2020-01-20 16:10:21 +00:00
|
|
|
// Copyright 2019 Intel Corporation. All Rights Reserved.
|
|
|
|
//
|
|
|
|
// Portions Copyright 2018 Amazon.com, Inc. or its affiliates. All Rights Reserved.
|
|
|
|
//
|
|
|
|
// Portions Copyright 2017 The Chromium OS Authors. All rights reserved.
|
|
|
|
//
|
|
|
|
// SPDX-License-Identifier: (Apache-2.0 AND BSD-3-Clause)
|
|
|
|
|
|
|
|
extern crate log;
|
|
|
|
extern crate net_util;
|
|
|
|
extern crate vhost_rs;
|
|
|
|
extern crate vhost_user_backend;
|
|
|
|
|
2020-05-29 14:30:18 +00:00
|
|
|
use libc::{self, EFD_NONBLOCK};
|
2020-01-20 16:10:21 +00:00
|
|
|
use log::*;
|
2020-07-07 15:50:13 +00:00
|
|
|
use net_util::{
|
|
|
|
open_tap, MacAddr, NetCounters, NetQueuePair, OpenTapError, RxVirtio, Tap, TxVirtio,
|
|
|
|
};
|
2020-07-06 15:41:45 +00:00
|
|
|
use option_parser::{OptionParser, OptionParserError};
|
2020-01-20 16:10:21 +00:00
|
|
|
use std::fmt;
|
|
|
|
use std::io::{self};
|
|
|
|
use std::net::Ipv4Addr;
|
|
|
|
use std::os::unix::io::AsRawFd;
|
2020-01-21 15:16:38 +00:00
|
|
|
use std::process;
|
2020-04-08 16:27:26 +00:00
|
|
|
use std::sync::{Arc, Mutex, RwLock};
|
2020-01-20 16:10:21 +00:00
|
|
|
use std::vec::Vec;
|
|
|
|
use vhost_rs::vhost_user::message::*;
|
2020-04-24 11:33:00 +00:00
|
|
|
use vhost_rs::vhost_user::{Error as VhostUserError, Listener};
|
2020-01-21 15:16:38 +00:00
|
|
|
use vhost_user_backend::{VhostUserBackend, VhostUserDaemon, Vring, VringWorker};
|
2020-01-20 16:10:21 +00:00
|
|
|
use virtio_bindings::bindings::virtio_net::*;
|
2020-06-01 13:54:39 +00:00
|
|
|
use virtio_bindings::bindings::virtio_ring::VIRTIO_RING_F_EVENT_IDX;
|
2020-05-29 14:30:18 +00:00
|
|
|
use vm_memory::{GuestMemoryAtomic, GuestMemoryMmap};
|
2020-01-20 16:10:21 +00:00
|
|
|
use vmm_sys_util::eventfd::EventFd;
|
|
|
|
|
|
|
|
pub type VhostUserResult<T> = std::result::Result<T, VhostUserError>;
|
|
|
|
pub type Result<T> = std::result::Result<T, Error>;
|
|
|
|
pub type VhostUserBackendResult<T> = std::result::Result<T, std::io::Error>;
|
|
|
|
|
|
|
|
#[derive(Debug)]
|
|
|
|
pub enum Error {
|
|
|
|
/// Failed to activate device.
|
|
|
|
BadActivate,
|
|
|
|
/// Failed to create kill eventfd
|
2020-01-24 08:07:25 +00:00
|
|
|
CreateKillEventFd(io::Error),
|
2020-01-20 16:10:21 +00:00
|
|
|
/// Failed to add event.
|
|
|
|
EpollCtl(io::Error),
|
|
|
|
/// Fail to wait event.
|
|
|
|
EpollWait(io::Error),
|
|
|
|
/// Failed to create EventFd.
|
|
|
|
EpollCreateFd,
|
|
|
|
/// Failed to read Tap.
|
|
|
|
FailedReadTap,
|
2020-05-08 15:43:56 +00:00
|
|
|
/// Failed to parse configuration string
|
|
|
|
FailedConfigParse(OptionParserError),
|
2020-01-20 16:10:21 +00:00
|
|
|
/// Failed to signal used queue.
|
2020-05-29 14:30:18 +00:00
|
|
|
FailedSignalingUsedQueue(io::Error),
|
2020-01-20 16:10:21 +00:00
|
|
|
/// Failed to handle event other than input event.
|
|
|
|
HandleEventNotEpollIn,
|
|
|
|
/// Failed to handle unknown event.
