rootfs: support EROFS filesystem

For kata containers, rootfs is used in the read-only way.
EROFS can noticably decrease metadata overhead.

On the basis of supporting the EROFS file system, it supports using the config parameter to switch the file system used by rootfs.

Fixes: #6063

Signed-off-by: Gao Xiang <hsiangkao@linux.alibaba.com>
Signed-off-by: yaoyinnan <yaoyinnan@foxmail.com>
This commit is contained in:
yaoyinnan 2023-02-11 00:44:13 +08:00
parent ed02c8a051
commit bdf20b5d26
32 changed files with 707 additions and 131 deletions

View File

@ -210,6 +210,9 @@ pub struct BootInfo {
/// Path to root device on host /// Path to root device on host
#[serde(default)] #[serde(default)]
pub image: String, pub image: String,
/// Rootfs filesystem type.
#[serde(default)]
pub rootfs_type: String,
/// Path to the firmware. /// Path to the firmware.
/// ///
/// If you want that qemu uses the default firmware leave this option empty. /// If you want that qemu uses the default firmware leave this option empty.

View File

@ -79,6 +79,12 @@ DBVALIDHYPERVISORPATHS := []
PKGDATADIR := $(PREFIXDEPS)/share/$(PROJECT_DIR) PKGDATADIR := $(PREFIXDEPS)/share/$(PROJECT_DIR)
KERNELDIR := $(PKGDATADIR) KERNELDIR := $(PKGDATADIR)
IMAGEPATH := $(PKGDATADIR)/$(IMAGENAME) IMAGEPATH := $(PKGDATADIR)/$(IMAGENAME)
ROOTFSTYPE_EXT4 := \"ext4\"
ROOTFSTYPE_XFS := \"xfs\"
ROOTFSTYPE_EROFS := \"erofs\"
DEFROOTFSTYPE := $(ROOTFSTYPE_EXT4)
PKGLIBEXECDIR := $(LIBEXECDIR)/$(PROJECT_DIR) PKGLIBEXECDIR := $(LIBEXECDIR)/$(PROJECT_DIR)
FIRMWAREPATH := FIRMWAREPATH :=
FIRMWAREVOLUMEPATH := FIRMWAREVOLUMEPATH :=
@ -210,6 +216,7 @@ USER_VARS += DBVALIDCTLPATHS
USER_VARS += SYSCONFIG USER_VARS += SYSCONFIG
USER_VARS += IMAGENAME USER_VARS += IMAGENAME
USER_VARS += IMAGEPATH USER_VARS += IMAGEPATH
USER_VARS += DEFROOTFSTYPE
USER_VARS += MACHINETYPE USER_VARS += MACHINETYPE
USER_VARS += KERNELDIR USER_VARS += KERNELDIR
USER_VARS += KERNELTYPE USER_VARS += KERNELTYPE

View File

@ -17,6 +17,12 @@ ctlpath = "@DBCTLPATH@"
kernel = "@KERNELPATH_DB@" kernel = "@KERNELPATH_DB@"
image = "@IMAGEPATH@" image = "@IMAGEPATH@"
# rootfs filesystem type:
# - ext4 (default)
# - xfs
# - erofs
rootfs_type=@DEFROOTFSTYPE@
# List of valid annotation names for the hypervisor # List of valid annotation names for the hypervisor
# Each member of the list is a regular expression, which is the base name # Each member of the list is a regular expression, which is the base name
# of the annotation, e.g. "path" for io.katacontainers.config.hypervisor.path" # of the annotation, e.g. "path" for io.katacontainers.config.hypervisor.path"

View File

@ -101,7 +101,10 @@ impl DragonballInner {
// get kernel params // get kernel params
let mut kernel_params = KernelParams::new(self.config.debug_info.enable_debug); let mut kernel_params = KernelParams::new(self.config.debug_info.enable_debug);
kernel_params.append(&mut KernelParams::new_rootfs_kernel_params(&rootfs_driver)); kernel_params.append(&mut KernelParams::new_rootfs_kernel_params(
&rootfs_driver,
&self.config.boot_info.rootfs_type,
)?);
kernel_params.append(&mut KernelParams::from_string( kernel_params.append(&mut KernelParams::from_string(
&self.config.boot_info.kernel_params, &self.config.boot_info.kernel_params,
)); ));

