vhost-user.c 20.8 KB
Newer Older
1 2 3 4 5 6 7 8 9 10
/*
 * vhost-user
 *
 * Copyright (c) 2013 Virtual Open Systems Sarl.
 *
 * This work is licensed under the terms of the GNU GPL, version 2 or later.
 * See the COPYING file in the top-level directory.
 *
 */

P
Peter Maydell 已提交
11
#include "qemu/osdep.h"
12
#include "qapi/error.h"
13 14
#include "hw/virtio/vhost.h"
#include "hw/virtio/vhost-backend.h"
15
#include "hw/virtio/virtio-net.h"
16 17 18 19 20 21 22 23 24 25 26
#include "sysemu/char.h"
#include "sysemu/kvm.h"
#include "qemu/error-report.h"
#include "qemu/sockets.h"

#include <sys/ioctl.h>
#include <sys/socket.h>
#include <sys/un.h>
#include <linux/vhost.h>

#define VHOST_MEMORY_MAX_NREGIONS    8
27
#define VHOST_USER_F_PROTOCOL_FEATURES 30
28

29 30 31 32
enum VhostUserProtocolFeature {
    VHOST_USER_PROTOCOL_F_MQ = 0,
    VHOST_USER_PROTOCOL_F_LOG_SHMFD = 1,
    VHOST_USER_PROTOCOL_F_RARP = 2,
33
    VHOST_USER_PROTOCOL_F_REPLY_ACK = 3,
34
    VHOST_USER_PROTOCOL_F_NET_MTU = 4,
35 36 37 38 39

    VHOST_USER_PROTOCOL_F_MAX
};

#define VHOST_USER_PROTOCOL_FEATURE_MASK ((1 << VHOST_USER_PROTOCOL_F_MAX) - 1)
40 41 42 43 44 45

typedef enum VhostUserRequest {
    VHOST_USER_NONE = 0,
    VHOST_USER_GET_FEATURES = 1,
    VHOST_USER_SET_FEATURES = 2,
    VHOST_USER_SET_OWNER = 3,
46
    VHOST_USER_RESET_OWNER = 4,
47 48 49 50 51 52 53 54 55 56
    VHOST_USER_SET_MEM_TABLE = 5,
    VHOST_USER_SET_LOG_BASE = 6,
    VHOST_USER_SET_LOG_FD = 7,
    VHOST_USER_SET_VRING_NUM = 8,
    VHOST_USER_SET_VRING_ADDR = 9,
    VHOST_USER_SET_VRING_BASE = 10,
    VHOST_USER_GET_VRING_BASE = 11,
    VHOST_USER_SET_VRING_KICK = 12,
    VHOST_USER_SET_VRING_CALL = 13,
    VHOST_USER_SET_VRING_ERR = 14,
57 58
    VHOST_USER_GET_PROTOCOL_FEATURES = 15,
    VHOST_USER_SET_PROTOCOL_FEATURES = 16,
59
    VHOST_USER_GET_QUEUE_NUM = 17,
60
    VHOST_USER_SET_VRING_ENABLE = 18,
61
    VHOST_USER_SEND_RARP = 19,
62
    VHOST_USER_NET_SET_MTU = 20,
63 64 65 66 67 68 69
    VHOST_USER_MAX
} VhostUserRequest;

typedef struct VhostUserMemoryRegion {
    uint64_t guest_phys_addr;
    uint64_t memory_size;
    uint64_t userspace_addr;
70
    uint64_t mmap_offset;
71 72 73 74 75 76 77 78
} VhostUserMemoryRegion;

typedef struct VhostUserMemory {
    uint32_t nregions;
    uint32_t padding;
    VhostUserMemoryRegion regions[VHOST_MEMORY_MAX_NREGIONS];
} VhostUserMemory;

79 80 81 82 83
typedef struct VhostUserLog {
    uint64_t mmap_size;
    uint64_t mmap_offset;
} VhostUserLog;

84 85 86 87 88
typedef struct VhostUserMsg {
    VhostUserRequest request;

