VirtualBox

source: vbox/trunk/src/VBox/Devices/Network/DevVirtioNet.cpp@ 67525

Last change on this file since 67525 was 67525, checked in by vboxsync, 8 years ago

Net/Virtio: bugref:8887: Extracted a part of vnetTransmitPendingPackets() into a separate function

  • Property svn:eol-style set to native
  • Property svn:keywords set to Author Date Id Revision
File size: 77.9 KB
Line 
1/* $Id: DevVirtioNet.cpp 67525 2017-06-21 07:57:59Z vboxsync $ */
2/** @file
3 * DevVirtioNet - Virtio Network Device
4 */
5
6/*
7 * Copyright (C) 2009-2016 Oracle Corporation
8 *
9 * This file is part of VirtualBox Open Source Edition (OSE), as
10 * available from http://www.virtualbox.org. This file is free software;
11 * you can redistribute it and/or modify it under the terms of the GNU
12 * General Public License (GPL) as published by the Free Software
13 * Foundation, in version 2 as it comes in the "COPYING" file of the
14 * VirtualBox OSE distribution. VirtualBox OSE is distributed in the
15 * hope that it will be useful, but WITHOUT ANY WARRANTY of any kind.
16 */
17
18
19/*********************************************************************************************************************************
20* Header Files *
21*********************************************************************************************************************************/
22#define LOG_GROUP LOG_GROUP_DEV_VIRTIO_NET
23#define VNET_GC_SUPPORT
24#define VNET_WITH_GSO
25#define VNET_WITH_MERGEABLE_RX_BUFS
26
27#include <VBox/vmm/pdmdev.h>
28#include <VBox/vmm/pdmnetifs.h>
29#include <iprt/asm.h>
30#include <iprt/net.h>
31#include <iprt/semaphore.h>
32#ifdef IN_RING3
33# include <iprt/mem.h>
34# include <iprt/uuid.h>
35#endif /* IN_RING3 */
36#include <VBox/VBoxPktDmp.h>
37#include "VBoxDD.h"
38#include "../VirtIO/Virtio.h"
39
40
41/*********************************************************************************************************************************
42* Defined Constants And Macros *
43*********************************************************************************************************************************/
44#ifndef VBOX_DEVICE_STRUCT_TESTCASE
45
46#define INSTANCE(pThis) pThis->VPCI.szInstance
47#define STATUS pThis->config.uStatus
48
49#ifdef IN_RING3
50
51#define VNET_PCI_CLASS 0x0200
52#define VNET_N_QUEUES 3
53#define VNET_NAME_FMT "VNet%d"
54
55#if 0
56/* Virtio Block Device */
57#define VNET_PCI_CLASS 0x0180
58#define VNET_N_QUEUES 2
59#define VNET_NAME_FMT "VBlk%d"
60#endif
61
62#endif /* IN_RING3 */
63
64#endif /* VBOX_DEVICE_STRUCT_TESTCASE */
65
66
67#define VNET_TX_DELAY 150 /**< 150 microseconds */
68#define VNET_MAX_FRAME_SIZE 65535 + 18 /**< Max IP packet size + Ethernet header with VLAN tag */
69#define VNET_MAC_FILTER_LEN 32
70#define VNET_MAX_VID (1 << 12)
71
72/** @name Virtio net features
73 * @{ */
74#define VNET_F_CSUM 0x00000001 /**< Host handles pkts w/ partial csum */
75#define VNET_F_GUEST_CSUM 0x00000002 /**< Guest handles pkts w/ partial csum */
76#define VNET_F_MAC 0x00000020 /**< Host has given MAC address. */
77#define VNET_F_GSO 0x00000040 /**< Host handles pkts w/ any GSO type */
78#define VNET_F_GUEST_TSO4 0x00000080 /**< Guest can handle TSOv4 in. */
79#define VNET_F_GUEST_TSO6 0x00000100 /**< Guest can handle TSOv6 in. */
80#define VNET_F_GUEST_ECN 0x00000200 /**< Guest can handle TSO[6] w/ ECN in. */
81#define VNET_F_GUEST_UFO 0x00000400 /**< Guest can handle UFO in. */
82#define VNET_F_HOST_TSO4 0x00000800 /**< Host can handle TSOv4 in. */
83#define VNET_F_HOST_TSO6 0x00001000 /**< Host can handle TSOv6 in. */
84#define VNET_F_HOST_ECN 0x00002000 /**< Host can handle TSO[6] w/ ECN in. */
85#define VNET_F_HOST_UFO 0x00004000 /**< Host can handle UFO in. */
86#define VNET_F_MRG_RXBUF 0x00008000 /**< Host can merge receive buffers. */
87#define VNET_F_STATUS 0x00010000 /**< virtio_net_config.status available */
88#define VNET_F_CTRL_VQ 0x00020000 /**< Control channel available */
89#define VNET_F_CTRL_RX 0x00040000 /**< Control channel RX mode support */
90#define VNET_F_CTRL_VLAN 0x00080000 /**< Control channel VLAN filtering */
91/** @} */
92
93#define VNET_S_LINK_UP 1
94
95
96/*********************************************************************************************************************************
97* Structures and Typedefs *
98*********************************************************************************************************************************/
99#ifdef _MSC_VER
100struct VNetPCIConfig
101#else /* !_MSC_VER */
102struct __attribute__ ((__packed__)) VNetPCIConfig /** @todo r=bird: Use #pragma pack if necessary, that's portable! */
103#endif /* !_MSC_VER */
104{
105 RTMAC mac;
106 uint16_t uStatus;
107};
108AssertCompileMemberOffset(struct VNetPCIConfig, uStatus, 6);
109
110/**
111 * Device state structure. Holds the current state of device.
112 *
113 * @extends VPCISTATE
114 * @implements PDMINETWORKDOWN
115 * @implements PDMINETWORKCONFIG
116 */
117typedef struct VNetState_st
118{
119 /* VPCISTATE must be the first member! */
120 VPCISTATE VPCI;
121
122// PDMCRITSECT csRx; /**< Protects RX queue. */
123
124 PDMINETWORKDOWN INetworkDown;
125 PDMINETWORKCONFIG INetworkConfig;
126 R3PTRTYPE(PPDMIBASE) pDrvBase; /**< Attached network driver. */
127 R3PTRTYPE(PPDMINETWORKUP) pDrv; /**< Connector of attached network driver. */
128
129 R3PTRTYPE(PPDMQUEUE) pCanRxQueueR3; /**< Rx wakeup signaller - R3. */
130 R0PTRTYPE(PPDMQUEUE) pCanRxQueueR0; /**< Rx wakeup signaller - R0. */
131 RCPTRTYPE(PPDMQUEUE) pCanRxQueueRC; /**< Rx wakeup signaller - RC. */
132# if HC_ARCH_BITS == 64
133 uint32_t padding;
134# endif
135
136 /**< Link Up(/Restore) Timer. */
137 PTMTIMERR3 pLinkUpTimer;
138
139#ifdef VNET_TX_DELAY
140 /**< Transmit Delay Timer - R3. */
141 PTMTIMERR3 pTxTimerR3;
142 /**< Transmit Delay Timer - R0. */
143 PTMTIMERR0 pTxTimerR0;
144 /**< Transmit Delay Timer - GC. */
145 PTMTIMERRC pTxTimerRC;
146
147# if HC_ARCH_BITS == 64
148 uint32_t padding2;
149# endif
150
151 uint32_t u32i;
152 uint32_t u32AvgDiff;
153 uint32_t u32MinDiff;
154 uint32_t u32MaxDiff;
155 uint64_t u64NanoTS;
156#endif /* VNET_TX_DELAY */
157
158 /** Indicates transmission in progress -- only one thread is allowed. */
159 uint32_t uIsTransmitting;
160
161 /** PCI config area holding MAC address as well as TBD. */
162 struct VNetPCIConfig config;
163 /** MAC address obtained from the configuration. */
164 RTMAC macConfigured;
165 /** True if physical cable is attached in configuration. */
166 bool fCableConnected;
167 /** Link up delay (in milliseconds). */
168 uint32_t cMsLinkUpDelay;
169
170 uint32_t alignment;
171
172 /** Number of packet being sent/received to show in debug log. */
173 uint32_t u32PktNo;
174
175 /** N/A: */
176 bool volatile fMaybeOutOfSpace;
177
178 /** Promiscuous mode -- RX filter accepts all packets. */
179 bool fPromiscuous;
180 /** AllMulti mode -- RX filter accepts all multicast packets. */
181 bool fAllMulti;
182 /** The number of actually used slots in aMacTable. */
183 uint32_t nMacFilterEntries;
184 /** Array of MAC addresses accepted by RX filter. */
185 RTMAC aMacFilter[VNET_MAC_FILTER_LEN];
186 /** Bit array of VLAN filter, one bit per VLAN ID. */
187 uint8_t aVlanFilter[VNET_MAX_VID / sizeof(uint8_t)];
188
189 R3PTRTYPE(PVQUEUE) pRxQueue;
190 R3PTRTYPE(PVQUEUE) pTxQueue;
191 R3PTRTYPE(PVQUEUE) pCtlQueue;
192 /* Receive-blocking-related fields ***************************************/
193
194 /** EMT: Gets signalled when more RX descriptors become available. */
195 RTSEMEVENT hEventMoreRxDescAvail;
196
197 /** @name Statistic
198 * @{ */
199 STAMCOUNTER StatReceiveBytes;
200 STAMCOUNTER StatTransmitBytes;
201 STAMCOUNTER StatReceiveGSO;
202 STAMCOUNTER StatTransmitPackets;
203 STAMCOUNTER StatTransmitGSO;
204 STAMCOUNTER StatTransmitCSum;
205#if defined(VBOX_WITH_STATISTICS)
206 STAMPROFILE StatReceive;
207 STAMPROFILE StatReceiveStore;
208 STAMPROFILEADV StatTransmit;
209 STAMPROFILE StatTransmitSend;
210 STAMPROFILE StatRxOverflow;
211 STAMCOUNTER StatRxOverflowWakeup;
212#endif /* VBOX_WITH_STATISTICS */
213 /** @} */
214} VNETSTATE;
215/** Pointer to a virtual I/O network device state. */
216typedef VNETSTATE *PVNETSTATE;
217
218#ifndef VBOX_DEVICE_STRUCT_TESTCASE
219
220#define VNETHDR_F_NEEDS_CSUM 1 // Use u16CSumStart, u16CSumOffset
221
222#define VNETHDR_GSO_NONE 0 // Not a GSO frame
223#define VNETHDR_GSO_TCPV4 1 // GSO frame, IPv4 TCP (TSO)
224#define VNETHDR_GSO_UDP 3 // GSO frame, IPv4 UDP (UFO)
225#define VNETHDR_GSO_TCPV6 4 // GSO frame, IPv6 TCP
226#define VNETHDR_GSO_ECN 0x80 // TCP has ECN set
227
228struct VNetHdr
229{
230 uint8_t u8Flags;
231 uint8_t u8GSOType;
232 uint16_t u16HdrLen;
233 uint16_t u16GSOSize;
234 uint16_t u16CSumStart;
235 uint16_t u16CSumOffset;
236};
237typedef struct VNetHdr VNETHDR;
238typedef VNETHDR *PVNETHDR;
239AssertCompileSize(VNETHDR, 10);
240
241struct VNetHdrMrx
242{
243 VNETHDR Hdr;
244 uint16_t u16NumBufs;
245};
246typedef struct VNetHdrMrx VNETHDRMRX;
247typedef VNETHDRMRX *PVNETHDRMRX;
248AssertCompileSize(VNETHDRMRX, 12);
249
250AssertCompileMemberOffset(VNETSTATE, VPCI, 0);
251
252#define VNET_OK 0
253#define VNET_ERROR 1
254typedef uint8_t VNETCTLACK;
255
256#define VNET_CTRL_CLS_RX_MODE 0
257#define VNET_CTRL_CMD_RX_MODE_PROMISC 0
258#define VNET_CTRL_CMD_RX_MODE_ALLMULTI 1
259
260#define VNET_CTRL_CLS_MAC 1
261#define VNET_CTRL_CMD_MAC_TABLE_SET 0
262
263#define VNET_CTRL_CLS_VLAN 2
264#define VNET_CTRL_CMD_VLAN_ADD 0
265#define VNET_CTRL_CMD_VLAN_DEL 1
266
267
268struct VNetCtlHdr
269{
270 uint8_t u8Class;
271 uint8_t u8Command;
272};
273typedef struct VNetCtlHdr VNETCTLHDR;
274typedef VNETCTLHDR *PVNETCTLHDR;
275AssertCompileSize(VNETCTLHDR, 2);
276
277#ifdef IN_RING3
278
279/** Returns true if large packets are written into several RX buffers. */
280DECLINLINE(bool) vnetMergeableRxBuffers(PVNETSTATE pThis)
281{
282 return !!(pThis->VPCI.uGuestFeatures & VNET_F_MRG_RXBUF);
283}
284
285DECLINLINE(int) vnetCsEnter(PVNETSTATE pThis, int rcBusy)
286{
287 return vpciCsEnter(&pThis->VPCI, rcBusy);
288}
289
290DECLINLINE(void) vnetCsLeave(PVNETSTATE pThis)
291{
292 vpciCsLeave(&pThis->VPCI);
293}
294
295#endif /* IN_RING3 */
296
297DECLINLINE(int) vnetCsRxEnter(PVNETSTATE pThis, int rcBusy)
298{
299 RT_NOREF_PV(pThis);
300 RT_NOREF_PV(rcBusy);
301 // STAM_PROFILE_START(&pThis->CTXSUFF(StatCsRx), a);
302 // int rc = PDMCritSectEnter(&pThis->csRx, rcBusy);
303 // STAM_PROFILE_STOP(&pThis->CTXSUFF(StatCsRx), a);
304 // return rc;
305 return VINF_SUCCESS;
306}
307
308DECLINLINE(void) vnetCsRxLeave(PVNETSTATE pThis)
309{
310 RT_NOREF_PV(pThis);
311 // PDMCritSectLeave(&pThis->csRx);
312}
313
314#ifdef IN_RING3
315/**
316 * Dump a packet to debug log.
