Index: /trunk/include/VBox/VBoxPktDmp.h
===================================================================
--- /trunk/include/VBox/VBoxPktDmp.h	(revision 82680)
+++ /trunk/include/VBox/VBoxPktDmp.h	(revision 82681)
@@ -50,5 +50,6 @@
 
 
-DECLHIDDEN(void) vboxEthPacketDump(const char *pcszInstance, const char *pcszText, const uint8_t *pcPacket, uint32_t cb)
+//DECLHIDDEN(void) 
+DECLINLINE(void) vboxEthPacketDump(const char *pcszInstance, const char *pcszText, const uint8_t *pcPacket, uint32_t cb)
 {
 #if defined(LOG_ENABLED) && !defined(VBOX_DEVICE_STRUCT_TESTCASE)
Index: /trunk/src/VBox/Devices/Makefile.kmk
===================================================================
--- /trunk/src/VBox/Devices/Makefile.kmk	(revision 82680)
+++ /trunk/src/VBox/Devices/Makefile.kmk	(revision 82681)
@@ -476,6 +476,13 @@
   VBoxDD_SOURCES        += \
  	VirtIO/Virtio.cpp \
+  	VirtIO/Virtio_1_0.cpp \
  	Network/DevVirtioNet.cpp
  endif
+
+ if defined(VBOX_WITH_VIRTIO) && defined(VBOX_WITH_VIRTIO_NET_1_0)
+  VBoxDD_DEFS         += VBOX_WITH_VIRTIO_NET_1_0
+  VBoxDD_SOURCES      += \
+  	Network/DevVirtioNet_1_0.cpp
+endif
 
  ifdef VBOX_WITH_UDPTUNNEL
@@ -525,8 +532,7 @@
  endif
 
- ifdef VBOX_WITH_VIRTIO_SCSI
+ if defined(VBOX_WITH_VIRTIO) && defined(VBOX_WITH_VIRTIO_SCSI)
   VBoxDD_DEFS           += VBOX_WITH_VIRTIO_SCSI
   VBoxDD_SOURCES        += \
-  	VirtIO/Virtio_1_0.cpp \
   	Storage/DevVirtioSCSI.cpp
  endif
@@ -958,5 +964,12 @@
    VBoxDDRC_SOURCES     += \
   	VirtIO/Virtio.cpp \
+  	VirtIO/Virtio_1_0.cpp \
   	Network/DevVirtioNet.cpp
+  endif
+
+  ifdef defined(VBOX_WITH_VIRTIO) && defined(VBOX_WITH_VIRTIO_NET_1_0)
+   VBoxDDRC_DEFS         += VBOX_WITH_VIRTIO_NET_1_0
+   VBoxDDRC_SOURCES      += \
+  	 Network/DevVirtioNet_1_0.cpp
   endif
 
@@ -1146,5 +1159,12 @@
   VBoxDDR0_SOURCES      += \
 	VirtIO/Virtio.cpp \
+  	VirtIO/Virtio_1_0.cpp \
   	Network/DevVirtioNet.cpp
+ endif
+
+ if defined(VBOX_WITH_VIRTIO) && defined(VBOX_WITH_VIRTIO_NET_1_0)
+  VBoxDDR0_DEFS         += VBOX_WITH_VIRTIO_NET_1_0
+  VBoxDDR0_SOURCES      += \
+  	Network/DevVirtioNet_1_0.cpp
  endif
 
@@ -1217,8 +1237,7 @@
  endif
 
- if defined(VBOX_WITH_VIRTIO_SCSI)
+ if defined (VBOX_WITH_VIRTIO) && defined(VBOX_WITH_VIRTIO_SCSI)
   VBoxDDR0_DEFS         += VBOX_WITH_VIRTIO_SCSI
   VBoxDDR0_SOURCES      += \
-  	VirtIO/Virtio_1_0.cpp \
   	Storage/DevVirtioSCSI.cpp
  endif
Index: /trunk/src/VBox/Devices/Network/DevVirtioNet_1_0.cpp
===================================================================
--- /trunk/src/VBox/Devices/Network/DevVirtioNet_1_0.cpp	(revision 82681)
+++ /trunk/src/VBox/Devices/Network/DevVirtioNet_1_0.cpp	(revision 82681)
@@ -0,0 +1,1409 @@
+/* $Id$ $Revision$ $Date$ $Author$ */
+
+/** @file
+ * VBox storage devices - Virtio NET Driver
+ *
+ * Log-levels used:
+ *    - Level 1:   The most important (but usually rare) things to note
+ *    - Level 2:   NET command logging
+ *    - Level 3:   Vector and I/O transfer summary (shows what client sent an expects and fulfillment)
+ *    - Level 6:   Device <-> Guest Driver negotation, traffic, notifications and state handling
+ *    - Level 12:  Brief formatted hex dumps of I/O data
+ */
+
+/*
+ * Copyright (C) 2006-2019 Oracle Corporation
+ *
+ * This file is part of VirtualBox Open Source Edition (OSE), as
+ * available from http://www.virtualbox.org. This file is free software;
+ * you can redistribute it and/or modify it under the terms of the GNU
+ * General Public License (GPL) as published by the Free Software
+ * Foundation, in version 2 as it comes in the "COPYING" file of the
+ * VirtualBox OSE distribution. VirtualBox OSE is distributed in the
+ * hope that it will be useful, but WITHOUT ANY WARRANTY of any kind.
+ */
+
+
+/*********************************************************************************************************************************
+*   Header Files                                                                                                                 *
+*********************************************************************************************************************************/
+//#define LOG_GROUP LOG_GROUP_DRV_NET
+#define LOG_GROUP LOG_GROUP_DEV_VIRTIO
+#define VIRTIONET_WITH_GSO
+#define VIRTIONET_WITH_MERGEABLE_RX_BUFS
+
+#include <VBox/vmm/pdmdev.h>
+#include <VBox/vmm/pdmcritsect.h>
+#include <VBox/vmm/pdmnetifs.h>
+#include <VBox/msi.h>
+#include <VBox/version.h>
+//#include <VBox/asm.h>
+#include <VBox/log.h>
+#include <iprt/errcore.h>
+#include <iprt/assert.h>
+#include <iprt/string.h>
+#include <VBox/sup.h>
+#ifdef IN_RING3
+#include <VBox/VBoxPktDmp.h>
+#endif
+#ifdef IN_RING3
+# include <iprt/alloc.h>
+# include <iprt/memcache.h>
+# include <iprt/semaphore.h>
+# include <iprt/sg.h>
+# include <iprt/param.h>
+# include <iprt/uuid.h>
+#endif
+#include "../VirtIO/Virtio_1_0.h"
+
+//#include "VBoxNET.h"
+#include "VBoxDD.h"
+
+
+/*********************************************************************************************************************************
+*   Defined Constants And Macros                                                                                                 *
+*********************************************************************************************************************************/
+/** The current saved state version. */
+#define VIRTIONET_SAVED_STATE_VERSION          UINT32_C(1)
+#define VIRTIONET_MAX_QPAIRS                   512
+#define VIRTIONET_MAX_QUEUES                   (VIRTIONET_MAX_QPAIRS * 2 + 1)
+#define VIRTIONET_MAX_FRAME_SIZE               65535 + 18     /**< Max IP pkt size + Ethernet header with VLAN tag  */
+#define VIRTIONET_MAC_FILTER_LEN               32
+#define VIRTIONET_MAX_VID                      (1 << 12)
+
+#define INSTANCE(a_pVirtio)                 ((a_pVirtio)->szInstanceName)
+#define QUEUE_NAME(a_pVirtio, a_idxQueue)   ((a_pVirtio)->virtqState[(a_idxQueue)].szVirtqName)
+#define VIRTQNAME(qIdx) (pThis->aszVirtqNames[qIdx])
+#define CBVIRTQNAME(qIdx) RTStrNLen(VIRTQNAME(qIdx), sizeof(VIRTQNAME(qIdx)))
+
+/* Macros to calculate queue specific index number VirtIO 1.0, 5.1.2 */
+#define RXQIDX(qPairIdx)  (qPairIdx * 2)
+#define TXQIDX(qPairIdx)  (qPairIdx * 2 + 1)
+#define CTRLQIDX          ((pThis->fNegotiatedFeatures & VIRTIONET_F_MQ) ? VIRTIONET_MAX_QPAIRS * 2 + 2 : 4)
+
+#define RXVIRTQNAME(qPairIdx)  (pThis->aszVirtqNames[RXQIDX(qPairIdx)])
+#define TXVIRTQNAME(qPairIdx)  (pThis->aszVirtqNames[TXQIDX(qPairIdx)])
+#define CTLVIRTQNAME(qPairIdx) (pThis->aszVirtqNames[CTRLQIDX])
+
+#define LUN0    0
+/** @name VirtIO 1.0 NET Host feature bits (See VirtIO 1.0 specification, Section 5.6.3)
+ * @{  */
+#define VIRTIONET_F_CSUM                 RT_BIT_64(0)          /**< Handle packets with partial checksum            */
+#define VIRTIONET_F_GUEST_CSUM           RT_BIT_64(1)          /**< Handles packets with partial checksum           */
+#define VIRTIONET_F_CTRL_GUEST_OFFLOADS  RT_BIT_64(2)          /**< Control channel offloads reconfig support       */
+#define VIRTIONET_F_MAC                  RT_BIT_64(5)          /**< Device has given MAC address                    */
+#define VIRTIONET_F_GUEST_TSO4           RT_BIT_64(7)          /**< Driver can receive TSOv4                        */
+#define VIRTIONET_F_GUEST_TSO6           RT_BIT_64(8)          /**< Driver can receive TSOv6                        */
+#define VIRTIONET_F_GUEST_ECN            RT_BIT_64(9)          /**< Driver can receive TSO with ECN                 */
+#define VIRTIONET_F_GUEST_UFO            RT_BIT_64(10)         /**< Driver can receive UFO                          */
+#define VIRTIONET_F_HOST_TSO4            RT_BIT_64(11)         /**< Device can receive TSOv4                        */
+#define VIRTIONET_F_HOST_TSO6            RT_BIT_64(12)         /**< Device can receive TSOv6                        */
+#define VIRTIONET_F_HOST_ECN             RT_BIT_64(13)         /**< Device can receive TSO with ECN                 */
+#define VIRTIONET_F_HOST_UFO             RT_BIT_64(14)         /**< Device can receive UFO                          */
+#define VIRTIONET_F_MRG_RXBUF            RT_BIT_64(15)         /**< Driver can merge receive buffers                */
+#define VIRTIONET_F_STATUS               RT_BIT_64(16)         /**< Config status field is available                */
+#define VIRTIONET_F_CTRL_VQ              RT_BIT_64(17)         /**< Control channel is available                    */
+#define VIRTIONET_F_CTRL_RX              RT_BIT_64(18)         /**< Control channel RX mode + MAC addr filtering    */
+#define VIRTIONET_F_CTRL_VLAN            RT_BIT_64(19)         /**< Control channel VLAN filtering                  */
+#define VIRTIONET_F_GUEST_ANNOUNCE       RT_BIT_64(21)         /**< Driver can send gratuitous packets              */
+#define VIRTIONET_F_MQ                   RT_BIT_64(22)         /**< Support ultiqueue with auto receive steering    */
+#define VIRTIONET_F_CTRL_MAC_ADDR        RT_BIT_64(23)         /**< Set MAC address through control channel         */
+/** @} */
+
+#ifdef VIRTIONET_WITH_GSO
+# define VIRTIONET_HOST_FEATURES_GSO    \
+      VIRTIONET_F_CSUM                  \
+    | VIRTIONET_F_HOST_TSO4             \
+    | VIRTIONET_F_HOST_TSO6             \
+    | VIRTIONET_F_HOST_UFO              \
+    | VIRTIONET_F_GUEST_TSO4            \
+    | VIRTIONET_F_GUEST_TSO6            \
+    | VIRTIONET_F_GUEST_UFO             \
+    | VIRTIONET_F_GUEST_CSUM                                   /* @bugref(4796) Guest must handle partial chksums   */
+#else
+# define VIRTIONET_HOST_FEATURES_GSO
+#endif
+
+#define VIRTIONET_HOST_FEATURES_OFFERED \
+      VIRTIONET_F_MAC                   \
+    | VIRTIONET_F_STATUS                \
+    | VIRTIONET_F_CTRL_VQ               \
+    | VIRTIONET_F_CTRL_RX               \
+    | VIRTIONET_F_CTRL_VLAN             \
+    | VIRTIONET_HOST_FEATURES_GSO
+
+#define PCI_DEVICE_ID_VIRTIONET_HOST               0x1041      /**< Informs guest driver of type of VirtIO device   */
+#define PCI_CLASS_BASE_NETWORK_CONTROLLER          0x02        /**< PCI Network device class                   */
+#define PCI_CLASS_SUB_NET_ETHERNET_CONTROLLER      0x00        /**< PCI NET Controller subclass                     */
+#define PCI_CLASS_PROG_UNSPECIFIED                 0x00        /**< Programming interface. N/A.                     */
+#define VIRTIONET_PCI_CLASS                        0x01        /**< Base class Mass Storage?                        */
+
+
+/*********************************************************************************************************************************
+*   Structures and Typedefs                                                                                                      *
+*********************************************************************************************************************************/
+/**
+ * Virtio Net Host Device device-specific configuration (VirtIO 1.0, 5.1.4)
+ * VBox VirtIO core issues callback to this VirtIO device-specific implementation to handle
+ * MMIO accesses to device-specific configuration parameters.
