]> git.proxmox.com Git - mirror_qemu.git/blame - hw/virtio-net.c
hw: honor low bit in mipssim machine
[mirror_qemu.git] / hw / virtio-net.c
CommitLineData
fbe78f4f
AL
1/*
2 * Virtio Network Device
3 *
4 * Copyright IBM, Corp. 2007
5 *
6 * Authors:
7 * Anthony Liguori <aliguori@us.ibm.com>
8 *
9 * This work is licensed under the terms of the GNU GPL, version 2. See
10 * the COPYING file in the top-level directory.
11 *
12 */
13
e4d5639d 14#include "iov.h"
fbe78f4f
AL
15#include "virtio.h"
16#include "net.h"
7200ac3c 17#include "net/checksum.h"
a8ed73f7 18#include "net/tap.h"
2f792016 19#include "qemu-error.h"
fbe78f4f
AL
20#include "qemu-timer.h"
21#include "virtio-net.h"
9bc6304c 22#include "vhost_net.h"
fbe78f4f 23
0ce0e8f4 24#define VIRTIO_NET_VM_VERSION 11
b6503ed9 25
4ffb17f5 26#define MAC_TABLE_ENTRIES 64
f21c0ed9 27#define MAX_VLAN (1 << 12) /* Per 802.1Q definition */
9d6271b8 28
fbe78f4f
AL
29typedef struct VirtIONet
30{
31 VirtIODevice vdev;
79674068 32 uint8_t mac[ETH_ALEN];
554c97dd 33 uint16_t status;
fbe78f4f
AL
34 VirtQueue *rx_vq;
35 VirtQueue *tx_vq;
3d11d36c 36 VirtQueue *ctrl_vq;
eb6b6c12 37 NICState *nic;
fbe78f4f
AL
38 QEMUTimer *tx_timer;
39 int tx_timer_active;
3a330134 40 uint32_t has_vnet_hdr;
0ce0e8f4 41 uint8_t has_ufo;
6243375f
MM
42 struct {
43 VirtQueueElement elem;
44 ssize_t len;
45 } async_tx;
fbe78f4f 46 int mergeable_rx_bufs;
f10c592e
AW
47 uint8_t promisc;
48 uint8_t allmulti;
015cb166
AW
49 uint8_t alluni;
50 uint8_t nomulti;
51 uint8_t nouni;
52 uint8_t nobcast;
9bc6304c
MT
53 uint8_t vhost_started;
54 VMChangeStateEntry *vmstate;
b6503ed9
AL
55 struct {
56 int in_use;
2d9aba39 57 int first_multi;
8fd2a2f1
AW
58 uint8_t multi_overflow;
59 uint8_t uni_overflow;
b6503ed9
AL
60 uint8_t *macs;
61 } mac_table;
f21c0ed9 62 uint32_t *vlans;
fbe78f4f
AL
63} VirtIONet;
64
65/* TODO
66 * - we could suppress RX interrupt if we were so inclined.
67 */
68
69static VirtIONet *to_virtio_net(VirtIODevice *vdev)
70{
71 return (VirtIONet *)vdev;
72}
73
0f03eca6 74static void virtio_net_get_config(VirtIODevice *vdev, uint8_t *config)
fbe78f4f
AL
75{
76 VirtIONet *n = to_virtio_net(vdev);
77 struct virtio_net_config netcfg;
78
554c97dd 79 netcfg.status = n->status;
79674068 80 memcpy(netcfg.mac, n->mac, ETH_ALEN);
fbe78f4f
AL
81 memcpy(config, &netcfg, sizeof(netcfg));
82}
83
0f03eca6
AL
84static void virtio_net_set_config(VirtIODevice *vdev, const uint8_t *config)
85{
86 VirtIONet *n = to_virtio_net(vdev);
87 struct virtio_net_config netcfg;
88
89 memcpy(&netcfg, config, sizeof(netcfg));
90
79674068
AL
91 if (memcmp(netcfg.mac, n->mac, ETH_ALEN)) {
92 memcpy(n->mac, netcfg.mac, ETH_ALEN);
eb6b6c12 93 qemu_format_nic_info_str(&n->nic->nc, n->mac);
0f03eca6
AL
94 }
95}
96
eb6b6c12 97static void virtio_net_set_link_status(VLANClientState *nc)
554c97dd 98{
eb6b6c12 99 VirtIONet *n = DO_UPCAST(NICState, nc, nc)->opaque;
554c97dd
AL
100 uint16_t old_status = n->status;
101
eb6b6c12 102 if (nc->link_down)
554c97dd
AL
103 n->status &= ~VIRTIO_NET_S_LINK_UP;
104 else
105 n->status |= VIRTIO_NET_S_LINK_UP;
106
107 if (n->status != old_status)
108 virtio_notify_config(&n->vdev);
109}
110
002437cd
AL
111static void virtio_net_reset(VirtIODevice *vdev)
112{
113 VirtIONet *n = to_virtio_net(vdev);
114
115 /* Reset back to compatibility mode */
116 n->promisc = 1;
117 n->allmulti = 0;
015cb166
AW
118 n->alluni = 0;
119 n->nomulti = 0;
120 n->nouni = 0;
121 n->nobcast = 0;
9bc6304c
MT
122 if (n->vhost_started) {
123 vhost_net_stop(tap_get_vhost_net(n->nic->nc.peer), vdev);
124 n->vhost_started = 0;
125 }
b6503ed9 126
f21c0ed9 127 /* Flush any MAC and VLAN filter table state */
b6503ed9 128 n->mac_table.in_use = 0;
2d9aba39 129 n->mac_table.first_multi = 0;
8fd2a2f1
AW
130 n->mac_table.multi_overflow = 0;
