4 * Copyright(c) 2010-2016 Intel Corporation. All rights reserved.
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
11 * * Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
13 * * Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in
15 * the documentation and/or other materials provided with the
17 * * Neither the name of Intel Corporation nor the names of its
18 * contributors may be used to endorse or promote products derived
19 * from this software without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
22 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
23 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
24 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
25 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
26 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
27 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
28 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
29 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
30 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
31 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
40 #include <sys/types.h>
43 #ifdef RTE_LIBRTE_VHOST_NUMA
47 #include <rte_common.h>
48 #include <rte_malloc.h>
52 #include "vhost_user.h"
54 static const char *vhost_message_str[VHOST_USER_MAX] = {
55 [VHOST_USER_NONE] = "VHOST_USER_NONE",
56 [VHOST_USER_GET_FEATURES] = "VHOST_USER_GET_FEATURES",
57 [VHOST_USER_SET_FEATURES] = "VHOST_USER_SET_FEATURES",
58 [VHOST_USER_SET_OWNER] = "VHOST_USER_SET_OWNER",
59 [VHOST_USER_RESET_OWNER] = "VHOST_USER_RESET_OWNER",
60 [VHOST_USER_SET_MEM_TABLE] = "VHOST_USER_SET_MEM_TABLE",
61 [VHOST_USER_SET_LOG_BASE] = "VHOST_USER_SET_LOG_BASE",
62 [VHOST_USER_SET_LOG_FD] = "VHOST_USER_SET_LOG_FD",
63 [VHOST_USER_SET_VRING_NUM] = "VHOST_USER_SET_VRING_NUM",
64 [VHOST_USER_SET_VRING_ADDR] = "VHOST_USER_SET_VRING_ADDR",
65 [VHOST_USER_SET_VRING_BASE] = "VHOST_USER_SET_VRING_BASE",
66 [VHOST_USER_GET_VRING_BASE] = "VHOST_USER_GET_VRING_BASE",
67 [VHOST_USER_SET_VRING_KICK] = "VHOST_USER_SET_VRING_KICK",
68 [VHOST_USER_SET_VRING_CALL] = "VHOST_USER_SET_VRING_CALL",
69 [VHOST_USER_SET_VRING_ERR] = "VHOST_USER_SET_VRING_ERR",
70 [VHOST_USER_GET_PROTOCOL_FEATURES] = "VHOST_USER_GET_PROTOCOL_FEATURES",
71 [VHOST_USER_SET_PROTOCOL_FEATURES] = "VHOST_USER_SET_PROTOCOL_FEATURES",
72 [VHOST_USER_GET_QUEUE_NUM] = "VHOST_USER_GET_QUEUE_NUM",
73 [VHOST_USER_SET_VRING_ENABLE] = "VHOST_USER_SET_VRING_ENABLE",
74 [VHOST_USER_SEND_RARP] = "VHOST_USER_SEND_RARP",
77 struct orig_region_map {
79 uint64_t mapped_address;
84 #define orig_region(ptr, nregions) \
85 ((struct orig_region_map *)RTE_PTR_ADD((ptr), \
86 sizeof(struct virtio_memory) + \
87 sizeof(struct virtio_memory_regions) * (nregions)))
95 ret = fstat(fd, &stat);
96 return ret == -1 ? (uint64_t)-1 : (uint64_t)stat.st_blksize;
100 free_mem_region(struct virtio_net *dev)
102 struct orig_region_map *region;
105 if (!dev || !dev->mem)
108 region = orig_region(dev->mem, dev->mem->nregions);
109 for (idx = 0; idx < dev->mem->nregions; idx++) {
110 if (region[idx].mapped_address) {
111 munmap((void *)(uintptr_t)region[idx].mapped_address,
112 region[idx].mapped_size);
113 close(region[idx].fd);
119 vhost_backend_cleanup(struct virtio_net *dev)
122 free_mem_region(dev);
127 munmap((void *)(uintptr_t)dev->log_addr, dev->log_size);
133 * This function just returns success at the moment unless
134 * the device hasn't been initialised.
