]> git.proxmox.com Git - mirror_qemu.git/blame - util/vhost-user-server.c
osdep: make readv_writev() work with partial read/write
[mirror_qemu.git] / util / vhost-user-server.c
CommitLineData
70eb2c07
CX
1/*
2 * Sharing QEMU devices via vhost-user protocol
3 *
4 * Copyright (c) Coiby Xu <coiby.xu@gmail.com>.
5 * Copyright (c) 2020 Red Hat, Inc.
6 *
7 * This work is licensed under the terms of the GNU GPL, version 2 or
8 * later. See the COPYING file in the top-level directory.
9 */
10#include "qemu/osdep.h"
11#include "qemu/main-loop.h"
80a06cc5 12#include "qemu/vhost-user-server.h"
7185c857 13#include "block/aio-wait.h"
70eb2c07 14
7185c857
SH
15/*
16 * Theory of operation:
17 *
18 * VuServer is started and stopped by vhost_user_server_start() and
19 * vhost_user_server_stop() from the main loop thread. Starting the server
20 * opens a vhost-user UNIX domain socket and listens for incoming connections.
21 * Only one connection is allowed at a time.
22 *
23 * The connection is handled by the vu_client_trip() coroutine in the
24 * VuServer->ctx AioContext. The coroutine consists of a vu_dispatch() loop
25 * where libvhost-user calls vu_message_read() to receive the next vhost-user
26 * protocol messages over the UNIX domain socket.
27 *
28 * When virtqueues are set up libvhost-user calls set_watch() to monitor kick
29 * fds. These fds are also handled in the VuServer->ctx AioContext.
30 *
31 * Both vu_client_trip() and kick fd monitoring can be stopped by shutting down
32 * the socket connection. Shutting down the socket connection causes
33 * vu_message_read() to fail since no more data can be received from the socket.
34 * After vu_dispatch() fails, vu_client_trip() calls vu_deinit() to stop
35 * libvhost-user before terminating the coroutine. vu_deinit() calls
36 * remove_watch() to stop monitoring kick fds and this stops virtqueue
37 * processing.
38 *
39 * When vu_client_trip() has finished cleaning up it schedules a BH in the main
40 * loop thread to accept the next client connection.
41 *
42 * When libvhost-user detects an error it calls panic_cb() and sets the
43 * dev->broken flag. Both vu_client_trip() and kick fd processing stop when
44 * the dev->broken flag is set.
45 *
46 * It is possible to switch AioContexts using
47 * vhost_user_server_detach_aio_context() and
48 * vhost_user_server_attach_aio_context(). They stop monitoring fds in the old
49 * AioContext and resume monitoring in the new AioContext. The vu_client_trip()
50 * coroutine remains in a yielded state during the switch. This is made
51 * possible by QIOChannel's support for spurious coroutine re-entry in
52 * qio_channel_yield(). The coroutine will restart I/O when re-entered from the
53 * new AioContext.
54 */
55
70eb2c07
CX
56static void vmsg_close_fds(VhostUserMsg *vmsg)
57{
58 int i;
59 for (i = 0; i < vmsg->fd_num; i++) {
60 close(vmsg->fds[i]);
61 }
62}
63
64static void vmsg_unblock_fds(VhostUserMsg *vmsg)
65{
66 int i;
67 for (i = 0; i < vmsg->fd_num; i++) {
ff5927ba 68 qemu_socket_set_nonblock(vmsg->fds[i]);
70eb2c07
CX
69 }
70}
71
70eb2c07
CX
72static void panic_cb(VuDev *vu_dev, const char *buf)
73{
7185c857 74 error_report("vu_panic: %s", buf);
70eb2c07
CX
75}
76
520d8b40
KW
77void vhost_user_server_ref(VuServer *server)
78{
79 assert(!server->wait_idle);
80 server->refcount++;
81}
82
83void vhost_user_server_unref(VuServer *server)
84{
85 server->refcount--;
86 if (server->wait_idle && !server->refcount) {
87 aio_co_wake(server->co_trip);
88 }
89}
90
70eb2c07
CX
91static bool coroutine_fn
92vu_message_read(VuDev *vu_dev, int conn_fd, VhostUserMsg *vmsg)
93{
94 struct iovec iov = {
95 .iov_base = (char *)vmsg,
96 .iov_len = VHOST_USER_HDR_SIZE,
97 };
98 int rc, read_bytes = 0;
99 Error *local_err = NULL;
70eb2c07 100 const size_t max_fds = G_N_ELEMENTS(vmsg->fds);
70eb2c07
CX
101 VuServer *server = container_of(vu_dev, VuServer, vu_dev);
102 QIOChannel *ioc = server->ioc;
