blob: ff8aad47751bae3e3bcd9b35d8135b5f046856ef [file] [log] [blame]
// Copyright 2018 The Chromium OS Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
use std::fmt::{self, Display};
use std::io::{self, Write};
use std::mem;
use std::os::unix::io::RawFd;
use std::path::{Path, PathBuf};
use std::result;
use std::thread;
use base::{error, warn, Error as SysError, Event, PollContext, PollToken};
use vm_memory::GuestMemory;
use super::{
copy_config, DescriptorError, Interrupt, Queue, Reader, VirtioDevice, Writer, TYPE_9P,
};
const QUEUE_SIZE: u16 = 128;
const QUEUE_SIZES: &[u16] = &[QUEUE_SIZE];
// The only virtio_9p feature.
const VIRTIO_9P_MOUNT_TAG: u8 = 0;
/// Errors that occur during operation of a virtio 9P device.
#[derive(Debug)]
pub enum P9Error {
/// The tag for the 9P device was too large to fit in the config space.
TagTooLong(usize),
/// The root directory for the 9P server is not absolute.
RootNotAbsolute(PathBuf),
/// Creating PollContext failed.
CreatePollContext(SysError),
/// Error while polling for events.
PollError(SysError),
/// Error while reading from the virtio queue's Event.
ReadQueueEvent(SysError),
/// A request is missing readable descriptors.
NoReadableDescriptors,
/// A request is missing writable descriptors.
NoWritableDescriptors,
/// Failed to signal the virio used queue.
SignalUsedQueue(SysError),
/// A DescriptorChain contains invalid data.
InvalidDescriptorChain(DescriptorError),
/// An internal I/O error occurred.
Internal(io::Error),
}
impl std::error::Error for P9Error {}
impl Display for P9Error {
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
use self::P9Error::*;
match self {
TagTooLong(len) => write!(
f,
"P9 device tag is too long: len = {}, max = {}",
len,
::std::u16::MAX
),
RootNotAbsolute(buf) => write!(
f,
"P9 root directory is not absolute: root = {}",
buf.display()
),
CreatePollContext(err) => write!(f, "failed to create PollContext: {}", err),
PollError(err) => write!(f, "failed to poll events: {}", err),
ReadQueueEvent(err) => write!(f, "failed to read from virtio queue Event: {}", err),
NoReadableDescriptors => write!(f, "request does not have any readable descriptors"),
NoWritableDescriptors => write!(f, "request does not have any writable descriptors"),
SignalUsedQueue(err) => write!(f, "failed to signal used queue: {}", err),
InvalidDescriptorChain(err) => {
write!(f, "DescriptorChain contains invalid data: {}", err)
}
Internal(err) => write!(f, "P9 internal server error: {}", err),
}
}
}
pub type P9Result<T> = result::Result<T, P9Error>;
struct Worker {
interrupt: Interrupt,
mem: GuestMemory,
queue: Queue,
server: p9::Server,
}
impl Worker {
fn process_queue(&mut self) -> P9Result<()> {
while let Some(avail_desc) = self.queue.pop(&self.mem) {
let mut reader = Reader::new(self.mem.clone(), avail_desc.clone())
.map_err(P9Error::InvalidDescriptorChain)?;
let mut writer = Writer::new(self.mem.clone(), avail_desc.clone())
.map_err(P9Error::InvalidDescriptorChain)?;
self.server
.handle_message(&mut reader, &mut writer)
.map_err(P9Error::Internal)?;
self.queue
.add_used(&self.mem, avail_desc.index, writer.bytes_written() as u32);
}
self.interrupt.signal_used_queue(self.queue.vector);
Ok(())
}
fn run(&mut self, queue_evt: Event, kill_evt: Event) -> P9Result<()> {
#[derive(PollToken)]
enum Token {
// A request is ready on the queue.
QueueReady,
// Check if any interrupts need to be re-asserted.
InterruptResample,
// The parent thread requested an exit.
