2013-07-16 14:25:09 +02:00
|
|
|
/*
|
|
|
|
* Virtio MMIO bindings
|
|
|
|
*
|
|
|
|
* Copyright (c) 2011 Linaro Limited
|
|
|
|
*
|
|
|
|
* Author:
|
|
|
|
* Peter Maydell <peter.maydell@linaro.org>
|
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License; either version 2
|
|
|
|
* of the License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License along
|
|
|
|
* with this program; if not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
|
|
|
|
2016-01-26 19:17:07 +01:00
|
|
|
#include "qemu/osdep.h"
|
2017-01-12 23:14:55 +01:00
|
|
|
#include "standard-headers/linux/virtio_mmio.h"
|
2019-08-12 07:23:42 +02:00
|
|
|
#include "hw/irq.h"
|
2019-08-12 07:23:51 +02:00
|
|
|
#include "hw/qdev-properties.h"
|
2013-07-16 14:25:09 +02:00
|
|
|
#include "hw/sysbus.h"
|
|
|
|
#include "hw/virtio/virtio.h"
|
2019-08-12 07:23:39 +02:00
|
|
|
#include "migration/qemu-file-types.h"
|
2013-07-16 14:25:09 +02:00
|
|
|
#include "qemu/host-utils.h"
|
2019-05-23 16:35:07 +02:00
|
|
|
#include "qemu/module.h"
|
2015-05-12 10:10:50 +02:00
|
|
|
#include "sysemu/kvm.h"
|
2021-05-17 15:06:28 +02:00
|
|
|
#include "sysemu/replay.h"
|
2019-09-26 15:02:22 +02:00
|
|
|
#include "hw/virtio/virtio-mmio.h"
|
2015-05-12 10:10:50 +02:00
|
|
|
#include "qemu/error-report.h"
|
2019-05-03 17:44:24 +02:00
|
|
|
#include "qemu/log.h"
|
|
|
|
#include "trace.h"
|
2013-07-16 14:25:09 +02:00
|
|
|
|
2016-10-21 22:48:08 +02:00
|
|
|
static bool virtio_mmio_ioeventfd_enabled(DeviceState *d)
|
2016-06-10 11:04:13 +02:00
|
|
|
{
|
2021-03-29 09:43:12 +02:00
|
|
|
VirtIOMMIOProxy *proxy = VIRTIO_MMIO(d);
|
|
|
|
|
|
|
|
return (proxy->flags & VIRTIO_IOMMIO_FLAG_USE_IOEVENTFD) != 0;
|
2015-05-12 10:10:50 +02:00
|
|
|
}
|
|
|
|
|
2016-06-10 11:04:13 +02:00
|
|
|
static int virtio_mmio_ioeventfd_assign(DeviceState *d,
|
|
|
|
EventNotifier *notifier,
|
|
|
|
int n, bool assign)
|
2015-05-12 10:10:50 +02:00
|
|
|
{
|
2016-06-10 11:04:13 +02:00
|
|
|
VirtIOMMIOProxy *proxy = VIRTIO_MMIO(d);
|
2015-05-12 10:10:50 +02:00
|
|
|
|
2016-06-10 11:04:13 +02:00
|
|
|
if (assign) {
|
2017-01-12 23:14:55 +01:00
|
|
|
memory_region_add_eventfd(&proxy->iomem, VIRTIO_MMIO_QUEUE_NOTIFY, 4,
|
2016-06-10 11:04:13 +02:00
|
|
|
true, n, notifier);
|
|
|
|
} else {
|
2017-01-12 23:14:55 +01:00
|
|
|
memory_region_del_eventfd(&proxy->iomem, VIRTIO_MMIO_QUEUE_NOTIFY, 4,
|
2016-06-10 11:04:13 +02:00
|
|
|
true, n, notifier);
|
2015-05-12 10:10:50 +02:00
|
|
|
}
|
2016-06-10 11:04:13 +02:00
|
|
|
return 0;
|
|
|
|
}
|
2015-05-12 10:10:50 +02:00
|
|
|
|
2016-06-10 11:04:13 +02:00
|
|
|
static void virtio_mmio_start_ioeventfd(VirtIOMMIOProxy *proxy)
|
|
|
|
{
|
|
|
|
virtio_bus_start_ioeventfd(&proxy->bus);
|
|
|
|
}
|
2015-05-12 10:10:50 +02:00
|
|
|
|
2016-06-10 11:04:13 +02:00
|
|
|
static void virtio_mmio_stop_ioeventfd(VirtIOMMIOProxy *proxy)
|
|
|
|
{
|
|
|
|
virtio_bus_stop_ioeventfd(&proxy->bus);
|
2015-05-12 10:10:50 +02:00
|
|
|
}
|
|
|
|
|
2019-12-13 10:54:10 +01:00
|
|
|
static void virtio_mmio_soft_reset(VirtIOMMIOProxy *proxy)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
2022-06-09 08:54:54 +02:00
|
|
|
virtio_bus_reset(&proxy->bus);
|
2019-12-13 10:54:10 +01:00
|
|
|
|
2022-06-09 08:54:54 +02:00
|
|
|
if (!proxy->legacy) {
|
|
|
|
for (i = 0; i < VIRTIO_QUEUE_MAX; i++) {
|
|
|
|
proxy->vqs[i].enabled = 0;
|
|
|
|
}
|
2019-12-13 10:54:10 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-07-16 14:25:09 +02:00
|
|
|
static uint64_t virtio_mmio_read(void *opaque, hwaddr offset, unsigned size)
|
|
|
|
{
|
|
|
|
VirtIOMMIOProxy *proxy = (VirtIOMMIOProxy *)opaque;
|
2013-09-20 13:31:39 +02:00
|
|
|
VirtIODevice *vdev = virtio_bus_get_device(&proxy->bus);
|
2013-07-16 14:25:09 +02:00
|
|
|
|
2019-05-03 17:44:24 +02:00
|
|
|
trace_virtio_mmio_read(offset);
|
2013-07-16 14:25:09 +02:00
|
|
|
|
|
|
|
if (!vdev) {
|
|
|
|
/* If no backend is present, we treat most registers as
|
|
|
|
* read-as-zero, except for the magic number, version and
|
|
|
|
* vendor ID. This is not strictly sanctioned by the virtio
|
|
|
|
* spec, but it allows us to provide transports with no backend
|
|
|
|
* plugged in which don't confuse Linux's virtio code: the
|
|
|
|
* probe won't complain about the bad magic number, but the
|
|
|
|
* device ID of zero means no backend will claim it.
|
|
|
|
*/
|
|
|
|
switch (offset) {
|
2017-01-12 23:14:55 +01:00
|
|
|
case VIRTIO_MMIO_MAGIC_VALUE:
|
2013-07-16 14:25:09 +02:00
|
|
|
return VIRT_MAGIC;
|
|
|
|
case VIRTIO_MMIO_VERSION:
|
2019-09-13 14:06:01 +02:00
|
|
|
if (proxy->legacy) {
|
|
|
|
return VIRT_VERSION_LEGACY;
|
|
|
|
} else {
|
|
|
|
return VIRT_VERSION;
|
|
|
|
}
|
2017-01-12 23:14:55 +01:00
|
|
|
case VIRTIO_MMIO_VENDOR_ID:
|
2013-07-16 14:25:09 +02:00
|
|
|
return VIRT_VENDOR;
|
|
|
|
default:
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (offset >= VIRTIO_MMIO_CONFIG) {
|
|
|
|
offset -= VIRTIO_MMIO_CONFIG;
|
2021-03-14 21:03:00 +01:00
|
|
|
if (proxy->legacy) {
|
|
|
|
switch (size) {
|
|
|
|
case 1:
|
|
|
|
return virtio_config_readb(vdev, offset);
|
|
|
|
case 2:
|
|
|
|
return virtio_config_readw(vdev, offset);
|
|
|
|
case 4:
|
|
|
|
return virtio_config_readl(vdev, offset);
|
|
|
|
default:
|
|
|
|
abort();
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
switch (size) {
|
|
|
|
case 1:
|
|
|
|
return virtio_config_modern_readb(vdev, offset);
|
|
|
|
case 2:
|
|
|
|
return virtio_config_modern_readw(vdev, offset);
|
|
|
|
case 4:
|
|
|
|
return virtio_config_modern_readl(vdev, offset);
|
|
|
|
default:
|
|
|
|
abort();
|
|
|
|
}
|
2013-07-16 14:25:09 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
if (size != 4) {
|
2019-05-03 17:44:24 +02:00
|
|
|
qemu_log_mask(LOG_GUEST_ERROR,
|
|
|
|
"%s: wrong size access to register!\n",
|
|
|
|
__func__);
|
2013-07-16 14:25:09 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
switch (offset) {
|
2017-01-12 23:14:55 +01:00
|
|
|
case VIRTIO_MMIO_MAGIC_VALUE:
|
2013-07-16 14:25:09 +02:00
|
|
|
return VIRT_MAGIC;
|
|
|
|
case VIRTIO_MMIO_VERSION:
|
2019-09-13 14:06:01 +02:00
|
|
|
if (proxy->legacy) {
|
|
|
|
return VIRT_VERSION_LEGACY;
|
|
|
|
} else {
|
|
|
|
return VIRT_VERSION;
|
|
|
|
}
|
2017-01-12 23:14:55 +01:00
|
|
|
case VIRTIO_MMIO_DEVICE_ID:
|
2013-07-16 14:25:09 +02:00
|
|
|
return vdev->device_id;
|
2017-01-12 23:14:55 +01:00
|
|
|
case VIRTIO_MMIO_VENDOR_ID:
|
2013-07-16 14:25:09 +02:00
|
|
|
return VIRT_VENDOR;
|
2017-01-12 23:14:55 +01:00
|
|
|
case VIRTIO_MMIO_DEVICE_FEATURES:
|
2019-09-13 14:06:01 +02:00
|
|
|
if (proxy->legacy) {
|
|
|
|
if (proxy->host_features_sel) {
|
|
|
|
return 0;
|
|
|
|
} else {
|
|
|
|
return vdev->host_features;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
VirtioDeviceClass *vdc = VIRTIO_DEVICE_GET_CLASS(vdev);
|
|
|
|
return (vdev->host_features & ~vdc->legacy_features)
|
|
|
|
>> (32 * proxy->host_features_sel);
|
2013-07-16 14:25:09 +02:00
|
|
|
}
|
2017-01-12 23:14:55 +01:00
|
|
|
case VIRTIO_MMIO_QUEUE_NUM_MAX:
|
2013-07-26 17:41:28 +02:00
|
|
|
if (!virtio_queue_get_num(vdev, vdev->queue_sel)) {
|
|
|
|
return 0;
|
|
|
|
}
|
2013-07-16 14:25:09 +02:00
|
|
|
return VIRTQUEUE_MAX_SIZE;
|
2017-01-12 23:14:55 +01:00
|
|
|
case VIRTIO_MMIO_QUEUE_PFN:
|
2019-09-13 14:06:01 +02:00
|
|
|
if (!proxy->legacy) {
|
|
|
|
qemu_log_mask(LOG_GUEST_ERROR,
|
|
|
|
"%s: read from legacy register (0x%"
|
|
|
|
HWADDR_PRIx ") in non-legacy mode\n",
|
|
|
|
__func__, offset);
|
|
|
|
return 0;
|
|
|
|
}
|
2013-07-16 14:25:09 +02:00
|
|
|
return virtio_queue_get_addr(vdev, vdev->queue_sel)
|
|
|
|
>> proxy->guest_page_shift;
|
2019-09-13 14:06:01 +02:00
|
|
|
case VIRTIO_MMIO_QUEUE_READY:
|
|
|
|
if (proxy->legacy) {
|
|
|
|
qemu_log_mask(LOG_GUEST_ERROR,
|
|
|
|
"%s: read from non-legacy register (0x%"
|
|
|
|
HWADDR_PRIx ") in legacy mode\n",
|
|
|
|
__func__, offset);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
return proxy->vqs[vdev->queue_sel].enabled;
|
2017-01-12 23:14:55 +01:00
|
|
|
case VIRTIO_MMIO_INTERRUPT_STATUS:
|
2020-09-23 12:56:46 +02:00
|
|
|
return qatomic_read(&vdev->isr);
|
2013-07-16 14:25:09 +02:00
|
|
|
case VIRTIO_MMIO_STATUS:
|
|
|
|
return vdev->status;
|
2019-09-13 14:06:01 +02:00
|
|
|
case VIRTIO_MMIO_CONFIG_GENERATION:
|
|
|
|
if (proxy->legacy) {
|
|
|
|
qemu_log_mask(LOG_GUEST_ERROR,
|
|
|
|
"%s: read from non-legacy register (0x%"
|
|
|
|
HWADDR_PRIx ") in legacy mode\n",
|
|
|
|
__func__, offset);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
return vdev->generation;
|
2020-12-20 17:35:39 +01:00
|
|
|
case VIRTIO_MMIO_SHM_LEN_LOW:
|
|
|
|
case VIRTIO_MMIO_SHM_LEN_HIGH:
|
|
|
|
/*
|
|
|
|
* VIRTIO_MMIO_SHM_SEL is unimplemented
|
|
|
|
* according to the linux driver, if region length is -1
|
|
|
|
* the shared memory doesn't exist
|
|
|
|
*/
|
|
|
|
return -1;
|
2017-01-12 23:14:55 +01:00
|
|
|
case VIRTIO_MMIO_DEVICE_FEATURES_SEL:
|
|
|
|
case VIRTIO_MMIO_DRIVER_FEATURES:
|
|
|
|
case VIRTIO_MMIO_DRIVER_FEATURES_SEL:
|
|
|
|
case VIRTIO_MMIO_GUEST_PAGE_SIZE:
|
|
|
|
case VIRTIO_MMIO_QUEUE_SEL:
|
|
|
|
case VIRTIO_MMIO_QUEUE_NUM:
|
|
|
|
case VIRTIO_MMIO_QUEUE_ALIGN:
|
|
|
|
case VIRTIO_MMIO_QUEUE_NOTIFY:
|
|
|
|
case VIRTIO_MMIO_INTERRUPT_ACK:
|
2019-09-13 14:06:01 +02:00
|
|
|
case VIRTIO_MMIO_QUEUE_DESC_LOW:
|
|
|
|
case VIRTIO_MMIO_QUEUE_DESC_HIGH:
|
|
|
|
case VIRTIO_MMIO_QUEUE_AVAIL_LOW:
|
|
|
|
case VIRTIO_MMIO_QUEUE_AVAIL_HIGH:
|
|
|
|
case VIRTIO_MMIO_QUEUE_USED_LOW:
|
|
|
|
case VIRTIO_MMIO_QUEUE_USED_HIGH:
|
2019-05-03 17:44:24 +02:00
|
|
|
qemu_log_mask(LOG_GUEST_ERROR,
|
2019-09-13 14:06:01 +02:00
|
|
|
"%s: read of write-only register (0x%" HWADDR_PRIx ")\n",
|
|
|
|
__func__, offset);
|
2013-07-16 14:25:09 +02:00
|
|
|
return 0;
|
|
|
|
default:
|
2019-09-13 14:06:01 +02:00
|
|
|
qemu_log_mask(LOG_GUEST_ERROR,
|
|
|
|
"%s: bad register offset (0x%" HWADDR_PRIx ")\n",
|
|
|
|
__func__, offset);
|
2013-07-16 14:25:09 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void virtio_mmio_write(void *opaque, hwaddr offset, uint64_t value,
|
|
|
|
unsigned size)
|
|
|
|
{
|
|
|
|
VirtIOMMIOProxy *proxy = (VirtIOMMIOProxy *)opaque;
|
2013-09-20 13:31:39 +02:00
|
|
|
VirtIODevice *vdev = virtio_bus_get_device(&proxy->bus);
|
2013-07-16 14:25:09 +02:00
|
|
|
|
2019-05-03 17:44:24 +02:00
|
|
|
trace_virtio_mmio_write_offset(offset, value);
|
2013-07-16 14:25:09 +02:00
|
|
|
|
|
|
|
if (!vdev) {
|
|
|
|
/* If no backend is present, we just make all registers
|
|
|
|
* write-ignored. This allows us to provide transports with
|
|
|
|
* no backend plugged in.
