |
| /* PCI bindings. */ |
| |
| typedef struct { |
| PCIDevice pci_dev; |
| VirtIODevice *vdev; |
| uint32_t flags; |
| uint32_t addr; |
| uint32_t class_code; |
| uint32_t nvectors; |
| BlockConf block; |
| NICConf nic; |
| uint32_t host_features; |
| #ifdef CONFIG_LINUX |
| V9fsConf fsconf; |
| #endif |
| /* Max. number of ports we can have for a the virtio-serial device */ |
| uint32_t max_virtserial_ports; |
| virtio_net_conf net; |
| bool ioeventfd_disabled; |
| bool ioeventfd_started; |
| } VirtIOPCIProxy; |
| |
| /* virtio device */ |
| |
| static void virtio_pci_notify(void *opaque, uint16_t vector) |
| { |
| VirtIOPCIProxy *proxy = opaque; |
| if (msix_enabled(&proxy->pci_dev)) |
| msix_notify(&proxy->pci_dev, vector); |
| else |
| qemu_set_irq(proxy->pci_dev.irq[0], proxy->vdev->isr & 1); |
| } |
| |
| static void virtio_pci_save_config(void * opaque, QEMUFile *f) |
| { |
| VirtIOPCIProxy *proxy = opaque; |
| pci_device_save(&proxy->pci_dev, f); |
| msix_save(&proxy->pci_dev, f); |
| if (msix_present(&proxy->pci_dev)) |
| qemu_put_be16(f, proxy->vdev->config_vector); |
| } |
| |
| static void virtio_pci_save_queue(void * opaque, int n, QEMUFile *f) |
| { |
| VirtIOPCIProxy *proxy = opaque; |
| if (msix_present(&proxy->pci_dev)) |
| qemu_put_be16(f, virtio_queue_vector(proxy->vdev, n)); |
| } |
| |
| static int virtio_pci_load_config(void * opaque, QEMUFile *f) |
| { |
| VirtIOPCIProxy *proxy = opaque; |
| int ret; |
| ret = pci_device_load(&proxy->pci_dev, f); |
| if (ret) { |
| return ret; |
| } |
| msix_load(&proxy->pci_dev, f); |
| if (msix_present(&proxy->pci_dev)) { |
| qemu_get_be16s(f, &proxy->vdev->config_vector); |
| } else { |
| proxy->vdev->config_vector = VIRTIO_NO_VECTOR; |
| } |
| if (proxy->vdev->config_vector != VIRTIO_NO_VECTOR) { |
| return msix_vector_use(&proxy->pci_dev, proxy->vdev->config_vector); |
| } |
| |
| /* Try to find out if the guest has bus master disabled, but is |
| in ready state. Then we have a buggy guest OS. */ |
| if ((proxy->vdev->status & VIRTIO_CONFIG_S_DRIVER_OK) && |
| !(proxy->pci_dev.config[PCI_COMMAND] & PCI_COMMAND_MASTER)) { |
| proxy->flags |= VIRTIO_PCI_FLAG_BUS_MASTER_BUG; |
| } |
| return 0; |
| } |
| |
| static int virtio_pci_load_queue(void * opaque, int n, QEMUFile *f) |
| { |
| VirtIOPCIProxy *proxy = opaque; |
| uint16_t vector; |
| if (msix_present(&proxy->pci_dev)) { |
| qemu_get_be16s(f, &vector); |
| } else { |
| vector = VIRTIO_NO_VECTOR; |
| } |
| virtio_queue_set_vector(proxy->vdev, n, vector); |
| if (vector != VIRTIO_NO_VECTOR) { |
| return msix_vector_use(&proxy->pci_dev, vector); |
| } |
| return 0; |
| } |
| |
| static int virtio_pci_set_host_notifier_internal(VirtIOPCIProxy *proxy, |
| int n, bool assign) |
| { |
| VirtQueue *vq = virtio_get_queue(proxy->vdev, n); |
| EventNotifier *notifier = virtio_queue_get_host_notifier(vq); |
| int r; |
| if (assign) { |
| r = event_notifier_init(notifier, 1); |
| if (r < 0) { |
| error_report("%s: unable to init event notifier: %d", |
| __func__, r); |
| return r; |
| } |
| r = kvm_set_ioeventfd_pio_word(event_notifier_get_fd(notifier), |
| proxy->addr + VIRTIO_PCI_QUEUE_NOTIFY, |
