2 * Sharing QEMU devices via vhost-user protocol
4 * Copyright (c) Coiby Xu <coiby.xu@gmail.com>.
5 * Copyright (c) 2020 Red Hat, Inc.
7 * This work is licensed under the terms of the GNU GPL, version 2 or
8 * later. See the COPYING file in the top-level directory.
10 #include "qemu/osdep.h"
11 #include "qemu/error-report.h"
12 #include "qemu/main-loop.h"
13 #include "qemu/vhost-user-server.h"
14 #include "block/aio-wait.h"
17 * Theory of operation:
19 * VuServer is started and stopped by vhost_user_server_start() and
20 * vhost_user_server_stop() from the main loop thread. Starting the server
21 * opens a vhost-user UNIX domain socket and listens for incoming connections.
22 * Only one connection is allowed at a time.
24 * The connection is handled by the vu_client_trip() coroutine in the
25 * VuServer->ctx AioContext. The coroutine consists of a vu_dispatch() loop
26 * where libvhost-user calls vu_message_read() to receive the next vhost-user
27 * protocol messages over the UNIX domain socket.
29 * When virtqueues are set up libvhost-user calls set_watch() to monitor kick
30 * fds. These fds are also handled in the VuServer->ctx AioContext.
32 * Both vu_client_trip() and kick fd monitoring can be stopped by shutting down
33 * the socket connection. Shutting down the socket connection causes
34 * vu_message_read() to fail since no more data can be received from the socket.
35 * After vu_dispatch() fails, vu_client_trip() calls vu_deinit() to stop
36 * libvhost-user before terminating the coroutine. vu_deinit() calls
37 * remove_watch() to stop monitoring kick fds and this stops virtqueue
40 * When vu_client_trip() has finished cleaning up it schedules a BH in the main
41 * loop thread to accept the next client connection.
43 * When libvhost-user detects an error it calls panic_cb() and sets the
44 * dev->broken flag. Both vu_client_trip() and kick fd processing stop when
45 * the dev->broken flag is set.
47 * It is possible to switch AioContexts using
48 * vhost_user_server_detach_aio_context() and
49 * vhost_user_server_attach_aio_context(). They stop monitoring fds in the old
50 * AioContext and resume monitoring in the new AioContext. The vu_client_trip()
51 * coroutine remains in a yielded state during the switch. This is made
52 * possible by QIOChannel's support for spurious coroutine re-entry in
53 * qio_channel_yield(). The coroutine will restart I/O when re-entered from the
57 static void vmsg_close_fds(VhostUserMsg
*vmsg
)
60 for (i
= 0; i
< vmsg
->fd_num
; i
++) {
65 static void vmsg_unblock_fds(VhostUserMsg
*vmsg
)
68 for (i
= 0; i
< vmsg
->fd_num
; i
++) {
69 qemu_socket_set_nonblock(vmsg
->fds
[i
]);
73 static void panic_cb(VuDev
*vu_dev
, const char *buf
)
75 error_report("vu_panic: %s", buf
);
78 void vhost_user_server_inc_in_flight(VuServer
*server
)
80 assert(!server
->wait_idle
);
81 qatomic_inc(&server
->in_flight
);
84 void vhost_user_server_dec_in_flight(VuServer
*server
)
86 if (qatomic_fetch_dec(&server
->in_flight
) == 1) {
87 if (server
->wait_idle
) {
88 aio_co_wake(server
->co_trip
);
93 bool vhost_user_server_has_in_flight(VuServer
*server
)
95 return qatomic_load_acquire(&server
->in_flight
) > 0;
98 static bool coroutine_fn
99 vu_message_read(VuDev
*vu_dev
, int conn_fd
, VhostUserMsg
*vmsg
)
102 .iov_base
= (char *)vmsg
,
103 .iov_len
= VHOST_USER_HDR_SIZE
,
105 int rc
, read_bytes
= 0;
106 Error
*local_err
= NULL
;
107 const size_t max_fds
= G_N_ELEMENTS(vmsg
->fds
);
108 VuServer
*server
= container_of(vu_dev
, VuServer
, vu_dev
);
109 QIOChannel
*ioc
= server
->ioc
;
113 error_report_err(local_err
);
117 assert(qemu_in_coroutine());
123 * qio_channel_readv_full may have short reads, keeping calling it
124 * until getting VHOST_USER_HDR_SIZE or 0 bytes in total
126 rc
= qio_channel_readv_full(ioc
, &iov
, 1, &fds
, &nfds
, 0, &local_err
);
128 if (rc
== QIO_CHANNEL_ERR_BLOCK
) {
129 assert(local_err
== NULL
);
131 server
->in_qio_channel_yield
= true;
132 qio_channel_yield(ioc
, G_IO_IN
);
133 server
->in_qio_channel_yield
= false;
139 error_report_err(local_err
);
145 if (vmsg
->fd_num
+ nfds
> max_fds
) {
146 error_report("A maximum of %zu fds are allowed, "
147 "however got %zu fds now",
148 max_fds
, vmsg
->fd_num
+ nfds
);
152 memcpy(vmsg
->fds
+ vmsg
->fd_num
, fds
, nfds
* sizeof(vmsg
->fds
[0]));
153 vmsg
->fd_num
+= nfds
;
157 if (rc
== 0) { /* socket closed */
164 } while (read_bytes
!= VHOST_USER_HDR_SIZE
);
166 /* qio_channel_readv_full will make socket fds blocking, unblock them */
167 vmsg_unblock_fds(vmsg
);
168 if (vmsg
->size
> sizeof(vmsg
->payload
)) {
169 error_report("Error: too big message request: %d, "
170 "size: vmsg->size: %u, "
171 "while sizeof(vmsg->payload) = %zu",
172 vmsg
->request
, vmsg
->size
, sizeof(vmsg
->payload
));
176 struct iovec iov_payload
= {
177 .iov_base
= (char *)&vmsg
->payload
,
178 .iov_len
= vmsg
->size
,
181 rc
= qio_channel_readv_all_eof(ioc
, &iov_payload
, 1, &local_err
);
184 error_report_err(local_err
);
193 vmsg_close_fds(vmsg
);
198 static coroutine_fn
void vu_client_trip(void *opaque
)
200 VuServer
*server
= opaque
;
201 VuDev
*vu_dev
= &server
->vu_dev
;
203 while (!vu_dev
->broken
) {
204 if (server
->quiescing
) {
205 server
->co_trip
= NULL
;
209 /* vu_dispatch() returns false if server->ctx went away */
210 if (!vu_dispatch(vu_dev
) && server
->ctx
) {
215 if (vhost_user_server_has_in_flight(server
)) {
216 /* Wait for requests to complete before we can unmap the memory */
217 server
->wait_idle
= true;
218 qemu_coroutine_yield();
219 server
->wait_idle
= false;
221 assert(!vhost_user_server_has_in_flight(server
));
225 /* vu_deinit() should have called remove_watch() */
226 assert(QTAILQ_EMPTY(&server
->vu_fd_watches
));
228 object_unref(OBJECT(server
->sioc
));
231 object_unref(OBJECT(server
->ioc
));
234 server
->co_trip
= NULL
;
235 if (server
->restart_listener_bh
) {
236 qemu_bh_schedule(server
->restart_listener_bh
);
242 * a wrapper for vu_kick_cb
244 * since aio_dispatch can only pass one user data pointer to the
245 * callback function, pack VuDev and pvt into a struct. Then unpack it
246 * and pass them to vu_kick_cb
248 static void kick_handler(void *opaque
)
250 VuFdWatch
*vu_fd_watch
= opaque
;
251 VuDev
*vu_dev
= vu_fd_watch
->vu_dev
;
253 vu_fd_watch
->cb(vu_dev
, 0, vu_fd_watch
->pvt
);
255 /* Stop vu_client_trip() if an error occurred in vu_fd_watch->cb() */
256 if (vu_dev
->broken
) {
257 VuServer
*server
= container_of(vu_dev
, VuServer
, vu_dev
);
259 qio_channel_shutdown(server
->ioc
, QIO_CHANNEL_SHUTDOWN_BOTH
, NULL
);
263 static VuFdWatch
*find_vu_fd_watch(VuServer
*server
, int fd
)
266 VuFdWatch
*vu_fd_watch
, *next
;
267 QTAILQ_FOREACH_SAFE(vu_fd_watch
, &server
->vu_fd_watches
, next
, next
) {
268 if (vu_fd_watch
->fd
== fd
) {
276 set_watch(VuDev
*vu_dev
, int fd
, int vu_evt
,
277 vu_watch_cb cb
, void *pvt
)
280 VuServer
*server
= container_of(vu_dev
, VuServer
, vu_dev
);
285 VuFdWatch
*vu_fd_watch
= find_vu_fd_watch(server
, fd
);
288 vu_fd_watch
= g_new0(VuFdWatch
, 1);
290 QTAILQ_INSERT_TAIL(&server
->vu_fd_watches
, vu_fd_watch
, next
);
292 vu_fd_watch
->fd
= fd
;
293 vu_fd_watch
->cb
= cb
;
294 qemu_socket_set_nonblock(fd
);
295 aio_set_fd_handler(server
->ctx
, fd
, kick_handler
,
296 NULL
, NULL
, NULL
, vu_fd_watch
);
297 vu_fd_watch
->vu_dev
= vu_dev
;
298 vu_fd_watch
->pvt
= pvt
;
303 static void remove_watch(VuDev
*vu_dev
, int fd
)
309 server
= container_of(vu_dev
, VuServer
, vu_dev
);
311 VuFdWatch
*vu_fd_watch
= find_vu_fd_watch(server
, fd
);
316 aio_set_fd_handler(server
->ctx
, fd
, NULL
, NULL
, NULL
, NULL
, NULL
);
318 QTAILQ_REMOVE(&server
->vu_fd_watches
, vu_fd_watch
, next
);
323 static void vu_accept(QIONetListener
*listener
, QIOChannelSocket
*sioc
,
326 VuServer
*server
= opaque
;
329 warn_report("Only one vhost-user client is allowed to "
330 "connect the server one time");
334 if (!vu_init(&server
->vu_dev
, server
->max_queues
, sioc
->fd
, panic_cb
,
335 vu_message_read
, set_watch
, remove_watch
, server
->vu_iface
)) {
336 error_report("Failed to initialize libvhost-user");
341 * Unset the callback function for network listener to make another
342 * vhost-user client keeping waiting until this client disconnects
344 qio_net_listener_set_client_func(server
->listener
,
350 * Increase the object reference, so sioc will not freed by
351 * qio_net_listener_channel_func which will call object_unref(OBJECT(sioc))
353 object_ref(OBJECT(server
->sioc
));
354 qio_channel_set_name(QIO_CHANNEL(sioc
), "vhost-user client");
355 server
->ioc
= QIO_CHANNEL(sioc
);
356 object_ref(OBJECT(server
->ioc
));
358 /* TODO vu_message_write() spins if non-blocking! */
359 qio_channel_set_blocking(server
->ioc
, false, NULL
);
361 qio_channel_set_follow_coroutine_ctx(server
->ioc
, true);
363 vhost_user_server_attach_aio_context(server
, server
->ctx
);
366 /* server->ctx acquired by caller */
367 void vhost_user_server_stop(VuServer
*server
)
369 qemu_bh_delete(server
->restart_listener_bh
);
370 server
->restart_listener_bh
= NULL
;
373 VuFdWatch
*vu_fd_watch
;
375 QTAILQ_FOREACH(vu_fd_watch
, &server
->vu_fd_watches
, next
) {
376 aio_set_fd_handler(server
->ctx
, vu_fd_watch
->fd
,
377 NULL
, NULL
, NULL
, NULL
, vu_fd_watch
);
380 qio_channel_shutdown(server
->ioc
, QIO_CHANNEL_SHUTDOWN_BOTH
, NULL
);
382 AIO_WAIT_WHILE(server
->ctx
, server
->co_trip
);
385 if (server
->listener
) {
386 qio_net_listener_disconnect(server
->listener
);
387 object_unref(OBJECT(server
->listener
));
392 * Allow the next client to connect to the server. Called from a BH in the main
395 static void restart_listener_bh(void *opaque
)
397 VuServer
*server
= opaque
;
399 qio_net_listener_set_client_func(server
->listener
, vu_accept
, server
,
403 /* Called with ctx acquired */
404 void vhost_user_server_attach_aio_context(VuServer
*server
, AioContext
*ctx
)
406 VuFdWatch
*vu_fd_watch
;
414 QTAILQ_FOREACH(vu_fd_watch
, &server
->vu_fd_watches
, next
) {
415 aio_set_fd_handler(ctx
, vu_fd_watch
->fd
, kick_handler
, NULL
,
416 NULL
, NULL
, vu_fd_watch
);
419 if (server
->co_trip
) {
421 * The caller didn't fully shut down co_trip (this can happen on
422 * non-polling drains like in bdrv_graph_wrlock()). This is okay as long
423 * as it no longer tries to shut it down and we're guaranteed to still
424 * be in the same AioContext as before.
426 * co_ctx can still be NULL if we get multiple calls and only just
427 * scheduled a new coroutine in the else branch.
429 AioContext
*co_ctx
= qemu_coroutine_get_aio_context(server
->co_trip
);
431 assert(!server
->quiescing
);
432 assert(!co_ctx
|| co_ctx
== ctx
);
434 server
->co_trip
= qemu_coroutine_create(vu_client_trip
, server
);
435 assert(!server
->in_qio_channel_yield
);
436 aio_co_schedule(ctx
, server
->co_trip
);
440 /* Called with server->ctx acquired */
441 void vhost_user_server_detach_aio_context(VuServer
*server
)
444 VuFdWatch
*vu_fd_watch
;
446 QTAILQ_FOREACH(vu_fd_watch
, &server
->vu_fd_watches
, next
) {
447 aio_set_fd_handler(server
->ctx
, vu_fd_watch
->fd
,
448 NULL
, NULL
, NULL
, NULL
, vu_fd_watch
);
455 if (server
->in_qio_channel_yield
) {
456 /* Stop receiving the next vhost-user message */
457 qio_channel_wake_read(server
->ioc
);
462 bool vhost_user_server_start(VuServer
*server
,
463 SocketAddress
*socket_addr
,
466 const VuDevIface
*vu_iface
,
470 QIONetListener
*listener
;
472 if (socket_addr
->type
!= SOCKET_ADDRESS_TYPE_UNIX
&&
473 socket_addr
->type
!= SOCKET_ADDRESS_TYPE_FD
) {
474 error_setg(errp
, "Only socket address types 'unix' and 'fd' are supported");
478 listener
= qio_net_listener_new();
479 if (qio_net_listener_open_sync(listener
, socket_addr
, 1,
481 object_unref(OBJECT(listener
));
485 bh
= qemu_bh_new(restart_listener_bh
, server
);
487 /* zero out unspecified fields */
488 *server
= (VuServer
) {
489 .listener
= listener
,
490 .restart_listener_bh
= bh
,
491 .vu_iface
= vu_iface
,
492 .max_queues
= max_queues
,
496 qio_net_listener_set_name(server
->listener
, "vhost-user-backend-listener");
498 qio_net_listener_set_client_func(server
->listener
,
503 QTAILQ_INIT(&server
->vu_fd_watches
);