]> git.proxmox.com Git - mirror_qemu.git/blob - util/vhost-user-server.c
tests/tcg/s390x: Add rxsbg.c
[mirror_qemu.git] / util / vhost-user-server.c
1 /*
2 * Sharing QEMU devices via vhost-user protocol
3 *
4 * Copyright (c) Coiby Xu <coiby.xu@gmail.com>.
5 * Copyright (c) 2020 Red Hat, Inc.
6 *
7 * This work is licensed under the terms of the GNU GPL, version 2 or
8 * later. See the COPYING file in the top-level directory.
9 */
10 #include "qemu/osdep.h"
11 #include "qemu/error-report.h"
12 #include "qemu/main-loop.h"
13 #include "qemu/vhost-user-server.h"
14 #include "block/aio-wait.h"
15
16 /*
17 * Theory of operation:
18 *
19 * VuServer is started and stopped by vhost_user_server_start() and
20 * vhost_user_server_stop() from the main loop thread. Starting the server
21 * opens a vhost-user UNIX domain socket and listens for incoming connections.
22 * Only one connection is allowed at a time.
23 *
24 * The connection is handled by the vu_client_trip() coroutine in the
25 * VuServer->ctx AioContext. The coroutine consists of a vu_dispatch() loop
26 * where libvhost-user calls vu_message_read() to receive the next vhost-user
27 * protocol messages over the UNIX domain socket.
28 *
29 * When virtqueues are set up libvhost-user calls set_watch() to monitor kick
30 * fds. These fds are also handled in the VuServer->ctx AioContext.
31 *
32 * Both vu_client_trip() and kick fd monitoring can be stopped by shutting down
33 * the socket connection. Shutting down the socket connection causes
34 * vu_message_read() to fail since no more data can be received from the socket.
35 * After vu_dispatch() fails, vu_client_trip() calls vu_deinit() to stop
36 * libvhost-user before terminating the coroutine. vu_deinit() calls
37 * remove_watch() to stop monitoring kick fds and this stops virtqueue
38 * processing.
39 *
40 * When vu_client_trip() has finished cleaning up it schedules a BH in the main
41 * loop thread to accept the next client connection.
42 *
43 * When libvhost-user detects an error it calls panic_cb() and sets the
44 * dev->broken flag. Both vu_client_trip() and kick fd processing stop when
45 * the dev->broken flag is set.
46 *
47 * It is possible to switch AioContexts using
48 * vhost_user_server_detach_aio_context() and
49 * vhost_user_server_attach_aio_context(). They stop monitoring fds in the old
50 * AioContext and resume monitoring in the new AioContext. The vu_client_trip()
51 * coroutine remains in a yielded state during the switch. This is made
52 * possible by QIOChannel's support for spurious coroutine re-entry in
53 * qio_channel_yield(). The coroutine will restart I/O when re-entered from the
54 * new AioContext.
55 */
56
57 static void vmsg_close_fds(VhostUserMsg *vmsg)
58 {
59 int i;
60 for (i = 0; i < vmsg->fd_num; i++) {
61 close(vmsg->fds[i]);
62 }
63 }
64
65 static void vmsg_unblock_fds(VhostUserMsg *vmsg)
66 {
67 int i;
68 for (i = 0; i < vmsg->fd_num; i++) {
69 qemu_socket_set_nonblock(vmsg->fds[i]);
70 }
71 }
72
73 static void panic_cb(VuDev *vu_dev, const char *buf)
74 {
75 error_report("vu_panic: %s", buf);
76 }
77
78 void vhost_user_server_ref(VuServer *server)
79 {
80 assert(!server->wait_idle);
81 server->refcount++;
82 }
83
84 void vhost_user_server_unref(VuServer *server)
85 {
86 server->refcount--;
87 if (server->wait_idle && !server->refcount) {
