2019-04-18 17:32:41 +00:00
|
|
|
// Copyright 2018 The Chromium OS Authors. All rights reserved.
|
|
|
|
// Use of this source code is governed by a BSD-style license that can be
|
2019-05-08 10:22:53 +00:00
|
|
|
// found in the LICENSE-BSD-3-Clause file.
|
|
|
|
//
|
|
|
|
// Copyright © 2019 Intel Corporation
|
|
|
|
//
|
|
|
|
// SPDX-License-Identifier: Apache-2.0 AND BSD-3-Clause
|
2019-04-18 17:32:41 +00:00
|
|
|
|
|
|
|
extern crate devices;
|
|
|
|
extern crate pci;
|
|
|
|
extern crate vm_allocator;
|
|
|
|
extern crate vm_memory;
|
|
|
|
extern crate vmm_sys_util;
|
|
|
|
|
|
|
|
use libc::EFD_NONBLOCK;
|
|
|
|
use std::sync::atomic::{AtomicUsize, Ordering};
|
|
|
|
use std::sync::Arc;
|
2019-05-29 23:33:29 +00:00
|
|
|
use std::sync::Mutex;
|
2019-04-18 17:32:41 +00:00
|
|
|
|
|
|
|
use devices::BusDevice;
|
|
|
|
use pci::{
|
2019-06-05 16:53:24 +00:00
|
|
|
InterruptDelivery, InterruptParameters, MsixCap, MsixConfig, PciBarConfiguration,
|
|
|
|
PciCapability, PciCapabilityID, PciClassCode, PciConfiguration, PciDevice, PciDeviceError,
|
2019-07-02 15:16:11 +00:00
|
|
|
PciHeaderType, PciInterruptPin, PciMassStorageSubclass, PciNetworkControllerSubclass,
|
|
|
|
PciSubclass,
|
2019-04-18 17:32:41 +00:00
|
|
|
};
|
|
|
|
use vm_allocator::SystemAllocator;
|
|
|
|
use vm_memory::{Address, ByteValued, GuestAddress, GuestMemoryMmap, GuestUsize, Le32};
|
|
|
|
use vmm_sys_util::{EventFd, Result};
|
|
|
|
|
|
|
|
use super::VirtioPciCommonConfig;
|
|
|
|
use crate::{
|
2019-07-02 15:16:11 +00:00
|
|
|
Queue, VirtioDevice, VirtioDeviceType, VirtioInterrupt, DEVICE_ACKNOWLEDGE, DEVICE_DRIVER,
|
|
|
|
DEVICE_DRIVER_OK, DEVICE_FAILED, DEVICE_FEATURES_OK, DEVICE_INIT,
|
2019-04-18 17:32:41 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
#[allow(clippy::enum_variant_names)]
|
|
|
|
enum PciCapabilityType {
|
|
|
|
CommonConfig = 1,
|
|
|
|
NotifyConfig = 2,
|
|
|
|
IsrConfig = 3,
|
|
|
|
DeviceConfig = 4,
|
|
|
|
PciConfig = 5,
|
|
|
|
}
|
|
|
|
|
|
|
|
#[allow(dead_code)]
|
|
|
|
#[repr(packed)]
|
|
|
|
#[derive(Clone, Copy, Default)]
|
|
|
|
struct VirtioPciCap {
|
|
|
|
cap_len: u8, // Generic PCI field: capability length
|
|
|
|
cfg_type: u8, // Identifies the structure.
|
|
|
|
pci_bar: u8, // Where to find it.
|
|
|
|
padding: [u8; 3], // Pad to full dword.
|
|
|
|
offset: Le32, // Offset within bar.
|
|
|
|
length: Le32, // Length of the structure, in bytes.
|
|
|
|
}
|
|
|
|
// It is safe to implement ByteValued. All members are simple numbers and any value is valid.
|
|
|
|
unsafe impl ByteValued for VirtioPciCap {}
|
|
|
|
|
|
|
|
impl PciCapability for VirtioPciCap {
|
|
|
|
fn bytes(&self) -> &[u8] {
|
|
|
|
self.as_slice()
|
|
|
|
}
|
|
|
|
|
|
|
|
fn id(&self) -> PciCapabilityID {
|
|
|
|
PciCapabilityID::VendorSpecific
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
const VIRTIO_PCI_CAPABILITY_BYTES: u8 = 16;
|
|
|
|
|
|
|
|
impl VirtioPciCap {
|
|
|
|
pub fn new(cfg_type: PciCapabilityType, pci_bar: u8, offset: u32, length: u32) -> Self {
|
|
|
|
VirtioPciCap {
|
|
|
|
cap_len: VIRTIO_PCI_CAPABILITY_BYTES,
|
|
|
|
cfg_type: cfg_type as u8,
|
|
|
|
pci_bar,
|
|
|
|
padding: [0; 3],
|
|
|
|
offset: Le32::from(offset),
|
|
|
|
length: Le32::from(length),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[allow(dead_code)]
|
|
|
|
#[repr(packed)]
|
|
|
|
#[derive(Clone, Copy, Default)]
|
|
|
|
struct VirtioPciNotifyCap {
|
|
|
|
cap: VirtioPciCap,
|
|
|
|
notify_off_multiplier: Le32,
|
|
|
|
}
|
|
|
|
// It is safe to implement ByteValued. All members are simple numbers and any value is valid.