| n, assign); |
| if (r < 0) { |
| error_report("%s: unable to map ioeventfd: %d", |
| __func__, r); |
| event_notifier_cleanup(notifier); |
| } |
| } else { |
| r = kvm_set_ioeventfd_pio_word(event_notifier_get_fd(notifier), |
| proxy->addr + VIRTIO_PCI_QUEUE_NOTIFY, |
| n, assign); |
| if (r < 0) { |
| error_report("%s: unable to unmap ioeventfd: %d", |
| __func__, r); |
| return r; |
| } |
| |
| /* Handle the race condition where the guest kicked and we deassigned |
| * before we got around to handling the kick. |
| */ |
| if (event_notifier_test_and_clear(notifier)) { |
| virtio_queue_notify_vq(vq); |
| } |
| |
| event_notifier_cleanup(notifier); |
| } |
| return r; |
| } |
| |
| static void virtio_pci_host_notifier_read(void *opaque) |
| { |
| VirtQueue *vq = opaque; |
| EventNotifier *n = virtio_queue_get_host_notifier(vq); |
| if (event_notifier_test_and_clear(n)) { |
| virtio_queue_notify_vq(vq); |
| } |
| } |
| |
| static void virtio_pci_set_host_notifier_fd_handler(VirtIOPCIProxy *proxy, |
| int n, bool assign) |
| { |
| VirtQueue *vq = virtio_get_queue(proxy->vdev, n); |
| EventNotifier *notifier = virtio_queue_get_host_notifier(vq); |
| if (assign) { |
| qemu_set_fd_handler(event_notifier_get_fd(notifier), |
| virtio_pci_host_notifier_read, NULL, vq); |
| } else { |
| qemu_set_fd_handler(event_notifier_get_fd(notifier), |
| NULL, NULL, NULL); |
| } |
| } |
| |
| static void virtio_pci_start_ioeventfd(VirtIOPCIProxy *proxy) |
| { |
| int n, r; |
| |
| if (!(proxy->flags & VIRTIO_PCI_FLAG_USE_IOEVENTFD) || |
| proxy->ioeventfd_disabled || |
| proxy->ioeventfd_started) { |
| return; |
| } |
| |
| for (n = 0; n < VIRTIO_PCI_QUEUE_MAX; n++) { |
| if (!virtio_queue_get_num(proxy->vdev, n)) { |
| continue; |
| } |
| |
| r = virtio_pci_set_host_notifier_internal(proxy, n, true); |
| if (r < 0) { |
| goto assign_error; |
| } |
| |
| virtio_pci_set_host_notifier_fd_handler(proxy, n, true); |
| } |
| proxy->ioeventfd_started = true; |
| return; |
| |
| assign_error: |
| while (--n >= 0) { |
| if (!virtio_queue_get_num(proxy->vdev, n)) { |
| continue; |
| } |
| |
| virtio_pci_set_host_notifier_fd_handler(proxy, n, false); |
| r = virtio_pci_set_host_notifier_internal(proxy, n, false); |
| assert(r >= 0); |
| } |
| proxy->ioeventfd_started = false; |
| error_report("%s: failed. Fallback to a userspace (slower).", __func__); |
| } |
| |
| static void virtio_pci_stop_ioeventfd(VirtIOPCIProxy *proxy) |
| { |
| int r; |
| int n; |
| |
| if (!proxy->ioeventfd_started) { |
| return; |
| } |
| |
| for (n = 0; n < VIRTIO_PCI_QUEUE_MAX; n++) { |
| if (!virtio_queue_get_num(proxy->vdev, n)) { |
| continue; |
| } |
| |
| virtio_pci_set_host_notifier_fd_handler(proxy, n, false); |
| r = virtio_pci_set_host_notifier_internal(proxy, n, false); |
| assert(r >= 0); |
| } |
| proxy->ioeventfd_started = false; |
| } |
| |
| static void virtio_pci_reset(DeviceState *d) |
| { |
| VirtIOPCIProxy *proxy = container_of(d, VirtIOPCIProxy, pci_dev.qdev); |
| virtio_pci_stop_ioeventfd(proxy); |
| virtio_reset(proxy->vdev); |
| msix_reset(&proxy->pci_dev); |
| proxy->flags &= ~VIRTIO_PCI_FLAG_BUS_MASTER_BUG; |
| } |
| |