View File

@ -6,7 +6,10 @@
use anyhow::{anyhow, Result}; use anyhow::{anyhow, Result};
use crate::{VM_ROOTFS_DRIVER_BLK, VM_ROOTFS_DRIVER_PMEM}; use crate::{
VM_ROOTFS_DRIVER_BLK, VM_ROOTFS_DRIVER_PMEM, VM_ROOTFS_FILESYSTEM_EROFS,
VM_ROOTFS_FILESYSTEM_EXT4, VM_ROOTFS_FILESYSTEM_XFS, VM_ROOTFS_ROOT_BLK, VM_ROOTFS_ROOT_PMEM,
};
use kata_types::config::LOG_VPORT_OPTION; use kata_types::config::LOG_VPORT_OPTION;
// Port where the agent will send the logs. Logs are sent through the vsock in cases // Port where the agent will send the logs. Logs are sent through the vsock in cases
@ -67,43 +70,49 @@ impl KernelParams {
Self { params } Self { params }
} }
pub(crate) fn new_rootfs_kernel_params(rootfs_driver: &str) -> Self { pub(crate) fn new_rootfs_kernel_params(rootfs_driver: &str, rootfs_type: &str) -> Result<Self> {
let params = match rootfs_driver { let mut params = vec![];
VM_ROOTFS_DRIVER_BLK => {
vec![ match rootfs_driver {
Param {
key: "root".to_string(),
value: "/dev/vda1".to_string(),
},
Param {
key: "rootflags".to_string(),
value: "data=ordered,errors=remount-ro ro".to_string(),
},
Param {
key: "rootfstype".to_string(),
value: "ext4".to_string(),
},
]
}
VM_ROOTFS_DRIVER_PMEM => { VM_ROOTFS_DRIVER_PMEM => {
vec![ params.push(Param::new("root", VM_ROOTFS_ROOT_PMEM));
Param { match rootfs_type {
key: "root".to_string(), VM_ROOTFS_FILESYSTEM_EXT4 | VM_ROOTFS_FILESYSTEM_XFS => {
value: "/dev/pmem0p1".to_string(), params.push(Param::new(
}, "rootflags",
Param { "dax,data=ordered,errors=remount-ro ro",
key: "rootflags".to_string(), ));
value: "data=ordered,errors=remount-ro,dax ro".to_string(), }
}, VM_ROOTFS_FILESYSTEM_EROFS => {
Param { params.push(Param::new("rootflags", "dax ro"));
key: "rootfstype".to_string(), }
value: "ext4".to_string(), _ => {
}, return Err(anyhow!("Unsupported rootfs type"));
] }
}
} }
_ => vec![], VM_ROOTFS_DRIVER_BLK => {
}; params.push(Param::new("root", VM_ROOTFS_ROOT_BLK));
Self { params } match rootfs_type {
VM_ROOTFS_FILESYSTEM_EXT4 | VM_ROOTFS_FILESYSTEM_XFS => {
params.push(Param::new("rootflags", "data=ordered,errors=remount-ro ro"));
}
VM_ROOTFS_FILESYSTEM_EROFS => {
params.push(Param::new("rootflags", "ro"));
}
_ => {
return Err(anyhow!("Unsupported rootfs type"));
}
}
}
_ => {
return Err(anyhow!("Unsupported rootfs driver"));
}
}
params.push(Param::new("rootfstype", rootfs_type));
Ok(Self { params })
} }
pub(crate) fn append(&mut self, params: &mut KernelParams) { pub(crate) fn append(&mut self, params: &mut KernelParams) {
@ -155,6 +164,12 @@ mod tests {
use super::*; use super::*;
use crate::{
VM_ROOTFS_DRIVER_BLK, VM_ROOTFS_DRIVER_PMEM, VM_ROOTFS_FILESYSTEM_EROFS,
VM_ROOTFS_FILESYSTEM_EXT4, VM_ROOTFS_FILESYSTEM_XFS, VM_ROOTFS_ROOT_BLK,
VM_ROOTFS_ROOT_PMEM,
};
#[test] #[test]
fn test_params() { fn test_params() {
let param1 = Param::new("", ""); let param1 = Param::new("", "");
@ -190,4 +205,142 @@ mod tests {
Ok(()) Ok(())
} }
#[derive(Debug)]
struct TestData<'a> {
rootfs_driver: &'a str,
rootfs_type: &'a str,
expect_params: KernelParams,
result: Result<()>,
}
#[test]
fn test_rootfs_kernel_params() {
let tests = &[
// EXT4
