2019-10-23 14:36:01 +00:00
|
|
|
// Copyright 2019 Red Hat, Inc. All Rights Reserved.
|
|
|
|
//
|
|
|
|
// Portions Copyright 2019 Intel Corporation. All Rights Reserved.
|
|
|
|
//
|
|
|
|
// Portions Copyright 2018 Amazon.com, Inc. or its affiliates. All Rights Reserved.
|
|
|
|
//
|
|
|
|
// Portions Copyright 2017 The Chromium OS Authors. All rights reserved.
|
|
|
|
//
|
|
|
|
// SPDX-License-Identifier: (Apache-2.0 AND BSD-3-Clause)
|
|
|
|
|
|
|
|
#[macro_use(crate_version, crate_authors)]
|
|
|
|
extern crate clap;
|
|
|
|
extern crate log;
|
|
|
|
extern crate vhost_rs;
|
|
|
|
extern crate vhost_user_backend;
|
|
|
|
extern crate vm_virtio;
|
|
|
|
|
|
|
|
use clap::{App, Arg};
|
|
|
|
use epoll;
|
|
|
|
use log::*;
|
|
|
|
use std::fs::File;
|
|
|
|
use std::fs::OpenOptions;
|
|
|
|
use std::io::Read;
|
|
|
|
use std::io::{Seek, SeekFrom, Write};
|
|
|
|
use std::mem;
|
2019-12-02 13:59:09 +00:00
|
|
|
use std::os::unix::fs::OpenOptionsExt;
|
2019-10-23 14:36:01 +00:00
|
|
|
use std::path::PathBuf;
|
|
|
|
use std::process;
|
|
|
|
use std::slice;
|
|
|
|
use std::sync::{Arc, RwLock};
|
|
|
|
use std::vec::Vec;
|
|
|
|
|
|
|
|
use qcow::{self, ImageType, QcowFile};
|
|
|
|
|
|
|
|
use vhost_rs::vhost_user::message::*;
|
|
|
|
use vhost_user_backend::{VhostUserBackend, VhostUserDaemon, Vring, VringWorker};
|
|
|
|
|
|
|
|
use virtio_bindings::bindings::virtio_blk::*;
|
|
|
|
use vm_memory::{Bytes, GuestMemoryError, GuestMemoryMmap};
|
|
|
|
use vm_virtio::block::{build_disk_image_id, Request};
|
|
|
|
|
|
|
|
const QUEUE_SIZE: usize = 1024;
|
|
|
|
const NUM_QUEUES: usize = 1;
|
|
|
|
const SECTOR_SHIFT: u8 = 9;
|
|
|
|
const SECTOR_SIZE: u64 = (0x01 as u64) << SECTOR_SHIFT;
|
|
|
|
const BLK_SIZE: u32 = 512;
|
|
|
|
|
|
|
|
trait DiskFile: Read + Seek + Write + Send + Sync {}
|
|
|
|
impl<D: Read + Seek + Write + Send + Sync> DiskFile for D {}
|
|
|
|
|
|
|
|
pub type Result<T> = std::result::Result<T, Error>;
|
|
|
|
pub type VhostUserBackendResult<T> = std::result::Result<T, std::io::Error>;
|
|
|
|
|
|
|
|
#[derive(Debug)]
|
|
|
|
pub enum Error {
|
|
|
|
/// Failed to detect image type.
|
|
|
|
DetectImageType,
|
|
|
|
/// Bad memory address.
|
|
|
|
GuestMemory(GuestMemoryError),
|
|
|
|
/// Can't open image file.
|
|
|
|
OpenImage,
|
2019-12-02 13:59:09 +00:00
|
|
|
/// Failed to parse direct parameter.
|
|
|
|
ParseDirectParam,
|
2019-10-23 14:36:01 +00:00
|
|
|
/// Failed to parse image parameter.
|
|
|
|
ParseImageParam,
|
|
|
|
/// Failed to parse sock parameter.
|
|
|
|
ParseSockParam,
|
2019-12-18 03:16:18 +00:00
|
|
|
/// Failed to parse readonly parameter.
