Anthony Liguori wrote: > Dor Laor wrote: >> Anthony Liguori wrote: >> >>> Hi Dor, >>> >>> I can't tell if you made any changes to this series. I have to look >>> back to my notes, but I believe it would be okay to pull this series >>> into KVM. I still need to spend some time updating the patchset to >>> be more friendly for QEMU though before resubmitting to qemu-devel. >>> Any help on making it more cross-architecture friendly would be >>> appreciated! >>> >>> >> Hi, >> >> I didn't do any change (except maybe very very minor adjustments for >> it to match existing version, nothing risky). >> The reason I sent it as it is + non-qemu-standard performance >> optimization is to finally have descent performance for KVM IO. >> My next step is to add backward compatibility support for older >> guests and then to implement host kernel module for network. >> > > I have backports up to 2.6.18 although I need to write the awk scripts > to make it automatic. If you can wait until the middle of the week > when I get back into the office, I'll post it. > > Regards, > > Anthony Liguori > Superb, I'll happily wait. >> I hope that someone will pick up the qemu part since it's important >> too, especially the block device and new devices too. >> There is also work in progress to move the balloon driver over virtio. >> Thanks, >> Dor. >> >>> Regards, >>> >>> Anthony Liguori >>> >>> [EMAIL PROTECTED] wrote: >>> >>>> From: Dor Laor <[EMAIL PROTECTED]> >>>> >>>> This patch implements the basic infrastructure for virtio devices. >>>> These >>>> devices are exposed to the guest as real PCI devices. The PCI >>>> vendor/device >>>> IDs have been donated by Qumranet and the subsystem IDs are used to >>>> distinguish >>>> the virtio device itself. >>>> >>>> Virtio provides an abstraction for performing guest=>host and >>>> host=>guest >>>> communications. It also provides a standard ring queue interface >>>> and discovery >>>> mechanism. Finally, virtio provides a simple mechanism for passing >>>> configuration between host and guest. >>>> >>>> In this virtio implementation, we provide these things via normal PCI >>>> operations. The Linux kernel support for this virtio device is >>>> pending in >>>> Rusty's virtio patch queue[1]. They should be submitted once the >>>> merge window >>>> opens again. >>>> >>>> Some future TODOs are to use endian/alignment safe routines when >>>> accessing the >>>> virtqueue so that mixed mode host/guests are supported. >>>> >>>> [1] http://ozlabs.org/~rusty/kernel/hg >>>> >>>> Signed-off-by: Anthony Liguori <[EMAIL PROTECTED]> >>>> Cc: Rusty Russell <[EMAIL PROTECTED]> >>>> Cc: Avi Kivity <[EMAIL PROTECTED]> >>>> Cc: Dor Laor <[EMAIL PROTECTED]> >>>> --- >>>> qemu/Makefile.target | 3 + >>>> qemu/hw/virtio.c | 422 >>>> ++++++++++++++++++++++++++++++++++++++++++++++++++ >>>> qemu/hw/virtio.h | 143 +++++++++++++++++ >>>> 3 files changed, 568 insertions(+), 0 deletions(-) >>>> create mode 100644 qemu/hw/virtio.c >>>> create mode 100644 qemu/hw/virtio.h >>>> >>>> diff --git a/qemu/Makefile.target b/qemu/Makefile.target >>>> index 12fb043..8b5853b 100644 >>>> --- a/qemu/Makefile.target >>>> +++ b/qemu/Makefile.target >>>> @@ -463,6 +463,9 @@ VL_OBJS += rtl8139.o >>>> # PCI Hypercall >>>> VL_OBJS+= hypercall.o >>>> >>>> +# virtio devices >>>> +VL_OBJS += virtio.o >>>> + >>>> ifeq ($(TARGET_BASE_ARCH), i386) >>>> # Hardware support >>>> VL_OBJS+= ide.o pckbd.o ps2.o vga.o $(SOUND_HW) dma.o >>>> diff --git a/qemu/hw/virtio.c b/qemu/hw/virtio.c >>>> new file mode 100644 >>>> index 0000000..6a1d380 >>>> --- /dev/null >>>> +++ b/qemu/hw/virtio.c >>>> @@ -0,0 +1,422 @@ >>>> +/* >>>> + * Virtio Support >>>> + * >>>> + * Copyright IBM, Corp. 2007 >>>> + * >>>> + * Authors: >>>> + * Anthony Liguori <[EMAIL PROTECTED]> >>>> + * >>>> + * This work is licensed under the terms of the GNU GPL, version >>>> 2. See >>>> + * the COPYING file in the top-level directory. >>>> + * >>>> + */ >>>> + >>>> +#include <inttypes.h> >>>> +#include <err.h> >>>> + >>>> +#include "virtio.h" >>>> +#include "sysemu.h" >>>> + >>>> +/* from Linux's linux/virtio_pci.h */ >>>> + >>>> +/* A 32-bit r/o bitmask of the features supported by the host */ >>>> +#define VIRTIO_PCI_HOST_FEATURES 0 >>>> + >>>> +/* A 32-bit r/w bitmask of features activated by the guest */ >>>> +#define VIRTIO_PCI_GUEST_FEATURES 4 >>>> + >>>> +/* A 32-bit r/w PFN for the currently selected queue */ >>>> +#define VIRTIO_PCI_QUEUE_PFN 8 >>>> + >>>> +/* A 16-bit r/o queue size for the currently selected queue */ >>>> +#define VIRTIO_PCI_QUEUE_NUM 12 >>>> + >>>> +/* A 16-bit r/w queue selector */ >>>> +#define VIRTIO_PCI_QUEUE_SEL 14 >>>> + >>>> +/* A 16-bit r/w queue notifier */ >>>> +#define VIRTIO_PCI_QUEUE_NOTIFY 16 >>>> + >>>> +/* An 8-bit device status register. */ >>>> +#define VIRTIO_PCI_STATUS 18 >>>> + >>>> +/* An 8-bit r/o interrupt status register. Reading the value will >>>> return the >>>> + * current contents of the ISR and will also clear it. This is >>>> effectively >>>> + * a read-and-acknowledge. */ >>>> +#define VIRTIO_PCI_ISR 19 >>>> + >>>> +#define VIRTIO_PCI_CONFIG 20 >>>> + >>>> +/* QEMU doesn't strictly need write barriers since everything runs in >>>> + * lock-step. We'll leave the calls to wmb() in though to make it >>>> obvious for >>>> + * KVM or if kqemu gets SMP support. >>>> + */ >>>> +#define wmb() do { } while (0) >>>> + >>>> +/* virt queue functions */ >>>> + >>>> +static void virtqueue_init(VirtQueue *vq, void *p) >>>> +{ >>>> + vq->vring.desc = p; >>>> + vq->vring.avail = p + vq->vring.num * sizeof(VRingDesc); >>>> + vq->vring.used = (void *)TARGET_PAGE_ALIGN((unsigned >>>> long)&vq->vring.avail->ring[vq->vring.num]); >>>> +} >>>> + >>>> +static unsigned virtqueue_next_desc(VirtQueue *vq, unsigned int i) >>>> +{ >>>> + unsigned int next; >>>> + >>>> + /* If this descriptor says it doesn't chain, we're done. */ >>>> + if (!