|
|
|
|
*/
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (offset >= VIRTIO_MMIO_CONFIG) {
|
|
|
|
offset -= VIRTIO_MMIO_CONFIG;
|
2021-03-14 21:03:00 +01:00
|
|
|
if (proxy->legacy) {
|
|
|
|
switch (size) {
|
|
|
|
case 1:
|
|
|
|
virtio_config_writeb(vdev, offset, value);
|
|
|
|
break;
|
|
|
|
case 2:
|
|
|
|
virtio_config_writew(vdev, offset, value);
|
|
|
|
break;
|
|
|
|
case 4:
|
|
|
|
virtio_config_writel(vdev, offset, value);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
abort();
|
|
|
|
}
|
|
|
|
return;
|
|
|
|
} else {
|
|
|
|
switch (size) {
|
|
|
|
case 1:
|
|
|
|
virtio_config_modern_writeb(vdev, offset, value);
|
|
|
|
break;
|
|
|
|
case 2:
|
|
|
|
virtio_config_modern_writew(vdev, offset, value);
|
|
|
|
break;
|
|
|
|
case 4:
|
|
|
|
virtio_config_modern_writel(vdev, offset, value);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
abort();
|
|
|
|
}
|
|
|
|
return;
|
2013-07-16 14:25:09 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
if (size != 4) {
|
2019-05-03 17:44:24 +02:00
|
|
|
qemu_log_mask(LOG_GUEST_ERROR,
|
|
|
|
"%s: wrong size access to register!\n",
|
|
|
|
__func__);
|
2013-07-16 14:25:09 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
switch (offset) {
|
2017-01-12 23:14:55 +01:00
|
|
|
case VIRTIO_MMIO_DEVICE_FEATURES_SEL:
|
2019-09-13 14:06:01 +02:00
|
|
|
if (value) {
|
|
|
|
proxy->host_features_sel = 1;
|
|
|
|
} else {
|
|
|
|
proxy->host_features_sel = 0;
|
|
|
|
}
|
2013-07-16 14:25:09 +02:00
|
|
|
break;
|
2017-01-12 23:14:55 +01:00
|
|
|
case VIRTIO_MMIO_DRIVER_FEATURES:
|
2019-09-13 14:06:01 +02:00
|
|
|
if (proxy->legacy) {
|
|
|
|
if (proxy->guest_features_sel) {
|
|
|
|
qemu_log_mask(LOG_GUEST_ERROR,
|
|
|
|
"%s: attempt to write guest features with "
|
|
|
|
"guest_features_sel > 0 in legacy mode\n",
|
|
|
|
__func__);
|
|
|
|
} else {
|
|
|
|
virtio_set_features(vdev, value);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
proxy->guest_features[proxy->guest_features_sel] = value;
|
2013-07-16 14:25:09 +02:00
|
|
|
}
|
|
|
|
break;
|
2017-01-12 23:14:55 +01:00
|
|
|
case VIRTIO_MMIO_DRIVER_FEATURES_SEL:
|
2019-09-13 14:06:01 +02:00
|
|
|
if (value) {
|
|
|
|
proxy->guest_features_sel = 1;
|
|
|
|
} else {
|
|
|
|
proxy->guest_features_sel = 0;
|
|
|
|
}
|
2013-07-16 14:25:09 +02:00
|
|
|
break;
|
2017-01-12 23:14:55 +01:00
|
|
|
case VIRTIO_MMIO_GUEST_PAGE_SIZE:
|
2019-09-13 14:06:01 +02:00
|
|
|
if (!proxy->legacy) {
|
|
|
|
qemu_log_mask(LOG_GUEST_ERROR,
|
|
|
|
"%s: write to legacy register (0x%"
|
|
|
|
HWADDR_PRIx ") in non-legacy mode\n",
|
|
|
|
__func__, offset);
|
|
|
|
return;
|
|
|
|
}
|
2013-07-16 14:25:09 +02:00
|
|
|
proxy->guest_page_shift = ctz32(value);
|
|
|
|
if (proxy->guest_page_shift > 31) {
|
|
|
|
proxy->guest_page_shift = 0;
|
|
|
|
}
|
2019-05-03 17:44:24 +02:00
|
|
|
trace_virtio_mmio_guest_page(value, proxy->guest_page_shift);
|
2013-07-16 14:25:09 +02:00
|
|
|
break;
|
2017-01-12 23:14:55 +01:00
|
|
|
case VIRTIO_MMIO_QUEUE_SEL:
|
2015-05-29 08:15:31 +02:00
|
|
|
if (value < VIRTIO_QUEUE_MAX) {
|
2013-07-16 14:25:09 +02:00
|
|
|
vdev->queue_sel = value;
|
|
|
|
}
|
|
|
|
break;
|
2017-01-12 23:14:55 +01:00
|
|
|
case VIRTIO_MMIO_QUEUE_NUM:
|
2019-05-03 17:44:24 +02:00
|
|
|
trace_virtio_mmio_queue_write(value, VIRTQUEUE_MAX_SIZE);
|
2019-12-24 09:14:46 +01:00
|
|
|
virtio_queue_set_num(vdev, vdev->queue_sel, value);
|
|
|
|
|
2019-09-13 14:06:01 +02:00
|
|
|
if (proxy->legacy) {
|
|
|
|
virtio_queue_update_rings(vdev, vdev->queue_sel);
|
|
|
|
} else {
|
2023-03-17 01:27:51 +01:00
|
|
|
virtio_init_region_cache(vdev, vdev->queue_sel);
|
2019-09-13 14:06:01 +02:00
|
|
|
proxy->vqs[vdev->queue_sel].num = value;
|
|
|
|
}
|
2013-07-16 14:25:09 +02:00
|
|
|
break;
|
2017-01-12 23:14:55 +01:00
|
|
|
case VIRTIO_MMIO_QUEUE_ALIGN:
|
2019-09-13 14:06:01 +02:00
|
|
|
if (!proxy->legacy) {
|
|
|
|
qemu_log_mask(LOG_GUEST_ERROR,
|
|
|
|
"%s: write to legacy register (0x%"
|
|
|
|
HWADDR_PRIx ") in non-legacy mode\n",
|
|
|
|
__func__, offset);
|
|
|
|
return;
|
|
|
|
}
|
2013-07-16 14:25:09 +02:00
|
|
|
virtio_queue_set_align(vdev, vdev->queue_sel, value);
|
|
|
|
break;
|
2017-01-12 23:14:55 +01:00
|
|
|
case VIRTIO_MMIO_QUEUE_PFN:
|
2019-09-13 14:06:01 +02:00
|
|
|
if (!proxy->legacy) {
|
|
|
|
qemu_log_mask(LOG_GUEST_ERROR,
|
|
|
|
"%s: write to legacy register (0x%"
|
|
|
|
HWADDR_PRIx ") in non-legacy mode\n",
|
|
|
|
__func__, offset);
|
|
|
|
return;
|
|
|
|
}
|
2013-07-16 14:25:09 +02:00
|
|
|
if (value == 0) {
|
2022-06-09 08:54:54 +02:00
|
|
|
virtio_mmio_soft_reset(proxy);
|
2013-07-16 14:25:09 +02:00
|
|
|
} else {
|
|
|
|
virtio_queue_set_addr(vdev, vdev->queue_sel,
|
|
|
|
value << proxy->guest_page_shift);
|
|
|
|
}
|
|
|
|
break;
|
2019-09-13 14:06:01 +02:00
|
|
|
case VIRTIO_MMIO_QUEUE_READY:
|
|
|
|
if (proxy->legacy) {
|
|
|
|
qemu_log_mask(LOG_GUEST_ERROR,
|
|
|
|
"%s: write to non-legacy register (0x%"
|
|
|
|
HWADDR_PRIx ") in legacy mode\n",
|
|
|
|
__func__, offset);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (value) {
|
|
|
|
virtio_queue_set_num(vdev, vdev->queue_sel,
|
|
|
|
proxy->vqs[vdev->queue_sel].num);
|
|
|
|
virtio_queue_set_rings(vdev, vdev->queue_sel,
|
|
|
|
((uint64_t)proxy->vqs[vdev->queue_sel].desc[1]) << 32 |
|
|
|
|
proxy->vqs[vdev->queue_sel].desc[0],
|
|
|
|
((uint64_t)proxy->vqs[vdev->queue_sel].avail[1]) << 32 |
|
|
|
|
proxy->vqs[vdev->queue_sel].avail[0],
|
|
|
|
((uint64_t)proxy->vqs[vdev->queue_sel].used[1]) << 32 |
|
|
|
|
proxy->vqs[vdev->queue_sel].used[0]);
|
|
|
|
proxy->vqs[vdev->queue_sel].enabled = 1;
|
|
|
|
} else {
|
|
|
|
proxy->vqs[vdev->queue_sel].enabled = 0;
|
|
|
|
}
|
|
|
|
break;
|
2017-01-12 23:14:55 +01:00
|
|
|
case VIRTIO_MMIO_QUEUE_NOTIFY:
|
2015-05-29 08:15:31 +02:00
|
|
|
if (value < VIRTIO_QUEUE_MAX) {
|
2013-07-16 14:25:09 +02:00
|
|
|
virtio_queue_notify(vdev, value);
|
|
|
|
}
|
|
|
|
break;
|
2017-01-12 23:14:55 +01:00
|
|
|
case VIRTIO_MMIO_INTERRUPT_ACK:
|
2020-09-23 12:56:46 +02:00
|
|
|
qatomic_and(&vdev->isr, ~value);
|
2013-07-16 14:25:09 +02:00
|
|
|
virtio_update_irq(vdev);
|
|
|
|
break;
|
|
|
|
case VIRTIO_MMIO_STATUS:
|
2015-05-12 10:10:50 +02:00
|
|
|
if (!(value & VIRTIO_CONFIG_S_DRIVER_OK)) {
|
|
|
|
virtio_mmio_stop_ioeventfd(proxy);
|
|
|
|
}
|
|
|
|
|
2019-09-13 14:06:01 +02:00
|
|
|
if (!proxy->legacy && (value & VIRTIO_CONFIG_S_FEATURES_OK)) {
|
|
|
|
virtio_set_features(vdev,
|
|
|
|
((uint64_t)proxy->guest_features[1]) << 32 |
|
|
|
|
proxy->guest_features[0]);
|
|
|
|
}
|
|
|
|
|
2013-07-16 14:25:09 +02:00
|
|
|
virtio_set_status(vdev, value & 0xff);
|
2015-05-12 10:10:50 +02:00
|
|
|
|
|
|
|
if (value & VIRTIO_CONFIG_S_DRIVER_OK) {
|
|
|
|
virtio_mmio_start_ioeventfd(proxy);
|
|
|
|
}
|
|
|
|
|
2013-07-16 14:25:09 +02:00
|
|
|
if (vdev->status == 0) {
|
2019-12-13 10:54:10 +01:00
|
|
|
virtio_mmio_soft_reset(proxy);
|
2013-07-16 14:25:09 +02:00
|
|
|
}
|
|
|
|
break;
|
2019-09-13 14:06:01 +02:00
|
|
|
case VIRTIO_MMIO_QUEUE_DESC_LOW:
|
|
|
|
if (proxy->legacy) {
|
|
|
|
qemu_log_mask(LOG_GUEST_ERROR,
|
|
|
|
"%s: write to non-legacy register (0x%"
|
|
|
|
HWADDR_PRIx ") in legacy mode\n",
|
|
|
|
__func__, offset);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
proxy->vqs[vdev->queue_sel].desc[0] = value;
|
|
|
|
break;
|
|
|
|
case VIRTIO_MMIO_QUEUE_DESC_HIGH:
|
|
|
|
if (proxy->legacy) {
|
|
|
|
qemu_log_mask(LOG_GUEST_ERROR,
|
|
|
|
"%s: write to non-legacy register (0x%"
|
|
|
|
HWADDR_PRIx ") in legacy mode\n",
|
|
|
|
__func__, offset);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
proxy->vqs[vdev->queue_sel].desc[1] = value;
|
|
|
|
break;
|
|
|
|
case VIRTIO_MMIO_QUEUE_AVAIL_LOW:
|
|
|
|
if (proxy->legacy) {
|
|
|
|
qemu_log_mask(LOG_GUEST_ERROR,
|
|
|
|
"%s: write to non-legacy register (0x%"
|
|
|
|
HWADDR_PRIx ") in legacy mode\n",
|
|
|
|
__func__, offset);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
proxy->vqs[vdev->queue_sel].avail[0] = value;
|
|
|
|
break;
|
|
|
|
case VIRTIO_MMIO_QUEUE_AVAIL_HIGH:
|
|
|
|
if (proxy->legacy) {
|
|
|
|
qemu_log_mask(LOG_GUEST_ERROR,
|
|
|
|
"%s: write to non-legacy register (0x%"
|
|
|
|
HWADDR_PRIx ") in legacy mode\n",
|
|
|
|
__func__, offset);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
proxy->vqs[vdev->queue_sel].avail[1] = value;
|
|
|
|
break;
|
|
|
|
case VIRTIO_MMIO_QUEUE_USED_LOW:
|
|
|
|
if (proxy->legacy) {
|
|
|
|
qemu_log_mask(LOG_GUEST_ERROR,
|
|
|
|
"%s: write to non-legacy register (0x%"
|
|
|
|
HWADDR_PRIx ") in legacy mode\n",
|
|
|
|
__func__, offset);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
proxy->vqs[vdev->queue_sel].used[0] = value;