|
|
|
|
HandleEventUnknownEvent,
|
|
|
|
/// Invalid vring address.
|
|
|
|
InvalidVringAddr,
|
|
|
|
/// No vring call fd to notify.
|
|
|
|
NoVringCallFdNotify,
|
|
|
|
/// No memory configured.
|
|
|
|
NoMemoryConfigured,
|
|
|
|
/// Open tap device failed.
|
2020-07-07 14:02:18 +00:00
|
|
|
OpenTap(OpenTapError),
|
2020-05-08 15:43:56 +00:00
|
|
|
/// No socket provided
|
|
|
|
SocketParameterMissing,
|
2020-05-29 14:30:18 +00:00
|
|
|
/// Underlying QueuePair error
|
2020-07-07 15:50:13 +00:00
|
|
|
NetQueuePair(net_util::NetQueuePairError),
|
2020-01-20 16:10:21 +00:00
|
|
|
}
|
|
|
|
|
2020-05-08 15:11:00 +00:00
|
|
|
pub const SYNTAX: &str = "vhost-user-net backend parameters \
|
2020-05-08 15:43:56 +00:00
|
|
|
\"ip=<ip_addr>,mask=<net_mask>,socket=<socket_path>,\
|
2020-05-08 15:11:00 +00:00
|
|
|
num_queues=<number_of_queues>,queue_size=<size_of_each_queue>,tap=<if_name>\"";
|
|
|
|
|
2020-01-20 16:10:21 +00:00
|
|
|
impl fmt::Display for Error {
|
|
|
|
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
|
|
|
|
write!(f, "vhost_user_net_error: {:?}", self)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl std::error::Error for Error {}
|
|
|
|
|
|
|
|
impl std::convert::From<Error> for std::io::Error {
|
|
|
|
fn from(e: Error) -> Self {
|
|
|
|
std::io::Error::new(io::ErrorKind::Other, e)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-04-08 16:27:26 +00:00
|
|
|
struct VhostUserNetThread {
|
2020-05-29 14:30:18 +00:00
|
|
|
net: NetQueuePair,
|
2020-01-20 16:10:21 +00:00
|
|
|
vring_worker: Option<Arc<VringWorker>>,
|
|
|
|
kill_evt: EventFd,
|
|
|
|
}
|
|
|
|
|
2020-04-08 16:27:26 +00:00
|
|
|
impl VhostUserNetThread {
|
2020-01-20 16:10:21 +00:00
|
|
|
/// Create a new virtio network device with the given TAP interface.
|
2020-04-09 16:20:38 +00:00
|
|
|
fn new(tap: Tap) -> Result<Self> {
|
2020-04-08 16:27:26 +00:00
|
|
|
Ok(VhostUserNetThread {
|
2020-01-20 16:10:21 +00:00
|
|
|
vring_worker: None,
|
2020-01-24 08:07:25 +00:00
|
|
|
kill_evt: EventFd::new(EFD_NONBLOCK).map_err(Error::CreateKillEventFd)?,
|
2020-05-29 14:30:18 +00:00
|
|
|
net: NetQueuePair {
|
|
|
|
mem: None,
|
|
|
|
tap,
|
|
|
|
rx: RxVirtio::new(),
|
|
|
|
tx: TxVirtio::new(),
|
|
|
|
rx_tap_listening: false,
|
|
|
|
epoll_fd: None,
|
2020-06-23 15:28:41 +00:00
|
|
|
counters: NetCounters::default(),
|
2020-07-23 16:16:10 +00:00
|
|
|
tap_event_id: 2,
|
2020-05-29 14:30:18 +00:00
|
|
|
},
|
2020-01-20 16:10:21 +00:00
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn set_vring_worker(&mut self, vring_worker: Option<Arc<VringWorker>>) {
|
2020-05-29 14:30:18 +00:00
|
|
|
self.net.epoll_fd = Some(vring_worker.as_ref().unwrap().as_raw_fd());
|
2020-01-20 16:10:21 +00:00
|
|
|
self.vring_worker = vring_worker;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-04-08 16:27:26 +00:00
|
|
|
pub struct VhostUserNetBackend {
|
2020-04-09 14:35:56 +00:00
|
|
|
threads: Vec<Mutex<VhostUserNetThread>>,
|
2020-04-08 16:27:26 +00:00
