1 /* SPDX-License-Identifier: BSD-3-Clause
2 * Copyright(c) 2010-2016 Intel Corporation
5 #include <sys/socket.h>
14 #include <rte_string_fns.h>
15 #include <rte_fbarray.h>
18 #include "virtio_user_dev.h"
20 /* The version of the protocol we support */
21 #define VHOST_USER_VERSION 0x1
23 #define VHOST_MEMORY_MAX_NREGIONS 8
27 struct vhost_memory_region regions[VHOST_MEMORY_MAX_NREGIONS];
30 struct vhost_user_msg {
31 enum vhost_user_request request;
33 #define VHOST_USER_VERSION_MASK 0x3
34 #define VHOST_USER_REPLY_MASK (0x1 << 2)
35 #define VHOST_USER_NEED_REPLY_MASK (0x1 << 3)
37 uint32_t size; /* the following payload size */
39 #define VHOST_USER_VRING_IDX_MASK 0xff
40 #define VHOST_USER_VRING_NOFD_MASK (0x1 << 8)
42 struct vhost_vring_state state;
43 struct vhost_vring_addr addr;
44 struct vhost_memory memory;
46 int fds[VHOST_MEMORY_MAX_NREGIONS];
49 #define VHOST_USER_HDR_SIZE offsetof(struct vhost_user_msg, payload.u64)
50 #define VHOST_USER_PAYLOAD_SIZE \
51 (sizeof(struct vhost_user_msg) - VHOST_USER_HDR_SIZE)
54 vhost_user_write(int fd, struct vhost_user_msg *msg, int *fds, int fd_num)
59 size_t fd_size = fd_num * sizeof(int);
60 char control[CMSG_SPACE(fd_size)];
63 memset(&msgh, 0, sizeof(msgh));
64 memset(control, 0, sizeof(control));
66 iov.iov_base = (uint8_t *)msg;
67 iov.iov_len = VHOST_USER_HDR_SIZE + msg->size;
71 msgh.msg_control = control;
72 msgh.msg_controllen = sizeof(control);
74 cmsg = CMSG_FIRSTHDR(&msgh);
75 cmsg->cmsg_len = CMSG_LEN(fd_size);
76 cmsg->cmsg_level = SOL_SOCKET;
77 cmsg->cmsg_type = SCM_RIGHTS;
78 memcpy(CMSG_DATA(cmsg), fds, fd_size);
81 r = sendmsg(fd, &msgh, 0);
82 } while (r < 0 && errno == EINTR);
88 vhost_user_read(int fd, struct vhost_user_msg *msg)
90 uint32_t valid_flags = VHOST_USER_REPLY_MASK | VHOST_USER_VERSION;
91 int ret, sz_hdr = VHOST_USER_HDR_SIZE, sz_payload;
93 ret = recv(fd, (void *)msg, sz_hdr, 0);
95 PMD_DRV_LOG(ERR, "Failed to recv msg hdr: %d instead of %d.",
100 /* validate msg flags */
101 if (msg->flags != (valid_flags)) {
102 PMD_DRV_LOG(ERR, "Failed to recv msg: flags %x instead of %x.",
103 msg->flags, valid_flags);
107 sz_payload = msg->size;
109 if ((size_t)sz_payload > sizeof(msg->payload))
113 ret = recv(fd, (void *)((char *)msg + sz_hdr), sz_payload, 0);
114 if (ret < sz_payload) {
116 "Failed to recv msg payload: %d instead of %d.",
129 vhost_user_set_owner(struct virtio_user_dev *dev)
132 struct vhost_user_msg msg = {
133 .request = VHOST_USER_SET_OWNER,
134 .flags = VHOST_USER_VERSION,
137 ret = vhost_user_write(dev->vhostfd, &msg, NULL, 0);
139 PMD_DRV_LOG(ERR, "Failed to set owner");
147 vhost_user_get_features(struct virtio_user_dev *dev, uint64_t *features)
