2019-05-08 10:22:53 +00:00
|
|
|
// Copyright 2018 Amazon.com, Inc. or its affiliates. All Rights Reserved.
|
|
|
|
//
|
|
|
|
// Portions Copyright 2017 The Chromium OS Authors. All rights reserved.
|
|
|
|
// Use of this source code is governed by a BSD-style license that can be
|
|
|
|
// found in the LICENSE-BSD-3-Clause file.
|
|
|
|
//
|
2019-02-28 13:16:58 +00:00
|
|
|
// Copyright © 2019 Intel Corporation
|
|
|
|
//
|
2019-05-08 10:22:53 +00:00
|
|
|
// SPDX-License-Identifier: Apache-2.0 AND BSD-3-Clause
|
|
|
|
//
|
2019-02-28 13:16:58 +00:00
|
|
|
|
2019-11-22 13:54:52 +00:00
|
|
|
extern crate anyhow;
|
2019-02-28 13:16:58 +00:00
|
|
|
extern crate arch;
|
2019-03-07 13:56:43 +00:00
|
|
|
extern crate devices;
|
2019-03-18 20:59:50 +00:00
|
|
|
extern crate epoll;
|
2019-02-28 13:16:58 +00:00
|
|
|
extern crate kvm_ioctls;
|
2019-02-28 14:26:30 +00:00
|
|
|
extern crate libc;
|
2019-02-28 13:16:58 +00:00
|
|
|
extern crate linux_loader;
|
2019-05-09 15:01:42 +00:00
|
|
|
extern crate net_util;
|
vm-virtio: Implement console size config feature
One of the features of the virtio console device is its size can be
configured and updated. Our first iteration of the console device
implementation is lack of this feature. As a result, it had a
default fixed size which could not be changed. This commit implements
the console config feature and lets us change the console size from
the vmm side.
During the activation of the device, vmm reads the current terminal
size, sets the console configuration accordinly, and lets the driver
know about this configuration by sending an interrupt. Later, if
someone changes the terminal size, the vmm detects the corresponding
event, updates the configuration, and sends interrupt as before. As a
result, the console device driver, in the guest, updates the console
size.
Signed-off-by: A K M Fazla Mehrab <fazla.mehrab.akm@intel.com>
2019-07-23 19:18:20 +00:00
|
|
|
extern crate signal_hook;
|
2019-09-11 16:07:33 +00:00
|
|
|
#[cfg(feature = "pci_support")]
|
2019-07-15 09:42:40 +00:00
|
|
|
extern crate vfio;
|
2019-05-06 17:27:40 +00:00
|
|
|
extern crate vm_allocator;
|
2019-02-28 13:16:58 +00:00
|
|
|
extern crate vm_memory;
|
2019-05-06 17:27:40 +00:00
|
|
|
extern crate vm_virtio;
|
2019-02-28 13:16:58 +00:00
|
|
|
|
2019-11-06 17:20:55 +00:00
|
|
|
use crate::config::VmConfig;
|
2019-11-11 13:55:50 +00:00
|
|
|
use crate::cpu;
|
2019-09-06 15:42:41 +00:00
|
|
|
use crate::device_manager::{get_win_size, Console, DeviceManager, DeviceManagerError};
|
2019-12-19 15:47:36 +00:00
|
|
|
use crate::memory_manager::{get_host_cpu_phys_bits, Error as MemoryManagerError, MemoryManager};
|
2019-11-22 13:54:52 +00:00
|
|
|
use anyhow::anyhow;
|
2019-12-19 15:47:36 +00:00
|
|
|
use arch::layout;
|
2020-01-14 10:17:23 +00:00
|
|
|
use devices::{ioapic, HotPlugNotificationFlags};
|
2019-12-05 16:22:00 +00:00
|
|
|
use kvm_bindings::{kvm_enable_cap, kvm_userspace_memory_region, KVM_CAP_SPLIT_IRQCHIP};
|
2019-02-28 13:16:58 +00:00
|
|
|
use kvm_ioctls::*;
|
2019-09-27 08:39:56 +00:00
|
|
|
use linux_loader::cmdline::Cmdline;
|
2019-02-28 13:16:58 +00:00
|
|
|
use linux_loader::loader::KernelLoader;
|
2019-12-05 03:27:40 +00:00
|
|
|
use signal_hook::{iterator::Signals, SIGINT, SIGTERM, SIGWINCH};
|
2019-02-28 13:16:58 +00:00
|
|
|
use std::ffi::CString;
|
2019-12-19 15:47:36 +00:00
|
|
|
use std::fs::File;
|
2019-09-04 13:55:14 +00:00
|
|
|
use std::io;
|
2019-11-11 14:31:11 +00:00
|
|
|
use std::sync::{Arc, Mutex, RwLock};
|
2019-11-11 13:55:50 +00:00
|
|
|
use std::{result, str, thread};
|
2019-07-11 09:48:14 +00:00
|
|
|
use vm_allocator::{GsiApic, SystemAllocator};
|
2019-11-22 13:54:52 +00:00
|
|
|
use vm_device::{Migratable, MigratableError, Pausable, Snapshotable};
|
2019-02-28 13:16:58 +00:00
|
|
|
use vm_memory::{
|
2019-12-19 15:47:36 +00:00
|
|
|
Address, Bytes, GuestAddress, GuestMemory, GuestMemoryMmap, GuestMemoryRegion, GuestUsize,
|
2019-02-28 13:16:58 +00:00
|
|
|
};
|
2019-09-04 14:28:48 +00:00
|
|
|
use vmm_sys_util::eventfd::EventFd;
|
2019-03-18 20:59:50 +00:00
|
|
|
use vmm_sys_util::terminal::Terminal;
|
2019-02-28 13:16:58 +00:00
|
|
|
|
2019-12-09 15:09:05 +00:00
|
|
|
const X86_64_IRQ_BASE: u32 = 5;
|
2019-02-28 13:16:58 +00:00
|
|
|
|
2019-04-25 17:10:42 +00:00
|
|
|
// CPUID feature bits
|
2019-06-07 21:30:20 +00:00
|
|
|
const TSC_DEADLINE_TIMER_ECX_BIT: u8 = 24; // tsc deadline timer ecx bit.
|
|
|
|
const HYPERVISOR_ECX_BIT: u8 = 31; // Hypervisor ecx bit.
|
2019-04-25 17:10:42 +00:00
|
|
|
|
2019-06-10 09:14:02 +00:00
|
|
|
// 64 bit direct boot entry offset for bzImage
|
|
|
|
const KERNEL_64BIT_ENTRY_OFFSET: u64 = 0x200;
|
|
|
|
|
2019-05-10 08:21:53 +00:00
|
|
|
/// Errors associated with VM management
|
2019-02-28 13:16:58 +00:00
|
|
|
#[derive(Debug)]
|
|
|
|
pub enum Error {
|
|
|
|
/// Cannot open the VM file descriptor.