Kill,
}
let poll_ctx: PollContext<Token> = PollContext::build_with(&[
(&queue_evt, Token::QueueReady),
(self.interrupt.get_resample_evt(), Token::InterruptResample),
(&kill_evt, Token::Kill),
])
.map_err(P9Error::CreatePollContext)?;
loop {
let events = poll_ctx.wait().map_err(P9Error::PollError)?;
for event in events.iter_readable() {
match event.token() {
Token::QueueReady => {
queue_evt.read().map_err(P9Error::ReadQueueEvent)?;
self.process_queue()?;
}
Token::InterruptResample => {
self.interrupt.interrupt_resample();
}
Token::Kill => return Ok(()),
}
}
}
}
}
/// Virtio device for sharing specific directories on the host system with the guest VM.
pub struct P9 {
config: Vec<u8>,
server: Option<p9::Server>,
kill_evt: Option<Event>,
avail_features: u64,
acked_features: u64,
worker: Option<thread::JoinHandle<P9Result<()>>>,
}
impl P9 {
pub fn new<P: AsRef<Path> + Into<Box<Path>>>(
base_features: u64,
root: P,
tag: &str,
) -> P9Result<P9> {
if tag.len() > ::std::u16::MAX as usize {
return Err(P9Error::TagTooLong(tag.len()));
}
if !root.as_ref().is_absolute() {
return Err(P9Error::RootNotAbsolute(root.as_ref().into()));
}
let len = tag.len() as u16;
let mut cfg = Vec::with_capacity(tag.len() + mem::size_of::<u16>());
cfg.push(len as u8);
cfg.push((len >> 8) as u8);
cfg.write_all(tag.as_bytes()).map_err(P9Error::Internal)?;
Ok(P9 {
config: cfg,
server: Some(p9::Server::new(
root,
Default::default(),
Default::default(),
)),
kill_evt: None,
avail_features: base_features | 1 << VIRTIO_9P_MOUNT_TAG,
acked_features: 0,
worker: None,
})
}
}
impl VirtioDevice for P9 {
fn keep_fds(&self) -> Vec<RawFd> {
Vec::new()
}
fn device_type(&self) -> u32 {
TYPE_9P
}
fn queue_max_sizes(&self) -> &[u16] {
QUEUE_SIZES
}
fn features(&self) -> u64 {
self.avail_features
}
fn ack_features(&mut self, value: u64) {
let mut v = value;
// Check if the guest is ACK'ing a feature that we didn't claim to have.
let unrequested_features = v & !self.avail_features;
if unrequested_features != 0 {
warn!("virtio_9p got unknown feature ack: {:x}", v);
// Don't count these features as acked.
v &= !unrequested_features;
}
self.acked_features |= v;
}
fn read_config(&self, offset: u64, data: &mut [u8]) {
copy_config(data, 0, self.config.as_slice(), offset);
}
fn activate(
&mut self,
guest_mem: GuestMemory,
interrupt: Interrupt,
mut queues: Vec<Queue>,
mut queue_evts: Vec<Event>,
) {
if queues.len() != 1 || queue_evts.len() != 1 {
return;
}
let (self_kill_evt, kill_evt) = match Event::new().and_then(|e| Ok((e.try_clone()?, e))) {
Ok(v) => v,
Err(e) => {
error!("failed creating kill Event pair: {}", e);
return;
}
};
self.kill_evt = Some(self_kill_evt);
if let Some(server) = self.server.take() {
let worker_result =
thread::Builder::new()
.name("virtio_9p".to_string())
.spawn(move || {
let mut worker = Worker {
interrupt,
mem: guest_mem,
queue: queues.remove(0),
server,
};
worker.run(queue_evts.remove(0), kill_evt)
});
match worker_result {
Ok(worker) => self.worker = Some(worker),
Err(e) => error!("failed to spawn virtio_9p worker: {}", e),
}
}
}
}
impl Drop for P9 {
fn drop(&mut self) {
if let Some(kill_evt) = self.kill_evt.take() {
if let Err(e) = kill_evt.write(1) {
error!("failed to kill virtio_9p worker thread: {}", e);
return;
}
// Only wait on the child thread if we were able to send it a kill event.
if let Some(worker) = self.worker.take() {
match worker.join() {
Ok(r) => {
if let Err(e) = r {
error!("virtio_9p worker thread exited with error: {}", e)
}
}
Err(e) => error!("virtio_9p worker thread panicked: {:?}", e),
}
}
}
}
}