1 /* 2 * Communication channel between QEMU and remote device process 3 * 4 * Copyright © 2018, 2021 Oracle and/or its affiliates. 5 * 6 * This work is licensed under the terms of the GNU GPL, version 2 or later. 7 * See the COPYING file in the top-level directory. 8 * 9 */ 10 11 #include "qemu/osdep.h" 12 #include "qemu-common.h" 13 14 #include "qemu/module.h" 15 #include "hw/remote/mpqemu-link.h" 16 #include "qapi/error.h" 17 #include "qemu/iov.h" 18 #include "qemu/error-report.h" 19 #include "qemu/main-loop.h" 20 #include "io/channel.h" 21 #include "sysemu/iothread.h" 22 #include "trace.h" 23 24 /* 25 * Send message over the ioc QIOChannel. 26 * This function is safe to call from: 27 * - main loop in co-routine context. Will block the main loop if not in 28 * co-routine context; 29 * - vCPU thread with no co-routine context and if the channel is not part 30 * of the main loop handling; 31 * - IOThread within co-routine context, outside of co-routine context 32 * will block IOThread; 33 * Returns true if no errors were encountered, false otherwise. 34 */ 35 bool mpqemu_msg_send(MPQemuMsg *msg, QIOChannel *ioc, Error **errp) 36 { 37 bool iolock = qemu_mutex_iothread_locked(); 38 bool iothread = qemu_in_iothread(); 39 struct iovec send[2] = {}; 40 int *fds = NULL; 41 size_t nfds = 0; 42 bool ret = false; 43 44 send[0].iov_base = msg; 45 send[0].iov_len = MPQEMU_MSG_HDR_SIZE; 46 47 send[1].iov_base = (void *)&msg->data; 48 send[1].iov_len = msg->size; 49 50 if (msg->num_fds) { 51 nfds = msg->num_fds; 52 fds = msg->fds; 53 } 54 55 /* 56 * Dont use in IOThread out of co-routine context as 57 * it will block IOThread. 58 */ 59 assert(qemu_in_coroutine() || !iothread); 60 61 /* 62 * Skip unlocking/locking iothread lock when the IOThread is running 63 * in co-routine context. Co-routine context is asserted above 64 * for IOThread case. 65 * Also skip lock handling while in a co-routine in the main context. 66 */ 67 if (iolock && !iothread && !qemu_in_coroutine()) { 68 qemu_mutex_unlock_iothread(); 69 } 70 71 if (!qio_channel_writev_full_all(ioc, send, G_N_ELEMENTS(send), 72 fds, nfds, errp)) { 73 ret = true; 74 } else { 75 trace_mpqemu_send_io_error(msg->cmd, msg->size, nfds); 76 } 77 78 if (iolock && !iothread && !qemu_in_coroutine()) { 79 /* See above comment why skip locking here. */ 80 qemu_mutex_lock_iothread(); 81 } 82 83 return ret; 84 } 85 86 /* 87 * Read message from the ioc QIOChannel. 88 * This function is safe to call from: 89 * - From main loop in co-routine context. Will block the main loop if not in 90 * co-routine context; 91 * - From vCPU thread with no co-routine context and if the channel is not part 92 * of the main loop handling; 93 * - From IOThread within co-routine context, outside of co-routine context 94 * will block IOThread; 95 */ 96 static ssize_t mpqemu_read(QIOChannel *ioc, void *buf, size_t len, int **fds, 97 size_t *nfds, Error **errp) 98 { 99 struct iovec iov = { .iov_base = buf, .iov_len = len }; 100 bool iolock = qemu_mutex_iothread_locked(); 101 bool iothread = qemu_in_iothread(); 102 int ret = -1; 103 104 /* 105 * Dont use in IOThread out of co-routine context as 106 * it will block IOThread. 