317 *
318 * @param pThis The device state structure.
319 * @param pbPacket The packet.
320 * @param cb The size of the packet.
321 * @param pszText A string denoting direction of packet transfer.
322 */
323DECLINLINE(void) vnetPacketDump(PVNETSTATE pThis, const uint8_t *pbPacket, size_t cb, const char *pszText)
324{
325# ifdef DEBUG
326# if 0
327 Log(("%s %s packet #%d (%d bytes):\n",
328 INSTANCE(pThis), pszText, ++pThis->u32PktNo, cb));
329 Log3(("%.*Rhxd\n", cb, pbPacket));
330# else
331 vboxEthPacketDump(INSTANCE(pThis), pszText, pbPacket, (uint32_t)cb);
332# endif
333# else
334 RT_NOREF4(pThis, pbPacket, cb, pszText);
335# endif
336}
337#endif /* IN_RING3 */
338
339/**
340 * Print features given in uFeatures to debug log.
341 *
342 * @param pThis The device state structure.
343 * @param fFeatures Descriptions of which features to print.
344 * @param pcszText A string to print before the list of features.
345 */
346DECLINLINE(void) vnetPrintFeatures(PVNETSTATE pThis, uint32_t fFeatures, const char *pcszText)
347{
348#ifdef DEBUG
349 static struct
350 {
351 uint32_t uMask;
352 const char *pcszDesc;
353 } const s_aFeatures[] =
354 {
355 { VNET_F_CSUM, "host handles pkts w/ partial csum" },
356 { VNET_F_GUEST_CSUM, "guest handles pkts w/ partial csum" },
357 { VNET_F_MAC, "host has given MAC address" },
358 { VNET_F_GSO, "host handles pkts w/ any GSO type" },
359 { VNET_F_GUEST_TSO4, "guest can handle TSOv4 in" },
360 { VNET_F_GUEST_TSO6, "guest can handle TSOv6 in" },
361 { VNET_F_GUEST_ECN, "guest can handle TSO[6] w/ ECN in" },
362 { VNET_F_GUEST_UFO, "guest can handle UFO in" },
363 { VNET_F_HOST_TSO4, "host can handle TSOv4 in" },
364 { VNET_F_HOST_TSO6, "host can handle TSOv6 in" },
365 { VNET_F_HOST_ECN, "host can handle TSO[6] w/ ECN in" },
366 { VNET_F_HOST_UFO, "host can handle UFO in" },
367 { VNET_F_MRG_RXBUF, "host can merge receive buffers" },
368 { VNET_F_STATUS, "virtio_net_config.status available" },
369 { VNET_F_CTRL_VQ, "control channel available" },
370 { VNET_F_CTRL_RX, "control channel RX mode support" },
371 { VNET_F_CTRL_VLAN, "control channel VLAN filtering" }
372 };
373
374 Log3(("%s %s:\n", INSTANCE(pThis), pcszText));
375 for (unsigned i = 0; i < RT_ELEMENTS(s_aFeatures); ++i)
376 {
377 if (s_aFeatures[i].uMask & fFeatures)
378 Log3(("%s --> %s\n", INSTANCE(pThis), s_aFeatures[i].pcszDesc));
379 }
380#else /* !DEBUG */
381 RT_NOREF3(pThis, fFeatures, pcszText);
382#endif /* !DEBUG */
383}
384
385static DECLCALLBACK(uint32_t) vnetIoCb_GetHostFeatures(void *pvState)
386{
387 RT_NOREF_PV(pvState);
388
389 /* We support:
390 * - Host-provided MAC address
391 * - Link status reporting in config space
392 * - Control queue
393 * - RX mode setting
394 * - MAC filter table
395 * - VLAN filter
396 */
397 return VNET_F_MAC
398 | VNET_F_STATUS
399 | VNET_F_CTRL_VQ
400 | VNET_F_CTRL_RX
401 | VNET_F_CTRL_VLAN
402#ifdef VNET_WITH_GSO
403 | VNET_F_CSUM
404 | VNET_F_HOST_TSO4
405 | VNET_F_HOST_TSO6
406 | VNET_F_HOST_UFO
407 | VNET_F_GUEST_CSUM /* We expect the guest to accept partial TCP checksums (see @bugref{4796}) */
408 | VNET_F_GUEST_TSO4
409 | VNET_F_GUEST_TSO6
410 | VNET_F_GUEST_UFO
411#endif
412#ifdef VNET_WITH_MERGEABLE_RX_BUFS
413 | VNET_F_MRG_RXBUF
414#endif
415 ;
416}
417
418static DECLCALLBACK(uint32_t) vnetIoCb_GetHostMinimalFeatures(void *pvState)
419{
420 RT_NOREF_PV(pvState);
421 return VNET_F_MAC;
422}
423
424static DECLCALLBACK(void) vnetIoCb_SetHostFeatures(void *pvState, uint32_t fFeatures)
425{
426 /** @todo Nothing to do here yet */
427 PVNETSTATE pThis = (PVNETSTATE)pvState;
428 LogFlow(("%s vnetIoCb_SetHostFeatures: uFeatures=%x\n", INSTANCE(pThis), fFeatures));
429 vnetPrintFeatures(pThis, fFeatures, "The guest negotiated the following features");
430}
431
432static DECLCALLBACK(int) vnetIoCb_GetConfig(void *pvState, uint32_t offCfg, uint32_t cb, void *data)
433{
434 PVNETSTATE pThis = (PVNETSTATE)pvState;
435 if (offCfg + cb > sizeof(struct VNetPCIConfig))
436 {
437 Log(("%s vnetIoCb_GetConfig: Read beyond the config structure is attempted (offCfg=%#x cb=%x).\n", INSTANCE(pThis), offCfg, cb));
438 return VERR_IOM_IOPORT_UNUSED;
439 }
440 memcpy(data, (uint8_t *)&pThis->config + offCfg, cb);
441 return VINF_SUCCESS;
442}
443
444static DECLCALLBACK(int) vnetIoCb_SetConfig(void *pvState, uint32_t offCfg, uint32_t cb, void *data)
445{
446 PVNETSTATE pThis = (PVNETSTATE)pvState;
447 if (offCfg + cb > sizeof(struct VNetPCIConfig))
448 {
449 Log(("%s vnetIoCb_SetConfig: Write beyond the config structure is attempted (offCfg=%#x cb=%x).\n", INSTANCE(pThis), offCfg, cb));
450 if (offCfg < sizeof(struct VNetPCIConfig))
451 memcpy((uint8_t *)&pThis->config + offCfg, data,
452 sizeof(struct VNetPCIConfig) - offCfg);
453 return VINF_SUCCESS;
454 }
455 memcpy((uint8_t *)&pThis->config + offCfg, data, cb);
456 return VINF_SUCCESS;
457}
458
459/**
460 * Hardware reset. Revert all registers to initial values.
461 *
462 * @param pThis The device state structure.
463 */
464static DECLCALLBACK(int) vnetIoCb_Reset(void *pvState)
465{
466 PVNETSTATE pThis = (PVNETSTATE)pvState;
467 Log(("%s Reset triggered\n", INSTANCE(pThis)));
468
469 int rc = vnetCsRxEnter(pThis, VERR_SEM_BUSY);
470 if (RT_UNLIKELY(rc != VINF_SUCCESS))
471 {
472 LogRel(("vnetIoCb_Reset failed to enter RX critical section!\n"));
473 return rc;
474 }
475 vpciReset(&pThis->VPCI);
476 vnetCsRxLeave(pThis);
477
478 /// @todo Implement reset
479 if (pThis->fCableConnected)
480 STATUS = VNET_S_LINK_UP;
481 else
482 STATUS = 0;
483 Log(("%s vnetIoCb_Reset: Link is %s\n", INSTANCE(pThis), pThis->fCableConnected ? "up" : "down"));
484
485 /*
486 * By default we pass all packets up since the older guests cannot control
487 * virtio mode.
488 */
489 pThis->fPromiscuous = true;
490 pThis->fAllMulti = false;
491 pThis->nMacFilterEntries = 0;
492 memset(pThis->aMacFilter, 0, VNET_MAC_FILTER_LEN * sizeof(RTMAC));
493 memset(pThis->aVlanFilter, 0, sizeof(pThis->aVlanFilter));
494 pThis->uIsTransmitting = 0;
495#ifndef IN_RING3
496 return VINF_IOM_R3_IOPORT_WRITE;
497#else
498 if (pThis->pDrv)
499 pThis->pDrv->pfnSetPromiscuousMode(pThis->pDrv, true);
500 return VINF_SUCCESS;
501#endif
502}
503
504#ifdef IN_RING3
505
506/**
507 * Wakeup the RX thread.
508 */
509static void vnetWakeupReceive(PPDMDEVINS pDevIns)
510{
511 PVNETSTATE pThis = PDMINS_2_DATA(pDevIns, PVNETSTATE);
512 if ( pThis->fMaybeOutOfSpace
513 && pThis->hEventMoreRxDescAvail != NIL_RTSEMEVENT)
514 {
515 STAM_COUNTER_INC(&pThis->StatRxOverflowWakeup);
516 Log(("%s Waking up Out-of-RX-space semaphore\n", INSTANCE(pThis)));
517 RTSemEventSignal(pThis->hEventMoreRxDescAvail);
518 }
519}
520
521
522/**
523 * Takes down the link temporarily if it's current status is up.
524 *
525 * This is used during restore and when replumbing the network link.
526 *
527 * The temporary link outage is supposed to indicate to the OS that all network
528 * connections have been lost and that it for instance is appropriate to
529 * renegotiate any DHCP lease.
530 *
531 * @param pThis The Virtual I/O network device state.
532 */
533static void vnetTempLinkDown(PVNETSTATE pThis)
534{
535 if (STATUS & VNET_S_LINK_UP)
536 {
537 STATUS &= ~VNET_S_LINK_UP;
538 vpciRaiseInterrupt(&pThis->VPCI, VERR_SEM_BUSY, VPCI_ISR_CONFIG);
539 /* Restore the link back in 5 seconds. */
540 int rc = TMTimerSetMillies(pThis->pLinkUpTimer, pThis->cMsLinkUpDelay);
541 AssertRC(rc);
542 Log(("%s vnetTempLinkDown: Link is down temporarily\n", INSTANCE(pThis)));
543 }
544}
545
546
547/**
548 * @callback_method_impl{FNTMTIMERDEV, Link Up Timer handler.}
549 */
550static DECLCALLBACK(void) vnetLinkUpTimer(PPDMDEVINS pDevIns, PTMTIMER pTimer, void *pvUser)
551{
552 RT_NOREF(pTimer);
553 PVNETSTATE pThis = (PVNETSTATE)pvUser;
554
555 int rc = vnetCsEnter(pThis, VERR_SEM_BUSY);
556 if (RT_UNLIKELY(rc != VINF_SUCCESS))
557 return;
558 STATUS |= VNET_S_LINK_UP;
559 vpciRaiseInterrupt(&pThis->VPCI, VERR_SEM_BUSY, VPCI_ISR_CONFIG);
560 vnetWakeupReceive(pDevIns);
561 vnetCsLeave(pThis);
562 Log(("%s vnetLinkUpTimer: Link is up\n", INSTANCE(pThis)));
563 if (pThis->pDrv)
564 pThis->pDrv->pfnNotifyLinkChanged(pThis->pDrv, PDMNETWORKLINKSTATE_UP);
565}
566
567
568/**
569 * @callback_method_impl{FNPDMQUEUEDEV, Handler for the wakeup signaller queue.}
570 */
571static DECLCALLBACK(bool) vnetCanRxQueueConsumer(PPDMDEVINS pDevIns, PPDMQUEUEITEMCORE pItem)
572{
573 RT_NOREF(pItem);
574 vnetWakeupReceive(pDevIns);
575 return true;
576}
577
578#endif /* IN_RING3 */
579
580/**
581 * This function is called when the driver becomes ready.
582 *
583 * @param pThis The device state structure.
584 */
585static DECLCALLBACK(void) vnetIoCb_Ready(void *pvState)
586{
587 PVNETSTATE pThis = (PVNETSTATE)pvState;
588 Log(("%s Driver became ready, waking up RX thread...\n", INSTANCE(pThis)));
589#ifdef IN_RING3
590 vnetWakeupReceive(pThis->VPCI.CTX_SUFF(pDevIns));
591#else
592 PPDMQUEUEITEMCORE pItem = PDMQueueAlloc(pThis->CTX_SUFF(pCanRxQueue));
593 if (pItem)
594 PDMQueueInsert(pThis->CTX_SUFF(pCanRxQueue), pItem);
595#endif
596}
597
598
599/**
600 * I/O port callbacks.
601 */
602static const VPCIIOCALLBACKS g_IOCallbacks =
603{
604 vnetIoCb_GetHostFeatures,
605 vnetIoCb_GetHostMinimalFeatures,
606 vnetIoCb_SetHostFeatures,
607 vnetIoCb_GetConfig,
608 vnetIoCb_SetConfig,
609 vnetIoCb_Reset,
610 vnetIoCb_Ready,
611};
612
613
614/**
615 * @callback_method_impl{FNIOMIOPORTIN}
616 */
617PDMBOTHCBDECL(int) vnetIOPortIn(PPDMDEVINS pDevIns, void *pvUser, RTIOPORT port, uint32_t *pu32, unsigned cb)
618{
619 return vpciIOPortIn(pDevIns, pvUser, port, pu32, cb, &g_IOCallbacks);
620}
621
622
623/**
624 * @callback_method_impl{FNIOMIOPORTOUT}
625 */
626PDMBOTHCBDECL(int) vnetIOPortOut(PPDMDEVINS pDevIns, void *pvUser, RTIOPORT port, uint32_t u32, unsigned cb)
627{
628 return vpciIOPortOut(pDevIns, pvUser, port, u32, cb, &g_IOCallbacks);
629}
630
631
632#ifdef IN_RING3
633
634/**
635 * Check if the device can receive data now.
