mirror of
https://github.com/Motorhead1991/qemu.git
synced 2025-07-27 04:13:53 -06:00
rust: bindings for MemoryRegionOps
Reviewed-by: Zhao Liu <zhao1.liu@intel.com> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
This commit is contained in:
parent
d449d29a99
commit
590faa03ee
9 changed files with 227 additions and 61 deletions
|
@ -180,6 +180,7 @@ module status
|
|||
``cell`` stable
|
||||
``c_str`` complete
|
||||
``irq`` complete
|
||||
``memory`` stable
|
||||
``module`` complete
|
||||
``offset_of`` stable
|
||||
``qdev`` stable
|
||||
|
|
|
@ -10,13 +10,14 @@ use std::{
|
|||
|
||||
use qemu_api::{
|
||||
bindings::{
|
||||
error_fatal, hwaddr, memory_region_init_io, qdev_prop_set_chr, qemu_chr_fe_accept_input,
|
||||
qemu_chr_fe_ioctl, qemu_chr_fe_set_handlers, qemu_chr_fe_write_all, qemu_irq,
|
||||
sysbus_connect_irq, sysbus_mmio_map, sysbus_realize, CharBackend, Chardev, MemoryRegion,
|
||||
QEMUChrEvent, CHR_IOCTL_SERIAL_SET_BREAK,
|
||||
error_fatal, qdev_prop_set_chr, qemu_chr_fe_accept_input, qemu_chr_fe_ioctl,
|
||||
qemu_chr_fe_set_handlers, qemu_chr_fe_write_all, qemu_irq, sysbus_connect_irq,
|
||||
sysbus_mmio_map, sysbus_realize, CharBackend, Chardev, QEMUChrEvent,
|
||||
CHR_IOCTL_SERIAL_SET_BREAK,
|
||||
},
|
||||
c_str, impl_vmstate_forward,
|
||||
irq::InterruptSource,
|
||||
memory::{hwaddr, MemoryRegion, MemoryRegionOps, MemoryRegionOpsBuilder},
|
||||
prelude::*,
|
||||
qdev::{Clock, ClockEvent, DeviceImpl, DeviceState, Property, ResetType, ResettablePhasesImpl},
|
||||
qom::{ClassInitImpl, ObjectImpl, Owned, ParentField},
|
||||
|
@ -26,7 +27,6 @@ use qemu_api::{
|
|||
|
||||
use crate::{
|
||||
device_class,
|
||||
memory_ops::PL011_OPS,
|
||||
registers::{self, Interrupt},
|
||||
RegisterOffset,
|
||||
};
|
||||
|
@ -487,20 +487,24 @@ impl PL011State {
|
|||
/// location/instance. All its fields are expected to hold unitialized
|
||||
/// values with the sole exception of `parent_obj`.
|
||||
unsafe fn init(&mut self) {
|
||||
static PL011_OPS: MemoryRegionOps<PL011State> = MemoryRegionOpsBuilder::<PL011State>::new()
|
||||
.read(&PL011State::read)
|
||||
.write(&PL011State::write)
|
||||
.native_endian()
|
||||
.impl_sizes(4, 4)
|
||||
.build();
|
||||
|
||||
// SAFETY:
|
||||
//
|
||||
// self and self.iomem are guaranteed to be valid at this point since callers
|
||||
// must make sure the `self` reference is valid.
