vhost-user.c 21.0 KB
Newer Older
1 2 3 4 5 6 7 8 9 10
/*
 * vhost-user
 *
 * Copyright (c) 2013 Virtual Open Systems Sarl.
 *
 * This work is licensed under the terms of the GNU GPL, version 2 or later.
 * See the COPYING file in the top-level directory.
 *
 */

P
Peter Maydell 已提交
11
#include "qemu/osdep.h"
12
#include "qapi/error.h"
13 14
#include "hw/virtio/vhost.h"
#include "hw/virtio/vhost-backend.h"
15
#include "hw/virtio/virtio-net.h"
16 17 18 19 20 21 22 23 24 25 26
#include "sysemu/char.h"
#include "sysemu/kvm.h"
#include "qemu/error-report.h"
#include "qemu/sockets.h"

#include <sys/ioctl.h>
#include <sys/socket.h>
#include <sys/un.h>
#include <linux/vhost.h>

#define VHOST_MEMORY_MAX_NREGIONS    8
27
#define VHOST_USER_F_PROTOCOL_FEATURES 30
28

29 30 31 32
enum VhostUserProtocolFeature {
    VHOST_USER_PROTOCOL_F_MQ = 0,
    VHOST_USER_PROTOCOL_F_LOG_SHMFD = 1,
    VHOST_USER_PROTOCOL_F_RARP = 2,
33
    VHOST_USER_PROTOCOL_F_REPLY_ACK = 3,
34
    VHOST_USER_PROTOCOL_F_NET_MTU = 4,
35 36 37 38 39

    VHOST_USER_PROTOCOL_F_MAX
};

#define VHOST_USER_PROTOCOL_FEATURE_MASK ((1 << VHOST_USER_PROTOCOL_F_MAX) - 1)
40 41 42 43 44 45

typedef enum VhostUserRequest {
    VHOST_USER_NONE = 0,
    VHOST_USER_GET_FEATURES = 1,
    VHOST_USER_SET_FEATURES = 2,
    VHOST_USER_SET_OWNER = 3,
46
    VHOST_USER_RESET_OWNER = 4,
47 48 49 50 51 52 53 54 55 56
    VHOST_USER_SET_MEM_TABLE = 5,
    VHOST_USER_SET_LOG_BASE = 6,
    VHOST_USER_SET_LOG_FD = 7,
    VHOST_USER_SET_VRING_NUM = 8,
    VHOST_USER_SET_VRING_ADDR = 9,
    VHOST_USER_SET_VRING_BASE = 10,
    VHOST_USER_GET_VRING_BASE = 11,
    VHOST_USER_SET_VRING_KICK = 12,
    VHOST_USER_SET_VRING_CALL = 13,
    VHOST_USER_SET_VRING_ERR = 14,
57 58
    VHOST_USER_GET_PROTOCOL_FEATURES = 15,
    VHOST_USER_SET_PROTOCOL_FEATURES = 16,
59
    VHOST_USER_GET_QUEUE_NUM = 17,
60
    VHOST_USER_SET_VRING_ENABLE = 18,
61
    VHOST_USER_SEND_RARP = 19,
62
    VHOST_USER_NET_SET_MTU = 20,
63 64 65 66 67 68 69
    VHOST_USER_MAX
} VhostUserRequest;

typedef struct VhostUserMemoryRegion {
    uint64_t guest_phys_addr;
    uint64_t memory_size;
    uint64_t userspace_addr;
70
    uint64_t mmap_offset;
71 72 73 74 75 76 77 78
} VhostUserMemoryRegion;

typedef struct VhostUserMemory {
    uint32_t nregions;
    uint32_t padding;
    VhostUserMemoryRegion regions[VHOST_MEMORY_MAX_NREGIONS];
} VhostUserMemory;

79 80 81 82 83
typedef struct VhostUserLog {
    uint64_t mmap_size;
    uint64_t mmap_offset;
} VhostUserLog;

84 85 86 87 88
typedef struct VhostUserMsg {
    VhostUserRequest request;