131 n->mac_table.uni_overflow = 0;
b6503ed9 132 memset(n->mac_table.macs, 0, MAC_TABLE_ENTRIES * ETH_ALEN);
f21c0ed9 133 memset(n->vlans, 0, MAX_VLAN >> 3);
002437cd
AL
134}
135
3a330134
MM
136static int peer_has_vnet_hdr(VirtIONet *n)
137{
eb6b6c12 138 if (!n->nic->nc.peer)
3a330134
MM
139 return 0;
140
665a3b07 141 if (n->nic->nc.peer->info->type != NET_CLIENT_TYPE_TAP)
3a330134
MM
142 return 0;
143
eb6b6c12 144 n->has_vnet_hdr = tap_has_vnet_hdr(n->nic->nc.peer);
3a330134
MM
145
146 return n->has_vnet_hdr;
147}
148
0ce0e8f4
MM
149static int peer_has_ufo(VirtIONet *n)
150{
151 if (!peer_has_vnet_hdr(n))
152 return 0;
153
eb6b6c12 154 n->has_ufo = tap_has_ufo(n->nic->nc.peer);
0ce0e8f4
MM
155
156 return n->has_ufo;
157}
158
8172539d 159static uint32_t virtio_net_get_features(VirtIODevice *vdev, uint32_t features)
fbe78f4f 160{
3a330134 161 VirtIONet *n = to_virtio_net(vdev);
fbe78f4f 162
c9f79a3f
MT
163 features |= (1 << VIRTIO_NET_F_MAC);
164
3a330134 165 if (peer_has_vnet_hdr(n)) {
eb6b6c12 166 tap_using_vnet_hdr(n->nic->nc.peer, 1);
8172539d
MT
167 } else {
168 features &= ~(0x1 << VIRTIO_NET_F_CSUM);
169 features &= ~(0x1 << VIRTIO_NET_F_HOST_TSO4);
170 features &= ~(0x1 << VIRTIO_NET_F_HOST_TSO6);
171 features &= ~(0x1 << VIRTIO_NET_F_HOST_ECN);
172
173 features &= ~(0x1 << VIRTIO_NET_F_GUEST_CSUM);
174 features &= ~(0x1 << VIRTIO_NET_F_GUEST_TSO4);
175 features &= ~(0x1 << VIRTIO_NET_F_GUEST_TSO6);
176 features &= ~(0x1 << VIRTIO_NET_F_GUEST_ECN);
177 }
3a330134 178
8172539d
MT
179 if (!peer_has_vnet_hdr(n) || !peer_has_ufo(n)) {
180 features &= ~(0x1 << VIRTIO_NET_F_GUEST_UFO);
181 features &= ~(0x1 << VIRTIO_NET_F_HOST_UFO);
3a330134
MM
182 }
183
9bc6304c
MT
184 if (!n->nic->nc.peer ||
185 n->nic->nc.peer->info->type != NET_CLIENT_TYPE_TAP) {
186 return features;
187 }
188 if (!tap_get_vhost_net(n->nic->nc.peer)) {
189 return features;
190 }
191 return vhost_net_get_features(tap_get_vhost_net(n->nic->nc.peer), features);
fbe78f4f
AL
192}
193
8eca6b1b
AL
194static uint32_t virtio_net_bad_features(VirtIODevice *vdev)
195{
196 uint32_t features = 0;
197
198 /* Linux kernel 2.6.25. It understood MAC (as everyone must),
199 * but also these: */
200 features |= (1 << VIRTIO_NET_F_MAC);
184bd048
DK
201 features |= (1 << VIRTIO_NET_F_CSUM);
202 features |= (1 << VIRTIO_NET_F_HOST_TSO4);
203 features |= (1 << VIRTIO_NET_F_HOST_TSO6);
204 features |= (1 << VIRTIO_NET_F_HOST_ECN);
8eca6b1b 205
8172539d 206 return features;
8eca6b1b
AL
207}
208
fbe78f4f
AL
209static void virtio_net_set_features(VirtIODevice *vdev, uint32_t features)
210{
211 VirtIONet *n = to_virtio_net(vdev);
212
213 n->mergeable_rx_bufs = !!(features & (1 << VIRTIO_NET_F_MRG_RXBUF));
f5436dd9
MM
214
215 if (n->has_vnet_hdr) {
eb6b6c12 216 tap_set_offload(n->nic->nc.peer,
f5436dd9
MM
217 (features >> VIRTIO_NET_F_GUEST_CSUM) & 1,
218 (features >> VIRTIO_NET_F_GUEST_TSO4) & 1,
219 (features >> VIRTIO_NET_F_GUEST_TSO6) & 1,
6c9f58ba
SS
220 (features >> VIRTIO_NET_F_GUEST_ECN) & 1,
221 (features >> VIRTIO_NET_F_GUEST_UFO) & 1);
f5436dd9 222 }
dc14a397
DS
223 if (!n->nic->nc.peer ||
224 n->nic->nc.peer->info->type != NET_CLIENT_TYPE_TAP) {
225 return;
226 }
227 if (!tap_get_vhost_net(n->nic->nc.peer)) {
228 return;
229 }
57c3229b 230 vhost_net_ack_features(tap_get_vhost_net(n->nic->nc.peer), features);
fbe78f4f
AL
231}
232
002437cd
AL
233static int virtio_net_handle_rx_mode(VirtIONet *n, uint8_t cmd,
234 VirtQueueElement *elem)
235{
236 uint8_t on;
237
238 if (elem->out_num != 2 || elem->out_sg[1].iov_len != sizeof(on)) {
239 fprintf(stderr, "virtio-net ctrl invalid rx mode command\n");
240 exit(1);
241 }
242
243 on = ldub_p(elem->out_sg[1].iov_base);
244
245 if (cmd == VIRTIO_NET_CTRL_RX_MODE_PROMISC)
246 n->promisc = on;
