Skip to content

Commit c22649d

Browse files
committed
virtio-device: extend VirtioDeviceActions Trait
This commit enhances the VirtioDeviceActions Trait to accommodate Vhost and Vhost-User devices. This way, this crate can be used not only to implement virtio abstractions for devices that are implemented inside the VMM, but it can also serve as a frontend virtio device abstraction for Vhost and Vhost-user type devices. This patch introduces four new methods to the VirtioDeviceActions: - `read_config` and `write_config`: These methods are invoked when the driver intends to read from or write to the device configuration space. Given that the device configuration space can be managed by various handlers outside of the VMM, such as vhost or vhost-user, dedicated logic is necessary to handle these operations. - `negotiate_driver_features`: This method is called when the driver finishes the negotiation of the driver features with the frontend device (selecting page 0). This method is crucial when the device handler is implemented outside of the VMM since the frontend device needs to negotiate the features with the backend device. Otherwise, the device will not be prepared to support some driver features. - `interrupt_status`: When the driver requires reading the interrupt status from the device, this method is invoked. Since the responsibility for managing interrupt status lies with the frontend device, specialized logic is needed to update the interrupt status appropriately (Used Buffer Notification or Configuration Change Notification). If the device is implemented within the VMM, the interrupt status is direct management and updating by the device. Signed-off-by: joaopeixoto13 <[email protected]>
1 parent 563ac82 commit c22649d

File tree

1 file changed

+65
-32
lines changed

1 file changed

+65
-32
lines changed

virtio-device/src/virtio_config.rs

+65-32
Original file line numberDiff line numberDiff line change
@@ -3,13 +3,10 @@
33
// SPDX-License-Identifier: Apache-2.0 OR BSD-3-Clause
44

55
use std::borrow::BorrowMut;
6-
use std::cmp;
76
use std::result;
87
use std::sync::atomic::AtomicU8;
98
use std::sync::Arc;
109

11-
use log::error;
12-
1310
use crate::{VirtioDevice, WithDriverSelect};
1411
use virtio_queue::{Queue, QueueT};
1512

@@ -85,6 +82,18 @@ pub trait VirtioDeviceActions {
8582

8683
/// Invoke the logic associated with resetting this device.
8784
fn reset(&mut self) -> result::Result<(), Self::E>;
85+
86+
/// Invoke the logic associated with reading from the device configuration space.
87+
fn read_config(&self, offset: usize, data: &mut [u8]);
88+
89+
/// Invoke the logic associated with writing to the device configuration space.
90+
fn write_config(&mut self, offset: usize, data: &[u8]);
91+
92+
/// Invoke the logic associated with negotiating the driver features.
93+
fn negotiate_driver_features(&mut self);
94+
95+
/// Invoke the logic associated with the device interrupt status.
96+
fn interrupt_status(&self) -> &Arc<AtomicU8>;
8897
}
8998

9099
// We can automatically implement the `VirtioDevice` trait for objects that only explicitly
@@ -130,6 +139,10 @@ where
130139
1 => ((features << 32) >> 32) + (v << 32),
131140
// Accessing an unknown page has no effect.
132141
_ => features,
142+
};
143+
144+
if page == 0 {
145+
<Self as VirtioDeviceActions>::negotiate_driver_features(self);
133146
}
134147
}
135148

@@ -150,41 +163,19 @@ where
150163
}
151164

152165
fn interrupt_status(&self) -> &Arc<AtomicU8> {
153-
&self.borrow().interrupt_status
166+
<Self as VirtioDeviceActions>::interrupt_status(self)
154167
}
155168

156169
fn config_generation(&self) -> u8 {
157170
self.borrow().config_generation
158171
}
159172

160173
fn read_config(&self, offset: usize, data: &mut [u8]) {
161-
let config_space = &self.borrow().config_space;
162-
let config_len = config_space.len();
163-
if offset >= config_len {
164-
error!("Failed to read from config space");
165-
return;
166-
}
167-
168-
// TODO: Are partial reads ok?
169-
let end = cmp::min(offset.saturating_add(data.len()), config_len);
170-
let read_len = end - offset;
171-
// Cannot fail because the lengths are identical and we do bounds checking beforehand.
172-
data[..read_len].copy_from_slice(&config_space[offset..end])
174+
<Self as VirtioDeviceActions>::read_config(self, offset, data)
173175
}
174176