636 * This must be called before the pfnRecieve() method is called.
637 *
638 * @remarks As a side effect this function enables queue notification
639 * if it cannot receive because the queue is empty.
640 * It disables notification if it can receive.
641 *
642 * @returns VERR_NET_NO_BUFFER_SPACE if it cannot.
643 * @param pInterface Pointer to the interface structure containing the called function pointer.
644 * @thread RX
645 */
646static int vnetCanReceive(PVNETSTATE pThis)
647{
648 int rc = vnetCsRxEnter(pThis, VERR_SEM_BUSY);
649 AssertRCReturn(rc, rc);
650
651 LogFlow(("%s vnetCanReceive\n", INSTANCE(pThis)));
652 if (!(pThis->VPCI.uStatus & VPCI_STATUS_DRV_OK))
653 rc = VERR_NET_NO_BUFFER_SPACE;
654 else if (!vqueueIsReady(&pThis->VPCI, pThis->pRxQueue))
655 rc = VERR_NET_NO_BUFFER_SPACE;
656 else if (vqueueIsEmpty(&pThis->VPCI, pThis->pRxQueue))
657 {
658 vringSetNotification(&pThis->VPCI, &pThis->pRxQueue->VRing, true);
659 rc = VERR_NET_NO_BUFFER_SPACE;
660 }
661 else
662 {
663 vringSetNotification(&pThis->VPCI, &pThis->pRxQueue->VRing, false);
664 rc = VINF_SUCCESS;
665 }
666
667 LogFlow(("%s vnetCanReceive -> %Rrc\n", INSTANCE(pThis), rc));
668 vnetCsRxLeave(pThis);
669 return rc;
670}
671
672/**
673 * @interface_method_impl{PDMINETWORKDOWN,pfnWaitReceiveAvail}
674 */
675static DECLCALLBACK(int) vnetNetworkDown_WaitReceiveAvail(PPDMINETWORKDOWN pInterface, RTMSINTERVAL cMillies)
676{
677 PVNETSTATE pThis = RT_FROM_MEMBER(pInterface, VNETSTATE, INetworkDown);
678 LogFlow(("%s vnetNetworkDown_WaitReceiveAvail(cMillies=%u)\n", INSTANCE(pThis), cMillies));
679 int rc = vnetCanReceive(pThis);
680
681 if (RT_SUCCESS(rc))
682 return VINF_SUCCESS;
683 if (RT_UNLIKELY(cMillies == 0))
684 return VERR_NET_NO_BUFFER_SPACE;
685
686 rc = VERR_INTERRUPTED;
687 ASMAtomicXchgBool(&pThis->fMaybeOutOfSpace, true);
688 STAM_PROFILE_START(&pThis->StatRxOverflow, a);
689
690 VMSTATE enmVMState;
691 while (RT_LIKELY( (enmVMState = PDMDevHlpVMState(pThis->VPCI.CTX_SUFF(pDevIns))) == VMSTATE_RUNNING
692 || enmVMState == VMSTATE_RUNNING_LS))
693 {
694 int rc2 = vnetCanReceive(pThis);
695 if (RT_SUCCESS(rc2))
696 {
697 rc = VINF_SUCCESS;
698 break;
699 }
700 Log(("%s vnetNetworkDown_WaitReceiveAvail: waiting cMillies=%u...\n", INSTANCE(pThis), cMillies));
701 RTSemEventWait(pThis->hEventMoreRxDescAvail, cMillies);
702 }
703 STAM_PROFILE_STOP(&pThis->StatRxOverflow, a);
704 ASMAtomicXchgBool(&pThis->fMaybeOutOfSpace, false);
705
706 LogFlow(("%s vnetNetworkDown_WaitReceiveAvail -> %d\n", INSTANCE(pThis), rc));
707 return rc;
708}
709
710
711/**
712 * @interface_method_impl{PDMIBASE,pfnQueryInterface}
713 */
714static DECLCALLBACK(void *) vnetQueryInterface(struct PDMIBASE *pInterface, const char *pszIID)
715{
716 PVNETSTATE pThis = RT_FROM_MEMBER(pInterface, VNETSTATE, VPCI.IBase);
717 Assert(&pThis->VPCI.IBase == pInterface);
718
719 PDMIBASE_RETURN_INTERFACE(pszIID, PDMINETWORKDOWN, &pThis->INetworkDown);
720 PDMIBASE_RETURN_INTERFACE(pszIID, PDMINETWORKCONFIG, &pThis->INetworkConfig);
721 return vpciQueryInterface(pInterface, pszIID);
722}
723
724/**
725 * Returns true if it is a broadcast packet.
726 *
727 * @returns true if destination address indicates broadcast.
728 * @param pvBuf The ethernet packet.
729 */
730DECLINLINE(bool) vnetIsBroadcast(const void *pvBuf)
731{
732 static const uint8_t s_abBcastAddr[] = { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF };
733 return memcmp(pvBuf, s_abBcastAddr, sizeof(s_abBcastAddr)) == 0;
734}
735
736/**
737 * Returns true if it is a multicast packet.
738 *
739 * @remarks returns true for broadcast packets as well.
740 * @returns true if destination address indicates multicast.
741 * @param pvBuf The ethernet packet.
742 */
743DECLINLINE(bool) vnetIsMulticast(const void *pvBuf)
744{
745 return (*(char*)pvBuf) & 1;
746}
747
748/**
749 * Determines if the packet is to be delivered to upper layer.
750 *
751 * @returns true if packet is intended for this node.
752 * @param pThis Pointer to the state structure.
753 * @param pvBuf The ethernet packet.
754 * @param cb Number of bytes available in the packet.
755 */
756static bool vnetAddressFilter(PVNETSTATE pThis, const void *pvBuf, size_t cb)
757{
758 if (pThis->fPromiscuous)
759 return true;
760
761 /* Ignore everything outside of our VLANs */
762 uint16_t *u16Ptr = (uint16_t*)pvBuf;
763 /* Compare TPID with VLAN Ether Type */
764 if ( u16Ptr[6] == RT_H2BE_U16(0x8100)
765 && !ASMBitTest(pThis->aVlanFilter, RT_BE2H_U16(u16Ptr[7]) & 0xFFF))
766 {
767 Log4(("%s vnetAddressFilter: not our VLAN, returning false\n", INSTANCE(pThis)));
768 return false;
769 }
770
771 if (vnetIsBroadcast(pvBuf))
772 return true;
773
774 if (pThis->fAllMulti && vnetIsMulticast(pvBuf))
775 return true;
776
777 if (!memcmp(pThis->config.mac.au8, pvBuf, sizeof(RTMAC)))
778 return true;
779 Log4(("%s vnetAddressFilter: %RTmac (conf) != %RTmac (dest)\n", INSTANCE(pThis), pThis->config.mac.au8, pvBuf));
780
781 for (unsigned i = 0; i < pThis->nMacFilterEntries; i++)
782 if (!memcmp(&pThis->aMacFilter[i], pvBuf, sizeof(RTMAC)))
783 return true;
784
785 Log2(("%s vnetAddressFilter: failed all tests, returning false, packet dump follows:\n", INSTANCE(pThis)));
786 vnetPacketDump(pThis, (const uint8_t *)pvBuf, cb, "<-- Incoming");
787
788 return false;
789}
790
791/**
792 * Pad and store received packet.
793 *
794 * @remarks Make sure that the packet appears to upper layer as one coming
795 * from real Ethernet: pad it and insert FCS.
796 *
797 * @returns VBox status code.
798 * @param pThis The device state structure.
799 * @param pvBuf The available data.
800 * @param cb Number of bytes available in the buffer.
801 * @thread RX
802 */
803static int vnetHandleRxPacket(PVNETSTATE pThis, const void *pvBuf, size_t cb,
804 PCPDMNETWORKGSO pGso)
805{
806 VNETHDRMRX Hdr;
807 unsigned uHdrLen;
808 RTGCPHYS addrHdrMrx = 0;
809
810 if (pGso)
811 {
812 Log2(("%s vnetHandleRxPacket: gso type=%x cbHdrsTotal=%u cbHdrsSeg=%u mss=%u off1=0x%x off2=0x%x\n",
813 INSTANCE(pThis), pGso->u8Type, pGso->cbHdrsTotal, pGso->cbHdrsSeg, pGso->cbMaxSeg, pGso->offHdr1, pGso->offHdr2));
814 Hdr.Hdr.u8Flags = VNETHDR_F_NEEDS_CSUM;
815 switch (pGso->u8Type)
816 {
817 case PDMNETWORKGSOTYPE_IPV4_TCP:
818 Hdr.Hdr.u8GSOType = VNETHDR_GSO_TCPV4;
819 Hdr.Hdr.u16CSumOffset = RT_OFFSETOF(RTNETTCP, th_sum);
820 break;
821 case PDMNETWORKGSOTYPE_IPV6_TCP:
822 Hdr.Hdr.u8GSOType = VNETHDR_GSO_TCPV6;
823 Hdr.Hdr.u16CSumOffset = RT_OFFSETOF(RTNETTCP, th_sum);
824 break;
825 case PDMNETWORKGSOTYPE_IPV4_UDP:
826 Hdr.Hdr.u8GSOType = VNETHDR_GSO_UDP;
827 Hdr.Hdr.u16CSumOffset = RT_OFFSETOF(RTNETUDP, uh_sum);
828 break;
829 default:
830 return VERR_INVALID_PARAMETER;
831 }
832 Hdr.Hdr.u16HdrLen = pGso->cbHdrsTotal;
833 Hdr.Hdr.u16GSOSize = pGso->cbMaxSeg;
834 Hdr.Hdr.u16CSumStart = pGso->offHdr2;
835 STAM_REL_COUNTER_INC(&pThis->StatReceiveGSO);
836 }
837 else
838 {
839 Hdr.Hdr.u8Flags = 0;
840 Hdr.Hdr.u8GSOType = VNETHDR_GSO_NONE;
841 }
842
843 if (vnetMergeableRxBuffers(pThis))
844 uHdrLen = sizeof(VNETHDRMRX);
845 else
846 uHdrLen = sizeof(VNETHDR);
847
848 vnetPacketDump(pThis, (const uint8_t *)pvBuf, cb, "<-- Incoming");
849
850 unsigned int uOffset = 0;
851 unsigned int nElem;
852 for (nElem = 0; uOffset < cb; nElem++)
853 {
854 VQUEUEELEM elem;
855 unsigned int nSeg = 0, uElemSize = 0, cbReserved = 0;
856
857 if (!vqueueGet(&pThis->VPCI, pThis->pRxQueue, &elem))
858 {
859 /*
860 * @todo: It is possible to run out of RX buffers if only a few
861 * were added and we received a big packet.