TestData {
rootfs_driver: VM_ROOTFS_DRIVER_PMEM,
rootfs_type: VM_ROOTFS_FILESYSTEM_EXT4,
expect_params: KernelParams {
params: [
Param::new("root", VM_ROOTFS_ROOT_PMEM),
Param::new("rootflags", "dax,data=ordered,errors=remount-ro ro"),
Param::new("rootfstype", VM_ROOTFS_FILESYSTEM_EXT4),
]
.to_vec(),
},
result: Ok(()),
},
TestData {
rootfs_driver: VM_ROOTFS_DRIVER_BLK,
rootfs_type: VM_ROOTFS_FILESYSTEM_EXT4,
expect_params: KernelParams {
params: [
Param::new("root", VM_ROOTFS_ROOT_BLK),
Param::new("rootflags", "data=ordered,errors=remount-ro ro"),
Param::new("rootfstype", VM_ROOTFS_FILESYSTEM_EXT4),
]
.to_vec(),
},
result: Ok(()),
},
// XFS
TestData {
rootfs_driver: VM_ROOTFS_DRIVER_PMEM,
rootfs_type: VM_ROOTFS_FILESYSTEM_XFS,
expect_params: KernelParams {
params: [
Param::new("root", VM_ROOTFS_ROOT_PMEM),
Param::new("rootflags", "dax,data=ordered,errors=remount-ro ro"),
Param::new("rootfstype", VM_ROOTFS_FILESYSTEM_XFS),
]
.to_vec(),
},
result: Ok(()),
},
TestData {
rootfs_driver: VM_ROOTFS_DRIVER_BLK,
rootfs_type: VM_ROOTFS_FILESYSTEM_XFS,
expect_params: KernelParams {
params: [
Param::new("root", VM_ROOTFS_ROOT_BLK),
Param::new("rootflags", "data=ordered,errors=remount-ro ro"),
Param::new("rootfstype", VM_ROOTFS_FILESYSTEM_XFS),
]
.to_vec(),
},
result: Ok(()),
},
// EROFS
TestData {
rootfs_driver: VM_ROOTFS_DRIVER_PMEM,
rootfs_type: VM_ROOTFS_FILESYSTEM_EROFS,
expect_params: KernelParams {
params: [
Param::new("root", VM_ROOTFS_ROOT_PMEM),
Param::new("rootflags", "dax ro"),
Param::new("rootfstype", VM_ROOTFS_FILESYSTEM_EROFS),
]
.to_vec(),
},
result: Ok(()),
},
TestData {
rootfs_driver: VM_ROOTFS_DRIVER_BLK,
rootfs_type: VM_ROOTFS_FILESYSTEM_EROFS,
expect_params: KernelParams {
params: [
Param::new("root", VM_ROOTFS_ROOT_BLK),
Param::new("rootflags", "ro"),
Param::new("rootfstype", VM_ROOTFS_FILESYSTEM_EROFS),
]
.to_vec(),
},
result: Ok(()),
},
// Unsupported rootfs driver
TestData {
rootfs_driver: "foo",
rootfs_type: VM_ROOTFS_FILESYSTEM_EXT4,
expect_params: KernelParams {
params: [
Param::new("root", VM_ROOTFS_ROOT_BLK),
Param::new("rootflags", "data=ordered,errors=remount-ro ro"),
Param::new("rootfstype", VM_ROOTFS_FILESYSTEM_EXT4),
]
.to_vec(),
},
result: Err(anyhow!("Unsupported rootfs driver")),
},
// Unsupported rootfs type
TestData {
rootfs_driver: VM_ROOTFS_DRIVER_BLK,
rootfs_type: "foo",
expect_params: KernelParams {
params: [
Param::new("root", VM_ROOTFS_ROOT_BLK),
Param::new("rootflags", "data=ordered,errors=remount-ro ro"),
Param::new("rootfstype", VM_ROOTFS_FILESYSTEM_EXT4),
]
.to_vec(),
},
result: Err(anyhow!("Unsupported rootfs type")),
},
];
for (i, t) in tests.iter().enumerate() {
let msg = format!("test[{}]: {:?}", i, t);
let result = KernelParams::new_rootfs_kernel_params(t.rootfs_driver, t.rootfs_type);
let msg = format!("{}, result: {:?}", msg, result);
if t.result.is_ok() {
assert!(result.is_ok(), "{}", msg);
assert_eq!(t.expect_params, result.unwrap());
} else {
let expected_error = format!("{}", t.result.as_ref().unwrap_err());
let actual_error = format!("{}", result.unwrap_err());
assert!(actual_error == expected_error, "{}", msg);
}
}
}
} }