#define VHOST_USER_VERSION_MASK     (0x3)
#define VHOST_USER_REPLY_MASK       (0x1<<2)
89
#define VHOST_USER_NEED_REPLY_MASK  (0x1 << 3)
90 91 92 93 94 95 96 97 98
    uint32_t flags;
    uint32_t size; /* the following payload size */
    union {
#define VHOST_USER_VRING_IDX_MASK   (0xff)
#define VHOST_USER_VRING_NOFD_MASK  (0x1<<8)
        uint64_t u64;
        struct vhost_vring_state state;
        struct vhost_vring_addr addr;
        VhostUserMemory memory;
99
        VhostUserLog log;
100
    } payload;
101 102 103 104 105 106 107 108 109 110 111 112
} QEMU_PACKED VhostUserMsg;

static VhostUserMsg m __attribute__ ((unused));
#define VHOST_USER_HDR_SIZE (sizeof(m.request) \
                            + sizeof(m.flags) \
                            + sizeof(m.size))

#define VHOST_USER_PAYLOAD_SIZE (sizeof(m) - VHOST_USER_HDR_SIZE)

/* The version of the protocol we support */
#define VHOST_USER_VERSION    (0x1)

113 114 115 116
struct vhost_user {
    CharBackend *chr;
};

117 118 119 120 121 122 123
static bool ioeventfd_enabled(void)
{
    return kvm_enabled() && kvm_eventfds_enabled();
}

static int vhost_user_read(struct vhost_dev *dev, VhostUserMsg *msg)
{
124 125
    struct vhost_user *u = dev->opaque;
    CharBackend *chr = u->chr;
126 127 128 129 130
    uint8_t *p = (uint8_t *) msg;
    int r, size = VHOST_USER_HDR_SIZE;

    r = qemu_chr_fe_read_all(chr, p, size);
    if (r != size) {
131 132
        error_report("Failed to read msg header. Read %d instead of %d."
                     " Original request %d.", r, size, msg->request);
133 134 135 136 137 138
        goto fail;
    }

    /* validate received flags */
    if (msg->flags != (VHOST_USER_REPLY_MASK | VHOST_USER_VERSION)) {
        error_report("Failed to read msg header."
139
                " Flags 0x%x instead of 0x%x.", msg->flags,
140 141 142 143 144 145 146
                VHOST_USER_REPLY_MASK | VHOST_USER_VERSION);
        goto fail;
    }

    /* validate message size is sane */
    if (msg->size > VHOST_USER_PAYLOAD_SIZE) {
        error_report("Failed to read msg header."
147
                " Size %d exceeds the maximum %zu.", msg->size,
148 149 150 151 152 153 154 155 156 157
                VHOST_USER_PAYLOAD_SIZE);
        goto fail;
    }

    if (msg->size) {
        p += VHOST_USER_HDR_SIZE;
        size = msg->size;
        r = qemu_chr_fe_read_all(chr, p, size);
        if (r != size) {
            error_report("Failed to read msg payload."
158
                         " Read %d instead of %d.", r, msg->size);
159 160 161 162 163 164 165 166 167 168
            goto fail;
        }
    }

    return 0;

fail:
    return -1;
}

169
static int process_message_reply(struct vhost_dev *dev,
170
                                 const VhostUserMsg *msg)
171
{
172
    VhostUserMsg msg_reply;
173

174
    if ((msg->flags & VHOST_USER_NEED_REPLY_MASK) == 0) {
175 176 177 178
        return 0;
    }

    if (vhost_user_read(dev, &msg_reply) < 0) {
179 180 181
        return -1;
    }

182
    if (msg_reply.request != msg->request) {
183 184
        error_report("Received unexpected msg type."
                     "Expected %d received %d",
185
                     msg->request, msg_reply.request);
186 187 188
        return -1;
    }

189
    return msg_reply.payload.u64 ? -1 : 0;
190 191
}

192 193 194 195
static bool vhost_user_one_time_request(VhostUserRequest request)
{
    switch (request) {
    case VHOST_USER_SET_OWNER:
196
    case VHOST_USER_RESET_OWNER:
197 198
    case VHOST_USER_SET_MEM_TABLE:
    case VHOST_USER_GET_QUEUE_NUM:
199
    case VHOST_USER_NET_SET_MTU:
200 201 202 203 204 205 206
        return true;
    default:
        return false;
    }
}