|
|
|
|
break;
|
|
|
|
case VIRTIO_MMIO_QUEUE_USED_HIGH:
|
|
|
|
if (proxy->legacy) {
|
|
|
|
qemu_log_mask(LOG_GUEST_ERROR,
|
|
|
|
"%s: write to non-legacy register (0x%"
|
|
|
|
HWADDR_PRIx ") in legacy mode\n",
|
|
|
|
__func__, offset);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
proxy->vqs[vdev->queue_sel].used[1] = value;
|
|
|
|
break;
|
2017-01-12 23:14:55 +01:00
|
|
|
case VIRTIO_MMIO_MAGIC_VALUE:
|
2013-07-16 14:25:09 +02:00
|
|
|
case VIRTIO_MMIO_VERSION:
|
2017-01-12 23:14:55 +01:00
|
|
|
case VIRTIO_MMIO_DEVICE_ID:
|
|
|
|
case VIRTIO_MMIO_VENDOR_ID:
|
|
|
|
case VIRTIO_MMIO_DEVICE_FEATURES:
|
|
|
|
case VIRTIO_MMIO_QUEUE_NUM_MAX:
|
|
|
|
case VIRTIO_MMIO_INTERRUPT_STATUS:
|
2019-09-13 14:06:01 +02:00
|
|
|
case VIRTIO_MMIO_CONFIG_GENERATION:
|
2019-05-03 17:44:24 +02:00
|
|
|
qemu_log_mask(LOG_GUEST_ERROR,
|
2019-09-13 14:06:01 +02:00
|
|
|
"%s: write to read-only register (0x%" HWADDR_PRIx ")\n",
|
|
|
|
__func__, offset);
|
2013-07-16 14:25:09 +02:00
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
2019-09-13 14:06:01 +02:00
|
|
|
qemu_log_mask(LOG_GUEST_ERROR,
|
|
|
|
"%s: bad register offset (0x%" HWADDR_PRIx ")\n",
|
|
|
|
__func__, offset);
|
2013-07-16 14:25:09 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-09-13 14:06:01 +02:00
|
|
|
static const MemoryRegionOps virtio_legacy_mem_ops = {
|
2013-07-16 14:25:09 +02:00
|
|
|
.read = virtio_mmio_read,
|
|
|
|
.write = virtio_mmio_write,
|
|
|
|
.endianness = DEVICE_NATIVE_ENDIAN,
|
|
|
|
};
|
|
|
|
|
2019-09-13 14:06:01 +02:00
|
|
|
static const MemoryRegionOps virtio_mem_ops = {
|
|
|
|
.read = virtio_mmio_read,
|
|
|
|
.write = virtio_mmio_write,
|
|
|
|
.endianness = DEVICE_LITTLE_ENDIAN,
|
|
|
|
};
|
|
|
|
|
2013-07-16 14:25:09 +02:00
|
|
|
static void virtio_mmio_update_irq(DeviceState *opaque, uint16_t vector)
|
|
|
|
{
|
|
|
|
VirtIOMMIOProxy *proxy = VIRTIO_MMIO(opaque);
|
2013-09-20 13:31:39 +02:00
|
|
|
VirtIODevice *vdev = virtio_bus_get_device(&proxy->bus);
|
2013-07-16 14:25:09 +02:00
|
|
|
int level;
|
|
|
|
|
2013-09-20 13:31:39 +02:00
|
|
|
if (!vdev) {
|
2013-07-16 14:25:09 +02:00
|
|
|
return;
|
|
|
|
}
|
2020-09-23 12:56:46 +02:00
|
|
|
level = (qatomic_read(&vdev->isr) != 0);
|
2019-05-03 17:44:24 +02:00
|
|
|
trace_virtio_mmio_setting_irq(level);
|
2013-07-16 14:25:09 +02:00
|
|
|
qemu_set_irq(proxy->irq, level);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int virtio_mmio_load_config(DeviceState *opaque, QEMUFile *f)
|
|
|
|
{
|
|
|
|
VirtIOMMIOProxy *proxy = VIRTIO_MMIO(opaque);
|
|
|
|
|
|
|
|
proxy->host_features_sel = qemu_get_be32(f);
|
|
|
|
proxy->guest_features_sel = qemu_get_be32(f);
|
|
|
|
proxy->guest_page_shift = qemu_get_be32(f);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void virtio_mmio_save_config(DeviceState *opaque, QEMUFile *f)
|
|
|
|
{
|
|
|
|
VirtIOMMIOProxy *proxy = VIRTIO_MMIO(opaque);
|
|
|
|
|
|
|
|
qemu_put_be32(f, proxy->host_features_sel);
|
|
|
|
qemu_put_be32(f, proxy->guest_features_sel);
|
|
|
|
qemu_put_be32(f, proxy->guest_page_shift);
|
|
|
|
}
|
|
|
|
|
2019-09-13 14:06:01 +02:00
|
|
|
static const VMStateDescription vmstate_virtio_mmio_queue_state = {
|
|
|
|
.name = "virtio_mmio/queue_state",
|
|
|
|
.version_id = 1,
|
|
|
|
.minimum_version_id = 1,
|
|
|
|
.fields = (VMStateField[]) {
|
|
|
|
VMSTATE_UINT16(num, VirtIOMMIOQueue),
|
|
|
|
VMSTATE_BOOL(enabled, VirtIOMMIOQueue),
|
|
|
|
VMSTATE_UINT32_ARRAY(desc, VirtIOMMIOQueue, 2),
|
|
|
|
VMSTATE_UINT32_ARRAY(avail, VirtIOMMIOQueue, 2),
|
|
|
|
VMSTATE_UINT32_ARRAY(used, VirtIOMMIOQueue, 2),
|
|
|
|
VMSTATE_END_OF_LIST()
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
static const VMStateDescription vmstate_virtio_mmio_state_sub = {
|
|
|
|
.name = "virtio_mmio/state",
|
|
|
|
.version_id = 1,
|
|
|
|
.minimum_version_id = 1,
|
|
|
|
.fields = (VMStateField[]) {
|
|
|
|
VMSTATE_UINT32_ARRAY(guest_features, VirtIOMMIOProxy, 2),
|
|
|
|
VMSTATE_STRUCT_ARRAY(vqs, VirtIOMMIOProxy, VIRTIO_QUEUE_MAX, 0,
|
|
|
|
vmstate_virtio_mmio_queue_state,
|
|
|
|
VirtIOMMIOQueue),
|
|
|
|
VMSTATE_END_OF_LIST()
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
static const VMStateDescription vmstate_virtio_mmio = {
|
|
|
|
.name = "virtio_mmio",
|
|
|
|
.version_id = 1,
|
|
|
|
.minimum_version_id = 1,
|
|
|
|
.fields = (VMStateField[]) {
|
|
|
|
VMSTATE_END_OF_LIST()
|
|
|
|
},
|
|
|
|
.subsections = (const VMStateDescription * []) {
|
|
|
|
&vmstate_virtio_mmio_state_sub,
|
|
|
|
NULL
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
static void virtio_mmio_save_extra_state(DeviceState *opaque, QEMUFile *f)
|
|
|
|
{
|
|
|
|
VirtIOMMIOProxy *proxy = VIRTIO_MMIO(opaque);
|
|
|
|
|
|
|
|
vmstate_save_state(f, &vmstate_virtio_mmio, proxy, NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int virtio_mmio_load_extra_state(DeviceState *opaque, QEMUFile *f)
|
|
|
|
{
|
|
|
|
VirtIOMMIOProxy *proxy = VIRTIO_MMIO(opaque);
|
|
|
|
|
|
|
|
return vmstate_load_state(f, &vmstate_virtio_mmio, proxy, 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool virtio_mmio_has_extra_state(DeviceState *opaque)
|
|
|
|
{
|
|
|
|
VirtIOMMIOProxy *proxy = VIRTIO_MMIO(opaque);
|
|
|
|
|
|
|
|
return !proxy->legacy;
|
|
|
|
}
|
|
|
|
|
2013-07-16 14:25:09 +02:00
|
|
|
static void virtio_mmio_reset(DeviceState *d)
|
|
|
|
{
|
|
|
|
VirtIOMMIOProxy *proxy = VIRTIO_MMIO(d);
|
2019-09-13 14:06:01 +02:00
|
|
|
int i;
|
2013-07-16 14:25:09 +02:00
|
|
|
|
2022-06-09 08:54:54 +02:00
|
|
|
virtio_mmio_soft_reset(proxy);
|
|
|
|
|
2013-07-16 14:25:09 +02:00
|
|
|
proxy->host_features_sel = 0;
|
|
|
|
proxy->guest_features_sel = 0;
|
|
|
|
proxy->guest_page_shift = 0;
|
2019-09-13 14:06:01 +02:00
|
|
|
|
|
|
|
if (!proxy->legacy) {
|
|
|
|
proxy->guest_features[0] = proxy->guest_features[1] = 0;
|
|
|
|
|
|
|
|
for (i = 0; i < VIRTIO_QUEUE_MAX; i++) {
|
|
|
|
proxy->vqs[i].num = 0;
|
|
|
|
proxy->vqs[i].desc[0] = proxy->vqs[i].desc[1] = 0;
|
|
|
|
proxy->vqs[i].avail[0] = proxy->vqs[i].avail[1] = 0;
|
|
|
|
proxy->vqs[i].used[0] = proxy->vqs[i].used[1] = 0;
|
|
|
|
}
|
|
|
|
}
|
2013-07-16 14:25:09 +02:00
|
|
|
}
|
|
|
|
|
2015-05-12 10:10:50 +02:00
|
|
|
static int virtio_mmio_set_guest_notifier(DeviceState *d, int n, bool assign,
|
|
|
|
bool with_irqfd)
|
|
|
|
{
|
|
|
|
VirtIOMMIOProxy *proxy = VIRTIO_MMIO(d);
|
|
|
|
VirtIODevice *vdev = virtio_bus_get_device(&proxy->bus);
|
|
|
|
VirtioDeviceClass *vdc = VIRTIO_DEVICE_GET_CLASS(vdev);
|
|
|
|
VirtQueue *vq = virtio_get_queue(vdev, n);
|
|
|
|
EventNotifier *notifier = virtio_queue_get_guest_notifier(vq);
|
|
|
|
|
|
|
|
if (assign) {
|
|
|
|
int r = event_notifier_init(notifier, 0);
|
|
|
|
if (r < 0) {
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
virtio_queue_set_guest_notifier_fd_handler(vq, true, with_irqfd);
|
|
|
|
} else {
|
|
|
|
virtio_queue_set_guest_notifier_fd_handler(vq, false, with_irqfd);
|
|
|
|
event_notifier_cleanup(notifier);
|
|
|
|
}
|
|
|
|
|
2016-12-15 19:23:24 +01:00
|
|
|
if (vdc->guest_notifier_mask && vdev->use_guest_notifier_mask) {
|
2015-05-12 10:10:50 +02:00
|
|
|
vdc->guest_notifier_mask(vdev, n, !assign);
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
2022-12-22 08:04:50 +01:00
|
|
|
static int virtio_mmio_set_config_guest_notifier(DeviceState *d, bool assign,
|
|
|
|
bool with_irqfd)
|
|
|
|
{
|
|
|
|
VirtIOMMIOProxy *proxy = VIRTIO_MMIO(d);
|
|
|
|
VirtIODevice *vdev = virtio_bus_get_device(&proxy->bus);
|
|
|
|
VirtioDeviceClass *vdc = VIRTIO_DEVICE_GET_CLASS(vdev);
|
|
|
|
EventNotifier *notifier = virtio_config_get_guest_notifier(vdev);
|
|
|
|
int r = 0;
|
2015-05-12 10:10:50 +02:00
|
|
|
|
2022-12-22 08:04:50 +01:00
|
|
|
if (assign) {
|
|
|
|
r = event_notifier_init(notifier, 0);
|
|
|
|
if (r < 0) {
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
virtio_config_set_guest_notifier_fd_handler(vdev, assign, with_irqfd);
|
|
|
|
} else {
|
|
|
|
virtio_config_set_guest_notifier_fd_handler(vdev, assign, with_irqfd);
|
|
|
|
event_notifier_cleanup(notifier);
|
|
|
|
}
|
|
|
|
if (vdc->guest_notifier_mask && vdev->use_guest_notifier_mask) {
|
|
|
|
vdc->guest_notifier_mask(vdev, VIRTIO_CONFIG_IRQ_IDX, !assign);
|
|
|
|
}
|
|
|
|
return r;
|
|
|
|
}
|
2015-05-12 10:10:50 +02:00
|
|
|
static int virtio_mmio_set_guest_notifiers(DeviceState *d, int nvqs,
|
|
|
|
bool assign)
|
|
|
|
{
|
|
|
|
VirtIOMMIOProxy *proxy = VIRTIO_MMIO(d);
|
|
|
|
VirtIODevice *vdev = virtio_bus_get_device(&proxy->bus);
|
|
|
|
/* TODO: need to check if kvm-arm supports irqfd */
|
|
|
|
bool with_irqfd = false;
|
|
|
|
int r, n;
|
|
|
|
|
|
|
|
nvqs = MIN(nvqs, VIRTIO_QUEUE_MAX);
|
|
|
|
|
|
|
|