(vq->vring.desc[i].flags & VRING_DESC_F_NEXT)) >>>> + return vq->vring.num; >>>> + >>>> + /* Check they're not leading us off end of descriptors. */ >>>> + next = vq->vring.desc[i].next; >>>> + /* Make sure compiler knows to grab that: we don't want it >>>> changing! */ >>>> + wmb(); >>>> + >>>> + if (next >= vq->vring.num) >>>> + errx(1, "Desc next is %u", next); >>>> + >>>> + return next; >>>> +} >>>> + >>>> +void virtqueue_push(VirtQueue *vq, const VirtQueueElement *elem, >>>> + unsigned int len) >>>> +{ >>>> + VRingUsedElem *used; >>>> + >>>> + /* Get a pointer to the next entry in the used ring. */ >>>> + used = &vq->vring.used->ring[vq->vring.used->idx % >>>> vq->vring.num]; >>>> + used->id = elem->index; >>>> + used->len = len; >>>> + /* Make sure buffer is written before we update index. */ >>>> + wmb(); >>>> + vq->vring.used->idx++; >>>> +} >>>> + >>>> +int virtqueue_pop(VirtQueue *vq, VirtQueueElement *elem) >>>> +{ >>>> + unsigned int i, head; >>>> + unsigned int position; >>>> + >>>> + /* Check it isn't doing very strange things with descriptor >>>> numbers. */ >>>> + if ((uint16_t)(vq->vring.avail->idx - vq->last_avail_idx) > >>>> vq->vring.num) >>>> + errx(1, "Guest moved used index from %u to %u", >>>> + vq->last_avail_idx, vq->vring.avail->idx); >>>> + >>>> + /* If there's nothing new since last we looked, return >>>> invalid. */ >>>> + if (vq->vring.avail->idx == vq->last_avail_idx) >>>> + return 0; >>>> + >>>> + /* Grab the next descriptor number they're advertising, and >>>> increment >>>> + * the index we've seen. */ >>>> + head = vq->vring.avail->ring[vq->last_avail_idx++ % >>>> vq->vring.num]; >>>> + >>>> + /* If their number is silly, that's a fatal mistake. */ >>>> + if (head >= vq->vring.num) >>>> + errx(1, "Guest says index %u is available", head); >>>> + >>>> + /* When we start there are none of either input nor output. */ >>>> + position = elem->out_num = elem->in_num = 0; >>>> + >>>> + i = head; >>>> + do { >>>> + struct iovec *sg; >>>> + >>>> + if ((vq->vring.desc[i].addr + vq->vring.desc[i].len) > ram_size) >>>> + errx(1, "Guest sent invalid pointer"); >>>> + >>>> + if (vq->vring.desc[i].flags & VRING_DESC_F_WRITE) >>>> + sg = &elem->in_sg[elem->in_num++]; >>>> + else >>>> + sg = &elem->out_sg[elem->out_num++]; >>>> + >>>> + /* Grab the first descriptor, and check it's OK. */ >>>> + sg->iov_len = vq->vring.desc[i].len; >>>> + sg->iov_base = phys_ram_base + vq->vring.desc[i].addr; >>>> + >>>> + /* If we've got too many, that implies a descriptor loop. */ >>>> + if ((elem->in_num + elem->out_num) > vq->vring.num) >>>> + errx(1, "Looped descriptor"); >>>> + } while ((i = virtqueue_next_desc(vq, i)) != vq->vring.num); >>>> + >>>> + elem->index = head; >>>> + >>>> + return elem->in_num + elem->out_num; >>>> +} >>>> + >>>> +/* virtio device */ >>>> + >>>> +static VirtIODevice *to_virtio_device(PCIDevice *pci_dev) >>>> +{ >>>> + return (VirtIODevice *)pci_dev; >>>> +} >>>> + >>>> +static void virtio_update_irq(VirtIODevice *vdev) >>>> +{ >>>> + qemu_set_irq(vdev->pci_dev.irq[0], vdev->isr & 1); >>>> +} >>>> + >>>> +static void virtio_ioport_write(void *opaque, uint32_t addr, >>>> uint32_t val) >>>> +{ >>>> + VirtIODevice *vdev = to_virtio_device(opaque); >>>> + ram_addr_t pa; >>>> + >>>> + addr -= vdev->addr; >>>> + >>>> + switch (addr) { >>>> + case VIRTIO_PCI_GUEST_FEATURES: >>>> + if (vdev->set_features) >>>> + vdev->set_features(vdev, val); >>>> + vdev->features = val; >>>> + break; >>>> + case VIRTIO_PCI_QUEUE_PFN: >>>> + pa = (ram_addr_t)val << TARGET_PAGE_BITS; >>>> + vdev->vq[vdev->queue_sel].pfn = val; >>>> + if (pa == 0) { >>>> + vdev->vq[vdev->queue_sel].vring.desc = NULL; >>>> + vdev->vq[vdev->queue_sel].vring.avail = NULL; >>>> + vdev->vq[vdev->queue_sel].vring.used = NULL; >>>> + } else if (pa < (ram_size - TARGET_PAGE_SIZE)) { >>>> + virtqueue_init(&vdev->vq[vdev->queue_sel], phys_ram_base + >>>> pa); >>>> + /* FIXME if pa == 0, deal with device tear down */ >>>> + } >>>> + break; >>>> + case VIRTIO_PCI_QUEUE_SEL: >>>> + if (val < VIRTIO_PCI_QUEUE_MAX) >>>> + vdev->queue_sel = val; >>>> + break; >>>> + case VIRTIO_PCI_QUEUE_NOTIFY: >>>> + if (val < VIRTIO_PCI_QUEUE_MAX && vdev->vq[val].vring.desc) >>>> + vdev->vq[val].handle_output(vdev, &vdev->vq[val]); >>>> + break; >>>> + case VIRTIO_PCI_STATUS: >>>> + vdev->status = val & 0xFF; >>>> + break; >>>> + } >>>> +} >>>> + >>>> +static uint32_t virtio_ioport_read(void *opaque, uint32_t addr) >>>> +{ >>>> + VirtIODevice *vdev = to_virtio_device(opaque); >>>> + uint32_t ret = 0xFFFFFFFF; >>>> + >>>> + addr -= vdev->addr; >>>> + >>>> + switch (addr) { >>>> + case VIRTIO_PCI_HOST_FEATURES: >>>> + ret = vdev->get_features(vdev); >>>> + break; >>>> + case VIRTIO_PCI_GUEST_FEATURES: >>>> + ret = vdev->features; >>>> + break; >>>> + case VIRTIO_PCI_QUEUE_PFN: >>>> + ret = vdev->vq[vdev->queue_sel].pfn; >>>> + break; >>>> + case VIRTIO_PCI_QUEUE_NUM: >>>> + ret = vdev->vq[vdev->queue_sel].vring.num; >>>> + break; >>>> + case VIRTIO_PCI_QUEUE_SEL: >>>> + ret = vdev->queue_sel; >>>> + break; >>>> + case VIRTIO_PCI_STATUS: >>>> + ret = vdev->status; >>>> + break; >>>> + case VIRTIO_PCI_ISR: >>>> + /* reading from the ISR also clears it. */ >>>> + ret = vdev->isr; >>>> + vdev->isr = 0; >>>> + virtio_update_irq(vdev); >>>> + break; >>>> + default: >>>> + break; >>>> + } >>>> + >>>> + return ret; >>>> +} >>>> + >>>> +static uint32_t virtio_config_readb(void *opaque, uint32_t addr) >>>> +{ >>>> + VirtIODevice *vdev = opaque; >>>> + uint8_t val; >>>> + >>>> + addr -= vdev->addr + VIRTIO_PCI_CONFIG; >>>> + if (addr > (vdev->config_len - sizeof(val))) >>>> + return (uint32_t)-1; >>>> + >>>> + memcpy(&val, vdev->config + addr, sizeof(val)); >>>> + return val; >>>> +} >>>> + >>>> +static uint32_t virtio_config_readw(void *opaque, uint32_t addr) >>>> +{ >>>> + VirtIODevice *vdev = opaque; >>>> + uint16_t val; >>>> + >>>> + addr -= vdev->addr + VIRTIO_PCI_CONFIG; >>>> + if (addr > (vdev->config_len - sizeof(val))) >>>> + return (uint32_t)-1; >>>> + >>>> + memcpy(&val, vdev->config + addr, sizeof(val)); >>>> + return val; >>>> +} >>>> + >>>> +static uint32_t virtio_config_readl(void *opaque, uint32_t addr) >>>> +{ >>>> + VirtIODevice *vdev = opaque; >>>> + uint32_t val; >>>> + >>>> + addr -= vdev->addr + VIRTIO_PCI_CONFIG; >>>> + if (addr > (vdev->config_len - sizeof(val))) >>>> + return (uint32_t)-1; >>>> + >>>> + memcpy(&val, vdev->config + addr, sizeof(val)); >>>> + return val; >>>> +} >>>> + >>>> +static void virtio_config_writeb(void *opaque, uint32_t addr, >>>> uint32_t data) >>>> +{ >>>> + VirtIODevice *vdev = opaque; >>>> + uint8_t val = data; >>>> + >>>> + addr -= vdev->addr + VIRTIO_PCI_CONFIG; >>>> + if (addr > (vdev->config_len - sizeof(val))) >>>> + return; >>>> + >>>> + memcpy(vdev->config + addr, &val, sizeof(val)); >>>> +} >>>> + >>>> +static void virtio_config_writew(void *opaque, uint32_t addr, >>>> uint32_t data) >>>> +{ >>>> + VirtIODevice *vdev = opaque; >>>> + uint16_t val = data; >>>> + >>>> + addr -= vdev->addr + VIRTIO_PCI_CONFIG; >>>> + if (addr > (vdev->config_len - sizeof(val))) >>>> + return; >>>> + >>>> + memcpy(vdev->config + addr, &val, sizeof(val)); >>>> +} >>>> + >>>> +static void virtio_config_writel(void *opaque, uint32_t addr, >>>> uint32_t data) >>>> +{ >>>> + VirtIODevice *vdev = opaque; >>>> + uint32_t val = data; >>>> + >>>> + addr -= vdev->addr + VIRTIO_PCI_CONFIG; >>>> + if (addr > (vdev->config_len - sizeof(val))) >>>> + return; >>>> + >>>> + memcpy(vdev->config + addr, &val, sizeof(val)); >>>> +} >>>> + >>>> +static void virtio_map(PCIDevice *pci_dev, int region_num, >>>> + uint32_t addr, uint32_t size, int type) >>>> +{ >>>> + VirtIODevice *vdev = to_virtio_device(pci_dev); >>>> + int i; >>>> + >>>> + vdev->addr = addr; >>>> + for (i = 0; i < 3; i++) { >>>> + register_ioport_write(addr, 20, 1 << i, virtio_ioport_write, >>>> vdev); >>>> + register_ioport_read(addr, 20, 1 << i, virtio_ioport_read, vdev); >>>> + } >>>> + >>>> + if (vdev->config_len) { >>>> + register_ioport_write(addr + 20, vdev->config_len, 1, >>>> + virtio_config_writeb, vdev); >>>> + register_ioport_write(addr + 20, vdev->config_len, 2, >>>> + virtio_config_writew, vdev); >>>> + register_ioport_write(addr + 20, vdev->config_len, 4, >>>> + virtio_config_writel, vdev); >>>> + register_ioport_read(addr + 20, vdev->config_len, 1, >>>> + virtio_config_readb, vdev); >>>> + register_ioport_read(addr + 20, vdev->config_len, 2, >>>> + virtio_config_readw, vdev); >>>> + register_ioport_read(addr + 20, vdev->config_len, 4, >>>> + virtio_config_readl, vdev); >>>> + >>>> + vdev->update_config(vdev, vdev->config); >>>> + } >>>> +} >>>> + >>>> +VirtQueue *virtio_add_queue(VirtIODevice *vdev, int queue_size, >>>> + void (*handle_output)(VirtIODevice *, VirtQueue *)) >>>> +{ >>>> + int i; >>>> + >>>> + for (i = 0; i < VIRTIO_PCI_QUEUE_MAX; i++) { >>>> + if (vdev->vq[i].vring.num == 0) >>>> + break; >>>> + } >>>> + >>>> + if (i == VIRTIO_PCI_QUEUE_MAX || queue_size > VIRTQUEUE_MAX_SIZE) >>>> + abort(); >>>> + >>>> + vdev->vq[i].vring.num = queue_size; >>>> + vdev->vq[i].handle_output = handle_output; >>>> + vdev->vq[i].index = i; >>>> + >>>> + return &vdev->vq[i]; >>>> +} >>>> + >>>> +void virtio_notify(VirtIODevice *vdev, VirtQueue *vq) >>>> +{ >>>> + if (vq->vring.avail->flags & VRING_AVAIL_F_NO_INTERRUPT) >>>> + return; >>>> + >>>> + vdev->isr = 1; >>>> + virtio_update_irq(vdev); >>>> +} >>>> + >>>> +VirtIODevice *virtio_init_pci(PCIBus *bus, const char *name, >>>> + uint16_t vendor, uint16_t device, >>>> + uint16_t subvendor, uint16_t subdevice, >>>> + uint8_t class_code, uint8_t subclass_code, >>>> + uint8_t pif, size_t config_size, >>>> + size_t struct_size) >>>> +{ >>>> + VirtIODevice *vdev; >>>> + PCIDevice *pci_dev; >>>> + uint8_t *config; >>>> + >>>> + pci_dev = pci_register_device(bus, name, struct_size, >>>> + -1, NULL, NULL); >>>> + vdev = to_virtio_device(pci_dev); >>>> + >>>> + vdev->status = 0; >>>> + vdev->isr = 0; >>>> + vdev->queue_sel = 0; >>>> + memset(vdev->vq, 0, sizeof(vdev->vq)); >>>> + >>>> + config = pci_dev->config; >>>> + config[0x00] = vendor & 0xFF; >>>> + config[0x01] = (vendor >> 8) & 0xFF; >>>> + config[0x02] = device & 0xFF; >>>> + config[0x03] = (device >> 8) & 0xFF; >>>> + >>>> + config[0x09] = pif; >>>> + config[0x0a] = subclass_code; >>>> + config[0x0b] = class_code; >>>> + config[0x0e] = 0x00; >>>> + >>>> + config[0x2c] = subvendor & 0xFF; >>>> + config[0x2d] = (subvendor >> 8) & 0xFF; >>>> + config[0x2e] = subdevice & 0xFF; >>>> + config[0x2f] = (subdevice >> 8) & 0xFF; >>>> + >>>> + config[0x3d] = 1; >>>> + >>>> + vdev->name = name; >>>> + vdev->config_len = config_size; >>>> + if (vdev->config_len) >>>> + vdev->config = qemu_mallocz(config_size); >>>> + else >>>> + vdev->config = NULL; >>>> + >>>> + pci_register_io_region(pci_dev, 0, 20 + config_size, >>>> PCI_ADDRESS_SPACE_IO, >>>> + virtio_map); >>>> + >>>> + return vdev; >>>> +} >>>> diff --git a/qemu/hw/virtio.h b/qemu/hw/virtio.h >>>> new file mode 100644 >>>> index 0000000..dee97ba >>>> --- /dev/null >>>> +++ b/qemu/hw/virtio.h >>>> @@ -0,0 +1,143 @@ >>>> +/* >>>> + * Virtio Support >>>> + * >>>> + * Copyright IBM, Corp. 2007 >>>> + * >>>> + * Authors: >>>> + * Anthony Liguori <[EMAIL PROTECTED]> >>>> + * >>>> + * This work is licensed under the terms of the GNU GPL, version >>>> 2. See >>>> + * the COPYING file in the top-level directory. >>>> + * >>>> + */ >>>> + >>>> +#ifndef _QEMU_VIRTIO_H >>>> +#define _QEMU_VIRTIO_H >>>> + >>>> +#include <sys/uio.h> >>>> +#include "hw.h" >>>> +#include "pci.h" >>>> + >>>> +/* from Linux's linux/virtio_config.h */ >>>> + >>>> +/* Status byte for guest to report progress, and synchronize >>>> features. */ >>>> +/* We have seen device and processed generic fields >>>> (VIRTIO_CONFIG_F_VIRTIO) */ >>>> +#define VIRTIO_CONFIG_S_ACKNOWLEDGE 1 >>>> +/* We have found a driver for the device. */ >>>> +#define VIRTIO_CONFIG_S_DRIVER 2 >>>> +/* Driver has used its parts of the config, and is happy */ >>>> +#define VIRTIO_CONFIG_S_DRIVER_OK 4 >>>> +/* We've given up on this device. */ >>>> +#define VIRTIO_CONFIG_S_FAILED 0x80 >>>> + >>>> +/* from Linux's linux/virtio_ring.h */ >>>> + >>>> +/* This marks a buffer as continuing via the next field. */ >>>> +#define VRING_DESC_F_NEXT 1 >>>> +/* This marks a buffer as write-only (otherwise read-only). */ >>>> +#define VRING_DESC_F_WRITE 2 >>>> + >>>> +/* This means don't notify other side when buffer added. */ >>>> +#define VRING_USED_F_NO_NOTIFY 1 >>>> +/* This means don't interrupt guest when buffer consumed. */ >>>> +#define VRING_AVAIL_F_NO_INTERRUPT 1 >>>> + >>>> +typedef struct VirtQueue VirtQueue; >>>> +typedef struct VirtIODevice VirtIODevice; >>>> + >>>> +typedef struct VRingDesc >>>> +{ >>>> + uint64_t addr; >>>> + uint32_t len; >>>> + uint16_t flags; >>>> + uint16_t next; >>>> +} VRingDesc; >>>> + >>>> +typedef struct VRingAvail >>>> +{ >>>> + uint16_t flags; >>>> + uint16_t idx; >>>> + uint16_t ring[0]; >>>> +} VRingAvail; >>>> + >>>> +typedef struct VRingUsedElem >>>> +{ >>>> + uint32_t id; >>>> + uint32_t len; >>>> +} VRingUsedElem; >>>> + >>>> +typedef struct VRingUsed >>>> +{ >>>> + uint16_t flags; >>>> + uint16_t idx; >>>> + VRingUsedElem ring[0]; >>>> +} VRingUsed; >>>> + >>>> +typedef struct VRing >>>> +{ >>>> + unsigned int num; >>>> + VRingDesc *desc; >>>> + VRingAvail *avail; >>>> + VRingUsed *used; >>>> +} VRing; >>>> + >>>> +struct VirtQueue >>>> +{ >>>> + VRing vring; >>>> + uint32_t pfn; >>>> + uint16_t last_avail_idx; >>>> + void (*handle_output)(VirtIODevice *vdev, VirtQueue *vq); >>>> + int index; >>>> +}; >>>> + >>>> +#define VIRTQUEUE_MAX_SIZE 1024 >>>> + >>>> +typedef struct VirtQueueElement >>>> +{ >>>> + unsigned int index; >>>> + unsigned int out_num; >>>> + unsigned int in_num; >>>> + struct iovec in_sg[VIRTQUEUE_MAX_SIZE]; >>>> + struct iovec out_sg[VIRTQUEUE_MAX_SIZE]; >>>> +} VirtQueueElement; >>>> + >>>> +#define VIRTIO_PCI_QUEUE_MAX 16 >>>> + >>>> +struct VirtIODevice >>>> +{ >>>> + PCIDevice pci_dev; >>>> + const char *name; >>>> + uint32_t addr; >>>> + uint16_t vendor; >>>> + uint16_t device; >>>> + uint8_t status; >>>> + uint8_t isr; >>>> + uint16_t queue_sel; >>>> + uint32_t features; >>>> + size_t config_len; >>>> + void *config; >>>> + uint32_t (*get_features)(VirtIODevice *vdev); >>>> + void (*set_features)(VirtIODevice *vdev, uint32_t val); >>>> + void (*update_config)(VirtIODevice *vdev, uint8_t *config); >>>> + VirtQueue vq[VIRTIO_PCI_QUEUE_MAX]; >>>> +}; >>>> + >>>> +VirtIODevice *virtio_init_pci(PCIBus *bus, const char *name, >>>> + uint16_t vendor, uint16_t device, >>>> + uint16_t subvendor, uint16_t subdevice, >>>> + uint8_t class_code, uint8_t subclass_code, >>>> + uint8_t pif, size_t config_size, >>>> + size_t struct_size); >>>> + >>>> +VirtQueue *virtio_add_queue(VirtIODevice *vdev, int queue_size, >>>> + void (*handle_output)(VirtIODevice *, >>>> + VirtQueue *)); >>>> + >>>> +void virtqueue_push(VirtQueue *vq, const VirtQueueElement *elem, >>>> + unsigned int len); >>>> + >>>> +int virtqueue_pop(VirtQueue *vq, VirtQueueElement *elem); >>>> + >>>> +void virtio_notify(VirtIODevice *vdev, VirtQueue *vq); >>>> + >>>> +#endif >>>> >>> >> >> >> ------------------------------------------------------------------------- >> >> This SF.net email is sponsored by: Microsoft >> Defy all challenges. Microsoft(R) Visual Studio 2005. >> http://clk.atdmt.com/MRT/go/vse0120000070mrt/direct/01/ >> _______________________________________________ >> kvm-devel mailing list >> kvm-devel@lists.sourceforge.net >> https://lists.sourceforge.net/lists/listinfo/kvm-devel >> > >
------------------------------------------------------------------------- This SF.net email is sponsored by: Microsoft Defy all challenges. Microsoft(R) Visual Studio 2005. http://clk.atdmt.com/MRT/go/vse0120000070mrt/direct/01/ _______________________________________________ kvm-devel mailing list kvm-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/kvm-devel