]>
Commit | Line | Data |
---|---|---|
d314f586 NN |
1 | /* |
2 | * vhost-user.c | |
3 | * | |
4 | * Copyright (c) 2013 Virtual Open Systems Sarl. | |
5 | * | |
6 | * This work is licensed under the terms of the GNU GPL, version 2 or later. | |
7 | * See the COPYING file in the top-level directory. | |
8 | * | |
9 | */ | |
10 | ||
2744d920 | 11 | #include "qemu/osdep.h" |
d314f586 NN |
12 | #include "clients.h" |
13 | #include "net/vhost_net.h" | |
14 | #include "net/vhost-user.h" | |
4d0cf552 | 15 | #include "hw/virtio/vhost-user.h" |
4d43a603 | 16 | #include "chardev/char-fe.h" |
e688df6b | 17 | #include "qapi/error.h" |
9af23989 | 18 | #include "qapi/qapi-commands-net.h" |
03ce5744 | 19 | #include "qemu/config-file.h" |
d314f586 | 20 | #include "qemu/error-report.h" |
922a01a0 | 21 | #include "qemu/option.h" |
69b32a6c | 22 | #include "trace.h" |
d314f586 | 23 | |
703878e2 | 24 | typedef struct NetVhostUserState { |
d314f586 | 25 | NetClientState nc; |
5d300164 | 26 | CharBackend chr; /* only queue index 0 */ |
4d0cf552 | 27 | VhostUserState *vhost_user; |
d314f586 | 28 | VHostNetState *vhost_net; |
6f1de6b7 | 29 | guint watch; |
a463215b | 30 | uint64_t acked_features; |
c89804d6 | 31 | bool started; |
703878e2 | 32 | } NetVhostUserState; |
d314f586 NN |
33 | |
34 | VHostNetState *vhost_user_get_vhost_net(NetClientState *nc) | |
35 | { | |
703878e2 | 36 | NetVhostUserState *s = DO_UPCAST(NetVhostUserState, nc, nc); |
f394b2e2 | 37 | assert(nc->info->type == NET_CLIENT_DRIVER_VHOST_USER); |
d314f586 NN |
38 | return s->vhost_net; |
39 | } | |
40 | ||
a463215b MAL |
41 | uint64_t vhost_user_get_acked_features(NetClientState *nc) |
42 | { | |
703878e2 | 43 | NetVhostUserState *s = DO_UPCAST(NetVhostUserState, nc, nc); |
f394b2e2 | 44 | assert(nc->info->type == NET_CLIENT_DRIVER_VHOST_USER); |
a463215b MAL |
45 | return s->acked_features; |
46 | } | |
47 | ||
b931bfbf | 48 | static void vhost_user_stop(int queues, NetClientState *ncs[]) |
d314f586 | 49 | { |
703878e2 | 50 | NetVhostUserState *s; |
b931bfbf | 51 | int i; |
d314f586 | 52 | |
b931bfbf | 53 | for (i = 0; i < queues; i++) { |
f394b2e2 | 54 | assert(ncs[i]->info->type == NET_CLIENT_DRIVER_VHOST_USER); |
d314f586 | 55 | |
703878e2 | 56 | s = DO_UPCAST(NetVhostUserState, nc, ncs[i]); |
d314f586 | 57 | |
b931bfbf | 58 | if (s->vhost_net) { |
a463215b | 59 | /* save acked features */ |
e6bcb1b6 MAL |
60 | uint64_t features = vhost_net_get_acked_features(s->vhost_net); |
61 | if (features) { | |
62 | s->acked_features = features; | |
63 | } | |
b931bfbf | 64 | vhost_net_cleanup(s->vhost_net); |
b931bfbf CO |
65 | } |
66 | } | |
d314f586 NN |
67 | } |
68 | ||
4d0cf552 TB |
69 | static int vhost_user_start(int queues, NetClientState *ncs[], |
70 | VhostUserState *be) | |
d314f586 | 71 | { |
b931bfbf | 72 | VhostNetOptions options; |
e6bcb1b6 | 73 | struct vhost_net *net = NULL; |
703878e2 | 74 | NetVhostUserState *s; |
b931bfbf CO |
75 | int max_queues; |
76 | int i; | |
77 | ||
78 | options.backend_type = VHOST_BACKEND_TYPE_USER; | |
79 | ||
80 | for (i = 0; i < queues; i++) { | |
f394b2e2 | 81 | assert(ncs[i]->info->type == NET_CLIENT_DRIVER_VHOST_USER); |
b931bfbf | 82 | |
703878e2 | 83 | s = DO_UPCAST(NetVhostUserState, nc, ncs[i]); |
b931bfbf CO |
84 | |
85 | options.net_backend = ncs[i]; | |
5d300164 | 86 | options.opaque = be; |
69e87b32 | 87 | options.busyloop_timeout = 0; |
e6bcb1b6 MAL |
88 | net = vhost_net_init(&options); |
89 | if (!net) { | |
9af9e0fe | 90 | error_report("failed to init vhost_net for queue %d", i); |
b931bfbf CO |
91 | goto err; |
92 | } | |
93 | ||
94 | if (i == 0) { | |
e6bcb1b6 | 95 | max_queues = vhost_net_get_max_queues(net); |
b931bfbf | 96 | if (queues > max_queues) { |
9af9e0fe MA |
97 | error_report("you are asking more queues than supported: %d", |
98 | max_queues); | |
b931bfbf CO |
99 | goto err; |
100 | } | |
101 | } | |
e6bcb1b6 MAL |
102 | |
103 | if (s->vhost_net) { | |
104 | vhost_net_cleanup(s->vhost_net); | |
105 | g_free(s->vhost_net); | |
106 | } | |
107 | s->vhost_net = net; | |
d314f586 NN |
108 | } |
109 | ||
b931bfbf CO |
110 | return 0; |
111 | ||
112 | err: | |
e6bcb1b6 MAL |
113 | if (net) { |
114 | vhost_net_cleanup(net); | |
a38a498d | 115 | g_free(net); |
e6bcb1b6 MAL |
116 | } |
117 | vhost_user_stop(i, ncs); | |
b931bfbf | 118 | return -1; |
d314f586 NN |
119 | } |
120 | ||
f6f56291 TC |
121 | static ssize_t vhost_user_receive(NetClientState *nc, const uint8_t *buf, |
122 | size_t size) | |
123 | { | |
3e866365 TC |
124 | /* In case of RARP (message size is 60) notify backup to send a fake RARP. |
125 | This fake RARP will be sent by backend only for guest | |
126 | without GUEST_ANNOUNCE capability. | |
f6f56291 | 127 | */ |
3e866365 | 128 | if (size == 60) { |
703878e2 | 129 | NetVhostUserState *s = DO_UPCAST(NetVhostUserState, nc, nc); |
3e866365 TC |
130 | int r; |
131 | static int display_rarp_failure = 1; | |
132 | char mac_addr[6]; | |
133 | ||
134 | /* extract guest mac address from the RARP message */ | |
135 | memcpy(mac_addr, &buf[6], 6); | |
136 | ||
137 | r = vhost_net_notify_migration_done(s->vhost_net, mac_addr); | |
138 | ||
139 | if ((r != 0) && (display_rarp_failure)) { | |
140 | fprintf(stderr, | |
141 | "Vhost user backend fails to broadcast fake RARP\n"); | |
142 | fflush(stderr); | |
143 | display_rarp_failure = 0; | |
144 | } | |
145 | } | |
146 | ||
f6f56291 TC |
147 | return size; |
148 | } | |
149 | ||
4d0cf552 | 150 | static void net_vhost_user_cleanup(NetClientState *nc) |