137 vhost_set_owner(int vid)
139 struct virtio_net *dev;
141 dev = get_device(vid);
149 vhost_reset_owner(int vid)
151 struct virtio_net *dev;
153 dev = get_device(vid);
157 if (dev->flags & VIRTIO_DEV_RUNNING) {
158 dev->flags &= ~VIRTIO_DEV_RUNNING;
159 notify_ops->destroy_device(vid);
162 cleanup_device(dev, 0);
168 * The features that we support are requested.
171 vhost_get_features(int vid, uint64_t *pu)
173 struct virtio_net *dev;
175 dev = get_device(vid);
179 /* Send our supported features. */
180 *pu = VHOST_FEATURES;
185 * We receive the negotiated features supported by us and the virtio device.
188 vhost_set_features(int vid, uint64_t *pu)
190 struct virtio_net *dev;
192 dev = get_device(vid);
195 if (*pu & ~VHOST_FEATURES)
200 ((1 << VIRTIO_NET_F_MRG_RXBUF) | (1ULL << VIRTIO_F_VERSION_1))) {
201 dev->vhost_hlen = sizeof(struct virtio_net_hdr_mrg_rxbuf);
203 dev->vhost_hlen = sizeof(struct virtio_net_hdr);
205 LOG_DEBUG(VHOST_CONFIG,
206 "(%d) mergeable RX buffers %s, virtio 1 %s\n",
208 (dev->features & (1 << VIRTIO_NET_F_MRG_RXBUF)) ? "on" : "off",
209 (dev->features & (1ULL << VIRTIO_F_VERSION_1)) ? "on" : "off");
215 * The virtio device sends us the size of the descriptor ring.
218 vhost_set_vring_num(int vid, struct vhost_vring_state *state)
220 struct virtio_net *dev;
222 dev = get_device(vid);
226 /* State->index refers to the queue index. The txq is 1, rxq is 0. */
227 dev->virtqueue[state->index]->size = state->num;
233 * Reallocate virtio_dev and vhost_virtqueue data structure to make them on the
234 * same numa node as the memory of vring descriptor.
236 #ifdef RTE_LIBRTE_VHOST_NUMA
237 static struct virtio_net*
238 numa_realloc(struct virtio_net *dev, int index)
240 int oldnode, newnode;
241 struct virtio_net *old_dev;
242 struct vhost_virtqueue *old_vq, *vq;
246 * vq is allocated on pairs, we should try to do realloc
247 * on first queue of one queue pair only.
249 if (index % VIRTIO_QNUM != 0)
253 vq = old_vq = dev->virtqueue[index];
255 ret = get_mempolicy(&newnode, NULL, 0, old_vq->desc,
256 MPOL_F_NODE | MPOL_F_ADDR);
258 /* check if we need to reallocate vq */
259 ret |= get_mempolicy(&oldnode, NULL, 0, old_vq,
260 MPOL_F_NODE | MPOL_F_ADDR);
262 RTE_LOG(ERR, VHOST_CONFIG,
263 "Unable to get vq numa information.\n");
266 if (oldnode != newnode) {
267 RTE_LOG(INFO, VHOST_CONFIG,
268 "reallocate vq from %d to %d node\n", oldnode, newnode);
269 vq = rte_malloc_socket(NULL, sizeof(*vq) * VIRTIO_QNUM, 0,
274 memcpy(vq, old_vq, sizeof(*vq) * VIRTIO_QNUM);
278 /* check if we need to reallocate dev */
279 ret = get_mempolicy(&oldnode, NULL, 0, old_dev,
280 MPOL_F_NODE | MPOL_F_ADDR);
282 RTE_LOG(ERR, VHOST_CONFIG,
283 "Unable to get dev numa information.\n");
286 if (oldnode != newnode) {
287 RTE_LOG(INFO, VHOST_CONFIG,
288 "reallocate dev from %d to %d node\n",
290 dev = rte_malloc_socket(NULL, sizeof(*dev), 0, newnode);
296 memcpy(dev, old_dev, sizeof(*dev));
301 dev->virtqueue[index] = vq;
302 dev->virtqueue[index + 1] = vq + 1;
303 vhost_devices[dev->vid] = dev;
308 static struct virtio_net*
309 numa_realloc(struct virtio_net *dev, int index __rte_unused)
316 * Converts QEMU virtual address to Vhost virtual address. This function is
317 * used to convert the ring addresses to our address space.