| static void virtio_ioport_write(void *opaque, uint32_t addr, uint32_t val) |
| { |
| VirtIOPCIProxy *proxy = opaque; |
| VirtIODevice *vdev = proxy->vdev; |
| target_phys_addr_t pa; |
| |
| switch (addr) { |
| case VIRTIO_PCI_GUEST_FEATURES: |
| /* Guest does not negotiate properly? We have to assume nothing. */ |
| if (val & (1 << VIRTIO_F_BAD_FEATURE)) { |
| if (vdev->bad_features) |
| val = proxy->host_features & vdev->bad_features(vdev); |
| else |
| val = 0; |
| } |
| if (vdev->set_features) |
| vdev->set_features(vdev, val); |
| vdev->guest_features = val; |
| break; |
| case VIRTIO_PCI_QUEUE_PFN: |
| pa = (target_phys_addr_t)val << VIRTIO_PCI_QUEUE_ADDR_SHIFT; |
| if (pa == 0) { |
| virtio_pci_stop_ioeventfd(proxy); |
| virtio_reset(proxy->vdev); |
| msix_unuse_all_vectors(&proxy->pci_dev); |
| } |
| else |
| virtio_queue_set_addr(vdev, vdev->queue_sel, pa); |
| break; |
| case VIRTIO_PCI_QUEUE_SEL: |
| if (val < VIRTIO_PCI_QUEUE_MAX) |
| vdev->queue_sel = val; |
| break; |
| case VIRTIO_PCI_QUEUE_NOTIFY: |
| virtio_queue_notify(vdev, val); |
| break; |
| case VIRTIO_PCI_STATUS: |
| if (!(val & VIRTIO_CONFIG_S_DRIVER_OK)) { |
| virtio_pci_stop_ioeventfd(proxy); |
| } |
| |
| virtio_set_status(vdev, val & 0xFF); |
| |
| if (val & VIRTIO_CONFIG_S_DRIVER_OK) { |
| virtio_pci_start_ioeventfd(proxy); |
| } |
| |
| if (vdev->status == 0) { |
| virtio_reset(proxy->vdev); |
| msix_unuse_all_vectors(&proxy->pci_dev); |
| } |
| |
| /* Linux before 2.6.34 sets the device as OK without enabling |
| the PCI device bus master bit. In this case we need to disable |
| some safety checks. */ |
| if ((val & VIRTIO_CONFIG_S_DRIVER_OK) && |
| !(proxy->pci_dev.config[PCI_COMMAND] & PCI_COMMAND_MASTER)) { |
| proxy->flags |= VIRTIO_PCI_FLAG_BUS_MASTER_BUG; |
| } |
| break; |
| case VIRTIO_MSI_CONFIG_VECTOR: |
| msix_vector_unuse(&proxy->pci_dev, vdev->config_vector); |
| /* Make it possible for guest to discover an error took place. */ |
| if (msix_vector_use(&proxy->pci_dev, val) < 0) |
| val = VIRTIO_NO_VECTOR; |
| vdev->config_vector = val; |
| break; |
| case VIRTIO_MSI_QUEUE_VECTOR: |
| msix_vector_unuse(&proxy->pci_dev, |
| virtio_queue_vector(vdev, vdev->queue_sel)); |
| /* Make it possible for guest to discover an error took place. */ |
| if (msix_vector_use(&proxy->pci_dev, val) < 0) |
| val = VIRTIO_NO_VECTOR; |
| virtio_queue_set_vector(vdev, vdev->queue_sel, val); |
| break; |
| default: |
| error_report("%s: unexpected address 0x%x value 0x%x", |
| __func__, addr, val); |
| break; |
| } |
| } |
| |
| static uint32_t virtio_ioport_read(VirtIOPCIProxy *proxy, uint32_t addr) |
| { |
| VirtIODevice *vdev = proxy->vdev; |
| uint32_t ret = 0xFFFFFFFF; |
| |
| switch (addr) { |
| case VIRTIO_PCI_HOST_FEATURES: |
| ret = proxy->host_features; |
| break; |
| case VIRTIO_PCI_GUEST_FEATURES: |
| ret = vdev->guest_features; |
| break; |
| case VIRTIO_PCI_QUEUE_PFN: |
| ret = virtio_queue_get_addr(vdev, vdev->queue_sel) |
| >> VIRTIO_PCI_QUEUE_ADDR_SHIFT; |
| break; |
| case VIRTIO_PCI_QUEUE_NUM: |
| ret = virtio_queue_get_num(vdev, vdev->queue_sel); |
| break; |
| case VIRTIO_PCI_QUEUE_SEL: |
| ret = vdev->queue_sel; |
| break; |