|
|
|
num_queues: usize,
|
|
|
|
queue_size: u16,
|
2020-04-09 20:59:13 +00:00
|
|
|
queues_per_thread: Vec<u64>,
|
2020-04-08 16:27:26 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
impl VhostUserNetBackend {
|
|
|
|
fn new(
|
|
|
|
ip_addr: Ipv4Addr,
|
2020-05-15 09:00:38 +00:00
|
|
|
host_mac: MacAddr,
|
2020-04-08 16:27:26 +00:00
|
|
|
netmask: Ipv4Addr,
|
|
|
|
num_queues: usize,
|
|
|
|
queue_size: u16,
|
|
|
|
ifname: Option<&str>,
|
|
|
|
) -> Result<Self> {
|
2020-05-15 09:00:38 +00:00
|
|
|
let mut taps = open_tap(
|
|
|
|
ifname,
|
|
|
|
Some(ip_addr),
|
|
|
|
Some(netmask),
|
2020-06-05 11:00:34 +00:00
|
|
|
&mut Some(host_mac),
|
2020-05-15 09:00:38 +00:00
|
|
|
num_queues / 2,
|
2021-01-27 17:52:22 +00:00
|
|
|
None,
|
2020-05-15 09:00:38 +00:00
|
|
|
)
|
|
|
|
.map_err(Error::OpenTap)?;
|
2020-04-09 14:35:56 +00:00
|
|
|
|
2020-04-09 20:59:13 +00:00
|
|
|
let mut queues_per_thread = Vec::new();
|
2020-04-09 14:35:56 +00:00
|
|
|
let mut threads = Vec::new();
|
2020-04-09 20:59:13 +00:00
|
|
|
for (i, tap) in taps.drain(..).enumerate() {
|
2020-04-09 16:20:38 +00:00
|
|
|
let thread = Mutex::new(VhostUserNetThread::new(tap)?);
|
2020-04-09 14:35:56 +00:00
|
|
|
threads.push(thread);
|
2020-04-09 20:59:13 +00:00
|
|
|
queues_per_thread.push(0b11 << (i * 2));
|
2020-04-09 14:35:56 +00:00
|
|
|
}
|
2020-04-08 16:27:26 +00:00
|
|
|
|
|
|
|
Ok(VhostUserNetBackend {
|
2020-04-09 14:35:56 +00:00
|
|
|
threads,
|
2020-04-08 16:27:26 +00:00
|
|
|
num_queues,
|
|
|
|
queue_size,
|
2020-04-09 20:59:13 +00:00
|
|
|
queues_per_thread,
|
2020-04-08 16:27:26 +00:00
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-01-20 16:10:21 +00:00
|
|
|
impl VhostUserBackend for VhostUserNetBackend {
|
|
|
|
fn num_queues(&self) -> usize {
|
|
|
|
self.num_queues
|
|
|
|
}
|
|
|
|
|
|
|
|
fn max_queue_size(&self) -> usize {
|
|
|
|
self.queue_size as usize
|
|
|
|
}
|
|
|
|
|
|
|
|
fn features(&self) -> u64 {
|
|
|
|
1 << VIRTIO_NET_F_GUEST_CSUM
|
|
|
|
| 1 << VIRTIO_NET_F_CSUM
|
|
|
|
| 1 << VIRTIO_NET_F_GUEST_TSO4
|
|
|
|
| 1 << VIRTIO_NET_F_GUEST_UFO
|
|
|
|
| 1 << VIRTIO_NET_F_HOST_TSO4
|
|
|
|
| 1 << VIRTIO_NET_F_HOST_UFO
|
|
|
|
| 1 << VIRTIO_F_VERSION_1
|
2020-06-01 13:54:39 +00:00
|
|
|
| 1 << VIRTIO_RING_F_EVENT_IDX
|
2020-01-20 16:10:21 +00:00
|
|
|
| VhostUserVirtioFeatures::PROTOCOL_FEATURES.bits()
|
|
|
|
}
|
|
|
|
|
|
|
|
fn protocol_features(&self) -> VhostUserProtocolFeatures {
|
vhost_user_net: don't claim to impl all features
Even if the vhost-user-net device did implement all currently-defined
features, it would be very short-sighted to use ::all(), because if a
new feature was defined later, the device would start claiming to
implement it even though it didn't.
More practically, claiming to implement all features breaks using QEMU
with the cloud-hypervisor vhost-user-net backend, because QEMU will
negotiate VHOST_USER_PROTOCOL_F_SLAVE_REQ, and then break when the
communication channel isn't actually set up.
