xref: /qemu/rust/qemu-api/src/memory.rs (revision c5f122fdcc280a82e7c5f31de890f985aa7ba773)
1590faa03SPaolo Bonzini // Copyright 2024 Red Hat, Inc.
2590faa03SPaolo Bonzini // Author(s): Paolo Bonzini <pbonzini@redhat.com>
3590faa03SPaolo Bonzini // SPDX-License-Identifier: GPL-2.0-or-later
4590faa03SPaolo Bonzini 
5d015d4cbSZhao Liu //! Bindings for `MemoryRegion`, `MemoryRegionOps` and `MemTxAttrs`
6590faa03SPaolo Bonzini 
7590faa03SPaolo Bonzini use std::{
8*e4fb0be1SPaolo Bonzini     ffi::{c_uint, c_void, CStr, CString},
9af0868cbSPaolo Bonzini     marker::PhantomData,
10590faa03SPaolo Bonzini };
11590faa03SPaolo Bonzini 
12d015d4cbSZhao Liu pub use bindings::{hwaddr, MemTxAttrs};
13590faa03SPaolo Bonzini 
14590faa03SPaolo Bonzini use crate::{
15590faa03SPaolo Bonzini     bindings::{self, device_endian, memory_region_init_io},
16590faa03SPaolo Bonzini     callbacks::FnCall,
17af0868cbSPaolo Bonzini     cell::Opaque,
18590faa03SPaolo Bonzini     prelude::*,
19590faa03SPaolo Bonzini     zeroable::Zeroable,
20590faa03SPaolo Bonzini };
21590faa03SPaolo Bonzini 
22590faa03SPaolo Bonzini pub struct MemoryRegionOps<T>(
23590faa03SPaolo Bonzini     bindings::MemoryRegionOps,
24590faa03SPaolo Bonzini     // Note: quite often you'll see PhantomData<fn(&T)> mentioned when discussing
25590faa03SPaolo Bonzini     // covariance and contravariance; you don't need any of those to understand
26590faa03SPaolo Bonzini     // this usage of PhantomData.  Quite simply, MemoryRegionOps<T> *logically*
27590faa03SPaolo Bonzini     // holds callbacks that take an argument of type &T, except the type is erased
28590faa03SPaolo Bonzini     // before the callback is stored in the bindings::MemoryRegionOps field.
29590faa03SPaolo Bonzini     // The argument of PhantomData is a function pointer in order to represent
30590faa03SPaolo Bonzini     // that relationship; while that will also provide desirable and safe variance
31590faa03SPaolo Bonzini     // for T, variance is not the point but just a consequence.
32590faa03SPaolo Bonzini     PhantomData<fn(&T)>,
33590faa03SPaolo Bonzini );
34590faa03SPaolo Bonzini 
35590faa03SPaolo Bonzini // SAFETY: When a *const T is passed to the callbacks, the call itself
36590faa03SPaolo Bonzini // is done in a thread-safe manner.  The invocation is okay as long as
37590faa03SPaolo Bonzini // T itself is `Sync`.