88 aio_co_wake(server->co_trip);
89 }
90 }
91
92 static bool coroutine_fn
93 vu_message_read(VuDev *vu_dev, int conn_fd, VhostUserMsg *vmsg)
94 {
95 struct iovec iov = {
96 .iov_base = (char *)vmsg,
97 .iov_len = VHOST_USER_HDR_SIZE,
98 };
99 int rc, read_bytes = 0;
100 Error *local_err = NULL;
101 const size_t max_fds = G_N_ELEMENTS(vmsg->fds);
102 VuServer *server = container_of(vu_dev, VuServer, vu_dev);
103 QIOChannel *ioc = server->ioc;
104
105 vmsg->fd_num = 0;
106 if (!ioc) {
107 error_report_err(local_err);
108 goto fail;
109 }
110
111 assert(qemu_in_coroutine());
112 do {
113 size_t nfds = 0;
114 int *fds = NULL;
115
116 /*
117 * qio_channel_readv_full may have short reads, keeping calling it
118 * until getting VHOST_USER_HDR_SIZE or 0 bytes in total
119 */
120 rc = qio_channel_readv_full(ioc, &iov, 1, &fds, &nfds, 0, &local_err);
121 if (rc < 0) {
122 if (rc == QIO_CHANNEL_ERR_BLOCK) {
123 assert(local_err == NULL);
124 qio_channel_yield(ioc, G_IO_IN);
125 continue;
126 } else {
127 error_report_err(local_err);
128 goto fail;
129 }
130 }
131
132 if (nfds > 0) {
133 if (vmsg->fd_num + nfds > max_fds) {
134 error_report("A maximum of %zu fds are allowed, "
135 "however got %zu fds now",
136 max_fds, vmsg->fd_num + nfds);
137 g_free(fds);
138 goto fail;
139 }
140 memcpy(vmsg->fds + vmsg->fd_num, fds, nfds * sizeof(vmsg->fds[0]));
141 vmsg->fd_num += nfds;
142 g_free(fds);
143 }
144
145 if (rc == 0) { /* socket closed */
146 goto fail;
147 }
148
149 iov.iov_base += rc;
150 iov.iov_len -= rc;
151 read_bytes += rc;
152 } while (read_bytes != VHOST_USER_HDR_SIZE);
153
154 /* qio_channel_readv_full will make socket fds blocking, unblock them */
155 vmsg_unblock_fds(vmsg);
156 if (vmsg->size > sizeof(vmsg->payload)) {
157 error_report("Error: too big message request: %d, "
158 "size: vmsg->size: %u, "
159 "while sizeof(vmsg->payload) = %zu",
160 vmsg->request, vmsg->size, sizeof(vmsg->payload));
161 goto fail;
162 }
163
164 struct iovec iov_payload = {
165 .iov_base = (char *)&vmsg->payload,
166 .iov_len = vmsg->size,
167 };
168 if (vmsg->size) {
169 rc = qio_channel_readv_all_eof(ioc, &iov_payload, 1, &local_err);
170 if (rc != 1) {
171 if (local_err) {
172 error_report_err(local_err);
173 }
174 goto fail;
175 }
176 }
177
178 return true;
179
180 fail:
181 vmsg_close_fds(vmsg);
182
183 return false;
184 }
185
186 static coroutine_fn void vu_client_trip(void *opaque)
187 {
188 VuServer *server = opaque;
189 VuDev *vu_dev = &server->vu_dev;
190
191 while (!vu_dev->broken && vu_dispatch(vu_dev)) {
192 /* Keep running */
193 }
194
195 if (server->refcount) {
196 /* Wait for requests to complete before we can unmap the memory */
197 server->wait_idle = true;
198 qemu_coroutine_yield();
199 server->wait_idle = false;
200 }
201 assert(server->refcount == 0);
202
203 vu_deinit(vu_dev);
204
205 /* vu_deinit() should have called remove_watch() */
206 assert(QTAILQ_EMPTY(&server->vu_fd_watches));
207
208 object_unref(OBJECT(server->sioc));
209 server->sioc = NULL;
210
211 object_unref(OBJECT(server->ioc));
212 server->ioc = NULL;
213
214 server->co_trip = NULL;
215 if (server->restart_listener_bh) {
216 qemu_bh_schedule(server->restart_listener_bh);
217 }
218 aio_wait_kick();
219 }
220
221 /*
222 * a wrapper for vu_kick_cb
223 *