View File

@ -27,6 +27,16 @@ use kata_types::config::hypervisor::Hypervisor as HypervisorConfig;
// Config which driver to use as vm root dev // Config which driver to use as vm root dev
const VM_ROOTFS_DRIVER_BLK: &str = "virtio-blk"; const VM_ROOTFS_DRIVER_BLK: &str = "virtio-blk";
const VM_ROOTFS_DRIVER_PMEM: &str = "virtio-pmem"; const VM_ROOTFS_DRIVER_PMEM: &str = "virtio-pmem";
//Configure the root corresponding to the driver
const VM_ROOTFS_ROOT_BLK: &str = "/dev/vda1";
const VM_ROOTFS_ROOT_PMEM: &str = "/dev/pmem0p1";
// Config which filesystem to use as rootfs type
const VM_ROOTFS_FILESYSTEM_EXT4: &str = "ext4";
const VM_ROOTFS_FILESYSTEM_XFS: &str = "xfs";
const VM_ROOTFS_FILESYSTEM_EROFS: &str = "erofs";
// before using hugepages for VM, we need to mount hugetlbfs // before using hugepages for VM, we need to mount hugetlbfs
// /dev/hugepages will be the mount point // /dev/hugepages will be the mount point
// mkdir -p /dev/hugepages // mkdir -p /dev/hugepages

View File

@ -112,6 +112,12 @@ KERNELDIR := $(PKGDATADIR)
IMAGEPATH := $(PKGDATADIR)/$(IMAGENAME) IMAGEPATH := $(PKGDATADIR)/$(IMAGENAME)
INITRDPATH := $(PKGDATADIR)/$(INITRDNAME) INITRDPATH := $(PKGDATADIR)/$(INITRDNAME)
ROOTFSTYPE_EXT4 := \"ext4\"
ROOTFSTYPE_XFS := \"xfs\"
ROOTFSTYPE_EROFS := \"erofs\"
DEFROOTFSTYPE := $(ROOTFSTYPE_EXT4)
FIRMWAREPATH := FIRMWAREPATH :=
FIRMWAREVOLUMEPATH := FIRMWAREVOLUMEPATH :=
@ -412,6 +418,7 @@ USER_VARS += IMAGENAME
USER_VARS += IMAGEPATH USER_VARS += IMAGEPATH
USER_VARS += INITRDNAME USER_VARS += INITRDNAME
USER_VARS += INITRDPATH USER_VARS += INITRDPATH
USER_VARS += DEFROOTFSTYPE
USER_VARS += MACHINETYPE USER_VARS += MACHINETYPE
USER_VARS += KERNELDIR USER_VARS += KERNELDIR
USER_VARS += KERNELTYPE USER_VARS += KERNELTYPE

View File

@ -78,6 +78,7 @@ func makeRuntimeConfig(prefixDir string) (configFile string, config oci.RuntimeC
hypervisorPath := filepath.Join(prefixDir, "hypervisor") hypervisorPath := filepath.Join(prefixDir, "hypervisor")
kernelPath := filepath.Join(prefixDir, "kernel") kernelPath := filepath.Join(prefixDir, "kernel")
imagePath := filepath.Join(prefixDir, "image") imagePath := filepath.Join(prefixDir, "image")
rootfsType := "ext4"
kernelParams := "foo=bar xyz" kernelParams := "foo=bar xyz"
machineType := "machineType" machineType := "machineType"
disableBlock := true disableBlock := true
@ -119,6 +120,7 @@ func makeRuntimeConfig(prefixDir string) (configFile string, config oci.RuntimeC
HypervisorPath: hypervisorPath, HypervisorPath: hypervisorPath,
KernelPath: kernelPath, KernelPath: kernelPath,
ImagePath: imagePath, ImagePath: imagePath,
RootfsType: rootfsType,
KernelParams: kernelParams, KernelParams: kernelParams,
MachineType: machineType, MachineType: machineType,
LogPath: logPath, LogPath: logPath,