#define VHOST_USER_VERSION_MASK     (0x3)
#define VHOST_USER_REPLY_MASK       (0x1<<2)
89
#define VHOST_USER_NEED_REPLY_MASK  (0x1 << 3)
90 91 92 93 94 95 96 97 98
    uint32_t flags;
    uint32_t size; /* the following payload size */
    union {
#define VHOST_USER_VRING_IDX_MASK   (0xff)
#define VHOST_USER_VRING_NOFD_MASK  (0x1<<8)
        uint64_t u64;
        struct vhost_vring_state state;
        struct vhost_vring_addr addr;
        VhostUserMemory memory;
99
        VhostUserLog log;
100
    } payload;
101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119
} QEMU_PACKED VhostUserMsg;

static VhostUserMsg m __attribute__ ((unused));
#define VHOST_USER_HDR_SIZE (sizeof(m.request) \
                            + sizeof(m.flags) \
                            + sizeof(m.size))

#define VHOST_USER_PAYLOAD_SIZE (sizeof(m) - VHOST_USER_HDR_SIZE)

/* The version of the protocol we support */
#define VHOST_USER_VERSION    (0x1)

static bool ioeventfd_enabled(void)
{
    return kvm_enabled() && kvm_eventfds_enabled();
}

static int vhost_user_read(struct vhost_dev *dev, VhostUserMsg *msg)
{
120
    CharBackend *chr = dev->opaque;
121 122 123 124 125
    uint8_t *p = (uint8_t *) msg;
    int r, size = VHOST_USER_HDR_SIZE;

    r = qemu_chr_fe_read_all(chr, p, size);
    if (r != size) {
126 127
        error_report("Failed to read msg header. Read %d instead of %d."
                     " Original request %d.", r, size, msg->request);
128 129 130 131 132 133
        goto fail;
    }

    /* validate received flags */
    if (msg->flags != (VHOST_USER_REPLY_MASK | VHOST_USER_VERSION)) {
        error_report("Failed to read msg header."
134
                " Flags 0x%x instead of 0x%x.", msg->flags,
135 136 137 138 139 140 141
                VHOST_USER_REPLY_MASK | VHOST_USER_VERSION);
        goto fail;
    }

    /* validate message size is sane */
    if (msg->size > VHOST_USER_PAYLOAD_SIZE) {
        error_report("Failed to read msg header."
142
                " Size %d exceeds the maximum %zu.", msg->size,
143 144 145 146 147 148 149 150 151 152
                VHOST_USER_PAYLOAD_SIZE);
        goto fail;
    }

    if (msg->size) {
        p += VHOST_USER_HDR_SIZE;
        size = msg->size;
        r = qemu_chr_fe_read_all(chr, p, size);
        if (r != size) {
            error_report("Failed to read msg payload."
153
                         " Read %d instead of %d.", r, msg->size);
154 155 156 157 158 159 160 161 162 163
            goto fail;
        }
    }

    return 0;

fail:
    return -1;
}

164
static int process_message_reply(struct vhost_dev *dev,
165
                                 VhostUserMsg msg)
166
{
167
    VhostUserMsg msg_reply;
168

169 170 171 172 173
    if ((msg.flags & VHOST_USER_NEED_REPLY_MASK) == 0) {
        return 0;
    }

    if (vhost_user_read(dev, &msg_reply) < 0) {
174 175 176
        return -1;
    }

177
    if (msg_reply.request != msg.request) {
178 179
        error_report("Received unexpected msg type."
                     "Expected %d received %d",
180
                     msg.request, msg_reply.request);
181 182 183
        return -1;
    }

184
    return msg_reply.payload.u64 ? -1 : 0;
185 186
}

187 188 189 190
static bool vhost_user_one_time_request(VhostUserRequest request)
{
    switch (request) {
    case VHOST_USER_SET_OWNER:
191
    case VHOST_USER_RESET_OWNER:
192 193
    case VHOST_USER_SET_MEM_TABLE:
    case VHOST_USER_GET_QUEUE_NUM:
194
    case VHOST_USER_NET_SET_MTU:
195 196 197 198 199 200 201
        return true;
    default:
        return false;
    }
}