/* most non-init callers ignore the error */
207 208 209
static int vhost_user_write(struct vhost_dev *dev, VhostUserMsg *msg,
                            int *fds, int fd_num)
{
210 211
    struct vhost_user *u = dev->opaque;
    CharBackend *chr = u->chr;
212
    int ret, size = VHOST_USER_HDR_SIZE + msg->size;
213

214 215 216 217 218 219
    /*
     * For non-vring specific requests, like VHOST_USER_SET_MEM_TABLE,
     * we just need send it once in the first time. For later such
     * request, we just ignore it.
     */
    if (vhost_user_one_time_request(msg->request) && dev->vq_index != 0) {
220
        msg->flags &= ~VHOST_USER_NEED_REPLY_MASK;
221 222 223
        return 0;
    }

224
    if (qemu_chr_fe_set_msgfds(chr, fds, fd_num) < 0) {
225
        error_report("Failed to set msg fds.");
226 227
        return -1;
    }
228

229 230 231 232 233 234 235 236
    ret = qemu_chr_fe_write_all(chr, (const uint8_t *) msg, size);
    if (ret != size) {
        error_report("Failed to write msg."
                     " Wrote %d instead of %d.", ret, size);
        return -1;
    }

    return 0;
237 238
}

239 240
static int vhost_user_set_log_base(struct vhost_dev *dev, uint64_t base,
                                   struct vhost_log *log)
241
{
242 243 244 245 246 247 248
    int fds[VHOST_MEMORY_MAX_NREGIONS];
    size_t fd_num = 0;
    bool shmfd = virtio_has_feature(dev->protocol_features,
                                    VHOST_USER_PROTOCOL_F_LOG_SHMFD);
    VhostUserMsg msg = {
        .request = VHOST_USER_SET_LOG_BASE,
        .flags = VHOST_USER_VERSION,
M
Michael S. Tsirkin 已提交
249
        .payload.log.mmap_size = log->size * sizeof(*(log->log)),
250 251
        .payload.log.mmap_offset = 0,
        .size = sizeof(msg.payload.log),
252 253 254 255 256 257
    };

    if (shmfd && log->fd != -1) {
        fds[fd_num++] = log->fd;
    }

258 259 260
    if (vhost_user_write(dev, &msg, fds, fd_num) < 0) {
        return -1;
    }
261 262 263 264

    if (shmfd) {
        msg.size = 0;
        if (vhost_user_read(dev, &msg) < 0) {
265
            return -1;
266 267 268 269 270 271 272 273
        }

        if (msg.request != VHOST_USER_SET_LOG_BASE) {
            error_report("Received unexpected msg type. "
                         "Expected %d received %d",
                         VHOST_USER_SET_LOG_BASE, msg.request);
            return -1;
        }
274
    }
275 276

    return 0;
277 278
}

279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332
static int vhost_user_set_mem_table(struct vhost_dev *dev,
                                    struct vhost_memory *mem)
{
    int fds[VHOST_MEMORY_MAX_NREGIONS];
    int i, fd;
    size_t fd_num = 0;
    bool reply_supported = virtio_has_feature(dev->protocol_features,
                                              VHOST_USER_PROTOCOL_F_REPLY_ACK);

    VhostUserMsg msg = {
        .request = VHOST_USER_SET_MEM_TABLE,
        .flags = VHOST_USER_VERSION,
    };

    if (reply_supported) {
        msg.flags |= VHOST_USER_NEED_REPLY_MASK;
    }

    for (i = 0; i < dev->mem->nregions; ++i) {
        struct vhost_memory_region *reg = dev->mem->regions + i;
        ram_addr_t offset;
        MemoryRegion *mr;