320 qva_to_vva(struct virtio_net *dev, uint64_t qemu_va)
322 struct virtio_memory_regions *region;
323 uint64_t vhost_va = 0;
324 uint32_t regionidx = 0;
326 /* Find the region where the address lives. */
327 for (regionidx = 0; regionidx < dev->mem->nregions; regionidx++) {
328 region = &dev->mem->regions[regionidx];
329 if ((qemu_va >= region->userspace_address) &&
330 (qemu_va <= region->userspace_address +
331 region->memory_size)) {
332 vhost_va = qemu_va + region->guest_phys_address +
333 region->address_offset -
334 region->userspace_address;
342 * The virtio device sends us the desc, used and avail ring addresses.
343 * This function then converts these to our address space.
346 vhost_set_vring_addr(int vid, struct vhost_vring_addr *addr)
348 struct virtio_net *dev;
349 struct vhost_virtqueue *vq;
351 dev = get_device(vid);
352 if ((dev == NULL) || (dev->mem == NULL))
355 /* addr->index refers to the queue index. The txq 1, rxq is 0. */
356 vq = dev->virtqueue[addr->index];
358 /* The addresses are converted from QEMU virtual to Vhost virtual. */
359 vq->desc = (struct vring_desc *)(uintptr_t)qva_to_vva(dev,
360 addr->desc_user_addr);
362 RTE_LOG(ERR, VHOST_CONFIG,
363 "(%d) failed to find desc ring address.\n",
368 dev = numa_realloc(dev, addr->index);
369 vq = dev->virtqueue[addr->index];
371 vq->avail = (struct vring_avail *)(uintptr_t)qva_to_vva(dev,
372 addr->avail_user_addr);
373 if (vq->avail == 0) {
374 RTE_LOG(ERR, VHOST_CONFIG,
375 "(%d) failed to find avail ring address.\n",
380 vq->used = (struct vring_used *)(uintptr_t)qva_to_vva(dev,
381 addr->used_user_addr);
383 RTE_LOG(ERR, VHOST_CONFIG,
384 "(%d) failed to find used ring address.\n",
389 if (vq->last_used_idx != vq->used->idx) {
390 RTE_LOG(WARNING, VHOST_CONFIG,
391 "last_used_idx (%u) and vq->used->idx (%u) mismatches; "
392 "some packets maybe resent for Tx and dropped for Rx\n",
393 vq->last_used_idx, vq->used->idx);
394 vq->last_used_idx = vq->used->idx;
397 vq->log_guest_addr = addr->log_guest_addr;
399 LOG_DEBUG(VHOST_CONFIG, "(%d) mapped address desc: %p\n",
401 LOG_DEBUG(VHOST_CONFIG, "(%d) mapped address avail: %p\n",
402 dev->vid, vq->avail);
403 LOG_DEBUG(VHOST_CONFIG, "(%d) mapped address used: %p\n",
405 LOG_DEBUG(VHOST_CONFIG, "(%d) log_guest_addr: %" PRIx64 "\n",
406 dev->vid, vq->log_guest_addr);
412 * The virtio device sends us the available ring last used index.
415 vhost_set_vring_base(int vid, struct vhost_vring_state *state)
417 struct virtio_net *dev;
419 dev = get_device(vid);
423 /* State->index refers to the queue index. The txq is 1, rxq is 0. */
424 dev->virtqueue[state->index]->last_used_idx = state->num;
430 * We send the virtio device our available ring last used index.
433 vhost_get_vring_base(int vid, uint32_t index,
434 struct vhost_vring_state *state)
436 struct virtio_net *dev;
438 dev = get_device(vid);
442 state->index = index;
443 /* State->index refers to the queue index. The txq is 1, rxq is 0. */
444 state->num = dev->virtqueue[state->index]->last_used_idx;
450 * The virtio device sends an eventfd to interrupt the guest. This fd gets
451 * copied into our process space.
454 vhost_set_vring_call(int vid, struct vhost_vring_file *file)
456 struct virtio_net *dev;
457 struct vhost_virtqueue *vq;
458 uint32_t cur_qp_idx = file->index / VIRTIO_QNUM;
460 dev = get_device(vid);
465 * FIXME: VHOST_SET_VRING_CALL is the first per-vring message
466 * we get, so we do vring queue pair allocation here.