/* most non-init callers ignore the error */
202 203 204
static int vhost_user_write(struct vhost_dev *dev, VhostUserMsg *msg,
                            int *fds, int fd_num)
{
205
    CharBackend *chr = dev->opaque;
206
    int ret, size = VHOST_USER_HDR_SIZE + msg->size;
207

208 209 210 211 212 213
    /*
     * For non-vring specific requests, like VHOST_USER_SET_MEM_TABLE,
     * we just need send it once in the first time. For later such
     * request, we just ignore it.
     */
    if (vhost_user_one_time_request(msg->request) && dev->vq_index != 0) {
214
        msg->flags &= ~VHOST_USER_NEED_REPLY_MASK;
215 216 217
        return 0;
    }

218
    if (qemu_chr_fe_set_msgfds(chr, fds, fd_num) < 0) {
219
        error_report("Failed to set msg fds.");
220 221
        return -1;
    }
222

223 224 225 226 227 228 229 230
    ret = qemu_chr_fe_write_all(chr, (const uint8_t *) msg, size);
    if (ret != size) {
        error_report("Failed to write msg."
                     " Wrote %d instead of %d.", ret, size);
        return -1;
    }

    return 0;
231 232
}

233 234
static int vhost_user_set_log_base(struct vhost_dev *dev, uint64_t base,
                                   struct vhost_log *log)
235
{
236 237 238 239 240 241 242
    int fds[VHOST_MEMORY_MAX_NREGIONS];
    size_t fd_num = 0;
    bool shmfd = virtio_has_feature(dev->protocol_features,
                                    VHOST_USER_PROTOCOL_F_LOG_SHMFD);
    VhostUserMsg msg = {
        .request = VHOST_USER_SET_LOG_BASE,
        .flags = VHOST_USER_VERSION,
M
Michael S. Tsirkin 已提交
243
        .payload.log.mmap_size = log->size * sizeof(*(log->log)),
244 245
        .payload.log.mmap_offset = 0,
        .size = sizeof(msg.payload.log),
246 247 248 249 250 251
    };

    if (shmfd && log->fd != -1) {
        fds[fd_num++] = log->fd;
    }

252 253 254
    if (vhost_user_write(dev, &msg, fds, fd_num) < 0) {
        return -1;
    }
255 256 257 258

    if (shmfd) {
        msg.size = 0;
        if (vhost_user_read(dev, &msg) < 0) {
259
            return -1;
260 261 262 263 264 265 266 267
        }

        if (msg.request != VHOST_USER_SET_LOG_BASE) {
            error_report("Received unexpected msg type. "
                         "Expected %d received %d",
                         VHOST_USER_SET_LOG_BASE, msg.request);
            return -1;
        }
268
    }
269 270

    return 0;
271 272
}

273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326
static int vhost_user_set_mem_table(struct vhost_dev *dev,
                                    struct vhost_memory *mem)
{
    int fds[VHOST_MEMORY_MAX_NREGIONS];
    int i, fd;
    size_t fd_num = 0;
    bool reply_supported = virtio_has_feature(dev->protocol_features,
                                              VHOST_USER_PROTOCOL_F_REPLY_ACK);

    VhostUserMsg msg = {
        .request = VHOST_USER_SET_MEM_TABLE,
        .flags = VHOST_USER_VERSION,
    };

    if (reply_supported) {
        msg.flags |= VHOST_USER_NEED_REPLY_MASK;
    }

    for (i = 0; i < dev->mem->nregions; ++i) {
        struct vhost_memory_region *reg = dev->mem->regions + i;
        ram_addr_t offset;
        MemoryRegion *mr;