103
8c7f7cbc 104 vmsg->fd_num = 0;
70eb2c07
CX
105 if (!ioc) {
106 error_report_err(local_err);
107 goto fail;
108 }
109
110 assert(qemu_in_coroutine());
111 do {
8c7f7cbc
SH
112 size_t nfds = 0;
113 int *fds = NULL;
114
70eb2c07
CX
115 /*
116 * qio_channel_readv_full may have short reads, keeping calling it
117 * until getting VHOST_USER_HDR_SIZE or 0 bytes in total
118 */
8c7f7cbc 119 rc = qio_channel_readv_full(ioc, &iov, 1, &fds, &nfds, &local_err);
70eb2c07
CX
120 if (rc < 0) {
121 if (rc == QIO_CHANNEL_ERR_BLOCK) {
8c7f7cbc 122 assert(local_err == NULL);
70eb2c07
CX
123 qio_channel_yield(ioc, G_IO_IN);
124 continue;
125 } else {
126 error_report_err(local_err);
8c7f7cbc 127 goto fail;
70eb2c07
CX
128 }
129 }
8c7f7cbc
SH
130
131 if (nfds > 0) {
132 if (vmsg->fd_num + nfds > max_fds) {
70eb2c07
CX
133 error_report("A maximum of %zu fds are allowed, "
134 "however got %zu fds now",
8c7f7cbc
SH
135 max_fds, vmsg->fd_num + nfds);
136 g_free(fds);
70eb2c07
CX
137 goto fail;
138 }
8c7f7cbc
SH
139 memcpy(vmsg->fds + vmsg->fd_num, fds, nfds * sizeof(vmsg->fds[0]));
140 vmsg->fd_num += nfds;
141 g_free(fds);
70eb2c07 142 }
8c7f7cbc
SH
143
144 if (rc == 0) { /* socket closed */
145 goto fail;
70eb2c07 146 }
70eb2c07 147
8c7f7cbc
SH
148 iov.iov_base += rc;
149 iov.iov_len -= rc;
150 read_bytes += rc;
151 } while (read_bytes != VHOST_USER_HDR_SIZE);
152
70eb2c07
CX
153 /* qio_channel_readv_full will make socket fds blocking, unblock them */
154 vmsg_unblock_fds(vmsg);
155 if (vmsg->size > sizeof(vmsg->payload)) {
156 error_report("Error: too big message request: %d, "
157 "size: vmsg->size: %u, "
158 "while sizeof(vmsg->payload) = %zu",
159 vmsg->request, vmsg->size, sizeof(vmsg->payload));
160 goto fail;
161 }
162
163 struct iovec iov_payload = {
164 .iov_base = (char *)&vmsg->payload,
165 .iov_len = vmsg->size,
166 };
167 if (vmsg->size) {
168 rc = qio_channel_readv_all_eof(ioc, &iov_payload, 1, &local_err);
edaf6205
SH
169 if (rc != 1) {
170 if (local_err) {
171 error_report_err(local_err);
172 }
70eb2c07
CX
173 goto fail;
174 }
175 }
176
177 return true;
178
179fail:
180 vmsg_close_fds(vmsg);
181
182 return false;
183}
184
70eb2c07
CX
185static coroutine_fn void vu_client_trip(void *opaque)
186{
187 VuServer *server = opaque;
7185c857 188 VuDev *vu_dev = &server->vu_dev;
70eb2c07 189
7185c857
SH
190 while (!vu_dev->broken && vu_dispatch(vu_dev)) {
191 /* Keep running */
70eb2c07
CX
192 }
193
520d8b40
KW
194 if (server->refcount) {
195 /* Wait for requests to complete before we can unmap the memory */
196 server->wait_idle = true;
197 qemu_coroutine_yield();
198 server->wait_idle = false;
199 }
200 assert(server->refcount == 0);
201
7185c857 202 vu_deinit(vu_dev);
70eb2c07 203
7185c857
SH
204 /* vu_deinit() should have called remove_watch() */
205 assert(QTAILQ_EMPTY(&server->vu_fd_watches));
206
207 object_unref(OBJECT(server->sioc));
208 server->sioc = NULL;
209
210 object_unref(OBJECT(server->ioc));
211 server->ioc = NULL;
212
213 server->co_trip = NULL;
214 if (server->restart_listener_bh) {
215 qemu_bh_schedule(server->restart_listener_bh);
216 }
217 aio_wait_kick();
70eb2c07
CX
218}
219
220/*
221 * a wrapper for vu_kick_cb
222 *
223 * since aio_dispatch can only pass one user data pointer to the
224 * callback function, pack VuDev and pvt into a struct. Then unpack it
225 * and pass them to vu_kick_cb
226 */
227static void kick_handler(void *opaque)
228{
229 VuFdWatch *vu_fd_watch = opaque;
7185c857 230 VuDev *vu_dev = vu_fd_watch->vu_dev;
70eb2c07 231
7185c857
SH
232 vu_fd_watch->cb(vu_dev, 0, vu_fd_watch->pvt);
233
234 /* Stop vu_client_trip() if an error occurred in vu_fd_watch->cb() */
235 if (vu_dev->broken) {
236 VuServer *server = container_of(vu_dev, VuServer, vu_dev);
237
238 qio_channel_shutdown(server->ioc, QIO_CHANNEL_SHUTDOWN_BOTH, NULL);
239 }
240}
70eb2c07
CX
241
242static VuFdWatch *find_vu_fd_watch(VuServer *server, int fd)
