mirror of
https://chromium.googlesource.com/crosvm/crosvm
synced 2025-02-06 10:32:10 +00:00
This device tree is derived from the Android fstab file which is provided via command line flag. BUG=chromium:922737 TEST=None CQ-DEPEND=CL:1415390 CQ-DEPEND=CL:1415270 Change-Id: Idd007c844f84cab3ff37be16a718f14e5f630312 Reviewed-on: https://chromium-review.googlesource.com/1370058 Commit-Ready: Daniel Verkamp <dverkamp@chromium.org> Tested-by: kokoro <noreply+kokoro@google.com> Reviewed-by: Dylan Reid <dgreid@chromium.org>
269 lines
9.3 KiB
Rust
269 lines
9.3 KiB
Rust
// Copyright 2018 The Chromium OS Authors. All rights reserved.
|
|
// Use of this source code is governed by a BSD-style license that can be
|
|
// found in the LICENSE file.
|
|
|
|
pub mod fdt;
|
|
|
|
extern crate byteorder;
|
|
extern crate devices;
|
|
extern crate io_jail;
|
|
extern crate kernel_cmdline;
|
|
extern crate kvm;
|
|
extern crate libc;
|
|
extern crate resources;
|
|
extern crate sync;
|
|
extern crate sys_util;
|
|
|
|
use std::collections::BTreeMap;
|
|
use std::fmt;
|
|
use std::fs::File;
|
|
use std::io::{Read, Seek, SeekFrom};
|
|
use std::os::unix::io::AsRawFd;
|
|
use std::result;
|
|
use std::sync::Arc;
|
|
|
|
use devices::virtio::VirtioDevice;
|
|
use devices::{
|
|
Bus, BusDevice, BusError, PciDevice, PciDeviceError, PciInterruptPin, PciRoot, ProxyDevice,
|
|
Serial,
|
|
};
|
|
use io_jail::Minijail;
|
|
use kvm::{IoeventAddress, Kvm, Vcpu, Vm};
|
|
use resources::SystemAllocator;
|
|
use sync::Mutex;
|
|
use sys_util::{syslog, EventFd, GuestAddress, GuestMemory, GuestMemoryError};
|
|
|
|
pub type Result<T> = result::Result<T, Box<std::error::Error>>;
|
|
|
|
/// Holds the pieces needed to build a VM. Passed to `build_vm` in the `LinuxArch` trait below to
|
|
/// create a `RunnableLinuxVm`.
|
|
pub struct VmComponents {
|
|
pub memory_mb: u64,
|
|
pub vcpu_count: u32,
|
|
pub kernel_image: File,
|
|
pub android_fstab: Option<File>,
|
|
pub extra_kernel_params: Vec<String>,
|
|
pub wayland_dmabuf: bool,
|
|
}
|
|
|
|
/// Holds the elements needed to run a Linux VM. Created by `build_vm`.
|
|
pub struct RunnableLinuxVm {
|
|
pub vm: Vm,
|
|
pub kvm: Kvm,
|
|
pub resources: SystemAllocator,
|
|
pub stdio_serial: Arc<Mutex<Serial>>,
|
|
pub exit_evt: EventFd,
|
|
pub vcpus: Vec<Vcpu>,
|
|
pub irq_chip: Option<File>,
|
|
pub io_bus: Bus,
|
|
pub mmio_bus: Bus,
|
|
pub pid_debug_label_map: BTreeMap<u32, String>,
|
|
}
|
|
|
|
/// The device and optional jail.
|
|
pub struct VirtioDeviceStub {
|
|
pub dev: Box<VirtioDevice>,
|
|
pub jail: Option<Minijail>,
|
|
}
|
|
|
|
/// Trait which is implemented for each Linux Architecture in order to
|
|
/// set up the memory, cpus, and system devices and to boot the kernel.
|
|
pub trait LinuxArch {
|
|
/// Takes `VmComponents` and generates a `RunnableLinuxVm`.
|
|
///
|
|
/// # Arguments
|
|
///
|
|
/// * `components` - Parts to use to build the VM.
|
|
/// * `virtio_devs` - Function to generate a list of virtio devices.
|
|
fn build_vm<F>(components: VmComponents, virtio_devs: F) -> Result<RunnableLinuxVm>
|
|
where
|
|
F: FnOnce(
|
|
&GuestMemory,
|
|
&EventFd,
|
|
) -> Result<Vec<(Box<PciDevice + 'static>, Option<Minijail>)>>;
|
|
}
|
|
|
|
/// Errors for device manager.
|
|
#[derive(Debug)]
|
|
pub enum DeviceRegistrationError {
|
|
/// Could not allocate IO space for the device.
|
|
AllocateIoAddrs(PciDeviceError),
|
|
/// Could not allocate an IRQ number.
|
|
AllocateIrq,
|
|
/// Could not create the mmio device to wrap a VirtioDevice.
|
|
CreateMmioDevice(sys_util::Error),
|
|
/// Could not create an event fd.
|
|
EventFdCreate(sys_util::Error),
|
|
/// Could not add a device to the mmio bus.
|
|
MmioInsert(BusError),
|
|
/// Failed to register ioevent with VM.
|
|
RegisterIoevent(sys_util::Error),
|
|
/// Failed to register irq eventfd with VM.
|
|
RegisterIrqfd(sys_util::Error),
|
|
/// Failed to initialize proxy device for jailed device.
|
|
ProxyDeviceCreation(devices::ProxyError),
|
|
/// Appending to kernel command line failed.
|
|
Cmdline(kernel_cmdline::Error),
|
|
/// No more IRQs are available.
|
|
IrqsExhausted,
|
|
/// No more MMIO space available.
|
|
AddrsExhausted,
|
|
}
|
|
|
|
impl fmt::Display for DeviceRegistrationError {
|
|
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
|
|
match self {
|
|
DeviceRegistrationError::AllocateIoAddrs(e) => {
|
|
write!(f, "Allocating IO addresses: {:?}", e)
|
|
}
|
|
DeviceRegistrationError::AllocateIrq => write!(f, "Allocating IRQ number"),
|
|
DeviceRegistrationError::CreateMmioDevice(e) => {
|
|
write!(f, "failed to create mmio device: {:?}", e)
|
|
}
|
|
DeviceRegistrationError::Cmdline(e) => {
|
|
write!(f, "unable to add device to kernel command line: {}", e)
|
|
}
|
|
DeviceRegistrationError::EventFdCreate(e) => {
|
|
write!(f, "failed to create eventfd: {:?}", e)
|
|
}
|
|
DeviceRegistrationError::MmioInsert(e) => {
|
|
write!(f, "failed to add to mmio bus: {:?}", e)
|
|
}
|
|
DeviceRegistrationError::RegisterIoevent(e) => {
|
|
write!(f, "failed to register ioevent to VM: {:?}", e)
|
|
}
|
|
DeviceRegistrationError::RegisterIrqfd(e) => {
|
|
write!(f, "failed to register irq eventfd to VM: {:?}", e)
|
|
}
|
|
DeviceRegistrationError::ProxyDeviceCreation(e) => {
|
|
write!(f, "failed to create proxy device: {}", e)
|
|
}
|
|
DeviceRegistrationError::IrqsExhausted => write!(f, "no more IRQs are available"),
|
|
DeviceRegistrationError::AddrsExhausted => write!(f, "no more addresses are available"),
|
|
}
|
|
}
|
|
}
|
|
|
|
/// Creates a root PCI device for use by this Vm.
|
|
pub fn generate_pci_root(
|
|
devices: Vec<(Box<PciDevice + 'static>, Option<Minijail>)>,
|
|
mmio_bus: &mut Bus,
|
|
resources: &mut SystemAllocator,
|
|
vm: &mut Vm,
|
|
) -> std::result::Result<
|
|
(PciRoot, Vec<(u32, PciInterruptPin)>, BTreeMap<u32, String>),
|
|
DeviceRegistrationError,
|
|
> {
|
|
let mut root = PciRoot::new();
|
|
let mut pci_irqs = Vec::new();
|
|
let mut pid_labels = BTreeMap::new();
|
|
for (dev_idx, (mut device, jail)) in devices.into_iter().enumerate() {
|
|
let mut keep_fds = device.keep_fds();
|
|
syslog::push_fds(&mut keep_fds);
|
|
|
|
let irqfd = EventFd::new().map_err(DeviceRegistrationError::EventFdCreate)?;
|
|
let irq_resample_fd = EventFd::new().map_err(DeviceRegistrationError::EventFdCreate)?;
|
|
let irq_num = resources
|
|
.allocate_irq()
|
|
.ok_or(DeviceRegistrationError::AllocateIrq)? as u32;
|
|
let pci_irq_pin = match dev_idx % 4 {
|
|
0 => PciInterruptPin::IntA,
|
|
1 => PciInterruptPin::IntB,
|
|
2 => PciInterruptPin::IntC,
|
|
3 => PciInterruptPin::IntD,
|
|
_ => panic!(""), // Obviously not possible, but the compiler is not smart enough.
|
|
};
|
|
vm.register_irqfd_resample(&irqfd, &irq_resample_fd, irq_num)
|
|
.map_err(DeviceRegistrationError::RegisterIrqfd)?;
|
|
keep_fds.push(irqfd.as_raw_fd());
|
|
keep_fds.push(irq_resample_fd.as_raw_fd());
|
|
device.assign_irq(irqfd, irq_resample_fd, irq_num, pci_irq_pin);
|
|
pci_irqs.push((dev_idx as u32, pci_irq_pin));
|
|
|
|
let ranges = device
|
|
.allocate_io_bars(resources)
|
|
.map_err(DeviceRegistrationError::AllocateIoAddrs)?;
|
|
for (event, addr, datamatch) in device.ioeventfds() {
|
|
let io_addr = IoeventAddress::Mmio(addr);
|
|
vm.register_ioevent(&event, io_addr, datamatch)
|
|
.map_err(DeviceRegistrationError::RegisterIoevent)?;
|
|
keep_fds.push(event.as_raw_fd());
|
|
}
|
|
let arced_dev: Arc<Mutex<BusDevice>> = if let Some(jail) = jail {
|
|
let proxy = ProxyDevice::new(device, &jail, keep_fds)
|
|
.map_err(DeviceRegistrationError::ProxyDeviceCreation)?;
|
|
pid_labels.insert(proxy.pid() as u32, proxy.debug_label());
|
|
Arc::new(Mutex::new(proxy))
|
|
} else {
|
|
Arc::new(Mutex::new(device))
|
|
};
|
|
root.add_device(arced_dev.clone());
|
|
for range in &ranges {
|
|
mmio_bus
|
|
.insert(arced_dev.clone(), range.0, range.1, true)
|
|
.map_err(DeviceRegistrationError::MmioInsert)?;
|
|
}
|
|
}
|
|
Ok((root, pci_irqs, pid_labels))
|
|
}
|
|
|
|
/// Errors for image loading.
|
|
#[derive(Debug)]
|
|
pub enum LoadImageError {
|
|
Seek(std::io::Error),
|
|
ImageSizeTooLarge(u64),
|
|
ReadToMemory(GuestMemoryError),
|
|
}
|
|
|
|
impl fmt::Display for LoadImageError {
|
|
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
|
|
match self {
|
|
LoadImageError::Seek(e) => write!(f, "Seek failed: {:?}", e),
|
|
LoadImageError::ImageSizeTooLarge(size) => {
|
|
write!(f, "Image size too large: {:?}", size)
|
|
}
|
|
LoadImageError::ReadToMemory(e) => {
|
|
write!(f, "Reading image into memory failed: {:?}", e)
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
/// Load an image from a file into guest memory.
|
|
///
|
|
/// # Arguments
|
|
///
|
|
/// * `guest_mem` - The memory to be used by the guest.
|
|
/// * `guest_addr` - The starting address to load the image in the guest memory.
|
|
/// * `max_size` - The amount of space in bytes available in the guest memory for the image.
|
|
/// * `image` - The file containing the image to be loaded.
|
|
///
|
|
/// The size in bytes of the loaded image is returned.
|
|
pub fn load_image<F>(
|
|
guest_mem: &GuestMemory,
|
|
image: &mut F,
|
|
guest_addr: GuestAddress,
|
|
max_size: u64,
|
|
) -> std::result::Result<usize, LoadImageError>
|
|
where
|
|
F: Read + Seek,
|
|
{
|
|
let size = image.seek(SeekFrom::End(0)).map_err(LoadImageError::Seek)?;
|
|
|
|
if size > usize::max_value() as u64 || size > max_size {
|
|
return Err(LoadImageError::ImageSizeTooLarge(size));
|
|
}
|
|
|
|
// This is safe due to the bounds check above.
|
|
let size = size as usize;
|
|
|
|
image
|
|
.seek(SeekFrom::Start(0))
|
|
.map_err(LoadImageError::Seek)?;
|
|
|
|
guest_mem
|
|
.read_to_memory(guest_addr, image, size)
|
|
.map_err(LoadImageError::ReadToMemory)?;
|
|
|
|
Ok(size)
|
|
}
|