| case VIRTIO_PCI_STATUS: |
| ret = vdev->status; |
| break; |
| case VIRTIO_PCI_ISR: |
| /* reading from the ISR also clears it. */ |
| ret = vdev->isr; |
| vdev->isr = 0; |
| qemu_set_irq(proxy->pci_dev.irq[0], 0); |
| break; |
| case VIRTIO_MSI_CONFIG_VECTOR: |
| ret = vdev->config_vector; |
| break; |
| case VIRTIO_MSI_QUEUE_VECTOR: |
| ret = virtio_queue_vector(vdev, vdev->queue_sel); |
| break; |
| default: |
| break; |
| } |
| |
| return ret; |
| } |
| |
| static uint32_t virtio_pci_config_readb(void *opaque, uint32_t addr) |
| { |
| VirtIOPCIProxy *proxy = opaque; |
| uint32_t config = VIRTIO_PCI_CONFIG(&proxy->pci_dev); |
| addr -= proxy->addr; |
| if (addr < config) |
| return virtio_ioport_read(proxy, addr); |
| addr -= config; |
| return virtio_config_readb(proxy->vdev, addr); |
| } |
| |
| static uint32_t virtio_pci_config_readw(void *opaque, uint32_t addr) |
| { |
| VirtIOPCIProxy *proxy = opaque; |
| uint32_t config = VIRTIO_PCI_CONFIG(&proxy->pci_dev); |
| addr -= proxy->addr; |
| if (addr < config) |
| return virtio_ioport_read(proxy, addr); |
| addr -= config; |
| return virtio_config_readw(proxy->vdev, addr); |
| } |
| |
| static uint32_t virtio_pci_config_readl(void *opaque, uint32_t addr) |
| { |
| VirtIOPCIProxy *proxy = opaque; |
| uint32_t config = VIRTIO_PCI_CONFIG(&proxy->pci_dev); |
| addr -= proxy->addr; |
| if (addr < config) |
| return virtio_ioport_read(proxy, addr); |
| addr -= config; |
| return virtio_config_readl(proxy->vdev, addr); |
| } |
| |
| static void virtio_pci_config_writeb(void *opaque, uint32_t addr, uint32_t val) |
| { |
| VirtIOPCIProxy *proxy = opaque; |
| uint32_t config = VIRTIO_PCI_CONFIG(&proxy->pci_dev); |
| addr -= proxy->addr; |
| if (addr < config) { |
| virtio_ioport_write(proxy, addr, val); |
| return; |
| } |
| addr -= config; |
| virtio_config_writeb(proxy->vdev, addr, val); |
| } |
| |
| static void virtio_pci_config_writew(void *opaque, uint32_t addr, uint32_t val) |
| { |
| VirtIOPCIProxy *proxy = opaque; |
| uint32_t config = VIRTIO_PCI_CONFIG(&proxy->pci_dev); |
| addr -= proxy->addr; |
| if (addr < config) { |
| virtio_ioport_write(proxy, addr, val); |
| return; |
| } |
| addr -= config; |
| virtio_config_writew(proxy->vdev, addr, val); |
| } |
| |
| static void virtio_pci_config_writel(void *opaque, uint32_t addr, uint32_t val) |
| { |
| VirtIOPCIProxy *proxy = opaque; |
| uint32_t config = VIRTIO_PCI_CONFIG(&proxy->pci_dev); |
| addr -= proxy->addr; |
| if (addr < config) { |
| virtio_ioport_write(proxy, addr, val); |
| return; |
| } |
| addr -= config; |
| virtio_config_writel(proxy->vdev, addr, val); |
| } |
| |
| static void virtio_map(PCIDevice *pci_dev, int region_num, |
| pcibus_t addr, pcibus_t size, int type) |
| { |
| VirtIOPCIProxy *proxy = container_of(pci_dev, VirtIOPCIProxy, pci_dev); |
| VirtIODevice *vdev = proxy->vdev; |
| unsigned config_len = VIRTIO_PCI_REGION_SIZE(pci_dev) + vdev->config_len; |
| |
| proxy->addr = addr; |
| |
| register_ioport_write(addr, config_len, 1, virtio_pci_config_writeb, proxy); |
| register_ioport_write(addr, config_len, 2, virtio_pci_config_writew, proxy); |
| register_ioport_write(addr, config_len, 4, virtio_pci_config_writel, proxy); |