        assert((uintptr_t)reg->userspace_addr == reg->userspace_addr);
        mr = memory_region_from_host((void *)(uintptr_t)reg->userspace_addr,
                                     &offset);
        fd = memory_region_get_fd(mr);
        if (fd > 0) {
            msg.payload.memory.regions[fd_num].userspace_addr = reg->userspace_addr;
            msg.payload.memory.regions[fd_num].memory_size  = reg->memory_size;
            msg.payload.memory.regions[fd_num].guest_phys_addr = reg->guest_phys_addr;
            msg.payload.memory.regions[fd_num].mmap_offset = offset;
            assert(fd_num < VHOST_MEMORY_MAX_NREGIONS);
            fds[fd_num++] = fd;
        }
    }

    msg.payload.memory.nregions = fd_num;

    if (!fd_num) {
        error_report("Failed initializing vhost-user memory map, "
                     "consider using -object memory-backend-file share=on");
        return -1;
    }

    msg.size = sizeof(msg.payload.memory.nregions);
    msg.size += sizeof(msg.payload.memory.padding);
    msg.size += fd_num * sizeof(VhostUserMemoryRegion);

    if (vhost_user_write(dev, &msg, fds, fd_num) < 0) {
        return -1;
    }

    if (reply_supported) {
333
        return process_message_reply(dev, &msg);
334 335 336 337 338
    }

    return 0;
}

339 340 341 342 343 344
static int vhost_user_set_vring_addr(struct vhost_dev *dev,
                                     struct vhost_vring_addr *addr)
{
    VhostUserMsg msg = {
        .request = VHOST_USER_SET_VRING_ADDR,
        .flags = VHOST_USER_VERSION,
345
        .payload.addr = *addr,
346
        .size = sizeof(msg.payload.addr),
347
    };
348

349 350 351
    if (vhost_user_write(dev, &msg, NULL, 0) < 0) {
        return -1;
    }
352

353 354
    return 0;
}
355

356 357 358 359 360 361
static int vhost_user_set_vring_endian(struct vhost_dev *dev,
                                       struct vhost_vring_state *ring)
{
    error_report("vhost-user trying to send unhandled ioctl");
    return -1;
}
362

363 364 365 366 367 368 369
static int vhost_set_vring(struct vhost_dev *dev,
                           unsigned long int request,
                           struct vhost_vring_state *ring)
{
    VhostUserMsg msg = {
        .request = request,
        .flags = VHOST_USER_VERSION,
370
        .payload.state = *ring,
371
        .size = sizeof(msg.payload.state),
372 373
    };

374 375 376
    if (vhost_user_write(dev, &msg, NULL, 0) < 0) {
        return -1;
    }
377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394

    return 0;
}

static int vhost_user_set_vring_num(struct vhost_dev *dev,
                                    struct vhost_vring_state *ring)
{
    return vhost_set_vring(dev, VHOST_USER_SET_VRING_NUM, ring);
}

static int vhost_user_set_vring_base(struct vhost_dev *dev,
                                     struct vhost_vring_state *ring)
{
    return vhost_set_vring(dev, VHOST_USER_SET_VRING_BASE, ring);
}

static int vhost_user_set_vring_enable(struct vhost_dev *dev, int enable)
{
395
    int i;
396

397
    if (!virtio_has_feature(dev->features, VHOST_USER_F_PROTOCOL_FEATURES)) {
398 399 400
        return -1;
    }

401 402 403 404 405 406 407 408
    for (i = 0; i < dev->nvqs; ++i) {
        struct vhost_vring_state state = {
            .index = dev->vq_index + i,
            .num   = enable,
        };

        vhost_set_vring(dev, VHOST_USER_SET_VRING_ENABLE, &state);
    }
409

410 411
    return 0;
}
412 413 414 415 416 417 418

static int vhost_user_get_vring_base(struct vhost_dev *dev,
                                     struct vhost_vring_state *ring)
{
    VhostUserMsg msg = {
        .request = VHOST_USER_GET_VRING_BASE,
        .flags = VHOST_USER_VERSION,
419
        .payload.state = *ring,
420
        .size = sizeof(msg.payload.state),
421 422
    };