for (n = 0; n < nvqs; n++) {
|
|
|
|
if (!virtio_queue_get_num(vdev, n)) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
r = virtio_mmio_set_guest_notifier(d, n, assign, with_irqfd);
|
|
|
|
if (r < 0) {
|
|
|
|
goto assign_error;
|
|
|
|
}
|
|
|
|
}
|
2022-12-22 08:04:50 +01:00
|
|
|
r = virtio_mmio_set_config_guest_notifier(d, assign, with_irqfd);
|
|
|
|
if (r < 0) {
|
|
|
|
goto assign_error;
|
|
|
|
}
|
2015-05-12 10:10:50 +02:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
assign_error:
|
|
|
|
/* We get here on assignment failure. Recover by undoing for VQs 0 .. n. */
|
|
|
|
assert(assign);
|
|
|
|
while (--n >= 0) {
|
|
|
|
virtio_mmio_set_guest_notifier(d, n, !assign, false);
|
|
|
|
}
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
2019-09-13 14:06:01 +02:00
|
|
|
static void virtio_mmio_pre_plugged(DeviceState *d, Error **errp)
|
|
|
|
{
|
|
|
|
VirtIOMMIOProxy *proxy = VIRTIO_MMIO(d);
|
|
|
|
VirtIODevice *vdev = virtio_bus_get_device(&proxy->bus);
|
|
|
|
|
|
|
|
if (!proxy->legacy) {
|
|
|
|
virtio_add_feature(&vdev->host_features, VIRTIO_F_VERSION_1);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-07-16 14:25:09 +02:00
|
|
|
/* virtio-mmio device */
|
|
|
|
|
virtio-mmio: format transport base address in BusClass.get_dev_path
At the moment the following QEMU command line triggers an assertion
failure (minimal reproducer by Cole):
qemu-system-aarch64 \
-machine virt-2.6,accel=tcg \
-nodefaults \
-no-user-config \
-nographic -monitor stdio \
-device virtio-scsi-device,id=scsi0 \
-device virtio-scsi-device,id=scsi1 \
-drive file=foo.img,format=raw,if=none,id=d0 \
-device scsi-hd,bus=scsi0.0,drive=d0 \
-drive file=foo.img,format=raw,if=none,id=d1 \
-device scsi-hd,bus=scsi1.0,drive=d1
qemu-system-aarch64: migration/savevm.c:615:
vmstate_register_with_alias_id:
Assertion `!se->compat || se->instance_id == 0' failed.
The reason is that the vmstate sections for the two scsi-hd devices are
not uniquely identifiable by name.
The direct parent buses of the scsi-hd devices -- scsi0.0 and scsi1.0 --
support the BusClass.get_dev_path member function. scsibus_get_dev_path()
formats a device path prefix with the help of its topologically parent
bus, and then appends the chan:id:lun triplet to it. For both scsi-hd
devices, this triplet is 0:0:0.
(Here we use "device path" in the QEMU migration sense, for vmstate
section identification, not in the OFW or UEFI device path senses.)
The virtio-scsi HBA is plugged into the virtio-mmio bus (implemented by
the internal VirtIOMMIOProxy device). This bus class
(TYPE_VIRTIO_MMIO_BUS) inherits, as its get_dev_path() member function,
the virtio_bus_get_dev_path() method from its parent class
(TYPE_VIRTIO_BUS).
virtio_bus_get_dev_path() does not format any kind of device address on
its own; "virtio addresses" are transport-specific. Therefore
virtio_bus_get_dev_path() asks the topologically parent bus of the proxy
object (implementing the specific virtio transport) to format the address
of the proxy object.
(For virtio-pci devices (where the proxy is an instance of VirtIOPCIProxy,
plugged into a PCI bus), this ends up in pcibus_get_dev_path().)
However, VirtIOMMIOProxy is usually (in practice: always) plugged into
"main-system-bus", the singleton TYPE_SYSTEM_BUS object. This BusClass
does not support formatting QEMU vmstate device paths at all (as
SysBusDevice objects can have zero or more IO ports and zero or more MMIO
regions). Hence the formatting request delegated from
virtio_bus_get_dev_path() gets answered with NULL.
The end result is that the two scsi-hd devices end up with the same device
path "0:0:0", which triggers the assert.
We can solve this by recognizing that virtio-mmio transports are
distinguished from each other by their base addresses in MMIO address
space. Implement virtio_mmio_bus_get_dev_path() as follows:
(1) The virtio device whose devpath is to be formatted resides on a
virtio-mmio bus that is implemented by a VirtIOMMIOProxy object. Ask
the parent bus of VirtIOMMIOProxy to format the device path of
VirtIOMMIOProxy, as a path prefix. (This is identical to what
virtio_bus_get_dev_path() does.)
(2) Append the base address of VirtIOMMIOProxy to the device path, such
as:
- virtio-mmio@000000000a003e00,
- virtio-mmio@000000000a003c00.
Given that these device paths are placed in the migration stream, step (2)
above, if done unconditionally, would break migration. So make that step
conditional on a new VirtIOMMIOProxy property, which is enabled for 2.7
machine types and later.
Cc: "Michael S. Tsirkin" <mst@redhat.com>
Cc: Cole Robinson <crobinso@redhat.com>
Cc: Dr. David Alan Gilbert <dgilbert@redhat.com>
Cc: Kevin Zhao <kevin.zhao@linaro.org>
Cc: Peter Maydell <peter.maydell@linaro.org>
Cc: Tom Hanson <thomas.hanson@linaro.org>
Reported-by: Kevin Zhao <kevin.zhao@linaro.org>
Reviewed-by: Andrew Jones <drjones@redhat.com>
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
Message-id: 1467739394-28357-1-git-send-email-lersek@redhat.com
Fixes: https://bugs.launchpad.net/qemu/+bug/1594239
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
2016-07-14 17:51:36 +02:00
|
|
|
static Property virtio_mmio_properties[] = {
|
|
|
|
DEFINE_PROP_BOOL("format_transport_address", VirtIOMMIOProxy,
|
|
|
|
format_transport_address, true),
|
2019-09-13 14:06:01 +02:00
|
|
|
DEFINE_PROP_BOOL("force-legacy", VirtIOMMIOProxy, legacy, true),
|
2021-03-29 09:43:12 +02:00
|
|
|
DEFINE_PROP_BIT("ioeventfd", VirtIOMMIOProxy, flags,
|
|
|
|
VIRTIO_IOMMIO_FLAG_USE_IOEVENTFD_BIT, true),
|
virtio-mmio: format transport base address in BusClass.get_dev_path
At the moment the following QEMU command line triggers an assertion
failure (minimal reproducer by Cole):
qemu-system-aarch64 \
-machine virt-2.6,accel=tcg \
-nodefaults \
-no-user-config \
-nographic -monitor stdio \
-device virtio-scsi-device,id=scsi0 \
-device virtio-scsi-device,id=scsi1 \
-drive file=foo.img,format=raw,if=none,id=d0 \
-device scsi-hd,bus=scsi0.0,drive=d0 \
-drive file=foo.img,format=raw,if=none,id=d1 \
-device scsi-hd,bus=scsi1.0,drive=d1
qemu-system-aarch64: migration/savevm.c:615:
vmstate_register_with_alias_id:
Assertion `!se->compat || se->instance_id == 0' failed.
The reason is that the vmstate sections for the two scsi-hd devices are
not uniquely identifiable by name.
The direct parent buses of the scsi-hd devices -- scsi0.0 and scsi1.0 --
support the BusClass.get_dev_path member function. scsibus_get_dev_path()
formats a device path prefix with the help of its topologically parent
bus, and then appends the chan:id:lun triplet to it. For both scsi-hd
devices, this triplet is 0:0:0.
(Here we use "device path" in the QEMU migration sense, for vmstate
section identification, not in the OFW or UEFI device path senses.)
The virtio-scsi HBA is plugged into the virtio-mmio bus (implemented by
the internal VirtIOMMIOProxy device). This bus class
(TYPE_VIRTIO_MMIO_BUS) inherits, as its get_dev_path() member function,
the virtio_bus_get_dev_path() method from its parent class
(TYPE_VIRTIO_BUS).
virtio_bus_get_dev_path() does not format any kind of device address on
its own; "virtio addresses" are transport-specific. Therefore
virtio_bus_get_dev_path() asks the topologically parent bus of the proxy
object (implementing the specific virtio transport) to format the address
of the proxy object.
(For virtio-pci devices (where the proxy is an instance of VirtIOPCIProxy,
plugged into a PCI bus), this ends up in pcibus_get_dev_path().)
However, VirtIOMMIOProxy is usually (in practice: always) plugged into
"main-system-bus", the singleton TYPE_SYSTEM_BUS object. This BusClass
does not support formatting QEMU vmstate device paths at all (as
SysBusDevice objects can have zero or more IO ports and zero or more MMIO
regions). Hence the formatting request delegated from
virtio_bus_get_dev_path() gets answered with NULL.
The end result is that the two scsi-hd devices end up with the same device
path "0:0:0", which triggers the assert.
We can solve this by recognizing that virtio-mmio transports are
distinguished from each other by their base addresses in MMIO address
space. Implement virtio_mmio_bus_get_dev_path() as follows:
(1) The virtio device whose devpath is to be formatted resides on a
virtio-mmio bus that is implemented by a VirtIOMMIOProxy object. Ask
the parent bus of VirtIOMMIOProxy to format the device path of
VirtIOMMIOProxy, as a path prefix. (This is identical to what
virtio_bus_get_dev_path() does.)
(2) Append the base address of VirtIOMMIOProxy to the device path, such
as:
- virtio-mmio@000000000a003e00,
- virtio-mmio@000000000a003c00.