| register_ioport_read(addr, config_len, 1, virtio_pci_config_readb, proxy); |
| register_ioport_read(addr, config_len, 2, virtio_pci_config_readw, proxy); |
| register_ioport_read(addr, config_len, 4, virtio_pci_config_readl, proxy); |
| |
| if (vdev->config_len) |
| vdev->get_config(vdev, vdev->config); |
| } |
| |
| static void virtio_write_config(PCIDevice *pci_dev, uint32_t address, |
| uint32_t val, int len) |
| { |
| VirtIOPCIProxy *proxy = DO_UPCAST(VirtIOPCIProxy, pci_dev, pci_dev); |
| |
| if (PCI_COMMAND == address) { |
| if (!(val & PCI_COMMAND_MASTER)) { |
| if (!(proxy->flags & VIRTIO_PCI_FLAG_BUS_MASTER_BUG)) { |
| virtio_pci_stop_ioeventfd(proxy); |
| virtio_set_status(proxy->vdev, |
| proxy->vdev->status & ~VIRTIO_CONFIG_S_DRIVER_OK); |
| } |
| } |
| } |
| |
| pci_default_write_config(pci_dev, address, val, len); |
| msix_write_config(pci_dev, address, val, len); |
| } |
| |
| static unsigned virtio_pci_get_features(void *opaque) |
| { |
| VirtIOPCIProxy *proxy = opaque; |
| return proxy->host_features; |
| } |
| |
| static void virtio_pci_guest_notifier_read(void *opaque) |
| { |
| VirtQueue *vq = opaque; |
| EventNotifier *n = virtio_queue_get_guest_notifier(vq); |
| if (event_notifier_test_and_clear(n)) { |
| virtio_irq(vq); |
| } |
| } |
| |
| static int virtio_pci_set_guest_notifier(void *opaque, int n, bool assign) |
| { |
| VirtIOPCIProxy *proxy = opaque; |
| VirtQueue *vq = virtio_get_queue(proxy->vdev, n); |
| EventNotifier *notifier = virtio_queue_get_guest_notifier(vq); |
| |
| if (assign) { |
| int r = event_notifier_init(notifier, 0); |
| if (r < 0) { |
| return r; |
| } |
| qemu_set_fd_handler(event_notifier_get_fd(notifier), |
| virtio_pci_guest_notifier_read, NULL, vq); |
| } else { |
| qemu_set_fd_handler(event_notifier_get_fd(notifier), |
| NULL, NULL, NULL); |
| event_notifier_cleanup(notifier); |
| } |
| |
| return 0; |
| } |
| |
| static bool virtio_pci_query_guest_notifiers(void *opaque) |
| { |
| VirtIOPCIProxy *proxy = opaque; |
| return msix_enabled(&proxy->pci_dev); |
| } |
| |
| static int virtio_pci_set_guest_notifiers(void *opaque, bool assign) |
| { |
| VirtIOPCIProxy *proxy = opaque; |
| VirtIODevice *vdev = proxy->vdev; |
| int r, n; |
| |
| for (n = 0; n < VIRTIO_PCI_QUEUE_MAX; n++) { |
| if (!virtio_queue_get_num(vdev, n)) { |
| break; |
| } |
| |
| r = virtio_pci_set_guest_notifier(opaque, n, assign); |
| if (r < 0) { |
| goto assign_error; |
| } |
| } |
| |
| return 0; |
| |
| assign_error: |
| /* We get here on assignment failure. Recover by undoing for VQs 0 .. n. */ |
| while (--n >= 0) { |
| virtio_pci_set_guest_notifier(opaque, n, !assign); |
| } |
| return r; |
| } |
| |
| static int virtio_pci_set_host_notifier(void *opaque, int n, bool assign) |
| { |
| VirtIOPCIProxy *proxy = opaque; |
| |
| /* Stop using ioeventfd for virtqueue kick if the device starts using host |
| * notifiers. This makes it easy to avoid stepping on each others' toes. |
| */ |
| proxy->ioeventfd_disabled = assign; |
| if (assign) { |
| virtio_pci_stop_ioeventfd(proxy); |
| } |
| /* We don't need to start here: it's not needed because backend |