224 * since aio_dispatch can only pass one user data pointer to the
225 * callback function, pack VuDev and pvt into a struct. Then unpack it
226 * and pass them to vu_kick_cb
227 */
228 static void kick_handler(void *opaque)
229 {
230 VuFdWatch *vu_fd_watch = opaque;
231 VuDev *vu_dev = vu_fd_watch->vu_dev;
232
233 vu_fd_watch->cb(vu_dev, 0, vu_fd_watch->pvt);
234
235 /* Stop vu_client_trip() if an error occurred in vu_fd_watch->cb() */
236 if (vu_dev->broken) {
237 VuServer *server = container_of(vu_dev, VuServer, vu_dev);
238
239 qio_channel_shutdown(server->ioc, QIO_CHANNEL_SHUTDOWN_BOTH, NULL);
240 }
241 }
242
243 static VuFdWatch *find_vu_fd_watch(VuServer *server, int fd)
244 {
245
246 VuFdWatch *vu_fd_watch, *next;
247 QTAILQ_FOREACH_SAFE(vu_fd_watch, &server->vu_fd_watches, next, next) {
248 if (vu_fd_watch->fd == fd) {
249 return vu_fd_watch;
250 }
251 }
252 return NULL;
253 }
254
255 static void
256 set_watch(VuDev *vu_dev, int fd, int vu_evt,
257 vu_watch_cb cb, void *pvt)
258 {
259
260 VuServer *server = container_of(vu_dev, VuServer, vu_dev);
261 g_assert(vu_dev);
262 g_assert(fd >= 0);
263 g_assert(cb);
264
265 VuFdWatch *vu_fd_watch = find_vu_fd_watch(server, fd);
266
267 if (!vu_fd_watch) {
268 VuFdWatch *vu_fd_watch = g_new0(VuFdWatch, 1);
269
270 QTAILQ_INSERT_TAIL(&server->vu_fd_watches, vu_fd_watch, next);
271
272 vu_fd_watch->fd = fd;
273 vu_fd_watch->cb = cb;
274 qemu_socket_set_nonblock(fd);
275 aio_set_fd_handler(server->ioc->ctx, fd, true, kick_handler,
276 NULL, NULL, NULL, vu_fd_watch);
277 vu_fd_watch->vu_dev = vu_dev;
278 vu_fd_watch->pvt = pvt;
279 }
280 }
281
282
283 static void remove_watch(VuDev *vu_dev, int fd)
284 {
285 VuServer *server;
286 g_assert(vu_dev);
287 g_assert(fd >= 0);
288
289 server = container_of(vu_dev, VuServer, vu_dev);
290
291 VuFdWatch *vu_fd_watch = find_vu_fd_watch(server, fd);
292
293 if (!vu_fd_watch) {
294 return;
295 }
296 aio_set_fd_handler(server->ioc->ctx, fd, true,
297 NULL, NULL, NULL, NULL, NULL);
298
299 QTAILQ_REMOVE(&server->vu_fd_watches, vu_fd_watch, next);
300 g_free(vu_fd_watch);
301 }
302
303
304 static void vu_accept(QIONetListener *listener, QIOChannelSocket *sioc,
305 gpointer opaque)
306 {
307 VuServer *server = opaque;
308
309 if (server->sioc) {
310 warn_report("Only one vhost-user client is allowed to "
311 "connect the server one time");
312 return;
313 }
314
315 if (!vu_init(&server->vu_dev, server->max_queues, sioc->fd, panic_cb,
316 vu_message_read, set_watch, remove_watch, server->vu_iface)) {
317 error_report("Failed to initialize libvhost-user");
318 return;
319 }
320
321 /*
322 * Unset the callback function for network listener to make another
323 * vhost-user client keeping waiting until this client disconnects
324 */
325 qio_net_listener_set_client_func(server->listener,
326 NULL,
327 NULL,
328 NULL);
329 server->sioc = sioc;
330 /*
331 * Increase the object reference, so sioc will not freed by
332 * qio_net_listener_channel_func which will call object_unref(OBJECT(sioc))
333 */
334 object_ref(OBJECT(server->sioc));
335 qio_channel_set_name(QIO_CHANNEL(sioc), "vhost-user client");
336 server->ioc = QIO_CHANNEL(sioc);
337 object_ref(OBJECT(server->ioc));
338
339 /* TODO vu_message_write() spins if non-blocking! */
340 qio_channel_set_blocking(server->ioc, false, NULL);
341