|
|
|
|
ParseReadOnlyParam,
|
2019-10-23 14:36:01 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
struct VhostUserBlkBackend {
|
|
|
|
mem: Option<GuestMemoryMmap>,
|
|
|
|
vring_worker: Option<Arc<VringWorker>>,
|
|
|
|
disk_image: Box<dyn DiskFile>,
|
|
|
|
disk_image_id: Vec<u8>,
|
|
|
|
disk_nsectors: u64,
|
|
|
|
config: virtio_blk_config,
|
2019-12-18 03:16:18 +00:00
|
|
|
rdonly: bool,
|
2019-10-23 14:36:01 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
impl VhostUserBlkBackend {
|
2019-12-02 13:59:09 +00:00
|
|
|
pub fn new(image_path: String, rdonly: bool, direct: bool) -> Result<Self> {
|
|
|
|
let mut options = OpenOptions::new();
|
|
|
|
options.read(true);
|
|
|
|
options.write(!rdonly);
|
|
|
|
if direct {
|
|
|
|
options.custom_flags(libc::O_DIRECT);
|
|
|
|
}
|
|
|
|
let image: File = options.open(&image_path).unwrap();
|
|
|
|
let mut raw_img: vm_virtio::RawFile = vm_virtio::RawFile::new(image, direct);
|
2019-10-23 14:36:01 +00:00
|
|
|
|
|
|
|
let image_id = build_disk_image_id(&PathBuf::from(&image_path));
|
2020-01-15 18:20:02 +00:00
|
|
|
let image_type = qcow::detect_image_type(&mut raw_img).unwrap();
|
2019-10-23 14:36:01 +00:00
|
|
|
let mut image = match image_type {
|
2020-01-15 18:20:02 +00:00
|
|
|
ImageType::Raw => Box::new(raw_img) as Box<dyn DiskFile>,
|
2019-10-23 14:36:01 +00:00
|
|
|
ImageType::Qcow2 => Box::new(QcowFile::from(raw_img).unwrap()) as Box<dyn DiskFile>,
|
|
|
|
};
|
|
|
|
|
|
|
|
let nsectors = (image.seek(SeekFrom::End(0)).unwrap() as u64) / SECTOR_SIZE;
|
|
|
|
let mut config = virtio_blk_config::default();
|
|
|
|
|
|
|
|
config.capacity = nsectors;
|
|
|
|
config.blk_size = BLK_SIZE;
|
|
|
|
config.size_max = 65535;
|
|
|
|
config.seg_max = 128 - 2;
|
|
|
|
config.min_io_size = 1;
|
|
|
|
config.opt_io_size = 1;
|
|
|
|
config.num_queues = 1;
|
vhost_user_blk: Add missing WCE property support
Add missing WCE (write-cache enable) property support. This not only
an enhancement, but also a fix for a bug.
Right now, when vhost_user_blk uses a qcow2 image, it doesn't write
the QCOW2 metadata until the guest explicitly requests a flush. In
practice, this is equivalent to the write back semantic.
Without WCE, the guest assumes write through for the virtio_blk
device, and doesn't send those flush requests. Adding support for WCE,
and enabling it by default, we ensure the guest does send said
requests.
Supporting "WCE = false" would require updating our qcow2
implementation to ensure that, when required, it honors the write
through semantics by not deferring the updates to QCOW2 metadata.
Signed-off-by: Sergio Lopez <slp@redhat.com>
2020-01-16 12:13:32 +00:00
|
|
|
config.wce = 1;
|
2019-10-23 14:36:01 +00:00
|
|
|
|
|
|
|
Ok(VhostUserBlkBackend {
|
|
|
|
mem: None,
|
|
|
|
vring_worker: None,
|
|
|
|
disk_image: image,
|
|
|
|
disk_image_id: image_id,
|
|
|
|
disk_nsectors: nsectors,
|
|
|
|
config,
|
2019-12-18 03:16:18 +00:00
|
|
|
rdonly,
|
2019-10-23 14:36:01 +00:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn process_queue(&mut self, vring: &mut Vring) -> bool {
|
|
|
|
let mut used_any = false;
|
|
|
|
let mem = match self.mem.as_ref() {
|
|
|
|
Some(m) => m,
|
|
|
|
None => return false,
|
|
|
|
};
|
|
|
|
|
|
|
|
while let Some(head) = vring.mut_queue().iter(mem).next() {
|
|
|
|
debug!("got an element in the queue");
|
|
|
|
let len;
|
|
|
|
match Request::parse(&head, mem) {
|
|
|
|
Ok(request) => {
|
|
|
|
debug!("element is a valid request");
|
|
|
|
let status = match request.execute(
|
|
|
|
&mut self.disk_image,
|
|
|
|
self.disk_nsectors,
|
|
|
|
mem,
|
|
|
|
&self.disk_image_id,
|
|
|
|
) {
|
|
|
|
Ok(l) => {
|
|
|
|
len = l;
|
|
|
|
VIRTIO_BLK_S_OK
|
|
|
|
}
|
|
|
|
Err(e) => {
|
|
|
|
len = 1;
|
|
|
|
e.status()
|
|
|
|
}
|
|
|
|
};
|
|
|
|
mem.write_obj(status, request.status_addr).unwrap();
|
|
|
|
}
|
|
|
|
Err(err) => {
|
|
|
|
error!("failed to parse available descriptor chain: {:?}", err);
|
|
|
|
len = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
vring.mut_queue().add_used(mem, head.index, len);
|
|
|
|
used_any = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
used_any
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl VhostUserBackend for VhostUserBlkBackend {
|
|
|
|
fn num_queues(&self) -> usize {
|
|
|
|
NUM_QUEUES
|
|
|
|
}
|
|
|
|
|
|
|
|
fn max_queue_size(&self) -> usize {
|
|
|
|
QUEUE_SIZE
|
|
|
|
}
|
|
|
|
|
|
|
|
fn features(&self) -> u64 {
|
2019-12-18 03:16:18 +00:00
|
|
|
let mut avail_features = 1 << VIRTIO_BLK_F_MQ
|
vhost_user_blk: Add missing WCE property support
Add missing WCE (write-cache enable) property support. This not only
an enhancement, but also a fix for a bug.
Right now, when vhost_user_blk uses a qcow2 image, it doesn't write
the QCOW2 metadata until the guest explicitly requests a flush. In
practice, this is equivalent to the write back semantic.
Without WCE, the guest assumes write through for the virtio_blk
device, and doesn't send those flush requests. Adding support for WCE,
and enabling it by default, we ensure the guest does send said
requests.
Supporting "WCE = false" would require updating our qcow2
implementation to ensure that, when required, it honors the write
through semantics by not deferring the updates to QCOW2 metadata.
Signed-off-by: Sergio Lopez <slp@redhat.com>
2020-01-16 12:13:32 +00:00
|
|
|
| 1 << VIRTIO_BLK_F_CONFIG_WCE
|
2019-10-23 14:36:01 +00:00
|
|
|
| 1 << VIRTIO_F_VERSION_1
|
2019-12-18 03:16:18 +00:00
|
|
|
| VhostUserVirtioFeatures::PROTOCOL_FEATURES.bits();
|
|
|
|
|
|
|
|
if self.rdonly {
|
|
|
|
avail_features |= 1 << VIRTIO_BLK_F_RO;
|
|
|
|
}
|
|
|
|
avail_features
|
2019-10-23 14:36:01 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
fn protocol_features(&self) -> VhostUserProtocolFeatures {
|
|
|
|
VhostUserProtocolFeatures::CONFIG
|
|
|
|
}
|
|
|
|
|
|
|
|
fn update_memory(&mut self, mem: GuestMemoryMmap) -> VhostUserBackendResult<()> {
|
|
|
|
self.mem = Some(mem);
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
|
|
|
fn handle_event(
|
|
|
|
&mut self,
|
|
|
|
device_event: u16,
|
|
|
|
evset: epoll::Events,
|
|
|
|
vrings: &[Arc<RwLock<Vring>>],
|
|
|
|
) -> VhostUserBackendResult<bool> {
|
|
|
|
if evset != epoll::Events::EPOLLIN {
|
|
|
|
warn!("invalid events operation");
|
|
|
|
return Ok(false);
|
|
|
|
}
|
|
|
|
|
|
|
|
debug!("event received: {:?}", device_event);
|
|
|
|
|
|
|
|
let mut vring = vrings[0].write().unwrap();
|
|
|
|
if self.process_queue(&mut vring) {
|
|
|
|
debug!("signalling queue");
|
|
|
|
vring.signal_used_queue().unwrap();
|
|
|
|
}
|
|
|
|
|
|
|
|
Ok(false)
|
|
|
|
}
|
|
|
|
|
|
|
|
fn get_config(&self, _offset: u32, _size: u32) -> Vec<u8> {
|
|
|
|
// self.config is a statically allocated virtio_blk_config
|
|
|
|
let buf = unsafe {
|
|
|
|
slice::from_raw_parts(
|
|
|
|
&self.config as *const virtio_blk_config as *const _,
|
|
|
|
mem::size_of::<virtio_blk_config>(),
|
|
|
|
)
|
|
|
|
};
|
|
|
|
|
|
|
|
buf.to_vec()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pub struct VhostUserBlkBackendConfig<'a> {
|
|
|
|
pub image: &'a str,
|
|
|
|
pub sock: &'a str,
|
2019-12-18 03:16:18 +00:00
|
|
|
pub readonly: bool,
|
2019-12-02 13:59:09 +00:00
|
|
|
pub direct: bool,
|
2019-10-23 14:36:01 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
impl<'a> VhostUserBlkBackendConfig<'a> {
|
|
|
|
pub fn parse(backend: &'a str) -> Result<Self> {
|
|
|
|
let params_list: Vec<&str> = backend.split(',').collect();
|
|
|
|
|
|
|
|
let mut image: &str = "";
|
|
|
|
let mut sock: &str = "";
|
2019-12-18 03:16:18 +00:00
|
|
|
let mut readonly: bool = false;
|
2019-12-02 13:59:09 +00:00
|
|
|
let mut direct: bool = false;
|
2019-10-23 14:36:01 +00:00
|
|
|
|
|
|
|
for param in params_list.iter() {
|
|
|
|
if param.starts_with("image=") {
|
|
|
|
image = ¶m[6..];
|
|
|
|
} else if param.starts_with("sock=") {
|
|
|
|
sock = ¶m[5..];
|
2019-12-18 03:16:18 +00:00
|
|
|
} else if param.starts_with("readonly=") {
|
|
|
|
readonly = match param[9..].parse::<bool>() {
|
|
|
|
Ok(b) => b,
|
|
|
|
Err(_) => return Err(Error::ParseReadOnlyParam),
|
|
|
|
}
|
2019-12-02 13:59:09 +00:00
|
|
|
} else if param.starts_with("direct=") {
|
|
|
|
direct = match param[7..].parse::<bool>() {
|
|
|
|
Ok(b) => b,
|
|
|
|
Err(_) => return Err(Error::ParseDirectParam),
|
|
|
|
}
|
2019-10-23 14:36:01 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if image.is_empty() {
|
|
|
|
return Err(Error::ParseImageParam);
|
|
|
|
}
|
|
|
|
if sock.is_empty() {
|
|
|
|
return Err(Error::ParseSockParam);
|
|
|
|
}
|
|
|
|
|
2019-12-18 03:16:18 +00:00
|
|
|
Ok(VhostUserBlkBackendConfig {
|
|
|
|
image,
|
|
|
|
sock,
|
|
|
|
readonly,
|
2019-12-02 13:59:09 +00:00
|
|
|
direct,
|
2019-12-18 03:16:18 +00:00
|
|
|
})
|
2019-10-23 14:36:01 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
fn main() {
|
|
|
|
let cmd_arguments = App::new("vhost-user-blk backend")
|
|
|
|
.version(crate_version!())
|
|
|
|
.author(crate_authors!())
|
|
|
|
.about("Launch a vhost-user-blk backend.")
|
|
|
|
.arg(
|
|
|
|
Arg::with_name("backend")
|
|
|
|
.long("backend")
|
|
|
|
.help(
|
|
|
|
"Backend parameters \"image=<image_path>,\
|
2019-12-02 13:59:09 +00:00
|
|
|
sock=<socket_path>,readonly=true|false,\
|
|
|
|
direct=true|false\"",
|
2019-10-23 14:36:01 +00:00
|
|
|
)
|
|
|
|
.takes_value(true)
|
|
|
|
.min_values(1),
|
|
|
|
)
|
|
|
|
.get_matches();
|
|
|
|
|
|
|
|
let vhost_user_blk_backend = cmd_arguments.value_of("backend").unwrap();
|
|
|
|
|
|
|
|
let backend_config = match VhostUserBlkBackendConfig::parse(vhost_user_blk_backend) {
|
|
|
|
Ok(config) => config,
|
|
|
|
Err(e) => {
|
|
|
|
println!("Failed parsing parameters {:?}", e);
|
|
|
|
process::exit(1);
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
let blk_backend = Arc::new(RwLock::new(
|
2019-12-02 13:59:09 +00:00
|
|
|
VhostUserBlkBackend::new(
|
|
|
|
backend_config.image.to_string(),
|
|
|
|
backend_config.readonly,
|
|
|
|
backend_config.direct,
|
|
|
|
)
|
|
|
|
.unwrap(),
|
2019-10-23 14:36:01 +00:00
|
|
|
));
|
|
|
|
|
|
|
|
debug!("blk_backend is created!\n");
|
|
|
|
|
|
|
|
let name = "vhost-user-blk-backend";
|
|
|
|
let mut blk_daemon = VhostUserDaemon::new(
|
|
|
|
name.to_string(),
|
|
|
|
backend_config.sock.to_string(),
|
|
|
|
blk_backend.clone(),
|
|
|
|
)
|
|
|
|
.unwrap();
|
|
|
|
debug!("blk_daemon is created!\n");
|
|
|
|
|
|
|
|
let vring_worker = blk_daemon.get_vring_worker();
|
|
|
|
|
|
|
|
blk_backend.write().unwrap().vring_worker = Some(vring_worker);
|
|
|
|
|
|
|
|
if let Err(e) = blk_daemon.start() {
|
|
|
|
println!(
|
|
|
|
"failed to start daemon for vhost-user-blk with error: {:?}\n",
|
|
|
|
e
|
|
|
|
);
|
|
|
|
process::exit(1);
|
|
|
|
}
|
|
|
|
|
|
|
|
blk_daemon.wait().unwrap();
|
|
|
|
}
|