150 struct vhost_user_msg msg = {
151 .request = VHOST_USER_GET_FEATURES,
152 .flags = VHOST_USER_VERSION,
155 ret = vhost_user_write(dev->vhostfd, &msg, NULL, 0);
159 ret = vhost_user_read(dev->vhostfd, &msg);
163 if (msg.request != VHOST_USER_GET_FEATURES) {
164 PMD_DRV_LOG(ERR, "Unexpected request type (%d)", msg.request);
168 if (msg.size != sizeof(*features)) {
169 PMD_DRV_LOG(ERR, "Unexpected payload size (%u)", msg.size);
173 *features = msg.payload.u64;
177 PMD_DRV_LOG(ERR, "Failed to get backend features");
183 vhost_user_set_features(struct virtio_user_dev *dev, uint64_t features)
186 struct vhost_user_msg msg = {
187 .request = VHOST_USER_SET_FEATURES,
188 .flags = VHOST_USER_VERSION,
189 .size = sizeof(features),
190 .payload.u64 = features,
193 msg.payload.u64 |= dev->device_features & (1ULL << VHOST_USER_F_PROTOCOL_FEATURES);
195 ret = vhost_user_write(dev->vhostfd, &msg, NULL, 0);
197 PMD_DRV_LOG(ERR, "Failed to set features");
205 struct vhost_memory *vm;
211 update_memory_region(const struct rte_memseg_list *msl __rte_unused,
212 const struct rte_memseg *ms, void *arg)
214 struct walk_arg *wa = arg;
215 struct vhost_memory_region *mr;
216 uint64_t start_addr, end_addr;
220 fd = rte_memseg_get_fd_thread_unsafe(ms);
222 PMD_DRV_LOG(ERR, "Failed to get fd, ms=%p rte_errno=%d",
227 if (rte_memseg_get_fd_offset_thread_unsafe(ms, &offset) < 0) {
228 PMD_DRV_LOG(ERR, "Failed to get offset, ms=%p rte_errno=%d",
233 start_addr = (uint64_t)(uintptr_t)ms->addr;
234 end_addr = start_addr + ms->len;
236 for (i = 0; i < wa->region_nr; i++) {
237 if (wa->fds[i] != fd)
240 mr = &wa->vm->regions[i];
242 if (mr->userspace_addr + mr->memory_size < end_addr)
243 mr->memory_size = end_addr - mr->userspace_addr;
245 if (mr->userspace_addr > start_addr) {
246 mr->userspace_addr = start_addr;
247 mr->guest_phys_addr = start_addr;
250 if (mr->mmap_offset > offset)
251 mr->mmap_offset = offset;
253 PMD_DRV_LOG(DEBUG, "index=%d fd=%d offset=0x%" PRIx64
254 " addr=0x%" PRIx64 " len=%" PRIu64, i, fd,
255 mr->mmap_offset, mr->userspace_addr,
261 if (i >= VHOST_MEMORY_MAX_NREGIONS) {
262 PMD_DRV_LOG(ERR, "Too many memory regions");
266 mr = &wa->vm->regions[i];
269 mr->guest_phys_addr = start_addr;
270 mr->userspace_addr = start_addr;
271 mr->memory_size = ms->len;
272 mr->mmap_offset = offset;
274 PMD_DRV_LOG(DEBUG, "index=%d fd=%d offset=0x%" PRIx64
275 " addr=0x%" PRIx64 " len=%" PRIu64, i, fd,
276 mr->mmap_offset, mr->userspace_addr,
285 prepare_vhost_memory_user(struct vhost_user_msg *msg, int fds[])
290 wa.vm = &msg->payload.memory;
294 * The memory lock has already been taken by memory subsystem
295 * or virtio_user_start_device().