        assert((uintptr_t)reg->userspace_addr == reg->userspace_addr);
        mr = memory_region_from_host((void *)(uintptr_t)reg->userspace_addr,
                                     &offset);
        fd = memory_region_get_fd(mr);
        if (fd > 0) {
            msg.payload.memory.regions[fd_num].userspace_addr = reg->userspace_addr;
            msg.payload.memory.regions[fd_num].memory_size  = reg->memory_size;
            msg.payload.memory.regions[fd_num].guest_phys_addr = reg->guest_phys_addr;
            msg.payload.memory.regions[fd_num].mmap_offset = offset;
            assert(fd_num < VHOST_MEMORY_MAX_NREGIONS);
            fds[fd_num++] = fd;
        }
    }

    msg.payload.memory.nregions = fd_num;

    if (!fd_num) {
        error_report("Failed initializing vhost-user memory map, "
                     "consider using -object memory-backend-file share=on");
        return -1;
    }

    msg.size = sizeof(msg.payload.memory.nregions);
    msg.size += sizeof(msg.payload.memory.padding);
    msg.size += fd_num * sizeof(VhostUserMemoryRegion);

    if (vhost_user_write(dev, &msg, fds, fd_num) < 0) {
        return -1;
    }

    if (reply_supported) {
327
        return process_message_reply(dev, msg);
328 329 330 331 332
    }

    return 0;
}

333 334 335 336 337 338
static int vhost_user_set_vring_addr(struct vhost_dev *dev,
                                     struct vhost_vring_addr *addr)
{
    VhostUserMsg msg = {
        .request = VHOST_USER_SET_VRING_ADDR,
        .flags = VHOST_USER_VERSION,
339
        .payload.addr = *addr,
340
        .size = sizeof(msg.payload.addr),
341
    };
342

343 344 345
    if (vhost_user_write(dev, &msg, NULL, 0) < 0) {
        return -1;
    }
346

347 348
    return 0;
}
349

350 351 352 353 354 355
static int vhost_user_set_vring_endian(struct vhost_dev *dev,
                                       struct vhost_vring_state *ring)
{
    error_report("vhost-user trying to send unhandled ioctl");
    return -1;
}
356

357 358 359 360 361 362 363
static int vhost_set_vring(struct vhost_dev *dev,
                           unsigned long int request,
                           struct vhost_vring_state *ring)
{
    VhostUserMsg msg = {
        .request = request,
        .flags = VHOST_USER_VERSION,
364
        .payload.state = *ring,
365
        .size = sizeof(msg.payload.state),
366 367
    };

368 369 370
    if (vhost_user_write(dev, &msg, NULL, 0) < 0) {
        return -1;
    }
371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388

    return 0;
}

static int vhost_user_set_vring_num(struct vhost_dev *dev,
                                    struct vhost_vring_state *ring)
{
    return vhost_set_vring(dev, VHOST_USER_SET_VRING_NUM, ring);
}

static int vhost_user_set_vring_base(struct vhost_dev *dev,
                                     struct vhost_vring_state *ring)
{
    return vhost_set_vring(dev, VHOST_USER_SET_VRING_BASE, ring);
}

static int vhost_user_set_vring_enable(struct vhost_dev *dev, int enable)
{
389
    int i;
390

391
    if (!virtio_has_feature(dev->features, VHOST_USER_F_PROTOCOL_FEATURES)) {
392 393 394
        return -1;
    }

395 396 397 398 399 400 401 402
    for (i = 0; i < dev->nvqs; ++i) {
        struct vhost_vring_state state = {
            .index = dev->vq_index + i,
            .num   = enable,
        };

        vhost_set_vring(dev, VHOST_USER_SET_VRING_ENABLE, &state);
    }
403

404 405
    return 0;
}
406 407 408 409 410 411 412

static int vhost_user_get_vring_base(struct vhost_dev *dev,
                                     struct vhost_vring_state *ring)
{
    VhostUserMsg msg = {
        .request = VHOST_USER_GET_VRING_BASE,
        .flags = VHOST_USER_VERSION,
413
        .payload.state = *ring,
414
        .size = sizeof(msg.payload.state),
415 416
    };