View File

@ -17,6 +17,12 @@ ctlpath = "@ACRNCTLPATH@"
kernel = "@KERNELPATH_ACRN@" kernel = "@KERNELPATH_ACRN@"
image = "@IMAGEPATH@" image = "@IMAGEPATH@"
# rootfs filesystem type:
# - ext4 (default)
# - xfs
# - erofs
rootfs_type=@DEFROOTFSTYPE@
# List of valid annotation names for the hypervisor # List of valid annotation names for the hypervisor
# Each member of the list is a regular expression, which is the base name # Each member of the list is a regular expression, which is the base name
# of the annotation, e.g. "path" for io.katacontainers.config.hypervisor.path" # of the annotation, e.g. "path" for io.katacontainers.config.hypervisor.path"

View File

@ -16,6 +16,12 @@ path = "@CLHPATH@"
kernel = "@KERNELPATH_CLH@" kernel = "@KERNELPATH_CLH@"
image = "@IMAGEPATH@" image = "@IMAGEPATH@"
# rootfs filesystem type:
# - ext4 (default)
# - xfs
# - erofs
rootfs_type=@DEFROOTFSTYPE@
# Enable confidential guest support. # Enable confidential guest support.
# Toggling that setting may trigger different hardware features, ranging # Toggling that setting may trigger different hardware features, ranging
# from memory encryption to both memory and CPU-state encryption and integrity. # from memory encryption to both memory and CPU-state encryption and integrity.

View File

@ -16,6 +16,12 @@ path = "@FCPATH@"
kernel = "@KERNELPATH_FC@" kernel = "@KERNELPATH_FC@"
image = "@IMAGEPATH@" image = "@IMAGEPATH@"
# rootfs filesystem type:
# - ext4 (default)
# - xfs
# - erofs
rootfs_type=@DEFROOTFSTYPE@
# List of valid annotation names for the hypervisor # List of valid annotation names for the hypervisor
# Each member of the list is a regular expression, which is the base name # Each member of the list is a regular expression, which is the base name
# of the annotation, e.g. "path" for io.katacontainers.config.hypervisor.path" # of the annotation, e.g. "path" for io.katacontainers.config.hypervisor.path"

View File

@ -18,6 +18,12 @@ image = "@IMAGEPATH@"
# initrd = "@INITRDPATH@" # initrd = "@INITRDPATH@"
machine_type = "@MACHINETYPE@" machine_type = "@MACHINETYPE@"
# rootfs filesystem type:
# - ext4 (default)
# - xfs
# - erofs
rootfs_type=@DEFROOTFSTYPE@
# Enable confidential guest support. # Enable confidential guest support.
# Toggling that setting may trigger different hardware features, ranging # Toggling that setting may trigger different hardware features, ranging
# from memory encryption to both memory and CPU-state encryption and integrity. # from memory encryption to both memory and CPU-state encryption and integrity.

View File

@ -320,6 +320,7 @@ func createAllRuntimeConfigFiles(dir, hypervisor string) (config string, err err
kernelPath := path.Join(dir, "kernel") kernelPath := path.Join(dir, "kernel")
kernelParams := "foo=bar xyz" kernelParams := "foo=bar xyz"
imagePath := path.Join(dir, "image") imagePath := path.Join(dir, "image")
rootfsType := "ext4"
logDir := path.Join(dir, "logs") logDir := path.Join(dir, "logs")
logPath := path.Join(logDir, "runtime.log") logPath := path.Join(logDir, "runtime.log")
machineType := "machineType" machineType := "machineType"
@ -337,6 +338,7 @@ func createAllRuntimeConfigFiles(dir, hypervisor string) (config string, err err
HypervisorPath: hypervisorPath, HypervisorPath: hypervisorPath,
KernelPath: kernelPath, KernelPath: kernelPath,
ImagePath: imagePath, ImagePath: imagePath,
RootfsType: rootfsType,
KernelParams: kernelParams, KernelParams: kernelParams,
MachineType: machineType, MachineType: machineType,
LogPath: logPath, LogPath: logPath,

