virtio: allow broken device to notify guest
[qemu/kevin.git] / hw / virtio / virtio.c
blob890b4d7eb7518f5db44782c140012f925b0862a6
1 /*
2 * Virtio Support
4 * Copyright IBM, Corp. 2007
6 * Authors:
7 * Anthony Liguori <aliguori@us.ibm.com>
9 * This work is licensed under the terms of the GNU GPL, version 2. See
10 * the COPYING file in the top-level directory.
14 #include "qemu/osdep.h"
15 #include "qapi/error.h"
16 #include "qemu-common.h"
17 #include "cpu.h"
18 #include "trace.h"
19 #include "exec/address-spaces.h"
20 #include "qemu/error-report.h"
21 #include "hw/virtio/virtio.h"
22 #include "qemu/atomic.h"
23 #include "hw/virtio/virtio-bus.h"
24 #include "migration/migration.h"
25 #include "hw/virtio/virtio-access.h"
26 #include "sysemu/dma.h"
29 * The alignment to use between consumer and producer parts of vring.
30 * x86 pagesize again. This is the default, used by transports like PCI
31 * which don't provide a means for the guest to tell the host the alignment.
33 #define VIRTIO_PCI_VRING_ALIGN 4096
35 typedef struct VRingDesc
37 uint64_t addr;
38 uint32_t len;
39 uint16_t flags;
40 uint16_t next;
41 } VRingDesc;
43 typedef struct VRingAvail
45 uint16_t flags;
46 uint16_t idx;
47 uint16_t ring[0];
48 } VRingAvail;
50 typedef struct VRingUsedElem
52 uint32_t id;
53 uint32_t len;
54 } VRingUsedElem;
56 typedef struct VRingUsed
58 uint16_t flags;
59 uint16_t idx;
60 VRingUsedElem ring[0];
61 } VRingUsed;
63 typedef struct VRingMemoryRegionCaches {
64 struct rcu_head rcu;
65 MemoryRegionCache desc;
66 MemoryRegionCache avail;
67 MemoryRegionCache used;
68 } VRingMemoryRegionCaches;
70 typedef struct VRing
72 unsigned int num;
73 unsigned int num_default;
74 unsigned int align;
75 hwaddr desc;
76 hwaddr avail;
77 hwaddr used;
78 VRingMemoryRegionCaches *caches;
79 } VRing;
81 struct VirtQueue
83 VRing vring;
85 /* Next head to pop */
86 uint16_t last_avail_idx;
88 /* Last avail_idx read from VQ. */
89 uint16_t shadow_avail_idx;
91 uint16_t used_idx;
93 /* Last used index value we have signalled on */
94 uint16_t signalled_used;
96 /* Last used index value we have signalled on */
97 bool signalled_used_valid;
99 /* Notification enabled? */
100 bool notification;
102 uint16_t queue_index;
104 unsigned int inuse;
106 uint16_t vector;
107 VirtIOHandleOutput handle_output;
108 VirtIOHandleAIOOutput handle_aio_output;
109 VirtIODevice *vdev;
110 EventNotifier guest_notifier;
111 EventNotifier host_notifier;
112 QLIST_ENTRY(VirtQueue) node;
115 static void virtio_free_region_cache(VRingMemoryRegionCaches *caches)
117 if (!caches) {
118 return;
121 address_space_cache_destroy(&caches->desc);
122 address_space_cache_destroy(&caches->avail);
123 address_space_cache_destroy(&caches->used);
124 g_free(caches);
127 static void virtio_init_region_cache(VirtIODevice *vdev, int n)
129 VirtQueue *vq = &vdev->vq[n];
130 VRingMemoryRegionCaches *old = vq->vring.caches;
131 VRingMemoryRegionCaches *new;
132 hwaddr addr, size;
133 int event_size;
134 int64_t len;
136 event_size = virtio_vdev_has_feature(vq->vdev, VIRTIO_RING_F_EVENT_IDX) ? 2 : 0;
138 addr = vq->vring.desc;
139 if (!addr) {
140 return;
142 new = g_new0(VRingMemoryRegionCaches, 1);
143 size = virtio_queue_get_desc_size(vdev, n);
144 len = address_space_cache_init(&new->desc, vdev->dma_as,
145 addr, size, false);
146 if (len < size) {
147 virtio_error(vdev, "Cannot map desc");
148 goto err_desc;
151 size = virtio_queue_get_used_size(vdev, n) + event_size;
152 len = address_space_cache_init(&new->used, vdev->dma_as,
153 vq->vring.used, size, true);
154 if (len < size) {
155 virtio_error(vdev, "Cannot map used");
156 goto err_used;
159 size = virtio_queue_get_avail_size(vdev, n) + event_size;
160 len = address_space_cache_init(&new->avail, vdev->dma_as,
161 vq->vring.avail, size, false);
162 if (len < size) {
163 virtio_error(vdev, "Cannot map avail");
164 goto err_avail;
167 atomic_rcu_set(&vq->vring.caches, new);
168 if (old) {
169 call_rcu(old, virtio_free_region_cache, rcu);
171 return;
173 err_avail:
174 address_space_cache_destroy(&new->used);
175 err_used:
176 address_space_cache_destroy(&new->desc);
177 err_desc:
178 g_free(new);
181 /* virt queue functions */
182 void virtio_queue_update_rings(VirtIODevice *vdev, int n)
184 VRing *vring = &vdev->vq[n].vring;
186 if (!vring->desc) {
187 /* not yet setup -> nothing to do */
188 return;
190 vring->avail = vring->desc + vring->num * sizeof(VRingDesc);
191 vring->used = vring_align(vring->avail +
192 offsetof(VRingAvail, ring[vring->num]),
193 vring->align);
194 virtio_init_region_cache(vdev, n);
197 /* Called within rcu_read_lock(). */
198 static void vring_desc_read(VirtIODevice *vdev, VRingDesc *desc,
199 MemoryRegionCache *cache, int i)
201 address_space_read_cached(cache, i * sizeof(VRingDesc),
202 desc, sizeof(VRingDesc));
203 virtio_tswap64s(vdev, &desc->addr);
204 virtio_tswap32s(vdev, &desc->len);
205 virtio_tswap16s(vdev, &desc->flags);
206 virtio_tswap16s(vdev, &desc->next);
209 static VRingMemoryRegionCaches *vring_get_region_caches(struct VirtQueue *vq)
211 VRingMemoryRegionCaches *caches = atomic_rcu_read(&vq->vring.caches);
212 assert(caches != NULL);
213 return caches;
215 /* Called within rcu_read_lock(). */
216 static inline uint16_t vring_avail_flags(VirtQueue *vq)
218 VRingMemoryRegionCaches *caches = vring_get_region_caches(vq);
219 hwaddr pa = offsetof(VRingAvail, flags);
220 return virtio_lduw_phys_cached(vq->vdev, &caches->avail, pa);
223 /* Called within rcu_read_lock(). */
224 static inline uint16_t vring_avail_idx(VirtQueue *vq)
226 VRingMemoryRegionCaches *caches = vring_get_region_caches(vq);
227 hwaddr pa = offsetof(VRingAvail, idx);
228 vq->shadow_avail_idx = virtio_lduw_phys_cached(vq->vdev, &caches->avail, pa);
229 return vq->shadow_avail_idx;
232 /* Called within rcu_read_lock(). */
233 static inline uint16_t vring_avail_ring(VirtQueue *vq, int i)
235 VRingMemoryRegionCaches *caches = vring_get_region_caches(vq);
236 hwaddr pa = offsetof(VRingAvail, ring[i]);
237 return virtio_lduw_phys_cached(vq->vdev, &caches->avail, pa);
240 /* Called within rcu_read_lock(). */
241 static inline uint16_t vring_get_used_event(VirtQueue *vq)
243 return vring_avail_ring(vq, vq->vring.num);
246 /* Called within rcu_read_lock(). */
247 static inline void vring_used_write(VirtQueue *vq, VRingUsedElem *uelem,
248 int i)
250 VRingMemoryRegionCaches *caches = vring_get_region_caches(vq);
251 hwaddr pa = offsetof(VRingUsed, ring[i]);
252 virtio_tswap32s(vq->vdev, &uelem->id);
253 virtio_tswap32s(vq->vdev, &uelem->len);
254 address_space_write_cached(&caches->used, pa, uelem, sizeof(VRingUsedElem));
255 address_space_cache_invalidate(&caches->used, pa, sizeof(VRingUsedElem));
258 /* Called within rcu_read_lock(). */
259 static uint16_t vring_used_idx(VirtQueue *vq)
261 VRingMemoryRegionCaches *caches = vring_get_region_caches(vq);
262 hwaddr pa = offsetof(VRingUsed, idx);
263 return virtio_lduw_phys_cached(vq->vdev, &caches->used, pa);
266 /* Called within rcu_read_lock(). */
267 static inline void vring_used_idx_set(VirtQueue *vq, uint16_t val)
269 VRingMemoryRegionCaches *caches = vring_get_region_caches(vq);
270 hwaddr pa = offsetof(VRingUsed, idx);
271 virtio_stw_phys_cached(vq->vdev, &caches->used, pa, val);
272 address_space_cache_invalidate(&caches->used, pa, sizeof(val));
273 vq->used_idx = val;
276 /* Called within rcu_read_lock(). */
277 static inline void vring_used_flags_set_bit(VirtQueue *vq, int mask)
279 VRingMemoryRegionCaches *caches = vring_get_region_caches(vq);
280 VirtIODevice *vdev = vq->vdev;
281 hwaddr pa = offsetof(VRingUsed, flags);
282 uint16_t flags = virtio_lduw_phys_cached(vq->vdev, &caches->used, pa);
284 virtio_stw_phys_cached(vdev, &caches->used, pa, flags | mask);
285 address_space_cache_invalidate(&caches->used, pa, sizeof(flags));
288 /* Called within rcu_read_lock(). */
289 static inline void vring_used_flags_unset_bit(VirtQueue *vq, int mask)
291 VRingMemoryRegionCaches *caches = vring_get_region_caches(vq);
292 VirtIODevice *vdev = vq->vdev;
293 hwaddr pa = offsetof(VRingUsed, flags);
294 uint16_t flags = virtio_lduw_phys_cached(vq->vdev, &caches->used, pa);
296 virtio_stw_phys_cached(vdev, &caches->used, pa, flags & ~mask);
297 address_space_cache_invalidate(&caches->used, pa, sizeof(flags));
300 /* Called within rcu_read_lock(). */
301 static inline void vring_set_avail_event(VirtQueue *vq, uint16_t val)
303 VRingMemoryRegionCaches *caches;
304 hwaddr pa;
305 if (!vq->notification) {
306 return;
309 caches = vring_get_region_caches(vq);
310 pa = offsetof(VRingUsed, ring[vq->vring.num]);
311 virtio_stw_phys_cached(vq->vdev, &caches->used, pa, val);
312 address_space_cache_invalidate(&caches->used, pa, sizeof(val));
315 void virtio_queue_set_notification(VirtQueue *vq, int enable)
317 vq->notification = enable;
319 if (!vq->vring.desc) {
320 return;
323 rcu_read_lock();
324 if (virtio_vdev_has_feature(vq->vdev, VIRTIO_RING_F_EVENT_IDX)) {
325 vring_set_avail_event(vq, vring_avail_idx(vq));
326 } else if (enable) {
327 vring_used_flags_unset_bit(vq, VRING_USED_F_NO_NOTIFY);
328 } else {
329 vring_used_flags_set_bit(vq, VRING_USED_F_NO_NOTIFY);
331 if (enable) {
332 /* Expose avail event/used flags before caller checks the avail idx. */
333 smp_mb();
335 rcu_read_unlock();
338 int virtio_queue_ready(VirtQueue *vq)
340 return vq->vring.avail != 0;
343 /* Fetch avail_idx from VQ memory only when we really need to know if
344 * guest has added some buffers.