|
||||
unsafe {
|
||||
memory_region_init_io(
|
||||
addr_of_mut!(self.iomem),
|
||||
addr_of_mut!(*self).cast::<Object>(),
|
||||
MemoryRegion::init_io(
|
||||
unsafe { &mut *addr_of_mut!(self.iomem) },
|
||||
addr_of_mut!(*self),
|
||||
&PL011_OPS,
|
||||
addr_of_mut!(*self).cast::<c_void>(),
|
||||
Self::TYPE_NAME.as_ptr(),
|
||||
"pl011",
|
||||
0x1000,
|
||||
);
|
||||
}
|
||||
|
||||
self.regs = Default::default();
|
||||
|
||||
|
@ -525,7 +529,7 @@ impl PL011State {
|
|||
}
|
||||
}
|
||||
|
||||
pub fn read(&mut self, offset: hwaddr, _size: u32) -> u64 {
|
||||
pub fn read(&self, offset: hwaddr, _size: u32) -> u64 {
|
||||
match RegisterOffset::try_from(offset) {
|
||||
Err(v) if (0x3f8..0x400).contains(&(v >> 2)) => {
|
||||
let device_id = self.get_class().device_id;
|
||||
|
@ -540,7 +544,7 @@ impl PL011State {
|
|||
if update_irq {
|
||||
self.update();
|
||||
unsafe {
|
||||
qemu_chr_fe_accept_input(&mut self.char_backend);
|
||||
qemu_chr_fe_accept_input(addr_of!(self.char_backend) as *mut _);
|
||||
}
|
||||
}
|
||||
result.into()
|
||||
|
@ -548,7 +552,7 @@ impl PL011State {
|
|||
}
|
||||
}
|
||||
|
||||
pub fn write(&mut self, offset: hwaddr, value: u64) {
|
||||
pub fn write(&self, offset: hwaddr, value: u64, _size: u32) {
|
||||
let mut update_irq = false;
|
||||
if let Ok(field) = RegisterOffset::try_from(offset) {
|
||||
// qemu_chr_fe_write_all() calls into the can_receive
|
||||
|
@ -561,14 +565,15 @@ impl PL011State {
|
|||
// XXX this blocks entire thread. Rewrite to use
|
||||
// qemu_chr_fe_write and background I/O callbacks
|
||||
unsafe {
|
||||
qemu_chr_fe_write_all(&mut self.char_backend, &ch, 1);
|
||||
qemu_chr_fe_write_all(addr_of!(self.char_backend) as *mut _, &ch, 1);
|
||||
}
|
||||
}
|
||||
|
||||
update_irq = self
|
||||
.regs
|
||||
.borrow_mut()
|
||||
.write(field, value as u32, &mut self.char_backend);
|
||||
update_irq = self.regs.borrow_mut().write(
|
||||
field,
|
||||
value as u32,
|
||||
addr_of!(self.char_backend) as *mut _,
|
||||
);
|
||||
} else {
|
||||
eprintln!("write bad offset {offset} value {value}");
|
||||
}
|
||||
|
|
|
@ -18,7 +18,6 @@ use qemu_api::c_str;
|
|||
|
||||
mod device;
|
||||
mod device_class;
|
||||
mod memory_ops;
|
||||
|
||||
pub use device::pl011_create;
|
||||
|
||||
|
|
|
@ -1,34 +0,0 @@
|
|||
// Copyright 2024, Linaro Limited
|
||||
// Author(s): Manos Pitsidianakis <manos.pitsidianakis@linaro.org>
|
||||
// SPDX-License-Identifier: GPL-2.0-or-later
|
||||
|
||||
use core::ptr::NonNull;
|
||||
use std::os::raw::{c_uint, c_void};
|
||||
|
||||
use qemu_api::{bindings::*, zeroable::Zeroable};
|
||||
|
||||
use crate::device::PL011State;
|
||||
|
||||
pub static PL011_OPS: MemoryRegionOps = MemoryRegionOps {
|
||||
read: Some(pl011_read),
|
||||
write: Some(pl011_write),
|
||||
read_with_attrs: None,
|
||||
write_with_attrs: None,
|
||||
endianness: device_endian::DEVICE_NATIVE_ENDIAN,
|
||||
valid: Zeroable::ZERO,
|
||||
impl_: MemoryRegionOps__bindgen_ty_2 {
|
||||
min_access_size: 4,
|
||||
max_access_size: 4,
|
||||
..Zeroable::ZERO
|
||||
},
|
||||
};
|
||||
|
||||
unsafe extern "C" fn pl011_read(opaque: *mut c_void, addr: hwaddr, size: c_uint) -> u64 {
|
||||
let mut state = NonNull::new(opaque).unwrap().cast::<PL011State>();
|
||||
unsafe { state.as_mut() }.read(addr, size)
|
||||
}
|
||||
|
||||
unsafe extern "C" fn pl011_write(opaque: *mut c_void, addr: hwaddr, data: u64, _size: c_uint) {
|
||||
let mut state = NonNull::new(opaque).unwrap().cast::<PL011State>();
|
||||
unsafe { state.as_mut() }.write(addr, data);
|
||||
}
|
|
@ -22,6 +22,7 @@ _qemu_api_rs = static_library(
|
|||
'src/cell.rs',
|
||||
'src/c_str.rs',
|
||||
'src/irq.rs',
|
||||
'src/memory.rs',
|
||||
'src/module.rs',
|
||||
'src/offset_of.rs',
|
||||
'src/prelude.rs',
|
||||
|
|
|
@ -19,6 +19,7 @@ pub mod c_str;
|
|||
pub mod callbacks;
|
||||
pub mod cell;
|
||||
pub mod irq;
|
||||
pub mod memory;
|
||||
pub mod module;
|
||||
pub mod offset_of;
|
||||
pub mod qdev;
|
||||
|
|
191
rust/qemu-api/src/memory.rs
Normal file
191
rust/qemu-api/src/memory.rs
Normal file
|
@ -0,0 +1,191 @@
|
|||
// Copyright 2024 Red Hat, Inc.
|
||||
// Author(s): Paolo Bonzini <pbonzini@redhat.com>
|
||||
// SPDX-License-Identifier: GPL-2.0-or-later
|
||||
|
||||
//! Bindings for `MemoryRegion` and `MemoryRegionOps`
|
||||
|
||||
use std::{
|
||||
ffi::{CStr, CString},
|
||||
marker::{PhantomData, PhantomPinned},
|
||||
os::raw::{c_uint, c_void},
|
||||
ptr::addr_of,
|
||||
};
|
||||
|
||||
pub use bindings::hwaddr;
|
||||
|
||||
use crate::{
|
||||
bindings::{self, device_endian, memory_region_init_io},
|
||||
callbacks::FnCall,
|
||||
prelude::*,
|
||||
zeroable::Zeroable,
|
||||
};
|
||||
|
||||
pub struct MemoryRegionOps<T>(
|
||||
bindings::MemoryRegionOps,
|
||||
// Note: quite often you'll see PhantomData<fn(&T)> mentioned when discussing
|
||||
// covariance and contravariance; you don't need any of those to understand
|
||||
// this usage of PhantomData. Quite simply, MemoryRegionOps<T> *logically*
|
||||
// holds callbacks that take an argument of type &T, except the type is erased
|
||||
// before the callback is stored in the bindings::MemoryRegionOps field.
|
||||
// The argument of PhantomData is a function pointer in order to represent
|
||||
// that relationship; while that will also provide desirable and safe variance
|
||||
// for T, variance is not the point but just a consequence.
|
||||
PhantomData<fn(&T)>,
|
||||
);
|
||||
|
||||
// SAFETY: When a *const T is passed to the callbacks, the call itself
|
||||
// is done in a thread-safe manner. The invocation is okay as long as
|
||||
// T itself is `Sync`.