|
|
|
|
VmFd(io::Error),
|
|
|
|
|
|
|
|
/// Cannot create the KVM instance
|
2019-11-29 15:36:33 +00:00
|
|
|
VmCreate(kvm_ioctls::Error),
|
2019-02-28 13:16:58 +00:00
|
|
|
|
|
|
|
/// Cannot set the VM up
|
2019-11-29 15:36:33 +00:00
|
|
|
VmSetup(kvm_ioctls::Error),
|
2019-02-28 13:16:58 +00:00
|
|
|
|
|
|
|
/// Cannot open the kernel image
|
|
|
|
KernelFile(io::Error),
|
|
|
|
|
|
|
|
/// Cannot load the kernel in memory
|
|
|
|
KernelLoad(linux_loader::loader::Error),
|
|
|
|
|
|
|
|
/// Cannot load the command line in memory
|
2020-01-24 08:34:51 +00:00
|
|
|
LoadCmdLine(linux_loader::loader::Error),
|
|
|
|
|
|
|
|
/// Cannot modify the command line
|
|
|
|
CmdLineInsertStr(linux_loader::cmdline::Error),
|
|
|
|
|
|
|
|
/// Cannot convert command line into CString
|
|
|
|
CmdLineCString(std::ffi::NulError),
|
|
|
|
|
|
|
|
/// Cannot configure system
|
|
|
|
ConfigureSystem(arch::Error),
|
2019-02-28 14:26:30 +00:00
|
|
|
|
2019-10-01 08:14:08 +00:00
|
|
|
PoisonedState,
|
|
|
|
|
2019-05-14 01:12:40 +00:00
|
|
|
/// Cannot create a device manager.
|
|
|
|
DeviceManager(DeviceManagerError),
|
|
|
|
|
2019-09-06 15:42:41 +00:00
|
|
|
/// Write to the console failed.
|
2019-08-02 14:23:52 +00:00
|
|
|
Console(vmm_sys_util::errno::Error),
|
2019-07-22 19:29:02 +00:00
|
|
|
|
2019-05-07 18:34:03 +00:00
|
|
|
/// Cannot setup terminal in raw mode.
|
2019-08-02 14:23:52 +00:00
|
|
|
SetTerminalRaw(vmm_sys_util::errno::Error),
|
2019-05-07 18:34:03 +00:00
|
|
|
|
|
|
|
/// Cannot setup terminal in canonical mode.
|
2019-08-02 14:23:52 +00:00
|
|
|
SetTerminalCanon(vmm_sys_util::errno::Error),
|
2019-05-07 18:34:03 +00:00
|
|
|
|
2019-05-14 01:12:40 +00:00
|
|
|
/// Cannot create the system allocator
|
|
|
|
CreateSystemAllocator,
|
2019-05-06 17:27:40 +00:00
|
|
|
|
2019-05-14 01:12:40 +00:00
|
|
|
/// Failed parsing network parameters
|
|
|
|
ParseNetworkParameters,
|
2019-05-19 02:24:47 +00:00
|
|
|
|
2019-06-10 09:14:02 +00:00
|
|
|
/// Memory is overflow
|
|
|
|
MemOverflow,
|
2019-05-22 20:06:49 +00:00
|
|
|
|
2019-07-17 16:54:11 +00:00
|
|
|
/// Failed to allocate the IOAPIC memory range.
|
|
|
|
IoapicRangeAllocation,
|
2019-08-30 17:24:01 +00:00
|
|
|
|
|
|
|
/// Cannot spawn a signal handler thread
|
|
|
|
SignalHandlerSpawn(io::Error),
|
2019-09-03 09:00:15 +00:00
|
|
|
|
|
|
|
/// Failed to join on vCPU threads
|
2020-01-24 08:34:51 +00:00
|
|
|
ThreadCleanup(std::boxed::Box<dyn std::any::Any + std::marker::Send>),
|
2019-09-23 23:12:07 +00:00
|
|
|
|
|
|
|
/// Failed to create a new KVM instance
|
2019-11-29 15:36:33 +00:00
|
|
|
KvmNew(kvm_ioctls::Error),
|
2019-10-01 14:41:50 +00:00
|
|
|
|
|
|
|
/// VM is not created
|
|
|
|
VmNotCreated,
|
|
|
|
|
2019-10-10 16:00:44 +00:00
|
|
|
/// VM is not running
|
|
|
|
VmNotRunning,
|
2019-10-01 15:03:38 +00:00
|
|
|
|
2019-10-01 14:41:50 +00:00
|
|
|
/// Cannot clone EventFd.
|
|
|
|
EventFdClone(io::Error),
|
2019-10-11 12:47:57 +00:00
|
|
|
|
|
|
|
/// Invalid VM state transition
|
|
|
|
InvalidStateTransition(VmState, VmState),
|
2019-08-14 12:10:29 +00:00
|
|
|
|
2019-11-11 13:55:50 +00:00
|
|
|
/// Error from CPU handling
|
|
|
|
CpuManager(cpu::Error),
|
2019-12-05 15:24:26 +00:00
|
|
|
|
|
|
|
/// Capability missing
|
|
|
|
CapabilityMissing(Cap),
|
2019-11-18 23:24:31 +00:00
|
|
|
|
|
|
|
/// Cannot pause devices
|
|
|
|
PauseDevices(MigratableError),
|
|
|
|
|
|
|
|
/// Cannot resume devices
|
|
|
|
ResumeDevices(MigratableError),
|
2019-11-21 18:04:08 +00:00
|
|
|
|
|
|
|
/// Cannot pause CPUs
|
|
|
|
PauseCpus(MigratableError),
|
|
|
|
|
|
|
|
/// Cannot resume cpus
|
|
|
|
ResumeCpus(MigratableError),
|
2019-11-22 13:54:52 +00:00
|
|
|
|
|
|
|
/// Cannot pause VM
|
|
|
|
Pause(MigratableError),
|
|
|
|
|
|
|
|
/// Cannot resume VM
|
|
|
|
Resume(MigratableError),
|
2019-12-19 15:47:36 +00:00
|
|
|
|
|
|
|
/// Memory manager error
|
|
|
|
MemoryManager(MemoryManagerError),
|
2019-02-28 14:26:30 +00:00
|
|
|
}
|
2019-11-11 13:55:50 +00:00
|
|
|
pub type Result<T> = result::Result<T, Error>;
|
2019-02-28 14:26:30 +00:00
|
|
|
|
2019-10-11 12:47:57 +00:00
|
|
|
#[derive(Clone, Copy, Debug, Deserialize, Serialize, PartialEq)]
|
2019-10-01 08:14:08 +00:00
|
|
|
pub enum VmState {
|
|
|
|
Created,
|
2019-10-10 16:00:44 +00:00
|
|
|
Running,
|
2019-10-01 08:14:08 +00:00
|
|
|
Shutdown,
|
2019-10-10 15:16:58 +00:00
|
|
|
Paused,
|
2019-10-01 08:14:08 +00:00
|
|
|
}
|
|
|
|
|
2019-10-11 12:47:57 +00:00
|
|
|
impl VmState {
|
|
|
|
fn valid_transition(self, new_state: VmState) -> Result<()> {
|
|
|
|
match self {
|
|
|
|
VmState::Created => match new_state {
|
|
|
|
VmState::Created | VmState::Shutdown | VmState::Paused => {
|
|
|
|
Err(Error::InvalidStateTransition(self, new_state))
|
|
|
|
}
|
|
|
|
VmState::Running => Ok(()),
|
|
|
|
},
|
|
|
|