417 418 419
    if (vhost_user_write(dev, &msg, NULL, 0) < 0) {
        return -1;
    }
420 421

    if (vhost_user_read(dev, &msg) < 0) {
422
        return -1;
423 424
    }

425 426 427 428 429
    if (msg.request != VHOST_USER_GET_VRING_BASE) {
        error_report("Received unexpected msg type. Expected %d received %d",
                     VHOST_USER_GET_VRING_BASE, msg.request);
        return -1;
    }
430

431
    if (msg.size != sizeof(msg.payload.state)) {
432 433
        error_report("Received bad msg size.");
        return -1;
434 435
    }

436
    *ring = msg.payload.state;
437

438 439 440
    return 0;
}

441 442 443
static int vhost_set_vring_file(struct vhost_dev *dev,
                                VhostUserRequest request,
                                struct vhost_vring_file *file)
444
{
445 446
    int fds[VHOST_MEMORY_MAX_NREGIONS];
    size_t fd_num = 0;
447
    VhostUserMsg msg = {
448
        .request = request,
449
        .flags = VHOST_USER_VERSION,
450
        .payload.u64 = file->index & VHOST_USER_VRING_IDX_MASK,
451
        .size = sizeof(msg.payload.u64),
452 453
    };

454 455 456
    if (ioeventfd_enabled() && file->fd > 0) {
        fds[fd_num++] = file->fd;
    } else {
457
        msg.payload.u64 |= VHOST_USER_VRING_NOFD_MASK;
458 459
    }

460 461 462
    if (vhost_user_write(dev, &msg, fds, fd_num) < 0) {
        return -1;
    }
463

464 465
    return 0;
}
466

467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483
static int vhost_user_set_vring_kick(struct vhost_dev *dev,
                                     struct vhost_vring_file *file)
{
    return vhost_set_vring_file(dev, VHOST_USER_SET_VRING_KICK, file);
}

static int vhost_user_set_vring_call(struct vhost_dev *dev,
                                     struct vhost_vring_file *file)
{
    return vhost_set_vring_file(dev, VHOST_USER_SET_VRING_CALL, file);
}

static int vhost_user_set_u64(struct vhost_dev *dev, int request, uint64_t u64)
{
    VhostUserMsg msg = {
        .request = request,
        .flags = VHOST_USER_VERSION,
484
        .payload.u64 = u64,
485
        .size = sizeof(msg.payload.u64),
486 487
    };

488 489 490
    if (vhost_user_write(dev, &msg, NULL, 0) < 0) {
        return -1;
    }
491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515

    return 0;
}

static int vhost_user_set_features(struct vhost_dev *dev,
                                   uint64_t features)
{
    return vhost_user_set_u64(dev, VHOST_USER_SET_FEATURES, features);
}

static int vhost_user_set_protocol_features(struct vhost_dev *dev,
                                            uint64_t features)
{
    return vhost_user_set_u64(dev, VHOST_USER_SET_PROTOCOL_FEATURES, features);
}

static int vhost_user_get_u64(struct vhost_dev *dev, int request, uint64_t *u64)
{
    VhostUserMsg msg = {
        .request = request,
        .flags = VHOST_USER_VERSION,
    };

    if (vhost_user_one_time_request(request) && dev->vq_index != 0) {
        return 0;
516
    }
517

518 519 520
    if (vhost_user_write(dev, &msg, NULL, 0) < 0) {
        return -1;
    }
521 522

    if (vhost_user_read(dev, &msg) < 0) {
523
        return -1;
524 525 526 527 528 529 530 531
    }

    if (msg.request != request) {
        error_report("Received unexpected msg type. Expected %d received %d",
                     request, msg.request);
        return -1;
    }

532
    if (msg.size != sizeof(msg.payload.u64)) {
533 534 535 536
        error_report("Received bad msg size.");
        return -1;
    }

537
    *u64 = msg.payload.u64;
538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553

    return 0;
}

static int vhost_user_get_features(struct vhost_dev *dev, uint64_t *features)
{
    return vhost_user_get_u64(dev, VHOST_USER_GET_FEATURES, features);
}

static int vhost_user_set_owner(struct vhost_dev *dev)
{
    VhostUserMsg msg = {
        .request = VHOST_USER_SET_OWNER,
        .flags = VHOST_USER_VERSION,
    };

554 555 556
    if (vhost_user_write(dev, &msg, NULL, 0) < 0) {
        return -1;
    }
557 558 559 560 561 562 563

    return 0;
}

static int vhost_user_reset_device(struct vhost_dev *dev)
{
    VhostUserMsg msg = {
564
        .request = VHOST_USER_RESET_OWNER,
565 566 567
        .flags = VHOST_USER_VERSION,
    };

568 569 570
    if (vhost_user_write(dev, &msg, NULL, 0) < 0) {
        return -1;
    }
571

572 573 574
    return 0;
}

575 576
static int vhost_user_init(struct vhost_dev *dev, void *opaque)
{
577
    uint64_t features;
578 579
    int err;

580 581 582 583
    assert(dev->vhost_ops->backend_type == VHOST_BACKEND_TYPE_USER);

    dev->opaque = opaque;

584
    err = vhost_user_get_features(dev, &features);
585 586 587 588 589 590 591
    if (err < 0) {
        return err;
    }

    if (virtio_has_feature(features, VHOST_USER_F_PROTOCOL_FEATURES)) {
        dev->backend_features |= 1ULL << VHOST_USER_F_PROTOCOL_FEATURES;

592 593
        err = vhost_user_get_u64(dev, VHOST_USER_GET_PROTOCOL_FEATURES,
                                 &features);
594 595 596 597 598
        if (err < 0) {
            return err;
        }

        dev->protocol_features = features & VHOST_USER_PROTOCOL_FEATURE_MASK;
599
        err = vhost_user_set_protocol_features(dev, dev->protocol_features);
600 601 602
        if (err < 0) {
            return err;
        }
603 604 605

        /* query the max queues we support if backend supports Multiple Queue */
        if (dev->protocol_features & (1ULL << VHOST_USER_PROTOCOL_F_MQ)) {
606 607
            err = vhost_user_get_u64(dev, VHOST_USER_GET_QUEUE_NUM,
                                     &dev->max_queues);
608 609 610 611
            if (err < 0) {
                return err;
            }
        }
612 613
    }

614 615 616 617 618 619 620 621
    if (dev->migration_blocker == NULL &&
        !virtio_has_feature(dev->protocol_features,
                            VHOST_USER_PROTOCOL_F_LOG_SHMFD)) {
        error_setg(&dev->migration_blocker,
                   "Migration disabled: vhost-user backend lacks "
                   "VHOST_USER_PROTOCOL_F_LOG_SHMFD feature.");
    }

622 623 624 625 626 627 628 629 630 631 632 633
    return 0;
}

static int vhost_user_cleanup(struct vhost_dev *dev)
{
    assert(dev->vhost_ops->backend_type == VHOST_BACKEND_TYPE_USER);

    dev->opaque = 0;

    return 0;
}

634 635 636 637 638 639 640
static int vhost_user_get_vq_index(struct vhost_dev *dev, int idx)
{
    assert(idx >= dev->vq_index && idx < dev->vq_index + dev->nvqs);

    return idx;
}

641 642 643 644 645
static int vhost_user_memslots_limit(struct vhost_dev *dev)
{
    return VHOST_MEMORY_MAX_NREGIONS;
}

646 647 648 649 650 651 652 653
static bool vhost_user_requires_shm_log(struct vhost_dev *dev)
{
    assert(dev->vhost_ops->backend_type == VHOST_BACKEND_TYPE_USER);

    return virtio_has_feature(dev->protocol_features,
                              VHOST_USER_PROTOCOL_F_LOG_SHMFD);
}

654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669
static int vhost_user_migration_done(struct vhost_dev *dev, char* mac_addr)
{
    VhostUserMsg msg = { 0 };

    assert(dev->vhost_ops->backend_type == VHOST_BACKEND_TYPE_USER);

    /* If guest supports GUEST_ANNOUNCE do nothing */
    if (virtio_has_feature(dev->acked_features, VIRTIO_NET_F_GUEST_ANNOUNCE)) {
        return 0;
    }