|
|
|
|
unsafe impl ByteValued for VirtioPciNotifyCap {}
|
|
|
|
|
|
|
|
impl PciCapability for VirtioPciNotifyCap {
|
|
|
|
fn bytes(&self) -> &[u8] {
|
|
|
|
self.as_slice()
|
|
|
|
}
|
|
|
|
|
|
|
|
fn id(&self) -> PciCapabilityID {
|
|
|
|
PciCapabilityID::VendorSpecific
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl VirtioPciNotifyCap {
|
|
|
|
pub fn new(
|
|
|
|
cfg_type: PciCapabilityType,
|
|
|
|
pci_bar: u8,
|
|
|
|
offset: u32,
|
|
|
|
length: u32,
|
|
|
|
multiplier: Le32,
|
|
|
|
) -> Self {
|
|
|
|
VirtioPciNotifyCap {
|
|
|
|
cap: VirtioPciCap {
|
|
|
|
cap_len: std::mem::size_of::<VirtioPciNotifyCap>() as u8,
|
|
|
|
cfg_type: cfg_type as u8,
|
|
|
|
pci_bar,
|
|
|
|
padding: [0; 3],
|
|
|
|
offset: Le32::from(offset),
|
|
|
|
length: Le32::from(length),
|
|
|
|
},
|
|
|
|
notify_off_multiplier: multiplier,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[allow(dead_code)]
|
|
|
|
#[derive(Copy, Clone)]
|
|
|
|
pub enum PciVirtioSubclass {
|
|
|
|
NonTransitionalBase = 0xff,
|
|
|
|
}
|
|
|
|
|
|
|
|
impl PciSubclass for PciVirtioSubclass {
|
|
|
|
fn get_register_value(&self) -> u8 {
|
|
|
|
*self as u8
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Allocate one bar for the structs pointed to by the capability structures.
|
2019-06-06 17:15:10 +00:00
|
|
|
// As per the PCI specification, because the same BAR shares MSI-X and non
|
|
|
|
// MSI-X structures, it is recommended to use 8KiB alignment for all those
|
|
|
|
// structures.
|
2019-04-18 17:32:41 +00:00
|
|
|
const COMMON_CONFIG_BAR_OFFSET: u64 = 0x0000;
|
|
|
|
const COMMON_CONFIG_SIZE: u64 = 56;
|
2019-06-06 17:15:10 +00:00
|
|
|
const ISR_CONFIG_BAR_OFFSET: u64 = 0x2000;
|
2019-04-18 17:32:41 +00:00
|
|
|
const ISR_CONFIG_SIZE: u64 = 1;
|
2019-06-06 17:15:10 +00:00
|
|
|
const DEVICE_CONFIG_BAR_OFFSET: u64 = 0x4000;
|
2019-04-18 17:32:41 +00:00
|
|
|
const DEVICE_CONFIG_SIZE: u64 = 0x1000;
|
2019-06-06 17:15:10 +00:00
|
|
|
const NOTIFICATION_BAR_OFFSET: u64 = 0x6000;
|
2019-04-18 17:32:41 +00:00
|
|
|
const NOTIFICATION_SIZE: u64 = 0x1000;
|
2019-06-06 17:15:10 +00:00
|
|
|
const MSIX_TABLE_BAR_OFFSET: u64 = 0x8000;
|
|
|
|
// The size is 256KiB because the table can hold up to 2048 entries, with each
|
|
|
|
// entry being 128 bits (4 DWORDS).
|
|
|
|
const MSIX_TABLE_SIZE: u64 = 0x40000;
|
|
|
|
const MSIX_PBA_BAR_OFFSET: u64 = 0x48000;
|
|
|
|
// The size is 2KiB because the Pending Bit Array has one bit per vector and it
|
|
|
|
// can support up to 2048 vectors.
|
|
|
|
const MSIX_PBA_SIZE: u64 = 0x800;
|
|
|
|
// The BAR size must be a power of 2.
