From nobody Sun Feb 8 11:17:06 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1619608630; cv=none; d=zohomail.com; s=zohoarc; b=b9iXM5XkgyPDJLAXDoDhKr54mmKxG6CGNTWQL/yB7PJTlvx2C11u6nYh3+oSDpK698qROemSnwJKncaGXfQiNoik1yMknOrxnCs96ZQwc1GF8Xcmvs1jyKNgk5IMA/5IhKF2dSUhWXhlgyCZXs5/6RIOSSCWixKJWBWNzQHDk9E= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1619608630; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:To; bh=3DGlnwqeF+oL583U65gQ5a2QKudNiqclqjJ2s7qby0c=; b=BBZnx8+5Z/TMDq8QkIAJOAa3sFfiB3/PSpAq5skTfyVZGB7Eg80B1VEbyJdLBtwM3D7goMX0FUAsIuRwBHUhBXyV/sLbB/y1rhHqOUWDygwLe0RUnFpTtRjcIliHTp+2GQb2LEyldbBG6b6PwixTbjy9019SCYtFe0EbOaE3UC8= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass header.from= (p=none dis=none) header.from= Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1619608630714226.89573263248678; Wed, 28 Apr 2021 04:17:10 -0700 (PDT) Received: from localhost ([::1]:38966 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1lbiBp-0004zN-Ke for importer@patchew.org; Wed, 28 Apr 2021 07:17:09 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]:36338) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1lbhxR-0006h8-W4 for qemu-devel@nongnu.org; Wed, 28 Apr 2021 07:02:18 -0400 Received: from us-smtp-delivery-124.mimecast.com ([170.10.133.124]:27647) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1lbhxO-0005EM-Gb for qemu-devel@nongnu.org; Wed, 28 Apr 2021 07:02:17 -0400 Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-220-r0NdyupyMbOlHlHYwBPL8w-1; Wed, 28 Apr 2021 07:02:10 -0400 Received: from smtp.corp.redhat.com (int-mx07.intmail.prod.int.phx2.redhat.com [10.5.11.22]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 74E5D100A605; Wed, 28 Apr 2021 11:02:09 +0000 (UTC) Received: from dgilbert-t580.localhost (ovpn-115-35.ams2.redhat.com [10.36.115.35]) by smtp.corp.redhat.com (Postfix) with ESMTP id 01BAB1042A91; Wed, 28 Apr 2021 11:01:59 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1619607732; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=3DGlnwqeF+oL583U65gQ5a2QKudNiqclqjJ2s7qby0c=; b=QaJsw4pru+GpnG3GR2j/0tWnza21QecW0QZTTrULN1A8/EGtFPbgJfJvA47lJjDNl0gcu/ +H/0Bmmx7044Qegu6BS81L1WiBa4v1NvuAIHT+VvO/98Wr48xDh/XzCIFlN3QkFZ400WNs OAHabn1kAIBV8DaLZ/ZRV8NVmsU/8qk= X-MC-Unique: r0NdyupyMbOlHlHYwBPL8w-1 From: "Dr. David Alan Gilbert (git)" To: qemu-devel@nongnu.org, vgoyal@redhat.com, stefanha@redhat.com, groug@kaod.org Subject: [PATCH v3 18/26] DAX/unmap: virtiofsd: Add VHOST_USER_SLAVE_FS_IO Date: Wed, 28 Apr 2021 12:00:52 +0100 Message-Id: <20210428110100.27757-19-dgilbert@redhat.com> In-Reply-To: <20210428110100.27757-1-dgilbert@redhat.com> References: <20210428110100.27757-1-dgilbert@redhat.com> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 2.84 on 10.5.11.22 Authentication-Results: relay.mimecast.com; auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=dgilbert@redhat.com X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Transfer-Encoding: quoted-printable Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: pass client-ip=170.10.133.124; envelope-from=dgilbert@redhat.com; helo=us-smtp-delivery-124.mimecast.com X-Spam_score_int: -29 X-Spam_score: -3.0 X-Spam_bar: --- X-Spam_report: (-3.0 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.22, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: virtio-fs@redhat.com Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" X-ZohoMail-DKIM: pass (identity @redhat.com) Content-Type: text/plain; charset="utf-8" From: "Dr. David Alan Gilbert" Define a new slave command 'VHOST_USER_SLAVE_FS_IO' for