862 */
863 Log(("%s vnetHandleRxPacket: Suddenly there is no space in receive queue!\n", INSTANCE(pThis)));
864 return VERR_INTERNAL_ERROR;
865 }
866
867 if (elem.nIn < 1)
868 {
869 Log(("%s vnetHandleRxPacket: No writable descriptors in receive queue!\n", INSTANCE(pThis)));
870 return VERR_INTERNAL_ERROR;
871 }
872
873 if (nElem == 0)
874 {
875 if (vnetMergeableRxBuffers(pThis))
876 {
877 addrHdrMrx = elem.aSegsIn[nSeg].addr;
878 cbReserved = uHdrLen;
879 }
880 else
881 {
882 /* The very first segment of the very first element gets the header. */
883 if (elem.aSegsIn[nSeg].cb != sizeof(VNETHDR))
884 {
885 Log(("%s vnetHandleRxPacket: The first descriptor does match the header size!\n", INSTANCE(pThis)));
886 return VERR_INTERNAL_ERROR;
887 }
888 elem.aSegsIn[nSeg++].pv = &Hdr;
889 }
890 uElemSize += uHdrLen;
891 }
892 while (nSeg < elem.nIn && uOffset < cb)
893 {
894 unsigned int uSize = (unsigned int)RT_MIN(elem.aSegsIn[nSeg].cb - (nSeg?0:cbReserved),
895 cb - uOffset);
896 elem.aSegsIn[nSeg++].pv = (uint8_t*)pvBuf + uOffset;
897 uOffset += uSize;
898 uElemSize += uSize;
899 }
900 STAM_PROFILE_START(&pThis->StatReceiveStore, a);
901 vqueuePut(&pThis->VPCI, pThis->pRxQueue, &elem, uElemSize, cbReserved);
902 STAM_PROFILE_STOP(&pThis->StatReceiveStore, a);
903 if (!vnetMergeableRxBuffers(pThis))
904 break;
905 cbReserved = 0;
906 }
907 if (vnetMergeableRxBuffers(pThis))
908 {
909 Hdr.u16NumBufs = nElem;
910 int rc = PDMDevHlpPCIPhysWrite(pThis->VPCI.CTX_SUFF(pDevIns), addrHdrMrx,
911 &Hdr, sizeof(Hdr));
912 if (RT_FAILURE(rc))
913 {
914 Log(("%s vnetHandleRxPacket: Failed to write merged RX buf header: %Rrc\n", INSTANCE(pThis), rc));
915 return rc;
916 }
917 }
918 vqueueSync(&pThis->VPCI, pThis->pRxQueue);
919 if (uOffset < cb)
920 {
921 Log(("%s vnetHandleRxPacket: Packet did not fit into RX queue (packet size=%u)!\n", INSTANCE(pThis), cb));
922 return VERR_TOO_MUCH_DATA;
923 }
924
925 return VINF_SUCCESS;
926}
927
928/**
929 * @interface_method_impl{PDMINETWORKDOWN,pfnReceiveGso}
930 */
931static DECLCALLBACK(int) vnetNetworkDown_ReceiveGso(PPDMINETWORKDOWN pInterface,
932 const void *pvBuf, size_t cb,
933 PCPDMNETWORKGSO pGso)
934{
935 PVNETSTATE pThis = RT_FROM_MEMBER(pInterface, VNETSTATE, INetworkDown);
936
937 if (pGso)
938 {
939 uint32_t uFeatures = pThis->VPCI.uGuestFeatures;
940
941 switch (pGso->u8Type)
942 {
943 case PDMNETWORKGSOTYPE_IPV4_TCP:
944 uFeatures &= VNET_F_GUEST_TSO4;
945 break;
946 case PDMNETWORKGSOTYPE_IPV6_TCP:
947 uFeatures &= VNET_F_GUEST_TSO6;
948 break;
949 case PDMNETWORKGSOTYPE_IPV4_UDP:
950 case PDMNETWORKGSOTYPE_IPV6_UDP:
951 uFeatures &= VNET_F_GUEST_UFO;
952 break;
953 default:
954 uFeatures = 0;
955 break;
956 }
957 if (!uFeatures)
958 {
959 Log2(("%s vnetNetworkDown_ReceiveGso: GSO type (0x%x) not supported\n", INSTANCE(pThis), pGso->u8Type));
960 return VERR_NOT_SUPPORTED;
961 }
962 }
963
964 Log2(("%s vnetNetworkDown_ReceiveGso: pvBuf=%p cb=%u pGso=%p\n", INSTANCE(pThis), pvBuf, cb, pGso));
965 int rc = vnetCanReceive(pThis);
966 if (RT_FAILURE(rc))
967 return rc;
968
969 /* Drop packets if VM is not running or cable is disconnected. */
970 VMSTATE enmVMState = PDMDevHlpVMState(pThis->VPCI.CTX_SUFF(pDevIns));
971 if (( enmVMState != VMSTATE_RUNNING
972 && enmVMState != VMSTATE_RUNNING_LS)
973 || !(STATUS & VNET_S_LINK_UP))
974 return VINF_SUCCESS;
975
976 STAM_PROFILE_START(&pThis->StatReceive, a);
977 vpciSetReadLed(&pThis->VPCI, true);
978 if (vnetAddressFilter(pThis, pvBuf, cb))
979 {
980 rc = vnetCsRxEnter(pThis, VERR_SEM_BUSY);
981 if (RT_SUCCESS(rc))
982 {
983 rc = vnetHandleRxPacket(pThis, pvBuf, cb, pGso);
984 STAM_REL_COUNTER_ADD(&pThis->StatReceiveBytes, cb);
985 vnetCsRxLeave(pThis);
986 }
987 }
988 vpciSetReadLed(&pThis->VPCI, false);
989 STAM_PROFILE_STOP(&pThis->StatReceive, a);
990 return rc;
991}
992
993/**
994 * @interface_method_impl{PDMINETWORKDOWN,pfnReceive}
995 */
996static DECLCALLBACK(int) vnetNetworkDown_Receive(PPDMINETWORKDOWN pInterface, const void *pvBuf, size_t cb)
997{
998 return vnetNetworkDown_ReceiveGso(pInterface, pvBuf, cb, NULL);
999}
1000
1001/**
1002 * Gets the current Media Access Control (MAC) address.
1003 *
1004 * @returns VBox status code.
1005 * @param pInterface Pointer to the interface structure containing the called function pointer.
1006 * @param pMac Where to store the MAC address.
1007 * @thread EMT
1008 */
1009static DECLCALLBACK(int) vnetGetMac(PPDMINETWORKCONFIG pInterface, PRTMAC pMac)
1010{
1011 PVNETSTATE pThis = RT_FROM_MEMBER(pInterface, VNETSTATE, INetworkConfig);
1012 memcpy(pMac, pThis->config.mac.au8, sizeof(RTMAC));
1013 return VINF_SUCCESS;
1014}
1015
1016/**
1017 * Gets the new link state.
1018 *
1019 * @returns The current link state.
1020 * @param pInterface Pointer to the interface structure containing the called function pointer.
1021 * @thread EMT
1022 */
1023static DECLCALLBACK(PDMNETWORKLINKSTATE) vnetGetLinkState(PPDMINETWORKCONFIG pInterface)
1024{
1025 PVNETSTATE pThis = RT_FROM_MEMBER(pInterface, VNETSTATE, INetworkConfig);
1026 if (STATUS & VNET_S_LINK_UP)
1027 return PDMNETWORKLINKSTATE_UP;
1028 return PDMNETWORKLINKSTATE_DOWN;
1029}
1030
1031
1032/**
1033 * Sets the new link state.
1034 *
1035 * @returns VBox status code.
1036 * @param pInterface Pointer to the interface structure containing the called function pointer.
1037 * @param enmState The new link state
1038 */
1039static DECLCALLBACK(int) vnetSetLinkState(PPDMINETWORKCONFIG pInterface, PDMNETWORKLINKSTATE enmState)
1040{
1041 PVNETSTATE pThis = RT_FROM_MEMBER(pInterface, VNETSTATE, INetworkConfig);
1042 bool fOldUp = !!(STATUS & VNET_S_LINK_UP);
1043 bool fNewUp = enmState == PDMNETWORKLINKSTATE_UP;
1044
1045 Log(("%s vnetSetLinkState: enmState=%d\n", INSTANCE(pThis), enmState));
1046 if (enmState == PDMNETWORKLINKSTATE_DOWN_RESUME)
1047 {
1048 if (fOldUp)
1049 {
1050 /*
1051 * We bother to bring the link down only if it was up previously. The UP link state
1052 * notification will be sent when the link actually goes up in vnetLinkUpTimer().
1053 */
1054 vnetTempLinkDown(pThis);
1055 if (pThis->pDrv)
1056 pThis->pDrv->pfnNotifyLinkChanged(pThis->pDrv, enmState);
1057 }
1058 }
1059 else if (fNewUp != fOldUp)
1060 {
1061 if (fNewUp)
1062 {
1063 Log(("%s Link is up\n", INSTANCE(pThis)));
1064 STATUS |= VNET_S_LINK_UP;
1065 vpciRaiseInterrupt(&pThis->VPCI, VERR_SEM_BUSY, VPCI_ISR_CONFIG);
1066 }
1067 else
1068 {
1069 /* The link was brought down explicitly, make sure it won't come up by timer. */
1070 TMTimerStop(pThis->pLinkUpTimer);
1071 Log(("%s Link is down\n", INSTANCE(pThis)));
1072 STATUS &= ~VNET_S_LINK_UP;
1073 vpciRaiseInterrupt(&pThis->VPCI, VERR_SEM_BUSY, VPCI_ISR_CONFIG);
1074 }
1075 if (pThis->pDrv)
1076 pThis->pDrv->pfnNotifyLinkChanged(pThis->pDrv, enmState);
1077 }
1078 return VINF_SUCCESS;
1079}
1080
1081static DECLCALLBACK(void) vnetQueueReceive(void *pvState, PVQUEUE pQueue)
1082{
1083 RT_NOREF(pQueue);
1084 PVNETSTATE pThis = (PVNETSTATE)pvState;
1085 Log(("%s Receive buffers has been added, waking up receive thread.\n", INSTANCE(pThis)));
1086 vnetWakeupReceive(pThis->VPCI.CTX_SUFF(pDevIns));
1087}
1088
1089/**
1090 * Sets up the GSO context according to the Virtio header.
1091 *
1092 * @param pGso The GSO context to setup.
1093 * @param pCtx The context descriptor.
1094 */
1095DECLINLINE(PPDMNETWORKGSO) vnetSetupGsoCtx(PPDMNETWORKGSO pGso, VNETHDR const *pHdr)
1096{
1097 pGso->u8Type = PDMNETWORKGSOTYPE_INVALID;
1098
1099 if (pHdr->u8GSOType & VNETHDR_GSO_ECN)
1100 {
1101 AssertMsgFailed(("Unsupported flag in virtio header: ECN\n"));
1102 return NULL;
1103 }
1104 switch (pHdr->u8GSOType & ~VNETHDR_GSO_ECN)
1105 {
1106 case VNETHDR_GSO_TCPV4:
1107 pGso->u8Type = PDMNETWORKGSOTYPE_IPV4_TCP;
1108 pGso->cbHdrsSeg = pHdr->u16HdrLen;
1109 break;
1110 case VNETHDR_GSO_TCPV6:
1111 pGso->u8Type = PDMNETWORKGSOTYPE_IPV6_TCP;
1112 pGso->cbHdrsSeg = pHdr->u16HdrLen;
1113 break;
1114 case VNETHDR_GSO_UDP:
1115 pGso->u8Type = PDMNETWORKGSOTYPE_IPV4_UDP;
1116 pGso->cbHdrsSeg = pHdr->u16CSumStart;
1117 break;
1118 default:
1119 return NULL;
1120 }
1121 if (pHdr->u8Flags & VNETHDR_F_NEEDS_CSUM)
1122 pGso->offHdr2 = pHdr->u16CSumStart;
1123 else
1124 {
1125 AssertMsgFailed(("GSO without checksum offloading!\n"));
1126 return NULL;
1127 }
1128 pGso->offHdr1 = sizeof(RTNETETHERHDR);
1129 pGso->cbHdrsTotal = pHdr->u16HdrLen;
1130 pGso->cbMaxSeg = pHdr->u16GSOSize;
1131 return pGso;
1132}
1133
1134DECLINLINE(uint16_t) vnetCSum16(const void *pvBuf, size_t cb)
1135{
1136 uint32_t csum = 0;
1137 uint16_t *pu16 = (uint16_t *)pvBuf;
1138
1139 while (cb > 1)
1140 {
1141 csum += *pu16++;
1142 cb -= 2;
1143 }
1144 if (cb)
1145 csum += *(uint8_t*)pu16;
1146 while (csum >> 16)
1147 csum = (csum >> 16) + (csum & 0xFFFF);
1148 return ~csum;
1149}
1150
1151DECLINLINE(void) vnetCompleteChecksum(uint8_t *pBuf, size_t cbSize, uint16_t uStart, uint16_t uOffset)
1152{
1153 *(uint16_t*)(pBuf + uStart + uOffset) = vnetCSum16(pBuf + uStart, cbSize - uStart);
1154}
1155
1156static int vnetTransmitFrame(PVNETSTATE pThis, PPDMSCATTERGATHER pSgBuf, PPDMNETWORKGSO pGso, PVNETHDR pHdr)
1157{
1158 vnetPacketDump(pThis, (uint8_t *)pSgBuf->aSegs[0].pvSeg, pSgBuf->cbUsed, "--> Outgoing");
1159 LogRel(("vnet: Outgoing %spacket %d bytes, csum_start=%x\n", pGso?"GSO ":"", pSgBuf->cbUsed, pHdr->u16CSumStart));
1160 if (pGso)
1161 {
1162 /* Some guests (RHEL) may report HdrLen excluding transport layer header! */
1163 /*
1164 * We cannot use cdHdrs provided by the guest because of different ways
1165 * it gets filled out by different versions of kernels.
1166 */
1167 //if (pGso->cbHdrs < pHdr->u16CSumStart + pHdr->u16CSumOffset + 2)
1168 {
1169 Log4(("%s vnetTransmitPendingPackets: HdrLen before adjustment %d.\n",
1170 INSTANCE(pThis), pGso->cbHdrsTotal));
1171 switch (pGso->u8Type)
1172 {
1173 case PDMNETWORKGSOTYPE_IPV4_TCP:
1174 case PDMNETWORKGSOTYPE_IPV6_TCP:
1175 pGso->cbHdrsTotal = pHdr->u16CSumStart +
1176 ((PRTNETTCP)(((uint8_t*)pSgBuf->aSegs[0].pvSeg) + pHdr->u16CSumStart))->th_off * 4;
1177 pGso->cbHdrsSeg = pGso->cbHdrsTotal;
1178 break;
1179 case PDMNETWORKGSOTYPE_IPV4_UDP:
1180 pGso->cbHdrsTotal = (uint8_t)(pHdr->u16CSumStart + sizeof(RTNETUDP));
1181 pGso->cbHdrsSeg = pHdr->u16CSumStart;
1182 break;
1183 }
1184 /* Update GSO structure embedded into the frame */
1185 ((PPDMNETWORKGSO)pSgBuf->pvUser)->cbHdrsTotal = pGso->cbHdrsTotal;
1186 ((PPDMNETWORKGSO)pSgBuf->pvUser)->cbHdrsSeg = pGso->cbHdrsSeg;
1187 Log4(("%s vnetTransmitPendingPackets: adjusted HdrLen to %d.\n",
1188 INSTANCE(pThis), pGso->cbHdrsTotal));
1189 }
1190 Log2(("%s vnetTransmitPendingPackets: gso type=%x cbHdrsTotal=%u cbHdrsSeg=%u mss=%u off1=0x%x off2=0x%x\n",
1191 INSTANCE(pThis), pGso->u8Type, pGso->cbHdrsTotal, pGso->cbHdrsSeg, pGso->cbMaxSeg, pGso->offHdr1, pGso->offHdr2));
1192 STAM_REL_COUNTER_INC(&pThis->StatTransmitGSO);
1193 }
1194 else if (pHdr->u8Flags & VNETHDR_F_NEEDS_CSUM)
1195 {
1196 STAM_REL_COUNTER_INC(&pThis->StatTransmitCSum);
1197 /*
1198 * This is not GSO frame but checksum offloading is requested.