247 else if (cmd == VIRTIO_NET_CTRL_RX_MODE_ALLMULTI)
248 n->allmulti = on;
015cb166
AW
249 else if (cmd == VIRTIO_NET_CTRL_RX_MODE_ALLUNI)
250 n->alluni = on;
251 else if (cmd == VIRTIO_NET_CTRL_RX_MODE_NOMULTI)
252 n->nomulti = on;
253 else if (cmd == VIRTIO_NET_CTRL_RX_MODE_NOUNI)
254 n->nouni = on;
255 else if (cmd == VIRTIO_NET_CTRL_RX_MODE_NOBCAST)
256 n->nobcast = on;
002437cd
AL
257 else
258 return VIRTIO_NET_ERR;
259
260 return VIRTIO_NET_OK;
261}
262
b6503ed9
AL
263static int virtio_net_handle_mac(VirtIONet *n, uint8_t cmd,
264 VirtQueueElement *elem)
265{
266 struct virtio_net_ctrl_mac mac_data;
267
268 if (cmd != VIRTIO_NET_CTRL_MAC_TABLE_SET || elem->out_num != 3 ||
269 elem->out_sg[1].iov_len < sizeof(mac_data) ||
270 elem->out_sg[2].iov_len < sizeof(mac_data))
271 return VIRTIO_NET_ERR;
272
273 n->mac_table.in_use = 0;
2d9aba39 274 n->mac_table.first_multi = 0;
8fd2a2f1
AW
275 n->mac_table.uni_overflow = 0;
276 n->mac_table.multi_overflow = 0;
b6503ed9
AL
277 memset(n->mac_table.macs, 0, MAC_TABLE_ENTRIES * ETH_ALEN);
278
279 mac_data.entries = ldl_le_p(elem->out_sg[1].iov_base);
280
281 if (sizeof(mac_data.entries) +
282 (mac_data.entries * ETH_ALEN) > elem->out_sg[1].iov_len)
283 return VIRTIO_NET_ERR;
284
285 if (mac_data.entries <= MAC_TABLE_ENTRIES) {
286 memcpy(n->mac_table.macs, elem->out_sg[1].iov_base + sizeof(mac_data),
287 mac_data.entries * ETH_ALEN);
288 n->mac_table.in_use += mac_data.entries;
289 } else {
8fd2a2f1 290 n->mac_table.uni_overflow = 1;
b6503ed9
AL
291 }
292
2d9aba39
AW
293 n->mac_table.first_multi = n->mac_table.in_use;
294
b6503ed9
AL
295 mac_data.entries = ldl_le_p(elem->out_sg[2].iov_base);
296
297 if (sizeof(mac_data.entries) +
298 (mac_data.entries * ETH_ALEN) > elem->out_sg[2].iov_len)
299 return VIRTIO_NET_ERR;
300
301 if (mac_data.entries) {
302 if (n->mac_table.in_use + mac_data.entries <= MAC_TABLE_ENTRIES) {
303 memcpy(n->mac_table.macs + (n->mac_table.in_use * ETH_ALEN),
304 elem->out_sg[2].iov_base + sizeof(mac_data),
305 mac_data.entries * ETH_ALEN);
306 n->mac_table.in_use += mac_data.entries;
8fd2a2f1
AW
307 } else {
308 n->mac_table.multi_overflow = 1;
309 }
b6503ed9
AL
310 }
311
312 return VIRTIO_NET_OK;
313}
314
f21c0ed9
AL
315static int virtio_net_handle_vlan_table(VirtIONet *n, uint8_t cmd,
316 VirtQueueElement *elem)
317{
318 uint16_t vid;
319
320 if (elem->out_num != 2 || elem->out_sg[1].iov_len != sizeof(vid)) {
321 fprintf(stderr, "virtio-net ctrl invalid vlan command\n");
322 return VIRTIO_NET_ERR;
323 }
324
325 vid = lduw_le_p(elem->out_sg[1].iov_base);
326
327 if (vid >= MAX_VLAN)
328 return VIRTIO_NET_ERR;
329
330 if (cmd == VIRTIO_NET_CTRL_VLAN_ADD)
331 n->vlans[vid >> 5] |= (1U << (vid & 0x1f));
332 else if (cmd == VIRTIO_NET_CTRL_VLAN_DEL)
333 n->vlans[vid >> 5] &= ~(1U << (vid & 0x1f));
334 else
335 return VIRTIO_NET_ERR;
336
337 return VIRTIO_NET_OK;
338}
339
3d11d36c
AL
340static void virtio_net_handle_ctrl(VirtIODevice *vdev, VirtQueue *vq)
341{
002437cd 342 VirtIONet *n = to_virtio_net(vdev);
3d11d36c
AL
343 struct virtio_net_ctrl_hdr ctrl;
344 virtio_net_ctrl_ack status = VIRTIO_NET_ERR;
345 VirtQueueElement elem;
346
347 while (virtqueue_pop(vq, &elem)) {
348 if ((elem.in_num < 1) || (elem.out_num < 1)) {
349 fprintf(stderr, "virtio-net ctrl missing headers\n");
350 exit(1);
351 }
352
353 if (elem.out_sg[0].iov_len < sizeof(ctrl) ||
c6bb9a32 354 elem.in_sg[elem.in_num - 1].iov_len < sizeof(status)) {
3d11d36c
AL
355 fprintf(stderr, "virtio-net ctrl header not in correct element\n");
356 exit(1);
357 }
358
359 ctrl.class = ldub_p(elem.out_sg[0].iov_base);
360 ctrl.cmd = ldub_p(elem.out_sg[0].iov_base + sizeof(ctrl.class));
361
002437cd
AL
362 if (ctrl.class == VIRTIO_NET_CTRL_RX_MODE)
363 status = virtio_net_handle_rx_mode(n, ctrl.cmd, &elem);