|
|
|
|
VmState::Running => match new_state {
|
|
|
|
VmState::Created | VmState::Running => {
|
|
|
|
Err(Error::InvalidStateTransition(self, new_state))
|
|
|
|
}
|
|
|
|
VmState::Paused | VmState::Shutdown => Ok(()),
|
|
|
|
},
|
|
|
|
|
|
|
|
VmState::Shutdown => match new_state {
|
|
|
|
VmState::Paused | VmState::Created | VmState::Shutdown => {
|
|
|
|
Err(Error::InvalidStateTransition(self, new_state))
|
|
|
|
}
|
|
|
|
VmState::Running => Ok(()),
|
|
|
|
},
|
|
|
|
|
|
|
|
VmState::Paused => match new_state {
|
|
|
|
VmState::Created | VmState::Paused => {
|
|
|
|
Err(Error::InvalidStateTransition(self, new_state))
|
|
|
|
}
|
|
|
|
VmState::Running | VmState::Shutdown => Ok(()),
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-11-07 12:38:09 +00:00
|
|
|
pub struct Vm {
|
2019-02-28 13:16:58 +00:00
|
|
|
kernel: File,
|
2019-09-04 11:59:14 +00:00
|
|
|
threads: Vec<thread::JoinHandle<()>>,
|
2019-03-07 13:56:43 +00:00
|
|
|
devices: DeviceManager,
|
2019-12-05 14:50:38 +00:00
|
|
|
config: Arc<Mutex<VmConfig>>,
|
2019-05-30 15:17:57 +00:00
|
|
|
on_tty: bool,
|
2019-09-09 12:43:03 +00:00
|
|
|
signals: Option<Signals>,
|
2019-10-01 08:14:08 +00:00
|
|
|
state: RwLock<VmState>,
|
2019-11-11 14:31:11 +00:00
|
|
|
cpu_manager: Arc<Mutex<cpu::CpuManager>>,
|
2019-12-19 15:47:36 +00:00
|
|
|
memory_manager: Arc<Mutex<MemoryManager>>,
|
2019-09-18 14:36:14 +00:00
|
|
|
}
|
|
|
|
|
2019-09-24 14:00:00 +00:00
|
|
|
impl Vm {
|
2019-12-05 14:50:38 +00:00
|
|
|
pub fn new(
|
|
|
|
config: Arc<Mutex<VmConfig>>,
|
|
|
|
exit_evt: EventFd,
|
|
|
|
reset_evt: EventFd,
|
|
|
|
) -> Result<Self> {
|
2019-09-23 23:12:07 +00:00
|
|
|
let kvm = Kvm::new().map_err(Error::KvmNew)?;
|
2019-12-05 15:24:26 +00:00
|
|
|
|
|
|
|
// Check required capabilities:
|
|
|
|
if !kvm.check_extension(Cap::SignalMsi) {
|
|
|
|
return Err(Error::CapabilityMissing(Cap::SignalMsi));
|
|
|
|
}
|
|
|
|
|
|
|
|
if !kvm.check_extension(Cap::TscDeadlineTimer) {
|
|
|
|
return Err(Error::CapabilityMissing(Cap::TscDeadlineTimer));
|
|
|
|
}
|
|
|
|
|
|
|
|
if !kvm.check_extension(Cap::SplitIrqchip) {
|
|
|
|
return Err(Error::CapabilityMissing(Cap::SplitIrqchip));
|
|
|
|
}
|
|
|
|
|
2019-12-05 14:50:38 +00:00
|
|
|
let kernel = File::open(&config.lock().unwrap().kernel.as_ref().unwrap().path)
|
|
|
|
.map_err(Error::KernelFile)?;
|
2020-02-05 08:35:56 +00:00
|
|
|
|
|
|
|
let fd: VmFd;
|
|
|
|
loop {
|
|
|
|
match kvm.create_vm() {
|
|
|
|
Ok(res) => fd = res,
|
|
|
|
Err(e) => {
|
|
|
|
if e.errno() == libc::EINTR {
|
|
|
|
// If the error returned is EINTR, which means the
|
|
|
|
// ioctl has been interrupted, we have to retry as
|
|
|
|
// this can't be considered as a regular error.
|
|
|
|
continue;
|
|
|
|
} else {
|
|
|
|
return Err(Error::VmCreate(e));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
2019-05-29 23:33:29 +00:00
|
|
|
let fd = Arc::new(fd);
|
2019-02-28 13:16:58 +00:00
|
|
|
|
|
|
|
// Set TSS
|
|
|
|
fd.set_tss_address(arch::x86_64::layout::KVM_TSS_ADDRESS.raw_value() as usize)
|
|
|
|
.map_err(Error::VmSetup)?;
|
|
|
|
|
2019-06-07 21:30:20 +00:00
|
|
|
let mut cpuid_patches = Vec::new();
|
2019-12-05 16:22:00 +00:00
|
|
|
// Create split irqchip
|
|
|
|
// Only the local APIC is emulated in kernel, both PICs and IOAPIC
|
|
|
|
// are not.
|
|
|
|
let mut cap: kvm_enable_cap = Default::default();
|
|
|
|
cap.cap = KVM_CAP_SPLIT_IRQCHIP;
|
|
|
|
cap.args[0] = ioapic::NUM_IOAPIC_PINS as u64;
|
|
|
|
fd.enable_cap(&cap).map_err(Error::VmSetup)?;
|
|
|
|
|
|
|
|
// Patch tsc deadline timer bit
|
|
|
|
cpuid_patches.push(cpu::CpuidPatch {
|
|
|
|
function: 1,
|
|
|
|
index: 0,
|
|
|
|
flags_bit: None,
|
|
|
|
eax_bit: None,
|
|
|
|
ebx_bit: None,
|
|
|
|
ecx_bit: Some(TSC_DEADLINE_TIMER_ECX_BIT),
|
|
|
|
edx_bit: None,
|
|
|
|
});
|
2019-06-07 21:30:20 +00:00
|
|
|
|
|
|
|
// Patch hypervisor bit
|
2019-11-11 13:55:50 +00:00
|
|
|
cpuid_patches.push(cpu::CpuidPatch {
|
2019-06-07 21:30:20 +00:00
|
|
|
function: 1,
|
|
|
|
index: 0,
|
|
|
|
flags_bit: None,
|
|
|
|
eax_bit: None,
|
|
|
|
ebx_bit: None,
|
|
|
|
ecx_bit: Some(HYPERVISOR_ECX_BIT),
|
|
|
|
edx_bit: None,
|
|
|
|
});
|
|
|
|
|
2019-11-07 12:38:09 +00:00
|
|
|
// Supported CPUID
|
|
|
|
let mut cpuid = kvm
|
2019-11-29 15:36:33 +00:00
|
|
|
.get_supported_cpuid(kvm_bindings::KVM_MAX_CPUID_ENTRIES)
|
2019-11-07 12:38:09 +00:00
|
|
|
.map_err(Error::VmSetup)?;
|
|
|
|
|
2019-11-11 13:55:50 +00:00
|
|
|
cpu::CpuidPatch::patch_cpuid(&mut cpuid, cpuid_patches);
|
2019-03-01 15:22:26 +00:00
|
|
|
|
2019-07-11 09:48:14 +00:00
|
|
|
let ioapic = GsiApic::new(
|
|
|
|
X86_64_IRQ_BASE,
|
|
|
|
ioapic::NUM_IOAPIC_PINS as u32 - X86_64_IRQ_BASE,
|
|
|
|
);
|
|
|
|
|
2019-05-06 17:27:40 +00:00
|
|
|
// Let's allocate 64 GiB of addressable MMIO space, starting at 0.
|
2019-12-19 15:47:36 +00:00
|
|
|
let allocator = Arc::new(Mutex::new(
|
|
|
|
SystemAllocator::new(
|
|
|
|
GuestAddress(0),
|
|
|
|
1 << 16 as GuestUsize,
|
|
|
|
GuestAddress(0),
|
|
|
|
1 << get_host_cpu_phys_bits(),
|
|
|
|
layout::MEM_32BIT_RESERVED_START,
|
|
|
|
layout::MEM_32BIT_DEVICES_SIZE,
|
|
|
|
vec![ioapic],
|
|
|
|
)
|
|
|
|
.ok_or(Error::CreateSystemAllocator)?,
|
|
|
|
));
|
|
|
|
|
|
|
|
let memory_config = config.lock().unwrap().memory.clone();
|
|
|
|
|
|
|
|
let memory_manager = MemoryManager::new(
|
|
|
|
allocator.clone(),
|
|
|
|
fd.clone(),
|
|
|
|
memory_config.size,
|
2020-01-07 11:25:55 +00:00
|
|
|
memory_config.hotplug_size,
|
2019-12-19 15:47:36 +00:00
|
|
|
&memory_config.file,
|
|
|
|
memory_config.mergeable,
|
2019-05-06 17:27:40 +00:00
|
|
|
)
|
2019-12-19 15:47:36 +00:00
|
|
|
.map_err(Error::MemoryManager)?;
|
2019-08-20 21:12:00 +00:00
|
|
|
|
2019-12-19 15:47:36 +00:00
|
|
|
let guest_memory = memory_manager.lock().unwrap().guest_memory();
|
2019-08-01 16:27:23 +00:00
|
|
|
|
2019-12-20 15:17:49 +00:00
|
|
|
let device_manager = DeviceManager::new(
|
2020-01-31 16:23:49 +00:00
|
|
|
fd.clone(),
|
|
|
|
config.clone(),
|
2019-12-20 15:17:49 +00:00
|
|
|
allocator,
|
|
|
|
memory_manager.clone(),
|
|
|
|
&exit_evt,
|
|
|
|
&reset_evt,
|
|
|
|
)
|
|
|
|
.map_err(Error::DeviceManager)?;
|
2019-03-07 13:56:43 +00:00
|
|
|
|
2019-05-30 15:17:57 +00:00
|
|
|
let on_tty = unsafe { libc::isatty(libc::STDIN_FILENO as i32) } != 0;
|
2019-05-08 06:47:59 +00:00
|
|
|
|
2019-12-05 14:50:38 +00:00
|
|
|
let boot_vcpus = config.lock().unwrap().cpus.boot_vcpus;
|
|
|
|
let max_vcpus = config.lock().unwrap().cpus.max_vcpus;
|
2019-11-11 13:55:50 +00:00
|
|
|
let cpu_manager = cpu::CpuManager::new(
|
2019-11-07 12:38:09 +00:00
|
|
|
boot_vcpus,
|
2019-11-25 13:55:10 +00:00
|
|
|
max_vcpus,
|
2019-11-07 12:38:09 +00:00
|
|
|
&device_manager,
|
2020-01-31 16:23:49 +00:00
|
|
|
guest_memory,
|
2019-02-28 13:16:58 +00:00
|
|
|
fd,
|
2019-11-07 12:38:09 +00:00
|
|
|
cpuid,
|
|
|
|
reset_evt,
|
2019-11-11 14:56:10 +00:00
|
|
|
)
|
|
|
|
.map_err(Error::CpuManager)?;
|
2019-11-07 12:38:09 +00:00
|
|
|
|
|
|
|
Ok(Vm {
|
2019-02-28 13:16:58 +00:00
|
|
|
kernel,
|
2019-03-07 13:56:43 +00:00
|
|
|
devices: device_manager,
|
|
|
|
config,
|
2019-05-30 15:17:57 +00:00
|
|
|
on_tty,
|
2019-11-07 12:38:09 +00:00
|
|
|
threads: Vec::with_capacity(1),
|
2019-09-09 12:43:03 +00:00
|
|
|
signals: None,
|
2019-10-01 08:14:08 +00:00
|
|
|
state: RwLock::new(VmState::Created),
|
2019-11-07 12:38:09 +00:00
|
|
|
cpu_manager,
|
2019-12-19 15:47:36 +00:00
|
|
|
memory_manager,
|
2019-02-28 13:16:58 +00:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2019-09-23 23:03:05 +00:00
|
|
|
fn load_kernel(&mut self) -> Result<GuestAddress> {
|
2019-09-27 08:39:56 +00:00
|
|
|
let mut cmdline = Cmdline::new(arch::CMDLINE_MAX_SIZE);
|
|
|
|
cmdline
|
2019-12-05 14:50:38 +00:00
|
|
|
.insert_str(self.config.lock().unwrap().cmdline.args.clone())
|
2020-01-24 08:34:51 +00:00
|
|
|
.map_err(Error::CmdLineInsertStr)?;
|
2019-09-11 15:22:00 +00:00
|
|
|
for entry in self.devices.cmdline_additions() {
|
2020-01-24 08:34:51 +00:00
|
|
|
cmdline.insert_str(entry).map_err(Error::CmdLineInsertStr)?;
|
2019-09-11 15:22:00 +00:00
|
|
|
}
|
|
|
|
|
2020-01-24 08:34:51 +00:00
|
|
|
let cmdline_cstring = CString::new(cmdline).map_err(Error::CmdLineCString)?;
|
2019-12-19 15:47:36 +00:00
|
|
|
let guest_memory = self.memory_manager.lock().as_ref().unwrap().guest_memory();
|
2019-12-31 10:49:11 +00:00
|
|
|
let mem = guest_memory.load_full();
|
2019-06-10 09:14:02 +00:00
|
|
|
let entry_addr = match linux_loader::loader::Elf::load(
|
2019-12-31 10:49:11 +00:00
|
|
|
mem.as_ref(),
|
2019-02-28 13:16:58 +00:00
|
|
|
None,
|
|
|
|
&mut self.kernel,
|
2019-09-27 13:11:50 +00:00
|
|
|
Some(arch::layout::HIGH_RAM_START),
|
2019-06-10 09:14:02 +00:00
|
|
|
) {
|
|
|
|
Ok(entry_addr) => entry_addr,
|
|
|
|
Err(linux_loader::loader::Error::InvalidElfMagicNumber) => {
|
|
|
|
linux_loader::loader::BzImage::load(
|
2019-12-31 10:49:11 +00:00
|
|
|
mem.as_ref(),
|
2019-06-10 09:14:02 +00:00
|
|
|
None,
|
|
|
|
&mut self.kernel,
|
2019-09-27 13:11:50 +00:00
|
|
|
Some(arch::layout::HIGH_RAM_START),
|
2019-06-10 09:14:02 +00:00
|
|
|
)
|
|
|
|
.map_err(Error::KernelLoad)?
|
|
|
|
}
|
|
|
|
_ => panic!("Invalid elf file"),
|
|
|
|
};
|
2019-02-28 13:16:58 +00:00
|
|
|
|
|
|
|
linux_loader::loader::load_cmdline(
|
2019-12-31 10:49:11 +00:00
|
|
|
mem.as_ref(),
|
2019-09-27 16:06:53 +00:00
|
|
|
arch::layout::CMDLINE_START,
|
2019-02-28 13:16:58 +00:00
|
|
|
&cmdline_cstring,
|
|
|
|
)
|
2020-01-24 08:34:51 +00:00
|
|
|
.map_err(Error::LoadCmdLine)?;
|
2019-11-25 14:16:55 +00:00
|
|
|
let boot_vcpus = self.cpu_manager.lock().unwrap().boot_vcpus();
|
2019-11-27 17:12:42 +00:00
|
|
|
let _max_vcpus = self.cpu_manager.lock().unwrap().max_vcpus();
|
2019-11-06 17:20:55 +00:00
|
|
|
|
|
|
|
#[allow(unused_mut, unused_assignments)]
|
|
|
|
let mut rsdp_addr: Option<GuestAddress> = None;
|
|
|
|
|
|
|
|
#[cfg(feature = "acpi")]
|
|
|
|
{
|
2019-12-06 16:14:32 +00:00
|
|
|
rsdp_addr = Some(crate::acpi::create_acpi_tables(
|
|
|
|
&mem,
|
|
|
|
&self.devices,
|
|
|
|
&self.cpu_manager,
|
2020-01-10 16:11:32 +00:00
|
|
|
&self.memory_manager,
|
2019-12-06 16:14:32 +00:00
|
|
|
));
|
2019-11-06 17:20:55 +00:00
|
|
|
}
|
|
|
|
|
2019-06-10 09:14:02 +00:00
|
|
|
match entry_addr.setup_header {
|
|
|
|
Some(hdr) => {
|
|
|
|
arch::configure_system(
|
2019-08-20 22:43:23 +00:00
|
|
|
&mem,
|
2019-09-27 16:06:53 +00:00
|
|
|
arch::layout::CMDLINE_START,
|
2019-06-10 09:14:02 +00:00
|
|
|
cmdline_cstring.to_bytes().len() + 1,
|
2019-11-25 14:16:55 +00:00
|
|
|
boot_vcpus,
|
2019-06-10 09:14:02 +00:00
|
|
|
Some(hdr),
|
2019-11-06 17:20:55 +00:00
|
|
|
rsdp_addr,
|
2019-06-10 09:14:02 +00:00
|
|
|
)
|
2020-01-24 08:34:51 +00:00
|
|
|
.map_err(Error::ConfigureSystem)?;
|
2019-06-10 09:14:02 +00:00
|
|
|
|
|
|
|
let load_addr = entry_addr
|
|
|
|
.kernel_load
|
|
|
|
.raw_value()
|
|
|
|
.checked_add(KERNEL_64BIT_ENTRY_OFFSET)
|
|
|
|
.ok_or(Error::MemOverflow)?;
|
|
|
|
|
|
|
|
Ok(GuestAddress(load_addr))
|
|
|
|
}
|
|
|
|
None => {
|
|
|
|
arch::configure_system(
|
2019-08-20 22:43:23 +00:00
|
|
|
&mem,
|
2019-09-27 16:06:53 +00:00
|
|
|
arch::layout::CMDLINE_START,
|
2019-06-10 09:14:02 +00:00
|
|
|
cmdline_cstring.to_bytes().len() + 1,
|
2019-11-25 14:16:55 +00:00
|
|
|
boot_vcpus,
|
2019-06-10 09:14:02 +00:00
|
|
|
None,
|
2019-11-06 17:20:55 +00:00
|
|
|
rsdp_addr,
|
2019-06-10 09:14:02 +00:00
|
|
|
)
|
2020-01-24 08:34:51 +00:00
|
|
|
.map_err(Error::ConfigureSystem)?;
|
2019-06-10 09:14:02 +00:00
|
|
|
|
|
|
|
Ok(entry_addr.kernel_load)
|
|
|
|
}
|
|
|
|
}
|
2019-02-28 13:16:58 +00:00
|
|
|
}
|
|
|
|
|
2019-09-30 09:53:49 +00:00
|
|
|
pub fn shutdown(&mut self) -> Result<()> {
|
2019-10-11 12:47:57 +00:00
|
|
|
let mut state = self.state.try_write().map_err(|_| Error::PoisonedState)?;
|
|
|
|
let new_state = VmState::Shutdown;
|
|
|
|
|
|
|
|
state.valid_transition(new_state)?;
|
|
|
|
|
2019-05-30 15:17:57 +00:00
|
|
|
if self.on_tty {
|
|
|
|
// Don't forget to set the terminal in canonical mode
|
|
|
|
// before to exit.
|
|
|
|
io::stdin()
|
|
|
|
.lock()
|
|
|
|
.set_canon_mode()
|
|
|
|
.map_err(Error::SetTerminalCanon)?;
|
|
|
|
}
|
|
|
|
|
2019-09-09 12:43:03 +00:00
|
|
|
// Trigger the termination of the signal_handler thread
|
|
|
|
if let Some(signals) = self.signals.take() {
|
|
|
|
signals.close();
|
|
|
|
}
|
|
|
|
|
2019-11-11 14:31:11 +00:00
|
|
|
self.cpu_manager
|
|
|
|
.lock()
|
|
|
|
.unwrap()
|
|
|
|
.shutdown()
|
|
|
|
.map_err(Error::CpuManager)?;
|
2019-09-03 09:00:15 +00:00
|
|
|
|
2019-09-04 11:59:14 +00:00
|
|
|
// Wait for all the threads to finish
|
|
|
|
for thread in self.threads.drain(..) {
|
2020-01-24 08:34:51 +00:00
|
|
|
thread.join().map_err(Error::ThreadCleanup)?
|
2019-09-03 09:00:15 +00:00
|
|
|
}
|
2019-10-11 12:47:57 +00:00
|
|
|
*state = new_state;
|
2019-10-01 08:14:08 +00:00
|
|
|
|
2019-09-24 14:14:04 +00:00
|
|
|
Ok(())
|
2019-03-18 20:59:50 +00:00
|
|
|
}
|
|
|
|
|
2020-01-10 15:52:23 +00:00
|
|
|
pub fn resize(&mut self, desired_vcpus: Option<u8>, desired_memory: Option<u64>) -> Result<()> {
|
2020-01-07 10:43:56 +00:00
|
|
|
if let Some(desired_vcpus) = desired_vcpus {
|
2020-01-17 16:48:46 +00:00
|
|
|
if self
|
|
|
|
.cpu_manager
|
2020-01-07 10:43:56 +00:00
|
|
|
.lock()
|
|
|
|
.unwrap()
|
|
|
|
.resize(desired_vcpus)
|
2020-01-17 16:48:46 +00:00
|
|
|
.map_err(Error::CpuManager)?
|
|
|
|
{
|
|
|
|
self.devices
|
|
|
|
.notify_hotplug(HotPlugNotificationFlags::CPU_DEVICES_CHANGED)
|
|
|
|
.map_err(Error::DeviceManager)?;
|
|
|
|
}
|
2020-01-07 10:43:56 +00:00
|
|
|
self.config.lock().unwrap().cpus.boot_vcpus = desired_vcpus;
|
|
|
|
}
|
|
|
|
|
2020-01-10 15:52:23 +00:00
|
|
|
if let Some(desired_memory) = desired_memory {
|
2020-01-17 16:56:45 +00:00
|
|
|
if self
|
|
|
|
.memory_manager
|
2020-01-10 16:16:29 +00:00
|
|
|
.lock()
|
|
|
|
.unwrap()
|
|
|
|
.resize(desired_memory)
|
2020-01-17 16:56:45 +00:00
|
|
|
.map_err(Error::MemoryManager)?
|
|
|
|
{
|
|
|
|
self.devices
|
|
|
|
.notify_hotplug(HotPlugNotificationFlags::MEMORY_DEVICES_CHANGED)
|
|
|
|
.map_err(Error::DeviceManager)?;
|
|
|
|
}
|
2020-01-10 15:52:23 +00:00
|
|
|
self.config.lock().unwrap().memory.size = desired_memory;
|
|
|
|
}
|
2019-11-27 17:27:31 +00:00
|
|
|
Ok(())
|
2019-11-26 16:46:10 +00:00
|
|
|
}
|
|
|
|
|
2019-12-05 03:27:40 +00:00
|
|
|
fn os_signal_handler(signals: Signals, console_input_clone: Arc<Console>, on_tty: bool) {
|
vm-virtio: Implement console size config feature
One of the features of the virtio console device is its size can be
configured and updated. Our first iteration of the console device
implementation is lack of this feature. As a result, it had a
default fixed size which could not be changed. This commit implements
the console config feature and lets us change the console size from
the vmm side.
During the activation of the device, vmm reads the current terminal
size, sets the console configuration accordinly, and lets the driver
know about this configuration by sending an interrupt. Later, if
someone changes the terminal size, the vmm detects the corresponding
event, updates the configuration, and sends interrupt as before. As a
result, the console device driver, in the guest, updates the console
size.
Signed-off-by: A K M Fazla Mehrab <fazla.mehrab.akm@intel.com>
2019-07-23 19:18:20 +00:00
|
|
|
for signal in signals.forever() {
|
2019-12-05 03:27:40 +00:00
|
|
|
match signal {
|
|
|
|
SIGWINCH => {
|
|
|
|
let (col, row) = get_win_size();
|
|
|
|
console_input_clone.update_console_size(col, row);
|
|
|
|
}
|
|
|
|
SIGTERM | SIGINT => {
|
|
|
|
if on_tty {
|
|
|
|
io::stdin()
|
|
|
|
.lock()
|
|
|
|
.set_canon_mode()
|
|
|
|
.expect("failed to restore terminal mode");
|
|
|
|
}
|
|
|
|
std::process::exit((signal != SIGTERM) as i32);
|
|
|
|
}
|
|
|
|
_ => (),
|
vm-virtio: Implement console size config feature
One of the features of the virtio console device is its size can be
configured and updated. Our first iteration of the console device
implementation is lack of this feature. As a result, it had a
default fixed size which could not be changed. This commit implements
the console config feature and lets us change the console size from
the vmm side.
During the activation of the device, vmm reads the current terminal
size, sets the console configuration accordinly, and lets the driver
know about this configuration by sending an interrupt. Later, if
someone changes the terminal size, the vmm detects the corresponding
event, updates the configuration, and sends interrupt as before. As a
result, the console device driver, in the guest, updates the console
size.
Signed-off-by: A K M Fazla Mehrab <fazla.mehrab.akm@intel.com>
2019-07-23 19:18:20 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-09-30 09:53:49 +00:00
|
|
|
pub fn boot(&mut self) -> Result<()> {
|
2019-10-11 12:47:57 +00:00
|
|
|
let current_state = self.get_state()?;
|
|
|
|
if current_state == VmState::Paused {
|
2019-11-22 13:54:52 +00:00
|
|
|
return self.resume().map_err(Error::Resume);
|
2019-10-11 12:47:57 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
let new_state = VmState::Running;
|
|
|
|
current_state.valid_transition(new_state)?;
|
|
|
|
|
2019-09-23 23:03:05 +00:00
|
|
|
let entry_addr = self.load_kernel()?;
|
2019-02-28 14:26:30 +00:00
|
|
|
|
2019-11-11 13:55:50 +00:00
|
|
|
self.cpu_manager
|
2019-11-11 14:31:11 +00:00
|
|
|
.lock()
|
|
|
|
.unwrap()
|
2019-11-11 13:55:50 +00:00
|
|
|
.start_boot_vcpus(entry_addr)
|
|
|
|
.map_err(Error::CpuManager)?;
|
2019-03-06 11:04:14 +00:00
|
|
|
|
2019-09-06 15:42:41 +00:00
|
|
|
if self.devices.console().input_enabled() {
|
|
|
|
let console = self.devices.console().clone();
|
2019-12-05 03:27:40 +00:00
|
|
|
let signals = Signals::new(&[SIGWINCH, SIGINT, SIGTERM]);
|
vm-virtio: Implement console size config feature
One of the features of the virtio console device is its size can be
configured and updated. Our first iteration of the console device
implementation is lack of this feature. As a result, it had a
default fixed size which could not be changed. This commit implements
the console config feature and lets us change the console size from
the vmm side.
During the activation of the device, vmm reads the current terminal
size, sets the console configuration accordinly, and lets the driver
know about this configuration by sending an interrupt. Later, if
someone changes the terminal size, the vmm detects the corresponding
event, updates the configuration, and sends interrupt as before. As a
result, the console device driver, in the guest, updates the console
size.
Signed-off-by: A K M Fazla Mehrab <fazla.mehrab.akm@intel.com>
2019-07-23 19:18:20 +00:00
|
|
|
match signals {
|
2019-09-09 12:43:03 +00:00
|
|
|
Ok(signals) => {
|
|
|
|
self.signals = Some(signals.clone());
|
|
|
|
|
2019-12-05 03:27:40 +00:00
|
|
|
let on_tty = self.on_tty;
|
2019-09-04 11:59:14 +00:00
|
|
|
self.threads.push(
|
|
|
|
thread::Builder::new()
|
|
|
|
.name("signal_handler".to_string())
|
2019-12-05 03:27:40 +00:00
|
|
|
.spawn(move || Vm::os_signal_handler(signals, console, on_tty))
|
2019-09-04 11:59:14 +00:00
|
|
|
.map_err(Error::SignalHandlerSpawn)?,
|
|
|
|
);
|
vm-virtio: Implement console size config feature
One of the features of the virtio console device is its size can be
configured and updated. Our first iteration of the console device
implementation is lack of this feature. As a result, it had a
default fixed size which could not be changed. This commit implements
the console config feature and lets us change the console size from
the vmm side.