+ */
+typedef struct virtio_net_config
+{
+    uint8_t  uMacAddress[6];                                    /**< mac                                            */
+#if VIRTIONET_HOST_FEATURES_OFFERED & VIRTIONET_F_STATUS
+    uint16_t uStatus;                                           /**< status                                         */
+#endif
+#if VIRTIONET_HOST_FEATURES_OFFERED & VIRTIONET_F_MQ
+    uint16_t uMaxVirtqPairs;                                    /**< max_virtq_pairs                                */
+#endif
+} VIRTIONET_CONFIG_T, PVIRTIONET_CONFIG_T;
+
+#define VIRTIONET_F_LINK_UP                RT_BIT_16(1)         /**< config status: Link is up                      */
+#define VIRTIONET_F_ANNOUNCE               RT_BIT_16(2)         /**< config status: Announce                        */
+
+/** @name VirtIO 1.0 NET Host Device device specific control types
+ * @{  */
+#define VIRTIONET_HDR_F_NEEDS_CSUM                   1          /**< Packet needs checksum                          */
+#define VIRTIONET_HDR_GSO_NONE                       0          /**< No Global Segmentation Offset                  */
+#define VIRTIONET_HDR_GSO_TCPV4                      1          /**< Global Segment Offset for TCPV4                */
+#define VIRTIONET_HDR_GSO_UDP                        3          /**< Global Segment Offset for UDP                  */
+#define VIRTIONET_HDR_GSO_TCPV6                      4          /**< Global Segment Offset for TCPV6                */
+#define VIRTIONET_HDR_GSO_ECN                     0x80          /**< Explicit Congestion Notification               */
+/** @} */
+
+/* Device operation: Net header packet (VirtIO 1.0, 5.1.6) */
+#pragma pack(1)
+struct virtio_net_hdr {
+    uint8_t  uFlags;                                           /**< flags                                           */
+    uint8_t  uGsoType;                                         /**< gso_type                                        */
+    uint16_t uHdrLen;                                          /**< hdr_len                                         */
+    uint16_t uGsoSize;                                         /**< gso_size                                        */
+    uint16_t uCsumStart;                                       /**< csum_start                                      */
+    uint16_t uCsumOffset;                                      /**< csum_offset                                     */
+    uint16_t uNumBuffers;                                      /**< num_buffers                                     */
+};
+#pragma pack()
+typedef virtio_net_hdr VIRTIONET_PKT_HDR, *PVIRTIONET_PKT_HDR;
+AssertCompileSize(VIRTIONET_PKT_HDR, 12);
+
+/* Control virtq: Command entry (VirtIO 1.0, 5.1.6.5) */
+#pragma pack(1)
+struct virtio_net_ctrl_hdr {
+    uint8_t uClass;                                             /**< class                                          */
+    uint8_t uCmd;                                               /**< command                                        */
+};
+#pragma pack()
+typedef virtio_net_ctrl_hdr VIRTIONET_CTRL_HDR, *PVIRTIONET_CTRL_HDR;
+
+typedef uint8_t VIRTIONET_CTRL_HDR_ACK;
+
+/* Command entry fAck values */
+#define VIRTIO_NET_OK                               0
+#define VIRTIO_NET_ERR                              1
+
+/** @name Control virtq: Receive filtering flags (VirtIO 1.0, 5.1.6.5.1)
+ * @{  */
+#define VIRTIONET_CTRL_RX                           0           /**< Control class: Receive filtering               */
+#define VIRTIONET_CTRL_RX_PROMISC                   0           /**< Promiscuous mode                               */
+#define VIRTIONET_CTRL_RX_ALLMULTI                  1           /**< All-multicast receive                          */
+#define VIRTIONET_CTRL_RX_ALLUNI                    2           /**< All-unicast receive                            */
+#define VIRTIONET_CTRL_RX_NOMULTI                   3           /**< No multicast receive                           */
+#define VIRTIONET_CTRL_RX_NOUNI                     4           /**< No unicast receive                             */
+#define VIRTIONET_CTRL_RX_NOBCAST                   5           /**< No broadcast receive                           */
+/** @} */
+
+
+typedef uint32_t VIRTIONET_CTRL_MAC_HDR;
+typedef uint8_t  VIRTIONET_CTRL_MAC_ENTRIES[][6];
+
+/** @name Control virtq: MAC address filtering flags (VirtIO 1.0, 5.1.6.5.2)
+ * @{  */
+#define VIRTIONET_CTRL_MAC                          1           /**< Control class: MAC address filtering            */
+#define VIRTIONET_CTRL_MAC_TABLE_SET                0           /**< Set MAC table                                   */
+#define VIRTIONET_CTRL_MAC_ADDR_SET                 1           /**< Set default MAC address                         */
+/** @} */
+
+/** @name Control virtq: MAC address filtering flags (VirtIO 1.0, 5.1.6.5.3)
+ * @{  */
+#define VIRTIONET_CTRL_VLAN                         2           /**< Control class: VLAN filtering                   */
+#define VIRTIONET_CTRL_VLAN_ADD                     0           /**< Add VLAN to filter table                        */
+#define VIRTIONET_CTRL_VLAN_DEL                     1           /**< Delete VLAN from filter table                   */
+/** @} */
+
+/** @name Control virtq: Gratuitous packet sending (VirtIO 1.0, 5.1.6.5.4)
+ * @{  */
+#define VIRTIONET_CTRL_ANNOUNCE                     3           /**< Control class: Gratuitous Packet Sending        */
+#define VIRTIONET_CTRL_ANNOUNCE_ACK                 0           /**< Gratuitous Packet Sending ACK                   */
+/** @} */
+
+struct virtio_net_ctrl_mq {
+    uint16_t    uVirtqueuePairs;                                /**<  virtqueue_pairs                                */
+};
+
+/** @name Control virtq: Receive steering in multiqueue mode (VirtIO 1.0, 5.1.6.5.5)
+ * @{  */
+#define VIRTIONET_CTRL_MQ                           4           /**< Control class: Receive steering                 */
+#define VIRTIONET_CTRL_MQ_VQ_PAIRS_SET              0           /**< Set number of TX/RX queues                      */
+#define VIRTIONET_CTRL_MQ_VQ_PAIRS_MIN              1           /**< Minimum number of TX/RX queues                  */
+#define VIRTIONET_CTRL_MQ_VQ_PAIRS_MAX         0x8000           /**< Maximum number of TX/RX queues                  */
+/** @} */
+
+uint64_t    uOffloads;                                          /**< offloads                                        */
+
+/** @name Offload State Configuration Flags (VirtIO 1.0, 5.1.6.5.6.1)
+ * @{  */
+//#define VIRTIONET_F_GUEST_CSUM                      1           /**< Guest offloads CSUM                             */
+//#define VIRTIONET_F_GUEST_TSO4                      7           /**< Guest offloads TSO4                             */
+//#define VIRTIONET_F_GUEST_TSO6                      8           /**< Guest Offloads TSO6                             */
+//#define VIRTIONET_F_GUEST_ECN                       9           /**< Guest Offloads ECN                              */
+//#define VIRTIONET_F_GUEST_UFO                      10           /**< Guest Offloads UFO                              */
+/** @} */
+
+/** @name Control virtq: Setting Offloads State (VirtIO 1.0, 5.1.6.5.6.1)
+ * @{  */
+#define VIRTIO_NET_CTRL_GUEST_OFFLOADS             5            /**< Control class: Offloads state configuration     */
+#define VIRTIO_NET_CTRL_GUEST_OFFLOADS_SET         0            /** Apply new offloads configuration                 */
+/** @} */
+
+
+/**
+ * Worker thread context, shared state.
+ */
+typedef struct VIRTIONETWORKER
+{
+    SUPSEMEVENT                     hEvtProcess;                /**< handle of associated sleep/wake-up semaphore      */
+} VIRTIONETWORKER;
+/** Pointer to a VirtIO SCSI worker. */
+typedef VIRTIONETWORKER *PVIRTIONETWORKER;
+
+/**
+ * Worker thread context, ring-3 state.
+ */
+typedef struct VIRTIONETWORKERR3
+{
+    R3PTRTYPE(PPDMTHREAD)           pThread;                    /**< pointer to worker thread's handle                 */
+    bool volatile                   fSleeping;                  /**< Flags whether worker thread is sleeping or not    */
+    bool volatile                   fNotified;                  /**< Flags whether worker thread notified              */
+} VIRTIONETWORKERR3;
+/** Pointer to a VirtIO SCSI worker. */
+typedef VIRTIONETWORKERR3 *PVIRTIONETWORKERR3;
+
+/**
+ * VirtIO Host NET device state, shared edition.
+ *
+ * @extends     VIRTIOCORE
+ */
+typedef struct VIRTIONET
+{
+    /** The core virtio state.   */
+    VIRTIOCORE              Virtio;
+
+    /** Virtio device-specific configuration */
+    VIRTIONET_CONFIG_T      virtioNetConfig;
+
+    /** Per device-bound virtq worker-thread contexts (eventq slot unused) */
+    VIRTIONETWORKER         aWorkers[VIRTIONET_MAX_QUEUES];
+
+    /** Track which VirtIO queues we've attached to */
+    bool                    afQueueAttached[VIRTIONET_MAX_QUEUES];
+
+    /** Device-specific spec-based VirtIO VIRTQNAMEs */
+    char                    aszVirtqNames[VIRTIONET_MAX_QUEUES][VIRTIO_MAX_QUEUE_NAME_SIZE];
+
+    /** Instance name */
+    char                    szInstanceName[16];
+
+    uint16_t                cVirtqPairs;
+
+    uint16_t                cVirtQueues;
+
+    uint64_t                fNegotiatedFeatures;
+
+#ifdef VIRTIONET_TX_DELAY
+    /** Transmit Delay Timer. */
+    TMTIMERHANDLE           hTxTimer;
+    uint32_t                u32i;
+    uint32_t                u32AvgDiff;
+    uint32_t                u32MinDiff;
+    uint32_t                u32MaxDiff;
+    uint64_t                u64NanoTS;
+#else  /* !VNET_TX_DELAY */
+    /** The event semaphore TX thread waits on. */
+    SUPSEMEVENT             hTxEvent;
+#endif /* !VNET_TX_DELAY */
+
+    /** Indicates transmission in progress -- only one thread is allowed. */
+    uint32_t                uIsTransmitting;
+
+//    /** PCI config area holding MAC address as well as TBD. */
+//    struct VNetPCIConfig    config;
+
+    /** MAC address obtained from the configuration. */
+    RTMAC                   macConfigured;
+
+    /** True if physical cable is attached in configuration. */
+    bool                    fCableConnected;
+
+    /** virtio-net-1-dot-0 (in milliseconds). */
+    uint32_t                cMsLinkUpDelay;
+
+    uint32_t                alignment;
+
+    /** Number of packet being sent/received to show in debug log. */
+    uint32_t                u32PktNo;
+
+    /** N/A: */
+    bool volatile           fMaybeOutOfSpace;
+
+    /** Resetting flag */
+    bool                    fResetting;
+
+    /** Promiscuous mode -- RX filter accepts all packets. */
+    bool                    fPromiscuous;
+    /** AllMulti mode -- RX filter accepts all multicast packets. */
+    bool                    fAllMulti;
+    /** The number of actually used slots in aMacTable. */
+    uint32_t                cMacFilterEntries;
+    /** Array of MAC addresses accepted by RX filter. */
+    RTMAC                   aMacFilter[VIRTIONET_MAC_FILTER_LEN];
+    /** Bit array of VLAN filter, one bit per VLAN ID. */
+    uint8_t                 aVlanFilter[VIRTIONET_MAX_VID / sizeof(uint8_t)];
+
+    /* Receive-blocking-related fields ***************************************/
+
+    /** EMT: Gets signalled when more RX descriptors become available. */
+    SUPSEMEVENT             hEventMoreRxDescAvail;
+
+    /** Handle of the I/O port range.  */
+    IOMIOPORTHANDLE         hIoPorts;
+
+    /** @name Statistic
+     * @{ */
+    STAMCOUNTER             StatReceiveBytes;
+    STAMCOUNTER             StatTransmitBytes;
+    STAMCOUNTER             StatReceiveGSO;
+    STAMCOUNTER             StatTransmitPackets;
+    STAMCOUNTER             StatTransmitGSO;
+    STAMCOUNTER             StatTransmitCSum;
+#ifdef VBOX_WITH_STATISTICS
+    STAMPROFILE             StatReceive;
+    STAMPROFILE             StatReceiveStore;
+    STAMPROFILEADV          StatTransmit;
+    STAMPROFILE             StatTransmitSend;
+    STAMPROFILE             StatRxOverflow;
+    STAMCOUNTER             StatRxOverflowWakeup;
+    STAMCOUNTER             StatTransmitByNetwork;
+    STAMCOUNTER             StatTransmitByThread;
+#endif
+} VIRTIONET;
+/** Pointer to the shared state of the VirtIO Host NET device. */
+typedef VIRTIONET *PVIRTIONET;
+
+/**
+ * VirtIO Host NET device state, ring-3 edition.
+ *
+ * @extends     VIRTIOCORER3
+ */
+typedef struct VIRTIONETR3
+{
+    /** The core virtio ring-3 state. */
+    VIRTIOCORER3                    Virtio;
+
+    /** Per device-bound virtq worker-thread contexts (eventq slot unused) */
+    VIRTIONETWORKERR3               aWorkers[VIRTIONET_MAX_QUEUES];
+
+    /** The device instance.
+     * @note This is _only_ for use when dealing with interface callbacks. */
+    PPDMDEVINSR3                    pDevIns;
+
+    /** Status LUN: Base interface. */
+    PDMIBASE                        IBase;
+
+    /** Status LUN: LED port interface. */
+    PDMILEDPORTS                    ILeds;
+
+    /** Status LUN: LED connector (peer). */
+    R3PTRTYPE(PPDMILEDCONNECTORS)   pLedsConnector;
+
+    /** Status: LED */
+    PDMLED                          led;
+
+    /** Attached network driver. */
+    R3PTRTYPE(PPDMIBASE)            pDrvBase;
+
+    /** Network port interface (down) */
+    PDMINETWORKDOWN                 INetworkDown;
+
+    /** Network config port interface (main). */
+    PDMINETWORKCONFIG               INetworkConfig;
+
+    /** Connector of attached network driver. */
+    R3PTRTYPE(PPDMINETWORKUP)       pDrv;
+
+#ifndef VIRTIONET_TX_DELAY
+    R3PTRTYPE(PPDMTHREAD)           pTxThread;
+#endif
+
+    /** Link Up(/Restore) Timer. */
+    TMTIMERHANDLE                   hLinkUpTimer;
+
+    /** Queue to send tasks to R3. - HC ptr */
+    R3PTRTYPE(PPDMQUEUE)            pNotifierQueueR3;
+
+    /** True if in the process of quiescing I/O */
+    uint32_t                        fQuiescing;
+
+    /** For which purpose we're quiescing. */
+    VIRTIOVMSTATECHANGED            enmQuiescingFor;
+
+} VIRTIONETR3;
+/** Pointer to the ring-3 state of the VirtIO Host NET device. */
+typedef VIRTIONETR3 *PVIRTIONETR3;
+
+/**
+ * VirtIO Host NET device state, ring-0 edition.
+ */
+typedef struct VIRTIONETR0
+{
+    /** The core virtio ring-0 state. */
+    VIRTIOCORER0                    Virtio;
+} VIRTIONETR0;
+/** Pointer to the ring-0 state of the VirtIO Host NET device. */
+typedef VIRTIONETR0 *PVIRTIONETR0;
+
+
+/**
+ * VirtIO Host NET device state, raw-mode edition.
+ */
+typedef struct VIRTIONETRC
+{
+    /** The core virtio raw-mode state. */
+    VIRTIOCORERC                    Virtio;
+} VIRTIONETRC;
+/** Pointer to the ring-0 state of the VirtIO Host NET device. */
+typedef VIRTIONETRC *PVIRTIONETRC;
+
+
+/** @typedef VIRTIONETCC
+ * The instance data for the current context. */
+typedef CTX_SUFF(VIRTIONET) VIRTIONETCC;
+
+/** @typedef PVIRTIONETCC
+ * Pointer to the instance data for the current context. */
+typedef CTX_SUFF(PVIRTIONET) PVIRTIONETCC;
+
+#ifdef IN_RING3 /* spans most of the file, at the moment. */
+
+
+DECLINLINE(void) virtioNetR3SetVirtqNames(PVIRTIONET pThis)
+{
+    for (uint16_t qPairIdx = 0; qPairIdx < pThis->cVirtqPairs; qPairIdx++)
+    {
+        RTStrPrintf(pThis->aszVirtqNames[RXQIDX(qPairIdx)], VIRTIO_MAX_QUEUE_NAME_SIZE, "receiveq<%d>",  qPairIdx);
+        RTStrPrintf(pThis->aszVirtqNames[TXQIDX(qPairIdx)], VIRTIO_MAX_QUEUE_NAME_SIZE, "transmitq<%d>", qPairIdx);
+    }
+    RTStrCopy(pThis->aszVirtqNames[CTRLQIDX], VIRTIO_MAX_QUEUE_NAME_SIZE, "controlq");
+}
+
+
+DECLINLINE(void) virtioNetPrintFeatures(PVIRTIONET pThis, uint32_t fFeatures, const char *pcszText)
+{
+#ifdef LOG_ENABLED
+    static struct
+    {
+        uint32_t fMask;
+        const char *pcszDesc;
+    } const s_aFeatures[] =
+    {
+        { VIRTIONET_F_CSUM,                "Host handles packets with partial checksum." },
+        { VIRTIONET_F_GUEST_CSUM,          "Guest handles packets with partial checksum." },
+        { VIRTIONET_F_CTRL_GUEST_OFFLOADS, "Control channel offloads reconfiguration support." },
+        { VIRTIONET_F_MAC,                 "Host has given MAC address." },
+        { VIRTIONET_F_GUEST_TSO4,          "Guest can receive TSOv4." },
+        { VIRTIONET_F_GUEST_TSO6,          "Guest can receive TSOv6." },
+        { VIRTIONET_F_GUEST_ECN,           "Guest can receive TSO with ECN." },
+        { VIRTIONET_F_GUEST_UFO,           "Guest can receive UFO." },
+        { VIRTIONET_F_HOST_TSO4,           "Host can receive TSOv4." },
+        { VIRTIONET_F_HOST_TSO6,           "Host can receive TSOv6." },
+        { VIRTIONET_F_HOST_ECN,            "Host can receive TSO with ECN." },
+        { VIRTIONET_F_HOST_UFO,            "Host can receive UFO." },
+        { VIRTIONET_F_MRG_RXBUF,           "Guest can merge receive buffers." },
+        { VIRTIONET_F_STATUS,              "Configuration status field is available." },
+        { VIRTIONET_F_CTRL_VQ,             "Control channel is available." },
+        { VIRTIONET_F_CTRL_RX,             "Control channel RX mode support." },
+        { VIRTIONET_F_CTRL_VLAN,           "Control channel VLAN filtering." },
+        { VIRTIONET_F_GUEST_ANNOUNCE,      "Guest can send gratuitous packets." },
+        { VIRTIONET_F_MQ,                  "Host supports multiqueue with automatic receive steering." },
+        { VIRTIONET_F_CTRL_MAC_ADDR,       "Set MAC address through control channel." }
+    };
+
+    Log3(("%s %s:\n", INSTANCE(pThis), pcszText));
+    for (unsigned i = 0; i < RT_ELEMENTS(s_aFeatures); ++i)
+    {
+        if (s_aFeatures[i].fMask & fFeatures)
+            Log3(("%s --> %s\n", INSTANCE(pThis), s_aFeatures[i].pcszDesc));
+    }
+#else  /* !LOG_ENABLED */
+    RT_NOREF3(pThis, fFeatures, pcszText);
+#endif /* !LOG_ENABLED */
+}
+
+/*
+ * Checks whether negotiated features have required flag combinations.
+ * See VirtIO 1.0 specification, Section 5.1.3.1 */
+DECLINLINE(bool) virtioNetValidateRequiredFeatures(uint32_t fFeatures)
+{
+    uint32_t fGuestCsumRequired = fFeatures & VIRTIONET_F_GUEST_TSO4
+                               || fFeatures & VIRTIONET_F_GUEST_TSO6
+                               || fFeatures & VIRTIONET_F_GUEST_UFO;
+
+    uint32_t fHostCsumRequired =  fFeatures & VIRTIONET_F_HOST_TSO4
+                               || fFeatures & VIRTIONET_F_HOST_TSO6
+                               || fFeatures & VIRTIONET_F_HOST_UFO;
+
+    uint32_t fCtrlVqRequired =    fFeatures & VIRTIONET_F_CTRL_RX
+                               || fFeatures & VIRTIONET_F_CTRL_VLAN
+                               || fFeatures & VIRTIONET_F_GUEST_ANNOUNCE
+                               || fFeatures & VIRTIONET_F_MQ
+                               || fFeatures & VIRTIONET_F_CTRL_MAC_ADDR;
+
+    if (fGuestCsumRequired && !(fFeatures & VIRTIONET_F_GUEST_CSUM))
+        return false;
+
+    if (fHostCsumRequired && !(fFeatures & VIRTIONET_F_CSUM))
+        return false;
+
+    if (fCtrlVqRequired && !(fFeatures & VIRTIONET_F_CTRL_VQ))
+        return false;
+
+    if (   fFeatures & VIRTIONET_F_GUEST_ECN
+        && !(   fFeatures & VIRTIONET_F_GUEST_TSO4
+             || fFeatures & VIRTIONET_F_GUEST_TSO6))
+                    return false;
+
+    if (   fFeatures & VIRTIONET_F_HOST_ECN
+        && !(   fFeatures & VIRTIONET_F_HOST_TSO4
+             || fFeatures & VIRTIONET_F_HOST_TSO6))
+                    return false;
+    return true;
+}
+
+/**
+ * @callback_method_impl{VIRTIOCORER3,pfnQueueNotified}
+ */
+static DECLCALLBACK(void) virtioNetR3Notified(PVIRTIOCORE pVirtio, PVIRTIOCORECC pVirtioCC, uint16_t qIdx)
+{
+    PVIRTIONET         pThis     = RT_FROM_MEMBER(pVirtio, VIRTIONET, Virtio);
+    PVIRTIONETCC       pThisCC   = RT_FROM_MEMBER(pVirtioCC, VIRTIONETCC, Virtio);
+    PPDMDEVINS         pDevIns   = pThisCC->pDevIns;
+    AssertReturnVoid(qIdx < pThis->cVirtQueues);
+    PVIRTIONETWORKER   pWorker   = &pThis->aWorkers[qIdx];
+    PVIRTIONETWORKERR3 pWorkerR3 = &pThisCC->aWorkers[qIdx];
+
+#ifdef LOG_ENABLED
+    RTLogFlush(NULL);
+#endif
+
+    Log6Func(("%s has available data\n", VIRTQNAME(qIdx)));
+    /* Wake queue's worker thread up if sleeping */
+    if (!ASMAtomicXchgBool(&pWorkerR3->fNotified, true))
+    {
+        if (ASMAtomicReadBool(&pWorkerR3->fSleeping))
+        {
+            Log6Func(("waking %s worker.\n", VIRTQNAME(qIdx)));
+            int rc = PDMDevHlpSUPSemEventSignal(pDevIns, pWorker->hEvtProcess);
+            AssertRC(rc);
+        }
+    }
+}
+
+/**
+ * @callback_method_impl{VIRTIOCORER3,pfnStatusChanged}
+ */
+static DECLCALLBACK(void) virtioNetR3StatusChanged(PVIRTIOCORE pVirtio, PVIRTIOCORECC pVirtioCC, uint32_t fVirtioReady)
+{
+    PVIRTIONET     pThis     = RT_FROM_MEMBER(pVirtio, VIRTIONET, Virtio);
+    PVIRTIONETCC   pThisCC   = RT_FROM_MEMBER(pVirtioCC, VIRTIONETCC, Virtio);
+
+    RT_NOREF5(pThis, pThisCC, pVirtio, pVirtioCC, fVirtioReady);
+}
+
+
+/*********************************************************************************************************************************
+*   Virtio Net config.                                                                                                           *
+*********************************************************************************************************************************/
+
+/**
+ * Resolves to boolean true if uOffset matches a field offset and size exactly,
+ * (or if 64-bit field, if it accesses either 32-bit part as a 32-bit access)
+ * Assumption is this critereon is mandated by VirtIO 1.0, Section 4.1.3.1)
+ * (Easily re-written to allow unaligned bounded access to a field).
+ *
+ * @param   member   - Member of VIRTIO_PCI_COMMON_CFG_T
+ * @result           - true or false
+ */
+#define MATCH_NET_CONFIG(member) \
+        (   (   RT_SIZEOFMEMB(VIRTIONET_CONFIG_T, member) == 8 \
+             && (   offConfig == RT_UOFFSETOF(VIRTIONET_CONFIG_T, member) \
+                 || offConfig == RT_UOFFSETOF(VIRTIONET_CONFIG_T, member) + sizeof(uint32_t)) \
+             && cb == sizeof(uint32_t)) \
+         || (   offConfig == RT_UOFFSETOF(VIRTIONET_CONFIG_T, member) \
+             && cb == RT_SIZEOFMEMB(VIRTIONET_CONFIG_T, member)) )
+
+#ifdef LOG_ENABLED
+# define LOG_NET_CONFIG_ACCESSOR(member) \
+        virtioCoreLogMappedIoValue(__FUNCTION__, #member, RT_SIZEOFMEMB(VIRTIONET_CONFIG_T, member), \
+                               pv, cb, offIntra, fWrite, false, 0);
+#else
+# define LOG_NET_CONFIG_ACCESSOR(member) do { } while (0)
+#endif
+
+#define NET_CONFIG_ACCESSOR(member) \
+    do \
+    { \
+        uint32_t offIntra = offConfig - RT_UOFFSETOF(VIRTIONET_CONFIG_T, member); \
+        if (fWrite) \
+            memcpy((char *)&pThis->virtioNetConfig.member + offIntra, pv, cb); \
+        else \
+            memcpy(pv, (const char *)&pThis->virtioNetConfig.member + offIntra, cb); \
+        LOG_NET_CONFIG_ACCESSOR(member); \
+    } while(0)
+
+#define NET_CONFIG_ACCESSOR_READONLY(member) \
+    do \
+    { \
+        uint32_t offIntra = offConfig - RT_UOFFSETOF(VIRTIONET_CONFIG_T, member); \
+        if (fWrite) \
+            LogFunc(("Guest attempted to write readonly virtio_pci_common_cfg.%s\n", #member)); \
+        else \
+        { \
+            memcpy(pv, (const char *)&pThis->virtioNetConfig.member + offIntra, cb); \
+            LOG_NET_CONFIG_ACCESSOR(member); \
+        } \
+    } while(0)
+
+
+#if 0
+
+static int virtioNetR3CfgAccessed(PVIRTIONET pThis, uint32_t offConfig, void *pv, uint32_t cb, bool fWrite)
+{
+    AssertReturn(pv && cb <= sizeof(uint32_t), fWrite ? VINF_SUCCESS : VINF_IOM_MMIO_UNUSED_00);
+
+    if (MATCH_NET_CONFIG(uMacAddress))
+        NET_CONFIG_ACCESSOR_READONLY(uMacAddress);
+#if VIRTIONET_HOST_FEATURES_OFFERED & VIRTIONET_F_STATUS
+    else
+    if (MATCH_NET_CONFIG(uStatus))
+        NET_CONFIG_ACCESSOR_READONLY(uStatus);
+#endif
+#if VIRTIONET_HOST_FEATURES_OFFERED & VIRTIONET_F_MQ
+    else
+    if (MATCH_NET_CONFIG(uMaxVirtqPairs))
+        NET_CONFIG_ACCESSOR_READONLY(uMaxVirtqPairs);
+#endif
+    else
+    {
+        LogFunc(("Bad access by guest to virtio_net_config: off=%u (%#x), cb=%u\n", offConfig, offConfig, cb));
+        return fWrite ? VINF_SUCCESS : VINF_IOM_MMIO_UNUSED_00;
+    }
+    return VINF_SUCCESS;
+}
+
+#undef NET_CONFIG_ACCESSOR_READONLY
+#undef NET_CONFIG_ACCESSOR
+#undef LOG_ACCESSOR
+#undef MATCH_NET_CONFIG
+
+/**
+ * @callback_method_impl{VIRTIOCORER3,pfnDevCapRead}
+ */
+static DECLCALLBACK(int) virtioNetR3DevCapRead(PPDMDEVINS pDevIns, uint32_t uOffset, void *pv, uint32_t cb)
+{
+    return virtioNetR3CfgAccessed(PDMDEVINS_2_DATA(pDevIns, PVIRTIONET), uOffset, pv, cb, false /*fRead*/);
+}
+
+/**
+ * @callback_method_impl{VIRTIOCORER3,pfnDevCapWrite}
+ */
+static DECLCALLBACK(int) virtioNetR3DevCapWrite(PPDMDEVINS pDevIns, uint32_t uOffset, const void *pv, uint32_t cb)
+{
+    return virtioNetR3CfgAccessed(PDMDEVINS_2_DATA(pDevIns, PVIRTIONET), uOffset, (void *)pv, cb, true /*fWrite*/);
+}
+
+#endif
+
+
+/*********************************************************************************************************************************
+*   Misc                                                                                                                         *
+*********************************************************************************************************************************/
+
+/**
+ * @callback_method_impl{FNDBGFHANDLERDEV, virtio-net debugger info callback.}
+ */
+static DECLCALLBACK(void) virtioNetR3Info(PPDMDEVINS pDevIns, PCDBGFINFOHLP pHlp, const char *pszArgs)
+{
+    PVIRTIONET pThis = PDMDEVINS_2_DATA(pDevIns, PVIRTIONET);
+
+    /* Parse arguments. */
+    RT_NOREF2(pThis, pszArgs); //bool fVerbose = pszArgs && strstr(pszArgs, "verbose") != NULL;
+
+    /* Show basic information. */
+    pHlp->pfnPrintf(pHlp, "%s#%d: virtio-scsci ",
+                    pDevIns->pReg->szName,
+                    pDevIns->iInstance);
+}
+
+
+/*********************************************************************************************************************************
+*   Saved state                                                                                                                  *
+*********************************************************************************************************************************/
+
+/**
+ * @callback_method_impl{FNSSMDEVLOADEXEC}
+ */
+static DECLCALLBACK(int) virtioNetR3LoadExec(PPDMDEVINS pDevIns, PSSMHANDLE pSSM, uint32_t uVersion, uint32_t uPass)
+{
+    PVIRTIONET     pThis   = PDMDEVINS_2_DATA(pDevIns, PVIRTIONET);
+    PVIRTIONETCC   pThisCC = PDMDEVINS_2_DATA_CC(pDevIns, PVIRTIONETCC);
+    PCPDMDEVHLPR3   pHlp    = pDevIns->pHlpR3;
+
+    RT_NOREF(pThisCC);
+    LogFunc(("LOAD EXEC!!\n"));
+
+    AssertReturn(uPass == SSM_PASS_FINAL, VERR_SSM_UNEXPECTED_PASS);
+    AssertLogRelMsgReturn(uVersion == VIRTIONET_SAVED_STATE_VERSION,
+                          ("uVersion=%u\n", uVersion), VERR_SSM_UNSUPPORTED_DATA_UNIT_VERSION);
+
+    virtioNetR3SetVirtqNames(pThis);
+    for (int qIdx = 0; qIdx < pThis->cVirtQueues; qIdx++)
+        pHlp->pfnSSMGetBool(pSSM, &pThis->afQueueAttached[qIdx]);
+
+
+    /*
+     * Call the virtio core to let it load its state.
+     */
+    int rc = virtioCoreR3LoadExec(&pThis->Virtio, pDevIns->pHlpR3, pSSM);
+
+    /*
+     * Nudge queue workers
+     */
+    for (int qIdx = 0; qIdx < pThis->cVirtqPairs; qIdx++)
+    {
+        if (pThis->afQueueAttached[qIdx])
+        {
+            LogFunc(("Waking %s worker.\n", VIRTQNAME(qIdx)));
+            rc = PDMDevHlpSUPSemEventSignal(pDevIns, pThis->aWorkers[qIdx].hEvtProcess);
+            AssertRCReturn(rc, rc);
+        }
+    }
+    return rc;
+}
+
+/**
+ * @callback_method_impl{FNSSMDEVSAVEEXEC}
+ */
+static DECLCALLBACK(int) virtioNetR3SaveExec(PPDMDEVINS pDevIns, PSSMHANDLE pSSM)
+{
+    PVIRTIONET     pThis   = PDMDEVINS_2_DATA(pDevIns, PVIRTIONET);
+    PVIRTIONETCC   pThisCC = PDMDEVINS_2_DATA_CC(pDevIns, PVIRTIONETCC);
+    PCPDMDEVHLPR3   pHlp    = pDevIns->pHlpR3;
+
+    RT_NOREF(pThisCC);
+
+    LogFunc(("SAVE EXEC!!\n"));
+
+    for (int qIdx = 0; qIdx < pThis->cVirtQueues; qIdx++)
+        pHlp->pfnSSMPutBool(pSSM, pThis->afQueueAttached[qIdx]);
+
+    /*
+     * Call the virtio core to let it save its state.
+     */
+    return virtioCoreR3SaveExec(&pThis->Virtio, pDevIns->pHlpR3, pSSM);
+}
+
+
+/*********************************************************************************************************************************
+*   Device interface.                                                                                                            *
+*********************************************************************************************************************************/
+
+/**
+ * @callback_method_impl{FNPDMDEVASYNCNOTIFY}
+ */
+static DECLCALLBACK(bool) virtioNetR3DeviceQuiesced(PPDMDEVINS pDevIns)
+{
+    PVIRTIONET     pThis   = PDMDEVINS_2_DATA(pDevIns, PVIRTIONET);
+    PVIRTIONETCC   pThisCC = PDMDEVINS_2_DATA_CC(pDevIns, PVIRTIONETCC);
+
+//    if (ASMAtomicReadU32(&pThis->cActiveReqs))
+//        return false;
+
+    LogFunc(("Device I/O activity quiesced: %s\n",
+        virtioCoreGetStateChangeText(pThisCC->enmQuiescingFor)));
+
+    virtioCoreR3VmStateChanged(&pThis->Virtio, pThisCC->enmQuiescingFor);
+
+    pThis->fResetting = false;
+    pThisCC->fQuiescing = false;
+
+    return true;
+}
+
+/**
+ * Worker for virtioNetR3Reset() and virtioNetR3SuspendOrPowerOff().
+ */
+static void virtioNetR3QuiesceDevice(PPDMDEVINS pDevIns, VIRTIOVMSTATECHANGED enmQuiescingFor)
+{
+    PVIRTIONET     pThis   = PDMDEVINS_2_DATA(pDevIns, PVIRTIONET);
+    PVIRTIONETCC   pThisCC = PDMDEVINS_2_DATA_CC(pDevIns, PVIRTIONETCC);
+
+    RT_NOREF(pThis);
+
+    /* Prevent worker threads from removing/processing elements from virtq's */
+    pThisCC->fQuiescing = true;
+    pThisCC->enmQuiescingFor = enmQuiescingFor;
+
+    PDMDevHlpSetAsyncNotification(pDevIns, virtioNetR3DeviceQuiesced);
+
+    /* If already quiesced invoke async callback.  */
+//    if (!ASMAtomicReadU32(&pThis->cActiveReqs))
+//        PDMDevHlpAsyncNotificationCompleted(pDevIns);
+}
+
+/**
+ * @interface_method_impl{PDMDEVREGR3,pfnReset}
+ */
+static DECLCALLBACK(void) virtioNetR3Reset(PPDMDEVINS pDevIns)
+{
+    LogFunc(("\n"));
+    PVIRTIONET pThis = PDMDEVINS_2_DATA(pDevIns, PVIRTIONET);
+    pThis->fResetting = true;
+    virtioNetR3QuiesceDevice(pDevIns, kvirtIoVmStateChangedReset);
+}
+
+/**
+ * @interface_method_impl{PDMDEVREGR3,pfnPowerOff}
+ */
+static DECLCALLBACK(void) virtioNetR3SuspendOrPowerOff(PPDMDEVINS pDevIns, VIRTIOVMSTATECHANGED enmType)
+{
+    LogFunc(("\n"));
+
+    PVIRTIONET     pThis   = PDMDEVINS_2_DATA(pDevIns, PVIRTIONET);
+    PVIRTIONETCC   pThisCC = PDMDEVINS_2_DATA_CC(pDevIns, PVIRTIONETCC);
+
+    RT_NOREF2(pThis, pThisCC);
+
+    /* VM is halted, thus no new I/O being dumped into queues by the guest.
+     * Workers have been flagged to stop pulling stuff already queued-up by the guest.
+     * Now tell lower-level to to suspend reqs (for example, DrvVD suspends all reqs
+     * on its wait queue, and we will get a callback as the state changes to
+     * suspended (and later, resumed) for each).
+     */
+
+    virtioNetR3QuiesceDevice(pDevIns, enmType);
+}
+
+/**
+ * @interface_method_impl{PDMDEVREGR3,pfnSuspend}
+ */
+static DECLCALLBACK(void) virtioNetR3PowerOff(PPDMDEVINS pDevIns)
+{
+    LogFunc(("\n"));
+    virtioNetR3SuspendOrPowerOff(pDevIns, kvirtIoVmStateChangedPowerOff);
+}
+
+/**
+ * @interface_method_impl{PDMDEVREGR3,pfnSuspend}
+ */
+static DECLCALLBACK(void) virtioNetR3Suspend(PPDMDEVINS pDevIns)
+{
+    LogFunc(("\n"));
+    virtioNetR3SuspendOrPowerOff(pDevIns, kvirtIoVmStateChangedSuspend);
+}
+
+/**
+ * @interface_method_impl{PDMDEVREGR3,pfnResume}
+ */
+static DECLCALLBACK(void) virtioNetR3Resume(PPDMDEVINS pDevIns)
+{
+    PVIRTIONET     pThis   = PDMDEVINS_2_DATA(pDevIns, PVIRTIONET);
+    PVIRTIONETCC   pThisCC = PDMDEVINS_2_DATA_CC(pDevIns, PVIRTIONETCC);
+    LogFunc(("\n"));
+
+    pThisCC->fQuiescing = false;
+
+    /* Wake worker threads flagged to skip pulling queue entries during quiesce
+     * to ensure they re-check their queues. Active request queues may already
+     * be awake due to new reqs coming in.
+     */
+/*
+    for (uint16_t qIdx = 0; qIdx < VIRTIONET_REQ_QUEUE_CNT; qIdx++)
+    {
+        if (ASMAtomicReadBool(&pThisCC->aWorkers[qIdx].fSleeping))
+        {
+            Log6Func(("waking %s worker.\n", VIRTQNAME(qIdx)));
+            int rc = PDMDevHlpSUPSemEventSignal(pDevIns, pThis->aWorkers[qIdx].hEvtProcess);
+            AssertRC(rc);
+        }
+    }
+*/
+    /* Ensure guest is working the queues too. */
+    virtioCoreR3VmStateChanged(&pThis->Virtio, kvirtIoVmStateChangedResume);
+}
+
+static void virtioNetR3Ctrl(PPDMDEVINS pDevIns, PVIRTIONET pThis, PVIRTIONETCC pThisCC, PVIRTIO_DESC_CHAIN_T pDescChain)
+{
+    RT_NOREF4(pDevIns, pThis, pThisCC, pDescChain);
+}
+static void virtioNetR3Transmit(PPDMDEVINS pDevIns, PVIRTIONET pThis, PVIRTIONETCC pThisCC, uint16_t qIdx, PVIRTIO_DESC_CHAIN_T pDescChain)
+{
+    RT_NOREF5(pDevIns, pThis, pThisCC, qIdx, pDescChain);
+}
+ static void virtioNetR3Receive(PPDMDEVINS pDevIns, PVIRTIONET pThis, PVIRTIONETCC pThisCC, uint16_t qIdx, PVIRTIO_DESC_CHAIN_T pDescChain)
+{
+    RT_NOREF5(pDevIns, pThis, pThisCC, qIdx, pDescChain);
+}
+
+/**
+ * @callback_method_impl{FNPDMTHREADWAKEUPDEV}
+ */
+static DECLCALLBACK(int) virtioNetR3WorkerWakeUp(PPDMDEVINS pDevIns, PPDMTHREAD pThread)
+{
+    PVIRTIONET pThis = PDMDEVINS_2_DATA(pDevIns, PVIRTIONET);
+    return PDMDevHlpSUPSemEventSignal(pDevIns, pThis->aWorkers[(uintptr_t)pThread->pvUser].hEvtProcess);
+}
+
+/**
+ * @callback_method_impl{FNPDMTHREADDEV}
+ */
+static DECLCALLBACK(int) virtioNetR3WorkerThread(PPDMDEVINS pDevIns, PPDMTHREAD pThread)
+{
+    uint16_t const     qIdx      = (uint16_t)(uintptr_t)pThread->pvUser;
+    PVIRTIONET         pThis     = PDMDEVINS_2_DATA(pDevIns, PVIRTIONET);
+    PVIRTIONETCC       pThisCC   = PDMDEVINS_2_DATA_CC(pDevIns, PVIRTIONETCC);
+    PVIRTIONETWORKER   pWorker   = &pThis->aWorkers[qIdx];
+    PVIRTIONETWORKERR3 pWorkerR3 = &pThisCC->aWorkers[qIdx];
+
+    if (pThread->enmState == PDMTHREADSTATE_INITIALIZING)
+        return VINF_SUCCESS;
+
+    while (pThread->enmState == PDMTHREADSTATE_RUNNING)
+    {
+        if (virtioCoreQueueIsEmpty(pDevIns, &pThis->Virtio, qIdx))
+        {
+            /* Atomic interlocks avoid missing alarm while going to sleep & notifier waking the awoken */
+            ASMAtomicWriteBool(&pWorkerR3->fSleeping, true);
+            bool fNotificationSent = ASMAtomicXchgBool(&pWorkerR3->fNotified, false);
+            if (!fNotificationSent)
+            {
+                Log6Func(("%s worker sleeping...\n", VIRTQNAME(qIdx)));
+                Assert(ASMAtomicReadBool(&pWorkerR3->fSleeping));
+                int rc = PDMDevHlpSUPSemEventWaitNoResume(pDevIns, pWorker->hEvtProcess, RT_INDEFINITE_WAIT);
+                AssertLogRelMsgReturn(RT_SUCCESS(rc) || rc == VERR_INTERRUPTED, ("%Rrc\n", rc), rc);
+                if (RT_UNLIKELY(pThread->enmState != PDMTHREADSTATE_RUNNING))
+                    return VINF_SUCCESS;
+                if (rc == VERR_INTERRUPTED)
+                    continue;
+                Log6Func(("%s worker woken\n", VIRTQNAME(qIdx)));
+                ASMAtomicWriteBool(&pWorkerR3->fNotified, false);
+            }
+            ASMAtomicWriteBool(&pWorkerR3->fSleeping, false);
+        }
+
+        if (!pThis->afQueueAttached[qIdx])
+        {
+            LogFunc(("%s queue not attached, worker aborting...\n", VIRTQNAME(qIdx)));
+            break;
+        }
+        if (!pThisCC->fQuiescing)
+        {
+             Log6Func(("fetching next descriptor chain from %s\n", VIRTQNAME(qIdx)));
+             PVIRTIO_DESC_CHAIN_T pDescChain;
+             int rc = virtioCoreR3QueueGet(pDevIns, &pThis->Virtio, qIdx, &pDescChain, true);
+             if (rc == VERR_NOT_AVAILABLE)
+             {
+                Log6Func(("Nothing found in %s\n", VIRTQNAME(qIdx)));
+                continue;
+             }
+
+             AssertRC(rc);
+             if (qIdx == CTRLQIDX)
+                 virtioNetR3Ctrl(pDevIns, pThis, pThisCC, pDescChain);
+             else if (qIdx & 1)
+                 virtioNetR3Transmit(pDevIns, pThis, pThisCC, qIdx, pDescChain);
+             else
+                 virtioNetR3Receive(pDevIns, pThis, pThisCC, qIdx, pDescChain);
+        }
+    }
+    return VINF_SUCCESS;
+}
+
+/**
+ * @interface_method_impl{PDMDEVREGR3,pfnDetach}
+ *
+ * One harddisk at one port has been unplugged.
+ * The VM is suspended at this point.
+ */
+static DECLCALLBACK(void) virtioNetR3Detach(PPDMDEVINS pDevIns, unsigned iLUN, uint32_t fFlags)
+{
+    PVIRTIONET       pThis   = PDMDEVINS_2_DATA(pDevIns, PVIRTIONET);
+    PVIRTIONETCC     pThisCC = PDMDEVINS_2_DATA_CC(pDevIns, PVIRTIONETCC);
+
+    LogFunc((""));
+
+    AssertMsg(fFlags & PDM_TACH_FLAGS_NOT_HOT_PLUG,
+              ("virtio-net: Device does not support hotplugging\n"));
+    RT_NOREF4(pThis, pThisCC, fFlags, iLUN);
+
+    /*
+     * Zero all important members.
+     */
+    pThisCC->pDrvBase       = NULL;
+}
+
+/**
+ * @interface_method_impl{PDMDEVREGR3,pfnAttach}
+ *
+ * This is called when we change block driver.
+ */
+static DECLCALLBACK(int) virtioNetR3Attach(PPDMDEVINS pDevIns, unsigned iLUN, uint32_t fFlags)
+{
+    PVIRTIONET       pThis   = PDMDEVINS_2_DATA(pDevIns, PVIRTIONET);
+    PVIRTIONETCC     pThisCC = PDMDEVINS_2_DATA_CC(pDevIns, PVIRTIONETCC);
+
+    AssertMsgReturn(fFlags & PDM_TACH_FLAGS_NOT_HOT_PLUG,
+                    ("virtio-net: Device does not support hotplugging\n"),
+                    VERR_INVALID_PARAMETER);
+
+    AssertRelease(!pThisCC->pDrvBase);
+
+    /*
+     * Try attach the NET driver and get the interfaces, required as well as optional.
+     */
+    int rc = PDMDevHlpDriverAttach(pDevIns, iLUN, &pDevIns->IBase, &pThisCC->pDrvBase, pThis->szInstanceName);
+    if (RT_FAILURE(rc))
+        AssertMsgFailed(("Failed to attach %s. rc=%Rrc\n", pThis->szInstanceName, rc));
+
+    if (RT_FAILURE(rc))
+        pThisCC->pDrvBase     = NULL;
+
+    return rc;
+}
+
+/**
+ * @interface_method_impl{PDMILEDPORTS,pfnQueryStatusLed}
+ */
+static DECLCALLBACK(int) virtioNetR3QueryStatusLed(PPDMILEDPORTS pInterface, unsigned iLUN, PPDMLED *ppLed)
+{
+    PVIRTIONETR3 pThisR3 = RT_FROM_MEMBER(pInterface, VIRTIONETR3, ILeds);
+    if (iLUN)
+        return VERR_PDM_LUN_NOT_FOUND;
+    *ppLed = &pThisR3->led;
+    return VINF_SUCCESS;
+}
+
+/**
+ * Turns on/off the write status LED.
+ *
+ * @returns VBox status code.
+ * @param   pThis          Pointer to the device state structure.
+ * @param   fOn            New LED state.
+ */
+void virtioNetR3SetWriteLed(PVIRTIONETR3 pThisR3, bool fOn)
+{
+    Log6Func(("%s\n", fOn ? "on" : "off"));
+    if (fOn)
+        pThisR3->led.Asserted.s.fWriting = pThisR3->led.Actual.s.fWriting = 1;
+    else
+        pThisR3->led.Actual.s.fWriting = fOn;
+}
+
+/**
+ * Turns on/off the read status LED.
+ *
+ * @returns VBox status code.
+ * @param   pThis          Pointer to the device state structure.
+ * @param   fOn             New LED state.
+ */
+void virtioNetR3SetReadLed(PVIRTIONETR3 pThisR3, bool fOn)
+{
+    Log6Func(("%s\n", fOn ? "on" : "off"));
+    if (fOn)
+        pThisR3->led.Asserted.s.fReading = pThisR3->led.Actual.s.fReading = 1;
+    else
+        pThisR3->led.Actual.s.fReading = fOn;
+}
+/**
+ * @interface_method_impl{PDMIBASE,pfnQueryInterface,
+ */
+static DECLCALLBACK(void *) virtioNetR3QueryInterface(struct PDMIBASE *pInterface, const char *pszIID)
+{
+    PVIRTIONETR3 pThisR3 = RT_FROM_MEMBER(pInterface, VIRTIONETR3, IBase);
+
+    PDMIBASE_RETURN_INTERFACE(pszIID, PDMINETWORKDOWN,   &pThisR3->INetworkDown);
+    PDMIBASE_RETURN_INTERFACE(pszIID, PDMINETWORKCONFIG, &pThisR3->INetworkConfig);
+    PDMIBASE_RETURN_INTERFACE(pszIID, PDMIBASE,          &pThisR3->IBase);
+    PDMIBASE_RETURN_INTERFACE(pszIID, PDMILEDPORTS,      &pThisR3->ILeds);
+    return NULL;
+}
+
+/**
+ * @interface_method_impl{PDMDEVREGR3,pfnDestruct}
+ */
+static DECLCALLBACK(int) virtioNetR3Destruct(PPDMDEVINS pDevIns)
+{
+    PDMDEV_CHECK_VERSIONS_RETURN_QUIET(pDevIns);
+    PVIRTIONET   pThis   = PDMDEVINS_2_DATA(pDevIns, PVIRTIONET);
+    PVIRTIONETCC pThisCC = PDMDEVINS_2_DATA_CC(pDevIns, PVIRTIONETCC);
+
+
+    for (unsigned qIdx = 0; qIdx < pThis->cVirtQueues; qIdx++)
+    {
+        PVIRTIONETWORKER pWorker = &pThis->aWorkers[qIdx];
+        if (pWorker->hEvtProcess != NIL_SUPSEMEVENT)
+        {
+            PDMDevHlpSUPSemEventClose(pDevIns, pWorker->hEvtProcess);
+            pWorker->hEvtProcess = NIL_SUPSEMEVENT;
+        }
+    }
+
+    virtioCoreR3Term(pDevIns, &pThis->Virtio, &pThisCC->Virtio);
+    return VINF_SUCCESS;
+}
+
+/**
+ * @interface_method_impl{PDMDEVREGR3,pfnConstruct}
+ */
+static DECLCALLBACK(int) virtioNetR3Construct(PPDMDEVINS pDevIns, int iInstance, PCFGMNODE pCfg)
+{
+    PDMDEV_CHECK_VERSIONS_RETURN(pDevIns);
+    PVIRTIONET   pThis   = PDMDEVINS_2_DATA(pDevIns, PVIRTIONET);
+    PVIRTIONETCC pThisCC = PDMDEVINS_2_DATA_CC(pDevIns, PVIRTIONETCC);
+    PCPDMDEVHLPR3 pHlp   = pDevIns->pHlpR3;
+
+    /*
+     * Quick initialization of the state data, making sure that the destructor always works.
+     */
+    LogFunc(("PDM device instance: %d\n", iInstance));
+    RTStrPrintf(pThis->szInstanceName, sizeof(pThis->szInstanceName), "VIRTIONET%d", iInstance);
+    pThisCC->pDevIns     = pDevIns;
+
+    pThisCC->IBase.pfnQueryInterface = virtioNetR3QueryInterface;
+    pThisCC->ILeds.pfnQueryStatusLed = virtioNetR3QueryStatusLed;
+    pThisCC->led.u32Magic = PDMLED_MAGIC;
+
+    /*
+     * Validate configuration.
+     */
+    PDMDEV_VALIDATE_CONFIG_RETURN(pDevIns, "MAC|CableConnected|LineSpeed|LinkUpDelay|StatNo", "");
+
+    /* Get config params */
+    int rc = pHlp->pfnCFGMQueryBytes(pCfg, "MAC", pThis->macConfigured.au8, sizeof(pThis->macConfigured));
+    if (RT_FAILURE(rc))
+        return PDMDEV_SET_ERROR(pDevIns, rc, N_("Configuration error: Failed to get MAC address"));
+
+    rc = pHlp->pfnCFGMQueryBool(pCfg, "CableConnected", &pThis->fCableConnected);
+    if (RT_FAILURE(rc))
+        return PDMDEV_SET_ERROR(pDevIns, rc, N_("Configuration error: Failed to get the value of 'CableConnected'"));
+
+    rc = pHlp->pfnCFGMQueryU32Def(pCfg, "LinkUpDelay", &pThis->cMsLinkUpDelay, 5000); /* ms */
+    if (RT_FAILURE(rc))
+        return PDMDEV_SET_ERROR(pDevIns, rc, N_("Configuration error: Failed to get the value of 'LinkUpDelay'"));
+    Assert(pThis->cMsLinkUpDelay <= 300000); /* less than 5 minutes */
+    if (pThis->cMsLinkUpDelay > 5000 || pThis->cMsLinkUpDelay < 100)
+        LogRel(("%s WARNING! Link up delay is set to %u seconds!\n", INSTANCE(pThis), pThis->cMsLinkUpDelay / 1000));
+    Log(("%s Link up delay is set to %u seconds\n", INSTANCE(pThis), pThis->cMsLinkUpDelay / 1000));
+
+    uint32_t uStatNo = iInstance;
+    rc = pHlp->pfnCFGMQueryU32Def(pCfg, "StatNo", &uStatNo, iInstance);
+    if (RT_FAILURE(rc))
+        return PDMDEV_SET_ERROR(pDevIns, rc, N_("Configuration error: Failed to get the \"StatNo\" value"));
+
+
+    /* Initialize PCI config space */
+//    memcpy(pThis->config.mac.au8, pThis->macConfigured.au8, sizeof(pThis->config.mac.au8));
+//    pThis->config.uStatus = 0;
+
+    /*
+     * Do core virtio initialization.
+     */
+
+    /* Configure virtio_scsi_config that transacts via VirtIO implementation's Dev. Specific Cap callbacks */
+    memset(pThis->virtioNetConfig.uMacAddress, 0, sizeof(pThis->virtioNetConfig.uMacAddress)); /* TBD */
+#if VIRTIONET_HOST_FEATURES_OFFERED & VIRTIONET_F_STATUS
+    pThis->virtioNetConfig.uStatus          = 0;
+#endif
+#if VIRTIONET_HOST_FEATURES_OFFERED & VIRTIONET_F_MQ
+    pThis->virtioNetConfig.uMaxVirtqPairs   = VIRTIONET_MAX_QPAIRS;
+#endif
+
+    /* Initialize the generic Virtio core: */
+    pThisCC->Virtio.pfnStatusChanged        = virtioNetR3StatusChanged;
+    pThisCC->Virtio.pfnQueueNotified        = virtioNetR3Notified;
+
+    VIRTIOPCIPARAMS VirtioPciParams;
+    VirtioPciParams.uDeviceId               = PCI_DEVICE_ID_VIRTIONET_HOST;
+    VirtioPciParams.uClassBase              = PCI_CLASS_BASE_NETWORK_CONTROLLER;
+    VirtioPciParams.uClassSub               = PCI_CLASS_SUB_NET_ETHERNET_CONTROLLER;
+    VirtioPciParams.uClassProg              = PCI_CLASS_PROG_UNSPECIFIED;
+    VirtioPciParams.uSubsystemId            = PCI_DEVICE_ID_VIRTIONET_HOST;  /* VirtIO 1.0 spec allows PCI Device ID here */
+    VirtioPciParams.uInterruptLine          = 0x00;
+    VirtioPciParams.uInterruptPin           = 0x01;
+
+    rc = virtioCoreR3Init(pDevIns, &pThis->Virtio, &pThisCC->Virtio, &VirtioPciParams, pThis->szInstanceName,
+                          VIRTIONET_HOST_FEATURES_OFFERED,
+                          &pThis->virtioNetConfig /*pvDevSpecificCap*/, sizeof(pThis->virtioNetConfig));
+    if (RT_FAILURE(rc))
+        return PDMDEV_SET_ERROR(pDevIns, rc, N_("virtio-net: failed to initialize VirtIO"));
+
+    pThis->fNegotiatedFeatures = virtioCoreGetNegotiatedFeatures(&pThis->Virtio);
+    if (!virtioNetValidateRequiredFeatures(pThis->fNegotiatedFeatures))
+        return PDMDEV_SET_ERROR(pDevIns, rc, N_("virtio-net: Required features not successfully negotiated."));
+
+    pThis->cVirtqPairs = pThis->fNegotiatedFeatures & VIRTIONET_F_MQ ? pThis->virtioNetConfig.uMaxVirtqPairs : 1;
+    pThis->cVirtQueues = pThis->cVirtqPairs + 1;
+    /*
+     * Initialize queues.
+     */
+    virtioNetR3SetVirtqNames(pThis);
+
+    /* Attach the queues and create worker threads for them: */
+    for (uint16_t qIdx = 0; qIdx < pThis->cVirtQueues; qIdx++)
+    {
+        rc = virtioCoreR3QueueAttach(&pThis->Virtio, qIdx, VIRTQNAME(qIdx));
+        if (RT_FAILURE(rc))
+            continue;
+        rc = PDMDevHlpThreadCreate(pDevIns, &pThisCC->aWorkers[qIdx].pThread,
+                                   (void *)(uintptr_t)qIdx, virtioNetR3WorkerThread,
+                                   virtioNetR3WorkerWakeUp, 0, RTTHREADTYPE_IO, VIRTQNAME(qIdx));
+        if (rc != VINF_SUCCESS)
+        {
+            LogRel(("Error creating thread for Virtual Queue %s: %Rrc\n", VIRTQNAME(qIdx), rc));
+            return rc;
+        }
+
+        rc = PDMDevHlpSUPSemEventCreate(pDevIns, &pThis->aWorkers[qIdx].hEvtProcess);
+        if (RT_FAILURE(rc))
+            return PDMDevHlpVMSetError(pDevIns, rc, RT_SRC_POS,
+                                       N_("DevVirtioNET: Failed to create SUP event semaphore"));
+        pThis->afQueueAttached[qIdx] = true;
+    }
+
+    /*
+     * Status driver (optional).
+     */
+    PPDMIBASE pUpBase;
+    rc = PDMDevHlpDriverAttach(pDevIns, PDM_STATUS_LUN, &pThisCC->IBase, &pUpBase, "Status Port");
+    if (RT_FAILURE(rc) && rc != VERR_PDM_NO_ATTACHED_DRIVER)
+        return PDMDEV_SET_ERROR(pDevIns, rc, N_("Failed to attach the status LUN"));
+    pThisCC->pLedsConnector = PDMIBASE_QUERY_INTERFACE(pUpBase, PDMILEDCONNECTORS);
+
+
+    /*
+     * Register saved state.
+     */
+    rc = PDMDevHlpSSMRegister(pDevIns, VIRTIONET_SAVED_STATE_VERSION, sizeof(*pThis),
+                              virtioNetR3SaveExec, virtioNetR3LoadExec);
+    AssertRCReturn(rc, rc);
+
+    /*
+     * Register the debugger info callback (ignore errors).
+     */
+    char szTmp[128];
+    RTStrPrintf(szTmp, sizeof(szTmp), "%s%u", pDevIns->pReg->szName, pDevIns->iInstance);
+    PDMDevHlpDBGFInfoRegister(pDevIns, szTmp, "virtio-net info", virtioNetR3Info);
+
+    return rc;
+}
+
+#else  /* !IN_RING3 */
+
+/**
+ * @callback_method_impl{PDMDEVREGR0,pfnConstruct}
+ */
+static DECLCALLBACK(int) virtioNetRZConstruct(PPDMDEVINS pDevIns)
+{
+    PDMDEV_CHECK_VERSIONS_RETURN(pDevIns);
+    PVIRTIONET   pThis   = PDMDEVINS_2_DATA(pDevIns, PVIRTIONET);
+    PVIRTIONETCC pThisCC = PDMDEVINS_2_DATA_CC(pDevIns, PVIRTIONETCC);
+
+    return virtioCoreRZInit(pDevIns, &pThis->Virtio, &pThisCC->Virtio);
+}
+
+#endif /* !IN_RING3 */
+
+
+/**
+ * The device registration structure.
+ */
+const PDMDEVREG g_DeviceVirtioNet_1_0 =
+{
+    /* .u32Version = */             PDM_DEVREG_VERSION,
+    /* .uReserved0 = */             0,
+    /* .szName = */                 "virtio-net-1-dot-0",
+    /* .fFlags = */                 PDM_DEVREG_FLAGS_DEFAULT_BITS | PDM_DEVREG_FLAGS_RZ | PDM_DEVREG_FLAGS_NEW_STYLE
+                                    | PDM_DEVREG_FLAGS_FIRST_SUSPEND_NOTIFICATION
+                                    | PDM_DEVREG_FLAGS_FIRST_POWEROFF_NOTIFICATION,
+    /* .fClass = */                 PDM_DEVREG_CLASS_NETWORK,
+    /* .cMaxInstances = */          ~0U,
+    /* .uSharedVersion = */         42,
+    /* .cbInstanceShared = */       sizeof(VIRTIONET),
+    /* .cbInstanceCC = */           sizeof(VIRTIONETCC),
+    /* .cbInstanceRC = */           sizeof(VIRTIONETRC),
+    /* .cMaxPciDevices = */         1,
+    /* .cMaxMsixVectors = */        VBOX_MSIX_MAX_ENTRIES,
+    /* .pszDescription = */         "Virtio Host NET.\n",
+#if defined(IN_RING3)
+    /* .pszRCMod = */               "VBoxDDRC.rc",
+    /* .pszR0Mod = */               "VBoxDDR0.r0",
+    /* .pfnConstruct = */           virtioNetR3Construct,
+    /* .pfnDestruct = */            virtioNetR3Destruct,
+    /* .pfnRelocate = */            NULL,
+    /* .pfnMemSetup = */            NULL,
+    /* .pfnPowerOn = */             NULL,
+    /* .pfnReset = */               virtioNetR3Reset,
+    /* .pfnSuspend = */             virtioNetR3Suspend,
+    /* .pfnResume = */              virtioNetR3Resume,
+    /* .pfnAttach = */              virtioNetR3Attach,
+    /* .pfnDetach = */              virtioNetR3Detach,
+    /* .pfnQueryInterface = */      NULL,
+    /* .pfnInitComplete = */        NULL,
+    /* .pfnPowerOff = */            virtioNetR3PowerOff,
+    /* .pfnSoftReset = */           NULL,
+    /* .pfnReserved0 = */           NULL,
+    /* .pfnReserved1 = */           NULL,
+    /* .pfnReserved2 = */           NULL,
+    /* .pfnReserved3 = */           NULL,
+    /* .pfnReserved4 = */           NULL,
+    /* .pfnReserved5 = */           NULL,
+    /* .pfnReserved6 = */           NULL,
+    /* .pfnReserved7 = */           NULL,
+#elif defined(IN_RING0)
+    /* .pfnEarlyConstruct = */      NULL,
+    /* .pfnConstruct = */           virtioNetRZConstruct,
+    /* .pfnDestruct = */            NULL,
+    /* .pfnFinalDestruct = */       NULL,
+    /* .pfnRequest = */             NULL,
+    /* .pfnReserved0 = */           NULL,
+    /* .pfnReserved1 = */           NULL,
+    /* .pfnReserved2 = */           NULL,
+    /* .pfnReserved3 = */           NULL,
+    /* .pfnReserved4 = */           NULL,
+    /* .pfnReserved5 = */           NULL,
+    /* .pfnReserved6 = */           NULL,
+    /* .pfnReserved7 = */           NULL,
+#elif defined(IN_RC)
+    /* .pfnConstruct = */           virtioNetRZConstruct,
+    /* .pfnReserved0 = */           NULL,
+    /* .pfnReserved1 = */           NULL,
+    /* .pfnReserved2 = */           NULL,
+    /* .pfnReserved3 = */           NULL,
+    /* .pfnReserved4 = */           NULL,
+    /* .pfnReserved5 = */           NULL,
+    /* .pfnReserved6 = */           NULL,
+    /* .pfnReserved7 = */           NULL,
+#else
+# error "Not in IN_RING3, IN_RING0 or IN_RC!"
+#endif
+    /* .u32VersionEnd = */          PDM_DEVREG_VERSION
+};
+
Index: /trunk/src/VBox/Devices/Storage/DevVirtioSCSI.cpp
===================================================================
--- /trunk/src/VBox/Devices/Storage/DevVirtioSCSI.cpp	(revision 82680)
+++ /trunk/src/VBox/Devices/Storage/DevVirtioSCSI.cpp	(revision 82681)
@@ -382,4 +382,5 @@
     /** Flag whether device is present. */
     bool                            fPresent;
+
     /** Media port interface. */
     PDMIMEDIAPORT                   IMediaPort;
@@ -412,4 +413,7 @@
     VIRTIOCORE                      Virtio;
 
+    /** VirtIO Host SCSI device runtime configuration parameters */
+    VIRTIOSCSI_CONFIG_T             virtioScsiConfig;
+
     bool                            fBootable;
     bool                            afPadding0[3];
@@ -442,6 +446,4 @@
     volatile uint32_t               cActiveReqs;
 
-    /** VirtIO Host SCSI device runtime configuration parameters */
-    VIRTIOSCSI_CONFIG_T             virtioScsiConfig;
 
     /** True if the guest/driver and VirtIO framework are in the ready state */
@@ -493,7 +495,4 @@
     /** Status Target: LEDs port interface. */
     PDMILEDPORTS                    ILeds;
-
-    /** Status Target: Partner of ILeds. */
-    R3PTRTYPE(PPDMILEDCONNECTORS)   pLedsConnector;
 
     /** IMediaExPort: Media ejection notification */
@@ -2550,5 +2549,4 @@
         pTarget->pDevIns = pDevIns;
         pTarget->uTarget = uTarget;
-        pTarget->led.u32Magic = PDMLED_MAGIC;
 
         pTarget->IBase.pfnQueryInterface                 = virtioScsiR3TargetQueryInterface;
Index: /trunk/src/VBox/Devices/VirtIO/Virtio_1_0.cpp
===================================================================
--- /trunk/src/VBox/Devices/VirtIO/Virtio_1_0.cpp	(revision 82680)
+++ /trunk/src/VBox/Devices/VirtIO/Virtio_1_0.cpp	(revision 82681)
@@ -1722,6 +1722,6 @@
     AssertReturn(pVirtioCC->pfnStatusChanged, VERR_INVALID_POINTER);
     AssertReturn(pVirtioCC->pfnQueueNotified, VERR_INVALID_POINTER);
-    AssertReturn(pVirtioCC->pfnDevCapRead,    VERR_INVALID_POINTER);
-    AssertReturn(pVirtioCC->pfnDevCapWrite,   VERR_INVALID_POINTER);
+//    AssertReturn(pVirtioCC->pfnDevCapRead,    VERR_INVALID_POINTER);
+//    AssertReturn(pVirtioCC->pfnDevCapWrite,   VERR_INVALID_POINTER);
 
 #if 0 /* Until pdmR3DvHlp_PCISetIrq() impl is fixed and Assert that limits vec to 0 is removed */
Index: /trunk/src/VBox/Devices/build/VBoxDD.cpp
===================================================================
--- /trunk/src/VBox/Devices/build/VBoxDD.cpp	(revision 82680)
+++ /trunk/src/VBox/Devices/build/VBoxDD.cpp	(revision 82681)
@@ -117,4 +117,9 @@
         return rc;
 #endif
+#ifdef VBOX_WITH_VIRTIO_NET_1_0
+    rc = pCallbacks->pfnRegister(pCallbacks, &g_DeviceVirtioNet_1_0);
+    if (RT_FAILURE(rc))
+        return rc;
+#endif
 #ifdef VBOX_WITH_INIP
     rc = pCallbacks->pfnRegister(pCallbacks, &g_DeviceINIP);
Index: /trunk/src/VBox/Devices/build/VBoxDD.h
===================================================================
--- /trunk/src/VBox/Devices/build/VBoxDD.h	(revision 82680)
+++ /trunk/src/VBox/Devices/build/VBoxDD.h	(revision 82681)
@@ -57,4 +57,7 @@
 extern const PDMDEVREG g_DeviceVirtioNet;
 #endif
+#ifdef VBOX_WITH_VIRTIO_NET_1_0
+extern const PDMDEVREG g_DeviceVirtioNet_1_0;
+#endif
 #ifdef VBOX_WITH_INIP
 extern const PDMDEVREG g_DeviceINIP;
Index: /trunk/src/VBox/Devices/build/VBoxDDR0.cpp
===================================================================
--- /trunk/src/VBox/Devices/build/VBoxDDR0.cpp	(revision 82680)
+++ /trunk/src/VBox/Devices/build/VBoxDDR0.cpp	(revision 82681)
@@ -60,4 +60,7 @@
 #ifdef VBOX_WITH_VIRTIO
     &g_DeviceVirtioNet,
+#endif
+#ifdef VBOX_WITH_VIRTIO_NET_1_0
+    &g_DeviceVirtioNet_1_0,
 #endif
     &g_DeviceICHAC97,
Index: /trunk/src/VBox/Frontends/VBoxManage/VBoxManageInfo.cpp
===================================================================
--- /trunk/src/VBox/Frontends/VBoxManage/VBoxManageInfo.cpp	(revision 82680)
+++ /trunk/src/VBox/Frontends/VBoxManage/VBoxManageInfo.cpp	(revision 82681)
@@ -1457,4 +1457,8 @@
 #ifdef VBOX_WITH_VIRTIO
                     case NetworkAdapterType_Virtio:     pszNICType = "virtio";      break;
+
+#endif
+#ifdef VBOX_WITH_VIRTIO_NET_1_0
+                    case NetworkAdapterType_Virtio_1_0: pszNICType = "virtio_1.0";  break;
 #endif
                     default: AssertFailed();            pszNICType = "unknown";     break;
Index: /trunk/src/VBox/Frontends/VBoxManage/VBoxManageModifyVM.cpp
===================================================================
--- /trunk/src/VBox/Frontends/VBoxManage/VBoxManageModifyVM.cpp	(revision 82680)
+++ /trunk/src/VBox/Frontends/VBoxManage/VBoxManageModifyVM.cpp	(revision 82681)
@@ -1498,4 +1498,10 @@
                 }
 #endif /* VBOX_WITH_VIRTIO */
+#ifdef VBOX_WITH_VIRTIO_NET_1_0
+                else if (!RTStrICmp(ValueUnion.psz, "virtio_1.0"))
+                {
+                    CHECK_ERROR(nic, COMSETTER(AdapterType)(NetworkAdapterType_Virtio_1_0));
+                }
+#endif /* VBOX_WITH_VIRTIO_NET_1_0 */
                 else
                 {
Index: /trunk/src/VBox/Frontends/VBoxShell/vboxshell.py
===================================================================
--- /trunk/src/VBox/Frontends/VBoxShell/vboxshell.py	(revision 82680)
+++ /trunk/src/VBox/Frontends/VBoxShell/vboxshell.py	(revision 82681)
@@ -1657,4 +1657,6 @@
     elif (natype == ctx['global'].constants.NetworkAdapterType_Virtio):
         return "virtio"
+    elif (natype == ctx['global'].constants.NetworkAdapterType_Virtio_1_0):
+        return "virtio_1.0"
     elif (natype == ctx['global'].constants.NetworkAdapterType_Null):
         return None
Index: /trunk/src/VBox/Frontends/VirtualBox/src/converter/UIConverterBackendCOM.cpp
===================================================================
--- /trunk/src/VBox/Frontends/VirtualBox/src/converter/UIConverterBackendCOM.cpp	(revision 82680)
+++ /trunk/src/VBox/Frontends/VirtualBox/src/converter/UIConverterBackendCOM.cpp	(revision 82681)
@@ -365,4 +365,5 @@
         case KNetworkAdapterType_Virtio:    return QApplication::translate("UICommon", "Paravirtualized Network (virtio-net)", "NetworkAdapterType");
 #endif /* VBOX_WITH_VIRTIO */
+        case KNetworkAdapterType_Virtio_1_0: return QApplication::translate("UICommon", "Paravirtualized Network (virtio-net-1-dot-0)", "NetworkAdapterType");
         case KNetworkAdapterType_Am79C960:  return QApplication::translate("UICommon", "PCnet-ISA (Am79C960)", "NetworkAdapterType");
         default: AssertMsgFailed(("No text for %d", type)); break;
Index: /trunk/src/VBox/Frontends/VirtualBox/src/settings/machine/UIMachineSettingsNetwork.cpp
===================================================================
--- /trunk/src/VBox/Frontends/VirtualBox/src/settings/machine/UIMachineSettingsNetwork.cpp	(revision 82680)
+++ /trunk/src/VBox/Frontends/VirtualBox/src/settings/machine/UIMachineSettingsNetwork.cpp	(revision 82681)
@@ -696,4 +696,10 @@
             ++iAdapterTypeIndex;
         }
+#ifdef VBOX_WITH_VIRTIO_1_0
+        m_pAdapterTypeCombo->insertItem(iAdapterTypeIndex, gpConverter->toString(KNetworkAdapterType_Virtio_1_0));
+        m_pAdapterTypeCombo->setItemData(iAdapterTypeIndex, KNetworkAdapterType_Virtio_1_0);
+        m_pAdapterTypeCombo->setItemData(iAdapterTypeIndex, m_pAdapterTypeCombo->itemText(iAdapterTypeIndex), Qt::ToolTipRole);
+        ++iAdapterTypeIndex;
+#endif /* VBOX_WITH_VIRTIO_1_0 */
 
         /* Choose requested adapter type: */
Index: /trunk/src/VBox/Frontends/VirtualBox/src/widgets/UIApplianceEditorWidget.cpp
===================================================================
--- /trunk/src/VBox/Frontends/VirtualBox/src/widgets/UIApplianceEditorWidget.cpp	(revision 82680)
+++ /trunk/src/VBox/Frontends/VirtualBox/src/widgets/UIApplianceEditorWidget.cpp	(revision 82681)
@@ -841,4 +841,7 @@
                 }
                 /* Pass editor back: */
+#ifdef VBOX_WITH_VIRTIO_NET_1_0
+                pComboBox->addItem(gpConverter->toString(KNetworkAdapterType_Virtio_1_0), KNetworkAdapterType_Virtio_1_0);
+#endif /* VBOX_WITH_VIRTIO */
                 pEditor = pComboBox;
                 break;
Index: /trunk/src/VBox/Main/Makefile.kmk
===================================================================
--- /trunk/src/VBox/Main/Makefile.kmk	(revision 82680)
+++ /trunk/src/VBox/Main/Makefile.kmk	(revision 82681)
@@ -145,4 +145,10 @@
 ifdef VBOX_WITH_VIRTIO
 VBOX_MAIN_DEFS += VBOX_WITH_VIRTIO
+endif
+ifdef VBOX_WITH_VIRTIO_1_0
+VBOX_MAIN_DEFS += VBOX_WITH_VIRTIO_1_0
+endif
+ifdef VBOX_WITH_VIRTIO_NET_1_0
+VBOX_MAIN_DEFS += VBOX_WITH_VIRTIO_NET_1_0
 endif
 ifdef VBOX_WITH_VMSVGA
Index: /trunk/src/VBox/Main/idl/VirtualBox.xidl
===================================================================
--- /trunk/src/VBox/Main/idl/VirtualBox.xidl	(revision 82680)
+++ /trunk/src/VBox/Main/idl/VirtualBox.xidl	(revision 82681)
@@ -19553,4 +19553,7 @@
         <desc>AMD PCnet-ISA/NE2100 network card (Am79C960).</desc>
     </const>
+    <const name="Virtio_1_0"            value="8">
+        <desc>Virtio 1.0 network device.</desc>
+    </const>
   </enum>
 
Index: /trunk/src/VBox/Main/src-client/ConsoleImpl.cpp
===================================================================
--- /trunk/src/VBox/Main/src-client/ConsoleImpl.cpp	(revision 82680)
+++ /trunk/src/VBox/Main/src-client/ConsoleImpl.cpp	(revision 82681)
@@ -1525,4 +1525,8 @@
             return "virtio-net";
 #endif
+#ifdef VBOX_WITH_VIRTIO_NET_1_0
+        case NetworkAdapterType_Virtio_1_0:
+            return "virtio-net-1-dot-0";
+#endif
         default:
             AssertFailed();
@@ -4215,4 +4219,5 @@
             notifyNatDnsChange(ptrVM.rawUVM(), "e1000", ulInstanceMax);
             notifyNatDnsChange(ptrVM.rawUVM(), "virtio-net", ulInstanceMax);
+            notifyNatDnsChange(ptrVM.rawUVM(), "virtio-net-1-dot-0", ulInstanceMax);
         }
     }
@@ -4893,5 +4898,6 @@
     AssertMsg(   (   !strcmp(pszDevice, "pcnet")
                   || !strcmp(pszDevice, "e1000")
-                  || !strcmp(pszDevice, "virtio-net"))
+                  || !strcmp(pszDevice, "virtio-net")
+                  || !strcmp(pszDevice, "virtio-net-1-dot-0"))
               && uLun == 0
               && uInstance < maxNetworkAdapters,
Index: /trunk/src/VBox/Main/src-client/ConsoleImpl2.cpp
===================================================================
--- /trunk/src/VBox/Main/src-client/ConsoleImpl2.cpp	(revision 82680)
+++ /trunk/src/VBox/Main/src-client/ConsoleImpl2.cpp	(revision 82681)
@@ -2481,4 +2481,8 @@
         InsertConfigNode(pDevices, "virtio-net", &pDevVirtioNet);
 #endif /* VBOX_WITH_VIRTIO */
+#ifdef VBOX_WITH_VIRTIO_NET_1_0
+        PCFGMNODE pDevVirtioNet1_0 = NULL;          /* Virtio network devices */
+        InsertConfigNode(pDevices, "virtio-net-1-dot-0", &pDevVirtioNet1_0);
+#endif /* VBOX_WITH_VIRTIO_NET_1_0 */
         std::list<BootNic> llBootNics;
         for (ULONG uInstance = 0; uInstance < maxNetworkAdapters; ++uInstance)
@@ -2518,4 +2522,10 @@
                     break;
 #endif /* VBOX_WITH_VIRTIO */
+#ifdef VBOX_WITH_VIRTIO_NET_1_0
+                case NetworkAdapterType_Virtio_1_0:
+                    pDev = pDevVirtioNet1_0;
+                    pszAdapterName = "virtio-net-1-dot-0";
+                    break;
+#endif /* VBOX_WITH_VIRTIO_NET_1_0 */
                 default:
                     AssertMsgFailed(("Invalid network adapter type '%d' for slot '%d'", adapterType, uInstance));
@@ -2604,4 +2614,6 @@
                     break;
                 case NetworkAdapterType_Virtio:
+                    break;
+                case NetworkAdapterType_Virtio_1_0:
                     break;
                 case NetworkAdapterType_Null:      AssertFailedBreak(); /* (compiler warnings) */
Index: /trunk/src/VBox/Main/src-server/NetworkAdapterImpl.cpp
===================================================================
--- /trunk/src/VBox/Main/src-server/NetworkAdapterImpl.cpp	(revision 82680)
+++ /trunk/src/VBox/Main/src-server/NetworkAdapterImpl.cpp	(revision 82681)
@@ -245,4 +245,7 @@
 #ifdef VBOX_WITH_VIRTIO
         case NetworkAdapterType_Virtio:
+#endif
+#ifdef VBOX_WITH_VIRTIO_NET_1_0
+        case NetworkAdapterType_Virtio_1_0:
 #endif /* VBOX_WITH_VIRTIO */
             break;
Index: /trunk/src/VBox/Main/src-server/SystemPropertiesImpl.cpp
===================================================================
--- /trunk/src/VBox/Main/src-server/SystemPropertiesImpl.cpp	(revision 82680)
+++ /trunk/src/VBox/Main/src-server/SystemPropertiesImpl.cpp	(revision 82681)
@@ -1453,4 +1453,6 @@
         NetworkAdapterType_I82545EM,
         NetworkAdapterType_Virtio,
+        NetworkAdapterType_Virtio_1_0,
+        NetworkAdapterType_Am79C960,
     };
     aSupportedNetworkAdapterTypes.assign(aNetworkAdapterTypes,
Index: /trunk/src/VBox/Main/xml/Settings.cpp
===================================================================
--- /trunk/src/VBox/Main/xml/Settings.cpp	(revision 82680)
+++ /trunk/src/VBox/Main/xml/Settings.cpp	(revision 82681)
@@ -3913,4 +3913,6 @@
             else if (strTemp == "virtio")
                 nic.type = NetworkAdapterType_Virtio;
+            else if (strTemp == "virtio_1.0")
+                nic.type = NetworkAdapterType_Virtio_1_0;
             else
                 throw ConfigFileError(this, pelmAdapter, N_("Invalid value '%s' in Adapter/@type attribute"), strTemp.c_str());
@@ -6523,4 +6525,5 @@
                         case NetworkAdapterType_I82545EM:   pcszType = "82545EM"; break;
                         case NetworkAdapterType_Virtio:     pcszType = "virtio"; break;
+                        case NetworkAdapterType_Virtio_1_0: pcszType = "virtio_1.0"; break;
                         default: /*case NetworkAdapterType_Am79C970A:*/  pcszType = "Am79C970A"; break;
                     }