b6503ed9
AL
364 else if (ctrl.class == VIRTIO_NET_CTRL_MAC)
365 status = virtio_net_handle_mac(n, ctrl.cmd, &elem);
f21c0ed9
AL
366 else if (ctrl.class == VIRTIO_NET_CTRL_VLAN)
367 status = virtio_net_handle_vlan_table(n, ctrl.cmd, &elem);
002437cd 368
3d11d36c
AL
369 stb_p(elem.in_sg[elem.in_num - 1].iov_base, status);
370
371 virtqueue_push(vq, &elem, sizeof(status));
372 virtio_notify(vdev, vq);
373 }
374}
375
fbe78f4f
AL
376/* RX */
377
378static void virtio_net_handle_rx(VirtIODevice *vdev, VirtQueue *vq)
379{
8aeff62d
MM
380 VirtIONet *n = to_virtio_net(vdev);
381
eb6b6c12 382 qemu_flush_queued_packets(&n->nic->nc);
a61d1f67
GC
383
384 /* We now have RX buffers, signal to the IO thread to break out of the
385 * select to re-poll the tap file descriptor */
386 qemu_notify_event();
fbe78f4f
AL
387}
388
eb6b6c12 389static int virtio_net_can_receive(VLANClientState *nc)
fbe78f4f 390{
eb6b6c12 391 VirtIONet *n = DO_UPCAST(NICState, nc, nc)->opaque;
cdd5cc12 392
fbe78f4f
AL
393 if (!virtio_queue_ready(n->rx_vq) ||
394 !(n->vdev.status & VIRTIO_CONFIG_S_DRIVER_OK))
395 return 0;
396
cdd5cc12
MM
397 return 1;
398}
399
400static int virtio_net_has_buffers(VirtIONet *n, int bufsize)
401{
fbe78f4f
AL
402 if (virtio_queue_empty(n->rx_vq) ||
403 (n->mergeable_rx_bufs &&
404 !virtqueue_avail_bytes(n->rx_vq, bufsize, 0))) {
405 virtio_queue_set_notification(n->rx_vq, 1);
06b12970
TL
406
407 /* To avoid a race condition where the guest has made some buffers
408 * available after the above check but before notification was
409 * enabled, check for available buffers again.
410 */
411 if (virtio_queue_empty(n->rx_vq) ||
412 (n->mergeable_rx_bufs &&
413 !virtqueue_avail_bytes(n->rx_vq, bufsize, 0)))
414 return 0;
fbe78f4f
AL
415 }
416
417 virtio_queue_set_notification(n->rx_vq, 0);
418 return 1;
419}
420
1d41b0c1
AL
421/* dhclient uses AF_PACKET but doesn't pass auxdata to the kernel so
422 * it never finds out that the packets don't have valid checksums. This
423 * causes dhclient to get upset. Fedora's carried a patch for ages to
424 * fix this with Xen but it hasn't appeared in an upstream release of
425 * dhclient yet.
426 *
427 * To avoid breaking existing guests, we catch udp packets and add
428 * checksums. This is terrible but it's better than hacking the guest
429 * kernels.
430 *
431 * N.B. if we introduce a zero-copy API, this operation is no longer free so
432 * we should provide a mechanism to disable it to avoid polluting the host
433 * cache.
434 */
435static void work_around_broken_dhclient(struct virtio_net_hdr *hdr,
436 const uint8_t *buf, size_t size)
437{
438 if ((hdr->flags & VIRTIO_NET_HDR_F_NEEDS_CSUM) && /* missing csum */
439 (size > 27 && size < 1500) && /* normal sized MTU */
440 (buf[12] == 0x08 && buf[13] == 0x00) && /* ethertype == IPv4 */
441 (buf[23] == 17) && /* ip.protocol == UDP */
442 (buf[34] == 0 && buf[35] == 67)) { /* udp.srcport == bootps */
443 /* FIXME this cast is evil */
444 net_checksum_calculate((uint8_t *)buf, size);
445 hdr->flags &= ~VIRTIO_NET_HDR_F_NEEDS_CSUM;
446 }
447}
448
fbe78f4f 449static int receive_header(VirtIONet *n, struct iovec *iov, int iovcnt,
4689f4b3 450 const void *buf, size_t size, size_t hdr_len)
fbe78f4f 451{
3f4cb3d3 452 struct virtio_net_hdr *hdr = (struct virtio_net_hdr *)iov[0].iov_base;
fbe78f4f
AL
453 int offset = 0;
454
455 hdr->flags = 0;
456 hdr->gso_type = VIRTIO_NET_HDR_GSO_NONE;
457
3a330134
MM
458 if (n->has_vnet_hdr) {
459 memcpy(hdr, buf, sizeof(*hdr));
460 offset = sizeof(*hdr);
1d41b0c1 461 work_around_broken_dhclient(hdr, buf + offset, size - offset);
3a330134
MM
462 }
463
fbe78f4f
AL
464 /* We only ever receive a struct virtio_net_hdr from the tapfd,
465 * but we may be passing along a larger header to the guest.