| * currently only stops on status change away from ok, |
| * reset, vmstop and such. If we do add code to start here, |
| * need to check vmstate, device state etc. */ |
| return virtio_pci_set_host_notifier_internal(proxy, n, assign); |
| } |
| |
| static void virtio_pci_vmstate_change(void *opaque, bool running) |
| { |
| VirtIOPCIProxy *proxy = opaque; |
| |
| if (running) { |
| virtio_pci_start_ioeventfd(proxy); |
| } else { |
| virtio_pci_stop_ioeventfd(proxy); |
| } |
| } |
| |
| static const VirtIOBindings virtio_pci_bindings = { |
| .notify = virtio_pci_notify, |
| .save_config = virtio_pci_save_config, |
| .load_config = virtio_pci_load_config, |
| .save_queue = virtio_pci_save_queue, |
| .load_queue = virtio_pci_load_queue, |
| .get_features = virtio_pci_get_features, |
| .query_guest_notifiers = virtio_pci_query_guest_notifiers, |
| .set_host_notifier = virtio_pci_set_host_notifier, |
| .set_guest_notifiers = virtio_pci_set_guest_notifiers, |
| .vmstate_change = virtio_pci_vmstate_change, |
| }; |
| |
| static void virtio_init_pci(VirtIOPCIProxy *proxy, VirtIODevice *vdev, |
| uint16_t vendor, uint16_t device, |
| uint16_t class_code, uint8_t pif) |
| { |
| uint8_t *config; |
| uint32_t size; |
| |
| proxy->vdev = vdev; |
| |
| config = proxy->pci_dev.config; |
| pci_config_set_vendor_id(config, vendor); |
| pci_config_set_device_id(config, device); |
| |
| config[0x08] = VIRTIO_PCI_ABI_VERSION; |
| |
| config[0x09] = pif; |
| pci_config_set_class(config, class_code); |
| |
| config[0x2c] = vendor & 0xFF; |
| config[0x2d] = (vendor >> 8) & 0xFF; |
| config[0x2e] = vdev->device_id & 0xFF; |
| config[0x2f] = (vdev->device_id >> 8) & 0xFF; |
| |
| config[0x3d] = 1; |
| |
| if (vdev->nvectors && !msix_init(&proxy->pci_dev, vdev->nvectors, 1, 0)) { |
| pci_register_bar(&proxy->pci_dev, 1, |
| msix_bar_size(&proxy->pci_dev), |
| PCI_BASE_ADDRESS_SPACE_MEMORY, |
| msix_mmio_map); |
| } else |
| vdev->nvectors = 0; |
| |
| proxy->pci_dev.config_write = virtio_write_config; |
| |
| size = VIRTIO_PCI_REGION_SIZE(&proxy->pci_dev) + vdev->config_len; |
| if (size & (size-1)) |
| size = 1 << qemu_fls(size); |
| |
| pci_register_bar(&proxy->pci_dev, 0, size, PCI_BASE_ADDRESS_SPACE_IO, |
| virtio_map); |
| |
| if (!kvm_has_many_ioeventfds()) { |
| proxy->flags &= ~VIRTIO_PCI_FLAG_USE_IOEVENTFD; |
| } |
| |
| virtio_bind_device(vdev, &virtio_pci_bindings, proxy); |
| proxy->host_features |= 0x1 << VIRTIO_F_NOTIFY_ON_EMPTY; |
| proxy->host_features |= 0x1 << VIRTIO_F_BAD_FEATURE; |
| proxy->host_features = vdev->get_features(vdev, proxy->host_features); |
| } |
| |
| static int virtio_blk_init_pci(PCIDevice *pci_dev) |
| { |
| VirtIOPCIProxy *proxy = DO_UPCAST(VirtIOPCIProxy, pci_dev, pci_dev); |
| VirtIODevice *vdev; |
| |
| if (proxy->class_code != PCI_CLASS_STORAGE_SCSI && |
| proxy->class_code != PCI_CLASS_STORAGE_OTHER) |
| proxy->class_code = PCI_CLASS_STORAGE_SCSI; |
| |
| vdev = virtio_blk_init(&pci_dev->qdev, &proxy->block); |
| if (!vdev) { |
| return -1; |
| } |
| vdev->nvectors = proxy->nvectors; |
| virtio_init_pci(proxy, vdev, |
| PCI_VENDOR_ID_REDHAT_QUMRANET, |
| PCI_DEVICE_ID_VIRTIO_BLOCK, |