345 * Called within rcu_read_lock(). */
346 static int virtio_queue_empty_rcu(VirtQueue *vq)
348 if (unlikely(!vq->vring.avail)) {
349 return 1;
352 if (vq->shadow_avail_idx != vq->last_avail_idx) {
353 return 0;
356 return vring_avail_idx(vq) == vq->last_avail_idx;
359 int virtio_queue_empty(VirtQueue *vq)
361 bool empty;
363 if (unlikely(!vq->vring.avail)) {
364 return 1;
367 if (vq->shadow_avail_idx != vq->last_avail_idx) {
368 return 0;
371 rcu_read_lock();
372 empty = vring_avail_idx(vq) == vq->last_avail_idx;
373 rcu_read_unlock();
374 return empty;
377 static void virtqueue_unmap_sg(VirtQueue *vq, const VirtQueueElement *elem,
378 unsigned int len)
380 AddressSpace *dma_as = vq->vdev->dma_as;
381 unsigned int offset;
382 int i;
384 offset = 0;
385 for (i = 0; i < elem->in_num; i++) {
386 size_t size = MIN(len - offset, elem->in_sg[i].iov_len);
388 dma_memory_unmap(dma_as, elem->in_sg[i].iov_base,
389 elem->in_sg[i].iov_len,
390 DMA_DIRECTION_FROM_DEVICE, size);
392 offset += size;
395 for (i = 0; i < elem->out_num; i++)
396 dma_memory_unmap(dma_as, elem->out_sg[i].iov_base,
397 elem->out_sg[i].iov_len,
398 DMA_DIRECTION_TO_DEVICE,
399 elem->out_sg[i].iov_len);
402 /* virtqueue_detach_element:
403 * @vq: The #VirtQueue
404 * @elem: The #VirtQueueElement
405 * @len: number of bytes written
407 * Detach the element from the virtqueue. This function is suitable for device
408 * reset or other situations where a #VirtQueueElement is simply freed and will
409 * not be pushed or discarded.
411 void virtqueue_detach_element(VirtQueue *vq, const VirtQueueElement *elem,
412 unsigned int len)
414 vq->inuse--;
415 virtqueue_unmap_sg(vq, elem, len);
418 /* virtqueue_unpop:
419 * @vq: The #VirtQueue
420 * @elem: The #VirtQueueElement
421 * @len: number of bytes written
423 * Pretend the most recent element wasn't popped from the virtqueue. The next
424 * call to virtqueue_pop() will refetch the element.
426 void virtqueue_unpop(VirtQueue *vq, const VirtQueueElement *elem,
427 unsigned int len)
429 vq->last_avail_idx--;
430 virtqueue_detach_element(vq, elem, len);
433 /* virtqueue_rewind:
434 * @vq: The #VirtQueue
435 * @num: Number of elements to push back
437 * Pretend that elements weren't popped from the virtqueue. The next
438 * virtqueue_pop() will refetch the oldest element.
440 * Use virtqueue_unpop() instead if you have a VirtQueueElement.
442 * Returns: true on success, false if @num is greater than the number of in use
443 * elements.
445 bool virtqueue_rewind(VirtQueue *vq, unsigned int num)
447 if (num > vq->inuse) {
448 return false;
450 vq->last_avail_idx -= num;
451 vq->inuse -= num;
452 return true;
455 /* Called within rcu_read_lock(). */
456 void virtqueue_fill(VirtQueue *vq, const VirtQueueElement *elem,
457 unsigned int len, unsigned int idx)
459 VRingUsedElem uelem;
461 trace_virtqueue_fill(vq, elem, len, idx);
463 virtqueue_unmap_sg(vq, elem, len);
465 if (unlikely(vq->vdev->broken)) {
466 return;
469 if (unlikely(!vq->vring.used)) {
470 return;
473 idx = (idx + vq->used_idx) % vq->vring.num;
475 uelem.id = elem->index;
476 uelem.len = len;
477 vring_used_write(vq, &uelem, idx);
480 /* Called within rcu_read_lock(). */
481 void virtqueue_flush(VirtQueue *vq, unsigned int count)
483 uint16_t old, new;
485 if (unlikely(vq->vdev->broken)) {
486 vq->inuse -= count;
487 return;
490 if (unlikely(!vq->vring.used)) {
491 return;
494 /* Make sure buffer is written before we update index. */
495 smp_wmb();
496 trace_virtqueue_flush(vq, count);
497 old = vq->used_idx;
498 new = old + count;
499 vring_used_idx_set(vq, new);
500 vq->inuse -= count;
501 if (unlikely((int16_t)(new - vq->signalled_used) < (uint16_t)(new - old)))
502 vq->signalled_used_valid = false;
505 void virtqueue_push(VirtQueue *vq, const VirtQueueElement *elem,
506 unsigned int len)
508 rcu_read_lock();
509 virtqueue_fill(vq, elem, len, 0);
510 virtqueue_flush(vq, 1);
511 rcu_read_unlock();
514 /* Called within rcu_read_lock(). */
515 static int virtqueue_num_heads(VirtQueue *vq, unsigned int idx)
517 uint16_t num_heads = vring_avail_idx(vq) - idx;
519 /* Check it isn't doing very strange things with descriptor numbers. */
520 if (num_heads > vq->vring.num) {
521 virtio_error(vq->vdev, "Guest moved used index from %u to %u",
522 idx, vq->shadow_avail_idx);
523 return -EINVAL;
525 /* On success, callers read a descriptor at vq->last_avail_idx.
526 * Make sure descriptor read does not bypass avail index read. */
527 if (num_heads) {
528 smp_rmb();
531 return num_heads;
534 /* Called within rcu_read_lock(). */
535 static bool virtqueue_get_head(VirtQueue *vq, unsigned int idx,
536 unsigned int *head)
538 /* Grab the next descriptor number they're advertising, and increment
539 * the index we've seen. */
540 *head = vring_avail_ring(vq, idx % vq->vring.num);
542 /* If their number is silly, that's a fatal mistake. */
543 if (*head >= vq->vring.num) {
544 virtio_error(vq->vdev, "Guest says index %u is available", *head);
545 return false;
548 return true;
551 enum {
552 VIRTQUEUE_READ_DESC_ERROR = -1,
553 VIRTQUEUE_READ_DESC_DONE = 0, /* end of chain */
554 VIRTQUEUE_READ_DESC_MORE = 1, /* more buffers in chain */
557 static int virtqueue_read_next_desc(VirtIODevice *vdev, VRingDesc *desc,
558 MemoryRegionCache *desc_cache, unsigned int max,
559 unsigned int *next)
561 /* If this descriptor says it doesn't chain, we're done. */
562 if (!(desc->flags & VRING_DESC_F_NEXT)) {
563 return VIRTQUEUE_READ_DESC_DONE;
566 /* Check they're not leading us off end of descriptors. */
567 *next = desc->next;
568 /* Make sure compiler knows to grab that: we don't want it changing! */
569 smp_wmb();
571 if (*next >= max) {
572 virtio_error(vdev, "Desc next is %u", *next);
573 return VIRTQUEUE_READ_DESC_ERROR;
576 vring_desc_read(vdev, desc, desc_cache, *next);
577 return VIRTQUEUE_READ_DESC_MORE;
580 void virtqueue_get_avail_bytes(VirtQueue *vq, unsigned int *in_bytes,
581 unsigned int *out_bytes,
582 unsigned max_in_bytes, unsigned max_out_bytes)
584 VirtIODevice *vdev = vq->vdev;
585 unsigned int max, idx;
586 unsigned int total_bufs, in_total, out_total;
587 VRingMemoryRegionCaches *caches;
588 MemoryRegionCache indirect_desc_cache = MEMORY_REGION_CACHE_INVALID;
589 int64_t len = 0;
590 int rc;
592 if (unlikely(!vq->vring.desc)) {
593 if (in_bytes) {
594 *in_bytes = 0;
596 if (out_bytes) {
597 *out_bytes = 0;
599 return;
602 rcu_read_lock();
603 idx = vq->last_avail_idx;
604 total_bufs = in_total = out_total = 0;
606 max = vq->vring.num;
607 caches = vring_get_region_caches(vq);
608 if (caches->desc.len < max * sizeof(VRingDesc)) {
609 virtio_error(vdev, "Cannot map descriptor ring");
610 goto err;
613 while ((rc = virtqueue_num_heads(vq, idx)) > 0) {
614 MemoryRegionCache *desc_cache = &caches->desc;
615 unsigned int num_bufs;
616 VRingDesc desc;
617 unsigned int i;
619 num_bufs = total_bufs;
621 if (!virtqueue_get_head(vq, idx++, &i)) {
622 goto err;
625 vring_desc_read(vdev, &desc, desc_cache, i);
627 if (desc.flags & VRING_DESC_F_INDIRECT) {
628 if (desc.len % sizeof(VRingDesc)) {
629 virtio_error(vdev, "Invalid size for indirect buffer table");
630 goto err;
633 /* If we've got too many, that implies a descriptor loop. */
634 if (num_bufs >= max) {
635 virtio_error(vdev, "Looped descriptor");
636 goto err;
639 /* loop over the indirect descriptor table */
640 len = address_space_cache_init(&indirect_desc_cache,
641 vdev->dma_as,
642 desc.addr, desc.len, false);
643 desc_cache = &indirect_desc_cache;
644 if (len < desc.len) {
645 virtio_error(vdev, "Cannot map indirect buffer");
646 goto err;
649 max = desc.len / sizeof(VRingDesc);
650 num_bufs = i = 0;
651 vring_desc_read(vdev, &desc, desc_cache, i);
654 do {
655 /* If we've got too many, that implies a descriptor loop. */
656 if (++num_bufs > max) {
657 virtio_error(vdev, "Looped descriptor");
658 goto err;
661 if (desc.flags & VRING_DESC_F_WRITE) {
662 in_total += desc.len;
663 } else {
664 out_total += desc.len;
666 if (in_total >= max_in_bytes && out_total >= max_out_bytes) {
667 goto done;
670 rc = virtqueue_read_next_desc(vdev, &desc, desc_cache, max, &i);
671 } while (rc == VIRTQUEUE_READ_DESC_MORE);
673 if (rc == VIRTQUEUE_READ_DESC_ERROR) {
674 goto err;
677 if (desc_cache == &indirect_desc_cache) {
678 address_space_cache_destroy(&indirect_desc_cache);
679 total_bufs++;
680 } else {
681 total_bufs = num_bufs;
685 if (rc < 0) {
686 goto err;
689 done:
690 address_space_cache_destroy(&indirect_desc_cache);
691 if (in_bytes) {
692 *in_bytes = in_total;
694 if (out_bytes) {
695 *out_bytes = out_total;
697 rcu_read_unlock();
698 return;
700 err:
701 in_total = out_total = 0;
702 goto done;
705 int virtqueue_avail_bytes(VirtQueue *vq, unsigned int in_bytes,
706 unsigned int out_bytes)
708 unsigned int in_total, out_total;
710 virtqueue_get_avail_bytes(vq, &in_total, &out_total, in_bytes, out_bytes);
711 return in_bytes <= in_total && out_bytes <= out_total;
714 static bool virtqueue_map_desc(VirtIODevice *vdev, unsigned int *p_num_sg,
715 hwaddr *addr, struct iovec *iov,
716 unsigned int max_num_sg, bool is_write,
717 hwaddr pa, size_t sz)
719 bool ok = false;
720 unsigned num_sg = *p_num_sg;
721 assert(num_sg <= max_num_sg);
723 if (!sz) {
724 virtio_error(vdev, "virtio: zero sized buffers are not allowed");
725 goto out;
728 while (sz) {
729 hwaddr len = sz;
731 if (num_sg == max_num_sg) {
732 virtio_error(vdev, "virtio: too many write descriptors in "
733 "indirect table");
734 goto out;
737 iov[num_sg].iov_base = dma_memory_map(vdev->dma_as, pa, &len,
738 is_write ?
739 DMA_DIRECTION_FROM_DEVICE :
740 DMA_DIRECTION_TO_DEVICE);
741 if (!iov[num_sg].iov_base) {
742 virtio_error(vdev, "virtio: bogus descriptor or out of resources");
743 goto out;
746 iov[num_sg].iov_len = len;
747 addr[num_sg] = pa;
749 sz -= len;
750 pa += len;
751 num_sg++;
753 ok = true;
755 out:
756 *p_num_sg = num_sg;
757 return ok;
760 /* Only used by error code paths before we have a VirtQueueElement (therefore
761 * virtqueue_unmap_sg() can't be used). Assumes buffers weren't written to
762 * yet.
764 static void virtqueue_undo_map_desc(unsigned int out_num, unsigned int in_num,
765 struct iovec *iov)
767 unsigned int i;
769 for (i = 0; i < out_num + in_num; i++) {
770 int is_write = i >= out_num;
772 cpu_physical_memory_unmap(iov->iov_base, iov->iov_len, is_write, 0);
773 iov++;
777 static void virtqueue_map_iovec(VirtIODevice *vdev, struct iovec *sg,
778 hwaddr *addr, unsigned int *num_sg,
779 int is_write)
781 unsigned int i;
782 hwaddr len;
784 for (i = 0; i < *num_sg; i++) {
785 len = sg[i].iov_len;
786 sg[i].iov_base = dma_memory_map(vdev->dma_as,
787 addr[i], &len, is_write ?
788 DMA_DIRECTION_FROM_DEVICE :
789 DMA_DIRECTION_TO_DEVICE);
790 if (!sg[i].iov_base) {
791 error_report("virtio: error trying to map MMIO memory");
792 exit(1);
794 if (len != sg[i].iov_len) {
795 error_report("virtio: unexpected memory split");
796 exit(1);
801 void virtqueue_map(VirtIODevice *vdev, VirtQueueElement *elem)
803 virtqueue_map_iovec(vdev, elem->in_sg, elem->in_addr, &elem->in_num, 1);
804 virtqueue_map_iovec(vdev, elem->out_sg, elem->out_addr, &elem->out_num, 0);
807 static void *virtqueue_alloc_element(size_t sz, unsigned out_num, unsigned in_num)
809 VirtQueueElement *elem;
810 size_t in_addr_ofs = QEMU_ALIGN_UP(sz, __alignof__(elem->in_addr[0]));
811 size_t out_addr_ofs = in_addr_ofs + in_num * sizeof(elem->in_addr[0]);
812 size_t out_addr_end = out_addr_ofs + out_num * sizeof(elem->out_addr[0]);
813 size_t in_sg_ofs = QEMU_ALIGN_UP(out_addr_end, __alignof__(elem->in_sg[0]));
814 size_t out_sg_ofs = in_sg_ofs + in_num * sizeof(elem->in_sg[0]);
815 size_t out_sg_end = out_sg_ofs + out_num * sizeof(elem->out_sg[0]);
817 assert(sz >= sizeof(VirtQueueElement));
818 elem = g_malloc(out_sg_end);
819 elem->out_num = out_num;
820 elem->in_num = in_num;
821 elem->in_addr = (void *)elem + in_addr_ofs;
822 elem->out_addr = (void *)elem + out_addr_ofs;
823 elem->in_sg = (void *)elem + in_sg_ofs;
824 elem->out_sg = (void *)elem + out_sg_ofs;
825 return elem;
828 void *virtqueue_pop(VirtQueue *vq, size_t sz)
830 unsigned int i, head, max;
831 VRingMemoryRegionCaches *caches;
832 MemoryRegionCache indirect_desc_cache = MEMORY_REGION_CACHE_INVALID;
833 MemoryRegionCache *desc_cache;
834 int64_t len;
835 VirtIODevice *vdev = vq->vdev;
836 VirtQueueElement *elem = NULL;
837 unsigned out_num, in_num;
838 hwaddr addr[VIRTQUEUE_MAX_SIZE];
839 struct iovec iov[VIRTQUEUE_MAX_SIZE];
840 VRingDesc desc;
841 int rc;
843 if (unlikely(vdev->broken)) {
844 return NULL;
846 rcu_read_lock();
847 if (virtio_queue_empty_rcu(vq)) {
848 goto done;
850 /* Needed after virtio_queue_empty(), see comment in
851 * virtqueue_num_heads(). */
852 smp_rmb();
854 /* When we start there are none of either input nor output. */
855 out_num = in_num = 0;
857 max = vq->vring.num;
859 if (vq->inuse >= vq->vring.num) {
860 virtio_error(vdev, "Virtqueue size exceeded");
861 goto done;
864 if (!virtqueue_get_head(vq, vq->last_avail_idx++, &head)) {
865 goto done;
868 if (virtio_vdev_has_feature(vdev, VIRTIO_RING_F_EVENT_IDX)) {
869 vring_set_avail_event(vq, vq->last_avail_idx);
872 i = head;
874 caches = vring_get_region_caches(vq);
875 if (caches->desc.len < max * sizeof(VRingDesc)) {
876 virtio_error(vdev, "Cannot map descriptor ring");
877 goto done;
880 desc_cache = &caches->desc;
881 vring_desc_read(vdev, &desc, desc_cache, i);
882 if (desc.flags & VRING_DESC_F_INDIRECT) {
883 if (desc.len % sizeof(VRingDesc)) {
884 virtio_error(vdev, "Invalid size for indirect buffer table");
885 goto done;
888 /* loop over the indirect descriptor table */
889 len = address_space_cache_init(&indirect_desc_cache, vdev->dma_as,
890 desc.addr, desc.len, false);
891 desc_cache = &indirect_desc_cache;
892 if (len < desc.len) {
893 virtio_error(vdev, "Cannot map indirect buffer");
894 goto done;
897 max = desc.len / sizeof(VRingDesc);
898 i = 0;
899 vring_desc_read(vdev, &desc, desc_cache, i);
902 /* Collect all the descriptors */
903 do {
904 bool map_ok;
906 if (desc.flags & VRING_DESC_F_WRITE) {
907 map_ok = virtqueue_map_desc(vdev, &in_num, addr + out_num,
908 iov + out_num,
909 VIRTQUEUE_MAX_SIZE - out_num, true,
910 desc.addr, desc.len);
911 } else {
912 if (in_num) {
913 virtio_error(vdev, "Incorrect order for descriptors");
914 goto err_undo_map;
916 map_ok = virtqueue_map_desc(vdev, &out_num, addr, iov,
917 VIRTQUEUE_MAX_SIZE, false,
918 desc.addr, desc.len);
920 if (!map_ok) {
921 goto err_undo_map;
924 /* If we've got too many, that implies a descriptor loop. */
925 if ((in_num + out_num) > max) {
926 virtio_error(vdev, "Looped descriptor");
927 goto err_undo_map;
930 rc = virtqueue_read_next_desc(vdev, &desc, desc_cache, max, &i);
931 } while (rc == VIRTQUEUE_READ_DESC_MORE);
933 if (rc == VIRTQUEUE_READ_DESC_ERROR) {
934 goto err_undo_map;
937 /* Now copy what we have collected and mapped */
938 elem = virtqueue_alloc_element(sz, out_num, in_num);
939 elem->index = head;
940 for (i = 0; i < out_num; i++) {
941 elem->out_addr[i] = addr[i];
942 elem->out_sg[i] = iov[i];
944 for (i = 0; i < in_num; i++) {
945 elem->in_addr[i] = addr[out_num + i];
946 elem->in_sg[i] = iov[out_num + i];
949 vq->inuse++;
951 trace_virtqueue_pop(vq, elem, elem->in_num, elem->out_num);
952 done:
953 address_space_cache_destroy(&indirect_desc_cache);
954 rcu_read_unlock();
956 return elem;
958 err_undo_map:
959 virtqueue_undo_map_desc(out_num, in_num, iov);
960 goto done;
963 /* virtqueue_drop_all:
964 * @vq: The #VirtQueue
965 * Drops all queued buffers and indicates them to the guest
966 * as if they are done. Useful when buffers can not be
967 * processed but must be returned to the guest.
969 unsigned int virtqueue_drop_all(VirtQueue *vq)
971 unsigned int dropped = 0;
972 VirtQueueElement elem = {};
973 VirtIODevice *vdev = vq->vdev;
974 bool fEventIdx = virtio_vdev_has_feature(vdev, VIRTIO_RING_F_EVENT_IDX);
976 if (unlikely(vdev->broken)) {
977 return 0;
980 while (!virtio_queue_empty(vq) && vq->inuse < vq->vring.num) {
981 /* works similar to virtqueue_pop but does not map buffers
982 * and does not allocate any memory */
983 smp_rmb();
984 if (!virtqueue_get_head(vq, vq->last_avail_idx, &elem.index)) {
985 break;
987 vq->inuse++;
988 vq->last_avail_idx++;
989 if (fEventIdx) {
990 vring_set_avail_event(vq, vq->last_avail_idx);
992 /* immediately push the element, nothing to unmap
993 * as both in_num and out_num are set to 0 */
994 virtqueue_push(vq, &elem, 0);
995 dropped++;
998 return dropped;
1001 /* Reading and writing a structure directly to QEMUFile is *awful*, but
1002 * it is what QEMU has always done by mistake. We can change it sooner
1003 * or later by bumping the version number of the affected vm states.
1004 * In the meanwhile, since the in-memory layout of VirtQueueElement
1005 * has changed, we need to marshal to and from the layout that was
1006 * used before the change.
1008 typedef struct VirtQueueElementOld {
1009 unsigned int index;
1010 unsigned int out_num;
1011 unsigned int in_num;
1012 hwaddr in_addr[VIRTQUEUE_MAX_SIZE];
1013 hwaddr out_addr[VIRTQUEUE_MAX_SIZE];
1014 struct iovec in_sg[VIRTQUEUE_MAX_SIZE];
1015 struct iovec out_sg[VIRTQUEUE_MAX_SIZE];
1016 } VirtQueueElementOld;
1018 void *qemu_get_virtqueue_element(VirtIODevice *vdev, QEMUFile *f, size_t sz)
1020 VirtQueueElement *elem;
1021 VirtQueueElementOld data;
1022 int i;
1024 qemu_get_buffer(f, (uint8_t *)&data, sizeof(VirtQueueElementOld));
1026 /* TODO: teach all callers that this can fail, and return failure instead
1027 * of asserting here.