466 */
467 iov[0].iov_base += hdr_len;
468 iov[0].iov_len -= hdr_len;
469
470 return offset;
471}
472
3831ab20
AL
473static int receive_filter(VirtIONet *n, const uint8_t *buf, int size)
474{
475 static const uint8_t bcast[] = {0xff, 0xff, 0xff, 0xff, 0xff, 0xff};
f21c0ed9 476 static const uint8_t vlan[] = {0x81, 0x00};
3831ab20 477 uint8_t *ptr = (uint8_t *)buf;
b6503ed9 478 int i;
3831ab20
AL
479
480 if (n->promisc)
481 return 1;
482
3a330134
MM
483 if (n->has_vnet_hdr) {
484 ptr += sizeof(struct virtio_net_hdr);
485 }
486
f21c0ed9
AL
487 if (!memcmp(&ptr[12], vlan, sizeof(vlan))) {
488 int vid = be16_to_cpup((uint16_t *)(ptr + 14)) & 0xfff;
489 if (!(n->vlans[vid >> 5] & (1U << (vid & 0x1f))))
490 return 0;
491 }
492
bbe2f399
AW
493 if (ptr[0] & 1) { // multicast
494 if (!memcmp(ptr, bcast, sizeof(bcast))) {
015cb166
AW
495 return !n->nobcast;
496 } else if (n->nomulti) {
497 return 0;
8fd2a2f1 498 } else if (n->allmulti || n->mac_table.multi_overflow) {
bbe2f399
AW
499 return 1;
500 }
2d9aba39
AW
501
502 for (i = n->mac_table.first_multi; i < n->mac_table.in_use; i++) {
503 if (!memcmp(ptr, &n->mac_table.macs[i * ETH_ALEN], ETH_ALEN)) {
504 return 1;
505 }
506 }
bbe2f399 507 } else { // unicast
015cb166
AW
508 if (n->nouni) {
509 return 0;
510 } else if (n->alluni || n->mac_table.uni_overflow) {
8fd2a2f1
AW
511 return 1;
512 } else if (!memcmp(ptr, n->mac, ETH_ALEN)) {
bbe2f399
AW
513 return 1;
514 }
3831ab20 515
2d9aba39
AW
516 for (i = 0; i < n->mac_table.first_multi; i++) {
517 if (!memcmp(ptr, &n->mac_table.macs[i * ETH_ALEN], ETH_ALEN)) {
518 return 1;
519 }
520 }
b6503ed9
AL
521 }
522
3831ab20
AL
523 return 0;
524}
525
eb6b6c12 526static ssize_t virtio_net_receive(VLANClientState *nc, const uint8_t *buf, size_t size)
fbe78f4f 527{
eb6b6c12 528 VirtIONet *n = DO_UPCAST(NICState, nc, nc)->opaque;
fbe78f4f 529 struct virtio_net_hdr_mrg_rxbuf *mhdr = NULL;
4689f4b3 530 size_t hdr_len, offset, i;
fbe78f4f 531
eb6b6c12 532 if (!virtio_net_can_receive(&n->nic->nc))
cdd5cc12
MM
533 return -1;
534
535 if (!virtio_net_has_buffers(n, size))
8aeff62d 536 return 0;
fbe78f4f 537
3831ab20 538 if (!receive_filter(n, buf, size))
4f1c942b 539 return size;
3831ab20 540
fbe78f4f
AL
541 /* hdr_len refers to the header we supply to the guest */
542 hdr_len = n->mergeable_rx_bufs ?
543 sizeof(struct virtio_net_hdr_mrg_rxbuf) : sizeof(struct virtio_net_hdr);
544
545 offset = i = 0;
546
547 while (offset < size) {
548 VirtQueueElement elem;
549 int len, total;
550 struct iovec sg[VIRTQUEUE_MAX_SIZE];
551
22c253d9 552 total = 0;
fbe78f4f
AL
553
554 if ((i != 0 && !n->mergeable_rx_bufs) ||
555 virtqueue_pop(n->rx_vq, &elem) == 0) {
556 if (i == 0)
4f1c942b 557 return -1;
fbe78f4f
AL
558 fprintf(stderr, "virtio-net truncating packet\n");
559 exit(1);
560 }
561
562 if (elem.in_num < 1) {
563 fprintf(stderr, "virtio-net receive queue contains no in buffers\n");
564 exit(1);
565 }
566
567 if (!n->mergeable_rx_bufs && elem.in_sg[0].iov_len != hdr_len) {
568 fprintf(stderr, "virtio-net header not in first element\n");
569 exit(1);
570 }
571
572 memcpy(&sg, &elem.in_sg[0], sizeof(sg[0]) * elem.in_num);
573
574 if (i == 0) {
575 if (n->mergeable_rx_bufs)
576 mhdr = (struct virtio_net_hdr_mrg_rxbuf *)sg[0].iov_base;
577
578 offset += receive_header(n, sg, elem.in_num,
579 buf + offset, size - offset, hdr_len);
580 total += hdr_len;
581 }
582
583 /* copy in packet. ugh */
e4d5639d
AS
584 len = iov_from_buf(sg, elem.in_num,