423 424 425
    if (vhost_user_write(dev, &msg, NULL, 0) < 0) {
        return -1;
    }
426 427

    if (vhost_user_read(dev, &msg) < 0) {
428
        return -1;
429 430
    }

431 432 433 434 435
    if (msg.request != VHOST_USER_GET_VRING_BASE) {
        error_report("Received unexpected msg type. Expected %d received %d",
                     VHOST_USER_GET_VRING_BASE, msg.request);
        return -1;
    }
436

437
    if (msg.size != sizeof(msg.payload.state)) {
438 439
        error_report("Received bad msg size.");
        return -1;
440 441
    }

442
    *ring = msg.payload.state;
443

444 445 446
    return 0;
}

447 448 449
static int vhost_set_vring_file(struct vhost_dev *dev,
                                VhostUserRequest request,
                                struct vhost_vring_file *file)
450
{
451 452
    int fds[VHOST_MEMORY_MAX_NREGIONS];
    size_t fd_num = 0;
453
    VhostUserMsg msg = {
454
        .request = request,
455
        .flags = VHOST_USER_VERSION,
456
        .payload.u64 = file->index & VHOST_USER_VRING_IDX_MASK,
457
        .size = sizeof(msg.payload.u64),
458 459
    };

460 461 462
    if (ioeventfd_enabled() && file->fd > 0) {
        fds[fd_num++] = file->fd;
    } else {
463
        msg.payload.u64 |= VHOST_USER_VRING_NOFD_MASK;
464 465
    }

466 467 468
    if (vhost_user_write(dev, &msg, fds, fd_num) < 0) {
        return -1;
    }
469

470 471
    return 0;
}
472

473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489
static int vhost_user_set_vring_kick(struct vhost_dev *dev,
                                     struct vhost_vring_file *file)
{
    return vhost_set_vring_file(dev, VHOST_USER_SET_VRING_KICK, file);
}

static int vhost_user_set_vring_call(struct vhost_dev *dev,
                                     struct vhost_vring_file *file)
{
    return vhost_set_vring_file(dev, VHOST_USER_SET_VRING_CALL, file);
}

static int vhost_user_set_u64(struct vhost_dev *dev, int request, uint64_t u64)
{
    VhostUserMsg msg = {
        .request = request,
        .flags = VHOST_USER_VERSION,
490
        .payload.u64 = u64,
491
        .size = sizeof(msg.payload.u64),
492 493
    };

494 495 496
    if (vhost_user_write(dev, &msg, NULL, 0) < 0) {
        return -1;
    }
497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521

    return 0;
}

static int vhost_user_set_features(struct vhost_dev *dev,
                                   uint64_t features)
{
    return vhost_user_set_u64(dev, VHOST_USER_SET_FEATURES, features);
}

static int vhost_user_set_protocol_features(struct vhost_dev *dev,
                                            uint64_t features)
{
    return vhost_user_set_u64(dev, VHOST_USER_SET_PROTOCOL_FEATURES, features);
}

static int vhost_user_get_u64(struct vhost_dev *dev, int request, uint64_t *u64)
{
    VhostUserMsg msg = {
        .request = request,
        .flags = VHOST_USER_VERSION,
    };

    if (vhost_user_one_time_request(request) && dev->vq_index != 0) {
        return 0;
522
    }
523

524 525 526
    if (vhost_user_write(dev, &msg, NULL, 0) < 0) {
        return -1;
    }
527 528

    if (vhost_user_read(dev, &msg) < 0) {
529
        return -1;
530 531 532 533 534 535 536 537
    }

    if (msg.request != request) {
        error_report("Received unexpected msg type. Expected %d received %d",
                     request, msg.request);
        return -1;
    }

538
    if (msg.size != sizeof(msg.payload.u64)) {
539 540 541 542
        error_report("Received bad msg size.");
        return -1;
    }

543
    *u64 = msg.payload.u64;
544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559

    return 0;
}

static int vhost_user_get_features(struct vhost_dev *dev, uint64_t *features)
{
    return vhost_user_get_u64(dev, VHOST_USER_GET_FEATURES, features);
}

static int vhost_user_set_owner(struct vhost_dev *dev)
{
    VhostUserMsg msg = {
        .request = VHOST_USER_SET_OWNER,
        .flags = VHOST_USER_VERSION,
    };