|
||||
unsafe impl<T: Sync> Sync for MemoryRegionOps<T> {}
|
||||
|
||||
#[derive(Clone)]
|
||||
pub struct MemoryRegionOpsBuilder<T>(bindings::MemoryRegionOps, PhantomData<fn(&T)>);
|
||||
|
||||
unsafe extern "C" fn memory_region_ops_read_cb<T, F: for<'a> FnCall<(&'a T, hwaddr, u32), u64>>(
|
||||
opaque: *mut c_void,
|
||||
addr: hwaddr,
|
||||
size: c_uint,
|
||||
) -> u64 {
|
||||
F::call((unsafe { &*(opaque.cast::<T>()) }, addr, size))
|
||||
}
|
||||
|
||||
unsafe extern "C" fn memory_region_ops_write_cb<T, F: for<'a> FnCall<(&'a T, hwaddr, u64, u32)>>(
|
||||
opaque: *mut c_void,
|
||||
addr: hwaddr,
|
||||
data: u64,
|
||||
size: c_uint,
|
||||
) {
|
||||
F::call((unsafe { &*(opaque.cast::<T>()) }, addr, data, size))
|
||||
}
|
||||
|
||||
impl<T> MemoryRegionOpsBuilder<T> {
|
||||
#[must_use]
|
||||
pub const fn read<F: for<'a> FnCall<(&'a T, hwaddr, u32), u64>>(mut self, _f: &F) -> Self {
|
||||
self.0.read = Some(memory_region_ops_read_cb::<T, F>);
|
||||
self
|
||||
}
|
||||
|
||||
#[must_use]
|
||||
pub const fn write<F: for<'a> FnCall<(&'a T, hwaddr, u64, u32)>>(mut self, _f: &F) -> Self {
|
||||
self.0.write = Some(memory_region_ops_write_cb::<T, F>);
|
||||
self
|
||||
}
|
||||
|
||||
#[must_use]
|
||||
pub const fn big_endian(mut self) -> Self {
|
||||
self.0.endianness = device_endian::DEVICE_BIG_ENDIAN;
|
||||
self
|
||||
}
|
||||
|
||||
#[must_use]
|
||||
pub const fn little_endian(mut self) -> Self {
|
||||
self.0.endianness = device_endian::DEVICE_LITTLE_ENDIAN;
|
||||
self
|
||||
}
|
||||
|
||||
#[must_use]
|
||||
pub const fn native_endian(mut self) -> Self {
|
||||
self.0.endianness = device_endian::DEVICE_NATIVE_ENDIAN;
|
||||
self
|
||||
}
|
||||
|
||||
#[must_use]
|
||||
pub const fn valid_sizes(mut self, min: u32, max: u32) -> Self {
|
||||
self.0.valid.min_access_size = min;
|
||||
self.0.valid.max_access_size = max;
|
||||
self
|
||||
}
|
||||
|
||||
#[must_use]
|
||||
pub const fn valid_unaligned(mut self) -> Self {
|
||||
self.0.valid.unaligned = true;
|
||||
self
|
||||
}
|
||||
|
||||
#[must_use]
|
||||
pub const fn impl_sizes(mut self, min: u32, max: u32) -> Self {
|
||||
self.0.impl_.min_access_size = min;
|
||||
self.0.impl_.max_access_size = max;
|
||||
self
|
||||
}
|
||||
|
||||
#[must_use]
|
||||
pub const fn impl_unaligned(mut self) -> Self {
|
||||
self.0.impl_.unaligned = true;
|
||||
self
|
||||
}
|
||||
|
||||
#[must_use]
|
||||
pub const fn build(self) -> MemoryRegionOps<T> {
|
||||
MemoryRegionOps::<T>(self.0, PhantomData)
|
||||
}
|
||||
|
||||
#[must_use]
|
||||
pub const fn new() -> Self {
|
||||
Self(bindings::MemoryRegionOps::ZERO, PhantomData)
|
||||
}
|
||||
}
|
||||
|
||||
impl<T> Default for MemoryRegionOpsBuilder<T> {
|
||||
fn default() -> Self {
|
||||
Self::new()
|
||||
}
|
||||
}
|
||||
|
||||
/// A safe wrapper around [`bindings::MemoryRegion`]. Compared to the
|
||||
/// underlying C struct it is marked as pinned because the QOM tree
|
||||
/// contains a pointer to it.
|
||||
pub struct MemoryRegion {
|
||||
inner: bindings::MemoryRegion,
|
||||
_pin: PhantomPinned,
|
||||
}
|
||||
|
||||
impl MemoryRegion {
|
||||
// inline to ensure that it is not included in tests, which only
|
||||
// link to hwcore and qom. FIXME: inlining is actually the opposite
|
||||
// of what we want, since this is the type-erased version of the
|
||||
// init_io function below. Look into splitting the qemu_api crate.
|
||||
#[inline(always)]
|
||||
unsafe fn do_init_io(
|
||||
slot: *mut bindings::MemoryRegion,
|
||||
owner: *mut Object,
|
||||
ops: &'static bindings::MemoryRegionOps,
|
||||
name: &'static str,
|
||||
size: u64,
|
||||
) {
|
||||
unsafe {
|
||||
let cstr = CString::new(name).unwrap();
|
||||
memory_region_init_io(
|
||||
slot,
|
||||
owner.cast::<Object>(),
|
||||
ops,
|
||||
owner.cast::<c_void>(),
|
||||
cstr.as_ptr(),
|
||||
size,
|
||||
);
|
||||
}
|
||||
}
|
||||
|
||||
pub fn init_io<T: IsA<Object>>(
|
||||
&mut self,
|
||||
owner: *mut T,
|
||||
ops: &'static MemoryRegionOps<T>,
|
||||
name: &'static str,
|
||||
size: u64,
|
||||
) {
|
||||
unsafe {
|
||||
Self::do_init_io(&mut self.inner, owner.cast::<Object>(), &ops.0, name, size);
|
||||
}
|
||||
}
|
||||
|
||||
pub(crate) const fn as_mut_ptr(&self) -> *mut bindings::MemoryRegion {
|
||||
addr_of!(self.inner) as *mut _
|
||||
}
|
||||
}
|
||||
|
||||
unsafe impl ObjectType for MemoryRegion {
|
||||
type Class = bindings::MemoryRegionClass;
|
||||
const TYPE_NAME: &'static CStr =
|
||||
unsafe { CStr::from_bytes_with_nul_unchecked(bindings::TYPE_MEMORY_REGION) };
|
||||
}
|
||||
qom_isa!(MemoryRegion: Object);
|
|
@ -2,7 +2,7 @@
|
|||
// Author(s): Paolo Bonzini <pbonzini@redhat.com>
|
||||
// SPDX-License-Identifier: GPL-2.0-or-later
|
||||
|
||||
use std::{ffi::CStr, ptr::addr_of};
|
||||
use std::ffi::CStr;
|
||||
|
||||
pub use bindings::{SysBusDevice, SysBusDeviceClass};
|
||||
|
||||
|
@ -10,6 +10,7 @@ use crate::{
|
|||
bindings,
|
||||
cell::bql_locked,
|
||||
irq::InterruptSource,
|
||||
memory::MemoryRegion,
|
||||
prelude::*,
|
||||
qdev::{DeviceClass, DeviceState},
|
||||
qom::ClassInitImpl,
|
||||
|
@ -42,10 +43,10 @@ where
|
|||
/// important, since whoever creates the sysbus device will refer to the
|
||||
/// region with a number that corresponds to the order of calls to
|
||||
/// `init_mmio`.
|
||||
fn init_mmio(&self, iomem: &bindings::MemoryRegion) {
|
||||
fn init_mmio(&self, iomem: &MemoryRegion) {
|
||||
assert!(bql_locked());
|
||||
unsafe {
|
||||
bindings::sysbus_init_mmio(self.as_mut_ptr(), addr_of!(*iomem) as *mut _);
|
||||
bindings::sysbus_init_mmio(self.as_mut_ptr(), iomem.as_mut_ptr());
|
||||
}
|
||||
}
|
||||
|
||||
|
|
|
@ -100,3 +100,4 @@ impl_zeroable!(crate::bindings::VMStateField);
|
|||
impl_zeroable!(crate::bindings::VMStateDescription);
|
||||
impl_zeroable!(crate::bindings::MemoryRegionOps__bindgen_ty_1);
|
||||
impl_zeroable!(crate::bindings::MemoryRegionOps__bindgen_ty_2);
|
||||
impl_zeroable!(crate::bindings::MemoryRegionOps);
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue