|
@@ -32,6 +32,7 @@ enum VhostUserProtocolFeature {
|
|
VHOST_USER_PROTOCOL_F_RARP = 2,
|
|
VHOST_USER_PROTOCOL_F_RARP = 2,
|
|
VHOST_USER_PROTOCOL_F_REPLY_ACK = 3,
|
|
VHOST_USER_PROTOCOL_F_REPLY_ACK = 3,
|
|
VHOST_USER_PROTOCOL_F_NET_MTU = 4,
|
|
VHOST_USER_PROTOCOL_F_NET_MTU = 4,
|
|
|
|
+ VHOST_USER_PROTOCOL_F_SLAVE_REQ = 5,
|
|
|
|
|
|
VHOST_USER_PROTOCOL_F_MAX
|
|
VHOST_USER_PROTOCOL_F_MAX
|
|
};
|
|
};
|
|
@@ -60,9 +61,17 @@ typedef enum VhostUserRequest {
|
|
VHOST_USER_SET_VRING_ENABLE = 18,
|
|
VHOST_USER_SET_VRING_ENABLE = 18,
|
|
VHOST_USER_SEND_RARP = 19,
|
|
VHOST_USER_SEND_RARP = 19,
|
|
VHOST_USER_NET_SET_MTU = 20,
|
|
VHOST_USER_NET_SET_MTU = 20,
|
|
|
|
+ VHOST_USER_SET_SLAVE_REQ_FD = 21,
|
|
|
|
+ VHOST_USER_IOTLB_MSG = 22,
|
|
VHOST_USER_MAX
|
|
VHOST_USER_MAX
|
|
} VhostUserRequest;
|
|
} VhostUserRequest;
|
|
|
|
|
|
|
|
+typedef enum VhostUserSlaveRequest {
|
|
|
|
+ VHOST_USER_SLAVE_NONE = 0,
|
|
|
|
+ VHOST_USER_SLAVE_IOTLB_MSG = 1,
|
|
|
|
+ VHOST_USER_SLAVE_MAX
|
|
|
|
+} VhostUserSlaveRequest;
|
|
|
|
+
|
|
typedef struct VhostUserMemoryRegion {
|
|
typedef struct VhostUserMemoryRegion {
|
|
uint64_t guest_phys_addr;
|
|
uint64_t guest_phys_addr;
|
|
uint64_t memory_size;
|
|
uint64_t memory_size;
|
|
@@ -97,6 +106,7 @@ typedef struct VhostUserMsg {
|
|
struct vhost_vring_addr addr;
|
|
struct vhost_vring_addr addr;
|
|
VhostUserMemory memory;
|
|
VhostUserMemory memory;
|
|
VhostUserLog log;
|
|
VhostUserLog log;
|
|
|
|
+ struct vhost_iotlb_msg iotlb;
|
|
} payload;
|
|
} payload;
|
|
} QEMU_PACKED VhostUserMsg;
|
|
} QEMU_PACKED VhostUserMsg;
|
|
|
|
|
|
@@ -110,6 +120,11 @@ static VhostUserMsg m __attribute__ ((unused));
|
|
/* The version of the protocol we support */
|
|
/* The version of the protocol we support */
|
|
#define VHOST_USER_VERSION (0x1)
|
|
#define VHOST_USER_VERSION (0x1)
|
|
|
|
|
|
|
|
+struct vhost_user {
|
|
|
|
+ CharBackend *chr;
|
|
|
|
+ int slave_fd;
|
|
|
|
+};
|
|
|
|
+
|
|
static bool ioeventfd_enabled(void)
|
|
static bool ioeventfd_enabled(void)
|
|
{
|
|
{
|
|
return kvm_enabled() && kvm_eventfds_enabled();
|
|
return kvm_enabled() && kvm_eventfds_enabled();
|
|
@@ -117,7 +132,8 @@ static bool ioeventfd_enabled(void)
|
|
|
|
|
|
static int vhost_user_read(struct vhost_dev *dev, VhostUserMsg *msg)
|
|
static int vhost_user_read(struct vhost_dev *dev, VhostUserMsg *msg)
|
|
{
|
|
{
|
|
- CharBackend *chr = dev->opaque;
|
|
|
|
|
|
+ struct vhost_user *u = dev->opaque;
|
|
|
|
+ CharBackend *chr = u->chr;
|
|
uint8_t *p = (uint8_t *) msg;
|
|
uint8_t *p = (uint8_t *) msg;
|
|
int r, size = VHOST_USER_HDR_SIZE;
|
|
int r, size = VHOST_USER_HDR_SIZE;
|
|
|
|
|
|
@@ -202,7 +218,8 @@ static bool vhost_user_one_time_request(VhostUserRequest request)
|
|
static int vhost_user_write(struct vhost_dev *dev, VhostUserMsg *msg,
|
|
static int vhost_user_write(struct vhost_dev *dev, VhostUserMsg *msg,
|
|
int *fds, int fd_num)
|
|
int *fds, int fd_num)
|
|
{
|
|
{
|
|
- CharBackend *chr = dev->opaque;
|
|
|
|
|
|
+ struct vhost_user *u = dev->opaque;
|
|
|
|
+ CharBackend *chr = u->chr;
|
|
int ret, size = VHOST_USER_HDR_SIZE + msg->size;
|
|
int ret, size = VHOST_USER_HDR_SIZE + msg->size;
|
|
|
|
|
|
/*
|
|
/*
|
|
@@ -572,14 +589,130 @@ static int vhost_user_reset_device(struct vhost_dev *dev)
|
|
return 0;
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
|
|
|
|
+static void slave_read(void *opaque)
|
|
|
|
+{
|
|
|
|
+ struct vhost_dev *dev = opaque;
|
|
|
|
+ struct vhost_user *u = dev->opaque;
|
|
|
|
+ VhostUserMsg msg = { 0, };
|
|
|
|
+ int size, ret = 0;
|
|
|
|
+
|
|
|
|
+ /* Read header */
|
|
|
|
+ size = read(u->slave_fd, &msg, VHOST_USER_HDR_SIZE);
|
|
|
|
+ if (size != VHOST_USER_HDR_SIZE) {
|
|
|
|
+ error_report("Failed to read from slave.");
|
|
|
|
+ goto err;
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ if (msg.size > VHOST_USER_PAYLOAD_SIZE) {
|
|
|
|
+ error_report("Failed to read msg header."
|
|
|
|
+ " Size %d exceeds the maximum %zu.", msg.size,
|
|
|
|
+ VHOST_USER_PAYLOAD_SIZE);
|
|
|
|
+ goto err;
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ /* Read payload */
|
|
|
|
+ size = read(u->slave_fd, &msg.payload, msg.size);
|
|
|
|
+ if (size != msg.size) {
|
|
|
|
+ error_report("Failed to read payload from slave.");
|
|
|
|
+ goto err;
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ switch (msg.request) {
|
|
|
|
+ case VHOST_USER_SLAVE_IOTLB_MSG:
|
|
|
|
+ ret = vhost_backend_handle_iotlb_msg(dev, &msg.payload.iotlb);
|
|
|
|
+ break;
|
|
|
|
+ default:
|
|
|
|
+ error_report("Received unexpected msg type.");
|
|
|
|
+ ret = -EINVAL;
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ /*
|
|
|
|
+ * REPLY_ACK feature handling. Other reply types has to be managed
|
|
|
|
+ * directly in their request handlers.
|
|
|
|
+ */
|
|
|
|
+ if (msg.flags & VHOST_USER_NEED_REPLY_MASK) {
|
|
|
|
+ msg.flags &= ~VHOST_USER_NEED_REPLY_MASK;
|
|
|
|
+ msg.flags |= VHOST_USER_REPLY_MASK;
|
|
|
|
+
|
|
|
|
+ msg.payload.u64 = !!ret;
|
|
|
|
+ msg.size = sizeof(msg.payload.u64);
|
|
|
|
+
|
|
|
|
+ size = write(u->slave_fd, &msg, VHOST_USER_HDR_SIZE + msg.size);
|
|
|
|
+ if (size != VHOST_USER_HDR_SIZE + msg.size) {
|
|
|
|
+ error_report("Failed to send msg reply to slave.");
|
|
|
|
+ goto err;
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ return;
|
|
|
|
+
|
|
|
|
+err:
|
|
|
|
+ qemu_set_fd_handler(u->slave_fd, NULL, NULL, NULL);
|
|
|
|
+ close(u->slave_fd);
|
|
|
|
+ u->slave_fd = -1;
|
|
|
|
+ return;
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+static int vhost_setup_slave_channel(struct vhost_dev *dev)
|
|
|
|
+{
|
|
|
|
+ VhostUserMsg msg = {
|
|
|
|
+ .request = VHOST_USER_SET_SLAVE_REQ_FD,
|
|
|
|
+ .flags = VHOST_USER_VERSION,
|
|
|
|
+ };
|
|
|
|
+ struct vhost_user *u = dev->opaque;
|
|
|
|
+ int sv[2], ret = 0;
|
|
|
|
+ bool reply_supported = virtio_has_feature(dev->protocol_features,
|
|
|
|
+ VHOST_USER_PROTOCOL_F_REPLY_ACK);
|
|
|
|
+
|
|
|
|
+ if (!virtio_has_feature(dev->protocol_features,
|
|
|
|
+ VHOST_USER_PROTOCOL_F_SLAVE_REQ)) {
|
|
|
|
+ return 0;
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ if (socketpair(PF_UNIX, SOCK_STREAM, 0, sv) == -1) {
|
|
|
|
+ error_report("socketpair() failed");
|
|
|
|
+ return -1;
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ u->slave_fd = sv[0];
|
|
|
|
+ qemu_set_fd_handler(u->slave_fd, slave_read, NULL, dev);
|
|
|
|
+
|
|
|
|
+ if (reply_supported) {
|
|
|
|
+ msg.flags |= VHOST_USER_NEED_REPLY_MASK;
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ ret = vhost_user_write(dev, &msg, &sv[1], 1);
|
|
|
|
+ if (ret) {
|
|
|
|
+ goto out;
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ if (reply_supported) {
|
|
|
|
+ ret = process_message_reply(dev, &msg);
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+out:
|
|
|
|
+ close(sv[1]);
|
|
|
|
+ if (ret) {
|
|
|
|
+ qemu_set_fd_handler(u->slave_fd, NULL, NULL, NULL);
|
|
|
|
+ close(u->slave_fd);
|
|
|
|
+ u->slave_fd = -1;
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ return ret;
|
|
|
|
+}
|
|
|
|
+
|
|
static int vhost_user_init(struct vhost_dev *dev, void *opaque)
|
|
static int vhost_user_init(struct vhost_dev *dev, void *opaque)
|
|
{
|
|
{
|
|
- uint64_t features;
|
|
|
|
|
|
+ uint64_t features, protocol_features;
|
|
|
|
+ struct vhost_user *u;
|
|
int err;
|
|
int err;
|
|
|
|
|
|
assert(dev->vhost_ops->backend_type == VHOST_BACKEND_TYPE_USER);
|
|
assert(dev->vhost_ops->backend_type == VHOST_BACKEND_TYPE_USER);
|
|
|
|
|
|
- dev->opaque = opaque;
|
|
|
|
|
|
+ u = g_new0(struct vhost_user, 1);
|
|
|
|
+ u->chr = opaque;
|
|
|
|
+ u->slave_fd = -1;
|
|
|
|
+ dev->opaque = u;
|
|
|
|
|
|
err = vhost_user_get_features(dev, &features);
|
|
err = vhost_user_get_features(dev, &features);
|
|
if (err < 0) {
|
|
if (err < 0) {
|
|
@@ -590,12 +723,13 @@ static int vhost_user_init(struct vhost_dev *dev, void *opaque)
|
|
dev->backend_features |= 1ULL << VHOST_USER_F_PROTOCOL_FEATURES;
|
|
dev->backend_features |= 1ULL << VHOST_USER_F_PROTOCOL_FEATURES;
|
|
|
|
|
|
err = vhost_user_get_u64(dev, VHOST_USER_GET_PROTOCOL_FEATURES,
|
|
err = vhost_user_get_u64(dev, VHOST_USER_GET_PROTOCOL_FEATURES,
|
|
- &features);
|
|
|
|
|
|
+ &protocol_features);
|
|
if (err < 0) {
|
|
if (err < 0) {
|
|
return err;
|
|
return err;
|
|
}
|
|
}
|
|
|
|
|
|
- dev->protocol_features = features & VHOST_USER_PROTOCOL_FEATURE_MASK;
|
|
|
|
|
|
+ dev->protocol_features =
|
|
|
|
+ protocol_features & VHOST_USER_PROTOCOL_FEATURE_MASK;
|
|
err = vhost_user_set_protocol_features(dev, dev->protocol_features);
|
|
err = vhost_user_set_protocol_features(dev, dev->protocol_features);
|
|
if (err < 0) {
|
|
if (err < 0) {
|
|
return err;
|
|
return err;
|
|
@@ -609,6 +743,16 @@ static int vhost_user_init(struct vhost_dev *dev, void *opaque)
|
|
return err;
|
|
return err;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
+
|
|
|
|
+ if (virtio_has_feature(features, VIRTIO_F_IOMMU_PLATFORM) &&
|
|
|
|
+ !(virtio_has_feature(dev->protocol_features,
|
|
|
|
+ VHOST_USER_PROTOCOL_F_SLAVE_REQ) &&