38590faa03SPaolo Bonzini unsafe impl<T: Sync> Sync for MemoryRegionOps<T> {}
39590faa03SPaolo Bonzini 
40590faa03SPaolo Bonzini #[derive(Clone)]
41590faa03SPaolo Bonzini pub struct MemoryRegionOpsBuilder<T>(bindings::MemoryRegionOps, PhantomData<fn(&T)>);
42590faa03SPaolo Bonzini 
memory_region_ops_read_cb<T, F: for<'a> FnCall<(&'a T, hwaddr, u32), u64>>( opaque: *mut c_void, addr: hwaddr, size: c_uint, ) -> u6443590faa03SPaolo Bonzini unsafe extern "C" fn memory_region_ops_read_cb<T, F: for<'a> FnCall<(&'a T, hwaddr, u32), u64>>(
44590faa03SPaolo Bonzini     opaque: *mut c_void,
45590faa03SPaolo Bonzini     addr: hwaddr,
46590faa03SPaolo Bonzini     size: c_uint,
47590faa03SPaolo Bonzini ) -> u64 {
48590faa03SPaolo Bonzini     F::call((unsafe { &*(opaque.cast::<T>()) }, addr, size))
49590faa03SPaolo Bonzini }
50590faa03SPaolo Bonzini 
memory_region_ops_write_cb<T, F: for<'a> FnCall<(&'a T, hwaddr, u64, u32)>>( opaque: *mut c_void, addr: hwaddr, data: u64, size: c_uint, )51590faa03SPaolo Bonzini unsafe extern "C" fn memory_region_ops_write_cb<T, F: for<'a> FnCall<(&'a T, hwaddr, u64, u32)>>(
52590faa03SPaolo Bonzini     opaque: *mut c_void,
53590faa03SPaolo Bonzini     addr: hwaddr,
54590faa03SPaolo Bonzini     data: u64,
55590faa03SPaolo Bonzini     size: c_uint,
56590faa03SPaolo Bonzini ) {
57590faa03SPaolo Bonzini     F::call((unsafe { &*(opaque.cast::<T>()) }, addr, data, size))
58590faa03SPaolo Bonzini }
59590faa03SPaolo Bonzini 
60590faa03SPaolo Bonzini impl<T> MemoryRegionOpsBuilder<T> {
61590faa03SPaolo Bonzini     #[must_use]
read<F: for<'a> FnCall<(&'a T, hwaddr, u32), u64>>(mut self, _f: &F) -> Self62590faa03SPaolo Bonzini     pub const fn read<F: for<'a> FnCall<(&'a T, hwaddr, u32), u64>>(mut self, _f: &F) -> Self {
63590faa03SPaolo Bonzini         self.0.read = Some(memory_region_ops_read_cb::<T, F>);
64590faa03SPaolo Bonzini         self
65590faa03SPaolo Bonzini     }
66590faa03SPaolo Bonzini 
67590faa03SPaolo Bonzini     #[must_use]
write<F: for<'a> FnCall<(&'a T, hwaddr, u64, u32)>>(mut self, _f: &F) -> Self68590faa03SPaolo Bonzini     pub const fn write<F: for<'a> FnCall<(&'a T, hwaddr, u64, u32)>>(mut self, _f: &F) -> Self {
69590faa03SPaolo Bonzini         self.0.write = Some(memory_region_ops_write_cb::<T, F>);
70590faa03SPaolo Bonzini         self
71590faa03SPaolo Bonzini     }
72590faa03SPaolo Bonzini 
73590faa03SPaolo Bonzini     #[must_use]
big_endian(mut self) -> Self74590faa03SPaolo Bonzini     pub const fn big_endian(mut self) -> Self {
75590faa03SPaolo Bonzini         self.0.endianness = device_endian::DEVICE_BIG_ENDIAN;
76590faa03SPaolo Bonzini         self
77590faa03SPaolo Bonzini     }
78590faa03SPaolo Bonzini 
79590faa03SPaolo Bonzini     #[must_use]
little_endian(mut self) -> Self80590faa03SPaolo Bonzini     pub const fn little_endian(mut self) -> Self {
81590faa03SPaolo Bonzini         self.0.endianness = device_endian::DEVICE_LITTLE_ENDIAN;
82590faa03SPaolo Bonzini         self
83590faa03SPaolo Bonzini     }
84590faa03SPaolo Bonzini 
85590faa03SPaolo Bonzini     #[must_use]
native_endian(mut self) -> Self86590faa03SPaolo Bonzini     pub const fn native_endian(mut self) -> Self {
87590faa03SPaolo Bonzini         self.0.endianness = device_endian::DEVICE_NATIVE_ENDIAN;
88590faa03SPaolo Bonzini         self
89590faa03SPaolo Bonzini     }
90590faa03SPaolo Bonzini 
91590faa03SPaolo Bonzini     #[must_use]
valid_sizes(mut self, min: u32, max: u32) -> Self92590faa03SPaolo Bonzini     pub const fn valid_sizes(mut self, min: u32, max: u32) -> Self {
93590faa03SPaolo Bonzini         self.0.valid.min_access_size = min;
94590faa03SPaolo Bonzini         self.0.valid.max_access_size = max;
95590faa03SPaolo Bonzini         self
96590faa03SPaolo Bonzini     }
97590faa03SPaolo Bonzini 
98590faa03SPaolo Bonzini     #[must_use]
valid_unaligned(mut self) -> Self99590faa03SPaolo Bonzini     pub const fn valid_unaligned(mut self) -> Self {
100590faa03SPaolo Bonzini         self.0.valid.unaligned = true;
101590faa03SPaolo Bonzini         self
102590faa03SPaolo Bonzini     }
103590faa03SPaolo Bonzini 
104590faa03SPaolo Bonzini     #[must_use]
impl_sizes(mut self, min: u32, max: u32) -> Self105590faa03SPaolo Bonzini     pub const fn impl_sizes(mut self, min: u32, max: u32) -> Self {
106590faa03SPaolo Bonzini         self.0.impl_.min_access_size = min;
107590faa03SPaolo Bonzini         self.0.impl_.max_access_size = max;
108590faa03SPaolo Bonzini         self
109590faa03SPaolo Bonzini     }
110590faa03SPaolo Bonzini 
111590faa03SPaolo Bonzini     #[must_use]
impl_unaligned(mut self) -> Self112590faa03SPaolo Bonzini     pub const fn impl_unaligned(mut self) -> Self {
113590faa03SPaolo Bonzini         self.0.impl_.unaligned = true;
114590faa03SPaolo Bonzini         self
115590faa03SPaolo Bonzini     }
116590faa03SPaolo Bonzini 
117590faa03SPaolo Bonzini     #[must_use]
build(self) -> MemoryRegionOps<T>118590faa03SPaolo Bonzini     pub const fn build(self) -> MemoryRegionOps<T> {
119590faa03SPaolo Bonzini         MemoryRegionOps::<T>(self.0, PhantomData)
120590faa03SPaolo Bonzini     }
121590faa03SPaolo Bonzini 
122590faa03SPaolo Bonzini     #[must_use]
new() -> Self123590faa03SPaolo Bonzini     pub const fn new() -> Self {
124590faa03SPaolo Bonzini         Self(bindings::MemoryRegionOps::ZERO, PhantomData)
125590faa03SPaolo Bonzini     }
126590faa03SPaolo Bonzini }
127590faa03SPaolo Bonzini 
128590faa03SPaolo Bonzini impl<T> Default for MemoryRegionOpsBuilder<T> {
default() -> Self129590faa03SPaolo Bonzini     fn default() -> Self {
130590faa03SPaolo Bonzini         Self::new()
131590faa03SPaolo Bonzini     }
132590faa03SPaolo Bonzini }
133590faa03SPaolo Bonzini 
134af0868cbSPaolo Bonzini /// A safe wrapper around [`bindings::MemoryRegion`].
135af0868cbSPaolo Bonzini #[repr(transparent)]
136af0868cbSPaolo Bonzini #[derive(qemu_api_macros::Wrapper)]
137af0868cbSPaolo Bonzini pub struct MemoryRegion(Opaque<bindings::MemoryRegion>);
138af0868cbSPaolo Bonzini 
139af0868cbSPaolo Bonzini unsafe impl Send for MemoryRegion {}
140af0868cbSPaolo Bonzini unsafe impl Sync for MemoryRegion {}
141590faa03SPaolo Bonzini 
142590faa03SPaolo Bonzini impl MemoryRegion {
143590faa03SPaolo Bonzini     // inline to ensure that it is not included in tests, which only
144590faa03SPaolo Bonzini     // link to hwcore and qom.  FIXME: inlining is actually the opposite
145590faa03SPaolo Bonzini     // of what we want, since this is the type-erased version of the
146590faa03SPaolo Bonzini     // init_io function below.  Look into splitting the qemu_api crate.