468 if (cur_qp_idx + 1 > dev->virt_qp_nb) {
469 if (alloc_vring_queue_pair(dev, cur_qp_idx) < 0)
473 /* file->index refers to the queue index. The txq is 1, rxq is 0. */
474 vq = dev->virtqueue[file->index];
480 vq->callfd = file->fd;
486 * The virtio device sends an eventfd that it can use to notify us.
487 * This fd gets copied into our process space.
490 vhost_set_vring_kick(int vid, struct vhost_vring_file *file)
492 struct virtio_net *dev;
493 struct vhost_virtqueue *vq;
495 dev = get_device(vid);
499 /* file->index refers to the queue index. The txq is 1, rxq is 0. */
500 vq = dev->virtqueue[file->index];
505 vq->kickfd = file->fd;
511 user_set_mem_table(int vid, struct VhostUserMsg *pmsg)
513 struct VhostUserMemory memory = pmsg->payload.memory;
514 struct virtio_memory_regions *pregion;
515 uint64_t mapped_address, mapped_size;
516 struct virtio_net *dev;
517 unsigned int idx = 0;
518 struct orig_region_map *pregion_orig;
521 /* unmap old memory regions one by one*/
522 dev = get_device(vid);
526 /* Remove from the data plane. */
527 if (dev->flags & VIRTIO_DEV_RUNNING) {
528 dev->flags &= ~VIRTIO_DEV_RUNNING;
529 notify_ops->destroy_device(vid);
533 free_mem_region(dev);
539 sizeof(struct virtio_memory) +
540 sizeof(struct virtio_memory_regions) * memory.nregions +
541 sizeof(struct orig_region_map) * memory.nregions);
542 if (dev->mem == NULL) {
543 RTE_LOG(ERR, VHOST_CONFIG,
544 "(%d) failed to allocate memory for dev->mem\n",
548 dev->mem->nregions = memory.nregions;
550 pregion_orig = orig_region(dev->mem, memory.nregions);
551 for (idx = 0; idx < memory.nregions; idx++) {
552 pregion = &dev->mem->regions[idx];
553 pregion->guest_phys_address =
554 memory.regions[idx].guest_phys_addr;
555 pregion->guest_phys_address_end =
556 memory.regions[idx].guest_phys_addr +
557 memory.regions[idx].memory_size;
558 pregion->memory_size =
559 memory.regions[idx].memory_size;
560 pregion->userspace_address =
561 memory.regions[idx].userspace_addr;
564 mapped_size = memory.regions[idx].memory_size +
565 memory.regions[idx].mmap_offset;
567 /* mmap() without flag of MAP_ANONYMOUS, should be called
568 * with length argument aligned with hugepagesz at older
569 * longterm version Linux, like 2.6.32 and 3.2.72, or
570 * mmap() will fail with EINVAL.
572 * to avoid failure, make sure in caller to keep length
575 alignment = get_blk_size(pmsg->fds[idx]);
576 if (alignment == (uint64_t)-1) {
577 RTE_LOG(ERR, VHOST_CONFIG,
578 "couldn't get hugepage size through fstat\n");
581 mapped_size = RTE_ALIGN_CEIL(mapped_size, alignment);
583 mapped_address = (uint64_t)(uintptr_t)mmap(NULL,
585 PROT_READ | PROT_WRITE, MAP_SHARED,
589 RTE_LOG(INFO, VHOST_CONFIG,
590 "mapped region %d fd:%d to:%p sz:0x%"PRIx64" "
591 "off:0x%"PRIx64" align:0x%"PRIx64"\n",
592 idx, pmsg->fds[idx], (void *)(uintptr_t)mapped_address,
593 mapped_size, memory.regions[idx].mmap_offset,
596 if (mapped_address == (uint64_t)(uintptr_t)MAP_FAILED) {
597 RTE_LOG(ERR, VHOST_CONFIG,
598 "mmap qemu guest failed.\n");
602 pregion_orig[idx].mapped_address = mapped_address;
603 pregion_orig[idx].mapped_size = mapped_size;
604 pregion_orig[idx].blksz = alignment;