| proxy->class_code, 0x00); |
| /* make the actual value visible */ |
| proxy->nvectors = vdev->nvectors; |
| return 0; |
| } |
| |
| static int virtio_exit_pci(PCIDevice *pci_dev) |
| { |
| return msix_uninit(pci_dev); |
| } |
| |
| static int virtio_blk_exit_pci(PCIDevice *pci_dev) |
| { |
| VirtIOPCIProxy *proxy = DO_UPCAST(VirtIOPCIProxy, pci_dev, pci_dev); |
| |
| virtio_pci_stop_ioeventfd(proxy); |
| virtio_blk_exit(proxy->vdev); |
| blockdev_mark_auto_del(proxy->block.bs); |
| return virtio_exit_pci(pci_dev); |
| } |
| |
| static int virtio_serial_init_pci(PCIDevice *pci_dev) |
| { |
| VirtIOPCIProxy *proxy = DO_UPCAST(VirtIOPCIProxy, pci_dev, pci_dev); |
| VirtIODevice *vdev; |
| |
| if (proxy->class_code != PCI_CLASS_COMMUNICATION_OTHER && |
| proxy->class_code != PCI_CLASS_DISPLAY_OTHER && /* qemu 0.10 */ |
| proxy->class_code != PCI_CLASS_OTHERS) /* qemu-kvm */ |
| proxy->class_code = PCI_CLASS_COMMUNICATION_OTHER; |
| |
| vdev = virtio_serial_init(&pci_dev->qdev, proxy->max_virtserial_ports); |
| if (!vdev) { |
| return -1; |
| } |
| vdev->nvectors = proxy->nvectors == DEV_NVECTORS_UNSPECIFIED |
| ? proxy->max_virtserial_ports + 1 |
| : proxy->nvectors; |
| virtio_init_pci(proxy, vdev, |
| PCI_VENDOR_ID_REDHAT_QUMRANET, |
| PCI_DEVICE_ID_VIRTIO_CONSOLE, |
| proxy->class_code, 0x00); |
| proxy->nvectors = vdev->nvectors; |
| return 0; |
| } |
| |
| static int virtio_serial_exit_pci(PCIDevice *pci_dev) |
| { |
| VirtIOPCIProxy *proxy = DO_UPCAST(VirtIOPCIProxy, pci_dev, pci_dev); |
| |
| virtio_serial_exit(proxy->vdev); |
| return virtio_exit_pci(pci_dev); |
| } |
| |
| static int virtio_net_init_pci(PCIDevice *pci_dev) |
| { |
| VirtIOPCIProxy *proxy = DO_UPCAST(VirtIOPCIProxy, pci_dev, pci_dev); |
| VirtIODevice *vdev; |
| |
| vdev = virtio_net_init(&pci_dev->qdev, &proxy->nic, &proxy->net); |
| |
| vdev->nvectors = proxy->nvectors; |
| virtio_init_pci(proxy, vdev, |
| PCI_VENDOR_ID_REDHAT_QUMRANET, |
| PCI_DEVICE_ID_VIRTIO_NET, |
| PCI_CLASS_NETWORK_ETHERNET, |
| 0x00); |
| |
| /* make the actual value visible */ |
| proxy->nvectors = vdev->nvectors; |
| return 0; |
| } |
| |
| static int virtio_net_exit_pci(PCIDevice *pci_dev) |
| { |
| VirtIOPCIProxy *proxy = DO_UPCAST(VirtIOPCIProxy, pci_dev, pci_dev); |
| |
| virtio_pci_stop_ioeventfd(proxy); |
| virtio_net_exit(proxy->vdev); |
| return virtio_exit_pci(pci_dev); |
| } |
| |
| static int virtio_balloon_init_pci(PCIDevice *pci_dev) |
| { |
| VirtIOPCIProxy *proxy = DO_UPCAST(VirtIOPCIProxy, pci_dev, pci_dev); |
| VirtIODevice *vdev; |
| |
| vdev = virtio_balloon_init(&pci_dev->qdev); |
| virtio_init_pci(proxy, vdev, |
| PCI_VENDOR_ID_REDHAT_QUMRANET, |
| PCI_DEVICE_ID_VIRTIO_BALLOON, |
| PCI_CLASS_MEMORY_RAM, |
| 0x00); |
| return 0; |
| } |
| |
| #ifdef CONFIG_VIRTFS |
| static int virtio_9p_init_pci(PCIDevice *pci_dev) |
| { |
| VirtIOPCIProxy *proxy = DO_UPCAST(VirtIOPCIProxy, pci_dev, pci_dev); |
| VirtIODevice *vdev; |
| |
| vdev = virtio_9p_init(&pci_dev->qdev, &proxy->fsconf); |
| vdev->nvectors = proxy->nvectors; |
| virtio_init_pci(proxy, vdev, |
| PCI_VENDOR_ID_REDHAT_QUMRANET, |
| 0x1009, |
| 0x2, |
| 0x00); |
| /* make the actual value visible */ |