|
|
|
|
const CAPABILITY_BAR_SIZE: u64 = 0x80000;
|
2019-04-18 17:32:41 +00:00
|
|
|
|
|
|
|
const NOTIFY_OFF_MULTIPLIER: u32 = 4; // A dword per notification address.
|
|
|
|
|
|
|
|
const VIRTIO_PCI_VENDOR_ID: u16 = 0x1af4;
|
|
|
|
const VIRTIO_PCI_DEVICE_ID_BASE: u16 = 0x1040; // Add to device type to get device ID.
|
|
|
|
|
|
|
|
pub struct VirtioPciDevice {
|
|
|
|
// PCI configuration registers.
|
|
|
|
configuration: PciConfiguration,
|
|
|
|
|
|
|
|
// virtio PCI common configuration
|
|
|
|
common_config: VirtioPciCommonConfig,
|
|
|
|
|
2019-05-29 23:33:29 +00:00
|
|
|
// MSI-X config
|
2019-06-07 16:19:46 +00:00
|
|
|
msix_config: Option<Arc<Mutex<MsixConfig>>>,
|
2019-05-29 23:33:29 +00:00
|
|
|
|
|
|
|
// Number of MSI-X vectors
|
|
|
|
msix_num: u16,
|
|
|
|
|
2019-04-18 17:32:41 +00:00
|
|
|
// Virtio device reference and status
|
|
|
|
device: Box<VirtioDevice>,
|
|
|
|
device_activated: bool,
|
|
|
|
|
|
|
|
// PCI interrupts.
|
|
|
|
interrupt_status: Arc<AtomicUsize>,
|
2019-06-03 20:57:26 +00:00
|
|
|
interrupt_cb: Option<Arc<VirtioInterrupt>>,
|
2019-04-18 17:32:41 +00:00
|
|
|
|
|
|
|
// virtio queues
|
|
|
|
queues: Vec<Queue>,
|
|
|
|
queue_evts: Vec<EventFd>,
|
|
|
|
|
|
|
|
// Guest memory
|
|
|
|
memory: Option<GuestMemoryMmap>,
|
|
|
|
|
|
|
|
// Setting PCI BAR
|
|
|
|
settings_bar: u8,
|
|
|
|
}
|
|
|
|
|
|
|
|
impl VirtioPciDevice {
|
|
|
|
/// Constructs a new PCI transport for the given virtio device.
|
2019-05-29 23:33:29 +00:00
|
|
|
pub fn new(memory: GuestMemoryMmap, device: Box<VirtioDevice>, msix_num: u16) -> Result<Self> {
|
2019-04-18 17:32:41 +00:00
|
|
|
let mut queue_evts = Vec::new();
|
|
|
|
for _ in device.queue_max_sizes().iter() {
|
|
|
|
queue_evts.push(EventFd::new(EFD_NONBLOCK)?)
|
|
|
|
}
|
|
|
|
let queues = device
|
|
|
|
.queue_max_sizes()
|
|
|
|
.iter()
|
|
|
|
.map(|&s| Queue::new(s))
|
|
|
|
.collect();
|
|
|
|
|
|
|
|
let pci_device_id = VIRTIO_PCI_DEVICE_ID_BASE + device.device_type() as u16;
|
|
|
|
|
2019-06-07 16:19:46 +00:00
|
|
|
let (msix_config, msix_config_clone) = if msix_num > 0 {
|
|
|
|
let msix_config = Arc::new(Mutex::new(MsixConfig::new(msix_num)));
|
|
|
|
let msix_config_clone = msix_config.clone();
|
|
|
|
(Some(msix_config), Some(msix_config_clone))
|
|
|
|
} else {
|
|
|
|
(None, None)
|
|
|
|
};
|
2019-06-07 01:46:11 +00:00
|
|
|
|
2019-07-02 15:16:11 +00:00
|
|
|
let (class, subclass) = match VirtioDeviceType::from(device.device_type()) {
|
|
|
|
VirtioDeviceType::TYPE_NET => (
|
|
|
|
PciClassCode::NetworkController,
|
|
|
|
&PciNetworkControllerSubclass::EthernetController as &PciSubclass,
|
|
|
|
),
|
|
|
|
VirtioDeviceType::TYPE_BLOCK => (
|
|
|
|
PciClassCode::MassStorage,
|
|
|
|
&PciMassStorageSubclass::MassStorage as &PciSubclass,
|
|
|
|
),
|
|
|
|
_ => (
|
|
|
|
PciClassCode::Other,
|
|
|
|
&PciVirtioSubclass::NonTransitionalBase as &PciSubclass,
|
|
|
|
),
|
|
|
|
};
|
|
|
|
|
2019-04-18 17:32:41 +00:00
|
|
|
let configuration = PciConfiguration::new(
|
|
|
|
VIRTIO_PCI_VENDOR_ID,
|
|
|
|
pci_device_id,
|
2019-07-02 15:16:11 +00:00
|
|
|
class,
|
|
|
|
subclass,
|