560 561 562
    if (vhost_user_write(dev, &msg, NULL, 0) < 0) {
        return -1;
    }
563 564 565 566 567 568 569

    return 0;
}

static int vhost_user_reset_device(struct vhost_dev *dev)
{
    VhostUserMsg msg = {
570
        .request = VHOST_USER_RESET_OWNER,
571 572 573
        .flags = VHOST_USER_VERSION,
    };

574 575 576
    if (vhost_user_write(dev, &msg, NULL, 0) < 0) {
        return -1;
    }
577

578 579 580
    return 0;
}

581 582
static int vhost_user_init(struct vhost_dev *dev, void *opaque)
{
583
    uint64_t features;
584
    struct vhost_user *u;
585 586
    int err;

587 588
    assert(dev->vhost_ops->backend_type == VHOST_BACKEND_TYPE_USER);

589 590 591
    u = g_new0(struct vhost_user, 1);
    u->chr = opaque;
    dev->opaque = u;
592

593
    err = vhost_user_get_features(dev, &features);
594 595 596 597 598 599 600
    if (err < 0) {
        return err;
    }

    if (virtio_has_feature(features, VHOST_USER_F_PROTOCOL_FEATURES)) {
        dev->backend_features |= 1ULL << VHOST_USER_F_PROTOCOL_FEATURES;

601 602
        err = vhost_user_get_u64(dev, VHOST_USER_GET_PROTOCOL_FEATURES,
                                 &features);
603 604 605 606 607
        if (err < 0) {
            return err;
        }

        dev->protocol_features = features & VHOST_USER_PROTOCOL_FEATURE_MASK;
608
        err = vhost_user_set_protocol_features(dev, dev->protocol_features);
609 610 611
        if (err < 0) {
            return err;
        }
612 613 614

        /* query the max queues we support if backend supports Multiple Queue */
        if (dev->protocol_features & (1ULL << VHOST_USER_PROTOCOL_F_MQ)) {
615 616
            err = vhost_user_get_u64(dev, VHOST_USER_GET_QUEUE_NUM,
                                     &dev->max_queues);
617 618 619 620
            if (err < 0) {
                return err;
            }
        }
621 622
    }

623 624 625 626 627 628 629 630
    if (dev->migration_blocker == NULL &&
        !virtio_has_feature(dev->protocol_features,
                            VHOST_USER_PROTOCOL_F_LOG_SHMFD)) {
        error_setg(&dev->migration_blocker,
                   "Migration disabled: vhost-user backend lacks "
                   "VHOST_USER_PROTOCOL_F_LOG_SHMFD feature.");
    }

631 632 633 634 635
    return 0;
}

static int vhost_user_cleanup(struct vhost_dev *dev)
{
636 637
    struct vhost_user *u;

638 639
    assert(dev->vhost_ops->backend_type == VHOST_BACKEND_TYPE_USER);

640 641
    u = dev->opaque;
    g_free(u);
642 643 644 645 646
    dev->opaque = 0;

    return 0;
}

647 648 649 650 651 652 653
static int vhost_user_get_vq_index(struct vhost_dev *dev, int idx)
{
    assert(idx >= dev->vq_index && idx < dev->vq_index + dev->nvqs);

    return idx;
}

654 655 656 657 658
static int vhost_user_memslots_limit(struct vhost_dev *dev)
{
    return VHOST_MEMORY_MAX_NREGIONS;
}

659 660 661 662 663 664 665 666
static bool vhost_user_requires_shm_log(struct vhost_dev *dev)
{
    assert(dev->vhost_ops->backend_type == VHOST_BACKEND_TYPE_USER);

    return virtio_has_feature(dev->protocol_features,
                              VHOST_USER_PROTOCOL_F_LOG_SHMFD);
}

667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682
static int vhost_user_migration_done(struct vhost_dev *dev, char* mac_addr)
{
    VhostUserMsg msg = { 0 };

    assert(dev->vhost_ops->backend_type == VHOST_BACKEND_TYPE_USER);