| proxy->nvectors = vdev->nvectors; |
| return 0; |
| } |
| #endif |
| |
| static PCIDeviceInfo virtio_info[] = { |
| { |
| .qdev.name = "virtio-blk-pci", |
| .qdev.alias = "virtio-blk", |
| .qdev.size = sizeof(VirtIOPCIProxy), |
| .init = virtio_blk_init_pci, |
| .exit = virtio_blk_exit_pci, |
| .qdev.props = (Property[]) { |
| DEFINE_PROP_HEX32("class", VirtIOPCIProxy, class_code, 0), |
| DEFINE_BLOCK_PROPERTIES(VirtIOPCIProxy, block), |
| DEFINE_PROP_BIT("ioeventfd", VirtIOPCIProxy, flags, |
| VIRTIO_PCI_FLAG_USE_IOEVENTFD_BIT, true), |
| DEFINE_PROP_UINT32("vectors", VirtIOPCIProxy, nvectors, 2), |
| DEFINE_VIRTIO_BLK_FEATURES(VirtIOPCIProxy, host_features), |
| DEFINE_PROP_END_OF_LIST(), |
| }, |
| .qdev.reset = virtio_pci_reset, |
| },{ |
| .qdev.name = "virtio-net-pci", |
| .qdev.size = sizeof(VirtIOPCIProxy), |
| .init = virtio_net_init_pci, |
| .exit = virtio_net_exit_pci, |
| .romfile = "pxe-virtio.bin", |
| .qdev.props = (Property[]) { |
| DEFINE_PROP_BIT("ioeventfd", VirtIOPCIProxy, flags, |
| VIRTIO_PCI_FLAG_USE_IOEVENTFD_BIT, false), |
| DEFINE_PROP_UINT32("vectors", VirtIOPCIProxy, nvectors, 3), |
| DEFINE_VIRTIO_NET_FEATURES(VirtIOPCIProxy, host_features), |
| DEFINE_NIC_PROPERTIES(VirtIOPCIProxy, nic), |
| DEFINE_PROP_UINT32("x-txtimer", VirtIOPCIProxy, |
| net.txtimer, TX_TIMER_INTERVAL), |
| DEFINE_PROP_INT32("x-txburst", VirtIOPCIProxy, |
| net.txburst, TX_BURST), |
| DEFINE_PROP_STRING("tx", VirtIOPCIProxy, net.tx), |
| DEFINE_PROP_END_OF_LIST(), |
| }, |
| .qdev.reset = virtio_pci_reset, |
| },{ |
| .qdev.name = "virtio-serial-pci", |
| .qdev.alias = "virtio-serial", |
| .qdev.size = sizeof(VirtIOPCIProxy), |
| .init = virtio_serial_init_pci, |
| .exit = virtio_serial_exit_pci, |
| .qdev.props = (Property[]) { |
| DEFINE_PROP_UINT32("vectors", VirtIOPCIProxy, nvectors, |
| DEV_NVECTORS_UNSPECIFIED), |
| DEFINE_PROP_HEX32("class", VirtIOPCIProxy, class_code, 0), |
| DEFINE_VIRTIO_COMMON_FEATURES(VirtIOPCIProxy, host_features), |
| DEFINE_PROP_UINT32("max_ports", VirtIOPCIProxy, max_virtserial_ports, |
| 31), |
| DEFINE_PROP_END_OF_LIST(), |
| }, |
| .qdev.reset = virtio_pci_reset, |
| },{ |
| .qdev.name = "virtio-balloon-pci", |
| .qdev.size = sizeof(VirtIOPCIProxy), |
| .init = virtio_balloon_init_pci, |
| .exit = virtio_exit_pci, |
| .qdev.props = (Property[]) { |
| DEFINE_VIRTIO_COMMON_FEATURES(VirtIOPCIProxy, host_features), |
| DEFINE_PROP_END_OF_LIST(), |
| }, |
| .qdev.reset = virtio_pci_reset, |
| },{ |
| #ifdef CONFIG_VIRTFS |
| .qdev.name = "virtio-9p-pci", |
| .qdev.size = sizeof(VirtIOPCIProxy), |
| .init = virtio_9p_init_pci, |
| .qdev.props = (Property[]) { |
| DEFINE_PROP_UINT32("vectors", VirtIOPCIProxy, nvectors, 2), |
| DEFINE_VIRTIO_COMMON_FEATURES(VirtIOPCIProxy, host_features), |
| DEFINE_PROP_STRING("mount_tag", VirtIOPCIProxy, fsconf.tag), |
| DEFINE_PROP_STRING("fsdev", VirtIOPCIProxy, fsconf.fsdev_id), |
| DEFINE_PROP_END_OF_LIST(), |
| }, |
| }, { |
| #endif |
| /* end of list */ |
| } |
| }; |
| |
| static void virtio_pci_register_devices(void) |
| { |
| pci_qdev_register_many(virtio_info); |
| } |
| |
| device_init(virtio_pci_register_devices) |