585 buf + offset, size - offset);
fbe78f4f
AL
586 total += len;
587
588 /* signal other side */
589 virtqueue_fill(n->rx_vq, &elem, total, i++);
590
591 offset += len;
592 }
593
594 if (mhdr)
595 mhdr->num_buffers = i;
596
597 virtqueue_flush(n->rx_vq, i);
598 virtio_notify(&n->vdev, n->rx_vq);
4f1c942b
MM
599
600 return size;
fbe78f4f
AL
601}
602
6243375f
MM
603static void virtio_net_flush_tx(VirtIONet *n, VirtQueue *vq);
604
eb6b6c12 605static void virtio_net_tx_complete(VLANClientState *nc, ssize_t len)
6243375f 606{
eb6b6c12 607 VirtIONet *n = DO_UPCAST(NICState, nc, nc)->opaque;
6243375f
MM
608
609 virtqueue_push(n->tx_vq, &n->async_tx.elem, n->async_tx.len);
610 virtio_notify(&n->vdev, n->tx_vq);
611
612 n->async_tx.elem.out_num = n->async_tx.len = 0;
613
614 virtio_queue_set_notification(n->tx_vq, 1);
615 virtio_net_flush_tx(n, n->tx_vq);
616}
617
fbe78f4f
AL
618/* TX */
619static void virtio_net_flush_tx(VirtIONet *n, VirtQueue *vq)
620{
621 VirtQueueElement elem;
fbe78f4f
AL
622
623 if (!(n->vdev.status & VIRTIO_CONFIG_S_DRIVER_OK))
624 return;
625
6243375f
MM
626 if (n->async_tx.elem.out_num) {
627 virtio_queue_set_notification(n->tx_vq, 0);
628 return;
629 }
630
fbe78f4f 631 while (virtqueue_pop(vq, &elem)) {
6243375f 632 ssize_t ret, len = 0;
fbe78f4f
AL
633 unsigned int out_num = elem.out_num;
634 struct iovec *out_sg = &elem.out_sg[0];
635 unsigned hdr_len;
636
637 /* hdr_len refers to the header received from the guest */
638 hdr_len = n->mergeable_rx_bufs ?
639 sizeof(struct virtio_net_hdr_mrg_rxbuf) :
640 sizeof(struct virtio_net_hdr);
641
642 if (out_num < 1 || out_sg->iov_len != hdr_len) {
643 fprintf(stderr, "virtio-net header not in first element\n");
644 exit(1);
645 }
646
647 /* ignore the header if GSO is not supported */
3a330134 648 if (!n->has_vnet_hdr) {
fbe78f4f
AL
649 out_num--;
650 out_sg++;
651 len += hdr_len;
652 } else if (n->mergeable_rx_bufs) {
653 /* tapfd expects a struct virtio_net_hdr */
654 hdr_len -= sizeof(struct virtio_net_hdr);
655 out_sg->iov_len -= hdr_len;
656 len += hdr_len;
657 }
658
eb6b6c12 659 ret = qemu_sendv_packet_async(&n->nic->nc, out_sg, out_num,
6243375f
MM
660 virtio_net_tx_complete);
661 if (ret == 0) {
662 virtio_queue_set_notification(n->tx_vq, 0);
663 n->async_tx.elem = elem;
664 n->async_tx.len = len;
665 return;
666 }
667
668 len += ret;
fbe78f4f
AL
669
670 virtqueue_push(vq, &elem, len);
671 virtio_notify(&n->vdev, vq);
672 }
673}
674
675static void virtio_net_handle_tx(VirtIODevice *vdev, VirtQueue *vq)
676{
677 VirtIONet *n = to_virtio_net(vdev);
678
679 if (n->tx_timer_active) {
680 virtio_queue_set_notification(vq, 1);
681 qemu_del_timer(n->tx_timer);
682 n->tx_timer_active = 0;
683 virtio_net_flush_tx(n, vq);
684 } else {
685 qemu_mod_timer(n->tx_timer,
686 qemu_get_clock(vm_clock) + TX_TIMER_INTERVAL);
687 n->tx_timer_active = 1;
688 virtio_queue_set_notification(vq, 0);
689 }
690}
691
692static void virtio_net_tx_timer(void *opaque)
693{
694 VirtIONet *n = opaque;
695
696 n->tx_timer_active = 0;
697
698 /* Just in case the driver is not ready on more */
699 if (!(n->vdev.status & VIRTIO_CONFIG_S_DRIVER_OK))
700 return;
701
702 virtio_queue_set_notification(n->tx_vq, 1);
703 virtio_net_flush_tx(n, n->tx_vq);
704}
705
706static void virtio_net_save(QEMUFile *f, void *opaque)
707{
708 VirtIONet *n = opaque;
709
9bc6304c
MT
710 if (n->vhost_started) {
711 /* TODO: should we really stop the backend?