    /* if backend supports VHOST_USER_PROTOCOL_F_RARP ask it to send the RARP */
    if (virtio_has_feature(dev->protocol_features,
                           VHOST_USER_PROTOCOL_F_RARP)) {
        msg.request = VHOST_USER_SEND_RARP;
        msg.flags = VHOST_USER_VERSION;
670
        memcpy((char *)&msg.payload.u64, mac_addr, 6);
671
        msg.size = sizeof(msg.payload.u64);
672

673
        return vhost_user_write(dev, &msg, NULL, 0);
674 675 676 677
    }
    return -1;
}

678 679 680 681
static bool vhost_user_can_merge(struct vhost_dev *dev,
                                 uint64_t start1, uint64_t size1,
                                 uint64_t start2, uint64_t size2)
{
682
    ram_addr_t offset;
683 684 685
    int mfd, rfd;
    MemoryRegion *mr;

686
    mr = memory_region_from_host((void *)(uintptr_t)start1, &offset);
687
    mfd = memory_region_get_fd(mr);
688

689
    mr = memory_region_from_host((void *)(uintptr_t)start2, &offset);
690
    rfd = memory_region_get_fd(mr);
691 692 693 694

    return mfd == rfd;
}

695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718
static int vhost_user_net_set_mtu(struct vhost_dev *dev, uint16_t mtu)
{
    VhostUserMsg msg;
    bool reply_supported = virtio_has_feature(dev->protocol_features,
                                              VHOST_USER_PROTOCOL_F_REPLY_ACK);

    if (!(dev->protocol_features & (1ULL << VHOST_USER_PROTOCOL_F_NET_MTU))) {
        return 0;
    }

    msg.request = VHOST_USER_NET_SET_MTU;
    msg.payload.u64 = mtu;
    msg.size = sizeof(msg.payload.u64);
    msg.flags = VHOST_USER_VERSION;
    if (reply_supported) {
        msg.flags |= VHOST_USER_NEED_REPLY_MASK;
    }

    if (vhost_user_write(dev, &msg, NULL, 0) < 0) {
        return -1;
    }

    /* If reply_ack supported, slave has to ack specified MTU is valid */
    if (reply_supported) {
719
        return process_message_reply(dev, msg);
720 721 722 723 724
    }

    return 0;
}

725 726 727
const VhostOps user_ops = {
        .backend_type = VHOST_BACKEND_TYPE_USER,
        .vhost_backend_init = vhost_user_init,
728
        .vhost_backend_cleanup = vhost_user_cleanup,
729
        .vhost_backend_memslots_limit = vhost_user_memslots_limit,
730 731 732 733 734 735 736 737 738 739 740 741 742 743 744
        .vhost_set_log_base = vhost_user_set_log_base,
        .vhost_set_mem_table = vhost_user_set_mem_table,
        .vhost_set_vring_addr = vhost_user_set_vring_addr,
        .vhost_set_vring_endian = vhost_user_set_vring_endian,
        .vhost_set_vring_num = vhost_user_set_vring_num,
        .vhost_set_vring_base = vhost_user_set_vring_base,
        .vhost_get_vring_base = vhost_user_get_vring_base,
        .vhost_set_vring_kick = vhost_user_set_vring_kick,
        .vhost_set_vring_call = vhost_user_set_vring_call,
        .vhost_set_features = vhost_user_set_features,
        .vhost_get_features = vhost_user_get_features,
        .vhost_set_owner = vhost_user_set_owner,
        .vhost_reset_device = vhost_user_reset_device,
        .vhost_get_vq_index = vhost_user_get_vq_index,
        .vhost_set_vring_enable = vhost_user_set_vring_enable,
745
        .vhost_requires_shm_log = vhost_user_requires_shm_log,
746
        .vhost_migration_done = vhost_user_migration_done,
747
        .vhost_backend_can_merge = vhost_user_can_merge,
748
        .vhost_net_set_mtu = vhost_user_net_set_mtu,
749
};