1028 * When we do, we might be able to re-enable NDEBUG below.
1030 #ifdef NDEBUG
1031 #error building with NDEBUG is not supported
1032 #endif
1033 assert(ARRAY_SIZE(data.in_addr) >= data.in_num);
1034 assert(ARRAY_SIZE(data.out_addr) >= data.out_num);
1036 elem = virtqueue_alloc_element(sz, data.out_num, data.in_num);
1037 elem->index = data.index;
1039 for (i = 0; i < elem->in_num; i++) {
1040 elem->in_addr[i] = data.in_addr[i];
1043 for (i = 0; i < elem->out_num; i++) {
1044 elem->out_addr[i] = data.out_addr[i];
1047 for (i = 0; i < elem->in_num; i++) {
1048 /* Base is overwritten by virtqueue_map. */
1049 elem->in_sg[i].iov_base = 0;
1050 elem->in_sg[i].iov_len = data.in_sg[i].iov_len;
1053 for (i = 0; i < elem->out_num; i++) {
1054 /* Base is overwritten by virtqueue_map. */
1055 elem->out_sg[i].iov_base = 0;
1056 elem->out_sg[i].iov_len = data.out_sg[i].iov_len;
1059 virtqueue_map(vdev, elem);
1060 return elem;
1063 void qemu_put_virtqueue_element(QEMUFile *f, VirtQueueElement *elem)
1065 VirtQueueElementOld data;
1066 int i;
1068 memset(&data, 0, sizeof(data));
1069 data.index = elem->index;
1070 data.in_num = elem->in_num;
1071 data.out_num = elem->out_num;
1073 for (i = 0; i < elem->in_num; i++) {
1074 data.in_addr[i] = elem->in_addr[i];
1077 for (i = 0; i < elem->out_num; i++) {
1078 data.out_addr[i] = elem->out_addr[i];
1081 for (i = 0; i < elem->in_num; i++) {
1082 /* Base is overwritten by virtqueue_map when loading. Do not
1083 * save it, as it would leak the QEMU address space layout. */
1084 data.in_sg[i].iov_len = elem->in_sg[i].iov_len;
1087 for (i = 0; i < elem->out_num; i++) {
1088 /* Do not save iov_base as above. */
1089 data.out_sg[i].iov_len = elem->out_sg[i].iov_len;
1091 qemu_put_buffer(f, (uint8_t *)&data, sizeof(VirtQueueElementOld));
1094 /* virtio device */
1095 static void virtio_notify_vector(VirtIODevice *vdev, uint16_t vector)
1097 BusState *qbus = qdev_get_parent_bus(DEVICE(vdev));
1098 VirtioBusClass *k = VIRTIO_BUS_GET_CLASS(qbus);
1100 if (unlikely(vdev->broken)) {
1101 return;
1104 if (k->notify) {
1105 k->notify(qbus->parent, vector);
1109 void virtio_update_irq(VirtIODevice *vdev)
1111 virtio_notify_vector(vdev, VIRTIO_NO_VECTOR);
1114 static int virtio_validate_features(VirtIODevice *vdev)
1116 VirtioDeviceClass *k = VIRTIO_DEVICE_GET_CLASS(vdev);
1118 if (virtio_host_has_feature(vdev, VIRTIO_F_IOMMU_PLATFORM) &&
1119 !virtio_vdev_has_feature(vdev, VIRTIO_F_IOMMU_PLATFORM)) {
1120 return -EFAULT;
1123 if (k->validate_features) {
1124 return k->validate_features(vdev);
1125 } else {
1126 return 0;
1130 int virtio_set_status(VirtIODevice *vdev, uint8_t val)
1132 VirtioDeviceClass *k = VIRTIO_DEVICE_GET_CLASS(vdev);
1133 trace_virtio_set_status(vdev, val);
1135 if (virtio_vdev_has_feature(vdev, VIRTIO_F_VERSION_1)) {
1136 if (!(vdev->status & VIRTIO_CONFIG_S_FEATURES_OK) &&
1137 val & VIRTIO_CONFIG_S_FEATURES_OK) {
1138 int ret = virtio_validate_features(vdev);
1140 if (ret) {
1141 return ret;
1145 if (k->set_status) {
1146 k->set_status(vdev, val);
1148 vdev->status = val;
1149 return 0;
1152 bool target_words_bigendian(void);
1153 static enum virtio_device_endian virtio_default_endian(void)
1155 if (target_words_bigendian()) {
1156 return VIRTIO_DEVICE_ENDIAN_BIG;
1157 } else {
1158 return VIRTIO_DEVICE_ENDIAN_LITTLE;
1162 static enum virtio_device_endian virtio_current_cpu_endian(void)
1164 CPUClass *cc = CPU_GET_CLASS(current_cpu);
1166 if (cc->virtio_is_big_endian(current_cpu)) {
1167 return VIRTIO_DEVICE_ENDIAN_BIG;
1168 } else {
1169 return VIRTIO_DEVICE_ENDIAN_LITTLE;
1173 static void virtio_virtqueue_reset_region_cache(struct VirtQueue *vq)
1175 VRingMemoryRegionCaches *caches;
1177 caches = atomic_read(&vq->vring.caches);
1178 atomic_rcu_set(&vq->vring.caches, NULL);
1179 if (caches) {
1180 call_rcu(caches, virtio_free_region_cache, rcu);
1184 void virtio_reset(void *opaque)
1186 VirtIODevice *vdev = opaque;
1187 VirtioDeviceClass *k = VIRTIO_DEVICE_GET_CLASS(vdev);
1188 int i;
1190 virtio_set_status(vdev, 0);
1191 if (current_cpu) {
1192 /* Guest initiated reset */
1193 vdev->device_endian = virtio_current_cpu_endian();
1194 } else {
1195 /* System reset */
1196 vdev->device_endian = virtio_default_endian();
1199 if (k->reset) {
1200 k->reset(vdev);
1203 vdev->broken = false;
1204 vdev->guest_features = 0;
1205 vdev->queue_sel = 0;
1206 vdev->status = 0;
1207 atomic_set(&vdev->isr, 0);
1208 vdev->config_vector = VIRTIO_NO_VECTOR;
1209 virtio_notify_vector(vdev, vdev->config_vector);
1211 for(i = 0; i < VIRTIO_QUEUE_MAX; i++) {
1212 vdev->vq[i].vring.desc = 0;
1213 vdev->vq[i].vring.avail = 0;
1214 vdev->vq[i].vring.used = 0;
1215 vdev->vq[i].last_avail_idx = 0;
1216 vdev->vq[i].shadow_avail_idx = 0;
1217 vdev->vq[i].used_idx = 0;
1218 virtio_queue_set_vector(vdev, i, VIRTIO_NO_VECTOR);
1219 vdev->vq[i].signalled_used = 0;
1220 vdev->vq[i].signalled_used_valid = false;
1221 vdev->vq[i].notification = true;
1222 vdev->vq[i].vring.num = vdev->vq[i].vring.num_default;
1223 vdev->vq[i].inuse = 0;
1224 virtio_virtqueue_reset_region_cache(&vdev->vq[i]);
1228 uint32_t virtio_config_readb(VirtIODevice *vdev, uint32_t addr)
1230 VirtioDeviceClass *k = VIRTIO_DEVICE_GET_CLASS(vdev);
1231 uint8_t val;
1233 if (addr + sizeof(val) > vdev->config_len) {
1234 return (uint32_t)-1;
1237 k->get_config(vdev, vdev->config);
1239 val = ldub_p(vdev->config + addr);
1240 return val;
1243 uint32_t virtio_config_readw(VirtIODevice *vdev, uint32_t addr)
1245 VirtioDeviceClass *k = VIRTIO_DEVICE_GET_CLASS(vdev);
1246 uint16_t val;
1248 if (addr + sizeof(val) > vdev->config_len) {
1249 return (uint32_t)-1;
1252 k->get_config(vdev, vdev->config);
1254 val = lduw_p(vdev->config + addr);
1255 return val;
1258 uint32_t virtio_config_readl(VirtIODevice *vdev, uint32_t addr)
1260 VirtioDeviceClass *k = VIRTIO_DEVICE_GET_CLASS(vdev);
1261 uint32_t val;
1263 if (addr + sizeof(val) > vdev->config_len) {
1264 return (uint32_t)-1;
1267 k->get_config(vdev, vdev->config);
1269 val = ldl_p(vdev->config + addr);
1270 return val;
1273 void virtio_config_writeb(VirtIODevice *vdev, uint32_t addr, uint32_t data)
1275 VirtioDeviceClass *k = VIRTIO_DEVICE_GET_CLASS(vdev);
1276 uint8_t val = data;
1278 if (addr + sizeof(val) > vdev->config_len) {
1279 return;
1282 stb_p(vdev->config + addr, val);
1284 if (k->set_config) {
1285 k->set_config(vdev, vdev->config);
1289 void virtio_config_writew(VirtIODevice *vdev, uint32_t addr, uint32_t data)
1291 VirtioDeviceClass *k = VIRTIO_DEVICE_GET_CLASS(vdev);
1292 uint16_t val = data;
1294 if (addr + sizeof(val) > vdev->config_len) {
1295 return;
1298 stw_p(vdev->config + addr, val);
1300 if (k->set_config) {
1301 k->set_config(vdev, vdev->config);
1305 void virtio_config_writel(VirtIODevice *vdev, uint32_t addr, uint32_t data)
1307 VirtioDeviceClass *k = VIRTIO_DEVICE_GET_CLASS(vdev);
1308 uint32_t val = data;
1310 if (addr + sizeof(val) > vdev->config_len) {
1311 return;
1314 stl_p(vdev->config + addr, val);
1316 if (k->set_config) {
1317 k->set_config(vdev, vdev->config);
1321 uint32_t virtio_config_modern_readb(VirtIODevice *vdev, uint32_t addr)
1323 VirtioDeviceClass *k = VIRTIO_DEVICE_GET_CLASS(vdev);
1324 uint8_t val;
1326 if (addr + sizeof(val) > vdev->config_len) {
1327 return (uint32_t)-1;
1330 k->get_config(vdev, vdev->config);
1332 val = ldub_p(vdev->config + addr);
1333 return val;
1336 uint32_t virtio_config_modern_readw(VirtIODevice *vdev, uint32_t addr)
1338 VirtioDeviceClass *k = VIRTIO_DEVICE_GET_CLASS(vdev);
1339 uint16_t val;
1341 if (addr + sizeof(val) > vdev->config_len) {
1342 return (uint32_t)-1;
1345 k->get_config(vdev, vdev->config);
1347 val = lduw_le_p(vdev->config + addr);
1348 return val;
1351 uint32_t virtio_config_modern_readl(VirtIODevice *vdev, uint32_t addr)
1353 VirtioDeviceClass *k = VIRTIO_DEVICE_GET_CLASS(vdev);
1354 uint32_t val;
1356 if (addr + sizeof(val) > vdev->config_len) {
1357 return (uint32_t)-1;
1360 k->get_config(vdev, vdev->config);
1362 val = ldl_le_p(vdev->config + addr);
1363 return val;
1366 void virtio_config_modern_writeb(VirtIODevice *vdev,
1367 uint32_t addr, uint32_t data)
1369 VirtioDeviceClass *k = VIRTIO_DEVICE_GET_CLASS(vdev);
1370 uint8_t val = data;
1372 if (addr + sizeof(val) > vdev->config_len) {
1373 return;
1376 stb_p(vdev->config + addr, val);
1378 if (k->set_config) {
1379 k->set_config(vdev, vdev->config);
1383 void virtio_config_modern_writew(VirtIODevice *vdev,
1384 uint32_t addr, uint32_t data)
1386 VirtioDeviceClass *k = VIRTIO_DEVICE_GET_CLASS(vdev);
1387 uint16_t val = data;
1389 if (addr + sizeof(val) > vdev->config_len) {
1390 return;
1393 stw_le_p(vdev->config + addr, val);
1395 if (k->set_config) {
1396 k->set_config(vdev, vdev->config);
1400 void virtio_config_modern_writel(VirtIODevice *vdev,
1401 uint32_t addr, uint32_t data)
1403 VirtioDeviceClass *k = VIRTIO_DEVICE_GET_CLASS(vdev);
1404 uint32_t val = data;
1406 if (addr + sizeof(val) > vdev->config_len) {
1407 return;
1410 stl_le_p(vdev->config + addr, val);
1412 if (k->set_config) {
1413 k->set_config(vdev, vdev->config);
1417 void virtio_queue_set_addr(VirtIODevice *vdev, int n, hwaddr addr)
1419 vdev->vq[n].vring.desc = addr;
1420 virtio_queue_update_rings(vdev, n);
1423 hwaddr virtio_queue_get_addr(VirtIODevice *vdev, int n)
1425 return vdev->vq[n].vring.desc;
1428 void virtio_queue_set_rings(VirtIODevice *vdev, int n, hwaddr desc,
1429 hwaddr avail, hwaddr used)
1431 vdev->vq[n].vring.desc = desc;
1432 vdev->vq[n].vring.avail = avail;
1433 vdev->vq[n].vring.used = used;
1434 virtio_init_region_cache(vdev, n);
1437 void virtio_queue_set_num(VirtIODevice *vdev, int n, int num)
1439 /* Don't allow guest to flip queue between existent and
1440 * nonexistent states, or to set it to an invalid size.