2019-04-18 17:32:41 +00:00
|
|
|
None,
|
|
|
|
PciHeaderType::Device,
|
|
|
|
VIRTIO_PCI_VENDOR_ID,
|
|
|
|
pci_device_id,
|
2019-06-07 16:19:46 +00:00
|
|
|
msix_config_clone,
|
2019-04-18 17:32:41 +00:00
|
|
|
);
|
|
|
|
|
|
|
|
Ok(VirtioPciDevice {
|
|
|
|
configuration,
|
|
|
|
common_config: VirtioPciCommonConfig {
|
|
|
|
driver_status: 0,
|
|
|
|
config_generation: 0,
|
|
|
|
device_feature_select: 0,
|
|
|
|
driver_feature_select: 0,
|
|
|
|
queue_select: 0,
|
2019-05-29 23:33:29 +00:00
|
|
|
msix_config: 0,
|
2019-04-18 17:32:41 +00:00
|
|
|
},
|
2019-06-07 01:46:11 +00:00
|
|
|
msix_config,
|
2019-05-29 23:33:29 +00:00
|
|
|
msix_num,
|
2019-04-18 17:32:41 +00:00
|
|
|
device,
|
|
|
|
device_activated: false,
|
|
|
|
interrupt_status: Arc::new(AtomicUsize::new(0)),
|
2019-06-03 20:57:26 +00:00
|
|
|
interrupt_cb: None,
|
2019-04-18 17:32:41 +00:00
|
|
|
queues,
|
|
|
|
queue_evts,
|
|
|
|
memory: Some(memory),
|
|
|
|
settings_bar: 0,
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2019-05-06 17:27:40 +00:00
|
|
|
/// Gets the list of queue events that must be triggered whenever the VM writes to
|
|
|
|
/// `virtio::NOTIFY_REG_OFFSET` past the MMIO base. Each event must be triggered when the
|
|
|
|
/// value being written equals the index of the event in this list.
|
|
|
|
pub fn queue_evts(&self) -> &[EventFd] {
|
|
|
|
self.queue_evts.as_slice()
|
|
|
|
}
|
|
|
|
|
2019-04-18 17:32:41 +00:00
|
|
|
fn is_driver_ready(&self) -> bool {
|
|
|
|
let ready_bits =
|
|
|
|
(DEVICE_ACKNOWLEDGE | DEVICE_DRIVER | DEVICE_DRIVER_OK | DEVICE_FEATURES_OK) as u8;
|
|
|
|
self.common_config.driver_status == ready_bits
|
|
|
|
&& self.common_config.driver_status & DEVICE_FAILED as u8 == 0
|
|
|
|
}
|
|
|
|
|
2019-05-08 14:59:39 +00:00
|
|
|
/// Determines if the driver has requested the device (re)init / reset itself
|
|
|
|
fn is_driver_init(&self) -> bool {
|
|
|
|
self.common_config.driver_status == DEVICE_INIT as u8
|
|
|
|
}
|
|
|
|
|
2019-04-18 17:32:41 +00:00
|
|
|
fn are_queues_valid(&self) -> bool {
|
|
|
|
if let Some(mem) = self.memory.as_ref() {
|
|
|
|
self.queues.iter().all(|q| q.is_valid(mem))
|
|
|
|
} else {
|
|
|
|
false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
fn add_pci_capabilities(
|
|
|
|
&mut self,
|
|
|
|
settings_bar: u8,
|
|
|
|
) -> std::result::Result<(), PciDeviceError> {
|
|
|
|
// Add pointers to the different configuration structures from the PCI capabilities.
|
|
|
|
let common_cap = VirtioPciCap::new(
|
|
|
|
PciCapabilityType::CommonConfig,
|
|
|
|
settings_bar,
|
|
|
|
COMMON_CONFIG_BAR_OFFSET as u32,
|
|
|
|
COMMON_CONFIG_SIZE as u32,
|
|
|
|
);
|
|
|
|
self.configuration
|
|
|
|
.add_capability(&common_cap)
|
|
|
|
.map_err(PciDeviceError::CapabilitiesSetup)?;
|
|
|
|
|
|
|
|
let isr_cap = VirtioPciCap::new(
|
|
|
|
PciCapabilityType::IsrConfig,
|
|
|
|
settings_bar,
|
|
|
|
ISR_CONFIG_BAR_OFFSET as u32,
|
|
|
|
ISR_CONFIG_SIZE as u32,
|
|
|
|
);
|
|
|
|
self.configuration
|
|
|
|
.add_capability(&isr_cap)
|
|
|
|
.map_err(PciDeviceError::CapabilitiesSetup)?;
|
|
|
|
|
|
|
|
// TODO(dgreid) - set based on device's configuration size?