605 pregion_orig[idx].fd = pmsg->fds[idx];
607 mapped_address += memory.regions[idx].mmap_offset;
609 pregion->address_offset = mapped_address -
610 pregion->guest_phys_address;
612 if (memory.regions[idx].guest_phys_addr == 0) {
613 dev->mem->base_address =
614 memory.regions[idx].userspace_addr;
615 dev->mem->mapped_address =
616 pregion->address_offset;
619 LOG_DEBUG(VHOST_CONFIG,
620 "REGION: %u GPA: %p QEMU VA: %p SIZE (%"PRIu64")\n",
622 (void *)(uintptr_t)pregion->guest_phys_address,
623 (void *)(uintptr_t)pregion->userspace_address,
624 pregion->memory_size);
631 munmap((void *)(uintptr_t)pregion_orig[idx].mapped_address,
632 pregion_orig[idx].mapped_size);
633 close(pregion_orig[idx].fd);
641 vq_is_ready(struct vhost_virtqueue *vq)
643 return vq && vq->desc &&
644 vq->kickfd != VIRTIO_UNINITIALIZED_EVENTFD &&
645 vq->callfd != VIRTIO_UNINITIALIZED_EVENTFD;
649 virtio_is_ready(struct virtio_net *dev)
651 struct vhost_virtqueue *rvq, *tvq;
654 for (i = 0; i < dev->virt_qp_nb; i++) {
655 rvq = dev->virtqueue[i * VIRTIO_QNUM + VIRTIO_RXQ];
656 tvq = dev->virtqueue[i * VIRTIO_QNUM + VIRTIO_TXQ];
658 if (!vq_is_ready(rvq) || !vq_is_ready(tvq)) {
659 RTE_LOG(INFO, VHOST_CONFIG,
660 "virtio is not ready for processing.\n");
665 RTE_LOG(INFO, VHOST_CONFIG,
666 "virtio is now ready for processing.\n");
671 user_set_vring_call(int vid, struct VhostUserMsg *pmsg)
673 struct vhost_vring_file file;
675 file.index = pmsg->payload.u64 & VHOST_USER_VRING_IDX_MASK;
676 if (pmsg->payload.u64 & VHOST_USER_VRING_NOFD_MASK)
677 file.fd = VIRTIO_INVALID_EVENTFD;
679 file.fd = pmsg->fds[0];
680 RTE_LOG(INFO, VHOST_CONFIG,
681 "vring call idx:%d file:%d\n", file.index, file.fd);
682 vhost_set_vring_call(vid, &file);
686 * In vhost-user, when we receive kick message, will test whether virtio
687 * device is ready for packet processing.
690 user_set_vring_kick(int vid, struct VhostUserMsg *pmsg)
692 struct vhost_vring_file file;
693 struct virtio_net *dev = get_device(vid);
698 file.index = pmsg->payload.u64 & VHOST_USER_VRING_IDX_MASK;
699 if (pmsg->payload.u64 & VHOST_USER_VRING_NOFD_MASK)
700 file.fd = VIRTIO_INVALID_EVENTFD;
702 file.fd = pmsg->fds[0];
703 RTE_LOG(INFO, VHOST_CONFIG,
704 "vring kick idx:%d file:%d\n", file.index, file.fd);
705 vhost_set_vring_kick(vid, &file);
707 if (virtio_is_ready(dev) && !(dev->flags & VIRTIO_DEV_RUNNING)) {
708 if (notify_ops->new_device(vid) == 0)
709 dev->flags |= VIRTIO_DEV_RUNNING;
714 * when virtio is stopped, qemu will send us the GET_VRING_BASE message.
717 user_get_vring_base(int vid, struct vhost_vring_state *state)
719 struct virtio_net *dev = get_device(vid);
723 /* We have to stop the queue (virtio) if it is running. */
724 if (dev->flags & VIRTIO_DEV_RUNNING) {
725 dev->flags &= ~VIRTIO_DEV_RUNNING;
726 notify_ops->destroy_device(vid);
729 /* Here we are safe to get the last used index */
730 vhost_get_vring_base(vid, state->index, state);
732 RTE_LOG(INFO, VHOST_CONFIG,
733 "vring base idx:%d file:%d\n", state->index, state->num);
735 * Based on current qemu vhost-user implementation, this message is
736 * sent and only sent in vhost_vring_stop.
737 * TODO: cleanup the vring, it isn't usable since here.
739 if (dev->virtqueue[state->index]->kickfd >= 0)
740 close(dev->virtqueue[state->index]->kickfd);
742 dev->virtqueue[state->index]->kickfd = VIRTIO_UNINITIALIZED_EVENTFD;
748 * when virtio queues are ready to work, qemu will send us to
749 * enable the virtio queue pair.
752 user_set_vring_enable(int vid, struct vhost_vring_state *state)
754 struct virtio_net *dev;
755 int enable = (int)state->num;
757 dev = get_device(vid);
761 RTE_LOG(INFO, VHOST_CONFIG,
762 "set queue enable: %d to qp idx: %d\n",
763 enable, state->index);
765 if (notify_ops->vring_state_changed)
766 notify_ops->vring_state_changed(vid, state->index, enable);
768 dev->virtqueue[state->index]->enabled = enable;
774 user_set_protocol_features(int vid, uint64_t protocol_features)
776 struct virtio_net *dev;
778 dev = get_device(vid);
779 if (dev == NULL || protocol_features & ~VHOST_USER_PROTOCOL_FEATURES)
782 dev->protocol_features = protocol_features;
786 user_set_log_base(int vid, struct VhostUserMsg *msg)
788 struct virtio_net *dev;
789 int fd = msg->fds[0];
793 dev = get_device(vid);
798 RTE_LOG(ERR, VHOST_CONFIG, "invalid log fd: %d\n", fd);
802 if (msg->size != sizeof(VhostUserLog)) {
803 RTE_LOG(ERR, VHOST_CONFIG,
804 "invalid log base msg size: %"PRId32" != %d\n",
805 msg->size, (int)sizeof(VhostUserLog));
809 size = msg->payload.log.mmap_size;
810 off = msg->payload.log.mmap_offset;
811 RTE_LOG(INFO, VHOST_CONFIG,
812 "log mmap size: %"PRId64", offset: %"PRId64"\n",
816 * mmap from 0 to workaround a hugepage mmap bug: mmap will
817 * fail when offset is not page size aligned.
819 addr = mmap(0, size, PROT_READ | PROT_WRITE, MAP_SHARED, fd, 0);
821 if (addr == MAP_FAILED) {
822 RTE_LOG(ERR, VHOST_CONFIG, "mmap log base failed!\n");
827 * Free previously mapped log memory on occasionally
828 * multiple VHOST_USER_SET_LOG_BASE.
831 munmap((void *)(uintptr_t)dev->log_addr, dev->log_size);
833 dev->log_addr = (uint64_t)(uintptr_t)addr;
834 dev->log_base = dev->log_addr + off;
835 dev->log_size = size;
841 * An rarp packet is constructed and broadcasted to notify switches about
842 * the new location of the migrated VM, so that packets from outside will
843 * not be lost after migration.
845 * However, we don't actually "send" a rarp packet here, instead, we set
846 * a flag 'broadcast_rarp' to let rte_vhost_dequeue_burst() inject it.
849 user_send_rarp(int vid, struct VhostUserMsg *msg)
851 struct virtio_net *dev;
852 uint8_t *mac = (uint8_t *)&msg->payload.u64;
854 dev = get_device(vid);
858 RTE_LOG(DEBUG, VHOST_CONFIG,
859 ":: mac: %02x:%02x:%02x:%02x:%02x:%02x\n",
860 mac[0], mac[1], mac[2], mac[3], mac[4], mac[5]);
861 memcpy(dev->mac.addr_bytes, mac, 6);
864 * Set the flag to inject a RARP broadcast packet at
865 * rte_vhost_dequeue_burst().
867 * rte_smp_wmb() is for making sure the mac is copied
868 * before the flag is set.
871 rte_atomic16_set(&dev->broadcast_rarp, 1);
876 /* return bytes# of read on success or negative val on failure. */
878 read_vhost_message(int sockfd, struct VhostUserMsg *msg)
882 ret = read_fd_message(sockfd, (char *)msg, VHOST_USER_HDR_SIZE,
883 msg->fds, VHOST_MEMORY_MAX_NREGIONS);
887 if (msg && msg->size) {
888 if (msg->size > sizeof(msg->payload)) {
889 RTE_LOG(ERR, VHOST_CONFIG,
890 "invalid msg size: %d\n", msg->size);
893 ret = read(sockfd, &msg->payload, msg->size);
896 if (ret != (int)msg->size) {
897 RTE_LOG(ERR, VHOST_CONFIG,
898 "read control message failed\n");
907 send_vhost_message(int sockfd, struct VhostUserMsg *msg)
914 msg->flags &= ~VHOST_USER_VERSION_MASK;
915 msg->flags |= VHOST_USER_VERSION;
916 msg->flags |= VHOST_USER_REPLY_MASK;
918 ret = send_fd_message(sockfd, (char *)msg,
919 VHOST_USER_HDR_SIZE + msg->size, NULL, 0);
925 vhost_user_msg_handler(int vid, int fd)
927 struct VhostUserMsg msg;
928 uint64_t features = 0;
931 ret = read_vhost_message(fd, &msg);
932 if (ret <= 0 || msg.request >= VHOST_USER_MAX) {
934 RTE_LOG(ERR, VHOST_CONFIG,
935 "vhost read message failed\n");
937 RTE_LOG(INFO, VHOST_CONFIG,
938 "vhost peer closed\n");
940 RTE_LOG(ERR, VHOST_CONFIG,
941 "vhost read incorrect message\n");
946 RTE_LOG(INFO, VHOST_CONFIG, "read message %s\n",
947 vhost_message_str[msg.request]);
948 switch (msg.request) {
949 case VHOST_USER_GET_FEATURES:
950 ret = vhost_get_features(vid, &features);
951 msg.payload.u64 = features;
952 msg.size = sizeof(msg.payload.u64);
953 send_vhost_message(fd, &msg);
955 case VHOST_USER_SET_FEATURES:
956 features = msg.payload.u64;
957 vhost_set_features(vid, &features);
960 case VHOST_USER_GET_PROTOCOL_FEATURES:
961 msg.payload.u64 = VHOST_USER_PROTOCOL_FEATURES;
962 msg.size = sizeof(msg.payload.u64);
963 send_vhost_message(fd, &msg);
965 case VHOST_USER_SET_PROTOCOL_FEATURES:
966 user_set_protocol_features(vid, msg.payload.u64);
969 case VHOST_USER_SET_OWNER:
970 vhost_set_owner(vid);
972 case VHOST_USER_RESET_OWNER:
973 vhost_reset_owner(vid);
976 case VHOST_USER_SET_MEM_TABLE:
977 user_set_mem_table(vid, &msg);
980 case VHOST_USER_SET_LOG_BASE:
981 user_set_log_base(vid, &msg);
983 /* it needs a reply */
984 msg.size = sizeof(msg.payload.u64);
985 send_vhost_message(fd, &msg);
987 case VHOST_USER_SET_LOG_FD:
989 RTE_LOG(INFO, VHOST_CONFIG, "not implemented.\n");
992 case VHOST_USER_SET_VRING_NUM:
993 vhost_set_vring_num(vid, &msg.payload.state);
995 case VHOST_USER_SET_VRING_ADDR:
996 vhost_set_vring_addr(vid, &msg.payload.addr);
998 case VHOST_USER_SET_VRING_BASE:
999 vhost_set_vring_base(vid, &msg.payload.state);
1002 case VHOST_USER_GET_VRING_BASE:
1003 ret = user_get_vring_base(vid, &msg.payload.state);
1004 msg.size = sizeof(msg.payload.state);
1005 send_vhost_message(fd, &msg);
1008 case VHOST_USER_SET_VRING_KICK:
1009 user_set_vring_kick(vid, &msg);
1011 case VHOST_USER_SET_VRING_CALL:
1012 user_set_vring_call(vid, &msg);
1015 case VHOST_USER_SET_VRING_ERR:
1016 if (!(msg.payload.u64 & VHOST_USER_VRING_NOFD_MASK))
1018 RTE_LOG(INFO, VHOST_CONFIG, "not implemented\n");
1021 case VHOST_USER_GET_QUEUE_NUM:
1022 msg.payload.u64 = VHOST_MAX_QUEUE_PAIRS;
1023 msg.size = sizeof(msg.payload.u64);
1024 send_vhost_message(fd, &msg);
1027 case VHOST_USER_SET_VRING_ENABLE:
1028 user_set_vring_enable(vid, &msg.payload.state);
1030 case VHOST_USER_SEND_RARP:
1031 user_send_rarp(vid, &msg);