    /* If guest supports GUEST_ANNOUNCE do nothing */
    if (virtio_has_feature(dev->acked_features, VIRTIO_NET_F_GUEST_ANNOUNCE)) {
        return 0;
    }

    /* if backend supports VHOST_USER_PROTOCOL_F_RARP ask it to send the RARP */
    if (virtio_has_feature(dev->protocol_features,
                           VHOST_USER_PROTOCOL_F_RARP)) {
        msg.request = VHOST_USER_SEND_RARP;
        msg.flags = VHOST_USER_VERSION;
683
        memcpy((char *)&msg.payload.u64, mac_addr, 6);
684
        msg.size = sizeof(msg.payload.u64);
685

686
        return vhost_user_write(dev, &msg, NULL, 0);
687 688 689 690
    }
    return -1;
}

691 692 693 694
static bool vhost_user_can_merge(struct vhost_dev *dev,
                                 uint64_t start1, uint64_t size1,
                                 uint64_t start2, uint64_t size2)
{
695
    ram_addr_t offset;
696 697 698
    int mfd, rfd;
    MemoryRegion *mr;

699
    mr = memory_region_from_host((void *)(uintptr_t)start1, &offset);
700
    mfd = memory_region_get_fd(mr);
701

702
    mr = memory_region_from_host((void *)(uintptr_t)start2, &offset);
703
    rfd = memory_region_get_fd(mr);
704 705 706 707

    return mfd == rfd;
}

708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731
static int vhost_user_net_set_mtu(struct vhost_dev *dev, uint16_t mtu)
{
    VhostUserMsg msg;
    bool reply_supported = virtio_has_feature(dev->protocol_features,
                                              VHOST_USER_PROTOCOL_F_REPLY_ACK);

    if (!(dev->protocol_features & (1ULL << VHOST_USER_PROTOCOL_F_NET_MTU))) {
        return 0;
    }

    msg.request = VHOST_USER_NET_SET_MTU;
    msg.payload.u64 = mtu;
    msg.size = sizeof(msg.payload.u64);
    msg.flags = VHOST_USER_VERSION;
    if (reply_supported) {
        msg.flags |= VHOST_USER_NEED_REPLY_MASK;
    }

    if (vhost_user_write(dev, &msg, NULL, 0) < 0) {
        return -1;
    }

    /* If reply_ack supported, slave has to ack specified MTU is valid */
    if (reply_supported) {
732
        return process_message_reply(dev, &msg);
733 734 735 736 737
    }

    return 0;
}

738 739 740
const VhostOps user_ops = {
        .backend_type = VHOST_BACKEND_TYPE_USER,
        .vhost_backend_init = vhost_user_init,
741
        .vhost_backend_cleanup = vhost_user_cleanup,
742
        .vhost_backend_memslots_limit = vhost_user_memslots_limit,
743 744 745 746 747 748 749 750 751 752 753 754 755 756 757
        .vhost_set_log_base = vhost_user_set_log_base,
        .vhost_set_mem_table = vhost_user_set_mem_table,
        .vhost_set_vring_addr = vhost_user_set_vring_addr,
        .vhost_set_vring_endian = vhost_user_set_vring_endian,
        .vhost_set_vring_num = vhost_user_set_vring_num,
        .vhost_set_vring_base = vhost_user_set_vring_base,
        .vhost_get_vring_base = vhost_user_get_vring_base,
        .vhost_set_vring_kick = vhost_user_set_vring_kick,
        .vhost_set_vring_call = vhost_user_set_vring_call,
        .vhost_set_features = vhost_user_set_features,
        .vhost_get_features = vhost_user_get_features,
        .vhost_set_owner = vhost_user_set_owner,
        .vhost_reset_device = vhost_user_reset_device,
        .vhost_get_vq_index = vhost_user_get_vq_index,
        .vhost_set_vring_enable = vhost_user_set_vring_enable,
758
        .vhost_requires_shm_log = vhost_user_requires_shm_log,
759
        .vhost_migration_done = vhost_user_migration_done,
760
        .vhost_backend_can_merge = vhost_user_can_merge,
761
        .vhost_net_set_mtu = vhost_user_net_set_mtu,
762
};