1442 if (!!num != !!vdev->vq[n].vring.num ||
1443 num > VIRTQUEUE_MAX_SIZE ||
1444 num < 0) {
1445 return;
1447 vdev->vq[n].vring.num = num;
1450 VirtQueue *virtio_vector_first_queue(VirtIODevice *vdev, uint16_t vector)
1452 return QLIST_FIRST(&vdev->vector_queues[vector]);
1455 VirtQueue *virtio_vector_next_queue(VirtQueue *vq)
1457 return QLIST_NEXT(vq, node);
1460 int virtio_queue_get_num(VirtIODevice *vdev, int n)
1462 return vdev->vq[n].vring.num;
1465 int virtio_queue_get_max_num(VirtIODevice *vdev, int n)
1467 return vdev->vq[n].vring.num_default;
1470 int virtio_get_num_queues(VirtIODevice *vdev)
1472 int i;
1474 for (i = 0; i < VIRTIO_QUEUE_MAX; i++) {
1475 if (!virtio_queue_get_num(vdev, i)) {
1476 break;
1480 return i;
1483 void virtio_queue_set_align(VirtIODevice *vdev, int n, int align)
1485 BusState *qbus = qdev_get_parent_bus(DEVICE(vdev));
1486 VirtioBusClass *k = VIRTIO_BUS_GET_CLASS(qbus);
1488 /* virtio-1 compliant devices cannot change the alignment */
1489 if (virtio_vdev_has_feature(vdev, VIRTIO_F_VERSION_1)) {
1490 error_report("tried to modify queue alignment for virtio-1 device");
1491 return;
1493 /* Check that the transport told us it was going to do this
1494 * (so a buggy transport will immediately assert rather than
1495 * silently failing to migrate this state)
1497 assert(k->has_variable_vring_alignment);
1499 vdev->vq[n].vring.align = align;
1500 virtio_queue_update_rings(vdev, n);
1503 static bool virtio_queue_notify_aio_vq(VirtQueue *vq)
1505 if (vq->vring.desc && vq->handle_aio_output) {
1506 VirtIODevice *vdev = vq->vdev;
1508 trace_virtio_queue_notify(vdev, vq - vdev->vq, vq);
1509 return vq->handle_aio_output(vdev, vq);
1512 return false;
1515 static void virtio_queue_notify_vq(VirtQueue *vq)
1517 if (vq->vring.desc && vq->handle_output) {
1518 VirtIODevice *vdev = vq->vdev;
1520 if (unlikely(vdev->broken)) {
1521 return;
1524 trace_virtio_queue_notify(vdev, vq - vdev->vq, vq);
1525 vq->handle_output(vdev, vq);
1529 void virtio_queue_notify(VirtIODevice *vdev, int n)
1531 VirtQueue *vq = &vdev->vq[n];
1533 if (unlikely(!vq->vring.desc || vdev->broken)) {
1534 return;
1537 trace_virtio_queue_notify(vdev, vq - vdev->vq, vq);
1538 if (vq->handle_aio_output) {
1539 event_notifier_set(&vq->host_notifier);
1540 } else if (vq->handle_output) {
1541 vq->handle_output(vdev, vq);
1545 uint16_t virtio_queue_vector(VirtIODevice *vdev, int n)
1547 return n < VIRTIO_QUEUE_MAX ? vdev->vq[n].vector :
1548 VIRTIO_NO_VECTOR;
1551 void virtio_queue_set_vector(VirtIODevice *vdev, int n, uint16_t vector)
1553 VirtQueue *vq = &vdev->vq[n];
1555 if (n < VIRTIO_QUEUE_MAX) {
1556 if (vdev->vector_queues &&
1557 vdev->vq[n].vector != VIRTIO_NO_VECTOR) {
1558 QLIST_REMOVE(vq, node);
1560 vdev->vq[n].vector = vector;
1561 if (vdev->vector_queues &&
1562 vector != VIRTIO_NO_VECTOR) {
1563 QLIST_INSERT_HEAD(&vdev->vector_queues[vector], vq, node);
1568 VirtQueue *virtio_add_queue(VirtIODevice *vdev, int queue_size,
1569 VirtIOHandleOutput handle_output)
1571 int i;
1573 for (i = 0; i < VIRTIO_QUEUE_MAX; i++) {
1574 if (vdev->vq[i].vring.num == 0)
1575 break;
1578 if (i == VIRTIO_QUEUE_MAX || queue_size > VIRTQUEUE_MAX_SIZE)
1579 abort();
1581 vdev->vq[i].vring.num = queue_size;
1582 vdev->vq[i].vring.num_default = queue_size;
1583 vdev->vq[i].vring.align = VIRTIO_PCI_VRING_ALIGN;
1584 vdev->vq[i].handle_output = handle_output;
1585 vdev->vq[i].handle_aio_output = NULL;
1587 return &vdev->vq[i];
1590 void virtio_del_queue(VirtIODevice *vdev, int n)
1592 if (n < 0 || n >= VIRTIO_QUEUE_MAX) {
1593 abort();
1596 vdev->vq[n].vring.num = 0;
1597 vdev->vq[n].vring.num_default = 0;
1600 static void virtio_set_isr(VirtIODevice *vdev, int value)
1602 uint8_t old = atomic_read(&vdev->isr);
1604 /* Do not write ISR if it does not change, so that its cacheline remains
1605 * shared in the common case where the guest does not read it.
1607 if ((old & value) != value) {
1608 atomic_or(&vdev->isr, value);
1612 /* Called within rcu_read_lock(). */
1613 static bool virtio_should_notify(VirtIODevice *vdev, VirtQueue *vq)
1615 uint16_t old, new;
1616 bool v;
1617 /* We need to expose used array entries before checking used event. */
1618 smp_mb();
1619 /* Always notify when queue is empty (when feature acknowledge) */
1620 if (virtio_vdev_has_feature(vdev, VIRTIO_F_NOTIFY_ON_EMPTY) &&
1621 !vq->inuse && virtio_queue_empty(vq)) {
1622 return true;
1625 if (!virtio_vdev_has_feature(vdev, VIRTIO_RING_F_EVENT_IDX)) {
1626 return !(vring_avail_flags(vq) & VRING_AVAIL_F_NO_INTERRUPT);
1629 v = vq->signalled_used_valid;
1630 vq->signalled_used_valid = true;
1631 old = vq->signalled_used;
1632 new = vq->signalled_used = vq->used_idx;
1633 return !v || vring_need_event(vring_get_used_event(vq), new, old);
1636 void virtio_notify_irqfd(VirtIODevice *vdev, VirtQueue *vq)
1638 bool should_notify;
1639 rcu_read_lock();
1640 should_notify = virtio_should_notify(vdev, vq);
1641 rcu_read_unlock();
1643 if (!should_notify) {
1644 return;
1647 trace_virtio_notify_irqfd(vdev, vq);
1650 * virtio spec 1.0 says ISR bit 0 should be ignored with MSI, but
1651 * windows drivers included in virtio-win 1.8.0 (circa 2015) are
1652 * incorrectly polling this bit during crashdump and hibernation
1653 * in MSI mode, causing a hang if this bit is never updated.
1654 * Recent releases of Windows do not really shut down, but rather
1655 * log out and hibernate to make the next startup faster. Hence,
1656 * this manifested as a more serious hang during shutdown with
1658 * Next driver release from 2016 fixed this problem, so working around it
1659 * is not a must, but it's easy to do so let's do it here.
1661 * Note: it's safe to update ISR from any thread as it was switched
1662 * to an atomic operation.