|
|
|
|
+ virtio_has_feature(dev->protocol_features,
|
|
|
|
+ VHOST_USER_PROTOCOL_F_REPLY_ACK))) {
|
|
|
|
+ error_report("IOMMU support requires reply-ack and "
|
|
|
|
+ "slave-req protocol features.");
|
|
|
|
+ return -1;
|
|
|
|
+ }
|
|
}
|
|
}
|
|
|
|
|
|
if (dev->migration_blocker == NULL &&
|
|
if (dev->migration_blocker == NULL &&
|
|
@@ -619,13 +763,26 @@ static int vhost_user_init(struct vhost_dev *dev, void *opaque)
|
|
"VHOST_USER_PROTOCOL_F_LOG_SHMFD feature.");
|
|
"VHOST_USER_PROTOCOL_F_LOG_SHMFD feature.");
|
|
}
|
|
}
|
|
|
|
|
|
|
|
+ err = vhost_setup_slave_channel(dev);
|
|
|
|
+ if (err < 0) {
|
|
|
|
+ return err;
|
|
|
|
+ }
|
|
|
|
+
|
|
return 0;
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
|
|
static int vhost_user_cleanup(struct vhost_dev *dev)
|
|
static int vhost_user_cleanup(struct vhost_dev *dev)
|
|
{
|
|
{
|
|
|
|
+ struct vhost_user *u;
|
|
|
|
+
|
|
assert(dev->vhost_ops->backend_type == VHOST_BACKEND_TYPE_USER);
|
|
assert(dev->vhost_ops->backend_type == VHOST_BACKEND_TYPE_USER);
|
|
|
|
|
|
|
|
+ u = dev->opaque;
|
|
|
|
+ if (u->slave_fd >= 0) {
|
|
|
|
+ close(u->slave_fd);
|
|
|
|
+ u->slave_fd = -1;
|
|
|
|
+ }
|
|
|
|
+ g_free(u);
|
|
dev->opaque = 0;
|
|
dev->opaque = 0;
|
|
|
|
|
|
return 0;
|
|
return 0;
|
|
@@ -722,6 +879,29 @@ static int vhost_user_net_set_mtu(struct vhost_dev *dev, uint16_t mtu)
|
|
return 0;
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
|
|
|
|
+static int vhost_user_send_device_iotlb_msg(struct vhost_dev *dev,
|
|
|
|
+ struct vhost_iotlb_msg *imsg)
|
|
|
|
+{
|
|
|
|
+ VhostUserMsg msg = {
|
|
|
|
+ .request = VHOST_USER_IOTLB_MSG,
|
|
|
|
+ .size = sizeof(msg.payload.iotlb),
|
|
|
|
+ .flags = VHOST_USER_VERSION | VHOST_USER_NEED_REPLY_MASK,
|
|
|
|
+ .payload.iotlb = *imsg,
|
|
|
|
+ };
|
|
|
|
+
|
|
|
|
+ if (vhost_user_write(dev, &msg, NULL, 0) < 0) {
|
|
|
|
+ return -EFAULT;
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ return process_message_reply(dev, &msg);
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+
|
|
|
|
+static void vhost_user_set_iotlb_callback(struct vhost_dev *dev, int enabled)
|
|
|
|
+{
|
|
|
|
+ /* No-op as the receive channel is not dedicated to IOTLB messages. */
|
|
|
|
+}
|
|
|
|
+
|
|
const VhostOps user_ops = {
|
|
const VhostOps user_ops = {
|
|
.backend_type = VHOST_BACKEND_TYPE_USER,
|
|
.backend_type = VHOST_BACKEND_TYPE_USER,
|
|
.vhost_backend_init = vhost_user_init,
|
|
.vhost_backend_init = vhost_user_init,
|
|
@@ -746,4 +926,6 @@ const VhostOps user_ops = {
|
|
.vhost_migration_done = vhost_user_migration_done,
|
|
.vhost_migration_done = vhost_user_migration_done,
|
|
.vhost_backend_can_merge = vhost_user_can_merge,
|
|
.vhost_backend_can_merge = vhost_user_can_merge,
|
|
.vhost_net_set_mtu = vhost_user_net_set_mtu,
|
|
.vhost_net_set_mtu = vhost_user_net_set_mtu,
|
|
|
|
+ .vhost_set_iotlb_callback = vhost_user_set_iotlb_callback,
|
|
|
|
+ .vhost_send_device_iotlb_msg = vhost_user_send_device_iotlb_msg,
|
|
};
|
|
};
|