d314f586 | 151 | { |
703878e2 | 152 | NetVhostUserState *s = DO_UPCAST(NetVhostUserState, nc, nc); |
d314f586 | 153 | |
b931bfbf CO |
154 | if (s->vhost_net) { |
155 | vhost_net_cleanup(s->vhost_net); | |
e6bcb1b6 | 156 | g_free(s->vhost_net); |
b931bfbf CO |
157 | s->vhost_net = NULL; |
158 | } | |
c39860e6 | 159 | if (nc->queue_index == 0) { |
41d4e5ec YW |
160 | if (s->watch) { |
161 | g_source_remove(s->watch); | |
162 | s->watch = 0; | |
163 | } | |
1ce2610c | 164 | qemu_chr_fe_deinit(&s->chr, true); |
4d0cf552 TB |
165 | if (s->vhost_user) { |
166 | vhost_user_cleanup(s->vhost_user); | |
167 | g_free(s->vhost_user); | |
168 | s->vhost_user = NULL; | |
169 | } | |
25f0d2aa | 170 | } |
b931bfbf | 171 | |
d314f586 NN |
172 | qemu_purge_queued_packets(nc); |
173 | } | |
174 | ||
ba288898 PB |
175 | static int vhost_user_set_vnet_endianness(NetClientState *nc, |
176 | bool enable) | |
177 | { | |
178 | /* Nothing to do. If the server supports | |
179 | * VHOST_USER_PROTOCOL_F_CROSS_ENDIAN, it will get the | |
180 | * vnet header endianness from there. If it doesn't, negotiation | |
181 | * fails. | |
182 | */ | |
183 | return 0; | |
184 | } | |
185 | ||
d314f586 NN |
186 | static bool vhost_user_has_vnet_hdr(NetClientState *nc) |
187 | { | |
f394b2e2 | 188 | assert(nc->info->type == NET_CLIENT_DRIVER_VHOST_USER); |
d314f586 NN |
189 | |
190 | return true; | |
191 | } | |
192 | ||
193 | static bool vhost_user_has_ufo(NetClientState *nc) | |
194 | { | |
f394b2e2 | 195 | assert(nc->info->type == NET_CLIENT_DRIVER_VHOST_USER); |
d314f586 NN |
196 | |
197 | return true; | |
198 | } | |
199 | ||
200 | static NetClientInfo net_vhost_user_info = { | |
f394b2e2 | 201 | .type = NET_CLIENT_DRIVER_VHOST_USER, |
703878e2 | 202 | .size = sizeof(NetVhostUserState), |
f6f56291 | 203 | .receive = vhost_user_receive, |
4d0cf552 | 204 | .cleanup = net_vhost_user_cleanup, |
d314f586 NN |
205 | .has_vnet_hdr = vhost_user_has_vnet_hdr, |
206 | .has_ufo = vhost_user_has_ufo, | |
ba288898 PB |
207 | .set_vnet_be = vhost_user_set_vnet_endianness, |
208 | .set_vnet_le = vhost_user_set_vnet_endianness, | |
d314f586 NN |
209 | }; |
210 | ||
a6553598 TM |
211 | static gboolean net_vhost_user_watch(GIOChannel *chan, GIOCondition cond, |
212 | void *opaque) | |
213 | { | |
703878e2 | 214 | NetVhostUserState *s = opaque; |
a6553598 | 215 | |
5345fdb4 | 216 | qemu_chr_fe_disconnect(&s->chr); |
a6553598 | 217 | |
e7c83a88 MAL |
218 | return TRUE; |
219 | } | |
220 | ||
083b266f | 221 | static void net_vhost_user_event(void *opaque, QEMUChrEvent event); |
e7c83a88 MAL |
222 | |
223 | static void chr_closed_bh(void *opaque) | |
224 | { | |
225 | const char *name = opaque; | |
226 | NetClientState *ncs[MAX_QUEUE_NUM]; | |
703878e2 | 227 | NetVhostUserState *s; |
e7c83a88 | 228 | Error *err = NULL; |
f66337bd | 229 | int queues, i; |
e7c83a88 MAL |
230 | |
231 | queues = qemu_find_net_clients_except(name, ncs, | |
232 | NET_CLIENT_DRIVER_NIC, | |
233 | MAX_QUEUE_NUM); | |
234 | assert(queues < MAX_QUEUE_NUM); | |
235 | ||
703878e2 | 236 | s = DO_UPCAST(NetVhostUserState, nc, ncs[0]); |
e7c83a88 | 237 | |
f66337bd HZ |
238 | for (i = queues -1; i >= 0; i--) { |
239 | s = DO_UPCAST(NetVhostUserState, nc, ncs[i]); | |
240 | ||
241 | if (s->vhost_net) { | |
242 | s->acked_features = vhost_net_get_acked_features(s->vhost_net); | |
243 | } | |
c6beefd6 AM |
244 | } |
245 | ||
e7c83a88 | 246 | qmp_set_link(name, false, &err); |
e7c83a88 MAL |
247 | |
248 | qemu_chr_fe_set_handlers(&s->chr, NULL, NULL, net_vhost_user_event, | |
81517ba3 | 249 | NULL, opaque, NULL, true); |
e7c83a88 MAL |
250 | |
251 | if (err) { | |
252 | error_report_err(err); | |
253 | } | |
a6553598 TM |
254 | } |
255 | ||
083b266f | 256 | static void net_vhost_user_event(void *opaque, QEMUChrEvent event) |
d314f586 | 257 | { |
b931bfbf CO |
258 | const char *name = opaque; |
259 | NetClientState *ncs[MAX_QUEUE_NUM]; | |
703878e2 | 260 | NetVhostUserState *s; |
0ec7b3e7 | 261 | Chardev *chr; |
b931bfbf CO |
262 | Error *err = NULL; |
263 | int queues; | |
d314f586 | 264 | |
b931bfbf | 265 | queues = qemu_find_net_clients_except(name, ncs, |
f394b2e2 | 266 | NET_CLIENT_DRIVER_NIC, |
b931bfbf | 267 | MAX_QUEUE_NUM); |
c1bf3531 MAL |
268 | assert(queues < MAX_QUEUE_NUM); |
269 | ||
703878e2 | 270 | s = DO_UPCAST(NetVhostUserState, nc, ncs[0]); |
5345fdb4 MAL |
271 | chr = qemu_chr_fe_get_driver(&s->chr); |
272 | trace_vhost_user_event(chr->label, event); | |
d314f586 NN |
273 | switch (event) { |
274 | case CHR_EVENT_OPENED: | |
4d0cf552 | 275 | if (vhost_user_start(queues, ncs, s->vhost_user) < 0) { |
5345fdb4 | 276 | qemu_chr_fe_disconnect(&s->chr); |
0d572afd | 277 | return; |
b931bfbf | 278 | } |
e7c83a88 MAL |
279 | s->watch = qemu_chr_fe_add_watch(&s->chr, G_IO_HUP, |
280 | net_vhost_user_watch, s); | |
b931bfbf | 281 | qmp_set_link(name, true, &err); |
c89804d6 | 282 | s->started = true; |
d314f586 NN |
283 | break; |
284 | case CHR_EVENT_CLOSED: | |
e7c83a88 MAL |
285 | /* a close event may happen during a read/write, but vhost |
286 | * code assumes the vhost_dev remains setup, so delay the | |
287 | * stop & clear to idle. | |
288 | * FIXME: better handle failure in vhost code, remove bh | |
289 | */ | |
290 | if (s->watch) { | |
291 | AioContext *ctx = qemu_get_current_aio_context(); | |
292 | ||
293 | g_source_remove(s->watch); | |
294 | s->watch = 0; | |
81517ba3 | 295 | qemu_chr_fe_set_handlers(&s->chr, NULL, NULL, NULL, NULL, |
e7c83a88 MAL |
296 | NULL, NULL, false); |
297 | ||
298 | aio_bh_schedule_oneshot(ctx, chr_closed_bh, opaque); | |
299 | } | |
d314f586 | 300 | break; |
d0ab6769 PMD |
301 | case CHR_EVENT_BREAK: |
302 | case CHR_EVENT_MUX_IN: | |
303 | case CHR_EVENT_MUX_OUT: | |
304 | /* Ignore */ | |
305 | break; | |
d314f586 | 306 | } |
b931bfbf CO |
307 | |
308 | if (err) { | |
309 | error_report_err(err); | |
310 | } | |
d314f586 NN |
311 | } |
312 | ||
313 | static int net_vhost_user_init(NetClientState *peer, const char *device, | |
0ec7b3e7 | 314 | const char *name, Chardev *chr, |
b931bfbf | 315 | int queues) |
d314f586 | 316 | { |
32a6ebec | 317 | Error *err = NULL; |
c89804d6 | 318 | NetClientState *nc, *nc0 = NULL; |
4d0cf552 | 319 | NetVhostUserState *s = NULL; |
0b99f224 | 320 | VhostUserState *user; |
b931bfbf | 321 | int i; |
d314f586 | 322 | |
c1bf3531 MAL |
323 | assert(name); |
324 | assert(queues > 0); | |
325 | ||
0b99f224 | 326 | user = g_new0(struct VhostUserState, 1); |
b931bfbf CO |
327 | for (i = 0; i < queues; i++) { |
328 | nc = qemu_new_net_client(&net_vhost_user_info, peer, device, name); | |
b931bfbf CO |
329 | snprintf(nc->info_str, sizeof(nc->info_str), "vhost-user%d to %s", |
330 | i, chr->label); | |
b931bfbf | 331 | nc->queue_index = i; |
5d300164 MAL |
332 | if (!nc0) { |
333 | nc0 = nc; | |
703878e2 | 334 | s = DO_UPCAST(NetVhostUserState, nc, nc); |
0b99f224 MAL |
335 | if (!qemu_chr_fe_init(&s->chr, chr, &err) || |
336 | !vhost_user_init(user, &s->chr, &err)) { | |
5d300164 | 337 | error_report_err(err); |
4d0cf552 | 338 | goto err; |
5d300164 | 339 | } |
32a6ebec | 340 | } |
4d0cf552 TB |
341 | s = DO_UPCAST(NetVhostUserState, nc, nc); |
342 | s->vhost_user = user; | |
b931bfbf | 343 | } |
d345ed2d | 344 | |
703878e2 | 345 | s = DO_UPCAST(NetVhostUserState, nc, nc0); |
c89804d6 | 346 | do { |
5345fdb4 | 347 | if (qemu_chr_fe_wait_connected(&s->chr, &err) < 0) { |
c89804d6 | 348 | error_report_err(err); |
4d0cf552 | 349 | goto err; |
c89804d6 | 350 | } |
5345fdb4 | 351 | qemu_chr_fe_set_handlers(&s->chr, NULL, NULL, |
81517ba3 AN |
352 | net_vhost_user_event, NULL, nc0->name, NULL, |
353 | true); | |
c89804d6 | 354 | } while (!s->started); |
d314f586 | 355 | |
1a5b68ce MAL |
356 | assert(s->vhost_net); |
357 | ||
d314f586 | 358 | return 0; |
4d0cf552 TB |
359 | |
360 | err: | |
361 | if (user) { | |
362 | vhost_user_cleanup(user); | |
363 | g_free(user); | |
364 | if (s) { | |
365 | s->vhost_user = NULL; | |
366 | } | |
367 | } | |
c67daf4a | 368 | if (nc0) { |
369 | qemu_del_net_client(nc0); | |
370 | } | |
4d0cf552 TB |
371 | |
372 | return -1; | |
d314f586 NN |
373 | } |
374 | ||
0ec7b3e7 | 375 | static Chardev *net_vhost_claim_chardev( |
81904831 | 376 | const NetdevVhostUserOptions *opts, Error **errp) |
03ce5744 | 377 | { |
0ec7b3e7 | 378 | Chardev *chr = qemu_chr_find(opts->chardev); |
03ce5744 NN |
379 | |
380 | if (chr == NULL) { | |
81904831 | 381 | error_setg(errp, "chardev \"%s\" not found", opts->chardev); |
03ce5744 NN |
382 | return NULL; |
383 | } | |
384 | ||
0a73336d DB |
385 | if (!qemu_chr_has_feature(chr, QEMU_CHAR_FEATURE_RECONNECTABLE)) { |
386 | error_setg(errp, "chardev \"%s\" is not reconnectable", | |
387 | opts->chardev); | |
03ce5744 NN |
388 | return NULL; |
389 | } | |
0a73336d DB |
390 | if (!qemu_chr_has_feature(chr, QEMU_CHAR_FEATURE_FD_PASS)) { |
391 | error_setg(errp, "chardev \"%s\" does not support FD passing", | |
81904831 | 392 | opts->chardev); |
03ce5744 NN |
393 | return NULL; |
394 | } | |
395 | ||
03ce5744 NN |
396 | return chr; |
397 | } | |
398 | ||
28d0de7a | 399 | static int net_vhost_check_net(void *opaque, QemuOpts *opts, Error **errp) |
03ce5744 NN |
400 | { |
401 | const char *name = opaque; | |
402 | const char *driver, *netdev; | |
03ce5744 NN |
403 | |
404 | driver = qemu_opt_get(opts, "driver"); | |
405 | netdev = qemu_opt_get(opts, "netdev"); | |
406 | ||
407 | if (!driver || !netdev) { | |
408 | return 0; | |
409 | } | |
410 | ||
411 | if (strcmp(netdev, name) == 0 && | |
d9d26114 | 412 | !g_str_has_prefix(driver, "virtio-net-")) { |
81904831 | 413 | error_setg(errp, "vhost-user requires frontend driver virtio-net-*"); |
03ce5744 NN |
414 | return -1; |
415 | } | |
416 | ||
417 | return 0; | |
418 | } | |
419 | ||
cebea510 | 420 | int net_init_vhost_user(const Netdev *netdev, const char *name, |
a30ecde6 | 421 | NetClientState *peer, Error **errp) |
d314f586 | 422 | { |
b931bfbf | 423 | int queues; |
03ce5744 | 424 | const NetdevVhostUserOptions *vhost_user_opts; |
0ec7b3e7 | 425 | Chardev *chr; |
03ce5744 | 426 | |
f394b2e2 EB |
427 | assert(netdev->type == NET_CLIENT_DRIVER_VHOST_USER); |
428 | vhost_user_opts = &netdev->u.vhost_user; | |
03ce5744 | 429 | |
0a73336d | 430 | chr = net_vhost_claim_chardev(vhost_user_opts, errp); |
03ce5744 | 431 | if (!chr) { |
03ce5744 NN |
432 | return -1; |
433 | } | |
434 | ||
435 | /* verify net frontend */ | |
436 | if (qemu_opts_foreach(qemu_find_opts("device"), net_vhost_check_net, | |
81904831 | 437 | (char *)name, errp)) { |
03ce5744 NN |
438 | return -1; |
439 | } | |
440 | ||
b931bfbf | 441 | queues = vhost_user_opts->has_queues ? vhost_user_opts->queues : 1; |
fff4e48e | 442 | if (queues < 1 || queues > MAX_QUEUE_NUM) { |
6f6f9512 | 443 | error_setg(errp, |
fff4e48e IM |
444 | "vhost-user number of queues must be in range [1, %d]", |
445 | MAX_QUEUE_NUM); | |
6f6f9512 VK |
446 | return -1; |
447 | } | |
03ce5744 | 448 | |
b931bfbf | 449 | return net_vhost_user_init(peer, "vhost_user", name, chr, queues); |
d314f586 | 450 | } |