|
|
|
|
let device_cap = VirtioPciCap::new(
|
|
|
|
PciCapabilityType::DeviceConfig,
|
|
|
|
settings_bar,
|
|
|
|
DEVICE_CONFIG_BAR_OFFSET as u32,
|
|
|
|
DEVICE_CONFIG_SIZE as u32,
|
|
|
|
);
|
|
|
|
self.configuration
|
|
|
|
.add_capability(&device_cap)
|
|
|
|
.map_err(PciDeviceError::CapabilitiesSetup)?;
|
|
|
|
|
|
|
|
let notify_cap = VirtioPciNotifyCap::new(
|
|
|
|
PciCapabilityType::NotifyConfig,
|
|
|
|
settings_bar,
|
|
|
|
NOTIFICATION_BAR_OFFSET as u32,
|
|
|
|
NOTIFICATION_SIZE as u32,
|
|
|
|
Le32::from(NOTIFY_OFF_MULTIPLIER),
|
|
|
|
);
|
|
|
|
self.configuration
|
|
|
|
.add_capability(¬ify_cap)
|
|
|
|
.map_err(PciDeviceError::CapabilitiesSetup)?;
|
|
|
|
|
|
|
|
//TODO(dgreid) - How will the configuration_cap work?
|
|
|
|
let configuration_cap = VirtioPciCap::new(PciCapabilityType::PciConfig, 0, 0, 0);
|
|
|
|
self.configuration
|
|
|
|
.add_capability(&configuration_cap)
|
|
|
|
.map_err(PciDeviceError::CapabilitiesSetup)?;
|
|
|
|
|
2019-06-07 16:19:46 +00:00
|
|
|
if self.msix_config.is_some() {
|
|
|
|
let msix_cap = MsixCap::new(
|
|
|
|
settings_bar,
|
|
|
|
self.msix_num,
|
|
|
|
MSIX_TABLE_BAR_OFFSET as u32,
|
2019-07-17 00:19:21 +00:00
|
|
|
settings_bar,
|
2019-06-07 16:19:46 +00:00
|
|
|
MSIX_PBA_BAR_OFFSET as u32,
|
|
|
|
);
|
|
|
|
self.configuration
|
|
|
|
.add_capability(&msix_cap)
|
|
|
|
.map_err(PciDeviceError::CapabilitiesSetup)?;
|
|
|
|
}
|
2019-05-29 23:33:29 +00:00
|
|
|
|
2019-04-18 17:32:41 +00:00
|
|
|
self.settings_bar = settings_bar;
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl PciDevice for VirtioPciDevice {
|
2019-06-05 16:53:24 +00:00
|
|
|
fn assign_pin_irq(
|
|
|
|
&mut self,
|
|
|
|
irq_cb: Arc<InterruptDelivery>,
|
|
|
|
irq_num: u32,
|
|
|
|
irq_pin: PciInterruptPin,
|
|
|
|
) {
|
2019-04-18 17:32:41 +00:00
|
|
|
self.configuration.set_irq(irq_num as u8, irq_pin);
|
2019-06-03 20:57:26 +00:00
|
|
|
|
2019-06-05 16:53:24 +00:00
|
|
|
let cb = Arc::new(Box::new(move |_queue: &Queue| {
|
|
|
|
let param = InterruptParameters { msix: None };
|
|
|
|
(irq_cb)(param)
|
|
|
|
}) as VirtioInterrupt);
|
2019-06-03 20:57:26 +00:00
|
|
|
|
|
|
|
self.interrupt_cb = Some(cb);
|
2019-04-18 17:32:41 +00:00
|
|
|
}
|
|
|
|
|
2019-06-05 16:53:24 +00:00
|
|
|
fn assign_msix(&mut self, msi_cb: Arc<InterruptDelivery>) {
|
2019-06-07 16:19:46 +00:00
|
|
|
if let Some(msix_config) = &self.msix_config {
|
|
|
|
msix_config
|
|
|
|
.lock()
|
|
|
|
.unwrap()
|
|
|
|
.register_interrupt_cb(msi_cb.clone());
|
|
|
|
|
|
|
|
let msix_config_clone = msix_config.clone();
|
|
|
|
|
|
|
|
let cb = Arc::new(Box::new(move |queue: &Queue| {
|
|
|
|
let config = &mut msix_config_clone.lock().unwrap();
|
|
|
|
let entry = &config.table_entries[queue.vector as usize];
|
|
|
|
|
|
|
|
// In case the vector control register associated with the entry
|
|
|
|
// has its first bit set, this means the vector is masked and the
|
|
|
|
// device should not inject the interrupt.
|
|
|
|
// Instead, the Pending Bit Array table is updated to reflect there
|
|
|
|
// is a pending interrupt for this specific vector.
|
2019-07-17 00:19:21 +00:00
|
|
|
if config.masked() || entry.masked() {
|
2019-06-07 16:19:46 +00:00
|
|
|
config.set_pba_bit(queue.vector, false);
|
|
|
|
return Ok(());
|
|
|
|
}
|
2019-06-06 19:38:48 +00:00
|
|
|
|
2019-06-07 16:19:46 +00:00
|
|
|
(msi_cb)(InterruptParameters { msix: Some(entry) })
|
|
|
|
}) as VirtioInterrupt);
|
2019-05-29 23:33:29 +00:00
|
|
|
|
2019-06-07 16:19:46 +00:00
|
|
|
self.interrupt_cb = Some(cb);
|
|
|
|
}
|
2019-05-29 23:33:29 +00:00
|
|
|
}
|
|
|
|
|
2019-06-05 09:24:18 +00:00
|
|
|
fn write_config_register(&mut self, reg_idx: usize, offset: u64, data: &[u8]) {
|
|
|
|
self.configuration
|
|
|
|
.write_config_register(reg_idx, offset, data);
|
|
|
|
}
|
|
|
|
|
|
|
|
fn read_config_register(&self, reg_idx: usize) -> u32 {
|
|
|
|
self.configuration.read_reg(reg_idx)
|
|
|
|
}
|
|
|
|
|
2019-05-06 17:27:40 +00:00
|
|
|
fn ioeventfds(&self) -> Vec<(&EventFd, u64, u64)> {
|
|
|
|
let bar0 = self
|
|
|
|
.configuration
|
|
|
|
.get_bar64_addr(self.settings_bar as usize);
|
|
|
|
let notify_base = bar0 + NOTIFICATION_BAR_OFFSET;
|
|
|
|
self.queue_evts()
|
|
|
|
.iter()
|
|
|
|
.enumerate()
|
|
|
|
.map(|(i, event)| {
|
|
|
|
(
|
|
|
|
event,
|
|
|
|
notify_base + i as u64 * u64::from(NOTIFY_OFF_MULTIPLIER),
|
|
|
|
i as u64,
|
|
|
|
)
|
|
|
|
})
|
|
|
|
.collect()
|
|
|
|
}
|
|
|
|
|
2019-04-18 17:32:41 +00:00
|
|
|
fn allocate_bars(
|
|
|
|
&mut self,
|
|
|
|
allocator: &mut SystemAllocator,
|
|
|
|
) -> std::result::Result<Vec<(GuestAddress, GuestUsize)>, PciDeviceError> {
|
|
|
|
let mut ranges = Vec::new();
|
|
|
|
|
|
|
|
// Allocate the virtio-pci capability BAR.
|
|
|
|
// See http://docs.oasis-open.org/virtio/virtio/v1.0/cs04/virtio-v1.0-cs04.html#x1-740004
|
|
|
|
let virtio_pci_bar_addr = allocator
|
|
|
|
.allocate_mmio_addresses(None, CAPABILITY_BAR_SIZE)
|
|
|
|
.ok_or(PciDeviceError::IoAllocationFailed(CAPABILITY_BAR_SIZE))?;
|
|
|
|
let config = PciBarConfiguration::default()
|
|
|
|
.set_register_index(0)
|
|
|
|
.set_address(virtio_pci_bar_addr.raw_value())
|
|
|
|
.set_size(CAPABILITY_BAR_SIZE);
|
|
|
|
let virtio_pci_bar =
|
|
|
|
self.configuration.add_pci_bar(&config).map_err(|e| {
|
|
|
|
PciDeviceError::IoRegistrationFailed(virtio_pci_bar_addr.raw_value(), e)
|
|
|
|
})? as u8;
|
|
|
|
|
|
|
|
ranges.push((virtio_pci_bar_addr, CAPABILITY_BAR_SIZE));
|
|
|
|
|
|
|
|
// Once the BARs are allocated, the capabilities can be added to the PCI configuration.
|
|
|
|
self.add_pci_capabilities(virtio_pci_bar)?;
|
|
|
|
|
|
|
|
// Allocate the device specific BARs.
|
|
|
|
for config in self.device.get_device_bars() {
|
|
|
|
let device_bar_addr = allocator
|
|
|
|
.allocate_mmio_addresses(None, config.get_size())
|
|
|
|
.ok_or_else(|| PciDeviceError::IoAllocationFailed(config.get_size()))?;
|
|
|
|
config.set_address(device_bar_addr.raw_value());
|
|
|
|
let _device_bar = self.configuration.add_pci_bar(&config).map_err(|e| {
|
|
|
|
PciDeviceError::IoRegistrationFailed(device_bar_addr.raw_value(), e)
|
|
|
|
})?;
|
|
|
|
ranges.push((device_bar_addr, config.get_size()));
|
|
|
|
}
|
|
|
|
|
|
|
|
Ok(ranges)
|
|
|
|
}
|
|
|
|
|
2019-07-02 23:27:38 +00:00
|
|
|
fn read_bar(&mut self, _base: u64, offset: u64, data: &mut [u8]) {
|
2019-04-18 17:32:41 +00:00
|
|
|
match offset {
|
|
|
|
o if o < COMMON_CONFIG_BAR_OFFSET + COMMON_CONFIG_SIZE => self.common_config.read(
|
|
|
|
o - COMMON_CONFIG_BAR_OFFSET,
|
|
|
|
data,
|
|
|
|
&mut self.queues,
|
|
|
|
self.device.as_mut(),
|
|
|
|
),
|
|
|
|
o if ISR_CONFIG_BAR_OFFSET <= o && o < ISR_CONFIG_BAR_OFFSET + ISR_CONFIG_SIZE => {
|
|
|
|
if let Some(v) = data.get_mut(0) {
|
|
|
|
// Reading this register resets it to 0.
|
|
|
|
*v = self.interrupt_status.swap(0, Ordering::SeqCst) as u8;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
o if DEVICE_CONFIG_BAR_OFFSET <= o
|
|
|
|
&& o < DEVICE_CONFIG_BAR_OFFSET + DEVICE_CONFIG_SIZE =>
|
|
|
|
{
|
|
|
|
self.device.read_config(o - DEVICE_CONFIG_BAR_OFFSET, data);
|
|
|
|
}
|
|
|
|
o if NOTIFICATION_BAR_OFFSET <= o
|
|
|
|
&& o < NOTIFICATION_BAR_OFFSET + NOTIFICATION_SIZE =>
|
|
|
|
{
|
|
|
|
// Handled with ioeventfds.
|
|
|
|
}
|
2019-05-29 23:33:29 +00:00
|
|
|
o if MSIX_TABLE_BAR_OFFSET <= o && o < MSIX_TABLE_BAR_OFFSET + MSIX_TABLE_SIZE => {
|
2019-06-07 16:19:46 +00:00
|
|
|
if let Some(msix_config) = &self.msix_config {
|
|
|
|
msix_config
|
|
|
|
.lock()
|
|
|
|
.unwrap()
|
|
|
|
.read_table(o - MSIX_TABLE_BAR_OFFSET, data);
|
|
|
|
}
|
2019-05-29 23:33:29 +00:00
|
|
|
}
|
|
|
|
o if MSIX_PBA_BAR_OFFSET <= o && o < MSIX_PBA_BAR_OFFSET + MSIX_PBA_SIZE => {
|
2019-06-07 16:19:46 +00:00
|
|
|
if let Some(msix_config) = &self.msix_config {
|
|
|
|
msix_config
|
|
|
|
.lock()
|
|
|
|
.unwrap()
|
|
|
|
.read_pba(o - MSIX_PBA_BAR_OFFSET, data);
|
|
|
|
}
|
2019-05-29 23:33:29 +00:00
|
|
|
}
|
2019-04-18 17:32:41 +00:00
|
|
|
_ => (),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-07-02 23:27:38 +00:00
|
|
|
fn write_bar(&mut self, _base: u64, offset: u64, data: &[u8]) {
|
2019-04-18 17:32:41 +00:00
|
|
|
match offset {
|
|
|
|
o if o < COMMON_CONFIG_BAR_OFFSET + COMMON_CONFIG_SIZE => self.common_config.write(
|
|
|
|
o - COMMON_CONFIG_BAR_OFFSET,
|
|
|
|
data,
|
|
|
|
&mut self.queues,
|
|
|
|
self.device.as_mut(),
|
|
|
|
),
|
|
|
|
o if ISR_CONFIG_BAR_OFFSET <= o && o < ISR_CONFIG_BAR_OFFSET + ISR_CONFIG_SIZE => {
|
|
|
|
if let Some(v) = data.get(0) {
|
|
|
|
self.interrupt_status
|
|
|
|
.fetch_and(!(*v as usize), Ordering::SeqCst);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
o if DEVICE_CONFIG_BAR_OFFSET <= o
|
|
|
|
&& o < DEVICE_CONFIG_BAR_OFFSET + DEVICE_CONFIG_SIZE =>
|
|
|
|
{
|
|
|
|
self.device.write_config(o - DEVICE_CONFIG_BAR_OFFSET, data);
|
|
|
|
}
|
|
|
|
o if NOTIFICATION_BAR_OFFSET <= o
|
|
|
|
&& o < NOTIFICATION_BAR_OFFSET + NOTIFICATION_SIZE =>
|
|
|
|
{
|
|
|
|
// Handled with ioeventfds.
|
|
|
|
}
|
2019-05-29 23:33:29 +00:00
|
|
|
o if MSIX_TABLE_BAR_OFFSET <= o && o < MSIX_TABLE_BAR_OFFSET + MSIX_TABLE_SIZE => {
|
2019-06-07 16:19:46 +00:00
|
|
|
if let Some(msix_config) = &self.msix_config {
|
|
|
|
msix_config
|
|
|
|
.lock()
|
|
|
|
.unwrap()
|
|
|
|
.write_table(o - MSIX_TABLE_BAR_OFFSET, data);
|
|
|
|
}
|
2019-05-29 23:33:29 +00:00
|
|
|
}
|
|
|
|
o if MSIX_PBA_BAR_OFFSET <= o && o < MSIX_PBA_BAR_OFFSET + MSIX_PBA_SIZE => {
|
2019-06-07 16:19:46 +00:00
|
|
|
if let Some(msix_config) = &self.msix_config {
|
|
|
|
msix_config
|
|
|
|
.lock()
|
|
|
|
.unwrap()
|
|
|
|
.write_pba(o - MSIX_PBA_BAR_OFFSET, data);
|
|
|
|
}
|
2019-05-29 23:33:29 +00:00
|
|
|
}
|
2019-04-18 17:32:41 +00:00
|
|
|
_ => (),
|
|
|
|
};
|
|
|
|
|
|
|
|
if !self.device_activated && self.is_driver_ready() && self.are_queues_valid() {
|
2019-06-03 20:57:26 +00:00
|
|
|
if let Some(interrupt_cb) = self.interrupt_cb.take() {
|
2019-05-08 14:59:39 +00:00
|
|
|
if self.memory.is_some() {
|
|
|
|
let mem = self.memory.as_ref().unwrap().clone();
|
2019-04-18 17:32:41 +00:00
|
|
|
self.device
|
|
|
|
.activate(
|
|
|
|
mem,
|
2019-06-03 20:57:26 +00:00
|
|
|
interrupt_cb,
|
2019-04-18 17:32:41 +00:00
|
|
|
self.interrupt_status.clone(),
|
|
|
|
self.queues.clone(),
|
|
|
|
self.queue_evts.split_off(0),
|
|
|
|
)
|
2019-06-03 20:57:26 +00:00
|
|
|
.expect("Failed to activate device");
|
2019-04-18 17:32:41 +00:00
|
|
|
self.device_activated = true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2019-05-08 14:59:39 +00:00
|
|
|
|
|
|
|
// Device has been reset by the driver
|
|
|
|
if self.device_activated && self.is_driver_init() {
|
2019-06-03 20:57:26 +00:00
|
|
|
if let Some((interrupt_cb, mut queue_evts)) = self.device.reset() {
|
2019-05-08 14:59:39 +00:00
|
|
|
// Upon reset the device returns its interrupt EventFD and it's queue EventFDs
|
2019-06-03 20:57:26 +00:00
|
|
|
self.interrupt_cb = Some(interrupt_cb);
|
2019-05-08 14:59:39 +00:00
|
|
|
self.queue_evts.append(&mut queue_evts);
|
|
|
|
|
|
|
|
self.device_activated = false;
|
|
|
|
|
|
|
|
// Reset queue readiness (changes queue_enable), queue sizes
|
|
|
|
// and selected_queue as per spec for reset
|
|
|
|
self.queues.iter_mut().for_each(Queue::reset);
|
|
|
|
self.common_config.queue_select = 0;
|
|
|
|
} else {
|
|
|
|
error!("Attempt to reset device when not implemented in underlying device");
|
|
|
|
self.common_config.driver_status = crate::DEVICE_FAILED as u8;
|
|
|
|
}
|
|
|
|
}
|
2019-04-18 17:32:41 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl BusDevice for VirtioPciDevice {
|
2019-07-02 23:27:38 +00:00
|
|
|
fn read(&mut self, base: u64, offset: u64, data: &mut [u8]) {
|
|
|
|
self.read_bar(base, offset, data)
|
2019-04-18 17:32:41 +00:00
|
|
|
}
|
|
|
|
|
2019-07-02 23:27:38 +00:00
|
|
|
fn write(&mut self, base: u64, offset: u64, data: &[u8]) {
|
|
|
|
self.write_bar(base, offset, data)
|
2019-04-18 17:32:41 +00:00
|
|
|
}
|
|
|
|
}
|