1664 virtio_set_isr(vq->vdev, 0x1);
1665 event_notifier_set(&vq->guest_notifier);
1668 static void virtio_irq(VirtQueue *vq)
1670 virtio_set_isr(vq->vdev, 0x1);
1671 virtio_notify_vector(vq->vdev, vq->vector);
1674 void virtio_notify(VirtIODevice *vdev, VirtQueue *vq)
1676 bool should_notify;
1677 rcu_read_lock();
1678 should_notify = virtio_should_notify(vdev, vq);
1679 rcu_read_unlock();
1681 if (!should_notify) {
1682 return;
1685 trace_virtio_notify(vdev, vq);
1686 virtio_irq(vq);
1689 void virtio_notify_config(VirtIODevice *vdev)
1691 if (!(vdev->status & VIRTIO_CONFIG_S_DRIVER_OK))
1692 return;
1694 virtio_set_isr(vdev, 0x3);
1695 vdev->generation++;
1696 virtio_notify_vector(vdev, vdev->config_vector);
1699 static bool virtio_device_endian_needed(void *opaque)
1701 VirtIODevice *vdev = opaque;
1703 assert(vdev->device_endian != VIRTIO_DEVICE_ENDIAN_UNKNOWN);
1704 if (!virtio_vdev_has_feature(vdev, VIRTIO_F_VERSION_1)) {
1705 return vdev->device_endian != virtio_default_endian();
1707 /* Devices conforming to VIRTIO 1.0 or later are always LE. */
1708 return vdev->device_endian != VIRTIO_DEVICE_ENDIAN_LITTLE;
1711 static bool virtio_64bit_features_needed(void *opaque)
1713 VirtIODevice *vdev = opaque;
1715 return (vdev->host_features >> 32) != 0;
1718 static bool virtio_virtqueue_needed(void *opaque)
1720 VirtIODevice *vdev = opaque;
1722 return virtio_host_has_feature(vdev, VIRTIO_F_VERSION_1);
1725 static bool virtio_ringsize_needed(void *opaque)
1727 VirtIODevice *vdev = opaque;
1728 int i;
1730 for (i = 0; i < VIRTIO_QUEUE_MAX; i++) {
1731 if (vdev->vq[i].vring.num != vdev->vq[i].vring.num_default) {
1732 return true;
1735 return false;
1738 static bool virtio_extra_state_needed(void *opaque)
1740 VirtIODevice *vdev = opaque;
1741 BusState *qbus = qdev_get_parent_bus(DEVICE(vdev));
1742 VirtioBusClass *k = VIRTIO_BUS_GET_CLASS(qbus);
1744 return k->has_extra_state &&
1745 k->has_extra_state(qbus->parent);
1748 static bool virtio_broken_needed(void *opaque)
1750 VirtIODevice *vdev = opaque;
1752 return vdev->broken;
1755 static const VMStateDescription vmstate_virtqueue = {
1756 .name = "virtqueue_state",
1757 .version_id = 1,
1758 .minimum_version_id = 1,
1759 .fields = (VMStateField[]) {
1760 VMSTATE_UINT64(vring.avail, struct VirtQueue),
1761 VMSTATE_UINT64(vring.used, struct VirtQueue),
1762 VMSTATE_END_OF_LIST()
1766 static const VMStateDescription vmstate_virtio_virtqueues = {
1767 .name = "virtio/virtqueues",
1768 .version_id = 1,
1769 .minimum_version_id = 1,
1770 .needed = &virtio_virtqueue_needed,
1771 .fields = (VMStateField[]) {
1772 VMSTATE_STRUCT_VARRAY_POINTER_KNOWN(vq, struct VirtIODevice,
1773 VIRTIO_QUEUE_MAX, 0, vmstate_virtqueue, VirtQueue),
1774 VMSTATE_END_OF_LIST()
1778 static const VMStateDescription vmstate_ringsize = {
1779 .name = "ringsize_state",
1780 .version_id = 1,
1781 .minimum_version_id = 1,
1782 .fields = (VMStateField[]) {
1783 VMSTATE_UINT32(vring.num_default, struct VirtQueue),
1784 VMSTATE_END_OF_LIST()
1788 static const VMStateDescription vmstate_virtio_ringsize = {
1789 .name = "virtio/ringsize",
1790 .version_id = 1,
1791 .minimum_version_id = 1,
1792 .needed = &virtio_ringsize_needed,
1793 .fields = (VMStateField[]) {
1794 VMSTATE_STRUCT_VARRAY_POINTER_KNOWN(vq, struct VirtIODevice,
1795 VIRTIO_QUEUE_MAX, 0, vmstate_ringsize, VirtQueue),
1796 VMSTATE_END_OF_LIST()
1800 static int get_extra_state(QEMUFile *f, void *pv, size_t size,
1801 VMStateField *field)
1803 VirtIODevice *vdev = pv;
1804 BusState *qbus = qdev_get_parent_bus(DEVICE(vdev));
1805 VirtioBusClass *k = VIRTIO_BUS_GET_CLASS(qbus);
1807 if (!k->load_extra_state) {
1808 return -1;
1809 } else {
1810 return k->load_extra_state(qbus->parent, f);
1814 static int put_extra_state(QEMUFile *f, void *pv, size_t size,
1815 VMStateField *field, QJSON *vmdesc)
1817 VirtIODevice *vdev = pv;
1818 BusState *qbus = qdev_get_parent_bus(DEVICE(vdev));
1819 VirtioBusClass *k = VIRTIO_BUS_GET_CLASS(qbus);
1821 k->save_extra_state(qbus->parent, f);
1822 return 0;
1825 static const VMStateInfo vmstate_info_extra_state = {
1826 .name = "virtqueue_extra_state",
1827 .get = get_extra_state,
1828 .put = put_extra_state,
1831 static const VMStateDescription vmstate_virtio_extra_state = {
1832 .name = "virtio/extra_state",
1833 .version_id = 1,
1834 .minimum_version_id = 1,
1835 .needed = &virtio_extra_state_needed,
1836 .fields = (VMStateField[]) {
1838 .name = "extra_state",
1839 .version_id = 0,
1840 .field_exists = NULL,
1841 .size = 0,
1842 .info = &vmstate_info_extra_state,
1843 .flags = VMS_SINGLE,
1844 .offset = 0,
1846 VMSTATE_END_OF_LIST()
1850 static const VMStateDescription vmstate_virtio_device_endian = {
1851 .name = "virtio/device_endian",
1852 .version_id = 1,
1853 .minimum_version_id = 1,
1854 .needed = &virtio_device_endian_needed,
1855 .fields = (VMStateField[]) {
1856 VMSTATE_UINT8(device_endian, VirtIODevice),
1857 VMSTATE_END_OF_LIST()
1861 static const VMStateDescription vmstate_virtio_64bit_features = {
1862 .name = "virtio/64bit_features",
1863 .version_id = 1,
1864 .minimum_version_id = 1,
1865 .needed = &virtio_64bit_features_needed,
1866 .fields = (VMStateField[]) {
1867 VMSTATE_UINT64(guest_features, VirtIODevice),
1868 VMSTATE_END_OF_LIST()
1872 static const VMStateDescription vmstate_virtio_broken = {
1873 .name = "virtio/broken",
1874 .version_id = 1,
1875 .minimum_version_id = 1,
1876 .needed = &virtio_broken_needed,
1877 .fields = (VMStateField[]) {
1878 VMSTATE_BOOL(broken, VirtIODevice),
1879 VMSTATE_END_OF_LIST()
1883 static const VMStateDescription vmstate_virtio = {
1884 .name = "virtio",
1885 .version_id = 1,
1886 .minimum_version_id = 1,
1887 .minimum_version_id_old = 1,
1888 .fields = (VMStateField[]) {
1889 VMSTATE_END_OF_LIST()
1891 .subsections = (const VMStateDescription*[]) {
1892 &vmstate_virtio_device_endian,
1893 &vmstate_virtio_64bit_features,
1894 &vmstate_virtio_virtqueues,
1895 &vmstate_virtio_ringsize,
1896 &vmstate_virtio_broken,
1897 &vmstate_virtio_extra_state,
1898 NULL
1902 void virtio_save(VirtIODevice *vdev, QEMUFile *f)
1904 BusState *qbus = qdev_get_parent_bus(DEVICE(vdev));
1905 VirtioBusClass *k = VIRTIO_BUS_GET_CLASS(qbus);
1906 VirtioDeviceClass *vdc = VIRTIO_DEVICE_GET_CLASS(vdev);
1907 uint32_t guest_features_lo = (vdev->guest_features & 0xffffffff);
1908 int i;
1910 if (k->save_config) {
1911 k->save_config(qbus->parent, f);
1914 qemu_put_8s(f, &vdev->status);
1915 qemu_put_8s(f, &vdev->isr);
1916 qemu_put_be16s(f, &vdev->queue_sel);
1917 qemu_put_be32s(f, &guest_features_lo);
1918 qemu_put_be32(f, vdev->config_len);
1919 qemu_put_buffer(f, vdev->config, vdev->config_len);
1921 for (i = 0; i < VIRTIO_QUEUE_MAX; i++) {
1922 if (vdev->vq[i].vring.num == 0)
1923 break;
1926 qemu_put_be32(f, i);
1928 for (i = 0; i < VIRTIO_QUEUE_MAX; i++) {
1929 if (vdev->vq[i].vring.num == 0)
1930 break;
1932 qemu_put_be32(f, vdev->vq[i].vring.num);
1933 if (k->has_variable_vring_alignment) {
1934 qemu_put_be32(f, vdev->vq[i].vring.align);
1937 * Save desc now, the rest of the ring addresses are saved in
1938 * subsections for VIRTIO-1 devices.
1940 qemu_put_be64(f, vdev->vq[i].vring.desc);
1941 qemu_put_be16s(f, &vdev->vq[i].last_avail_idx);
1942 if (k->save_queue) {
1943 k->save_queue(qbus->parent, i, f);
1947 if (vdc->save != NULL) {
1948 vdc->save(vdev, f);
1951 if (vdc->vmsd) {
1952 vmstate_save_state(f, vdc->vmsd, vdev, NULL);
1955 /* Subsections */
1956 vmstate_save_state(f, &vmstate_virtio, vdev, NULL);
1959 /* A wrapper for use as a VMState .put function */
1960 static int virtio_device_put(QEMUFile *f, void *opaque, size_t size,
1961 VMStateField *field, QJSON *vmdesc)
1963 virtio_save(VIRTIO_DEVICE(opaque), f);
1965 return 0;
1968 /* A wrapper for use as a VMState .get function */
1969 static int virtio_device_get(QEMUFile *f, void *opaque, size_t size,
1970 VMStateField *field)
1972 VirtIODevice *vdev = VIRTIO_DEVICE(opaque);
1973 DeviceClass *dc = DEVICE_CLASS(VIRTIO_DEVICE_GET_CLASS(vdev));
1975 return virtio_load(vdev, f, dc->vmsd->version_id);
1978 const VMStateInfo virtio_vmstate_info = {
1979 .name = "virtio",
1980 .get = virtio_device_get,
1981 .put = virtio_device_put,
1984 static int virtio_set_features_nocheck(VirtIODevice *vdev, uint64_t val)
1986 VirtioDeviceClass *k = VIRTIO_DEVICE_GET_CLASS(vdev);
1987 bool bad = (val & ~(vdev->host_features)) != 0;
1989 val &= vdev->host_features;
1990 if (k->set_features) {
1991 k->set_features(vdev, val);
1993 vdev->guest_features = val;
1994 return bad ? -1 : 0;
1997 int virtio_set_features(VirtIODevice *vdev, uint64_t val)
2000 * The driver must not attempt to set features after feature negotiation
2001 * has finished.
2003 if (vdev->status & VIRTIO_CONFIG_S_FEATURES_OK) {
2004 return -EINVAL;
2006 return virtio_set_features_nocheck(vdev, val);
2009 int virtio_load(VirtIODevice *vdev, QEMUFile *f, int version_id)
2011 int i, ret;
2012 int32_t config_len;
2013 uint32_t num;
2014 uint32_t features;
2015 BusState *qbus = qdev_get_parent_bus(DEVICE(vdev));
2016 VirtioBusClass *k = VIRTIO_BUS_GET_CLASS(qbus);
2017 VirtioDeviceClass *vdc = VIRTIO_DEVICE_GET_CLASS(vdev);
2020 * We poison the endianness to ensure it does not get used before
2021 * subsections have been loaded.
2023 vdev->device_endian = VIRTIO_DEVICE_ENDIAN_UNKNOWN;
2025 if (k->load_config) {
2026 ret = k->load_config(qbus->parent, f);
2027 if (ret)
2028 return ret;
2031 qemu_get_8s(f, &vdev->status);
2032 qemu_get_8s(f, &vdev->isr);
2033 qemu_get_be16s(f, &vdev->queue_sel);
2034 if (vdev->queue_sel >= VIRTIO_QUEUE_MAX) {
2035 return -1;
2037 qemu_get_be32s(f, &features);
2040 * Temporarily set guest_features low bits - needed by
2041 * virtio net load code testing for VIRTIO_NET_F_CTRL_GUEST_OFFLOADS
2042 * VIRTIO_NET_F_GUEST_ANNOUNCE and VIRTIO_NET_F_CTRL_VQ.