1199 */
1200 vnetCompleteChecksum((uint8_t*)pSgBuf->aSegs[0].pvSeg, pSgBuf->cbUsed,
1201 pHdr->u16CSumStart, pHdr->u16CSumOffset);
1202 }
1203
1204 return pThis->pDrv->pfnSendBuf(pThis->pDrv, pSgBuf, false);
1205}
1206
1207static void vnetTransmitPendingPackets(PVNETSTATE pThis, PVQUEUE pQueue, bool fOnWorkerThread)
1208{
1209 /*
1210 * Only one thread is allowed to transmit at a time, others should skip
1211 * transmission as the packets will be picked up by the transmitting
1212 * thread.
1213 */
1214 if (!ASMAtomicCmpXchgU32(&pThis->uIsTransmitting, 1, 0))
1215 return;
1216
1217 if ((pThis->VPCI.uStatus & VPCI_STATUS_DRV_OK) == 0)
1218 {
1219 Log(("%s Ignoring transmit requests from non-existent driver (status=0x%x).\n", INSTANCE(pThis), pThis->VPCI.uStatus));
1220 return;
1221 }
1222
1223 PPDMINETWORKUP pDrv = pThis->pDrv;
1224 if (pDrv)
1225 {
1226 int rc = pDrv->pfnBeginXmit(pDrv, fOnWorkerThread);
1227 Assert(rc == VINF_SUCCESS || rc == VERR_TRY_AGAIN);
1228 if (rc == VERR_TRY_AGAIN)
1229 {
1230 ASMAtomicWriteU32(&pThis->uIsTransmitting, 0);
1231 return;
1232 }
1233 }
1234
1235 unsigned int uHdrLen;
1236 if (vnetMergeableRxBuffers(pThis))
1237 uHdrLen = sizeof(VNETHDRMRX);
1238 else
1239 uHdrLen = sizeof(VNETHDR);
1240
1241 Log3(("%s vnetTransmitPendingPackets: About to transmit %d pending packets\n",
1242 INSTANCE(pThis), vringReadAvailIndex(&pThis->VPCI, &pThis->pTxQueue->VRing) - pThis->pTxQueue->uNextAvailIndex));
1243
1244 vpciSetWriteLed(&pThis->VPCI, true);
1245
1246 VQUEUEELEM elem;
1247 /*
1248 * Do not remove descriptors from available ring yet, try to allocate the
1249 * buffer first.
1250 */
1251 while (vqueuePeek(&pThis->VPCI, pQueue, &elem))
1252 {
1253 unsigned int uOffset = 0;
1254 if (elem.nOut < 2 || elem.aSegsOut[0].cb != uHdrLen)
1255 {
1256 Log(("%s vnetQueueTransmit: The first segment is not the header! (%u < 2 || %u != %u).\n",
1257 INSTANCE(pThis), elem.nOut, elem.aSegsOut[0].cb, uHdrLen));
1258 break; /* For now we simply ignore the header, but it must be there anyway! */
1259 }
1260 else
1261 {
1262 unsigned int uSize = 0;
1263 STAM_PROFILE_ADV_START(&pThis->StatTransmit, a);
1264 /* Compute total frame size. */
1265 for (unsigned int i = 1; i < elem.nOut && uSize < VNET_MAX_FRAME_SIZE; i++)
1266 uSize += elem.aSegsOut[i].cb;
1267 Log5(("%s vnetTransmitPendingPackets: complete frame is %u bytes.\n", INSTANCE(pThis), uSize));
1268 Assert(uSize <= VNET_MAX_FRAME_SIZE);
1269 /* Truncate oversized frames. */
1270 if (uSize > VNET_MAX_FRAME_SIZE)
1271 uSize = VNET_MAX_FRAME_SIZE;
1272 if (pThis->pDrv)
1273 {
1274 VNETHDR Hdr;
1275 PDMNETWORKGSO Gso, *pGso;
1276
1277 PDMDevHlpPhysRead(pThis->VPCI.CTX_SUFF(pDevIns), elem.aSegsOut[0].addr,
1278 &Hdr, sizeof(Hdr));
1279
1280 STAM_REL_COUNTER_INC(&pThis->StatTransmitPackets);
1281
1282 STAM_PROFILE_START(&pThis->StatTransmitSend, a);
1283
1284 pGso = vnetSetupGsoCtx(&Gso, &Hdr);
1285 /** @todo Optimize away the extra copying! (lazy bird) */
1286 PPDMSCATTERGATHER pSgBuf;
1287 int rc = pThis->pDrv->pfnAllocBuf(pThis->pDrv, uSize, pGso, &pSgBuf);
1288 if (RT_SUCCESS(rc))
1289 {
1290 Assert(pSgBuf->cSegs == 1);
1291 pSgBuf->cbUsed = uSize;
1292 /* Assemble a complete frame. */
1293 for (unsigned int i = 1; i < elem.nOut && uSize > 0; i++)
1294 {
1295 unsigned int cbSegment = RT_MIN(uSize, elem.aSegsOut[i].cb);
1296 PDMDevHlpPhysRead(pThis->VPCI.CTX_SUFF(pDevIns), elem.aSegsOut[i].addr,
1297 ((uint8_t*)pSgBuf->aSegs[0].pvSeg) + uOffset,
1298 cbSegment);
1299 uOffset += cbSegment;
1300 uSize -= cbSegment;
1301 }
1302 rc = vnetTransmitFrame(pThis, pSgBuf, pGso, &Hdr);
1303 }
1304 else
1305 {
1306 Log4(("virtio-net: failed to allocate SG buffer: size=%u rc=%Rrc\n", uSize, rc));
1307 STAM_PROFILE_STOP(&pThis->StatTransmitSend, a);
1308 STAM_PROFILE_ADV_STOP(&pThis->StatTransmit, a);
1309 /* Stop trying to fetch TX descriptors until we get more bandwidth. */
1310 break;
1311 }
1312
1313 STAM_PROFILE_STOP(&pThis->StatTransmitSend, a);
1314 STAM_REL_COUNTER_ADD(&pThis->StatTransmitBytes, uOffset);
1315 }
1316 }
1317 /* Remove this descriptor chain from the available ring */
1318 vqueueSkip(&pThis->VPCI, pQueue);
1319 vqueuePut(&pThis->VPCI, pQueue, &elem, sizeof(VNETHDR) + uOffset);
1320 vqueueSync(&pThis->VPCI, pQueue);
1321 STAM_PROFILE_ADV_STOP(&pThis->StatTransmit, a);
1322 }
1323 vpciSetWriteLed(&pThis->VPCI, false);
1324
1325 if (pDrv)
1326 pDrv->pfnEndXmit(pDrv);
1327 ASMAtomicWriteU32(&pThis->uIsTransmitting, 0);
1328}
1329
1330/**
1331 * @interface_method_impl{PDMINETWORKDOWN,pfnXmitPending}
1332 */
1333static DECLCALLBACK(void) vnetNetworkDown_XmitPending(PPDMINETWORKDOWN pInterface)
1334{
1335 PVNETSTATE pThis = RT_FROM_MEMBER(pInterface, VNETSTATE, INetworkDown);
1336 vnetTransmitPendingPackets(pThis, pThis->pTxQueue, false /*fOnWorkerThread*/);
1337}
1338
1339#ifdef VNET_TX_DELAY
1340
1341static DECLCALLBACK(void) vnetQueueTransmit(void *pvState, PVQUEUE pQueue)
1342{
1343 PVNETSTATE pThis = (PVNETSTATE)pvState;
1344
1345 if (TMTimerIsActive(pThis->CTX_SUFF(pTxTimer)))
1346 {
1347 TMTimerStop(pThis->CTX_SUFF(pTxTimer));
1348 Log3(("%s vnetQueueTransmit: Got kicked with notification disabled, re-enable notification and flush TX queue\n", INSTANCE(pThis)));
1349 vnetTransmitPendingPackets(pThis, pQueue, false /*fOnWorkerThread*/);
1350 if (RT_FAILURE(vnetCsEnter(pThis, VERR_SEM_BUSY)))
1351 LogRel(("vnetQueueTransmit: Failed to enter critical section!/n"));
1352 else
1353 {
1354 vringSetNotification(&pThis->VPCI, &pThis->pTxQueue->VRing, true);
1355 vnetCsLeave(pThis);
1356 }
1357 }
1358 else
1359 {
1360 if (RT_FAILURE(vnetCsEnter(pThis, VERR_SEM_BUSY)))
1361 LogRel(("vnetQueueTransmit: Failed to enter critical section!/n"));
1362 else
1363 {
1364 vringSetNotification(&pThis->VPCI, &pThis->pTxQueue->VRing, false);
1365 TMTimerSetMicro(pThis->CTX_SUFF(pTxTimer), VNET_TX_DELAY);
1366 pThis->u64NanoTS = RTTimeNanoTS();
1367 vnetCsLeave(pThis);
1368 }
1369 }
1370}
1371
1372/**
1373 * @callback_method_impl{FNTMTIMERDEV, Transmit Delay Timer handler.}
1374 */
1375static DECLCALLBACK(void) vnetTxTimer(PPDMDEVINS pDevIns, PTMTIMER pTimer, void *pvUser)
1376{
1377 RT_NOREF(pDevIns, pTimer);
1378 PVNETSTATE pThis = (PVNETSTATE)pvUser;
1379
1380 uint32_t u32MicroDiff = (uint32_t)((RTTimeNanoTS() - pThis->u64NanoTS)/1000);
1381 if (u32MicroDiff < pThis->u32MinDiff)
1382 pThis->u32MinDiff = u32MicroDiff;
1383 if (u32MicroDiff > pThis->u32MaxDiff)
1384 pThis->u32MaxDiff = u32MicroDiff;
1385 pThis->u32AvgDiff = (pThis->u32AvgDiff * pThis->u32i + u32MicroDiff) / (pThis->u32i + 1);
1386 pThis->u32i++;
1387 Log3(("vnetTxTimer: Expired, diff %9d usec, avg %9d usec, min %9d usec, max %9d usec\n",
1388 u32MicroDiff, pThis->u32AvgDiff, pThis->u32MinDiff, pThis->u32MaxDiff));
1389
1390// Log3(("%s vnetTxTimer: Expired\n", INSTANCE(pThis)));
1391 vnetTransmitPendingPackets(pThis, pThis->pTxQueue, false /*fOnWorkerThread*/);
1392 if (RT_FAILURE(vnetCsEnter(pThis, VERR_SEM_BUSY)))
1393 {
1394 LogRel(("vnetTxTimer: Failed to enter critical section!/n"));
1395 return;
1396 }
1397 vringSetNotification(&pThis->VPCI, &pThis->pTxQueue->VRing, true);
1398 vnetCsLeave(pThis);
1399}
1400
1401#else /* !VNET_TX_DELAY */
1402
1403static DECLCALLBACK(void) vnetQueueTransmit(void *pvState, PVQUEUE pQueue)
1404{
1405 PVNETSTATE pThis = (PVNETSTATE)pvState;
1406
1407 vnetTransmitPendingPackets(pThis, pQueue, false /*fOnWorkerThread*/);
1408}
1409
1410#endif /* !VNET_TX_DELAY */
1411
1412static uint8_t vnetControlRx(PVNETSTATE pThis, PVNETCTLHDR pCtlHdr, PVQUEUEELEM pElem)
1413{
1414 uint8_t u8Ack = VNET_OK;
1415 uint8_t fOn, fDrvWasPromisc = pThis->fPromiscuous | pThis->fAllMulti;
1416 PDMDevHlpPhysRead(pThis->VPCI.CTX_SUFF(pDevIns),
1417 pElem->aSegsOut[1].addr,
1418 &fOn, sizeof(fOn));
1419 Log(("%s vnetControlRx: uCommand=%u fOn=%u\n", INSTANCE(pThis), pCtlHdr->u8Command, fOn));
1420 switch (pCtlHdr->u8Command)
1421 {
1422 case VNET_CTRL_CMD_RX_MODE_PROMISC:
1423 pThis->fPromiscuous = !!fOn;
1424 break;
1425 case VNET_CTRL_CMD_RX_MODE_ALLMULTI:
1426 pThis->fAllMulti = !!fOn;
1427 break;
1428 default:
1429 u8Ack = VNET_ERROR;
1430 }
1431 if (fDrvWasPromisc != (pThis->fPromiscuous | pThis->fAllMulti) && pThis->pDrv)
1432 pThis->pDrv->pfnSetPromiscuousMode(pThis->pDrv,
1433 (pThis->fPromiscuous | pThis->fAllMulti));
1434
1435 return u8Ack;
1436}
1437
1438static uint8_t vnetControlMac(PVNETSTATE pThis, PVNETCTLHDR pCtlHdr, PVQUEUEELEM pElem)
1439{
1440 uint32_t nMacs = 0;
1441
1442 if (pCtlHdr->u8Command != VNET_CTRL_CMD_MAC_TABLE_SET
1443 || pElem->nOut != 3
1444 || pElem->aSegsOut[1].cb < sizeof(nMacs)
1445 || pElem->aSegsOut[2].cb < sizeof(nMacs))
1446 {
1447 Log(("%s vnetControlMac: Segment layout is wrong (u8Command=%u nOut=%u cb1=%u cb2=%u)\n",
1448 INSTANCE(pThis), pCtlHdr->u8Command, pElem->nOut, pElem->aSegsOut[1].cb, pElem->aSegsOut[2].cb));
1449 return VNET_ERROR;
1450 }
1451
1452 /* Load unicast addresses */
1453 PDMDevHlpPhysRead(pThis->VPCI.CTX_SUFF(pDevIns),
1454 pElem->aSegsOut[1].addr,
1455 &nMacs, sizeof(nMacs));
1456
1457 if (pElem->aSegsOut[1].cb < nMacs * sizeof(RTMAC) + sizeof(nMacs))
1458 {
1459 Log(("%s vnetControlMac: The unicast mac segment is too small (nMacs=%u cb=%u)\n",
1460 INSTANCE(pThis), nMacs, pElem->aSegsOut[1].cb));
1461 return VNET_ERROR;
1462 }
1463
1464 if (nMacs > VNET_MAC_FILTER_LEN)
1465 {
1466 Log(("%s vnetControlMac: MAC table is too big, have to use promiscuous mode (nMacs=%u)\n", INSTANCE(pThis), nMacs));
1467 pThis->fPromiscuous = true;
1468 }
1469 else
1470 {
1471 if (nMacs)
1472 PDMDevHlpPhysRead(pThis->VPCI.CTX_SUFF(pDevIns),
1473 pElem->aSegsOut[1].addr + sizeof(nMacs),
1474 pThis->aMacFilter, nMacs * sizeof(RTMAC));
1475 pThis->nMacFilterEntries = nMacs;