175177
fn write_config(&mut self, offset: usize, data: &[u8]) {
176-
let config_space = &mut self.borrow_mut().config_space;
177-
let config_len = config_space.len();
178-
if offset >= config_len {
179-
error!("Failed to write to config space");
180-
return;
181-
}
182-
183-
// TODO: Are partial writes ok?
184-
let end = cmp::min(offset.saturating_add(data.len()), config_len);
185-
let write_len = end - offset;
186-
// Cannot fail because the lengths are identical and we do bounds checking beforehand.
187-
config_space[offset..end].copy_from_slice(&data[..write_len]);
178+
<Self as VirtioDeviceActions>::write_config(self, offset, data)
188179
}
189180
}
190181

@@ -222,6 +213,9 @@ pub(crate) mod tests {
222213
use super::*;
223214
use crate::mmio::VirtioMmioDevice;
224215
use std::borrow::Borrow;
216+
use log::error;
217+
use std::cmp;
218+
use std::sync::atomic::Ordering;
225219

226220
pub struct Dummy {
227221
pub cfg: VirtioConfig<Queue>,
@@ -276,6 +270,42 @@ pub(crate) mod tests {
276270
self.reset_count += 1;
277271
Ok(())
278272
}
273+
274+
fn read_config(&self, offset: usize, data: &mut [u8]) {
275+
let config_space = &self.cfg.config_space;
276+
let config_len = config_space.len();
277+
if offset >= config_len {
278+
error!("Failed to read from config space");
279+
return;
280+
}
281+
282+
// TODO: Are partial reads ok?
283+
let end = cmp::min(offset.saturating_add(data.len()), config_len);
284+
let read_len = end - offset;
285+
// Cannot fail because the lengths are identical and we do bounds checking beforehand.
286+
data[..read_len].copy_from_slice(&config_space[offset..end])
287+
}
288+
289+
fn write_config(&mut self, offset: usize, data: &[u8]) {
290+
let config_space = &mut self.cfg.config_space;
291+
let config_len = config_space.len();
292+
if offset >= config_len {
293+
error!("Failed to write to config space");
294+
return;
295+
}
296+
297+
// TODO: Are partial writes ok?
298+
let end = cmp::min(offset.saturating_add(data.len()), config_len);
299+
let write_len = end - offset;
300+
// Cannot fail because the lengths are identical and we do bounds checking beforehand.
301+
config_space[offset..end].copy_from_slice(&data[..write_len]);
302+
}
303+
304+
fn negotiate_driver_features(&mut self) {}
305+
306+
fn interrupt_status(&self) -> &Arc<AtomicU8> {
307+
&self.cfg.interrupt_status
308+
}
279309
}
280310

281311
impl VirtioMmioDevice for Dummy {
@@ -320,10 +350,10 @@ pub(crate) mod tests {
320350
let mut v2 = vec![0u8; len];
321351

322352
// Offset to large to read anything.
323-
d.read_config(len, v2.as_mut_slice());
353+
VirtioDevice::read_config(&d, len, v2.as_mut_slice());
324354
assert_eq!(v1, v2);
325355

326-
d.read_config(len / 2, v2.as_mut_slice());
356+
VirtioDevice::read_config(&d, len / 2, v2.as_mut_slice());
327357
for i in 0..len {
328358
if i < len / 2 {
329359
assert_eq!(v2[i], config_space[len / 2 + i]);
@@ -333,10 +363,10 @@ pub(crate) mod tests {
333363
}
334364

335365
// Offset too large to overwrite anything.
336-
d.write_config(len, v1.as_slice());
366+
VirtioDevice::write_config(&mut d, len, v1.as_slice());
337367
assert_eq!(d.cfg.config_space, config_space);
338368

339-
d.write_config(len / 2, v1.as_slice());
369+
VirtioDevice::write_config(&mut d, len / 2, v1.as_slice());
340370
for (i, &value) in config_space.iter().enumerate().take(len) {
341371
if i < len / 2 {
342372
assert_eq!(d.cfg.config_space[i], value);
@@ -345,6 +375,9 @@ pub(crate) mod tests {
345375
}
346376
}
347377

378+
d.cfg.interrupt_status.fetch_or(1, Ordering::SeqCst);
379+
assert_eq!(VirtioDevice::interrupt_status(&d).load(Ordering::SeqCst), 1);
380+
348381
// Let's test the `WithDriverSelect` auto impl now.
349382
assert_eq!(d.queue_select(), 0);
350383
d.set_queue_select(1);

0 commit comments

Comments
 (0)