2044 * Note: devices should always test host features in future - don't create
2045 * new dependencies like this.
2047 vdev->guest_features = features;
2049 config_len = qemu_get_be32(f);
2052 * There are cases where the incoming config can be bigger or smaller
2053 * than what we have; so load what we have space for, and skip
2054 * any excess that's in the stream.
2056 qemu_get_buffer(f, vdev->config, MIN(config_len, vdev->config_len));
2058 while (config_len > vdev->config_len) {
2059 qemu_get_byte(f);
2060 config_len--;
2063 num = qemu_get_be32(f);
2065 if (num > VIRTIO_QUEUE_MAX) {
2066 error_report("Invalid number of virtqueues: 0x%x", num);
2067 return -1;
2070 for (i = 0; i < num; i++) {
2071 vdev->vq[i].vring.num = qemu_get_be32(f);
2072 if (k->has_variable_vring_alignment) {
2073 vdev->vq[i].vring.align = qemu_get_be32(f);
2075 vdev->vq[i].vring.desc = qemu_get_be64(f);
2076 qemu_get_be16s(f, &vdev->vq[i].last_avail_idx);
2077 vdev->vq[i].signalled_used_valid = false;
2078 vdev->vq[i].notification = true;
2080 if (!vdev->vq[i].vring.desc && vdev->vq[i].last_avail_idx) {
2081 error_report("VQ %d address 0x0 "
2082 "inconsistent with Host index 0x%x",
2083 i, vdev->vq[i].last_avail_idx);
2084 return -1;
2086 if (k->load_queue) {
2087 ret = k->load_queue(qbus->parent, i, f);
2088 if (ret)
2089 return ret;
2093 virtio_notify_vector(vdev, VIRTIO_NO_VECTOR);
2095 if (vdc->load != NULL) {
2096 ret = vdc->load(vdev, f, version_id);
2097 if (ret) {
2098 return ret;
2102 if (vdc->vmsd) {
2103 ret = vmstate_load_state(f, vdc->vmsd, vdev, version_id);
2104 if (ret) {
2105 return ret;
2109 /* Subsections */
2110 ret = vmstate_load_state(f, &vmstate_virtio, vdev, 1);
2111 if (ret) {
2112 return ret;
2115 if (vdev->device_endian == VIRTIO_DEVICE_ENDIAN_UNKNOWN) {
2116 vdev->device_endian = virtio_default_endian();
2119 if (virtio_64bit_features_needed(vdev)) {
2121 * Subsection load filled vdev->guest_features. Run them
2122 * through virtio_set_features to sanity-check them against
2123 * host_features.
2125 uint64_t features64 = vdev->guest_features;
2126 if (virtio_set_features_nocheck(vdev, features64) < 0) {
2127 error_report("Features 0x%" PRIx64 " unsupported. "
2128 "Allowed features: 0x%" PRIx64,
2129 features64, vdev->host_features);
2130 return -1;
2132 } else {
2133 if (virtio_set_features_nocheck(vdev, features) < 0) {
2134 error_report("Features 0x%x unsupported. "
2135 "Allowed features: 0x%" PRIx64,
2136 features, vdev->host_features);
2137 return -1;
2141 rcu_read_lock();
2142 for (i = 0; i < num; i++) {
2143 if (vdev->vq[i].vring.desc) {
2144 uint16_t nheads;
2147 * VIRTIO-1 devices migrate desc, used, and avail ring addresses so
2148 * only the region cache needs to be set up. Legacy devices need
2149 * to calculate used and avail ring addresses based on the desc
2150 * address.
2152 if (virtio_vdev_has_feature(vdev, VIRTIO_F_VERSION_1)) {
2153 virtio_init_region_cache(vdev, i);
2154 } else {
2155 virtio_queue_update_rings(vdev, i);
2158 nheads = vring_avail_idx(&vdev->vq[i]) - vdev->vq[i].last_avail_idx;
2159 /* Check it isn't doing strange things with descriptor numbers. */
2160 if (nheads > vdev->vq[i].vring.num) {
2161 error_report("VQ %d size 0x%x Guest index 0x%x "
2162 "inconsistent with Host index 0x%x: delta 0x%x",
2163 i, vdev->vq[i].vring.num,
2164 vring_avail_idx(&vdev->vq[i]),
2165 vdev->vq[i].last_avail_idx, nheads);
2166 return -1;
2168 vdev->vq[i].used_idx = vring_used_idx(&vdev->vq[i]);
2169 vdev->vq[i].shadow_avail_idx = vring_avail_idx(&vdev->vq[i]);
2172 * Some devices migrate VirtQueueElements that have been popped
2173 * from the avail ring but not yet returned to the used ring.
2174 * Since max ring size < UINT16_MAX it's safe to use modulo
2175 * UINT16_MAX + 1 subtraction.
2177 vdev->vq[i].inuse = (uint16_t)(vdev->vq[i].last_avail_idx -
2178 vdev->vq[i].used_idx);
2179 if (vdev->vq[i].inuse > vdev->vq[i].vring.num) {
2180 error_report("VQ %d size 0x%x < last_avail_idx 0x%x - "
2181 "used_idx 0x%x",
2182 i, vdev->vq[i].vring.num,
2183 vdev->vq[i].last_avail_idx,
2184 vdev->vq[i].used_idx);
2185 return -1;
2189 rcu_read_unlock();
2191 return 0;
2194 void virtio_cleanup(VirtIODevice *vdev)
2196 qemu_del_vm_change_state_handler(vdev->vmstate);
2199 static void virtio_vmstate_change(void *opaque, int running, RunState state)
2201 VirtIODevice *vdev = opaque;
2202 BusState *qbus = qdev_get_parent_bus(DEVICE(vdev));
2203 VirtioBusClass *k = VIRTIO_BUS_GET_CLASS(qbus);
2204 bool backend_run = running && (vdev->status & VIRTIO_CONFIG_S_DRIVER_OK);
2205 vdev->vm_running = running;
2207 if (backend_run) {
2208 virtio_set_status(vdev, vdev->status);
2211 if (k->vmstate_change) {
2212 k->vmstate_change(qbus->parent, backend_run);
2215 if (!backend_run) {
2216 virtio_set_status(vdev, vdev->status);
2220 void virtio_instance_init_common(Object *proxy_obj, void *data,
2221 size_t vdev_size, const char *vdev_name)
2223 DeviceState *vdev = data;
2225 object_initialize(vdev, vdev_size, vdev_name);
2226 object_property_add_child(proxy_obj, "virtio-backend", OBJECT(vdev), NULL);
2227 object_unref(OBJECT(vdev));
2228 qdev_alias_all_properties(vdev, proxy_obj);
2231 void virtio_init(VirtIODevice *vdev, const char *name,
2232 uint16_t device_id, size_t config_size)
2234 BusState *qbus = qdev_get_parent_bus(DEVICE(vdev));
2235 VirtioBusClass *k = VIRTIO_BUS_GET_CLASS(qbus);
2236 int i;
2237 int nvectors = k->query_nvectors ? k->query_nvectors(qbus->parent) : 0;
2239 if (nvectors) {
2240 vdev->vector_queues =
2241 g_malloc0(sizeof(*vdev->vector_queues) * nvectors);
2244 vdev->device_id = device_id;
2245 vdev->status = 0;
2246 atomic_set(&vdev->isr, 0);
2247 vdev->queue_sel = 0;
2248 vdev->config_vector = VIRTIO_NO_VECTOR;
2249 vdev->vq = g_malloc0(sizeof(VirtQueue) * VIRTIO_QUEUE_MAX);
2250 vdev->vm_running = runstate_is_running();
2251 vdev->broken = false;
2252 for (i = 0; i < VIRTIO_QUEUE_MAX; i++) {
2253 vdev->vq[i].vector = VIRTIO_NO_VECTOR;
2254 vdev->vq[i].vdev = vdev;
2255 vdev->vq[i].queue_index = i;
2258 vdev->name = name;
2259 vdev->config_len = config_size;
2260 if (vdev->config_len) {
2261 vdev->config = g_malloc0(config_size);
2262 } else {
2263 vdev->config = NULL;
2265 vdev->vmstate = qemu_add_vm_change_state_handler(virtio_vmstate_change,
2266 vdev);
2267 vdev->device_endian = virtio_default_endian();
2268 vdev->use_guest_notifier_mask = true;
2271 hwaddr virtio_queue_get_desc_addr(VirtIODevice *vdev, int n)
2273 return vdev->vq[n].vring.desc;
2276 hwaddr virtio_queue_get_avail_addr(VirtIODevice *vdev, int n)
2278 return vdev->vq[n].vring.avail;
2281 hwaddr virtio_queue_get_used_addr(VirtIODevice *vdev, int n)
2283 return vdev->vq[n].vring.used;
2286 hwaddr virtio_queue_get_desc_size(VirtIODevice *vdev, int n)
2288 return sizeof(VRingDesc) * vdev->vq[n].vring.num;
2291 hwaddr virtio_queue_get_avail_size(VirtIODevice *vdev, int n)
2293 return offsetof(VRingAvail, ring) +
2294 sizeof(uint16_t) * vdev->vq[n].vring.num;
2297 hwaddr virtio_queue_get_used_size(VirtIODevice *vdev, int n)
2299 return offsetof(VRingUsed, ring) +
2300 sizeof(VRingUsedElem) * vdev->vq[n].vring.num;
2303 uint16_t virtio_queue_get_last_avail_idx(VirtIODevice *vdev, int n)
2305 return vdev->vq[n].last_avail_idx;
2308 void virtio_queue_set_last_avail_idx(VirtIODevice *vdev, int n, uint16_t idx)
2310 vdev->vq[n].last_avail_idx = idx;
2311 vdev->vq[n].shadow_avail_idx = idx;
2314 void virtio_queue_update_used_idx(VirtIODevice *vdev, int n)
2316 rcu_read_lock();
2317 if (vdev->vq[n].vring.desc) {
2318 vdev->vq[n].used_idx = vring_used_idx(&vdev->vq[n]);
2320 rcu_read_unlock();
2323 void virtio_queue_invalidate_signalled_used(VirtIODevice *vdev, int n)
2325 vdev->vq[n].signalled_used_valid = false;
2328 VirtQueue *virtio_get_queue(VirtIODevice *vdev, int n)
2330 return vdev->vq + n;
2333 uint16_t virtio_get_queue_index(VirtQueue *vq)
2335 return vq->queue_index;
2338 static void virtio_queue_guest_notifier_read(EventNotifier *n)
2340 VirtQueue *vq = container_of(n, VirtQueue, guest_notifier);
2341 if (event_notifier_test_and_clear(n)) {
2342 virtio_irq(vq);
2346 void virtio_queue_set_guest_notifier_fd_handler(VirtQueue *vq, bool assign,
2347 bool with_irqfd)
2349 if (assign && !with_irqfd) {
2350 event_notifier_set_handler(&vq->guest_notifier,
2351 virtio_queue_guest_notifier_read);
2352 } else {
2353 event_notifier_set_handler(&vq->guest_notifier, NULL);
2355 if (!assign) {
2356 /* Test and clear notifier before closing it,
2357 * in case poll callback didn't have time to run. */
2358 virtio_queue_guest_notifier_read(&vq->guest_notifier);
2362 EventNotifier *virtio_queue_get_guest_notifier(VirtQueue *vq)
2364 return &vq->guest_notifier;
2367 static void virtio_queue_host_notifier_aio_read(EventNotifier *n)
2369 VirtQueue *vq = container_of(n, VirtQueue, host_notifier);
2370 if (event_notifier_test_and_clear(n)) {
2371 virtio_queue_notify_aio_vq(vq);
2375 static void virtio_queue_host_notifier_aio_poll_begin(EventNotifier *n)
2377 VirtQueue *vq = container_of(n, VirtQueue, host_notifier);
2379 virtio_queue_set_notification(vq, 0);
2382 static bool virtio_queue_host_notifier_aio_poll(void *opaque)
2384 EventNotifier *n = opaque;
2385 VirtQueue *vq = container_of(n, VirtQueue, host_notifier);
2386 bool progress;
2388 if (!vq->vring.desc || virtio_queue_empty(vq)) {
2389 return false;
2392 progress = virtio_queue_notify_aio_vq(vq);
2394 /* In case the handler function re-enabled notifications */
2395 virtio_queue_set_notification(vq, 0);
2396 return progress;
2399 static void virtio_queue_host_notifier_aio_poll_end(EventNotifier *n)
2401 VirtQueue *vq = container_of(n, VirtQueue, host_notifier);
2403 /* Caller polls once more after this to catch requests that race with us */
2404 virtio_queue_set_notification(vq, 1);
2407 void virtio_queue_aio_set_host_notifier_handler(VirtQueue *vq, AioContext *ctx,
2408 VirtIOHandleAIOOutput handle_output)
2410 if (handle_output) {
2411 vq->handle_aio_output = handle_output;
2412 aio_set_event_notifier(ctx, &vq->host_notifier, true,
2413 virtio_queue_host_notifier_aio_read,
2414 virtio_queue_host_notifier_aio_poll);
2415 aio_set_event_notifier_poll(ctx, &vq->host_notifier,
2416 virtio_queue_host_notifier_aio_poll_begin,
2417 virtio_queue_host_notifier_aio_poll_end);
2418 } else {
2419 aio_set_event_notifier(ctx, &vq->host_notifier, true, NULL, NULL);
2420 /* Test and clear notifier before after disabling event,
2421 * in case poll callback didn't have time to run. */
2422 virtio_queue_host_notifier_aio_read(&vq->host_notifier);
2423 vq->handle_aio_output = NULL;
2427 void virtio_queue_host_notifier_read(EventNotifier *n)
2429 VirtQueue *vq = container_of(n, VirtQueue, host_notifier);
2430 if (event_notifier_test_and_clear(n)) {
2431 virtio_queue_notify_vq(vq);
2435 EventNotifier *virtio_queue_get_host_notifier(VirtQueue *vq)
2437 return &vq->host_notifier;
2440 void virtio_device_set_child_bus_name(VirtIODevice *vdev, char *bus_name)
2442 g_free(vdev->bus_name);
2443 vdev->bus_name = g_strdup(bus_name);
2446 void GCC_FMT_ATTR(2, 3) virtio_error(VirtIODevice *vdev, const char *fmt, ...)