I wasn't sure exactly which features the backend should claim to
implement, though. Definitely MQ, and I'm fairly certain none of the
features I've ommitted are implemented. But I'm not sure about
REPLY_ACK. As far as I can tell it should be implemented entirely by
the vhost crate, with no cooperation required from the vhost-user-net
backend itself, so there should be no reason to let a frontend use it
if it wants to. But despite this, neither vhost-user-fs nor
vhost-user-blk claims to implement it.
Signed-off-by: Alyssa Ross <hi@alyssa.is>
2020-08-07 14:31:50 +00:00
|
|
|
VhostUserProtocolFeatures::MQ | VhostUserProtocolFeatures::REPLY_ACK
|
2020-01-20 16:10:21 +00:00
|
|
|
}
|
|
|
|
|
2020-02-14 11:27:47 +00:00
|
|
|
fn set_event_idx(&mut self, _enabled: bool) {}
|
|
|
|
|
2020-01-20 16:10:21 +00:00
|
|
|
fn update_memory(&mut self, mem: GuestMemoryMmap) -> VhostUserBackendResult<()> {
|
2020-04-09 14:35:56 +00:00
|
|
|
for thread in self.threads.iter() {
|
2020-05-29 14:30:18 +00:00
|
|
|
thread.lock().unwrap().net.mem = Some(GuestMemoryAtomic::new(mem.clone()));
|
2020-04-09 14:35:56 +00:00
|
|
|
}
|
2020-01-20 16:10:21 +00:00
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
|
|
|
fn handle_event(
|
2020-04-09 11:14:05 +00:00
|
|
|
&self,
|
2020-01-20 16:10:21 +00:00
|
|
|
device_event: u16,
|
|
|
|
evset: epoll::Events,
|
|
|
|
vrings: &[Arc<RwLock<Vring>>],
|
2020-04-09 16:20:38 +00:00
|
|
|
thread_id: usize,
|
2020-01-20 16:10:21 +00:00
|
|
|
) -> VhostUserBackendResult<bool> {
|
|
|
|
if evset != epoll::Events::EPOLLIN {
|
|
|
|
return Err(Error::HandleEventNotEpollIn.into());
|
|
|
|
}
|
|
|
|
|
2020-04-09 16:20:38 +00:00
|
|
|
let mut thread = self.threads[thread_id].lock().unwrap();
|
2020-01-20 16:10:21 +00:00
|
|
|
match device_event {
|
2020-04-16 16:57:29 +00:00
|
|
|
0 => {
|
2020-05-29 14:30:18 +00:00
|
|
|
let mut vring = vrings[0].write().unwrap();
|
|
|
|
if thread
|
|
|
|
.net
|
|
|
|
.resume_rx(&mut vring.mut_queue())
|
|
|
|
.map_err(Error::NetQueuePair)?
|
|
|
|
{
|
|
|
|
vring
|
|
|
|
.signal_used_queue()
|
|
|
|
.map_err(Error::FailedSignalingUsedQueue)?
|
2020-01-20 16:10:21 +00:00
|
|
|
}
|
|
|
|
}
|
2020-04-16 16:57:29 +00:00
|
|
|
1 => {
|
2020-05-18 13:53:13 +00:00
|
|
|
let mut vring = vrings[1].write().unwrap();
|
2020-05-29 14:30:18 +00:00
|
|
|
if thread
|
|
|
|
.net
|
|
|
|
.process_tx(&mut vring.mut_queue())
|
|
|
|
.map_err(Error::NetQueuePair)?
|
|
|
|
{
|
|
|
|
vring
|
|
|
|
.signal_used_queue()
|
|
|
|
.map_err(Error::FailedSignalingUsedQueue)?
|
|
|
|
}
|
2020-01-20 16:10:21 +00:00
|
|
|
}
|
2020-04-16 16:57:29 +00:00
|
|
|
2 => {
|
2020-04-09 16:20:38 +00:00
|
|
|
let mut vring = vrings[0].write().unwrap();
|
2020-05-29 14:30:18 +00:00
|
|
|
if thread
|
|
|
|
.net
|
|
|
|
.process_rx_tap(&mut vring.mut_queue())
|
|
|
|
.map_err(Error::NetQueuePair)?
|
2020-01-20 16:10:21 +00:00
|
|
|
{
|
2020-05-29 14:30:18 +00:00
|
|
|
vring
|
|
|
|
.signal_used_queue()
|
|
|
|
.map_err(Error::FailedSignalingUsedQueue)?