147590faa03SPaolo Bonzini     #[inline(always)]
do_init_io( slot: *mut bindings::MemoryRegion, owner: *mut Object, ops: &'static bindings::MemoryRegionOps, name: &'static str, size: u64, )148590faa03SPaolo Bonzini     unsafe fn do_init_io(
149590faa03SPaolo Bonzini         slot: *mut bindings::MemoryRegion,
150590faa03SPaolo Bonzini         owner: *mut Object,
151590faa03SPaolo Bonzini         ops: &'static bindings::MemoryRegionOps,
152590faa03SPaolo Bonzini         name: &'static str,
153590faa03SPaolo Bonzini         size: u64,
154590faa03SPaolo Bonzini     ) {
155590faa03SPaolo Bonzini         unsafe {
156590faa03SPaolo Bonzini             let cstr = CString::new(name).unwrap();
157590faa03SPaolo Bonzini             memory_region_init_io(
158590faa03SPaolo Bonzini                 slot,
1597fb4a99dSPaolo Bonzini                 owner.cast::<bindings::Object>(),
160590faa03SPaolo Bonzini                 ops,
161590faa03SPaolo Bonzini                 owner.cast::<c_void>(),
162590faa03SPaolo Bonzini                 cstr.as_ptr(),
163590faa03SPaolo Bonzini                 size,
164590faa03SPaolo Bonzini             );
165590faa03SPaolo Bonzini         }
166590faa03SPaolo Bonzini     }
167590faa03SPaolo Bonzini 
init_io<T: IsA<Object>>( &mut self, owner: *mut T, ops: &'static MemoryRegionOps<T>, name: &'static str, size: u64, )168590faa03SPaolo Bonzini     pub fn init_io<T: IsA<Object>>(
169590faa03SPaolo Bonzini         &mut self,
170590faa03SPaolo Bonzini         owner: *mut T,
171590faa03SPaolo Bonzini         ops: &'static MemoryRegionOps<T>,
172590faa03SPaolo Bonzini         name: &'static str,
173590faa03SPaolo Bonzini         size: u64,
174590faa03SPaolo Bonzini     ) {
175590faa03SPaolo Bonzini         unsafe {
176af0868cbSPaolo Bonzini             Self::do_init_io(
177af0868cbSPaolo Bonzini                 self.0.as_mut_ptr(),
178af0868cbSPaolo Bonzini                 owner.cast::<Object>(),
179af0868cbSPaolo Bonzini                 &ops.0,
180af0868cbSPaolo Bonzini                 name,
181af0868cbSPaolo Bonzini                 size,
182af0868cbSPaolo Bonzini             );
183590faa03SPaolo Bonzini         }
184590faa03SPaolo Bonzini     }
185590faa03SPaolo Bonzini }
186590faa03SPaolo Bonzini 
187590faa03SPaolo Bonzini unsafe impl ObjectType for MemoryRegion {
188590faa03SPaolo Bonzini     type Class = bindings::MemoryRegionClass;
189590faa03SPaolo Bonzini     const TYPE_NAME: &'static CStr =
190590faa03SPaolo Bonzini         unsafe { CStr::from_bytes_with_nul_unchecked(bindings::TYPE_MEMORY_REGION) };
191590faa03SPaolo Bonzini }
192590faa03SPaolo Bonzini qom_isa!(MemoryRegion: Object);
193d015d4cbSZhao Liu 
194d015d4cbSZhao Liu /// A special `MemTxAttrs` constant, used to indicate that no memory
195d015d4cbSZhao Liu /// attributes are specified.
196d015d4cbSZhao Liu ///
197d015d4cbSZhao Liu /// Bus masters which don't specify any attributes will get this,
198d015d4cbSZhao Liu /// which has all attribute bits clear except the topmost one
199d015d4cbSZhao Liu /// (so that we can distinguish "all attributes deliberately clear"
200d015d4cbSZhao Liu /// from "didn't specify" if necessary).
201d015d4cbSZhao Liu pub const MEMTXATTRS_UNSPECIFIED: MemTxAttrs = MemTxAttrs {
202d015d4cbSZhao Liu     unspecified: true,
203d015d4cbSZhao Liu     ..Zeroable::ZERO
204d015d4cbSZhao Liu };
205