243{
244
245 VuFdWatch *vu_fd_watch, *next;
246 QTAILQ_FOREACH_SAFE(vu_fd_watch, &server->vu_fd_watches, next, next) {
247 if (vu_fd_watch->fd == fd) {
248 return vu_fd_watch;
249 }
250 }
251 return NULL;
252}
253
254static void
255set_watch(VuDev *vu_dev, int fd, int vu_evt,
256 vu_watch_cb cb, void *pvt)
257{
258
259 VuServer *server = container_of(vu_dev, VuServer, vu_dev);
260 g_assert(vu_dev);
261 g_assert(fd >= 0);
262 g_assert(cb);
263
264 VuFdWatch *vu_fd_watch = find_vu_fd_watch(server, fd);
265
266 if (!vu_fd_watch) {
267 VuFdWatch *vu_fd_watch = g_new0(VuFdWatch, 1);
268
269 QTAILQ_INSERT_TAIL(&server->vu_fd_watches, vu_fd_watch, next);
270
271 vu_fd_watch->fd = fd;
272 vu_fd_watch->cb = cb;
ff5927ba 273 qemu_socket_set_nonblock(fd);
70eb2c07 274 aio_set_fd_handler(server->ioc->ctx, fd, true, kick_handler,
826cc324 275 NULL, NULL, NULL, vu_fd_watch);
70eb2c07
CX
276 vu_fd_watch->vu_dev = vu_dev;
277 vu_fd_watch->pvt = pvt;
278 }
279}
280
281
282static void remove_watch(VuDev *vu_dev, int fd)
283{
284 VuServer *server;
285 g_assert(vu_dev);
286 g_assert(fd >= 0);
287
288 server = container_of(vu_dev, VuServer, vu_dev);
289
290 VuFdWatch *vu_fd_watch = find_vu_fd_watch(server, fd);
291
292 if (!vu_fd_watch) {
293 return;
294 }
826cc324
SH
295 aio_set_fd_handler(server->ioc->ctx, fd, true,
296 NULL, NULL, NULL, NULL, NULL);
70eb2c07
CX
297
298 QTAILQ_REMOVE(&server->vu_fd_watches, vu_fd_watch, next);
299 g_free(vu_fd_watch);
300}
301
302
303static void vu_accept(QIONetListener *listener, QIOChannelSocket *sioc,
304 gpointer opaque)
305{
306 VuServer *server = opaque;
307
308 if (server->sioc) {
309 warn_report("Only one vhost-user client is allowed to "
310 "connect the server one time");
311 return;
312 }
313
314 if (!vu_init(&server->vu_dev, server->max_queues, sioc->fd, panic_cb,
315 vu_message_read, set_watch, remove_watch, server->vu_iface)) {
316 error_report("Failed to initialize libvhost-user");
317 return;
318 }
319
320 /*
321 * Unset the callback function for network listener to make another
322 * vhost-user client keeping waiting until this client disconnects
323 */
324 qio_net_listener_set_client_func(server->listener,
325 NULL,
326 NULL,
327 NULL);
328 server->sioc = sioc;
329 /*
330 * Increase the object reference, so sioc will not freed by
331 * qio_net_listener_channel_func which will call object_unref(OBJECT(sioc))
332 */
333 object_ref(OBJECT(server->sioc));
334 qio_channel_set_name(QIO_CHANNEL(sioc), "vhost-user client");
335 server->ioc = QIO_CHANNEL(sioc);
336 object_ref(OBJECT(server->ioc));
7185c857
SH
337
338 /* TODO vu_message_write() spins if non-blocking! */
46a096c8 339 qio_channel_set_blocking(server->ioc, false, NULL);
70eb2c07 340
7185c857
SH
341 server->co_trip = qemu_coroutine_create(vu_client_trip, server);
342
343 aio_context_acquire(server->ctx);
344 vhost_user_server_attach_aio_context(server, server->ctx);
345 aio_context_release(server->ctx);
346}
70eb2c07
CX
347
348void vhost_user_server_stop(VuServer *server)
349{
7185c857
SH
350 aio_context_acquire(server->ctx);
351
352 qemu_bh_delete(server->restart_listener_bh);
353 server->restart_listener_bh = NULL;
354
70eb2c07 355 if (server->sioc) {
7185c857
SH
356 VuFdWatch *vu_fd_watch;
357
358 QTAILQ_FOREACH(vu_fd_watch, &server->vu_fd_watches, next) {
359 aio_set_fd_handler(server->ctx, vu_fd_watch->fd, true,
826cc324 360 NULL, NULL, NULL, NULL, vu_fd_watch);
7185c857
SH
361 }
362
363 qio_channel_shutdown(server->ioc, QIO_CHANNEL_SHUTDOWN_BOTH, NULL);
364
365 AIO_WAIT_WHILE(server->ctx, server->co_trip);
70eb2c07
CX
366 }
367
7185c857
SH
368 aio_context_release(server->ctx);
369
70eb2c07
CX
370 if (server->listener) {
371 qio_net_listener_disconnect(server->listener);
372 object_unref(OBJECT(server->listener));
373 }
7185c857
SH
374}
375
376/*
377 * Allow the next client to connect to the server. Called from a BH in the main
378 * loop.
379 */
380static void restart_listener_bh(void *opaque)
381{
382 VuServer *server = opaque;
70eb2c07 383
7185c857
SH
384 qio_net_listener_set_client_func(server->listener, vu_accept, server,
385 NULL);
70eb2c07
CX
386}
387
7185c857
SH
388/* Called with ctx acquired */
389void vhost_user_server_attach_aio_context(VuServer *server, AioContext *ctx)
70eb2c07 390{
7185c857 391 VuFdWatch *vu_fd_watch;
70eb2c07 392
7185c857 393 server->ctx = ctx;
70eb2c07
CX
394
395 if (!server->sioc) {
70eb2c07
CX
396 return;
397 }
398
7185c857
SH
399 qio_channel_attach_aio_context(server->ioc, ctx);
400
401 QTAILQ_FOREACH(vu_fd_watch, &server->vu_fd_watches, next) {
402 aio_set_fd_handler(ctx, vu_fd_watch->fd, true, kick_handler, NULL,
826cc324 403 NULL, NULL, vu_fd_watch);
70eb2c07
CX
404 }
405
7185c857
SH
406 aio_co_schedule(ctx, server->co_trip);
407}
408
409/* Called with server->ctx acquired */
410void vhost_user_server_detach_aio_context(VuServer *server)
411{
412 if (server->sioc) {
413 VuFdWatch *vu_fd_watch;
414
415 QTAILQ_FOREACH(vu_fd_watch, &server->vu_fd_watches, next) {
416 aio_set_fd_handler(server->ctx, vu_fd_watch->fd, true,
826cc324 417 NULL, NULL, NULL, NULL, vu_fd_watch);
70eb2c07 418 }
7185c857
SH
419
420 qio_channel_detach_aio_context(server->ioc);
70eb2c07 421 }
70eb2c07 422
7185c857
SH
423 server->ctx = NULL;
424}
70eb2c07
CX
425
426bool vhost_user_server_start(VuServer *server,
427 SocketAddress *socket_addr,
428 AioContext *ctx,
429 uint16_t max_queues,
70eb2c07
CX
430 const VuDevIface *vu_iface,
431 Error **errp)
432{
7185c857 433 QEMUBH *bh;
90fc91d5
SH
434 QIONetListener *listener;
435
436 if (socket_addr->type != SOCKET_ADDRESS_TYPE_UNIX &&
437 socket_addr->type != SOCKET_ADDRESS_TYPE_FD) {
438 error_setg(errp, "Only socket address types 'unix' and 'fd' are supported");
439 return false;
440 }
441
442 listener = qio_net_listener_new();
70eb2c07
CX
443 if (qio_net_listener_open_sync(listener, socket_addr, 1,
444 errp) < 0) {
445 object_unref(OBJECT(listener));
446 return false;
447 }
448
7185c857
SH
449 bh = qemu_bh_new(restart_listener_bh, server);
450
1d787456 451 /* zero out unspecified fields */
70eb2c07
CX
452 *server = (VuServer) {
453 .listener = listener,
7185c857 454 .restart_listener_bh = bh,
70eb2c07
CX
455 .vu_iface = vu_iface,
456 .max_queues = max_queues,
457 .ctx = ctx,
70eb2c07
CX
458 };
459
460 qio_net_listener_set_name(server->listener, "vhost-user-backend-listener");
461
462 qio_net_listener_set_client_func(server->listener,
463 vu_accept,
464 server,
465 NULL);
466
467 QTAILQ_INIT(&server->vu_fd_watches);
468 return true;
469}