2448 va_list ap;
2450 va_start(ap, fmt);
2451 error_vreport(fmt, ap);
2452 va_end(ap);
2454 if (virtio_vdev_has_feature(vdev, VIRTIO_F_VERSION_1)) {
2455 virtio_set_status(vdev, vdev->status | VIRTIO_CONFIG_S_NEEDS_RESET);
2456 virtio_notify_config(vdev);
2459 vdev->broken = true;
2462 static void virtio_memory_listener_commit(MemoryListener *listener)
2464 VirtIODevice *vdev = container_of(listener, VirtIODevice, listener);
2465 int i;
2467 for (i = 0; i < VIRTIO_QUEUE_MAX; i++) {
2468 if (vdev->vq[i].vring.num == 0) {
2469 break;
2471 virtio_init_region_cache(vdev, i);
2475 static void virtio_device_realize(DeviceState *dev, Error **errp)
2477 VirtIODevice *vdev = VIRTIO_DEVICE(dev);
2478 VirtioDeviceClass *vdc = VIRTIO_DEVICE_GET_CLASS(dev);
2479 Error *err = NULL;
2481 /* Devices should either use vmsd or the load/save methods */
2482 assert(!vdc->vmsd || !vdc->load);
2484 if (vdc->realize != NULL) {
2485 vdc->realize(dev, &err);
2486 if (err != NULL) {
2487 error_propagate(errp, err);
2488 return;
2492 virtio_bus_device_plugged(vdev, &err);
2493 if (err != NULL) {
2494 error_propagate(errp, err);
2495 return;
2498 vdev->listener.commit = virtio_memory_listener_commit;
2499 memory_listener_register(&vdev->listener, vdev->dma_as);
2502 static void virtio_device_unrealize(DeviceState *dev, Error **errp)
2504 VirtIODevice *vdev = VIRTIO_DEVICE(dev);
2505 VirtioDeviceClass *vdc = VIRTIO_DEVICE_GET_CLASS(dev);
2506 Error *err = NULL;
2508 virtio_bus_device_unplugged(vdev);
2510 if (vdc->unrealize != NULL) {
2511 vdc->unrealize(dev, &err);
2512 if (err != NULL) {
2513 error_propagate(errp, err);
2514 return;
2518 g_free(vdev->bus_name);
2519 vdev->bus_name = NULL;
2522 static void virtio_device_free_virtqueues(VirtIODevice *vdev)
2524 int i;
2525 if (!vdev->vq) {
2526 return;
2529 for (i = 0; i < VIRTIO_QUEUE_MAX; i++) {
2530 if (vdev->vq[i].vring.num == 0) {
2531 break;
2533 virtio_virtqueue_reset_region_cache(&vdev->vq[i]);
2535 g_free(vdev->vq);
2538 static void virtio_device_instance_finalize(Object *obj)
2540 VirtIODevice *vdev = VIRTIO_DEVICE(obj);
2542 memory_listener_unregister(&vdev->listener);
2543 virtio_device_free_virtqueues(vdev);
2545 g_free(vdev->config);
2546 g_free(vdev->vector_queues);
2549 static Property virtio_properties[] = {
2550 DEFINE_VIRTIO_COMMON_FEATURES(VirtIODevice, host_features),
2551 DEFINE_PROP_END_OF_LIST(),
2554 static int virtio_device_start_ioeventfd_impl(VirtIODevice *vdev)
2556 VirtioBusState *qbus = VIRTIO_BUS(qdev_get_parent_bus(DEVICE(vdev)));
2557 int n, r, err;
2559 for (n = 0; n < VIRTIO_QUEUE_MAX; n++) {
2560 VirtQueue *vq = &vdev->vq[n];
2561 if (!virtio_queue_get_num(vdev, n)) {
2562 continue;
2564 r = virtio_bus_set_host_notifier(qbus, n, true);
2565 if (r < 0) {
2566 err = r;
2567 goto assign_error;
2569 event_notifier_set_handler(&vq->host_notifier,
2570 virtio_queue_host_notifier_read);
2573 for (n = 0; n < VIRTIO_QUEUE_MAX; n++) {
2574 /* Kick right away to begin processing requests already in vring */
2575 VirtQueue *vq = &vdev->vq[n];
2576 if (!vq->vring.num) {
2577 continue;
2579 event_notifier_set(&vq->host_notifier);
2581 return 0;
2583 assign_error:
2584 while (--n >= 0) {
2585 VirtQueue *vq = &vdev->vq[n];
2586 if (!virtio_queue_get_num(vdev, n)) {
2587 continue;
2590 event_notifier_set_handler(&vq->host_notifier, NULL);
2591 r = virtio_bus_set_host_notifier(qbus, n, false);
2592 assert(r >= 0);
2594 return err;
2597 int virtio_device_start_ioeventfd(VirtIODevice *vdev)
2599 BusState *qbus = qdev_get_parent_bus(DEVICE(vdev));
2600 VirtioBusState *vbus = VIRTIO_BUS(qbus);
2602 return virtio_bus_start_ioeventfd(vbus);
2605 static void virtio_device_stop_ioeventfd_impl(VirtIODevice *vdev)
2607 VirtioBusState *qbus = VIRTIO_BUS(qdev_get_parent_bus(DEVICE(vdev)));
2608 int n, r;
2610 for (n = 0; n < VIRTIO_QUEUE_MAX; n++) {
2611 VirtQueue *vq = &vdev->vq[n];
2613 if (!virtio_queue_get_num(vdev, n)) {
2614 continue;
2616 event_notifier_set_handler(&vq->host_notifier, NULL);
2617 r = virtio_bus_set_host_notifier(qbus, n, false);
2618 assert(r >= 0);
2622 void virtio_device_stop_ioeventfd(VirtIODevice *vdev)
2624 BusState *qbus = qdev_get_parent_bus(DEVICE(vdev));
2625 VirtioBusState *vbus = VIRTIO_BUS(qbus);
2627 virtio_bus_stop_ioeventfd(vbus);
2630 int virtio_device_grab_ioeventfd(VirtIODevice *vdev)
2632 BusState *qbus = qdev_get_parent_bus(DEVICE(vdev));
2633 VirtioBusState *vbus = VIRTIO_BUS(qbus);
2635 return virtio_bus_grab_ioeventfd(vbus);
2638 void virtio_device_release_ioeventfd(VirtIODevice *vdev)
2640 BusState *qbus = qdev_get_parent_bus(DEVICE(vdev));
2641 VirtioBusState *vbus = VIRTIO_BUS(qbus);
2643 virtio_bus_release_ioeventfd(vbus);
2646 static void virtio_device_class_init(ObjectClass *klass, void *data)
2648 /* Set the default value here. */
2649 VirtioDeviceClass *vdc = VIRTIO_DEVICE_CLASS(klass);
2650 DeviceClass *dc = DEVICE_CLASS(klass);
2652 dc->realize = virtio_device_realize;
2653 dc->unrealize = virtio_device_unrealize;
2654 dc->bus_type = TYPE_VIRTIO_BUS;
2655 dc->props = virtio_properties;
2656 vdc->start_ioeventfd = virtio_device_start_ioeventfd_impl;
2657 vdc->stop_ioeventfd = virtio_device_stop_ioeventfd_impl;
2659 vdc->legacy_features |= VIRTIO_LEGACY_FEATURES;
2662 bool virtio_device_ioeventfd_enabled(VirtIODevice *vdev)
2664 BusState *qbus = qdev_get_parent_bus(DEVICE(vdev));
2665 VirtioBusState *vbus = VIRTIO_BUS(qbus);
2667 return virtio_bus_ioeventfd_enabled(vbus);
2670 static const TypeInfo virtio_device_info = {
2671 .name = TYPE_VIRTIO_DEVICE,
2672 .parent = TYPE_DEVICE,
2673 .instance_size = sizeof(VirtIODevice),
2674 .class_init = virtio_device_class_init,
2675 .instance_finalize = virtio_device_instance_finalize,
2676 .abstract = true,
2677 .class_size = sizeof(VirtioDeviceClass),
2680 static void virtio_register_types(void)
2682 type_register_static(&virtio_device_info);
2685 type_init(virtio_register_types)