1476#ifdef DEBUG
1477 Log(("%s vnetControlMac: unicast macs:\n", INSTANCE(pThis)));
1478 for(unsigned i = 0; i < nMacs; i++)
1479 Log((" %RTmac\n", &pThis->aMacFilter[i]));
1480#endif /* DEBUG */
1481 }
1482
1483 /* Load multicast addresses */
1484 PDMDevHlpPhysRead(pThis->VPCI.CTX_SUFF(pDevIns),
1485 pElem->aSegsOut[2].addr,
1486 &nMacs, sizeof(nMacs));
1487
1488 if (pElem->aSegsOut[2].cb < nMacs * sizeof(RTMAC) + sizeof(nMacs))
1489 {
1490 Log(("%s vnetControlMac: The multicast mac segment is too small (nMacs=%u cb=%u)\n",
1491 INSTANCE(pThis), nMacs, pElem->aSegsOut[2].cb));
1492 return VNET_ERROR;
1493 }
1494
1495 if (nMacs > VNET_MAC_FILTER_LEN - pThis->nMacFilterEntries)
1496 {
1497 Log(("%s vnetControlMac: MAC table is too big, have to use allmulti mode (nMacs=%u)\n", INSTANCE(pThis), nMacs));
1498 pThis->fAllMulti = true;
1499 }
1500 else
1501 {
1502 if (nMacs)
1503 PDMDevHlpPhysRead(pThis->VPCI.CTX_SUFF(pDevIns),
1504 pElem->aSegsOut[2].addr + sizeof(nMacs),
1505 &pThis->aMacFilter[pThis->nMacFilterEntries],
1506 nMacs * sizeof(RTMAC));
1507#ifdef DEBUG
1508 Log(("%s vnetControlMac: multicast macs:\n", INSTANCE(pThis)));
1509 for(unsigned i = 0; i < nMacs; i++)
1510 Log((" %RTmac\n",
1511 &pThis->aMacFilter[i+pThis->nMacFilterEntries]));
1512#endif /* DEBUG */
1513 pThis->nMacFilterEntries += nMacs;
1514 }
1515
1516 return VNET_OK;
1517}
1518
1519static uint8_t vnetControlVlan(PVNETSTATE pThis, PVNETCTLHDR pCtlHdr, PVQUEUEELEM pElem)
1520{
1521 uint8_t u8Ack = VNET_OK;
1522 uint16_t u16Vid;
1523
1524 if (pElem->nOut != 2 || pElem->aSegsOut[1].cb != sizeof(u16Vid))
1525 {
1526 Log(("%s vnetControlVlan: Segment layout is wrong (u8Command=%u nOut=%u cb=%u)\n",
1527 INSTANCE(pThis), pCtlHdr->u8Command, pElem->nOut, pElem->aSegsOut[1].cb));
1528 return VNET_ERROR;
1529 }
1530
1531 PDMDevHlpPhysRead(pThis->VPCI.CTX_SUFF(pDevIns),
1532 pElem->aSegsOut[1].addr,
1533 &u16Vid, sizeof(u16Vid));
1534
1535 if (u16Vid >= VNET_MAX_VID)
1536 {
1537 Log(("%s vnetControlVlan: VLAN ID is out of range (VID=%u)\n", INSTANCE(pThis), u16Vid));
1538 return VNET_ERROR;
1539 }
1540
1541 Log(("%s vnetControlVlan: uCommand=%u VID=%u\n", INSTANCE(pThis), pCtlHdr->u8Command, u16Vid));
1542
1543 switch (pCtlHdr->u8Command)
1544 {
1545 case VNET_CTRL_CMD_VLAN_ADD:
1546 ASMBitSet(pThis->aVlanFilter, u16Vid);
1547 break;
1548 case VNET_CTRL_CMD_VLAN_DEL:
1549 ASMBitClear(pThis->aVlanFilter, u16Vid);
1550 break;
1551 default:
1552 u8Ack = VNET_ERROR;
1553 }
1554
1555 return u8Ack;
1556}
1557
1558
1559static DECLCALLBACK(void) vnetQueueControl(void *pvState, PVQUEUE pQueue)
1560{
1561 PVNETSTATE pThis = (PVNETSTATE)pvState;
1562 uint8_t u8Ack;
1563 VQUEUEELEM elem;
1564 while (vqueueGet(&pThis->VPCI, pQueue, &elem))
1565 {
1566 if (elem.nOut < 1 || elem.aSegsOut[0].cb < sizeof(VNETCTLHDR))
1567 {
1568 Log(("%s vnetQueueControl: The first 'out' segment is not the header! (%u < 1 || %u < %u).\n",
1569 INSTANCE(pThis), elem.nOut, elem.aSegsOut[0].cb,sizeof(VNETCTLHDR)));
1570 break; /* Skip the element and hope the next one is good. */
1571 }
1572 else if ( elem.nIn < 1
1573 || elem.aSegsIn[elem.nIn - 1].cb < sizeof(VNETCTLACK))
1574 {
1575 Log(("%s vnetQueueControl: The last 'in' segment is too small to hold the acknowledge! (%u < 1 || %u < %u).\n",
1576 INSTANCE(pThis), elem.nIn, elem.aSegsIn[elem.nIn - 1].cb, sizeof(VNETCTLACK)));
1577 break; /* Skip the element and hope the next one is good. */
1578 }
1579 else
1580 {
1581 VNETCTLHDR CtlHdr;
1582 PDMDevHlpPhysRead(pThis->VPCI.CTX_SUFF(pDevIns),
1583 elem.aSegsOut[0].addr,
1584 &CtlHdr, sizeof(CtlHdr));
1585 switch (CtlHdr.u8Class)
1586 {
1587 case VNET_CTRL_CLS_RX_MODE:
1588 u8Ack = vnetControlRx(pThis, &CtlHdr, &elem);
1589 break;
1590 case VNET_CTRL_CLS_MAC:
1591 u8Ack = vnetControlMac(pThis, &CtlHdr, &elem);
1592 break;
1593 case VNET_CTRL_CLS_VLAN:
1594 u8Ack = vnetControlVlan(pThis, &CtlHdr, &elem);
1595 break;
1596 default:
1597 u8Ack = VNET_ERROR;
1598 }
1599 Log(("%s Processed control message %u, ack=%u.\n", INSTANCE(pThis), CtlHdr.u8Class, u8Ack));
1600 PDMDevHlpPCIPhysWrite(pThis->VPCI.CTX_SUFF(pDevIns),
1601 elem.aSegsIn[elem.nIn - 1].addr,
1602 &u8Ack, sizeof(u8Ack));
1603 }
1604 vqueuePut(&pThis->VPCI, pQueue, &elem, sizeof(u8Ack));
1605 vqueueSync(&pThis->VPCI, pQueue);
1606 }
1607}
1608
1609
1610/* -=-=-=-=- Saved state -=-=-=-=- */
1611
1612/**
1613 * Saves the configuration.
1614 *
1615 * @param pThis The VNET state.
1616 * @param pSSM The handle to the saved state.
1617 */
1618static void vnetSaveConfig(PVNETSTATE pThis, PSSMHANDLE pSSM)
1619{
1620 SSMR3PutMem(pSSM, &pThis->macConfigured, sizeof(pThis->macConfigured));
1621}
1622
1623
1624/**
1625 * @callback_method_impl{FNSSMDEVLIVEEXEC}
1626 */
1627static DECLCALLBACK(int) vnetLiveExec(PPDMDEVINS pDevIns, PSSMHANDLE pSSM, uint32_t uPass)
1628{
1629 RT_NOREF(uPass);
1630 PVNETSTATE pThis = PDMINS_2_DATA(pDevIns, PVNETSTATE);
1631 vnetSaveConfig(pThis, pSSM);
1632 return VINF_SSM_DONT_CALL_AGAIN;
1633}
1634
1635
1636/**
1637 * @callback_method_impl{FNSSMDEVSAVEPREP}
1638 */
1639static DECLCALLBACK(int) vnetSavePrep(PPDMDEVINS pDevIns, PSSMHANDLE pSSM)
1640{
1641 RT_NOREF(pSSM);
1642 PVNETSTATE pThis = PDMINS_2_DATA(pDevIns, PVNETSTATE);
1643
1644 int rc = vnetCsRxEnter(pThis, VERR_SEM_BUSY);
1645 if (RT_UNLIKELY(rc != VINF_SUCCESS))
1646 return rc;
1647 vnetCsRxLeave(pThis);
1648 return VINF_SUCCESS;
1649}
1650
1651
1652/**
1653 * @callback_method_impl{FNSSMDEVSAVEEXEC}
1654 */
1655static DECLCALLBACK(int) vnetSaveExec(PPDMDEVINS pDevIns, PSSMHANDLE pSSM)
1656{
1657 PVNETSTATE pThis = PDMINS_2_DATA(pDevIns, PVNETSTATE);
1658
1659 /* Save config first */
1660 vnetSaveConfig(pThis, pSSM);
1661
1662 /* Save the common part */
1663 int rc = vpciSaveExec(&pThis->VPCI, pSSM);
1664 AssertRCReturn(rc, rc);
1665 /* Save device-specific part */
1666 rc = SSMR3PutMem( pSSM, pThis->config.mac.au8, sizeof(pThis->config.mac));
1667 AssertRCReturn(rc, rc);
1668 rc = SSMR3PutBool(pSSM, pThis->fPromiscuous);
1669 AssertRCReturn(rc, rc);
1670 rc = SSMR3PutBool(pSSM, pThis->fAllMulti);
1671 AssertRCReturn(rc, rc);
1672 rc = SSMR3PutU32( pSSM, pThis->nMacFilterEntries);
1673 AssertRCReturn(rc, rc);
1674 rc = SSMR3PutMem( pSSM, pThis->aMacFilter,
1675 pThis->nMacFilterEntries * sizeof(RTMAC));
1676 AssertRCReturn(rc, rc);
1677 rc = SSMR3PutMem( pSSM, pThis->aVlanFilter, sizeof(pThis->aVlanFilter));
1678 AssertRCReturn(rc, rc);
1679 Log(("%s State has been saved\n", INSTANCE(pThis)));
1680 return VINF_SUCCESS;
1681}
1682
1683
1684/**
1685 * @callback_method_impl{FNSSMDEVLOADPREP, Serializes the receive thread, it may
1686 * be working inside the critsect. }
1687 */
1688static DECLCALLBACK(int) vnetLoadPrep(PPDMDEVINS pDevIns, PSSMHANDLE pSSM)
1689{
1690 RT_NOREF(pSSM);
1691 PVNETSTATE pThis = PDMINS_2_DATA(pDevIns, PVNETSTATE);
1692
1693 int rc = vnetCsRxEnter(pThis, VERR_SEM_BUSY);
1694 if (RT_UNLIKELY(rc != VINF_SUCCESS))
1695 return rc;
1696 vnetCsRxLeave(pThis);
1697 return VINF_SUCCESS;
1698}
1699
1700
1701/**
1702 * @callback_method_impl{FNSSMDEVLOADEXEC}
1703 */
1704static DECLCALLBACK(int) vnetLoadExec(PPDMDEVINS pDevIns, PSSMHANDLE pSSM, uint32_t uVersion, uint32_t uPass)
1705{
1706 PVNETSTATE pThis = PDMINS_2_DATA(pDevIns, PVNETSTATE);
1707 int rc;
1708
1709 /* config checks */
1710 RTMAC macConfigured;
1711 rc = SSMR3GetMem(pSSM, &macConfigured, sizeof(macConfigured));
1712 AssertRCReturn(rc, rc);
1713 if (memcmp(&macConfigured, &pThis->macConfigured, sizeof(macConfigured))
1714 && (uPass == 0 || !PDMDevHlpVMTeleportedAndNotFullyResumedYet(pDevIns)))
1715 LogRel(("%s: The mac address differs: config=%RTmac saved=%RTmac\n", INSTANCE(pThis), &pThis->macConfigured, &macConfigured));
1716
1717 rc = vpciLoadExec(&pThis->VPCI, pSSM, uVersion, uPass, VNET_N_QUEUES);
1718 AssertRCReturn(rc, rc);
1719
1720 if (uPass == SSM_PASS_FINAL)
1721 {
1722 rc = SSMR3GetMem( pSSM, pThis->config.mac.au8,
1723 sizeof(pThis->config.mac));
1724 AssertRCReturn(rc, rc);
1725
1726 if (uVersion > VIRTIO_SAVEDSTATE_VERSION_3_1_BETA1)
1727 {
1728 rc = SSMR3GetBool(pSSM, &pThis->fPromiscuous);
1729 AssertRCReturn(rc, rc);
1730 rc = SSMR3GetBool(pSSM, &pThis->fAllMulti);
1731 AssertRCReturn(rc, rc);
1732 rc = SSMR3GetU32(pSSM, &pThis->nMacFilterEntries);
1733 AssertRCReturn(rc, rc);
1734 rc = SSMR3GetMem(pSSM, pThis->aMacFilter,
1735 pThis->nMacFilterEntries * sizeof(RTMAC));
1736 AssertRCReturn(rc, rc);
1737 /* Clear the rest. */
1738 if (pThis->nMacFilterEntries < VNET_MAC_FILTER_LEN)
1739 memset(&pThis->aMacFilter[pThis->nMacFilterEntries],
1740 0,
1741 (VNET_MAC_FILTER_LEN - pThis->nMacFilterEntries)
1742 * sizeof(RTMAC));
1743 rc = SSMR3GetMem(pSSM, pThis->aVlanFilter,
1744 sizeof(pThis->aVlanFilter));
1745 AssertRCReturn(rc, rc);
1746 }
1747 else
1748 {
1749 pThis->fPromiscuous = true;
1750 pThis->fAllMulti = false;
1751 pThis->nMacFilterEntries = 0;
1752 memset(pThis->aMacFilter, 0, VNET_MAC_FILTER_LEN * sizeof(RTMAC));
1753 memset(pThis->aVlanFilter, 0, sizeof(pThis->aVlanFilter));
1754 if (pThis->pDrv)
1755 pThis->pDrv->pfnSetPromiscuousMode(pThis->pDrv, true);
1756 }
1757 }
1758
1759 return rc;
1760}
1761
1762
1763/**
1764 * @callback_method_impl{FNSSMDEVLOADDONE, Link status adjustments after
1765 * loading.}
1766 */
1767static DECLCALLBACK(int) vnetLoadDone(PPDMDEVINS pDevIns, PSSMHANDLE pSSM)
1768{
1769 RT_NOREF(pSSM);
1770 PVNETSTATE pThis = PDMINS_2_DATA(pDevIns, PVNETSTATE);
1771
1772 if (pThis->pDrv)
1773 pThis->pDrv->pfnSetPromiscuousMode(pThis->pDrv,
1774 (pThis->fPromiscuous | pThis->fAllMulti));
1775 /*
1776 * Indicate link down to the guest OS that all network connections have
1777 * been lost, unless we've been teleported here.