Given that these device paths are placed in the migration stream, step (2)
above, if done unconditionally, would break migration. So make that step
conditional on a new VirtIOMMIOProxy property, which is enabled for 2.7
machine types and later.
Cc: "Michael S. Tsirkin" <mst@redhat.com>
Cc: Cole Robinson <crobinso@redhat.com>
Cc: Dr. David Alan Gilbert <dgilbert@redhat.com>
Cc: Kevin Zhao <kevin.zhao@linaro.org>
Cc: Peter Maydell <peter.maydell@linaro.org>
Cc: Tom Hanson <thomas.hanson@linaro.org>
Reported-by: Kevin Zhao <kevin.zhao@linaro.org>
Reviewed-by: Andrew Jones <drjones@redhat.com>
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
Message-id: 1467739394-28357-1-git-send-email-lersek@redhat.com
Fixes: https://bugs.launchpad.net/qemu/+bug/1594239
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
2016-07-14 17:51:36 +02:00
|
|
|
DEFINE_PROP_END_OF_LIST(),
|
|
|
|
};
|
|
|
|
|
2013-07-16 14:25:09 +02:00
|
|
|
static void virtio_mmio_realizefn(DeviceState *d, Error **errp)
|
|
|
|
{
|
|
|
|
VirtIOMMIOProxy *proxy = VIRTIO_MMIO(d);
|
|
|
|
SysBusDevice *sbd = SYS_BUS_DEVICE(d);
|
|
|
|
|
2021-09-23 14:11:51 +02:00
|
|
|
qbus_init(&proxy->bus, sizeof(proxy->bus), TYPE_VIRTIO_MMIO_BUS, d, NULL);
|
2013-07-16 14:25:09 +02:00
|
|
|
sysbus_init_irq(sbd, &proxy->irq);
|
2021-03-29 09:43:12 +02:00
|
|
|
|
|
|
|
if (!kvm_eventfds_enabled()) {
|
|
|
|
proxy->flags &= ~VIRTIO_IOMMIO_FLAG_USE_IOEVENTFD;
|
|
|
|
}
|
|
|
|
|
2021-05-17 15:06:28 +02:00
|
|
|
/* fd-based ioevents can't be synchronized in record/replay */
|
|
|
|
if (replay_mode != REPLAY_MODE_NONE) {
|
|
|
|
proxy->flags &= ~VIRTIO_IOMMIO_FLAG_USE_IOEVENTFD;
|
|
|
|
}
|
|
|
|
|
2019-09-13 14:06:01 +02:00
|
|
|
if (proxy->legacy) {
|
|
|
|
memory_region_init_io(&proxy->iomem, OBJECT(d),
|
|
|
|
&virtio_legacy_mem_ops, proxy,
|
|
|
|
TYPE_VIRTIO_MMIO, 0x200);
|
|
|
|
} else {
|
|
|
|
memory_region_init_io(&proxy->iomem, OBJECT(d),
|
|
|
|
&virtio_mem_ops, proxy,
|
|
|
|
TYPE_VIRTIO_MMIO, 0x200);
|
|
|
|
}
|
2013-07-16 14:25:09 +02:00
|
|
|
sysbus_init_mmio(sbd, &proxy->iomem);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void virtio_mmio_class_init(ObjectClass *klass, void *data)
|
|
|
|
{
|
|
|
|
DeviceClass *dc = DEVICE_CLASS(klass);
|
|
|
|
|
|
|
|
dc->realize = virtio_mmio_realizefn;
|
|
|
|
dc->reset = virtio_mmio_reset;
|
2013-07-29 16:17:45 +02:00
|
|
|
set_bit(DEVICE_CATEGORY_MISC, dc->categories);
|
2020-01-10 16:30:32 +01:00
|
|
|
device_class_set_props(dc, virtio_mmio_properties);
|
2013-07-16 14:25:09 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
static const TypeInfo virtio_mmio_info = {
|
|
|
|
.name = TYPE_VIRTIO_MMIO,
|
|
|
|
.parent = TYPE_SYS_BUS_DEVICE,
|
|
|
|
.instance_size = sizeof(VirtIOMMIOProxy),
|
|
|
|
.class_init = virtio_mmio_class_init,
|
|
|
|
};
|
|
|
|
|
|
|
|
/* virtio-mmio-bus. */
|
|
|
|
|
virtio-mmio: format transport base address in BusClass.get_dev_path
At the moment the following QEMU command line triggers an assertion
failure (minimal reproducer by Cole):
qemu-system-aarch64 \
-machine virt-2.6,accel=tcg \
-nodefaults \
-no-user-config \
-nographic -monitor stdio \
-device virtio-scsi-device,id=scsi0 \
-device virtio-scsi-device,id=scsi1 \
-drive file=foo.img,format=raw,if=none,id=d0 \
-device scsi-hd,bus=scsi0.0,drive=d0 \
-drive file=foo.img,format=raw,if=none,id=d1 \
-device scsi-hd,bus=scsi1.0,drive=d1
qemu-system-aarch64: migration/savevm.c:615:
vmstate_register_with_alias_id:
Assertion `!se->compat || se->instance_id == 0' failed.
The reason is that the vmstate sections for the two scsi-hd devices are
not uniquely identifiable by name.
The direct parent buses of the scsi-hd devices -- scsi0.0 and scsi1.0 --
support the BusClass.get_dev_path member function. scsibus_get_dev_path()
formats a device path prefix with the help of its topologically parent
bus, and then appends the chan:id:lun triplet to it. For both scsi-hd
devices, this triplet is 0:0:0.
(Here we use "device path" in the QEMU migration sense, for vmstate
section identification, not in the OFW or UEFI device path senses.)
The virtio-scsi HBA is plugged into the virtio-mmio bus (implemented by
the internal VirtIOMMIOProxy device). This bus class
(TYPE_VIRTIO_MMIO_BUS) inherits, as its get_dev_path() member function,
the virtio_bus_get_dev_path() method from its parent class
(TYPE_VIRTIO_BUS).
virtio_bus_get_dev_path() does not format any kind of device address on
its own; "virtio addresses" are transport-specific. Therefore
virtio_bus_get_dev_path() asks the topologically parent bus of the proxy
object (implementing the specific virtio transport) to format the address
of the proxy object.
(For virtio-pci devices (where the proxy is an instance of VirtIOPCIProxy,
plugged into a PCI bus), this ends up in pcibus_get_dev_path().)
However, VirtIOMMIOProxy is usually (in practice: always) plugged into
"main-system-bus", the singleton TYPE_SYSTEM_BUS object. This BusClass
does not support formatting QEMU vmstate device paths at all (as
SysBusDevice objects can have zero or more IO ports and zero or more MMIO
regions). Hence the formatting request delegated from
virtio_bus_get_dev_path() gets answered with NULL.
The end result is that the two scsi-hd devices end up with the same device
path "0:0:0", which triggers the assert.
We can solve this by recognizing that virtio-mmio transports are
distinguished from each other by their base addresses in MMIO address
space. Implement virtio_mmio_bus_get_dev_path() as follows:
(1) The virtio device whose devpath is to be formatted resides on a
virtio-mmio bus that is implemented by a VirtIOMMIOProxy object. Ask
the parent bus of VirtIOMMIOProxy to format the device path of
VirtIOMMIOProxy, as a path prefix. (This is identical to what
virtio_bus_get_dev_path() does.)
(2) Append the base address of VirtIOMMIOProxy to the device path, such
as:
- virtio-mmio@000000000a003e00,
- virtio-mmio@000000000a003c00.
Given that these device paths are placed in the migration stream, step (2)
above, if done unconditionally, would break migration. So make that step
conditional on a new VirtIOMMIOProxy property, which is enabled for 2.7
machine types and later.
Cc: "Michael S. Tsirkin" <mst@redhat.com>
Cc: Cole Robinson <crobinso@redhat.com>
Cc: Dr. David Alan Gilbert <dgilbert@redhat.com>
Cc: Kevin Zhao <kevin.zhao@linaro.org>
Cc: Peter Maydell <peter.maydell@linaro.org>
Cc: Tom Hanson <thomas.hanson@linaro.org>
Reported-by: Kevin Zhao <kevin.zhao@linaro.org>
Reviewed-by: Andrew Jones <drjones@redhat.com>
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
Message-id: 1467739394-28357-1-git-send-email-lersek@redhat.com
Fixes: https://bugs.launchpad.net/qemu/+bug/1594239
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
2016-07-14 17:51:36 +02:00
|
|
|
static char *virtio_mmio_bus_get_dev_path(DeviceState *dev)
|
|
|
|
{
|
|
|
|
BusState *virtio_mmio_bus;
|
|
|
|
VirtIOMMIOProxy *virtio_mmio_proxy;
|
|
|
|
char *proxy_path;
|
|
|
|
char *path;
|
virtio-mmio: improve virtio-mmio get_dev_path alog
At the moment the following QEMU command line triggers an assertion
failure On xlnx-versal SOC:
qemu-system-aarch64 \
-machine xlnx-versal-virt -nographic -smp 2 -m 128 \
-fsdev local,id=shareid,path=${HOME}/work,security_model=none \
-device virtio-9p-device,fsdev=shareid,mount_tag=share \
-fsdev local,id=shareid1,path=${HOME}/Music,security_model=none \
-device virtio-9p-device,fsdev=shareid1,mount_tag=share1
qemu-system-aarch64: ../migration/savevm.c:860:
vmstate_register_with_alias_id:
Assertion `!se->compat || se->instance_id == 0' failed.
This problem was fixed on arm virt platform in commit f58b39d2d5b
("virtio-mmio: format transport base address in BusClass.get_dev_path")
It works perfectly on arm virt platform. but there is still there on
xlnx-versal SOC.
The main difference between arm virt and xlnx-versal is they use
different way to create virtio-mmio qdev. on arm virt, it calls
sysbus_create_simple("virtio-mmio", base, pic[irq]); which will call
sysbus_mmio_map internally and assign base address to subsys device
mmio correctly. but xlnx-versal's implements won't do this.
However, xlnx-versal can't switch to sysbus_create_simple() to create
virtio-mmio device. It's because xlnx-versal's cpu use
VersalVirt.soc.fpd.apu.mr as it's memory. which is subregion of
system_memory. sysbus_create_simple will add virtio to system_memory,
which can't be accessed by cpu.
Besides, xlnx-versal can't add sysbus_mmio_map api call too, because
this will add memory region to system_memory, and it can't be added
to VersalVirt.soc.fpd.apu.mr again.
We can solve this by assign correct base address offset on dev_path.
This path was test on aarch64 virt & xlnx-versal platform.
Signed-off-by: schspa <schspa@gmail.com>
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
2021-02-25 06:36:06 +01:00
|
|
|
MemoryRegionSection section;
|
virtio-mmio: format transport base address in BusClass.get_dev_path
At the moment the following QEMU command line triggers an assertion
failure (minimal reproducer by Cole):
qemu-system-aarch64 \
-machine virt-2.6,accel=tcg \
-nodefaults \
-no-user-config \
-nographic -monitor stdio \
-device virtio-scsi-device,id=scsi0 \
-device virtio-scsi-device,id=scsi1 \
-drive file=foo.img,format=raw,if=none,id=d0 \
-device scsi-hd,bus=scsi0.0,drive=d0 \
-drive file=foo.img,format=raw,if=none,id=d1 \
-device scsi-hd,bus=scsi1.0,drive=d1
qemu-system-aarch64: migration/savevm.c:615:
vmstate_register_with_alias_id:
Assertion `!se->compat || se->instance_id == 0' failed.
The reason is that the vmstate sections for the two scsi-hd devices are
not uniquely identifiable by name.
The direct parent buses of the scsi-hd devices -- scsi0.0 and scsi1.0 --
support the BusClass.get_dev_path member function. scsibus_get_dev_path()
formats a device path prefix with the help of its topologically parent
bus, and then appends the chan:id:lun triplet to it. For both scsi-hd
devices, this triplet is 0:0:0.
(Here we use "device path" in the QEMU migration sense, for vmstate
section identification, not in the OFW or UEFI device path senses.)
The virtio-scsi HBA is plugged into the virtio-mmio bus (implemented by
the internal VirtIOMMIOProxy device). This bus class
(TYPE_VIRTIO_MMIO_BUS) inherits, as its get_dev_path() member function,
the virtio_bus_get_dev_path() method from its parent class
(TYPE_VIRTIO_BUS).
virtio_bus_get_dev_path() does not format any kind of device address on
its own; "virtio addresses" are transport-specific. Therefore
virtio_bus_get_dev_path() asks the topologically parent bus of the proxy
object (implementing the specific virtio transport) to format the address
of the proxy object.
(For virtio-pci devices (where the proxy is an instance of VirtIOPCIProxy,
plugged into a PCI bus), this ends up in pcibus_get_dev_path().)
However, VirtIOMMIOProxy is usually (in practice: always) plugged into
"main-system-bus", the singleton TYPE_SYSTEM_BUS object. This BusClass
does not support formatting QEMU vmstate device paths at all (as
SysBusDevice objects can have zero or more IO ports and zero or more MMIO
regions). Hence the formatting request delegated from
virtio_bus_get_dev_path() gets answered with NULL.