|
2020-01-20 16:10:21 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
_ => return Err(Error::HandleEventUnknownEvent.into()),
|
|
|
|
}
|
|
|
|
|
|
|
|
Ok(false)
|
|
|
|
}
|
2020-02-11 11:27:03 +00:00
|
|
|
|
2020-04-09 15:49:11 +00:00
|
|
|
fn exit_event(&self, thread_index: usize) -> Option<(EventFd, Option<u16>)> {
|
|
|
|
// The exit event is placed after the queues and the tap event, which
|
|
|
|
// is event index 3.
|
2020-04-08 16:27:26 +00:00
|
|
|
Some((
|
2020-04-09 15:49:11 +00:00
|
|
|
self.threads[thread_index]
|
2020-04-09 14:35:56 +00:00
|
|
|
.lock()
|
|
|
|
.unwrap()
|
|
|
|
.kill_evt
|
|
|
|
.try_clone()
|
|
|
|
.unwrap(),
|
2020-04-09 15:49:11 +00:00
|
|
|
Some(3),
|
2020-04-08 16:27:26 +00:00
|
|
|
))
|
2020-02-11 11:27:03 +00:00
|
|
|
}
|
2020-04-09 20:59:13 +00:00
|
|
|
|
|
|
|
fn queues_per_thread(&self) -> Vec<u64> {
|
|
|
|
self.queues_per_thread.clone()
|
|
|
|
}
|
2020-01-20 16:10:21 +00:00
|
|
|
}
|
|
|
|
|
2020-05-08 15:43:56 +00:00
|
|
|
pub struct VhostUserNetBackendConfig {
|
2020-01-20 16:10:21 +00:00
|
|
|
pub ip: Ipv4Addr,
|
2020-05-15 09:00:38 +00:00
|
|
|
pub host_mac: MacAddr,
|
2020-01-20 16:10:21 +00:00
|
|
|
pub mask: Ipv4Addr,
|
2020-05-08 15:43:56 +00:00
|
|
|
pub socket: String,
|
2020-01-20 16:10:21 +00:00
|
|
|
pub num_queues: usize,
|
|
|
|
pub queue_size: u16,
|
2020-05-08 15:43:56 +00:00
|
|
|
pub tap: Option<String>,
|
2020-01-20 16:10:21 +00:00
|
|
|
}
|
|
|
|
|
2020-05-08 15:43:56 +00:00
|
|
|
impl VhostUserNetBackendConfig {
|
|
|
|
pub fn parse(backend: &str) -> Result<Self> {
|
|
|
|
let mut parser = OptionParser::new();
|
|
|
|
|
|
|
|
parser
|
|
|
|
.add("tap")
|
|
|
|
.add("ip")
|
2020-05-15 09:00:38 +00:00
|
|
|
.add("host_mac")
|
2020-05-08 15:43:56 +00:00
|
|
|
.add("mask")
|
|
|
|
.add("queue_size")
|
|
|
|
.add("num_queues")
|
|
|
|
.add("socket");
|
|
|
|
|
|
|
|
parser.parse(backend).map_err(Error::FailedConfigParse)?;
|
|
|
|
|
|
|
|
let tap = parser.get("tap");
|
|
|
|
let ip = parser
|
|
|
|
.convert("ip")
|
|
|
|
.map_err(Error::FailedConfigParse)?
|
|
|
|
.unwrap_or_else(|| Ipv4Addr::new(192, 168, 100, 1));
|
2020-05-15 09:00:38 +00:00
|
|
|
let host_mac = parser
|
|
|
|
.convert("host_mac")
|
|
|
|
.map_err(Error::FailedConfigParse)?
|
|
|
|
.unwrap_or_else(MacAddr::local_random);
|
2020-05-08 15:43:56 +00:00
|
|
|
let mask = parser
|
|
|
|
.convert("mask")
|
|
|
|
.map_err(Error::FailedConfigParse)?
|
|
|
|
.unwrap_or_else(|| Ipv4Addr::new(255, 255, 255, 0));
|
|
|
|
let queue_size = parser
|
|
|
|
.convert("queue_size")
|
|
|
|
.map_err(Error::FailedConfigParse)?
|
|
|
|
.unwrap_or(256);
|
|
|
|
let num_queues = parser
|
|
|
|
.convert("num_queues")
|
|
|
|
.map_err(Error::FailedConfigParse)?