1778 */
1779 if (!PDMDevHlpVMTeleportedAndNotFullyResumedYet(pDevIns))
1780 vnetTempLinkDown(pThis);
1781
1782 return VINF_SUCCESS;
1783}
1784
1785
1786/* -=-=-=-=- PCI Device -=-=-=-=- */
1787
1788/**
1789 * @callback_method_impl{FNPCIIOREGIONMAP}
1790 */
1791static DECLCALLBACK(int) vnetMap(PPDMDEVINS pDevIns, PPDMPCIDEV pPciDev, uint32_t iRegion,
1792 RTGCPHYS GCPhysAddress, RTGCPHYS cb, PCIADDRESSSPACE enmType)
1793{
1794 RT_NOREF(pPciDev, iRegion);
1795 PVNETSTATE pThis = PDMINS_2_DATA(pDevIns, PVNETSTATE);
1796 int rc;
1797
1798 if (enmType != PCI_ADDRESS_SPACE_IO)
1799 {
1800 /* We should never get here */
1801 AssertMsgFailed(("Invalid PCI address space param in map callback"));
1802 return VERR_INTERNAL_ERROR;
1803 }
1804
1805 pThis->VPCI.IOPortBase = (RTIOPORT)GCPhysAddress;
1806 rc = PDMDevHlpIOPortRegister(pDevIns, pThis->VPCI.IOPortBase,
1807 cb, 0, vnetIOPortOut, vnetIOPortIn,
1808 NULL, NULL, "VirtioNet");
1809#ifdef VNET_GC_SUPPORT
1810 AssertRCReturn(rc, rc);
1811 rc = PDMDevHlpIOPortRegisterR0(pDevIns, pThis->VPCI.IOPortBase,
1812 cb, 0, "vnetIOPortOut", "vnetIOPortIn",
1813 NULL, NULL, "VirtioNet");
1814 AssertRCReturn(rc, rc);
1815 rc = PDMDevHlpIOPortRegisterRC(pDevIns, pThis->VPCI.IOPortBase,
1816 cb, 0, "vnetIOPortOut", "vnetIOPortIn",
1817 NULL, NULL, "VirtioNet");
1818#endif
1819 AssertRC(rc);
1820 return rc;
1821}
1822
1823
1824/* -=-=-=-=- PDMDEVREG -=-=-=-=- */
1825
1826/**
1827 * @interface_method_impl{PDMDEVREG,pfnDetach}
1828 */
1829static DECLCALLBACK(void) vnetDetach(PPDMDEVINS pDevIns, unsigned iLUN, uint32_t fFlags)
1830{
1831 RT_NOREF(fFlags);
1832 PVNETSTATE pThis = PDMINS_2_DATA(pDevIns, PVNETSTATE);
1833 Log(("%s vnetDetach:\n", INSTANCE(pThis)));
1834
1835 AssertLogRelReturnVoid(iLUN == 0);
1836
1837 int rc = vnetCsEnter(pThis, VERR_SEM_BUSY);
1838 if (RT_FAILURE(rc))
1839 {
1840 LogRel(("vnetDetach failed to enter critical section!\n"));
1841 return;
1842 }
1843
1844 /*
1845 * Zero some important members.
1846 */
1847 pThis->pDrvBase = NULL;
1848 pThis->pDrv = NULL;
1849
1850 vnetCsLeave(pThis);
1851}
1852
1853
1854/**
1855 * @interface_method_impl{PDMDEVREG,pfnAttach}
1856 */
1857static DECLCALLBACK(int) vnetAttach(PPDMDEVINS pDevIns, unsigned iLUN, uint32_t fFlags)
1858{
1859 RT_NOREF(fFlags);
1860 PVNETSTATE pThis = PDMINS_2_DATA(pDevIns, PVNETSTATE);
1861 LogFlow(("%s vnetAttach:\n", INSTANCE(pThis)));
1862
1863 AssertLogRelReturn(iLUN == 0, VERR_PDM_NO_SUCH_LUN);
1864
1865 int rc = vnetCsEnter(pThis, VERR_SEM_BUSY);
1866 if (RT_FAILURE(rc))
1867 {
1868 LogRel(("vnetAttach failed to enter critical section!\n"));
1869 return rc;
1870 }
1871
1872 /*
1873 * Attach the driver.
1874 */
1875 rc = PDMDevHlpDriverAttach(pDevIns, 0, &pThis->VPCI.IBase, &pThis->pDrvBase, "Network Port");
1876 if (RT_SUCCESS(rc))
1877 {
1878 if (rc == VINF_NAT_DNS)
1879 {
1880#ifdef RT_OS_LINUX
1881 PDMDevHlpVMSetRuntimeError(pDevIns, 0 /*fFlags*/, "NoDNSforNAT",
1882 N_("A Domain Name Server (DNS) for NAT networking could not be determined. Please check your /etc/resolv.conf for <tt>nameserver</tt> entries. Either add one manually (<i>man resolv.conf</i>) or ensure that your host is correctly connected to an ISP. If you ignore this warning the guest will not be able to perform nameserver lookups and it will probably observe delays if trying so"));
1883#else
1884 PDMDevHlpVMSetRuntimeError(pDevIns, 0 /*fFlags*/, "NoDNSforNAT",
1885 N_("A Domain Name Server (DNS) for NAT networking could not be determined. Ensure that your host is correctly connected to an ISP. If you ignore this warning the guest will not be able to perform nameserver lookups and it will probably observe delays if trying so"));
1886#endif
1887 }
1888 pThis->pDrv = PDMIBASE_QUERY_INTERFACE(pThis->pDrvBase, PDMINETWORKUP);
1889 AssertMsgStmt(pThis->pDrv, ("Failed to obtain the PDMINETWORKUP interface!\n"),
1890 rc = VERR_PDM_MISSING_INTERFACE_BELOW);
1891 }
1892 else if ( rc == VERR_PDM_NO_ATTACHED_DRIVER
1893 || rc == VERR_PDM_CFG_MISSING_DRIVER_NAME)
1894 {
1895 /* This should never happen because this function is not called
1896 * if there is no driver to attach! */
1897 Log(("%s No attached driver!\n", INSTANCE(pThis)));
1898 }
1899
1900 /*
1901 * Temporary set the link down if it was up so that the guest
1902 * will know that we have change the configuration of the
1903 * network card
1904 */
1905 if (RT_SUCCESS(rc))
1906 vnetTempLinkDown(pThis);
1907
1908 vnetCsLeave(pThis);
1909 return rc;
1910
1911}
1912
1913
1914/**
1915 * @interface_method_impl{PDMDEVREG,pfnSuspend}
1916 */
1917static DECLCALLBACK(void) vnetSuspend(PPDMDEVINS pDevIns)
1918{
1919 /* Poke thread waiting for buffer space. */
1920 vnetWakeupReceive(pDevIns);
1921}
1922
1923
1924/**
1925 * @interface_method_impl{PDMDEVREG,pfnPowerOff}
1926 */
1927static DECLCALLBACK(void) vnetPowerOff(PPDMDEVINS pDevIns)
1928{
1929 /* Poke thread waiting for buffer space. */
1930 vnetWakeupReceive(pDevIns);
1931}
1932
1933
1934/**
1935 * @interface_method_impl{PDMDEVREG,pfnRelocate}
1936 */
1937static DECLCALLBACK(void) vnetRelocate(PPDMDEVINS pDevIns, RTGCINTPTR offDelta)
1938{
1939 PVNETSTATE pThis = PDMINS_2_DATA(pDevIns, PVNETSTATE);
1940 vpciRelocate(pDevIns, offDelta);
1941 pThis->pCanRxQueueRC = PDMQueueRCPtr(pThis->pCanRxQueueR3);
1942#ifdef VNET_TX_DELAY
1943 pThis->pTxTimerRC = TMTimerRCPtr(pThis->pTxTimerR3);
1944#endif /* VNET_TX_DELAY */
1945 // TBD
1946}
1947
1948
1949/**
1950 * @interface_method_impl{PDMDEVREG,pfnDestruct}
1951 */
1952static DECLCALLBACK(int) vnetDestruct(PPDMDEVINS pDevIns)
1953{
1954 PVNETSTATE pThis = PDMINS_2_DATA(pDevIns, PVNETSTATE);
1955 PDMDEV_CHECK_VERSIONS_RETURN_QUIET(pDevIns);
1956
1957 LogRel(("TxTimer stats (avg/min/max): %7d usec %7d usec %7d usec\n",
1958 pThis->u32AvgDiff, pThis->u32MinDiff, pThis->u32MaxDiff));
1959 Log(("%s Destroying instance\n", INSTANCE(pThis)));
1960 if (pThis->hEventMoreRxDescAvail != NIL_RTSEMEVENT)
1961 {
1962 RTSemEventSignal(pThis->hEventMoreRxDescAvail);
1963 RTSemEventDestroy(pThis->hEventMoreRxDescAvail);
1964 pThis->hEventMoreRxDescAvail = NIL_RTSEMEVENT;
1965 }
1966
1967 // if (PDMCritSectIsInitialized(&pThis->csRx))
1968 // PDMR3CritSectDelete(&pThis->csRx);
1969
1970 return vpciDestruct(&pThis->VPCI);
1971}
1972
1973
1974/**
1975 * @interface_method_impl{PDMDEVREG,pfnConstruct}
1976 */
1977static DECLCALLBACK(int) vnetConstruct(PPDMDEVINS pDevIns, int iInstance, PCFGMNODE pCfg)
1978{
1979 PVNETSTATE pThis = PDMINS_2_DATA(pDevIns, PVNETSTATE);
1980 int rc;
1981 PDMDEV_CHECK_VERSIONS_RETURN(pDevIns);
1982
1983 /* Initialize the instance data suffiencently for the destructor not to blow up. */
1984 pThis->hEventMoreRxDescAvail = NIL_RTSEMEVENT;
1985
1986 /* Do our own locking. */
1987 rc = PDMDevHlpSetDeviceCritSect(pDevIns, PDMDevHlpCritSectGetNop(pDevIns));
1988 AssertRCReturn(rc, rc);
1989
1990 /* Initialize PCI part. */
1991 pThis->VPCI.IBase.pfnQueryInterface = vnetQueryInterface;
1992 rc = vpciConstruct(pDevIns, &pThis->VPCI, iInstance,
1993 VNET_NAME_FMT, VIRTIO_NET_ID,
1994 VNET_PCI_CLASS, VNET_N_QUEUES);
1995 pThis->pRxQueue = vpciAddQueue(&pThis->VPCI, 256, vnetQueueReceive, "RX ");
1996 pThis->pTxQueue = vpciAddQueue(&pThis->VPCI, 256, vnetQueueTransmit, "TX ");
1997 pThis->pCtlQueue = vpciAddQueue(&pThis->VPCI, 16, vnetQueueControl, "CTL");
1998
1999 Log(("%s Constructing new instance\n", INSTANCE(pThis)));
2000
2001 /*
2002 * Validate configuration.
