301 lines
9.1 KiB
Go
301 lines
9.1 KiB
Go
// Linsk - A utility to access Linux-native file systems on non-Linux operating systems.
|
|
// Copyright (c) 2023 The Linsk Authors.
|
|
//
|
|
// This program is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// This program is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU General Public License
|
|
// along with this program. If not, see <https://www.gnu.org/licenses/>.
|
|
|
|
package cmd
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"os"
|
|
"path/filepath"
|
|
"strconv"
|
|
"strings"
|
|
"time"
|
|
|
|
"log/slog"
|
|
|
|
"github.com/AlexSSD7/linsk/cmd/runvm"
|
|
"github.com/AlexSSD7/linsk/nettap"
|
|
"github.com/AlexSSD7/linsk/osspecifics"
|
|
"github.com/AlexSSD7/linsk/share"
|
|
"github.com/AlexSSD7/linsk/storage"
|
|
"github.com/AlexSSD7/linsk/vm"
|
|
"github.com/pkg/errors"
|
|
)
|
|
|
|
func createStoreOrExit() *storage.Storage {
|
|
store, err := storage.NewStorage(slog.With("caller", "storage"), dataDirFlag)
|
|
if err != nil {
|
|
slog.Error("Failed to create Linsk data storage", "error", err.Error(), "data-dir", dataDirFlag)
|
|
os.Exit(1)
|
|
}
|
|
|
|
return store
|
|
}
|
|
|
|
func runVM(passthroughArg string, fn runvm.Func, forwardPortsRules []vm.PortForwardingRule, unrestrictedNetworking bool, withNetTap bool) int {
|
|
store := createStoreOrExit()
|
|
|
|
vmImagePath, err := store.CheckVMImageExists()
|
|
if err != nil {
|
|
slog.Error("Failed to check whether VM image exists", "error", err.Error())
|
|
return 1
|
|
}
|
|
|
|
if vmImagePath == "" {
|
|
slog.Error("VM image does not exist. You need to build it first before attempting to start Linsk. Please run `linsk build` first.")
|
|
return 1
|
|
}
|
|
|
|
biosPath, err := store.CheckDownloadVMBIOS(context.Background())
|
|
if err != nil {
|
|
slog.Error("Failed to check/download VM BIOS", "error", err.Error())
|
|
return 1
|
|
}
|
|
|
|
var passthroughConfig vm.PassthroughConfig
|
|
|
|
if passthroughArg != "" {
|
|
passthroughConfigPtr, err := getDevicePassthroughConfig(passthroughArg)
|
|
if err != nil {
|
|
slog.Error("Failed to get device passthrough config", "error", err.Error())
|
|
return 1
|
|
}
|
|
|
|
passthroughConfig = *passthroughConfigPtr
|
|
}
|
|
|
|
if len(passthroughConfig.USB) != 0 {
|
|
// Log USB-related warnings.
|
|
|
|
// Unfortunately USB passthrough is unstable in macOS and Windows. On Windows, you also need to install external
|
|
// libusbK driver, which nullifies the UX. This is a problem with how QEMU works, and unfortunately there isn't
|
|
// much we can do about it from our side.
|
|
|
|
switch {
|
|
case osspecifics.IsWindows():
|
|
// TODO: To document: installation of libusbK driver with Zadig utility.
|
|
slog.Warn("USB passthrough is unstable on Windows and requires installation of libusbK driver. Please consider using raw block device passthrough instead.")
|
|
case osspecifics.IsMacOS():
|
|
slog.Warn("USB passthrough is unstable on macOS. Please consider using raw block device passthrough instead.")
|
|
}
|
|
}
|
|
|
|
var tapRuntimeCtx *share.NetTapRuntimeContext
|
|
var tapsConfig []vm.TapConfig
|
|
|
|
if withNetTap {
|
|
tapManager, err := nettap.NewTapManager(slog.With("caller", "nettap-manager"))
|
|
if err != nil {
|
|
slog.Error("Failed to create new network tap manager", "error", err.Error())
|
|
return 1
|
|
}
|
|
|
|
tapNameToUse, err := nettap.NewUniqueTapName()
|
|
if err != nil {
|
|
slog.Error("Failed to generate new network tap name", "error", err.Error())
|
|
return 1
|
|
}
|
|
|
|
knownAllocs, err := store.ListNetTapAllocations()
|
|
if err != nil {
|
|
slog.Error("Failed to list net tap allocations", "error", err.Error())
|
|
return 1
|
|
}
|
|
|
|
removedTaps, err := tapManager.PruneTaps(knownAllocs)
|
|
if err != nil {
|
|
slog.Error("Failed to prune dangling network taps", "error", err.Error())
|
|
} else {
|
|
// This is optional, meaning that we won't exit in panic if this fails.
|
|
for _, removedTap := range removedTaps {
|
|
err = store.ReleaseNetTapAllocation(removedTap)
|
|
if err != nil {
|
|
slog.Error("Failed to release a danging net tap allocation", "error", err.Error())
|
|
}
|
|
}
|
|
}
|
|
|
|
err = store.SaveNetTapAllocation(tapNameToUse, os.Getpid())
|
|
if err != nil {
|
|
slog.Error("Failed to save net tap allocation", "error", err.Error())
|
|
return 1
|
|
}
|
|
|
|
tapManager, err = nettap.NewTapManager(slog.Default())
|
|
if err != nil {
|
|
slog.Error("Failed to create net tap manager", "error", err.Error())
|
|
return 1
|
|
}
|
|
|
|
err = tapManager.CreateNewTap(tapNameToUse)
|
|
if err != nil {
|
|
releaseErr := store.ReleaseNetTapAllocation(tapNameToUse)
|
|
if releaseErr != nil {
|
|
slog.Error("Failed to release net tap allocation", "error", releaseErr.Error(), "tap-name", tapNameToUse)
|
|
// Non-critical error.
|
|
}
|
|
|
|
slog.Error("Failed to create new tap", "error", err.Error())
|
|
return 1
|
|
}
|
|
|
|
defer func() {
|
|
err := tapManager.DeleteTap(tapNameToUse)
|
|
if err != nil {
|
|
slog.Error("Failed to clean up net tap", "error", err.Error(), "tap-name", tapNameToUse)
|
|
} else {
|
|
err = store.ReleaseNetTapAllocation(tapNameToUse)
|
|
if err != nil {
|
|
slog.Error("Failed to release net tap allocation", "error", err.Error(), "tap-name", tapNameToUse)
|
|
}
|
|
}
|
|
}()
|
|
|
|
tapNet, err := nettap.GenerateNet()
|
|
if err != nil {
|
|
slog.Error("Failed to generate tap net plan", "error", err.Error())
|
|
return 1
|
|
}
|
|
|
|
err = tapManager.ConfigureNet(tapNameToUse, tapNet.HostCIDR)
|
|
if err != nil {
|
|
slog.Error("Failed to configure tap net", "error", err.Error())
|
|
return 1
|
|
}
|
|
|
|
tapRuntimeCtx = &share.NetTapRuntimeContext{
|
|
Manager: tapManager,
|
|
Name: tapNameToUse,
|
|
Net: tapNet,
|
|
}
|
|
|
|
tapsConfig = []vm.TapConfig{{
|
|
Name: tapNameToUse,
|
|
}}
|
|
}
|
|
|
|
vmCfg := vm.Config{
|
|
Drives: []vm.DriveConfig{{
|
|
Path: vmImagePath,
|
|
SnapshotMode: true,
|
|
}},
|
|
|
|
MemoryAlloc: vmMemAllocFlag,
|
|
BIOSPath: biosPath,
|
|
|
|
PassthroughConfig: passthroughConfig,
|
|
ExtraPortForwardingRules: forwardPortsRules,
|
|
|
|
UnrestrictedNetworking: unrestrictedNetworking,
|
|
Taps: tapsConfig,
|
|
|
|
OSUpTimeout: time.Duration(vmOSUpTimeoutFlag) * time.Second,
|
|
SSHUpTimeout: time.Duration(vmSSHSetupTimeoutFlag) * time.Second,
|
|
|
|
Debug: vmDebugFlag,
|
|
}
|
|
|
|
vi, err := vm.NewVM(slog.Default().With("caller", "vm"), vmCfg)
|
|
if err != nil {
|
|
slog.Error("Failed to create vm instance", "error", err.Error())
|
|
return 1
|
|
}
|
|
|
|
return runvm.RunVM(vi, true, tapRuntimeCtx, fn)
|
|
}
|
|
|
|
func getDevicePassthroughConfig(val string) (*vm.PassthroughConfig, error) {
|
|
isRoot, err := osspecifics.CheckRunAsRoot()
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "check whether the program is run as root")
|
|
}
|
|
|
|
if !isRoot {
|
|
return nil, fmt.Errorf("device passthrough of any type requires root (admin) privileges")
|
|
}
|
|
|
|
valSplit := strings.Split(val, ":")
|
|
if want, have := 2, len(valSplit); want != have {
|
|
return nil, fmt.Errorf("bad device passthrough syntax: wrong items split by ':' count: want %v, have %v", want, have)
|
|
}
|
|
|
|
switch valSplit[0] {
|
|
case "usb":
|
|
usbValsSplit := strings.Split(valSplit[1], ",")
|
|
if want, have := 2, len(usbValsSplit); want != have {
|
|
return nil, fmt.Errorf("bad usb device passthrough syntax: wrong args split by ',' count: want %v, have %v", want, have)
|
|
}
|
|
|
|
vendorID, err := strconv.ParseUint(usbValsSplit[0], 16, 32)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("bad usb vendor id '%v'", usbValsSplit[0])
|
|
}
|
|
|
|
productID, err := strconv.ParseUint(usbValsSplit[1], 16, 32)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("bad usb product id '%v'", usbValsSplit[1])
|
|
}
|
|
|
|
return &vm.PassthroughConfig{
|
|
USB: []vm.USBDevicePassthroughConfig{{
|
|
VendorID: uint16(vendorID),
|
|
ProductID: uint16(productID),
|
|
}},
|
|
}, nil
|
|
case "dev":
|
|
devPath := filepath.Clean(valSplit[1])
|
|
|
|
err := osspecifics.CheckValidDevicePath(devPath)
|
|
if err != nil {
|
|
return nil, errors.Wrapf(err, "check whether device path is valid '%v'", devPath)
|
|
}
|
|
|
|
blockSize, err := osspecifics.GetDeviceLogicalBlockSize(devPath)
|
|
if err != nil {
|
|
return nil, errors.Wrapf(err, "get logical block size for device '%v'", devPath)
|
|
}
|
|
|
|
return &vm.PassthroughConfig{Block: []vm.BlockDevicePassthroughConfig{{
|
|
Path: devPath,
|
|
BlockSize: blockSize,
|
|
}}}, nil
|
|
case "dev_faulty_bs":
|
|
// Originally, Linsk assumed that the block size management was done by QEMU.
|
|
// But it appears that it wasn't, and QEMU used the default sector size of 512.
|
|
// bytes everywhere, no matter the physical/logical block size of the actual device.
|
|
//
|
|
// Sometimes, this can make the VM optimize the disk for the emulated 512 block size,
|
|
// thus making the disk look "corrupted" to the host OS that sees the right block
|
|
// size of more than 512 bytes.
|
|
//
|
|
// This mode emulates the faulty block size definition for compatibility with older Linsk versions.
|
|
|
|
devPath := filepath.Clean(valSplit[1])
|
|
|
|
err := osspecifics.CheckValidDevicePath(devPath)
|
|
if err != nil {
|
|
return nil, errors.Wrapf(err, "check whether device path is valid '%v'", devPath)
|
|
}
|
|
|
|
return &vm.PassthroughConfig{Block: []vm.BlockDevicePassthroughConfig{{
|
|
Path: devPath,
|
|
BlockSize: 512,
|
|
}}}, nil
|
|
default:
|
|
return nil, fmt.Errorf("unknown device passthrough type '%v'", val)
|
|
}
|
|
}
|