|
|
|
|
.unwrap_or(2);
|
|
|
|
let socket = parser.get("socket").ok_or(Error::SocketParameterMissing)?;
|
2020-01-20 16:10:21 +00:00
|
|
|
|
|
|
|
Ok(VhostUserNetBackendConfig {
|
|
|
|
ip,
|
2020-05-15 09:00:38 +00:00
|
|
|
host_mac,
|
2020-01-20 16:10:21 +00:00
|
|
|
mask,
|
2020-05-08 15:43:56 +00:00
|
|
|
socket,
|
2020-01-20 16:10:21 +00:00
|
|
|
num_queues,
|
|
|
|
queue_size,
|
2020-03-03 06:40:55 +00:00
|
|
|
tap,
|
2020-01-20 16:10:21 +00:00
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
2020-01-21 15:16:38 +00:00
|
|
|
|
|
|
|
pub fn start_net_backend(backend_command: &str) {
|
|
|
|
let backend_config = match VhostUserNetBackendConfig::parse(backend_command) {
|
|
|
|
Ok(config) => config,
|
|
|
|
Err(e) => {
|
2020-04-09 14:35:56 +00:00
|
|
|
eprintln!("Failed parsing parameters {:?}", e);
|
2020-01-21 15:16:38 +00:00
|
|
|
process::exit(1);
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2020-05-08 15:43:56 +00:00
|
|
|
let tap = if let Some(tap) = backend_config.tap.as_ref() {
|
|
|
|
Some(tap.as_str())
|
|
|
|
} else {
|
|
|
|
None
|
|
|
|
};
|
|
|
|
|
2020-01-21 15:16:38 +00:00
|
|
|
let net_backend = Arc::new(RwLock::new(
|
|
|
|
VhostUserNetBackend::new(
|
|
|
|
backend_config.ip,
|
2020-05-15 09:00:38 +00:00
|
|
|
backend_config.host_mac,
|
2020-01-21 15:16:38 +00:00
|
|
|
backend_config.mask,
|
|
|
|
backend_config.num_queues,
|
|
|
|
backend_config.queue_size,
|
2020-05-08 15:43:56 +00:00
|
|
|
tap,
|
2020-01-21 15:16:38 +00:00
|
|
|
)
|
|
|
|
.unwrap(),
|
|
|
|
));
|
|
|
|
|
2020-04-24 11:33:00 +00:00
|
|
|
let listener = Listener::new(&backend_config.socket, true).unwrap();
|
|
|
|
|
|
|
|
let mut net_daemon =
|
|
|
|
VhostUserDaemon::new("vhost-user-net-backend".to_string(), net_backend.clone()).unwrap();
|
2020-01-21 15:16:38 +00:00
|
|
|
|
2020-04-09 14:35:56 +00:00
|
|
|
let mut vring_workers = net_daemon.get_vring_workers();
|
|
|
|
|
|
|
|
if vring_workers.len() != net_backend.read().unwrap().threads.len() {
|
|
|
|
error!("Number of vring workers must be identical to the number of backend threads");
|
|
|
|
process::exit(1);
|
|
|
|
}
|
2020-01-21 15:16:38 +00:00
|
|
|
|
2020-04-09 14:35:56 +00:00
|
|
|
for thread in net_backend.read().unwrap().threads.iter() {
|
|
|
|
thread
|
|
|
|
.lock()
|
|
|
|
.unwrap()
|
|
|
|
.set_vring_worker(Some(vring_workers.remove(0)));
|
|
|
|
}
|
2020-01-21 15:16:38 +00:00
|
|
|
|
2020-04-24 11:33:00 +00:00
|
|
|
if let Err(e) = net_daemon.start(listener) {
|
2020-04-09 14:35:56 +00:00
|
|
|
error!(
|
2020-01-21 15:16:38 +00:00
|
|
|
"failed to start daemon for vhost-user-net with error: {:?}",
|
|
|
|
e
|
|
|
|
);
|
|
|
|
process::exit(1);
|
|
|
|
}
|
|
|
|
|
2020-02-06 12:17:59 +00:00
|
|
|
if let Err(e) = net_daemon.wait() {
|
|
|
|
error!("Error from the main thread: {:?}", e);
|
|
|
|
}
|
|
|
|
|
2020-04-09 14:35:56 +00:00
|
|
|
for thread in net_backend.read().unwrap().threads.iter() {
|
|
|
|
if let Err(e) = thread.lock().unwrap().kill_evt.write(1) {
|
|
|
|
error!("Error shutting down worker thread: {:?}", e)
|
|
|
|
}
|
2020-02-06 12:17:59 +00:00
|
|
|
}
|
2020-01-21 15:16:38 +00:00
|
|
|
}
|