2003 */
2004 if (!CFGMR3AreValuesValid(pCfg, "MAC\0" "CableConnected\0" "LineSpeed\0" "LinkUpDelay\0"))
2005 return PDMDEV_SET_ERROR(pDevIns, VERR_PDM_DEVINS_UNKNOWN_CFG_VALUES,
2006 N_("Invalid configuration for VirtioNet device"));
2007
2008 /* Get config params */
2009 rc = CFGMR3QueryBytes(pCfg, "MAC", pThis->macConfigured.au8,
2010 sizeof(pThis->macConfigured));
2011 if (RT_FAILURE(rc))
2012 return PDMDEV_SET_ERROR(pDevIns, rc,
2013 N_("Configuration error: Failed to get MAC address"));
2014 rc = CFGMR3QueryBool(pCfg, "CableConnected", &pThis->fCableConnected);
2015 if (RT_FAILURE(rc))
2016 return PDMDEV_SET_ERROR(pDevIns, rc,
2017 N_("Configuration error: Failed to get the value of 'CableConnected'"));
2018 rc = CFGMR3QueryU32Def(pCfg, "LinkUpDelay", (uint32_t*)&pThis->cMsLinkUpDelay, 5000); /* ms */
2019 if (RT_FAILURE(rc))
2020 return PDMDEV_SET_ERROR(pDevIns, rc,
2021 N_("Configuration error: Failed to get the value of 'LinkUpDelay'"));
2022 Assert(pThis->cMsLinkUpDelay <= 300000); /* less than 5 minutes */
2023 if (pThis->cMsLinkUpDelay > 5000 || pThis->cMsLinkUpDelay < 100)
2024 {
2025 LogRel(("%s WARNING! Link up delay is set to %u seconds!\n",
2026 INSTANCE(pThis), pThis->cMsLinkUpDelay / 1000));
2027 }
2028 Log(("%s Link up delay is set to %u seconds\n",
2029 INSTANCE(pThis), pThis->cMsLinkUpDelay / 1000));
2030
2031
2032 vnetPrintFeatures(pThis, vnetIoCb_GetHostFeatures(pThis), "Device supports the following features");
2033
2034 /* Initialize PCI config space */
2035 memcpy(pThis->config.mac.au8, pThis->macConfigured.au8, sizeof(pThis->config.mac.au8));
2036 pThis->config.uStatus = 0;
2037
2038 /* Initialize state structure */
2039 pThis->u32PktNo = 1;
2040
2041 /* Interfaces */
2042 pThis->INetworkDown.pfnWaitReceiveAvail = vnetNetworkDown_WaitReceiveAvail;
2043 pThis->INetworkDown.pfnReceive = vnetNetworkDown_Receive;
2044 pThis->INetworkDown.pfnReceiveGso = vnetNetworkDown_ReceiveGso;
2045 pThis->INetworkDown.pfnXmitPending = vnetNetworkDown_XmitPending;
2046
2047 pThis->INetworkConfig.pfnGetMac = vnetGetMac;
2048 pThis->INetworkConfig.pfnGetLinkState = vnetGetLinkState;
2049 pThis->INetworkConfig.pfnSetLinkState = vnetSetLinkState;
2050
2051 /* Initialize critical section. */
2052 // char szTmp[sizeof(pThis->VPCI.szInstance) + 2];
2053 // RTStrPrintf(szTmp, sizeof(szTmp), "%sRX", pThis->VPCI.szInstance);
2054 // rc = PDMDevHlpCritSectInit(pDevIns, &pThis->csRx, szTmp);
2055 // if (RT_FAILURE(rc))
2056 // return rc;
2057
2058 /* Map our ports to IO space. */
2059 rc = PDMDevHlpPCIIORegionRegister(pDevIns, 0,
2060 VPCI_CONFIG + sizeof(VNetPCIConfig),
2061 PCI_ADDRESS_SPACE_IO, vnetMap);
2062 if (RT_FAILURE(rc))
2063 return rc;
2064
2065
2066 /* Register save/restore state handlers. */
2067 rc = PDMDevHlpSSMRegisterEx(pDevIns, VIRTIO_SAVEDSTATE_VERSION, sizeof(VNETSTATE), NULL,
2068 NULL, vnetLiveExec, NULL,
2069 vnetSavePrep, vnetSaveExec, NULL,
2070 vnetLoadPrep, vnetLoadExec, vnetLoadDone);
2071 if (RT_FAILURE(rc))
2072 return rc;
2073
2074 /* Create the RX notifier signaller. */
2075 rc = PDMDevHlpQueueCreate(pDevIns, sizeof(PDMQUEUEITEMCORE), 1, 0,
2076 vnetCanRxQueueConsumer, true, "VNet-Rcv", &pThis->pCanRxQueueR3);
2077 if (RT_FAILURE(rc))
2078 return rc;
2079 pThis->pCanRxQueueR0 = PDMQueueR0Ptr(pThis->pCanRxQueueR3);
2080 pThis->pCanRxQueueRC = PDMQueueRCPtr(pThis->pCanRxQueueR3);
2081
2082 /* Create Link Up Timer */
2083 rc = PDMDevHlpTMTimerCreate(pDevIns, TMCLOCK_VIRTUAL, vnetLinkUpTimer, pThis,
2084 TMTIMER_FLAGS_NO_CRIT_SECT,
2085 "VirtioNet Link Up Timer", &pThis->pLinkUpTimer);
2086 if (RT_FAILURE(rc))
2087 return rc;
2088
2089#ifdef VNET_TX_DELAY
2090 /* Create Transmit Delay Timer */
2091 rc = PDMDevHlpTMTimerCreate(pDevIns, TMCLOCK_VIRTUAL, vnetTxTimer, pThis,
2092 TMTIMER_FLAGS_NO_CRIT_SECT,
2093 "VirtioNet TX Delay Timer", &pThis->pTxTimerR3);
2094 if (RT_FAILURE(rc))
2095 return rc;
2096 pThis->pTxTimerR0 = TMTimerR0Ptr(pThis->pTxTimerR3);
2097 pThis->pTxTimerRC = TMTimerRCPtr(pThis->pTxTimerR3);
2098
2099 pThis->u32i = pThis->u32AvgDiff = pThis->u32MaxDiff = 0;
2100 pThis->u32MinDiff = UINT32_MAX;
2101#endif /* VNET_TX_DELAY */
2102
2103 rc = PDMDevHlpDriverAttach(pDevIns, 0, &pThis->VPCI.IBase, &pThis->pDrvBase, "Network Port");
2104 if (RT_SUCCESS(rc))
2105 {
2106 if (rc == VINF_NAT_DNS)
2107 {
2108 PDMDevHlpVMSetRuntimeError(pDevIns, 0 /*fFlags*/, "NoDNSforNAT",
2109 N_("A Domain Name Server (DNS) for NAT networking could not be determined. Ensure that your host is correctly connected to an ISP. If you ignore this warning the guest will not be able to perform nameserver lookups and it will probably observe delays if trying so"));
2110 }
2111 pThis->pDrv = PDMIBASE_QUERY_INTERFACE(pThis->pDrvBase, PDMINETWORKUP);
2112 AssertMsgReturn(pThis->pDrv, ("Failed to obtain the PDMINETWORKUP interface!\n"),
2113 VERR_PDM_MISSING_INTERFACE_BELOW);
2114 }
2115 else if ( rc == VERR_PDM_NO_ATTACHED_DRIVER
2116 || rc == VERR_PDM_CFG_MISSING_DRIVER_NAME )
2117 {
2118 /* No error! */
2119 Log(("%s This adapter is not attached to any network!\n", INSTANCE(pThis)));
2120 }
2121 else
2122 return PDMDEV_SET_ERROR(pDevIns, rc, N_("Failed to attach the network LUN"));
2123
2124 rc = RTSemEventCreate(&pThis->hEventMoreRxDescAvail);
2125 if (RT_FAILURE(rc))
2126 return rc;
2127
2128 rc = vnetIoCb_Reset(pThis);
2129 AssertRC(rc);
2130
2131 PDMDevHlpSTAMRegisterF(pDevIns, &pThis->StatReceiveBytes, STAMTYPE_COUNTER, STAMVISIBILITY_ALWAYS, STAMUNIT_BYTES, "Amount of data received", "/Public/Net/VNet%u/BytesReceived", iInstance);
2132 PDMDevHlpSTAMRegisterF(pDevIns, &pThis->StatTransmitBytes, STAMTYPE_COUNTER, STAMVISIBILITY_ALWAYS, STAMUNIT_BYTES, "Amount of data transmitted", "/Public/Net/VNet%u/BytesTransmitted", iInstance);
2133
2134 PDMDevHlpSTAMRegisterF(pDevIns, &pThis->StatReceiveBytes, STAMTYPE_COUNTER, STAMVISIBILITY_ALWAYS, STAMUNIT_BYTES, "Amount of data received", "/Devices/VNet%d/ReceiveBytes", iInstance);
2135 PDMDevHlpSTAMRegisterF(pDevIns, &pThis->StatTransmitBytes, STAMTYPE_COUNTER, STAMVISIBILITY_ALWAYS, STAMUNIT_BYTES, "Amount of data transmitted", "/Devices/VNet%d/TransmitBytes", iInstance);
2136 PDMDevHlpSTAMRegisterF(pDevIns, &pThis->StatReceiveGSO, STAMTYPE_COUNTER, STAMVISIBILITY_ALWAYS, STAMUNIT_COUNT, "Number of received GSO packets", "/Devices/VNet%d/Packets/ReceiveGSO", iInstance);
2137 PDMDevHlpSTAMRegisterF(pDevIns, &pThis->StatTransmitPackets, STAMTYPE_COUNTER, STAMVISIBILITY_ALWAYS, STAMUNIT_COUNT, "Number of sent packets", "/Devices/VNet%d/Packets/Transmit", iInstance);
2138 PDMDevHlpSTAMRegisterF(pDevIns, &pThis->StatTransmitGSO, STAMTYPE_COUNTER, STAMVISIBILITY_ALWAYS, STAMUNIT_COUNT, "Number of sent GSO packets", "/Devices/VNet%d/Packets/Transmit-Gso", iInstance);
2139 PDMDevHlpSTAMRegisterF(pDevIns, &pThis->StatTransmitCSum, STAMTYPE_COUNTER, STAMVISIBILITY_ALWAYS, STAMUNIT_COUNT, "Number of completed TX checksums", "/Devices/VNet%d/Packets/Transmit-Csum", iInstance);
2140#if defined(VBOX_WITH_STATISTICS)
2141 PDMDevHlpSTAMRegisterF(pDevIns, &pThis->StatReceive, STAMTYPE_PROFILE, STAMVISIBILITY_ALWAYS, STAMUNIT_TICKS_PER_CALL, "Profiling receive", "/Devices/VNet%d/Receive/Total", iInstance);
2142 PDMDevHlpSTAMRegisterF(pDevIns, &pThis->StatReceiveStore, STAMTYPE_PROFILE, STAMVISIBILITY_ALWAYS, STAMUNIT_TICKS_PER_CALL, "Profiling receive storing", "/Devices/VNet%d/Receive/Store", iInstance);
2143 PDMDevHlpSTAMRegisterF(pDevIns, &pThis->StatRxOverflow, STAMTYPE_PROFILE, STAMVISIBILITY_ALWAYS, STAMUNIT_TICKS_PER_OCCURENCE, "Profiling RX overflows", "/Devices/VNet%d/RxOverflow", iInstance);
2144 PDMDevHlpSTAMRegisterF(pDevIns, &pThis->StatRxOverflowWakeup, STAMTYPE_COUNTER, STAMVISIBILITY_ALWAYS, STAMUNIT_OCCURENCES, "Nr of RX overflow wakeups", "/Devices/VNet%d/RxOverflowWakeup", iInstance);
2145 PDMDevHlpSTAMRegisterF(pDevIns, &pThis->StatTransmit, STAMTYPE_PROFILE, STAMVISIBILITY_ALWAYS, STAMUNIT_TICKS_PER_CALL, "Profiling transmits in HC", "/Devices/VNet%d/Transmit/Total", iInstance);
2146 PDMDevHlpSTAMRegisterF(pDevIns, &pThis->StatTransmitSend, STAMTYPE_PROFILE, STAMVISIBILITY_ALWAYS, STAMUNIT_TICKS_PER_CALL, "Profiling send transmit in HC", "/Devices/VNet%d/Transmit/Send", iInstance);
2147#endif /* VBOX_WITH_STATISTICS */
2148
2149 return VINF_SUCCESS;
2150}
2151
2152/**
2153 * The device registration structure.
2154 */
2155const PDMDEVREG g_DeviceVirtioNet =
2156{
2157 /* Structure version. PDM_DEVREG_VERSION defines the current version. */
2158 PDM_DEVREG_VERSION,
2159 /* Device name. */
2160 "virtio-net",
2161 /* Name of guest context module (no path).
2162 * Only evalutated if PDM_DEVREG_FLAGS_RC is set. */
2163 "VBoxDDRC.rc",
2164 /* Name of ring-0 module (no path).
2165 * Only evalutated if PDM_DEVREG_FLAGS_RC is set. */
2166 "VBoxDDR0.r0",
2167 /* The description of the device. The UTF-8 string pointed to shall, like this structure,
2168 * remain unchanged from registration till VM destruction. */
2169 "Virtio Ethernet.\n",
2170
2171 /* Flags, combination of the PDM_DEVREG_FLAGS_* \#defines. */
2172#ifdef VNET_GC_SUPPORT
2173 PDM_DEVREG_FLAGS_DEFAULT_BITS | PDM_DEVREG_FLAGS_RC | PDM_DEVREG_FLAGS_R0,
2174#else
2175 PDM_DEVREG_FLAGS_DEFAULT_BITS,
2176#endif
2177 /* Device class(es), combination of the PDM_DEVREG_CLASS_* \#defines. */
2178 PDM_DEVREG_CLASS_NETWORK,
2179 /* Maximum number of instances (per VM). */
2180 ~0U,
2181 /* Size of the instance data. */
2182 sizeof(VNETSTATE),
2183
2184 /* pfnConstruct */
2185 vnetConstruct,
2186 /* pfnDestruct */
2187 vnetDestruct,
2188 /* pfnRelocate */
2189 vnetRelocate,
2190 /* pfnMemSetup. */
2191 NULL,
2192 /* pfnPowerOn */
2193 NULL,
2194 /* pfnReset */
2195 NULL,
2196 /* pfnSuspend */
2197 vnetSuspend,
2198 /* pfnResume */
2199 NULL,
2200 /* pfnAttach */
2201 vnetAttach,
2202 /* pfnDetach */
2203 vnetDetach,
2204 /* pfnQueryInterface */
2205 NULL,
2206 /* pfnInitComplete */
2207 NULL,
2208 /* pfnPowerOff */
2209 vnetPowerOff,
2210 /* pfnSoftReset */
2211 NULL,
2212
2213 /* u32VersionEnd */
2214 PDM_DEVREG_VERSION
2215};
2216
2217#endif /* IN_RING3 */
2218#endif /* !VBOX_DEVICE_STRUCT_TESTCASE */
Note: See TracBrowser for help on using the repository browser.

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette