]> Git Repo - qemu.git/blame - hw/virtio/vhost-user.c
cmd646: add to storage category
[qemu.git] / hw / virtio / vhost-user.c
CommitLineData
5f6f6664
NN
1/*
2 * vhost-user
3 *
4 * Copyright (c) 2013 Virtual Open Systems Sarl.
5 *
6 * This work is licensed under the terms of the GNU GPL, version 2 or later.
7 * See the COPYING file in the top-level directory.
8 *
9 */
10
11#include "hw/virtio/vhost.h"
12#include "hw/virtio/vhost-backend.h"
3e866365 13#include "hw/virtio/virtio-net.h"
5f6f6664
NN
14#include "sysemu/char.h"
15#include "sysemu/kvm.h"
16#include "qemu/error-report.h"
17#include "qemu/sockets.h"
3fd74b84 18#include "exec/ram_addr.h"
d2fc4402 19#include "migration/migration.h"
5f6f6664
NN
20
21#include <fcntl.h>
22#include <unistd.h>
23#include <sys/ioctl.h>
24#include <sys/socket.h>
25#include <sys/un.h>
26#include <linux/vhost.h>
27
28#define VHOST_MEMORY_MAX_NREGIONS 8
dcb10c00 29#define VHOST_USER_F_PROTOCOL_FEATURES 30
e2051e9e 30
de1372d4
TC
31enum VhostUserProtocolFeature {
32 VHOST_USER_PROTOCOL_F_MQ = 0,
33 VHOST_USER_PROTOCOL_F_LOG_SHMFD = 1,
34 VHOST_USER_PROTOCOL_F_RARP = 2,
35
36 VHOST_USER_PROTOCOL_F_MAX
37};
38
39#define VHOST_USER_PROTOCOL_FEATURE_MASK ((1 << VHOST_USER_PROTOCOL_F_MAX) - 1)
5f6f6664
NN
40
41typedef enum VhostUserRequest {
42 VHOST_USER_NONE = 0,
43 VHOST_USER_GET_FEATURES = 1,
44 VHOST_USER_SET_FEATURES = 2,
45 VHOST_USER_SET_OWNER = 3,
d1f8b30e 46 VHOST_USER_RESET_DEVICE = 4,
5f6f6664
NN
47 VHOST_USER_SET_MEM_TABLE = 5,
48 VHOST_USER_SET_LOG_BASE = 6,
49 VHOST_USER_SET_LOG_FD = 7,
50 VHOST_USER_SET_VRING_NUM = 8,
51 VHOST_USER_SET_VRING_ADDR = 9,
52 VHOST_USER_SET_VRING_BASE = 10,
53 VHOST_USER_GET_VRING_BASE = 11,
54 VHOST_USER_SET_VRING_KICK = 12,
55 VHOST_USER_SET_VRING_CALL = 13,
56 VHOST_USER_SET_VRING_ERR = 14,
dcb10c00
MT
57 VHOST_USER_GET_PROTOCOL_FEATURES = 15,
58 VHOST_USER_SET_PROTOCOL_FEATURES = 16,
e2051e9e 59 VHOST_USER_GET_QUEUE_NUM = 17,
7263a0ad 60 VHOST_USER_SET_VRING_ENABLE = 18,
3e866365 61 VHOST_USER_SEND_RARP = 19,
5f6f6664
NN
62 VHOST_USER_MAX
63} VhostUserRequest;
64
65typedef struct VhostUserMemoryRegion {
66 uint64_t guest_phys_addr;
67 uint64_t memory_size;
68 uint64_t userspace_addr;
3fd74b84 69 uint64_t mmap_offset;
5f6f6664
NN
70} VhostUserMemoryRegion;
71
72typedef struct VhostUserMemory {
73 uint32_t nregions;
74 uint32_t padding;
75 VhostUserMemoryRegion regions[VHOST_MEMORY_MAX_NREGIONS];
76} VhostUserMemory;
77
78typedef struct VhostUserMsg {
79 VhostUserRequest request;
80
81#define VHOST_USER_VERSION_MASK (0x3)
82#define VHOST_USER_REPLY_MASK (0x1<<2)
83 uint32_t flags;
84 uint32_t size; /* the following payload size */
85 union {
86#define VHOST_USER_VRING_IDX_MASK (0xff)
87#define VHOST_USER_VRING_NOFD_MASK (0x1<<8)
88 uint64_t u64;
89 struct vhost_vring_state state;
90 struct vhost_vring_addr addr;
91 VhostUserMemory memory;
92 };
93} QEMU_PACKED VhostUserMsg;
94
95static VhostUserMsg m __attribute__ ((unused));
96#define VHOST_USER_HDR_SIZE (sizeof(m.request) \
97 + sizeof(m.flags) \
98 + sizeof(m.size))
99
100#define VHOST_USER_PAYLOAD_SIZE (sizeof(m) - VHOST_USER_HDR_SIZE)
101
102/* The version of the protocol we support */
103#define VHOST_USER_VERSION (0x1)
104
105static bool ioeventfd_enabled(void)
106{
107 return kvm_enabled() && kvm_eventfds_enabled();
108}
109
5f6f6664
NN
110static int vhost_user_read(struct vhost_dev *dev, VhostUserMsg *msg)
111{
112 CharDriverState *chr = dev->opaque;
113 uint8_t *p = (uint8_t *) msg;
114 int r, size = VHOST_USER_HDR_SIZE;
115
116 r = qemu_chr_fe_read_all(chr, p, size);
117 if (r != size) {
ab7c5aaf 118 error_report("Failed to read msg header. Read %d instead of %d.", r,
5f6f6664
NN
119 size);
120 goto fail;
121 }
122
123 /* validate received flags */
124 if (msg->flags != (VHOST_USER_REPLY_MASK | VHOST_USER_VERSION)) {
125 error_report("Failed to read msg header."
ab7c5aaf 126 " Flags 0x%x instead of 0x%x.", msg->flags,
5f6f6664
NN
127 VHOST_USER_REPLY_MASK | VHOST_USER_VERSION);
128 goto fail;
129 }
130
131 /* validate message size is sane */
132 if (msg->size > VHOST_USER_PAYLOAD_SIZE) {
133 error_report("Failed to read msg header."
ab7c5aaf 134 " Size %d exceeds the maximum %zu.", msg->size,
5f6f6664
NN
135 VHOST_USER_PAYLOAD_SIZE);
136 goto fail;
137 }
138
139 if (msg->size) {
140 p += VHOST_USER_HDR_SIZE;
141 size = msg->size;
142 r = qemu_chr_fe_read_all(chr, p, size);
143 if (r != size) {
144 error_report("Failed to read msg payload."
ab7c5aaf 145 " Read %d instead of %d.", r, msg->size);
5f6f6664
NN
146 goto fail;
147 }
148 }
149
150 return 0;
151
152fail:
153 return -1;
154}
155
21e70425
MAL
156static bool vhost_user_one_time_request(VhostUserRequest request)
157{
158 switch (request) {
159 case VHOST_USER_SET_OWNER:
160 case VHOST_USER_RESET_DEVICE:
161 case VHOST_USER_SET_MEM_TABLE:
162 case VHOST_USER_GET_QUEUE_NUM:
163 return true;
164 default:
165 return false;
166 }
167}
168
169/* most non-init callers ignore the error */
5f6f6664
NN
170static int vhost_user_write(struct vhost_dev *dev, VhostUserMsg *msg,
171 int *fds, int fd_num)
172{
173 CharDriverState *chr = dev->opaque;
174 int size = VHOST_USER_HDR_SIZE + msg->size;
175
21e70425
MAL
176 /*
177 * For non-vring specific requests, like VHOST_USER_SET_MEM_TABLE,
178 * we just need send it once in the first time. For later such
179 * request, we just ignore it.
180 */
181 if (vhost_user_one_time_request(msg->request) && dev->vq_index != 0) {
182 return 0;
183 }
184
5f6f6664
NN
185 if (fd_num) {
186 qemu_chr_fe_set_msgfds(chr, fds, fd_num);
187 }
188
189 return qemu_chr_fe_write_all(chr, (const uint8_t *) msg, size) == size ?
190 0 : -1;
191}
192
21e70425
MAL
193static int vhost_user_set_log_base(struct vhost_dev *dev, uint64_t base,
194 struct vhost_log *log)
b931bfbf 195{
21e70425
MAL
196 int fds[VHOST_MEMORY_MAX_NREGIONS];
197 size_t fd_num = 0;
198 bool shmfd = virtio_has_feature(dev->protocol_features,
199 VHOST_USER_PROTOCOL_F_LOG_SHMFD);
200 VhostUserMsg msg = {
201 .request = VHOST_USER_SET_LOG_BASE,
202 .flags = VHOST_USER_VERSION,
203 .u64 = base,
204 .size = sizeof(m.u64),
205 };
206
207 if (shmfd && log->fd != -1) {
208 fds[fd_num++] = log->fd;
209 }
210
211 vhost_user_write(dev, &msg, fds, fd_num);
212
213 if (shmfd) {
214 msg.size = 0;
215 if (vhost_user_read(dev, &msg) < 0) {
216 return 0;
217 }
218
219 if (msg.request != VHOST_USER_SET_LOG_BASE) {
220 error_report("Received unexpected msg type. "
221 "Expected %d received %d",
222 VHOST_USER_SET_LOG_BASE, msg.request);
223 return -1;
224 }
b931bfbf 225 }
21e70425
MAL
226
227 return 0;
b931bfbf
CO
228}
229
21e70425
MAL
230static int vhost_user_set_mem_table(struct vhost_dev *dev,
231 struct vhost_memory *mem)
5f6f6664 232{
5f6f6664 233 int fds[VHOST_MEMORY_MAX_NREGIONS];
3fd74b84 234 int i, fd;
5f6f6664 235 size_t fd_num = 0;
21e70425
MAL
236 VhostUserMsg msg = {
237 .request = VHOST_USER_SET_MEM_TABLE,
238 .flags = VHOST_USER_VERSION,
239 };
5f6f6664 240
21e70425
MAL
241 for (i = 0; i < dev->mem->nregions; ++i) {
242 struct vhost_memory_region *reg = dev->mem->regions + i;
243 ram_addr_t ram_addr;
244
245 assert((uintptr_t)reg->userspace_addr == reg->userspace_addr);
246 qemu_ram_addr_from_host((void *)(uintptr_t)reg->userspace_addr,
247 &ram_addr);
248 fd = qemu_get_ram_fd(ram_addr);
249 if (fd > 0) {
250 msg.memory.regions[fd_num].userspace_addr = reg->userspace_addr;
251 msg.memory.regions[fd_num].memory_size = reg->memory_size;
252 msg.memory.regions[fd_num].guest_phys_addr = reg->guest_phys_addr;
253 msg.memory.regions[fd_num].mmap_offset = reg->userspace_addr -
254 (uintptr_t) qemu_get_ram_block_host_ptr(ram_addr);
255 assert(fd_num < VHOST_MEMORY_MAX_NREGIONS);
256 fds[fd_num++] = fd;
257 }
7305483a
YL
258 }
259
21e70425
MAL
260 msg.memory.nregions = fd_num;
261
262 if (!fd_num) {
263 error_report("Failed initializing vhost-user memory map, "
264 "consider using -object memory-backend-file share=on");
265 return -1;
b931bfbf
CO
266 }
267
21e70425
MAL
268 msg.size = sizeof(m.memory.nregions);
269 msg.size += sizeof(m.memory.padding);
270 msg.size += fd_num * sizeof(VhostUserMemoryRegion);
5f6f6664 271
21e70425 272 vhost_user_write(dev, &msg, fds, fd_num);
5f6f6664 273
21e70425
MAL
274 return 0;
275}
5f6f6664 276
21e70425
MAL
277static int vhost_user_set_vring_addr(struct vhost_dev *dev,
278 struct vhost_vring_addr *addr)
279{
280 VhostUserMsg msg = {
281 .request = VHOST_USER_SET_VRING_ADDR,
282 .flags = VHOST_USER_VERSION,
283 .addr = *addr,
284 .size = sizeof(*addr),
285 };
5f6f6664 286
21e70425 287 vhost_user_write(dev, &msg, NULL, 0);
5f6f6664 288
21e70425
MAL
289 return 0;
290}
5f6f6664 291
21e70425
MAL
292static int vhost_user_set_vring_endian(struct vhost_dev *dev,
293 struct vhost_vring_state *ring)
294{
295 error_report("vhost-user trying to send unhandled ioctl");
296 return -1;
297}
5f6f6664 298
21e70425
MAL
299static int vhost_set_vring(struct vhost_dev *dev,
300 unsigned long int request,
301 struct vhost_vring_state *ring)
302{
303 VhostUserMsg msg = {
304 .request = request,
305 .flags = VHOST_USER_VERSION,
306 .state = *ring,
307 .size = sizeof(*ring),
308 };
309
310 vhost_user_write(dev, &msg, NULL, 0);
311
312 return 0;
313}
314
315static int vhost_user_set_vring_num(struct vhost_dev *dev,
316 struct vhost_vring_state *ring)
317{
318 return vhost_set_vring(dev, VHOST_USER_SET_VRING_NUM, ring);
319}
320
321static int vhost_user_set_vring_base(struct vhost_dev *dev,
322 struct vhost_vring_state *ring)
323{
324 return vhost_set_vring(dev, VHOST_USER_SET_VRING_BASE, ring);
325}
326
327static int vhost_user_set_vring_enable(struct vhost_dev *dev, int enable)
328{
329 struct vhost_vring_state state = {
330 .index = dev->vq_index,
331 .num = enable,
332 };
333
334 if (!(dev->protocol_features & (1ULL << VHOST_USER_PROTOCOL_F_MQ))) {
5f6f6664 335 return -1;
5f6f6664
NN
336 }
337
21e70425
MAL
338 return vhost_set_vring(dev, VHOST_USER_SET_VRING_ENABLE, &state);
339}
340
341
342static int vhost_user_get_vring_base(struct vhost_dev *dev,
343 struct vhost_vring_state *ring)
344{
345 VhostUserMsg msg = {
346 .request = VHOST_USER_GET_VRING_BASE,
347 .flags = VHOST_USER_VERSION,
348 .state = *ring,
349 .size = sizeof(*ring),
350 };
351
352 vhost_user_write(dev, &msg, NULL, 0);
353
354 if (vhost_user_read(dev, &msg) < 0) {
5f6f6664
NN
355 return 0;
356 }
357
21e70425
MAL
358 if (msg.request != VHOST_USER_GET_VRING_BASE) {
359 error_report("Received unexpected msg type. Expected %d received %d",
360 VHOST_USER_GET_VRING_BASE, msg.request);
361 return -1;
362 }
5f6f6664 363
21e70425
MAL
364 if (msg.size != sizeof(m.state)) {
365 error_report("Received bad msg size.");
366 return -1;
5f6f6664
NN
367 }
368
21e70425
MAL
369 *ring = msg.state;
370
5f6f6664
NN
371 return 0;
372}
373
21e70425
MAL
374static int vhost_set_vring_file(struct vhost_dev *dev,
375 VhostUserRequest request,
376 struct vhost_vring_file *file)
c2bea314 377{
9a78a5dd
MAL
378 int fds[VHOST_MEMORY_MAX_NREGIONS];
379 size_t fd_num = 0;
c2bea314 380 VhostUserMsg msg = {
21e70425 381 .request = request,
c2bea314 382 .flags = VHOST_USER_VERSION,
21e70425 383 .u64 = file->index & VHOST_USER_VRING_IDX_MASK,
c2bea314
MAL
384 .size = sizeof(m.u64),
385 };
386
21e70425
MAL
387 if (ioeventfd_enabled() && file->fd > 0) {
388 fds[fd_num++] = file->fd;
389 } else {
390 msg.u64 |= VHOST_USER_VRING_NOFD_MASK;
9a78a5dd
MAL
391 }
392
393 vhost_user_write(dev, &msg, fds, fd_num);
394
21e70425
MAL
395 return 0;
396}
9a78a5dd 397
21e70425
MAL
398static int vhost_user_set_vring_kick(struct vhost_dev *dev,
399 struct vhost_vring_file *file)
400{
401 return vhost_set_vring_file(dev, VHOST_USER_SET_VRING_KICK, file);
402}
403
404static int vhost_user_set_vring_call(struct vhost_dev *dev,
405 struct vhost_vring_file *file)
406{
407 return vhost_set_vring_file(dev, VHOST_USER_SET_VRING_CALL, file);
408}
409
410static int vhost_user_set_u64(struct vhost_dev *dev, int request, uint64_t u64)
411{
412 VhostUserMsg msg = {
413 .request = request,
414 .flags = VHOST_USER_VERSION,
415 .u64 = u64,
416 .size = sizeof(m.u64),
417 };
418
419 vhost_user_write(dev, &msg, NULL, 0);
420
421 return 0;
422}
423
424static int vhost_user_set_features(struct vhost_dev *dev,
425 uint64_t features)
426{
427 return vhost_user_set_u64(dev, VHOST_USER_SET_FEATURES, features);
428}
429
430static int vhost_user_set_protocol_features(struct vhost_dev *dev,
431 uint64_t features)
432{
433 return vhost_user_set_u64(dev, VHOST_USER_SET_PROTOCOL_FEATURES, features);
434}
435
436static int vhost_user_get_u64(struct vhost_dev *dev, int request, uint64_t *u64)
437{
438 VhostUserMsg msg = {
439 .request = request,
440 .flags = VHOST_USER_VERSION,
441 };
442
443 if (vhost_user_one_time_request(request) && dev->vq_index != 0) {
444 return 0;
9a78a5dd 445 }
c2bea314 446
21e70425
MAL
447 vhost_user_write(dev, &msg, NULL, 0);
448
449 if (vhost_user_read(dev, &msg) < 0) {
450 return 0;
451 }
452
453 if (msg.request != request) {
454 error_report("Received unexpected msg type. Expected %d received %d",
455 request, msg.request);
456 return -1;
457 }
458
459 if (msg.size != sizeof(m.u64)) {
460 error_report("Received bad msg size.");
461 return -1;
462 }
463
464 *u64 = msg.u64;
465
466 return 0;
467}
468
469static int vhost_user_get_features(struct vhost_dev *dev, uint64_t *features)
470{
471 return vhost_user_get_u64(dev, VHOST_USER_GET_FEATURES, features);
472}
473
474static int vhost_user_set_owner(struct vhost_dev *dev)
475{
476 VhostUserMsg msg = {
477 .request = VHOST_USER_SET_OWNER,
478 .flags = VHOST_USER_VERSION,
479 };
480
481 vhost_user_write(dev, &msg, NULL, 0);
482
483 return 0;
484}
485
486static int vhost_user_reset_device(struct vhost_dev *dev)
487{
488 VhostUserMsg msg = {
489 .request = VHOST_USER_RESET_DEVICE,
490 .flags = VHOST_USER_VERSION,
491 };
492
493 vhost_user_write(dev, &msg, NULL, 0);
494
c2bea314
MAL
495 return 0;
496}
497
5f6f6664
NN
498static int vhost_user_init(struct vhost_dev *dev, void *opaque)
499{
21e70425 500 uint64_t features;
dcb10c00
MT
501 int err;
502
5f6f6664
NN
503 assert(dev->vhost_ops->backend_type == VHOST_BACKEND_TYPE_USER);
504
505 dev->opaque = opaque;
506
21e70425 507 err = vhost_user_get_features(dev, &features);
dcb10c00
MT
508 if (err < 0) {
509 return err;
510 }
511
512 if (virtio_has_feature(features, VHOST_USER_F_PROTOCOL_FEATURES)) {
513 dev->backend_features |= 1ULL << VHOST_USER_F_PROTOCOL_FEATURES;
514
21e70425
MAL
515 err = vhost_user_get_u64(dev, VHOST_USER_GET_PROTOCOL_FEATURES,
516 &features);
dcb10c00
MT
517 if (err < 0) {
518 return err;
519 }
520
521 dev->protocol_features = features & VHOST_USER_PROTOCOL_FEATURE_MASK;
21e70425 522 err = vhost_user_set_protocol_features(dev, dev->protocol_features);
dcb10c00
MT
523 if (err < 0) {
524 return err;
525 }
e2051e9e
YL
526
527 /* query the max queues we support if backend supports Multiple Queue */
528 if (dev->protocol_features & (1ULL << VHOST_USER_PROTOCOL_F_MQ)) {
21e70425
MAL
529 err = vhost_user_get_u64(dev, VHOST_USER_GET_QUEUE_NUM,
530 &dev->max_queues);
e2051e9e
YL
531 if (err < 0) {
532 return err;
533 }
534 }
dcb10c00
MT
535 }
536
d2fc4402
MAL
537 if (dev->migration_blocker == NULL &&
538 !virtio_has_feature(dev->protocol_features,
539 VHOST_USER_PROTOCOL_F_LOG_SHMFD)) {
540 error_setg(&dev->migration_blocker,
541 "Migration disabled: vhost-user backend lacks "
542 "VHOST_USER_PROTOCOL_F_LOG_SHMFD feature.");
543 }
544
5f6f6664
NN
545 return 0;
546}
547
548static int vhost_user_cleanup(struct vhost_dev *dev)
549{
550 assert(dev->vhost_ops->backend_type == VHOST_BACKEND_TYPE_USER);
551
552 dev->opaque = 0;
553
554 return 0;
555}
556
fc57fd99
YL
557static int vhost_user_get_vq_index(struct vhost_dev *dev, int idx)
558{
559 assert(idx >= dev->vq_index && idx < dev->vq_index + dev->nvqs);
560
561 return idx;
562}
563
2ce68e4c
IM
564static int vhost_user_memslots_limit(struct vhost_dev *dev)
565{
566 return VHOST_MEMORY_MAX_NREGIONS;
567}
568
1be0ac21
MAL
569static bool vhost_user_requires_shm_log(struct vhost_dev *dev)
570{
571 assert(dev->vhost_ops->backend_type == VHOST_BACKEND_TYPE_USER);
572
573 return virtio_has_feature(dev->protocol_features,
574 VHOST_USER_PROTOCOL_F_LOG_SHMFD);
575}
576
3e866365
TC
577static int vhost_user_migration_done(struct vhost_dev *dev, char* mac_addr)
578{
579 VhostUserMsg msg = { 0 };
580 int err;
581
582 assert(dev->vhost_ops->backend_type == VHOST_BACKEND_TYPE_USER);
583
584 /* If guest supports GUEST_ANNOUNCE do nothing */
585 if (virtio_has_feature(dev->acked_features, VIRTIO_NET_F_GUEST_ANNOUNCE)) {
586 return 0;
587 }
588
589 /* if backend supports VHOST_USER_PROTOCOL_F_RARP ask it to send the RARP */
590 if (virtio_has_feature(dev->protocol_features,
591 VHOST_USER_PROTOCOL_F_RARP)) {
592 msg.request = VHOST_USER_SEND_RARP;
593 msg.flags = VHOST_USER_VERSION;
594 memcpy((char *)&msg.u64, mac_addr, 6);
595 msg.size = sizeof(m.u64);
596
597 err = vhost_user_write(dev, &msg, NULL, 0);
598 return err;
599 }
600 return -1;
601}
602
5f6f6664
NN
603const VhostOps user_ops = {
604 .backend_type = VHOST_BACKEND_TYPE_USER,
5f6f6664 605 .vhost_backend_init = vhost_user_init,
fc57fd99 606 .vhost_backend_cleanup = vhost_user_cleanup,
2ce68e4c 607 .vhost_backend_memslots_limit = vhost_user_memslots_limit,
21e70425
MAL
608 .vhost_set_log_base = vhost_user_set_log_base,
609 .vhost_set_mem_table = vhost_user_set_mem_table,
610 .vhost_set_vring_addr = vhost_user_set_vring_addr,
611 .vhost_set_vring_endian = vhost_user_set_vring_endian,
612 .vhost_set_vring_num = vhost_user_set_vring_num,
613 .vhost_set_vring_base = vhost_user_set_vring_base,
614 .vhost_get_vring_base = vhost_user_get_vring_base,
615 .vhost_set_vring_kick = vhost_user_set_vring_kick,
616 .vhost_set_vring_call = vhost_user_set_vring_call,
617 .vhost_set_features = vhost_user_set_features,
618 .vhost_get_features = vhost_user_get_features,
619 .vhost_set_owner = vhost_user_set_owner,
620 .vhost_reset_device = vhost_user_reset_device,
621 .vhost_get_vq_index = vhost_user_get_vq_index,
622 .vhost_set_vring_enable = vhost_user_set_vring_enable,
1be0ac21 623 .vhost_requires_shm_log = vhost_user_requires_shm_log,
3e866365 624 .vhost_migration_done = vhost_user_migration_done,
fc57fd99 625};
This page took 0.168548 seconds and 4 git commands to generate.