rust: bindings for MemoryRegionOps

Reviewed-by: Zhao Liu <zhao1.liu@intel.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
This commit is contained in:
Paolo Bonzini 2025-01-17 18:14:25 +01:00
parent d449d29a99
commit 590faa03ee
9 changed files with 227 additions and 61 deletions

View file

@ -180,6 +180,7 @@ module status
``cell`` stable
``c_str`` complete
``irq`` complete
``memory`` stable
``module`` complete
``offset_of`` stable
``qdev`` stable

View file

@ -10,13 +10,14 @@ use std::{
use qemu_api::{
bindings::{
error_fatal, hwaddr, memory_region_init_io, qdev_prop_set_chr, qemu_chr_fe_accept_input,
qemu_chr_fe_ioctl, qemu_chr_fe_set_handlers, qemu_chr_fe_write_all, qemu_irq,
sysbus_connect_irq, sysbus_mmio_map, sysbus_realize, CharBackend, Chardev, MemoryRegion,
QEMUChrEvent, CHR_IOCTL_SERIAL_SET_BREAK,
error_fatal, qdev_prop_set_chr, qemu_chr_fe_accept_input, qemu_chr_fe_ioctl,
qemu_chr_fe_set_handlers, qemu_chr_fe_write_all, qemu_irq, sysbus_connect_irq,
sysbus_mmio_map, sysbus_realize, CharBackend, Chardev, QEMUChrEvent,
CHR_IOCTL_SERIAL_SET_BREAK,
},
c_str, impl_vmstate_forward,
irq::InterruptSource,
memory::{hwaddr, MemoryRegion, MemoryRegionOps, MemoryRegionOpsBuilder},
prelude::*,
qdev::{Clock, ClockEvent, DeviceImpl, DeviceState, Property, ResetType, ResettablePhasesImpl},
qom::{ClassInitImpl, ObjectImpl, Owned, ParentField},
@ -26,7 +27,6 @@ use qemu_api::{
use crate::{
device_class,
memory_ops::PL011_OPS,
registers::{self, Interrupt},
RegisterOffset,
};
@ -487,20 +487,24 @@ impl PL011State {
/// location/instance. All its fields are expected to hold unitialized
/// values with the sole exception of `parent_obj`.
unsafe fn init(&mut self) {
static PL011_OPS: MemoryRegionOps<PL011State> = MemoryRegionOpsBuilder::<PL011State>::new()
.read(&PL011State::read)
.write(&PL011State::write)
.native_endian()
.impl_sizes(4, 4)
.build();
// SAFETY:
//
// self and self.iomem are guaranteed to be valid at this point since callers
// must make sure the `self` reference is valid.
unsafe {
memory_region_init_io(
addr_of_mut!(self.iomem),
addr_of_mut!(*self).cast::<Object>(),
MemoryRegion::init_io(
unsafe { &mut *addr_of_mut!(self.iomem) },
addr_of_mut!(*self),
&PL011_OPS,
addr_of_mut!(*self).cast::<c_void>(),
Self::TYPE_NAME.as_ptr(),
"pl011",
0x1000,
);
}
self.regs = Default::default();
@ -525,7 +529,7 @@ impl PL011State {
}
}
pub fn read(&mut self, offset: hwaddr, _size: u32) -> u64 {
pub fn read(&self, offset: hwaddr, _size: u32) -> u64 {
match RegisterOffset::try_from(offset) {
Err(v) if (0x3f8..0x400).contains(&(v >> 2)) => {
let device_id = self.get_class().device_id;
@ -540,7 +544,7 @@ impl PL011State {
if update_irq {
self.update();
unsafe {
qemu_chr_fe_accept_input(&mut self.char_backend);
qemu_chr_fe_accept_input(addr_of!(self.char_backend) as *mut _);
}
}
result.into()
@ -548,7 +552,7 @@ impl PL011State {
}
}
pub fn write(&mut self, offset: hwaddr, value: u64) {
pub fn write(&self, offset: hwaddr, value: u64, _size: u32) {
let mut update_irq = false;
if let Ok(field) = RegisterOffset::try_from(offset) {
// qemu_chr_fe_write_all() calls into the can_receive
@ -561,14 +565,15 @@ impl PL011State {
// XXX this blocks entire thread. Rewrite to use
// qemu_chr_fe_write and background I/O callbacks
unsafe {
qemu_chr_fe_write_all(&mut self.char_backend, &ch, 1);
qemu_chr_fe_write_all(addr_of!(self.char_backend) as *mut _, &ch, 1);
}
}
update_irq = self
.regs
.borrow_mut()
.write(field, value as u32, &mut self.char_backend);
update_irq = self.regs.borrow_mut().write(
field,
value as u32,
addr_of!(self.char_backend) as *mut _,
);
} else {
eprintln!("write bad offset {offset} value {value}");
}