342 server->co_trip = qemu_coroutine_create(vu_client_trip, server);
343
344 aio_context_acquire(server->ctx);
345 vhost_user_server_attach_aio_context(server, server->ctx);
346 aio_context_release(server->ctx);
347 }
348
349 void vhost_user_server_stop(VuServer *server)
350 {
351 aio_context_acquire(server->ctx);
352
353 qemu_bh_delete(server->restart_listener_bh);
354 server->restart_listener_bh = NULL;
355
356 if (server->sioc) {
357 VuFdWatch *vu_fd_watch;
358
359 QTAILQ_FOREACH(vu_fd_watch, &server->vu_fd_watches, next) {
360 aio_set_fd_handler(server->ctx, vu_fd_watch->fd, true,
361 NULL, NULL, NULL, NULL, vu_fd_watch);
362 }
363
364 qio_channel_shutdown(server->ioc, QIO_CHANNEL_SHUTDOWN_BOTH, NULL);
365
366 AIO_WAIT_WHILE(server->ctx, server->co_trip);
367 }
368
369 aio_context_release(server->ctx);
370
371 if (server->listener) {
372 qio_net_listener_disconnect(server->listener);
373 object_unref(OBJECT(server->listener));
374 }
375 }
376
377 /*
378 * Allow the next client to connect to the server. Called from a BH in the main
379 * loop.
380 */
381 static void restart_listener_bh(void *opaque)
382 {
383 VuServer *server = opaque;
384
385 qio_net_listener_set_client_func(server->listener, vu_accept, server,
386 NULL);
387 }
388
389 /* Called with ctx acquired */
390 void vhost_user_server_attach_aio_context(VuServer *server, AioContext *ctx)
391 {
392 VuFdWatch *vu_fd_watch;
393
394 server->ctx = ctx;
395
396 if (!server->sioc) {
397 return;
398 }
399
400 qio_channel_attach_aio_context(server->ioc, ctx);
401
402 QTAILQ_FOREACH(vu_fd_watch, &server->vu_fd_watches, next) {
403 aio_set_fd_handler(ctx, vu_fd_watch->fd, true, kick_handler, NULL,
404 NULL, NULL, vu_fd_watch);
405 }
406
407 aio_co_schedule(ctx, server->co_trip);
408 }
409
410 /* Called with server->ctx acquired */
411 void vhost_user_server_detach_aio_context(VuServer *server)
412 {
413 if (server->sioc) {
414 VuFdWatch *vu_fd_watch;
415
416 QTAILQ_FOREACH(vu_fd_watch, &server->vu_fd_watches, next) {
417 aio_set_fd_handler(server->ctx, vu_fd_watch->fd, true,
418 NULL, NULL, NULL, NULL, vu_fd_watch);
419 }
420
421 qio_channel_detach_aio_context(server->ioc);
422 }
423
424 server->ctx = NULL;
425 }
426
427 bool vhost_user_server_start(VuServer *server,
428 SocketAddress *socket_addr,
429 AioContext *ctx,
430 uint16_t max_queues,
431 const VuDevIface *vu_iface,
432 Error **errp)
433 {
434 QEMUBH *bh;
435 QIONetListener *listener;
436
437 if (socket_addr->type != SOCKET_ADDRESS_TYPE_UNIX &&
438 socket_addr->type != SOCKET_ADDRESS_TYPE_FD) {
439 error_setg(errp, "Only socket address types 'unix' and 'fd' are supported");
440 return false;
441 }
442
443 listener = qio_net_listener_new();
444 if (qio_net_listener_open_sync(listener, socket_addr, 1,
445 errp) < 0) {
446 object_unref(OBJECT(listener));
447 return false;
448 }
449
450 bh = qemu_bh_new(restart_listener_bh, server);
451
452 /* zero out unspecified fields */
453 *server = (VuServer) {
454 .listener = listener,
455 .restart_listener_bh = bh,
456 .vu_iface = vu_iface,
457 .max_queues = max_queues,
458 .ctx = ctx,
459 };
460
461 qio_net_listener_set_name(server->listener, "vhost-user-backend-listener");
462
463 qio_net_listener_set_client_func(server->listener,
464 vu_accept,
465 server,
466 NULL);
467
468 QTAILQ_INIT(&server->vu_fd_watches);
469 return true;
470 }