107 */ 108 assert(qemu_in_coroutine() || !iothread); 109 110 if (iolock && !iothread && !qemu_in_coroutine()) { 111 qemu_mutex_unlock_iothread(); 112 } 113 114 ret = qio_channel_readv_full_all_eof(ioc, &iov, 1, fds, nfds, errp); 115 116 if (iolock && !iothread && !qemu_in_coroutine()) { 117 qemu_mutex_lock_iothread(); 118 } 119 120 return (ret <= 0) ? ret : iov.iov_len; 121 } 122 123 bool mpqemu_msg_recv(MPQemuMsg *msg, QIOChannel *ioc, Error **errp) 124 { 125 ERRP_GUARD(); 126 g_autofree int *fds = NULL; 127 size_t nfds = 0; 128 ssize_t len; 129 bool ret = false; 130 131 len = mpqemu_read(ioc, msg, MPQEMU_MSG_HDR_SIZE, &fds, &nfds, errp); 132 if (len <= 0) { 133 goto fail; 134 } else if (len != MPQEMU_MSG_HDR_SIZE) { 135 error_setg(errp, "Message header corrupted"); 136 goto fail; 137 } 138 139 if (msg->size > sizeof(msg->data)) { 140 error_setg(errp, "Invalid size for message"); 141 goto fail; 142 } 143 144 if (!msg->size) { 145 goto copy_fds; 146 } 147 148 len = mpqemu_read(ioc, &msg->data, msg->size, NULL, NULL, errp); 149 if (len <= 0) { 150 goto fail; 151 } 152 if (len != msg->size) { 153 error_setg(errp, "Unable to read full message"); 154 goto fail; 155 } 156 157 copy_fds: 158 msg->num_fds = nfds; 159 if (nfds > G_N_ELEMENTS(msg->fds)) { 160 error_setg(errp, 161 "Overflow error: received %zu fds, more than max of %d fds", 162 nfds, REMOTE_MAX_FDS); 163 goto fail; 164 } 165 if (nfds) { 166 memcpy(msg->fds, fds, nfds * sizeof(int)); 167 } 168 169 ret = true; 170 171 fail: 172 if (*errp) { 173 trace_mpqemu_recv_io_error(msg->cmd, msg->size, nfds); 174 } 175 while (*errp && nfds) { 176 close(fds[nfds - 1]); 177 nfds--; 178 } 179 180 return ret; 181 } 182 183 /* 184 * Send msg and wait for a reply with command code RET_MSG. 185 * Returns the message received of size u64 or UINT64_MAX 186 * on error. 187 * Called from VCPU thread in non-coroutine context. 188 * Used by the Proxy object to communicate to remote processes. 189 */ 190 uint64_t mpqemu_msg_send_and_await_reply(MPQemuMsg *msg, PCIProxyDev *pdev, 191 Error **errp) 192 { 193 MPQemuMsg msg_reply = {0}; 194 uint64_t ret = UINT64_MAX; 195 196 assert(!qemu_in_coroutine()); 197 198 QEMU_LOCK_GUARD(&pdev->io_mutex); 199 if (!mpqemu_msg_send(msg, pdev->ioc, errp)) { 200 return ret; 201 } 202 203 if (!mpqemu_msg_recv(&msg_reply, pdev->ioc, errp)) { 204 return ret; 205 } 206 207 if (!mpqemu_msg_valid(&msg_reply) || msg_reply.cmd != MPQEMU_CMD_RET) { 208 error_setg(errp, "ERROR: Invalid reply received for command %d", 209 msg->cmd); 210 return ret; 211 } 212 213 return msg_reply.data.u64; 214 } 215 216 bool mpqemu_msg_valid(MPQemuMsg *msg) 217 { 218 if (msg->cmd >= MPQEMU_CMD_MAX || msg->cmd < 0) { 219 return false; 220 } 221 222 /* Verify FDs. */ 223 if (msg->num_fds >= REMOTE_MAX_FDS) { 224 return false; 225 } 226 227 if (msg->num_fds > 0) { 228 for (int i = 0; i < msg->num_fds; i++) { 229 if (fcntl(msg->fds[i], F_GETFL) == -1) { 230 return false; 231 } 232 } 233 } 234 235 /* Verify message specific fields. */ 236 switch (msg->cmd) { 237 case MPQEMU_CMD_SYNC_SYSMEM: 238 if (msg->num_fds == 0 || msg->size != sizeof(SyncSysmemMsg)) { 239 return false; 240 } 241 break; 242 case MPQEMU_CMD_PCI_CFGWRITE: 243 case MPQEMU_CMD_PCI_CFGREAD: 244 if (msg->size != sizeof(PciConfDataMsg)) { 245 return false; 246 } 247 break; 248 case MPQEMU_CMD_BAR_WRITE: 249 case MPQEMU_CMD_BAR_READ: 250 if ((msg->size != sizeof(BarAccessMsg)) || (msg->num_fds != 0)) { 251 return false; 252 } 253 break; 254 case MPQEMU_CMD_SET_IRQFD: 255 if (msg->size || (msg->num_fds != 2)) { 256 return false; 257 } 258 break; 259 default: 260 break; 261 } 262 263 return true; 264 } 265