View file

@ -18,7 +18,6 @@ use qemu_api::c_str;
mod device;
mod device_class;
mod memory_ops;
pub use device::pl011_create;

View file

@ -1,34 +0,0 @@
// Copyright 2024, Linaro Limited
// Author(s): Manos Pitsidianakis <manos.pitsidianakis@linaro.org>
// SPDX-License-Identifier: GPL-2.0-or-later
use core::ptr::NonNull;
use std::os::raw::{c_uint, c_void};
use qemu_api::{bindings::*, zeroable::Zeroable};
use crate::device::PL011State;
pub static PL011_OPS: MemoryRegionOps = MemoryRegionOps {
read: Some(pl011_read),
write: Some(pl011_write),
read_with_attrs: None,
write_with_attrs: None,
endianness: device_endian::DEVICE_NATIVE_ENDIAN,
valid: Zeroable::ZERO,
impl_: MemoryRegionOps__bindgen_ty_2 {
min_access_size: 4,
max_access_size: 4,
..Zeroable::ZERO
},
};
unsafe extern "C" fn pl011_read(opaque: *mut c_void, addr: hwaddr, size: c_uint) -> u64 {
let mut state = NonNull::new(opaque).unwrap().cast::<PL011State>();
unsafe { state.as_mut() }.read(addr, size)
}
unsafe extern "C" fn pl011_write(opaque: *mut c_void, addr: hwaddr, data: u64, _size: c_uint) {
let mut state = NonNull::new(opaque).unwrap().cast::<PL011State>();
unsafe { state.as_mut() }.write(addr, data);
}

View file

@ -22,6 +22,7 @@ _qemu_api_rs = static_library(
'src/cell.rs',
'src/c_str.rs',
'src/irq.rs',
'src/memory.rs',
'src/module.rs',
'src/offset_of.rs',
'src/prelude.rs',

View file

@ -19,6 +19,7 @@ pub mod c_str;
pub mod callbacks;
pub mod cell;
pub mod irq;
pub mod memory;
pub mod module;
pub mod offset_of;
pub mod qdev;

191
rust/qemu-api/src/memory.rs Normal file
View file

@ -0,0 +1,191 @@
// Copyright 2024 Red Hat, Inc.
// Author(s): Paolo Bonzini <pbonzini@redhat.com>
// SPDX-License-Identifier: GPL-2.0-or-later
//! Bindings for `MemoryRegion` and `MemoryRegionOps`
use std::{
ffi::{CStr, CString},
marker::{PhantomData, PhantomPinned},
os::raw::{c_uint, c_void},
ptr::addr_of,
};
pub use bindings::hwaddr;
use crate::{
bindings::{self, device_endian, memory_region_init_io},
callbacks::FnCall,
prelude::*,
zeroable::Zeroable,
};
pub struct MemoryRegionOps<T>(
bindings::MemoryRegionOps,
// Note: quite often you'll see PhantomData<fn(&T)> mentioned when discussing
// covariance and contravariance; you don't need any of those to understand
// this usage of PhantomData. Quite simply, MemoryRegionOps<T> *logically*
// holds callbacks that take an argument of type &T, except the type is erased
// before the callback is stored in the bindings::MemoryRegionOps field.
// The argument of PhantomData is a function pointer in order to represent
// that relationship; while that will also provide desirable and safe variance
// for T, variance is not the point but just a consequence.
PhantomData<fn(&T)>,
);
// SAFETY: When a *const T is passed to the callbacks, the call itself
// is done in a thread-safe manner. The invocation is okay as long as
// T itself is `Sync`.
unsafe impl<T: Sync> Sync for MemoryRegionOps<T> {}
#[derive(Clone)]
pub struct MemoryRegionOpsBuilder<T>(bindings::MemoryRegionOps, PhantomData<fn(&T)>);
unsafe extern "C" fn memory_region_ops_read_cb<T, F: for<'a> FnCall<(&'a T, hwaddr, u32), u64>>(
opaque: *mut c_void,
addr: hwaddr,
size: c_uint,
) -> u64 {
F::call((unsafe { &*(opaque.cast::<T>()) }, addr, size))
}
unsafe extern "C" fn memory_region_ops_write_cb<T, F: for<'a> FnCall<(&'a T, hwaddr, u64, u32)>>(
opaque: *mut c_void,
addr: hwaddr,
data: u64,
size: c_uint,
) {
F::call((unsafe { &*(opaque.cast::<T>()) }, addr, data, size))
}
impl<T> MemoryRegionOpsBuilder<T> {
#[must_use]
pub const fn read<F: for<'a> FnCall<(&'a T, hwaddr, u32), u64>>(mut self, _f: &F) -> Self {
self.0.read = Some(memory_region_ops_read_cb::<T, F>);
self
}
#[must_use]
pub const fn write<F: for<'a> FnCall<(&'a T, hwaddr, u64, u32)>>(mut self, _f: &F) -> Self {
self.0.write = Some(memory_region_ops_write_cb::<T, F>);
self
}
#[must_use]
pub const fn big_endian(mut self) -> Self {
self.0.endianness = device_endian::DEVICE_BIG_ENDIAN;
self
}
#[must_use]
pub const fn little_endian(mut self) -> Self {
self.0.endianness = device_endian::DEVICE_LITTLE_ENDIAN;
self
}
#[must_use]
pub const fn native_endian(mut self) -> Self {
self.0.endianness = device_endian::DEVICE_NATIVE_ENDIAN;
self
}
#[must_use]
pub const fn valid_sizes(mut self, min: u32, max: u32) -> Self {
self.0.valid.min_access_size = min;
self.0.valid.max_access_size = max;
self
}
#[must_use]
pub const fn valid_unaligned(mut self) -> Self {
self.0.valid.unaligned = true;
self
}
#[must_use]
pub const fn impl_sizes(mut self, min: u32, max: u32) -> Self {
self.0.impl_.min_access_size = min;
self.0.impl_.max_access_size = max;
self
}
#[must_use]
pub const fn impl_unaligned(mut self) -> Self {
self.0.impl_.unaligned = true;
self
}
#[must_use]
pub const fn build(self) -> MemoryRegionOps<T> {
MemoryRegionOps::<T>(self.0, PhantomData)
}
#[must_use]
pub const fn new() -> Self {
Self(bindings::MemoryRegionOps::ZERO, PhantomData)
}
}
impl<T> Default for MemoryRegionOpsBuilder<T> {
fn default() -> Self {
Self::new()
}
}
/// A safe wrapper around [`bindings::MemoryRegion`]. Compared to the
/// underlying C struct it is marked as pinned because the QOM tree
/// contains a pointer to it.
pub struct MemoryRegion {
inner: bindings::MemoryRegion,
_pin: PhantomPinned,
}
impl MemoryRegion {
// inline to ensure that it is not included in tests, which only
// link to hwcore and qom. FIXME: inlining is actually the opposite
// of what we want, since this is the type-erased version of the
// init_io function below. Look into splitting the qemu_api crate.
#[inline(always)]
unsafe fn do_init_io(
slot: *mut bindings::MemoryRegion,
owner: *mut Object,
ops: &'static bindings::MemoryRegionOps,
name: &'static str,
size: u64,
) {
unsafe {
let cstr = CString::new(name).unwrap();
memory_region_init_io(
slot,
owner.cast::<Object>(),
ops,
owner.cast::<c_void>(),
cstr.as_ptr(),
size,
);
}
}
pub fn init_io<T: IsA<Object>>(
&mut self,
owner: *mut T,
ops: &'static MemoryRegionOps<T>,
name: &'static str,
size: u64,
) {
unsafe {
Self::do_init_io(&mut self.inner, owner.cast::<Object>(), &ops.0, name, size);
}
}
pub(crate) const fn as_mut_ptr(&self) -> *mut bindings::MemoryRegion {
addr_of!(self.inner) as *mut _
}
}
unsafe impl ObjectType for MemoryRegion {
type Class = bindings::MemoryRegionClass;
const TYPE_NAME: &'static CStr =
unsafe { CStr::from_bytes_with_nul_unchecked(bindings::TYPE_MEMORY_REGION) };
}
qom_isa!(MemoryRegion: Object);

View file

@ -2,7 +2,7 @@
// Author(s): Paolo Bonzini <pbonzini@redhat.com>
// SPDX-License-Identifier: GPL-2.0-or-later
use std::{ffi::CStr, ptr::addr_of};
use std::ffi::CStr;
pub use bindings::{SysBusDevice, SysBusDeviceClass};
@ -10,6 +10,7 @@ use crate::{
bindings,
cell::bql_locked,
irq::InterruptSource,
memory::MemoryRegion,
prelude::*,
qdev::{DeviceClass, DeviceState},
qom::ClassInitImpl,
@ -42,10 +43,10 @@ where
/// important, since whoever creates the sysbus device will refer to the
/// region with a number that corresponds to the order of calls to
/// `init_mmio`.
fn init_mmio(&self, iomem: &bindings::MemoryRegion) {
fn init_mmio(&self, iomem: &MemoryRegion) {
assert!(bql_locked());
unsafe {
bindings::sysbus_init_mmio(self.as_mut_ptr(), addr_of!(*iomem) as *mut _);
bindings::sysbus_init_mmio(self.as_mut_ptr(), iomem.as_mut_ptr());
}
}

View file

@ -100,3 +100,4 @@ impl_zeroable!(crate::bindings::VMStateField);
impl_zeroable!(crate::bindings::VMStateDescription);
impl_zeroable!(crate::bindings::MemoryRegionOps__bindgen_ty_1);
impl_zeroable!(crate::bindings::MemoryRegionOps__bindgen_ty_2);
impl_zeroable!(crate::bindings::MemoryRegionOps);