The end result is that the two scsi-hd devices end up with the same device
path "0:0:0", which triggers the assert.
We can solve this by recognizing that virtio-mmio transports are
distinguished from each other by their base addresses in MMIO address
space. Implement virtio_mmio_bus_get_dev_path() as follows:
(1) The virtio device whose devpath is to be formatted resides on a
virtio-mmio bus that is implemented by a VirtIOMMIOProxy object. Ask
the parent bus of VirtIOMMIOProxy to format the device path of
VirtIOMMIOProxy, as a path prefix. (This is identical to what
virtio_bus_get_dev_path() does.)
(2) Append the base address of VirtIOMMIOProxy to the device path, such
as:
- virtio-mmio@000000000a003e00,
- virtio-mmio@000000000a003c00.
Given that these device paths are placed in the migration stream, step (2)
above, if done unconditionally, would break migration. So make that step
conditional on a new VirtIOMMIOProxy property, which is enabled for 2.7
machine types and later.
Cc: "Michael S. Tsirkin" <mst@redhat.com>
Cc: Cole Robinson <crobinso@redhat.com>
Cc: Dr. David Alan Gilbert <dgilbert@redhat.com>
Cc: Kevin Zhao <kevin.zhao@linaro.org>
Cc: Peter Maydell <peter.maydell@linaro.org>
Cc: Tom Hanson <thomas.hanson@linaro.org>
Reported-by: Kevin Zhao <kevin.zhao@linaro.org>
Reviewed-by: Andrew Jones <drjones@redhat.com>
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
Message-id: 1467739394-28357-1-git-send-email-lersek@redhat.com
Fixes: https://bugs.launchpad.net/qemu/+bug/1594239
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
2016-07-14 17:51:36 +02:00
|
|
|
|
|
|
|
virtio_mmio_bus = qdev_get_parent_bus(dev);
|
|
|
|
virtio_mmio_proxy = VIRTIO_MMIO(virtio_mmio_bus->parent);
|
|
|
|
proxy_path = qdev_get_dev_path(DEVICE(virtio_mmio_proxy));
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If @format_transport_address is false, then we just perform the same as
|
|
|
|
* virtio_bus_get_dev_path(): we delegate the address formatting for the
|
|
|
|
* device on the virtio-mmio bus to the bus that the virtio-mmio proxy
|
|
|
|
* (i.e., the device that implements the virtio-mmio bus) resides on. In
|
|
|
|
* this case the base address of the virtio-mmio transport will be
|
|
|
|
* invisible.
|
|
|
|
*/
|
|
|
|
if (!virtio_mmio_proxy->format_transport_address) {
|
|
|
|
return proxy_path;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Otherwise, we append the base address of the transport. */
|
virtio-mmio: improve virtio-mmio get_dev_path alog
At the moment the following QEMU command line triggers an assertion
failure On xlnx-versal SOC:
qemu-system-aarch64 \
-machine xlnx-versal-virt -nographic -smp 2 -m 128 \
-fsdev local,id=shareid,path=${HOME}/work,security_model=none \
-device virtio-9p-device,fsdev=shareid,mount_tag=share \
-fsdev local,id=shareid1,path=${HOME}/Music,security_model=none \
-device virtio-9p-device,fsdev=shareid1,mount_tag=share1
qemu-system-aarch64: ../migration/savevm.c:860:
vmstate_register_with_alias_id:
Assertion `!se->compat || se->instance_id == 0' failed.
This problem was fixed on arm virt platform in commit f58b39d2d5b
("virtio-mmio: format transport base address in BusClass.get_dev_path")
It works perfectly on arm virt platform. but there is still there on
xlnx-versal SOC.
The main difference between arm virt and xlnx-versal is they use
different way to create virtio-mmio qdev. on arm virt, it calls
sysbus_create_simple("virtio-mmio", base, pic[irq]); which will call
sysbus_mmio_map internally and assign base address to subsys device
mmio correctly. but xlnx-versal's implements won't do this.
However, xlnx-versal can't switch to sysbus_create_simple() to create
virtio-mmio device. It's because xlnx-versal's cpu use
VersalVirt.soc.fpd.apu.mr as it's memory. which is subregion of
system_memory. sysbus_create_simple will add virtio to system_memory,
which can't be accessed by cpu.
Besides, xlnx-versal can't add sysbus_mmio_map api call too, because
this will add memory region to system_memory, and it can't be added
to VersalVirt.soc.fpd.apu.mr again.
We can solve this by assign correct base address offset on dev_path.
This path was test on aarch64 virt & xlnx-versal platform.
Signed-off-by: schspa <schspa@gmail.com>
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
2021-02-25 06:36:06 +01:00
|
|
|
section = memory_region_find(&virtio_mmio_proxy->iomem, 0, 0x200);
|
|
|
|
assert(section.mr);
|
virtio-mmio: format transport base address in BusClass.get_dev_path
At the moment the following QEMU command line triggers an assertion
failure (minimal reproducer by Cole):
qemu-system-aarch64 \
-machine virt-2.6,accel=tcg \
-nodefaults \
-no-user-config \
-nographic -monitor stdio \
-device virtio-scsi-device,id=scsi0 \
-device virtio-scsi-device,id=scsi1 \
-drive file=foo.img,format=raw,if=none,id=d0 \
-device scsi-hd,bus=scsi0.0,drive=d0 \
-drive file=foo.img,format=raw,if=none,id=d1 \
-device scsi-hd,bus=scsi1.0,drive=d1
qemu-system-aarch64: migration/savevm.c:615:
vmstate_register_with_alias_id:
Assertion `!se->compat || se->instance_id == 0' failed.
The reason is that the vmstate sections for the two scsi-hd devices are
not uniquely identifiable by name.
The direct parent buses of the scsi-hd devices -- scsi0.0 and scsi1.0 --
support the BusClass.get_dev_path member function. scsibus_get_dev_path()
formats a device path prefix with the help of its topologically parent
bus, and then appends the chan:id:lun triplet to it. For both scsi-hd
devices, this triplet is 0:0:0.
(Here we use "device path" in the QEMU migration sense, for vmstate
section identification, not in the OFW or UEFI device path senses.)
The virtio-scsi HBA is plugged into the virtio-mmio bus (implemented by
the internal VirtIOMMIOProxy device). This bus class
(TYPE_VIRTIO_MMIO_BUS) inherits, as its get_dev_path() member function,
the virtio_bus_get_dev_path() method from its parent class
(TYPE_VIRTIO_BUS).
virtio_bus_get_dev_path() does not format any kind of device address on
its own; "virtio addresses" are transport-specific. Therefore
virtio_bus_get_dev_path() asks the topologically parent bus of the proxy
object (implementing the specific virtio transport) to format the address
of the proxy object.
(For virtio-pci devices (where the proxy is an instance of VirtIOPCIProxy,
plugged into a PCI bus), this ends up in pcibus_get_dev_path().)
However, VirtIOMMIOProxy is usually (in practice: always) plugged into
"main-system-bus", the singleton TYPE_SYSTEM_BUS object. This BusClass
does not support formatting QEMU vmstate device paths at all (as
SysBusDevice objects can have zero or more IO ports and zero or more MMIO
regions). Hence the formatting request delegated from
virtio_bus_get_dev_path() gets answered with NULL.
The end result is that the two scsi-hd devices end up with the same device
path "0:0:0", which triggers the assert.
We can solve this by recognizing that virtio-mmio transports are
distinguished from each other by their base addresses in MMIO address
space. Implement virtio_mmio_bus_get_dev_path() as follows:
(1) The virtio device whose devpath is to be formatted resides on a
virtio-mmio bus that is implemented by a VirtIOMMIOProxy object. Ask
the parent bus of VirtIOMMIOProxy to format the device path of
VirtIOMMIOProxy, as a path prefix. (This is identical to what
virtio_bus_get_dev_path() does.)
(2) Append the base address of VirtIOMMIOProxy to the device path, such
as:
- virtio-mmio@000000000a003e00,
- virtio-mmio@000000000a003c00.
Given that these device paths are placed in the migration stream, step (2)
above, if done unconditionally, would break migration. So make that step
conditional on a new VirtIOMMIOProxy property, which is enabled for 2.7
machine types and later.
Cc: "Michael S. Tsirkin" <mst@redhat.com>
Cc: Cole Robinson <crobinso@redhat.com>
Cc: Dr. David Alan Gilbert <dgilbert@redhat.com>
Cc: Kevin Zhao <kevin.zhao@linaro.org>
Cc: Peter Maydell <peter.maydell@linaro.org>
Cc: Tom Hanson <thomas.hanson@linaro.org>
Reported-by: Kevin Zhao <kevin.zhao@linaro.org>
Reviewed-by: Andrew Jones <drjones@redhat.com>
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
Message-id: 1467739394-28357-1-git-send-email-lersek@redhat.com
Fixes: https://bugs.launchpad.net/qemu/+bug/1594239
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
2016-07-14 17:51:36 +02:00
|
|
|
|
|
|
|
if (proxy_path) {
|
2023-01-10 22:29:47 +01:00
|
|
|
path = g_strdup_printf("%s/virtio-mmio@" HWADDR_FMT_plx, proxy_path,
|
virtio-mmio: improve virtio-mmio get_dev_path alog
At the moment the following QEMU command line triggers an assertion
failure On xlnx-versal SOC:
qemu-system-aarch64 \
-machine xlnx-versal-virt -nographic -smp 2 -m 128 \
-fsdev local,id=shareid,path=${HOME}/work,security_model=none \
-device virtio-9p-device,fsdev=shareid,mount_tag=share \
-fsdev local,id=shareid1,path=${HOME}/Music,security_model=none \
-device virtio-9p-device,fsdev=shareid1,mount_tag=share1
qemu-system-aarch64: ../migration/savevm.c:860:
vmstate_register_with_alias_id:
Assertion `!se->compat || se->instance_id == 0' failed.
This problem was fixed on arm virt platform in commit f58b39d2d5b
("virtio-mmio: format transport base address in BusClass.get_dev_path")
It works perfectly on arm virt platform. but there is still there on
xlnx-versal SOC.
The main difference between arm virt and xlnx-versal is they use
different way to create virtio-mmio qdev. on arm virt, it calls
sysbus_create_simple("virtio-mmio", base, pic[irq]); which will call
sysbus_mmio_map internally and assign base address to subsys device
mmio correctly. but xlnx-versal's implements won't do this.
However, xlnx-versal can't switch to sysbus_create_simple() to create
virtio-mmio device. It's because xlnx-versal's cpu use
VersalVirt.soc.fpd.apu.mr as it's memory. which is subregion of
system_memory. sysbus_create_simple will add virtio to system_memory,
which can't be accessed by cpu.
Besides, xlnx-versal can't add sysbus_mmio_map api call too, because
this will add memory region to system_memory, and it can't be added
to VersalVirt.soc.fpd.apu.mr again.
We can solve this by assign correct base address offset on dev_path.
This path was test on aarch64 virt & xlnx-versal platform.
Signed-off-by: schspa <schspa@gmail.com>
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
2021-02-25 06:36:06 +01:00
|
|
|
section.offset_within_address_space);
|
virtio-mmio: format transport base address in BusClass.get_dev_path
At the moment the following QEMU command line triggers an assertion
failure (minimal reproducer by Cole):
qemu-system-aarch64 \
-machine virt-2.6,accel=tcg \
-nodefaults \
-no-user-config \
-nographic -monitor stdio \
-device virtio-scsi-device,id=scsi0 \
-device virtio-scsi-device,id=scsi1 \
-drive file=foo.img,format=raw,if=none,id=d0 \
-device scsi-hd,bus=scsi0.0,drive=d0 \
-drive file=foo.img,format=raw,if=none,id=d1 \
-device scsi-hd,bus=scsi1.0,drive=d1
qemu-system-aarch64: migration/savevm.c:615:
vmstate_register_with_alias_id:
Assertion `!se->compat || se->instance_id == 0' failed.
The reason is that the vmstate sections for the two scsi-hd devices are
not uniquely identifiable by name.
The direct parent buses of the scsi-hd devices -- scsi0.0 and scsi1.0 --
support the BusClass.get_dev_path member function. scsibus_get_dev_path()
formats a device path prefix with the help of its topologically parent
bus, and then appends the chan:id:lun triplet to it. For both scsi-hd
devices, this triplet is 0:0:0.
(Here we use "device path" in the QEMU migration sense, for vmstate
section identification, not in the OFW or UEFI device path senses.)
The virtio-scsi HBA is plugged into the virtio-mmio bus (implemented by
the internal VirtIOMMIOProxy device). This bus class
(TYPE_VIRTIO_MMIO_BUS) inherits, as its get_dev_path() member function,
the virtio_bus_get_dev_path() method from its parent class
(TYPE_VIRTIO_BUS).
virtio_bus_get_dev_path() does not format any kind of device address on
its own; "virtio addresses" are transport-specific. Therefore
virtio_bus_get_dev_path() asks the topologically parent bus of the proxy
object (implementing the specific virtio transport) to format the address
of the proxy object.