712 * If we don't, it might keep writing to memory. */
713 vhost_net_stop(tap_get_vhost_net(n->nic->nc.peer), &n->vdev);
714 n->vhost_started = 0;
715 }
fbe78f4f
AL
716 virtio_save(&n->vdev, f);
717
79674068 718 qemu_put_buffer(f, n->mac, ETH_ALEN);
fbe78f4f 719 qemu_put_be32(f, n->tx_timer_active);
e46cb38f 720 qemu_put_be32(f, n->mergeable_rx_bufs);
9d6271b8 721 qemu_put_be16(f, n->status);
f10c592e
AW
722 qemu_put_byte(f, n->promisc);
723 qemu_put_byte(f, n->allmulti);
b6503ed9
AL
724 qemu_put_be32(f, n->mac_table.in_use);
725 qemu_put_buffer(f, n->mac_table.macs, n->mac_table.in_use * ETH_ALEN);
f21c0ed9 726 qemu_put_buffer(f, (uint8_t *)n->vlans, MAX_VLAN >> 3);
3a330134 727 qemu_put_be32(f, n->has_vnet_hdr);
8fd2a2f1
AW
728 qemu_put_byte(f, n->mac_table.multi_overflow);
729 qemu_put_byte(f, n->mac_table.uni_overflow);
015cb166
AW
730 qemu_put_byte(f, n->alluni);
731 qemu_put_byte(f, n->nomulti);
732 qemu_put_byte(f, n->nouni);
733 qemu_put_byte(f, n->nobcast);
0ce0e8f4 734 qemu_put_byte(f, n->has_ufo);
fbe78f4f
AL
735}
736
737static int virtio_net_load(QEMUFile *f, void *opaque, int version_id)
738{
739 VirtIONet *n = opaque;
2d9aba39 740 int i;
fbe78f4f 741
9d6271b8 742 if (version_id < 2 || version_id > VIRTIO_NET_VM_VERSION)
fbe78f4f
AL
743 return -EINVAL;
744
745 virtio_load(&n->vdev, f);
746
79674068 747 qemu_get_buffer(f, n->mac, ETH_ALEN);
fbe78f4f 748 n->tx_timer_active = qemu_get_be32(f);
e46cb38f 749 n->mergeable_rx_bufs = qemu_get_be32(f);
fbe78f4f 750
9d6271b8
AL
751 if (version_id >= 3)
752 n->status = qemu_get_be16(f);
753
002437cd 754 if (version_id >= 4) {
f10c592e
AW
755 if (version_id < 8) {
756 n->promisc = qemu_get_be32(f);
757 n->allmulti = qemu_get_be32(f);
758 } else {
759 n->promisc = qemu_get_byte(f);
760 n->allmulti = qemu_get_byte(f);
761 }
002437cd
AL
762 }
763
b6503ed9
AL
764 if (version_id >= 5) {
765 n->mac_table.in_use = qemu_get_be32(f);
766 /* MAC_TABLE_ENTRIES may be different from the saved image */
767 if (n->mac_table.in_use <= MAC_TABLE_ENTRIES) {
768 qemu_get_buffer(f, n->mac_table.macs,
769 n->mac_table.in_use * ETH_ALEN);
770 } else if (n->mac_table.in_use) {
771 qemu_fseek(f, n->mac_table.in_use * ETH_ALEN, SEEK_CUR);
8fd2a2f1 772 n->mac_table.multi_overflow = n->mac_table.uni_overflow = 1;
b6503ed9
AL
773 n->mac_table.in_use = 0;
774 }
775 }
776
f21c0ed9
AL
777 if (version_id >= 6)
778 qemu_get_buffer(f, (uint8_t *)n->vlans, MAX_VLAN >> 3);
779
3a330134
MM
780 if (version_id >= 7) {
781 if (qemu_get_be32(f) && !peer_has_vnet_hdr(n)) {
1ecda02b 782 error_report("virtio-net: saved image requires vnet_hdr=on");
3a330134
MM
783 return -1;
784 }
785
786 if (n->has_vnet_hdr) {
eb6b6c12
MM
787 tap_using_vnet_hdr(n->nic->nc.peer, 1);
788 tap_set_offload(n->nic->nc.peer,
704a76fc
MT
789 (n->vdev.guest_features >> VIRTIO_NET_F_GUEST_CSUM) & 1,
790 (n->vdev.guest_features >> VIRTIO_NET_F_GUEST_TSO4) & 1,
791 (n->vdev.guest_features >> VIRTIO_NET_F_GUEST_TSO6) & 1,
792 (n->vdev.guest_features >> VIRTIO_NET_F_GUEST_ECN) & 1,
793 (n->vdev.guest_features >> VIRTIO_NET_F_GUEST_UFO) & 1);
3a330134 794 }
6c042c16
AW
795 }
796
8fd2a2f1
AW
797 if (version_id >= 9) {
798 n->mac_table.multi_overflow = qemu_get_byte(f);
799 n->mac_table.uni_overflow = qemu_get_byte(f);
800 }
801
015cb166
AW
802 if (version_id >= 10) {
803 n->alluni = qemu_get_byte(f);
804 n->nomulti = qemu_get_byte(f);
805 n->nouni = qemu_get_byte(f);
806 n->nobcast = qemu_get_byte(f);
807 }
808
0ce0e8f4
MM
809 if (version_id >= 11) {
810 if (qemu_get_byte(f) && !peer_has_ufo(n)) {
1ecda02b 811 error_report("virtio-net: saved image requires TUN_F_UFO support");
0ce0e8f4
MM
812 return -1;
813 }
814 }
815
2d9aba39
AW
816 /* Find the first multicast entry in the saved MAC filter */
817 for (i = 0; i < n->mac_table.in_use; i++) {
818 if (n->mac_table.macs[i * ETH_ALEN] & 1) {
819 break;
820 }
821 }
822 n->mac_table.first_multi = i;
823
fbe78f4f
AL
824 if (n->tx_timer_active) {
825 qemu_mod_timer(n->tx_timer,
826 qemu_get_clock(vm_clock) + TX_TIMER_INTERVAL);
827 }
fbe78f4f
AL
828 return 0;
829}
830
eb6b6c12 831static void virtio_net_cleanup(VLANClientState *nc)