a client to ask qemu to perform a read/write from an fd directly to GPA. Signed-off-by: Dr. David Alan Gilbert --- docs/interop/vhost-user.rst | 16 ++++ hw/virtio/trace-events | 6 ++ hw/virtio/vhost-user-fs.c | 95 +++++++++++++++++++++++ hw/virtio/vhost-user.c | 5 ++ include/hw/virtio/vhost-user-fs.h | 2 + subprojects/libvhost-user/libvhost-user.h | 1 + 6 files changed, 125 insertions(+) diff --git a/docs/interop/vhost-user.rst b/docs/interop/vhost-user.rst index 09aee3565d..2fa62ea451 100644 --- a/docs/interop/vhost-user.rst +++ b/docs/interop/vhost-user.rst @@ -1453,6 +1453,22 @@ Slave message types multiple chunks can be unmapped in one command. A reply is generated indicating whether unmapping succeeded. =20 +``VHOST_USER_SLAVE_FS_IO`` + :id: 9 + :equivalent ioctl: N/A + :slave payload: ``struct VhostUserFSSlaveMsg`` + :master payload: N/A + + Requests that IO be performed directly from an fd, passed in ancillary + data, to guest memory on behalf of the daemon; this is normally for a + case where a memory region isn't visible to the daemon. slave payload + has flags which determine the direction of IO operation. + + The ``VHOST_USER_FS_FLAG_MAP_R`` flag must be set in the ``flags`` field= to + read from the file into RAM. + The ``VHOST_USER_FS_FLAG_MAP_W`` flag must be set in the ``flags`` field= to + write to the file from RAM. + .. _reply_ack: =20 VHOST_USER_PROTOCOL_F_REPLY_ACK diff --git a/hw/virtio/trace-events b/hw/virtio/trace-events index c62727f879..20557a078e 100644 --- a/hw/virtio/trace-events +++ b/hw/virtio/trace-events @@ -53,6 +53,12 @@ vhost_vdpa_get_features(void *dev, uint64_t features) "d= ev: %p features: 0x%"PRI vhost_vdpa_set_owner(void *dev) "dev: %p" vhost_vdpa_vq_get_addr(void *dev, void *vq, uint64_t desc_user_addr, uint6= 4_t avail_user_addr, uint64_t used_user_addr) "dev: %p vq: %p desc_user_add= r: 0x%"PRIx64" avail_user_addr: 0x%"PRIx64" used_user_addr: 0x%"PRIx64 =20 +# vhost-user-fs.c + +vhost_user_fs_slave_io_loop(const char *name, uint64_t owr, int is_ram, in= t is_romd, size_t size) "region %s with internal offset 0x%"PRIx64 " ram=3D= %d romd=3D%d mrs.size=3D%zd" +vhost_user_fs_slave_io_loop_res(ssize_t transferred) "%zd" +vhost_user_fs_slave_io_exit(int res, size_t done) "res: %d done: %zd" + # virtio.c virtqueue_alloc_element(void *elem, size_t sz, unsigned in_num, unsigned o= ut_num) "elem %p size %zd in_num %u out_num %u" virtqueue_fill(void *vq, const void *elem, unsigned int len, unsigned int = idx) "vq %p elem %p len %u idx %u" diff --git a/hw/virtio/vhost-user-fs.c b/hw/virtio/vhost-user-fs.c index 963f694435..ee600ce968 100644 --- a/hw/virtio/vhost-user-fs.c +++ b/hw/virtio/vhost-user-fs.c @@ -23,6 +23,8 @@ #include "hw/virtio/vhost-user-fs.h" #include "monitor/monitor.h" #include "sysemu/sysemu.h" +#include "exec/address-spaces.h" +#include "trace.h" =20 static const int user_feature_bits[] =3D { VIRTIO_F_VERSION_1, @@ -220,6 +222,99 @@ uint64_t vhost_user_fs_slave_unmap(struct vhost_dev *d= ev, int message_size, return (uint64_t)res; } =20 +uint64_t vhost_user_fs_slave_io(struct vhost_dev *dev, int message_size, + VhostUserFSSlaveMsg *sm, int fd) +{ + VHostUserFS *fs =3D (VHostUserFS *)object_dynamic_cast(OBJECT(dev->vde= v), + TYPE_VHOST_USER_FS); + if (!fs) { + error_report("%s: Bad fs ptr", __func__); + return (uint64_t)-1; + } + if (!check_slave_message_entries(sm, message_size)) { + return (uint64_t)-1; + } + + unsigned int i; + int res =3D 0; + size_t done =3D 0; + + if (fd < 0) { + error_report("Bad fd for io"); + return (uint64_t)-1; + } + + for (i =3D 0; i < sm->count && !res; i++) { + VhostUserFSSlaveMsgEntry *e =3D &sm->entries[i]; + if (e->len =3D=3D 0) { + continue; + } + + size_t len =3D e->len; + uint64_t fd_offset =3D e->fd_offset; + hwaddr gpa =3D e->c_offset; + + while (len && !res) { + hwaddr xlat, xlat_len; + bool is_write =3D e->flags & VHOST_USER_FS_FLAG_MAP_W; + MemoryRegion *mr =3D address_space_translate(dev->vdev->dma_as= , gpa, + &xlat, &xlat_len, + is_write, + MEMTXATTRS_UNSPECIF= IED); + if (!mr || !xlat_len) { + error_report("No guest region found for 0x%" HWADDR_PRIx, = gpa); + res =3D -EFAULT; + break; + } + + trace_vhost_user_fs_slave_io_loop(mr->name, + (uint64_t)xlat, + memory_region_is_ram(mr), + memory_region_is_romd(mr), + (size_t)xlat_len); + + void *hostptr =3D qemu_map_ram_ptr(mr->ram_block, + xlat); + ssize_t transferred; + if (e->flags & VHOST_USER_FS_FLAG_MAP_R) { + /* Read from file into RAM */ + if (mr->readonly) { + res =3D -EFAULT; + break; + } + transferred =3D pread(fd, hostptr, xlat_len, fd_offset); + } else if (e->flags & VHOST_USER_FS_FLAG_MAP_W) { + /* Write into file from RAM */ + transferred =3D pwrite(fd, hostptr, xlat_len, fd_offset); + } else { + transferred =3D EINVAL; + } + + trace_vhost_user_fs_slave_io_loop_res(transferred); + if (transferred < 0) { + res =3D -errno; + break; + } + if (!transferred) { + /* EOF */ + break; + } + + done +=3D transferred; + fd_offset +=3D transferred; + gpa +=3D transferred; + len -=3D transferred; + } + } + close(fd); + + trace_vhost_user_fs_slave_io_exit(res, done); + if (res < 0) { + return (uint64_t)res; + } + return (uint64_t)done; +} + static void vuf_get_config(VirtIODevice *vdev, uint8_t *config) { VHostUserFS *fs =3D VHOST_USER_FS(vdev); diff --git a/hw/virtio/vhost-user.c b/hw/virtio/vhost-user.c index 7d9b0ad45d..58af28cb79 100644 --- a/hw/virtio/vhost-user.c +++ b/hw/virtio/vhost-user.c @@ -138,6 +138,7 @@ typedef enum VhostUserSlaveRequest { VHOST_USER_SLAVE_VRING_ERR =3D 5, VHOST_USER_SLAVE_FS_MAP =3D 6, VHOST_USER_SLAVE_FS_UNMAP =3D 7, + VHOST_USER_SLAVE_FS_IO =3D 8, VHOST_USER_SLAVE_MAX } VhostUserSlaveRequest; =20 @@ -1563,6 +1564,10 @@ static gboolean slave_read(QIOChannel *ioc, GIOCondi= tion condition, case VHOST_USER_SLAVE_FS_UNMAP: ret =3D vhost_user_fs_slave_unmap(dev, hdr.size, &payload.fs); break; + case VHOST_USER_SLAVE_FS_IO: + ret =3D vhost_user_fs_slave_io(dev, hdr.size, &payload.fs, + fd ? fd[0] : -1); + break; #endif default: error_report("Received unexpected msg type: %d.", hdr.request); diff --git a/include/hw/virtio/vhost-user-fs.h b/include/hw/virtio/vhost-us= er-fs.h index 0766f17548..2931164e23 100644 --- a/include/hw/virtio/vhost-user-fs.h +++ b/include/hw/virtio/vhost-user-fs.h @@ -78,5 +78,7 @@ uint64_t vhost_user_fs_slave_map(struct vhost_dev *dev, i= nt message_size, VhostUserFSSlaveMsg *sm, int fd); uint64_t vhost_user_fs_slave_unmap(struct vhost_dev *dev, int message_size, VhostUserFSSlaveMsg *sm); +uint64_t vhost_user_fs_slave_io(struct vhost_dev *dev, int message_size, + VhostUserFSSlaveMsg *sm, int fd); =20 #endif /* _QEMU_VHOST_USER_FS_H */ diff --git a/subprojects/libvhost-user/libvhost-user.h b/subprojects/libvho= st-user/libvhost-user.h index a98c5f5c11..42b0833c4b 100644 --- a/subprojects/libvhost-user/libvhost-user.h +++ b/subprojects/libvhost-user/libvhost-user.h @@ -121,6 +121,7 @@ typedef enum VhostUserSlaveRequest { VHOST_USER_SLAVE_VRING_ERR =3D 5, VHOST_USER_SLAVE_FS_MAP =3D 6, VHOST_USER_SLAVE_FS_UNMAP =3D 7, + VHOST_USER_SLAVE_FS_IO =3D 8, VHOST_USER_SLAVE_MAX } VhostUserSlaveRequest; =20 --=20 2.31.1