(For virtio-pci devices (where the proxy is an instance of VirtIOPCIProxy,
plugged into a PCI bus), this ends up in pcibus_get_dev_path().)
However, VirtIOMMIOProxy is usually (in practice: always) plugged into
"main-system-bus", the singleton TYPE_SYSTEM_BUS object. This BusClass
does not support formatting QEMU vmstate device paths at all (as
SysBusDevice objects can have zero or more IO ports and zero or more MMIO
regions). Hence the formatting request delegated from
virtio_bus_get_dev_path() gets answered with NULL.
The end result is that the two scsi-hd devices end up with the same device
path "0:0:0", which triggers the assert.
We can solve this by recognizing that virtio-mmio transports are
distinguished from each other by their base addresses in MMIO address
space. Implement virtio_mmio_bus_get_dev_path() as follows:
(1) The virtio device whose devpath is to be formatted resides on a
virtio-mmio bus that is implemented by a VirtIOMMIOProxy object. Ask
the parent bus of VirtIOMMIOProxy to format the device path of
VirtIOMMIOProxy, as a path prefix. (This is identical to what
virtio_bus_get_dev_path() does.)
(2) Append the base address of VirtIOMMIOProxy to the device path, such
as:
- virtio-mmio@000000000a003e00,
- virtio-mmio@000000000a003c00.
Given that these device paths are placed in the migration stream, step (2)
above, if done unconditionally, would break migration. So make that step
conditional on a new VirtIOMMIOProxy property, which is enabled for 2.7
machine types and later.
Cc: "Michael S. Tsirkin" <mst@redhat.com>
Cc: Cole Robinson <crobinso@redhat.com>
Cc: Dr. David Alan Gilbert <dgilbert@redhat.com>
Cc: Kevin Zhao <kevin.zhao@linaro.org>
Cc: Peter Maydell <peter.maydell@linaro.org>
Cc: Tom Hanson <thomas.hanson@linaro.org>
Reported-by: Kevin Zhao <kevin.zhao@linaro.org>
Reviewed-by: Andrew Jones <drjones@redhat.com>
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
Message-id: 1467739394-28357-1-git-send-email-lersek@redhat.com
Fixes: https://bugs.launchpad.net/qemu/+bug/1594239
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
2016-07-14 17:51:36 +02:00
|
|
|
} else {
|
2023-01-10 22:29:47 +01:00
|
|
|
path = g_strdup_printf("virtio-mmio@" HWADDR_FMT_plx,
|
virtio-mmio: improve virtio-mmio get_dev_path alog
At the moment the following QEMU command line triggers an assertion
failure On xlnx-versal SOC:
qemu-system-aarch64 \
-machine xlnx-versal-virt -nographic -smp 2 -m 128 \
-fsdev local,id=shareid,path=${HOME}/work,security_model=none \
-device virtio-9p-device,fsdev=shareid,mount_tag=share \
-fsdev local,id=shareid1,path=${HOME}/Music,security_model=none \
-device virtio-9p-device,fsdev=shareid1,mount_tag=share1
qemu-system-aarch64: ../migration/savevm.c:860:
vmstate_register_with_alias_id:
Assertion `!se->compat || se->instance_id == 0' failed.
This problem was fixed on arm virt platform in commit f58b39d2d5b
("virtio-mmio: format transport base address in BusClass.get_dev_path")
It works perfectly on arm virt platform. but there is still there on
xlnx-versal SOC.
The main difference between arm virt and xlnx-versal is they use
different way to create virtio-mmio qdev. on arm virt, it calls
sysbus_create_simple("virtio-mmio", base, pic[irq]); which will call
sysbus_mmio_map internally and assign base address to subsys device
mmio correctly. but xlnx-versal's implements won't do this.
However, xlnx-versal can't switch to sysbus_create_simple() to create
virtio-mmio device. It's because xlnx-versal's cpu use
VersalVirt.soc.fpd.apu.mr as it's memory. which is subregion of
system_memory. sysbus_create_simple will add virtio to system_memory,
which can't be accessed by cpu.
Besides, xlnx-versal can't add sysbus_mmio_map api call too, because
this will add memory region to system_memory, and it can't be added
to VersalVirt.soc.fpd.apu.mr again.
We can solve this by assign correct base address offset on dev_path.
This path was test on aarch64 virt & xlnx-versal platform.
Signed-off-by: schspa <schspa@gmail.com>
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
2021-02-25 06:36:06 +01:00
|
|
|
section.offset_within_address_space);
|
virtio-mmio: format transport base address in BusClass.get_dev_path
At the moment the following QEMU command line triggers an assertion
failure (minimal reproducer by Cole):
qemu-system-aarch64 \
-machine virt-2.6,accel=tcg \
-nodefaults \
-no-user-config \
-nographic -monitor stdio \
-device virtio-scsi-device,id=scsi0 \
-device virtio-scsi-device,id=scsi1 \
-drive file=foo.img,format=raw,if=none,id=d0 \
-device scsi-hd,bus=scsi0.0,drive=d0 \
-drive file=foo.img,format=raw,if=none,id=d1 \
-device scsi-hd,bus=scsi1.0,drive=d1
qemu-system-aarch64: migration/savevm.c:615:
vmstate_register_with_alias_id:
Assertion `!se->compat || se->instance_id == 0' failed.
The reason is that the vmstate sections for the two scsi-hd devices are
not uniquely identifiable by name.
The direct parent buses of the scsi-hd devices -- scsi0.0 and scsi1.0 --
support the BusClass.get_dev_path member function. scsibus_get_dev_path()
formats a device path prefix with the help of its topologically parent
bus, and then appends the chan:id:lun triplet to it. For both scsi-hd
devices, this triplet is 0:0:0.
(Here we use "device path" in the QEMU migration sense, for vmstate
section identification, not in the OFW or UEFI device path senses.)
The virtio-scsi HBA is plugged into the virtio-mmio bus (implemented by
the internal VirtIOMMIOProxy device). This bus class
(TYPE_VIRTIO_MMIO_BUS) inherits, as its get_dev_path() member function,
the virtio_bus_get_dev_path() method from its parent class
(TYPE_VIRTIO_BUS).
virtio_bus_get_dev_path() does not format any kind of device address on
its own; "virtio addresses" are transport-specific. Therefore
virtio_bus_get_dev_path() asks the topologically parent bus of the proxy
object (implementing the specific virtio transport) to format the address
of the proxy object.
(For virtio-pci devices (where the proxy is an instance of VirtIOPCIProxy,
plugged into a PCI bus), this ends up in pcibus_get_dev_path().)
However, VirtIOMMIOProxy is usually (in practice: always) plugged into
"main-system-bus", the singleton TYPE_SYSTEM_BUS object. This BusClass
does not support formatting QEMU vmstate device paths at all (as
SysBusDevice objects can have zero or more IO ports and zero or more MMIO
regions). Hence the formatting request delegated from
virtio_bus_get_dev_path() gets answered with NULL.
The end result is that the two scsi-hd devices end up with the same device
path "0:0:0", which triggers the assert.
We can solve this by recognizing that virtio-mmio transports are
distinguished from each other by their base addresses in MMIO address
space. Implement virtio_mmio_bus_get_dev_path() as follows:
(1) The virtio device whose devpath is to be formatted resides on a
virtio-mmio bus that is implemented by a VirtIOMMIOProxy object. Ask
the parent bus of VirtIOMMIOProxy to format the device path of
VirtIOMMIOProxy, as a path prefix. (This is identical to what
virtio_bus_get_dev_path() does.)
(2) Append the base address of VirtIOMMIOProxy to the device path, such
as:
- virtio-mmio@000000000a003e00,
- virtio-mmio@000000000a003c00.
Given that these device paths are placed in the migration stream, step (2)
above, if done unconditionally, would break migration. So make that step
conditional on a new VirtIOMMIOProxy property, which is enabled for 2.7
machine types and later.
Cc: "Michael S. Tsirkin" <mst@redhat.com>
Cc: Cole Robinson <crobinso@redhat.com>
Cc: Dr. David Alan Gilbert <dgilbert@redhat.com>
Cc: Kevin Zhao <kevin.zhao@linaro.org>
Cc: Peter Maydell <peter.maydell@linaro.org>
Cc: Tom Hanson <thomas.hanson@linaro.org>
Reported-by: Kevin Zhao <kevin.zhao@linaro.org>
Reviewed-by: Andrew Jones <drjones@redhat.com>
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
Message-id: 1467739394-28357-1-git-send-email-lersek@redhat.com
Fixes: https://bugs.launchpad.net/qemu/+bug/1594239
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
2016-07-14 17:51:36 +02:00
|
|
|
}
|
virtio-mmio: improve virtio-mmio get_dev_path alog
At the moment the following QEMU command line triggers an assertion
failure On xlnx-versal SOC:
qemu-system-aarch64 \
-machine xlnx-versal-virt -nographic -smp 2 -m 128 \
-fsdev local,id=shareid,path=${HOME}/work,security_model=none \
-device virtio-9p-device,fsdev=shareid,mount_tag=share \
-fsdev local,id=shareid1,path=${HOME}/Music,security_model=none \
-device virtio-9p-device,fsdev=shareid1,mount_tag=share1
qemu-system-aarch64: ../migration/savevm.c:860:
vmstate_register_with_alias_id:
Assertion `!se->compat || se->instance_id == 0' failed.
This problem was fixed on arm virt platform in commit f58b39d2d5b
("virtio-mmio: format transport base address in BusClass.get_dev_path")
It works perfectly on arm virt platform. but there is still there on
xlnx-versal SOC.
The main difference between arm virt and xlnx-versal is they use
different way to create virtio-mmio qdev. on arm virt, it calls
sysbus_create_simple("virtio-mmio", base, pic[irq]); which will call
sysbus_mmio_map internally and assign base address to subsys device
mmio correctly. but xlnx-versal's implements won't do this.
However, xlnx-versal can't switch to sysbus_create_simple() to create
virtio-mmio device. It's because xlnx-versal's cpu use
VersalVirt.soc.fpd.apu.mr as it's memory. which is subregion of
system_memory. sysbus_create_simple will add virtio to system_memory,
which can't be accessed by cpu.
Besides, xlnx-versal can't add sysbus_mmio_map api call too, because
this will add memory region to system_memory, and it can't be added
to VersalVirt.soc.fpd.apu.mr again.
We can solve this by assign correct base address offset on dev_path.
This path was test on aarch64 virt & xlnx-versal platform.
Signed-off-by: schspa <schspa@gmail.com>
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
2021-02-25 06:36:06 +01:00
|
|
|
memory_region_unref(section.mr);
|
|
|
|
|
virtio-mmio: format transport base address in BusClass.get_dev_path
At the moment the following QEMU command line triggers an assertion
failure (minimal reproducer by Cole):
qemu-system-aarch64 \
-machine virt-2.6,accel=tcg \
-nodefaults \
-no-user-config \
-nographic -monitor stdio \
-device virtio-scsi-device,id=scsi0 \
-device virtio-scsi-device,id=scsi1 \
-drive file=foo.img,format=raw,if=none,id=d0 \
-device scsi-hd,bus=scsi0.0,drive=d0 \
-drive file=foo.img,format=raw,if=none,id=d1 \
-device scsi-hd,bus=scsi1.0,drive=d1
qemu-system-aarch64: migration/savevm.c:615:
vmstate_register_with_alias_id:
Assertion `!se->compat || se->instance_id == 0' failed.
The reason is that the vmstate sections for the two scsi-hd devices are
not uniquely identifiable by name.
The direct parent buses of the scsi-hd devices -- scsi0.0 and scsi1.0 --
support the BusClass.get_dev_path member function. scsibus_get_dev_path()
formats a device path prefix with the help of its topologically parent
bus, and then appends the chan:id:lun triplet to it. For both scsi-hd
devices, this triplet is 0:0:0.
(Here we use "device path" in the QEMU migration sense, for vmstate
section identification, not in the OFW or UEFI device path senses.)
The virtio-scsi HBA is plugged into the virtio-mmio bus (implemented by
the internal VirtIOMMIOProxy device). This bus class
(TYPE_VIRTIO_MMIO_BUS) inherits, as its get_dev_path() member function,
the virtio_bus_get_dev_path() method from its parent class
(TYPE_VIRTIO_BUS).
virtio_bus_get_dev_path() does not format any kind of device address on
its own; "virtio addresses" are transport-specific. Therefore
virtio_bus_get_dev_path() asks the topologically parent bus of the proxy
object (implementing the specific virtio transport) to format the address
of the proxy object.
(For virtio-pci devices (where the proxy is an instance of VirtIOPCIProxy,
plugged into a PCI bus), this ends up in pcibus_get_dev_path().)
However, VirtIOMMIOProxy is usually (in practice: always) plugged into
"main-system-bus", the singleton TYPE_SYSTEM_BUS object. This BusClass
does not support formatting QEMU vmstate device paths at all (as
SysBusDevice objects can have zero or more IO ports and zero or more MMIO
regions). Hence the formatting request delegated from
virtio_bus_get_dev_path() gets answered with NULL.
The end result is that the two scsi-hd devices end up with the same device
path "0:0:0", which triggers the assert.
We can solve this by recognizing that virtio-mmio transports are
distinguished from each other by their base addresses in MMIO address
space. Implement virtio_mmio_bus_get_dev_path() as follows:
(1) The virtio device whose devpath is to be formatted resides on a
virtio-mmio bus that is implemented by a VirtIOMMIOProxy object. Ask
the parent bus of VirtIOMMIOProxy to format the device path of
VirtIOMMIOProxy, as a path prefix. (This is identical to what
virtio_bus_get_dev_path() does.)
(2) Append the base address of VirtIOMMIOProxy to the device path, such
as:
- virtio-mmio@000000000a003e00,
- virtio-mmio@000000000a003c00.
Given that these device paths are placed in the migration stream, step (2)
above, if done unconditionally, would break migration. So make that step
conditional on a new VirtIOMMIOProxy property, which is enabled for 2.7
machine types and later.
Cc: "Michael S. Tsirkin" <mst@redhat.com>
Cc: Cole Robinson <crobinso@redhat.com>
Cc: Dr. David Alan Gilbert <dgilbert@redhat.com>
Cc: Kevin Zhao <kevin.zhao@linaro.org>
Cc: Peter Maydell <peter.maydell@linaro.org>
Cc: Tom Hanson <thomas.hanson@linaro.org>
Reported-by: Kevin Zhao <kevin.zhao@linaro.org>
Reviewed-by: Andrew Jones <drjones@redhat.com>
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
Message-id: 1467739394-28357-1-git-send-email-lersek@redhat.com
Fixes: https://bugs.launchpad.net/qemu/+bug/1594239
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
2016-07-14 17:51:36 +02:00
|
|
|
g_free(proxy_path);
|
|
|
|
return path;
|
|
|
|
}
|
|
|
|
|
virtio-mmio : fix the crash in the vm shutdown
The root cause for this crash is the ioeventfd not stopped while the VM stop.
The callback for vmstate_change was not implement in virtio-mmio bus
Reproduce step
load the vm with
-M microvm \
-netdev tap,id=net0,vhostforce,script=no,downscript=no \
-device virtio-net-device,netdev=net0\
After the VM boot, login the vm and then shutdown the vm
System will crash
[Current thread is 1 (Thread 0x7ffff6edde00 (LWP 374378))]
(gdb) bt
0 0x00005555558f18b4 in qemu_flush_or_purge_queued_packets (purge=false, nc=0x55500252e850) at ../net/net.c:636
1 qemu_flush_queued_packets (nc=0x55500252e850) at ../net/net.c:656
2 0x0000555555b6c363 in virtio_queue_notify_vq (vq=0x7fffe7e2b010) at ../hw/virtio/virtio.c:2339
3 virtio_queue_host_notifier_read (n=0x7fffe7e2b08c) at ../hw/virtio/virtio.c:3583
4 0x0000555555de7b5a in aio_dispatch_handler (ctx=ctx@entry=0x5555567c5780, node=0x555556b83fd0) at ../util/aio-posix.c:329
5 0x0000555555de8454 in aio_dispatch_ready_handlers (ready_list=<optimized out>, ctx=<optimized out>) at ../util/aio-posix.c:359
6 aio_poll (ctx=0x5555567c5780, blocking=blocking@entry=false) at ../util/aio-posix.c:662
7 0x0000555555cce0cc in monitor_cleanup () at ../monitor/monitor.c:645
8 0x0000555555b06bd2 in qemu_cleanup () at ../softmmu/runstate.c:822
9 0x000055555586e693 in main (argc=<optimized out>, argv=<optimized out>, envp=<optimized out>) at ../softmmu/main.c:51
Signed-off-by: Cindy Lu <lulu@redhat.com>
Message-Id: <20211109023744.22387-1-lulu@redhat.com>
Acked-by: Jason Wang <jasowang@redhat.com
Reviewed-by: Michael S. Tsirkin <mst@redhat.com>
Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
2021-11-09 03:37:44 +01:00
|
|
|
static void virtio_mmio_vmstate_change(DeviceState *d, bool running)
|
|
|
|
{
|
|
|
|
VirtIOMMIOProxy *proxy = VIRTIO_MMIO(d);
|
|
|
|
|
|
|
|
if (running) {
|
|
|
|
virtio_mmio_start_ioeventfd(proxy);
|
|
|
|
} else {
|
|
|
|
virtio_mmio_stop_ioeventfd(proxy);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-07-16 14:25:09 +02:00
|
|
|
static void virtio_mmio_bus_class_init(ObjectClass *klass, void *data)
|
|
|
|
{
|
|
|
|
BusClass *bus_class = BUS_CLASS(klass);
|
|
|
|
VirtioBusClass *k = VIRTIO_BUS_CLASS(klass);
|
|
|
|
|
|
|
|
k->notify = virtio_mmio_update_irq;
|
|
|
|
k->save_config = virtio_mmio_save_config;
|
|
|
|
k->load_config = virtio_mmio_load_config;
|
2019-09-13 14:06:01 +02:00
|
|
|
k->save_extra_state = virtio_mmio_save_extra_state;
|
|
|
|
k->load_extra_state = virtio_mmio_load_extra_state;
|
|
|
|
k->has_extra_state = virtio_mmio_has_extra_state;
|
2015-05-12 10:10:50 +02:00
|
|
|
k->set_guest_notifiers = virtio_mmio_set_guest_notifiers;
|
2016-10-21 22:48:08 +02:00
|
|
|
k->ioeventfd_enabled = virtio_mmio_ioeventfd_enabled;
|
2016-06-10 11:04:13 +02:00
|
|
|
k->ioeventfd_assign = virtio_mmio_ioeventfd_assign;
|
2019-09-13 14:06:01 +02:00
|
|
|
k->pre_plugged = virtio_mmio_pre_plugged;
|
virtio-mmio : fix the crash in the vm shutdown
The root cause for this crash is the ioeventfd not stopped while the VM stop.
The callback for vmstate_change was not implement in virtio-mmio bus
Reproduce step
load the vm with
-M microvm \
-netdev tap,id=net0,vhostforce,script=no,downscript=no \
-device virtio-net-device,netdev=net0\
After the VM boot, login the vm and then shutdown the vm
System will crash
[Current thread is 1 (Thread 0x7ffff6edde00 (LWP 374378))]
(gdb) bt
0 0x00005555558f18b4 in qemu_flush_or_purge_queued_packets (purge=false, nc=0x55500252e850) at ../net/net.c:636
1 qemu_flush_queued_packets (nc=0x55500252e850) at ../net/net.c:656
2 0x0000555555b6c363 in virtio_queue_notify_vq (vq=0x7fffe7e2b010) at ../hw/virtio/virtio.c:2339
3 virtio_queue_host_notifier_read (n=0x7fffe7e2b08c) at ../hw/virtio/virtio.c:3583
4 0x0000555555de7b5a in aio_dispatch_handler (ctx=ctx@entry=0x5555567c5780, node=0x555556b83fd0) at ../util/aio-posix.c:329
5 0x0000555555de8454 in aio_dispatch_ready_handlers (ready_list=<optimized out>, ctx=<optimized out>) at ../util/aio-posix.c:359
6 aio_poll (ctx=0x5555567c5780, blocking=blocking@entry=false) at ../util/aio-posix.c:662
7 0x0000555555cce0cc in monitor_cleanup () at ../monitor/monitor.c:645
8 0x0000555555b06bd2 in qemu_cleanup () at ../softmmu/runstate.c:822
9 0x000055555586e693 in main (argc=<optimized out>, argv=<optimized out>, envp=<optimized out>) at ../softmmu/main.c:51
Signed-off-by: Cindy Lu <lulu@redhat.com>
Message-Id: <20211109023744.22387-1-lulu@redhat.com>
Acked-by: Jason Wang <jasowang@redhat.com
Reviewed-by: Michael S. Tsirkin <mst@redhat.com>
Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
2021-11-09 03:37:44 +01:00
|
|
|
k->vmstate_change = virtio_mmio_vmstate_change;
|
2013-07-16 14:25:09 +02:00
|
|
|
k->has_variable_vring_alignment = true;
|
|
|
|
bus_class->max_dev = 1;
|
virtio-mmio: format transport base address in BusClass.get_dev_path
At the moment the following QEMU command line triggers an assertion
failure (minimal reproducer by Cole):
qemu-system-aarch64 \
-machine virt-2.6,accel=tcg \
-nodefaults \
-no-user-config \
-nographic -monitor stdio \
-device virtio-scsi-device,id=scsi0 \
-device virtio-scsi-device,id=scsi1 \
-drive file=foo.img,format=raw,if=none,id=d0 \
-device scsi-hd,bus=scsi0.0,drive=d0 \
-drive file=foo.img,format=raw,if=none,id=d1 \
-device scsi-hd,bus=scsi1.0,drive=d1
qemu-system-aarch64: migration/savevm.c:615:
vmstate_register_with_alias_id:
Assertion `!se->compat || se->instance_id == 0' failed.
The reason is that the vmstate sections for the two scsi-hd devices are
not uniquely identifiable by name.
The direct parent buses of the scsi-hd devices -- scsi0.0 and scsi1.0 --
support the BusClass.get_dev_path member function. scsibus_get_dev_path()
formats a device path prefix with the help of its topologically parent
bus, and then appends the chan:id:lun triplet to it. For both scsi-hd
devices, this triplet is 0:0:0.
(Here we use "device path" in the QEMU migration sense, for vmstate
section identification, not in the OFW or UEFI device path senses.)
The virtio-scsi HBA is plugged into the virtio-mmio bus (implemented by
the internal VirtIOMMIOProxy device). This bus class
(TYPE_VIRTIO_MMIO_BUS) inherits, as its get_dev_path() member function,
the virtio_bus_get_dev_path() method from its parent class
(TYPE_VIRTIO_BUS).
virtio_bus_get_dev_path() does not format any kind of device address on
its own; "virtio addresses" are transport-specific. Therefore
virtio_bus_get_dev_path() asks the topologically parent bus of the proxy
object (implementing the specific virtio transport) to format the address
of the proxy object.
(For virtio-pci devices (where the proxy is an instance of VirtIOPCIProxy,
plugged into a PCI bus), this ends up in pcibus_get_dev_path().)
However, VirtIOMMIOProxy is usually (in practice: always) plugged into
"main-system-bus", the singleton TYPE_SYSTEM_BUS object. This BusClass
does not support formatting QEMU vmstate device paths at all (as
SysBusDevice objects can have zero or more IO ports and zero or more MMIO
regions). Hence the formatting request delegated from
virtio_bus_get_dev_path() gets answered with NULL.
The end result is that the two scsi-hd devices end up with the same device
path "0:0:0", which triggers the assert.
We can solve this by recognizing that virtio-mmio transports are
distinguished from each other by their base addresses in MMIO address
space. Implement virtio_mmio_bus_get_dev_path() as follows:
(1) The virtio device whose devpath is to be formatted resides on a
virtio-mmio bus that is implemented by a VirtIOMMIOProxy object. Ask
the parent bus of VirtIOMMIOProxy to format the device path of
VirtIOMMIOProxy, as a path prefix. (This is identical to what
virtio_bus_get_dev_path() does.)
(2) Append the base address of VirtIOMMIOProxy to the device path, such
as:
- virtio-mmio@000000000a003e00,
- virtio-mmio@000000000a003c00.
Given that these device paths are placed in the migration stream, step (2)
above, if done unconditionally, would break migration. So make that step
conditional on a new VirtIOMMIOProxy property, which is enabled for 2.7
machine types and later.
Cc: "Michael S. Tsirkin" <mst@redhat.com>
Cc: Cole Robinson <crobinso@redhat.com>
Cc: Dr. David Alan Gilbert <dgilbert@redhat.com>
Cc: Kevin Zhao <kevin.zhao@linaro.org>
Cc: Peter Maydell <peter.maydell@linaro.org>
Cc: Tom Hanson <thomas.hanson@linaro.org>
Reported-by: Kevin Zhao <kevin.zhao@linaro.org>
Reviewed-by: Andrew Jones <drjones@redhat.com>
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
Message-id: 1467739394-28357-1-git-send-email-lersek@redhat.com
Fixes: https://bugs.launchpad.net/qemu/+bug/1594239
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
2016-07-14 17:51:36 +02:00
|
|
|
bus_class->get_dev_path = virtio_mmio_bus_get_dev_path;
|
2013-07-16 14:25:09 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
static const TypeInfo virtio_mmio_bus_info = {
|
|
|
|
.name = TYPE_VIRTIO_MMIO_BUS,
|
|
|
|
.parent = TYPE_VIRTIO_BUS,
|
|
|
|
.instance_size = sizeof(VirtioBusState),
|
|
|
|
.class_init = virtio_mmio_bus_class_init,
|
|
|
|
};
|
|
|
|
|
|
|
|
static void virtio_mmio_register_types(void)
|
|
|
|
{
|
|
|
|
type_register_static(&virtio_mmio_bus_info);
|
|
|
|
type_register_static(&virtio_mmio_info);
|
|
|
|
}
|
|
|
|
|
|
|
|
type_init(virtio_mmio_register_types)
|