b946a153 832{
eb6b6c12 833 VirtIONet *n = DO_UPCAST(NICState, nc, nc)->opaque;
b946a153 834
eb6b6c12 835 n->nic = NULL;
b946a153
AL
836}
837
eb6b6c12
MM
838static NetClientInfo net_virtio_info = {
839 .type = NET_CLIENT_TYPE_NIC,
840 .size = sizeof(NICState),
841 .can_receive = virtio_net_can_receive,
842 .receive = virtio_net_receive,
843 .cleanup = virtio_net_cleanup,
844 .link_status_changed = virtio_net_set_link_status,
845};
846
9bc6304c
MT
847static void virtio_net_set_status(struct VirtIODevice *vdev, uint8_t status)
848{
849 VirtIONet *n = to_virtio_net(vdev);
850 if (!n->nic->nc.peer) {
851 return;
852 }
853 if (n->nic->nc.peer->info->type != NET_CLIENT_TYPE_TAP) {
854 return;
855 }
856
857 if (!tap_get_vhost_net(n->nic->nc.peer)) {
858 return;
859 }
860 if (!!n->vhost_started == !!(status & VIRTIO_CONFIG_S_DRIVER_OK)) {
861 return;
862 }
863 if (status & VIRTIO_CONFIG_S_DRIVER_OK) {
864 int r = vhost_net_start(tap_get_vhost_net(n->nic->nc.peer), vdev);
865 if (r < 0) {
866 fprintf(stderr, "unable to start vhost net: %d: "
867 "falling back on userspace virtio\n", -r);
868 } else {
869 n->vhost_started = 1;
870 }
871 } else {
872 vhost_net_stop(tap_get_vhost_net(n->nic->nc.peer), vdev);
873 n->vhost_started = 0;
874 }
875}
876
877static void virtio_net_vmstate_change(void *opaque, int running, int reason)
878{
879 VirtIONet *n = opaque;
880 if (!running) {
881 return;
882 }
883 /* This is called when vm is started, it will start vhost backend if
884 * appropriate e.g. after migration. */
885 virtio_net_set_status(&n->vdev, n->vdev.status);
886}
887
97b15621 888VirtIODevice *virtio_net_init(DeviceState *dev, NICConf *conf)
fbe78f4f
AL
889{
890 VirtIONet *n;
891 static int virtio_net_id;
892
53c25cea
PB
893 n = (VirtIONet *)virtio_common_init("virtio-net", VIRTIO_ID_NET,
894 sizeof(struct virtio_net_config),
895 sizeof(VirtIONet));
fbe78f4f 896
0f03eca6
AL
897 n->vdev.get_config = virtio_net_get_config;
898 n->vdev.set_config = virtio_net_set_config;
fbe78f4f
AL
899 n->vdev.get_features = virtio_net_get_features;
900 n->vdev.set_features = virtio_net_set_features;
8eca6b1b 901 n->vdev.bad_features = virtio_net_bad_features;
002437cd 902 n->vdev.reset = virtio_net_reset;
9bc6304c 903 n->vdev.set_status = virtio_net_set_status;
fbe78f4f
AL
904 n->rx_vq = virtio_add_queue(&n->vdev, 256, virtio_net_handle_rx);
905 n->tx_vq = virtio_add_queue(&n->vdev, 256, virtio_net_handle_tx);
4ffb17f5 906 n->ctrl_vq = virtio_add_queue(&n->vdev, 64, virtio_net_handle_ctrl);
97b15621 907 qemu_macaddr_default_if_unset(&conf->macaddr);
3cbe04c4 908 memcpy(&n->mac[0], &conf->macaddr, sizeof(n->mac));
554c97dd 909 n->status = VIRTIO_NET_S_LINK_UP;
fbe78f4f 910
eb6b6c12
MM
911 n->nic = qemu_new_nic(&net_virtio_info, conf, dev->info->name, dev->id, n);
912
913 qemu_format_nic_info_str(&n->nic->nc, conf->macaddr.a);
96d5e201 914
fbe78f4f
AL
915 n->tx_timer = qemu_new_timer(vm_clock, virtio_net_tx_timer, n);
916 n->tx_timer_active = 0;
917 n->mergeable_rx_bufs = 0;
002437cd 918 n->promisc = 1; /* for compatibility */
fbe78f4f 919
b6503ed9 920 n->mac_table.macs = qemu_mallocz(MAC_TABLE_ENTRIES * ETH_ALEN);
b6503ed9 921
f21c0ed9 922 n->vlans = qemu_mallocz(MAX_VLAN >> 3);
f21c0ed9 923
9d6271b8 924 register_savevm("virtio-net", virtio_net_id++, VIRTIO_NET_VM_VERSION,
fbe78f4f 925 virtio_net_save, virtio_net_load, n);
9bc6304c 926 n->vmstate = qemu_add_vm_change_state_handler(virtio_net_vmstate_change, n);
cf21e106 927
53c25cea 928 return &n->vdev;
cf21e106 929}
97b15621
GH
930
931void virtio_net_exit(VirtIODevice *vdev)
932{
933 VirtIONet *n = DO_UPCAST(VirtIONet, vdev, vdev);
9bc6304c
MT
934 qemu_del_vm_change_state_handler(n->vmstate);
935
936 if (n->vhost_started) {
937 vhost_net_stop(tap_get_vhost_net(n->nic->nc.peer), vdev);
938 }
97b15621 939
eb6b6c12 940 qemu_purge_queued_packets(&n->nic->nc);
97b15621
GH
941
942 unregister_savevm("virtio-net", n);
943
944 qemu_free(n->mac_table.macs);
945 qemu_free(n->vlans);
946
947 qemu_del_timer(n->tx_timer);
948 qemu_free_timer(n->tx_timer);
949
950 virtio_cleanup(&n->vdev);
eb6b6c12 951 qemu_del_vlan_client(&n->nic->nc);
97b15621 952}