297 if (rte_memseg_walk_thread_unsafe(update_memory_region, &wa) < 0)
300 msg->payload.memory.nregions = wa.region_nr;
301 msg->payload.memory.padding = 0;
306 static struct vhost_user_msg m;
308 const char * const vhost_msg_strings[] = {
309 [VHOST_USER_RESET_OWNER] = "VHOST_RESET_OWNER",
310 [VHOST_USER_SET_VRING_CALL] = "VHOST_SET_VRING_CALL",
311 [VHOST_USER_SET_VRING_NUM] = "VHOST_SET_VRING_NUM",
312 [VHOST_USER_SET_VRING_BASE] = "VHOST_SET_VRING_BASE",
313 [VHOST_USER_GET_VRING_BASE] = "VHOST_GET_VRING_BASE",
314 [VHOST_USER_SET_VRING_ADDR] = "VHOST_SET_VRING_ADDR",
315 [VHOST_USER_SET_VRING_KICK] = "VHOST_SET_VRING_KICK",
316 [VHOST_USER_SET_MEM_TABLE] = "VHOST_SET_MEM_TABLE",
317 [VHOST_USER_SET_VRING_ENABLE] = "VHOST_SET_VRING_ENABLE",
318 [VHOST_USER_GET_PROTOCOL_FEATURES] = "VHOST_USER_GET_PROTOCOL_FEATURES",
319 [VHOST_USER_SET_PROTOCOL_FEATURES] = "VHOST_USER_SET_PROTOCOL_FEATURES",
320 [VHOST_USER_SET_STATUS] = "VHOST_SET_STATUS",
321 [VHOST_USER_GET_STATUS] = "VHOST_GET_STATUS",
325 vhost_user_sock(struct virtio_user_dev *dev,
326 enum vhost_user_request req,
329 struct vhost_user_msg msg;
330 struct vhost_vring_file *file = 0;
332 int has_reply_ack = 0;
333 int fds[VHOST_MEMORY_MAX_NREGIONS];
335 int vhostfd = dev->vhostfd;
339 PMD_DRV_LOG(INFO, "%s", vhost_msg_strings[req]);
341 if (dev->is_server && vhostfd < 0)
344 if (dev->protocol_features & (1ULL << VHOST_USER_PROTOCOL_F_REPLY_ACK))
348 msg.flags = VHOST_USER_VERSION;
352 case VHOST_USER_GET_STATUS:
353 if (!(dev->status & VIRTIO_CONFIG_STATUS_FEATURES_OK) ||
354 (!(dev->protocol_features &
355 (1ULL << VHOST_USER_PROTOCOL_F_STATUS))))
358 case VHOST_USER_GET_PROTOCOL_FEATURES:
362 case VHOST_USER_SET_STATUS:
363 if (!(dev->status & VIRTIO_CONFIG_STATUS_FEATURES_OK) ||
364 (!(dev->protocol_features &
365 (1ULL << VHOST_USER_PROTOCOL_F_STATUS))))
369 msg.flags |= VHOST_USER_NEED_REPLY_MASK;
371 case VHOST_USER_SET_PROTOCOL_FEATURES:
372 case VHOST_USER_SET_LOG_BASE:
373 msg.payload.u64 = *((__u64 *)arg);
374 msg.size = sizeof(m.payload.u64);
377 case VHOST_USER_SET_FEATURES:
378 msg.payload.u64 = *((__u64 *)arg) | (dev->device_features &
379 (1ULL << VHOST_USER_F_PROTOCOL_FEATURES));
380 msg.size = sizeof(m.payload.u64);
383 case VHOST_USER_RESET_OWNER:
386 case VHOST_USER_SET_MEM_TABLE:
387 if (prepare_vhost_memory_user(&msg, fds) < 0)
389 fd_num = msg.payload.memory.nregions;
390 msg.size = sizeof(m.payload.memory.nregions);
391 msg.size += sizeof(m.payload.memory.padding);
392 msg.size += fd_num * sizeof(struct vhost_memory_region);
395 msg.flags |= VHOST_USER_NEED_REPLY_MASK;
398 case VHOST_USER_SET_LOG_FD:
399 fds[fd_num++] = *((int *)arg);
402 case VHOST_USER_SET_VRING_NUM:
403 case VHOST_USER_SET_VRING_BASE:
404 case VHOST_USER_SET_VRING_ENABLE:
405 memcpy(&msg.payload.state, arg, sizeof(msg.payload.state));
406 msg.size = sizeof(m.payload.state);
409 case VHOST_USER_GET_VRING_BASE:
410 memcpy(&msg.payload.state, arg, sizeof(msg.payload.state));
411 msg.size = sizeof(m.payload.state);
415 case VHOST_USER_SET_VRING_ADDR:
416 memcpy(&msg.payload.addr, arg, sizeof(msg.payload.addr));
417 msg.size = sizeof(m.payload.addr);
420 case VHOST_USER_SET_VRING_KICK:
421 case VHOST_USER_SET_VRING_CALL:
422 case VHOST_USER_SET_VRING_ERR:
424 msg.payload.u64 = file->index & VHOST_USER_VRING_IDX_MASK;
425 msg.size = sizeof(m.payload.u64);
427 fds[fd_num++] = file->fd;
429 msg.payload.u64 |= VHOST_USER_VRING_NOFD_MASK;
433 PMD_DRV_LOG(ERR, "trying to send unhandled msg type");
437 if (vhost_user_write(vhostfd, &msg, fds, fd_num) < 0) {
438 PMD_DRV_LOG(ERR, "%s failed: %s",
439 vhost_msg_strings[req], strerror(errno));
443 if (need_reply || msg.flags & VHOST_USER_NEED_REPLY_MASK) {
444 if (vhost_user_read(vhostfd, &msg) < 0) {
445 PMD_DRV_LOG(ERR, "Received msg failed: %s",
450 if (req != msg.request) {
451 PMD_DRV_LOG(ERR, "Received unexpected msg type");
456 case VHOST_USER_GET_STATUS:
457 case VHOST_USER_GET_PROTOCOL_FEATURES:
458 if (msg.size != sizeof(m.payload.u64)) {
459 PMD_DRV_LOG(ERR, "Received bad msg size");
462 *((__u64 *)arg) = msg.payload.u64;
464 case VHOST_USER_GET_VRING_BASE:
465 if (msg.size != sizeof(m.payload.state)) {
466 PMD_DRV_LOG(ERR, "Received bad msg size");
469 memcpy(arg, &msg.payload.state,
470 sizeof(struct vhost_vring_state));
473 /* Reply-ack handling */
474 if (msg.size != sizeof(m.payload.u64)) {
475 PMD_DRV_LOG(ERR, "Received bad msg size");
479 if (msg.payload.u64 != 0) {
480 PMD_DRV_LOG(ERR, "Slave replied NACK");
491 #define MAX_VIRTIO_USER_BACKLOG 1
493 virtio_user_start_server(struct virtio_user_dev *dev, struct sockaddr_un *un)
497 int fd = dev->listenfd;
499 ret = bind(fd, (struct sockaddr *)un, sizeof(*un));
501 PMD_DRV_LOG(ERR, "failed to bind to %s: %s; remove it and try again\n",
502 dev->path, strerror(errno));
505 ret = listen(fd, MAX_VIRTIO_USER_BACKLOG);
509 flag = fcntl(fd, F_GETFL);
510 if (fcntl(fd, F_SETFL, flag | O_NONBLOCK) < 0) {
511 PMD_DRV_LOG(ERR, "fcntl failed, %s", strerror(errno));
519 * Set up environment to talk with a vhost user backend.
526 vhost_user_setup(struct virtio_user_dev *dev)
530 struct sockaddr_un un;
532 fd = socket(AF_UNIX, SOCK_STREAM, 0);
534 PMD_DRV_LOG(ERR, "socket() error, %s", strerror(errno));
538 flag = fcntl(fd, F_GETFD);
539 if (fcntl(fd, F_SETFD, flag | FD_CLOEXEC) < 0)
540 PMD_DRV_LOG(WARNING, "fcntl failed, %s", strerror(errno));
542 memset(&un, 0, sizeof(un));
543 un.sun_family = AF_UNIX;
544 strlcpy(un.sun_path, dev->path, sizeof(un.sun_path));
546 if (dev->is_server) {
548 if (virtio_user_start_server(dev, &un) < 0) {
549 PMD_DRV_LOG(ERR, "virtio-user startup fails in server mode");
555 if (connect(fd, (struct sockaddr *)&un, sizeof(un)) < 0) {
556 PMD_DRV_LOG(ERR, "connect error, %s", strerror(errno));
567 vhost_user_enable_queue_pair(struct virtio_user_dev *dev,
573 if (dev->qp_enabled[pair_idx] == enable)
576 for (i = 0; i < 2; ++i) {
577 struct vhost_vring_state state = {
578 .index = pair_idx * 2 + i,
582 if (vhost_user_sock(dev, VHOST_USER_SET_VRING_ENABLE, &state))
586 dev->qp_enabled[pair_idx] = enable;
590 struct virtio_user_backend_ops virtio_ops_user = {
591 .setup = vhost_user_setup,
592 .set_owner = vhost_user_set_owner,
593 .get_features = vhost_user_get_features,
594 .set_features = vhost_user_set_features,
595 .send_request = vhost_user_sock,
596 .enable_qp = vhost_user_enable_queue_pair