During the activation of the device, vmm reads the current terminal
size, sets the console configuration accordinly, and lets the driver
know about this configuration by sending an interrupt. Later, if
someone changes the terminal size, the vmm detects the corresponding
event, updates the configuration, and sends interrupt as before. As a
result, the console device driver, in the guest, updates the console
size.
Signed-off-by: A K M Fazla Mehrab <fazla.mehrab.akm@intel.com>
2019-07-23 19:18:20 +00:00
|
|
|
}
|
|
|
|
Err(e) => error!("Signal not found {}", e),
|
|
|
|
}
|
2019-09-24 14:06:56 +00:00
|
|
|
|
|
|
|
if self.on_tty {
|
|
|
|
io::stdin()
|
|
|
|
.lock()
|
|
|
|
.set_raw_mode()
|
|
|
|
.map_err(Error::SetTerminalRaw)?;
|
|
|
|
}
|
vm-virtio: Implement console size config feature
One of the features of the virtio console device is its size can be
configured and updated. Our first iteration of the console device
implementation is lack of this feature. As a result, it had a
default fixed size which could not be changed. This commit implements
the console config feature and lets us change the console size from
the vmm side.
During the activation of the device, vmm reads the current terminal
size, sets the console configuration accordinly, and lets the driver
know about this configuration by sending an interrupt. Later, if
someone changes the terminal size, the vmm detects the corresponding
event, updates the configuration, and sends interrupt as before. As a
result, the console device driver, in the guest, updates the console
size.
Signed-off-by: A K M Fazla Mehrab <fazla.mehrab.akm@intel.com>
2019-07-23 19:18:20 +00:00
|
|
|
}
|
2019-09-24 14:06:56 +00:00
|
|
|
|
2019-10-01 08:14:08 +00:00
|
|
|
let mut state = self.state.try_write().map_err(|_| Error::PoisonedState)?;
|
2019-10-11 12:47:57 +00:00
|
|
|
*state = new_state;
|
2019-10-01 08:14:08 +00:00
|
|
|
|
2019-09-25 13:01:49 +00:00
|
|
|
Ok(())
|
2019-02-28 13:16:58 +00:00
|
|
|
}
|
2019-02-28 14:26:30 +00:00
|
|
|
|
2019-09-24 14:22:35 +00:00
|
|
|
pub fn handle_stdin(&self) -> Result<()> {
|
|
|
|
let mut out = [0u8; 64];
|
|
|
|
let count = io::stdin()
|
|
|
|
.lock()
|
|
|
|
.read_raw(&mut out)
|
|
|
|
.map_err(Error::Console)?;
|
|
|
|
|
|
|
|
if self.devices.console().input_enabled() {
|
|
|
|
self.devices
|
|
|
|
.console()
|
|
|
|
.queue_input_bytes(&out[..count])
|
|
|
|
.map_err(Error::Console)?;
|
|
|
|
}
|
|
|
|
|
|
|
|
Ok(())
|
|
|
|
}
|
2019-09-25 09:26:11 +00:00
|
|
|
|
|
|
|
/// Gets a thread-safe reference counted pointer to the VM configuration.
|
2019-12-05 14:50:38 +00:00
|
|
|
pub fn get_config(&self) -> Arc<Mutex<VmConfig>> {
|
2019-09-25 09:26:11 +00:00
|
|
|
Arc::clone(&self.config)
|
|
|
|
}
|
2019-10-01 08:14:08 +00:00
|
|
|
|
|
|
|
/// Get the VM state. Returns an error if the state is poisoned.
|
|
|
|
pub fn get_state(&self) -> Result<VmState> {
|
|
|
|
self.state
|
|
|
|
.try_read()
|
|
|
|
.map_err(|_| Error::PoisonedState)
|
2019-10-11 12:47:57 +00:00
|
|
|
.map(|state| *state)
|
2019-10-01 08:14:08 +00:00
|
|
|
}
|
2019-02-28 13:16:58 +00:00
|
|
|
}
|
|
|
|
|
2019-11-22 13:54:52 +00:00
|
|
|
impl Pausable for Vm {
|
|
|
|
fn pause(&mut self) -> std::result::Result<(), MigratableError> {
|
|
|
|
let mut state = self
|
|
|
|
.state
|
|
|
|
.try_write()
|
|
|
|
.map_err(|e| MigratableError::Pause(anyhow!("Could not get VM state: {}", e)))?;
|
|
|
|
let new_state = VmState::Paused;
|
|
|
|
|
|
|
|
state
|
|
|
|
.valid_transition(new_state)
|
|
|
|
.map_err(|e| MigratableError::Pause(anyhow!("Invalid transition: {:?}", e)))?;
|
|
|
|
|
|
|
|
self.cpu_manager.lock().unwrap().pause()?;
|
|
|
|
self.devices.pause()?;
|
|
|
|
|
|
|
|
*state = new_state;
|
|
|
|
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
|
|
|
fn resume(&mut self) -> std::result::Result<(), MigratableError> {
|
|
|
|
let mut state = self
|
|
|
|
.state
|
|
|
|
.try_write()
|
|
|
|
.map_err(|e| MigratableError::Resume(anyhow!("Could not get VM state: {}", e)))?;
|
|
|
|
let new_state = VmState::Running;
|
|
|
|
|
|
|
|
state
|
|
|
|
.valid_transition(new_state)
|
|
|
|
.map_err(|e| MigratableError::Pause(anyhow!("Invalid transition: {:?}", e)))?;
|
|
|
|
|
|
|
|
self.devices.resume()?;
|
|
|
|
self.cpu_manager.lock().unwrap().resume()?;
|
|
|
|
|
|
|
|
// And we're back to the Running state.
|
|
|
|
*state = new_state;
|
|
|
|
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl Snapshotable for Vm {}
|
|
|
|
impl Migratable for Vm {}
|
|
|
|
|
2019-10-11 16:59:29 +00:00
|
|
|
#[cfg(test)]
|
|
|
|
mod tests {
|
|
|
|
use super::*;
|
|
|
|
|
|
|
|
fn test_vm_state_transitions(state: VmState) {
|
|
|
|
match state {
|
|
|
|
VmState::Created => {
|
|
|
|
// Check the transitions from Created
|
|
|
|
assert!(state.valid_transition(VmState::Created).is_err());
|
|
|
|
assert!(state.valid_transition(VmState::Running).is_ok());
|
|
|
|
assert!(state.valid_transition(VmState::Shutdown).is_err());
|
|
|
|
assert!(state.valid_transition(VmState::Paused).is_err());
|
|
|
|
}
|
|
|
|
VmState::Running => {
|
|
|
|
// Check the transitions from Running
|
|
|
|
assert!(state.valid_transition(VmState::Created).is_err());
|
|
|
|
assert!(state.valid_transition(VmState::Running).is_err());
|
|
|
|
assert!(state.valid_transition(VmState::Shutdown).is_ok());
|
|
|
|
assert!(state.valid_transition(VmState::Paused).is_ok());
|
|
|
|
}
|
|
|
|
VmState::Shutdown => {
|
|
|
|
// Check the transitions from Shutdown
|
|
|
|
assert!(state.valid_transition(VmState::Created).is_err());
|
|
|
|
assert!(state.valid_transition(VmState::Running).is_ok());
|
|
|
|
assert!(state.valid_transition(VmState::Shutdown).is_err());
|
|
|
|
assert!(state.valid_transition(VmState::Paused).is_err());
|
|
|
|
}
|
|
|
|
VmState::Paused => {
|
|
|
|
// Check the transitions from Paused
|
|
|
|
assert!(state.valid_transition(VmState::Created).is_err());
|
|
|
|
assert!(state.valid_transition(VmState::Running).is_ok());
|
|
|
|
assert!(state.valid_transition(VmState::Shutdown).is_ok());
|
|
|
|
assert!(state.valid_transition(VmState::Paused).is_err());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_vm_created_transitions() {
|
|
|
|
test_vm_state_transitions(VmState::Created);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_vm_running_transitions() {
|
|
|
|
test_vm_state_transitions(VmState::Running);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_vm_shutdown_transitions() {
|
|
|
|
test_vm_state_transitions(VmState::Shutdown);
|
|
|
|
}
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
fn test_vm_paused_transitions() {
|
|
|
|
test_vm_state_transitions(VmState::Paused);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-02-28 13:16:58 +00:00
|
|
|
#[allow(unused)]
|
|
|
|
pub fn test_vm() {
|
|
|
|
// This example based on https://lwn.net/Articles/658511/
|
|
|
|
let code = [
|
|
|
|
0xba, 0xf8, 0x03, /* mov $0x3f8, %dx */
|
|
|
|
0x00, 0xd8, /* add %bl, %al */
|
|
|
|
0x04, b'0', /* add $'0', %al */
|
|
|
|
0xee, /* out %al, (%dx) */
|
|
|
|
0xb0, b'\n', /* mov $'\n', %al */
|
|
|
|
0xee, /* out %al, (%dx) */
|
|
|
|
0xf4, /* hlt */
|
|
|
|
];
|
|
|
|
|
|
|
|
let mem_size = 0x1000;
|
|
|
|
let load_addr = GuestAddress(0x1000);
|
2020-02-06 08:00:41 +00:00
|
|
|
let mem = GuestMemoryMmap::from_ranges(&[(load_addr, mem_size)]).unwrap();
|
2019-02-28 13:16:58 +00:00
|
|
|
|
|
|
|
let kvm = Kvm::new().expect("new KVM instance creation failed");
|
|
|
|
let vm_fd = kvm.create_vm().expect("new VM fd creation failed");
|
|
|
|
|
|
|
|
mem.with_regions(|index, region| {
|
|
|
|
let mem_region = kvm_userspace_memory_region {
|
|
|
|
slot: index as u32,
|
|
|
|
guest_phys_addr: region.start_addr().raw_value(),
|
|
|
|
memory_size: region.len() as u64,
|
|
|
|
userspace_addr: region.as_ptr() as u64,
|
|
|
|
flags: 0,
|
|
|
|
};
|
|
|
|
|
|
|
|
// Safe because the guest regions are guaranteed not to overlap.
|
2019-06-03 21:09:01 +00:00
|
|
|
unsafe { vm_fd.set_user_memory_region(mem_region) }
|
2019-02-28 13:16:58 +00:00
|
|
|
})
|
|
|
|
.expect("Cannot configure guest memory");
|
|
|
|
mem.write_slice(&code, load_addr)
|
|
|
|
.expect("Writing code to memory failed");
|
|
|
|
|
|
|
|
let vcpu_fd = vm_fd.create_vcpu(0).expect("new VcpuFd failed");
|
|
|
|
|
|
|
|
let mut vcpu_sregs = vcpu_fd.get_sregs().expect("get sregs failed");
|
|
|
|
vcpu_sregs.cs.base = 0;
|
|
|
|
vcpu_sregs.cs.selector = 0;
|
|
|
|
vcpu_fd.set_sregs(&vcpu_sregs).expect("set sregs failed");
|
|
|
|
|
|
|
|
let mut vcpu_regs = vcpu_fd.get_regs().expect("get regs failed");
|
|
|
|
vcpu_regs.rip = 0x1000;
|
|
|
|
vcpu_regs.rax = 2;
|
|
|
|
vcpu_regs.rbx = 3;
|
|
|
|
vcpu_regs.rflags = 2;
|
|
|
|
vcpu_fd.set_regs(&vcpu_regs).expect("set regs failed");
|
|
|
|
|
|
|
|
loop {
|
|
|
|
match vcpu_fd.run().expect("run failed") {
|
|
|
|
VcpuExit::IoIn(addr, data) => {
|
|
|
|
println!(
|
|
|
|
"IO in -- addr: {:#x} data [{:?}]",
|
|
|
|
addr,
|
|
|
|
str::from_utf8(&data).unwrap()
|
|
|
|
);
|
|
|
|
}
|
|
|
|
VcpuExit::IoOut(addr, data) => {
|
|
|
|
println!(
|
|
|
|
"IO out -- addr: {:#x} data [{:?}]",
|
|
|
|
addr,
|
|
|
|
str::from_utf8(&data).unwrap()
|
|
|
|
);
|
|
|
|
}
|
|
|
|
VcpuExit::MmioRead(_addr, _data) => {}
|
|
|
|
VcpuExit::MmioWrite(_addr, _data) => {}
|
|
|
|
VcpuExit::Unknown => {}
|
|
|
|
VcpuExit::Exception => {}
|
|
|
|
VcpuExit::Hypercall => {}
|
|
|
|
VcpuExit::Debug => {}
|
|
|
|
VcpuExit::Hlt => {
|
|
|
|
println!("HLT");
|
|
|
|
}
|
|
|
|
VcpuExit::IrqWindowOpen => {}
|
|
|
|
VcpuExit::Shutdown => {}
|
|
|
|
VcpuExit::FailEntry => {}
|
|
|
|
VcpuExit::Intr => {}
|
|
|
|
VcpuExit::SetTpr => {}
|
|
|
|
VcpuExit::TprAccess => {}
|
|
|
|
VcpuExit::S390Sieic => {}
|
|
|
|
VcpuExit::S390Reset => {}
|
|
|
|
VcpuExit::Dcr => {}
|
|
|
|
VcpuExit::Nmi => {}
|
|
|
|
VcpuExit::InternalError => {}
|
|
|
|
VcpuExit::Osi => {}
|
|
|
|
VcpuExit::PaprHcall => {}
|
|
|
|
VcpuExit::S390Ucontrol => {}
|
|
|
|
VcpuExit::Watchdog => {}
|
|
|
|
VcpuExit::S390Tsch => {}
|
|
|
|
VcpuExit::Epr => {}
|
|
|
|
VcpuExit::SystemEvent => {}
|
|
|
|
VcpuExit::S390Stsi => {}
|
2019-06-18 17:31:50 +00:00
|
|
|
VcpuExit::IoapicEoi(_vector) => {}
|
2019-02-28 13:16:58 +00:00
|
|
|
VcpuExit::Hyperv => {}
|
|
|
|
}
|
|
|
|
// r => panic!("unexpected exit reason: {:?}", r),
|
|
|
|
}
|
|
|
|
}
|