View File

@ -211,6 +211,7 @@ type RuntimeConfigOptions struct {
DefaultGuestHookPath string DefaultGuestHookPath string
KernelPath string KernelPath string
ImagePath string ImagePath string
RootfsType string
KernelParams string KernelParams string
MachineType string MachineType string
LogPath string LogPath string
@ -307,6 +308,7 @@ func MakeRuntimeConfigFileData(config RuntimeConfigOptions) string {
block_device_aio = "` + config.BlockDeviceAIO + `" block_device_aio = "` + config.BlockDeviceAIO + `"
kernel_params = "` + config.KernelParams + `" kernel_params = "` + config.KernelParams + `"
image = "` + config.ImagePath + `" image = "` + config.ImagePath + `"
rootfs_type = "` + config.RootfsType + `"
machine_type = "` + config.MachineType + `" machine_type = "` + config.MachineType + `"
default_vcpus = ` + strconv.FormatUint(uint64(config.DefaultVCPUCount), 10) + ` default_vcpus = ` + strconv.FormatUint(uint64(config.DefaultVCPUCount), 10) + `
default_maxvcpus = ` + strconv.FormatUint(uint64(config.DefaultMaxVCPUCount), 10) + ` default_maxvcpus = ` + strconv.FormatUint(uint64(config.DefaultMaxVCPUCount), 10) + `

View File

@ -44,6 +44,7 @@ var defaultJailerPath = "/usr/bin/jailer"
var defaultImagePath = "/usr/share/kata-containers/kata-containers.img" var defaultImagePath = "/usr/share/kata-containers/kata-containers.img"
var defaultKernelPath = "/usr/share/kata-containers/vmlinuz.container" var defaultKernelPath = "/usr/share/kata-containers/vmlinuz.container"
var defaultInitrdPath = "/usr/share/kata-containers/kata-containers-initrd.img" var defaultInitrdPath = "/usr/share/kata-containers/kata-containers-initrd.img"
var defaultRootfsType = "ext4"
var defaultFirmwarePath = "" var defaultFirmwarePath = ""
var defaultFirmwareVolumePath = "" var defaultFirmwareVolumePath = ""
var defaultMachineAccelerators = "" var defaultMachineAccelerators = ""

View File

@ -83,6 +83,7 @@ type hypervisor struct {
CtlPath string `toml:"ctlpath"` CtlPath string `toml:"ctlpath"`
Initrd string `toml:"initrd"` Initrd string `toml:"initrd"`
Image string `toml:"image"` Image string `toml:"image"`
RootfsType string `toml:"rootfs_type"`
Firmware string `toml:"firmware"` Firmware string `toml:"firmware"`
FirmwareVolume string `toml:"firmware_volume"` FirmwareVolume string `toml:"firmware_volume"`
MachineAccelerators string `toml:"machine_accelerators"` MachineAccelerators string `toml:"machine_accelerators"`
@ -260,6 +261,16 @@ func (h hypervisor) image() (string, error) {
return ResolvePath(p) return ResolvePath(p)
} }
func (h hypervisor) rootfsType() (string, error) {
p := h.RootfsType
if p == "" {
p = "ext4"
}
return p, nil
}
func (h hypervisor) firmware() (string, error) { func (h hypervisor) firmware() (string, error) {
p := h.Firmware p := h.Firmware
@ -647,6 +658,11 @@ func newFirecrackerHypervisorConfig(h hypervisor) (vc.HypervisorConfig, error) {
return vc.HypervisorConfig{}, err return vc.HypervisorConfig{}, err
} }
rootfsType, err := h.rootfsType()
if err != nil {
return vc.HypervisorConfig{}, err
}
firmware, err := h.firmware() firmware, err := h.firmware()
if err != nil { if err != nil {
return vc.HypervisorConfig{}, err return vc.HypervisorConfig{}, err
@ -670,6 +686,7 @@ func newFirecrackerHypervisorConfig(h hypervisor) (vc.HypervisorConfig, error) {
KernelPath: kernel, KernelPath: kernel,
InitrdPath: initrd, InitrdPath: initrd,
ImagePath: image, ImagePath: image,
RootfsType: rootfsType,
FirmwarePath: firmware, FirmwarePath: firmware,
KernelParams: vc.DeserializeParams(strings.Fields(kernelParams)), KernelParams: vc.DeserializeParams(strings.Fields(kernelParams)),
NumVCPUs: h.defaultVCPUs(), NumVCPUs: h.defaultVCPUs(),
@ -717,6 +734,11 @@ func newQemuHypervisorConfig(h hypervisor) (vc.HypervisorConfig, error) {
return vc.HypervisorConfig{}, err return vc.HypervisorConfig{}, err
} }
rootfsType, err := h.rootfsType()
if err != nil {
return vc.HypervisorConfig{}, err
}
pflashes, err := h.PFlash() pflashes, err := h.PFlash()
if err != nil { if err != nil {
return vc.HypervisorConfig{}, err return vc.HypervisorConfig{}, err
@ -778,6 +800,7 @@ func newQemuHypervisorConfig(h hypervisor) (vc.HypervisorConfig, error) {
KernelPath: kernel, KernelPath: kernel,
InitrdPath: initrd, InitrdPath: initrd,
ImagePath: image, ImagePath: image,
RootfsType: rootfsType,
FirmwarePath: firmware, FirmwarePath: firmware,
FirmwareVolumePath: firmwareVolume, FirmwareVolumePath: firmwareVolume,
PFlash: pflashes, PFlash: pflashes,
@ -868,6 +891,11 @@ func newAcrnHypervisorConfig(h hypervisor) (vc.HypervisorConfig, error) {
errors.New("image must be defined in the configuration file") errors.New("image must be defined in the configuration file")
} }
rootfsType, err := h.rootfsType()
if err != nil {
return vc.HypervisorConfig{}, err
}
firmware, err := h.firmware() firmware, err := h.firmware()
if err != nil { if err != nil {
return vc.HypervisorConfig{}, err return vc.HypervisorConfig{}, err
@ -885,6 +913,7 @@ func newAcrnHypervisorConfig(h hypervisor) (vc.HypervisorConfig, error) {
HypervisorPathList: h.HypervisorPathList, HypervisorPathList: h.HypervisorPathList,
KernelPath: kernel, KernelPath: kernel,
ImagePath: image, ImagePath: image,
RootfsType: rootfsType,
HypervisorCtlPath: hypervisorctl, HypervisorCtlPath: hypervisorctl,
HypervisorCtlPathList: h.CtlPathList, HypervisorCtlPathList: h.CtlPathList,
FirmwarePath: firmware, FirmwarePath: firmware,
@ -935,6 +964,11 @@ func newClhHypervisorConfig(h hypervisor) (vc.HypervisorConfig, error) {
errors.New("image or initrd must be defined in the configuration file") errors.New("image or initrd must be defined in the configuration file")
} }
rootfsType, err := h.rootfsType()
if err != nil {
return vc.HypervisorConfig{}, err
}
firmware, err := h.firmware() firmware, err := h.firmware()
if err != nil { if err != nil {
return vc.HypervisorConfig{}, err return vc.HypervisorConfig{}, err
@ -969,6 +1003,7 @@ func newClhHypervisorConfig(h hypervisor) (vc.HypervisorConfig, error) {
KernelPath: kernel, KernelPath: kernel,
InitrdPath: initrd, InitrdPath: initrd,
ImagePath: image, ImagePath: image,
RootfsType: rootfsType,
FirmwarePath: firmware, FirmwarePath: firmware,
MachineAccelerators: machineAccelerators, MachineAccelerators: machineAccelerators,
KernelParams: vc.DeserializeParams(strings.Fields(kernelParams)), KernelParams: vc.DeserializeParams(strings.Fields(kernelParams)),
@ -1028,15 +1063,23 @@ func newDragonballHypervisorConfig(h hypervisor) (vc.HypervisorConfig, error) {
if err != nil { if err != nil {
return vc.HypervisorConfig{}, err return vc.HypervisorConfig{}, err
} }
image, err := h.image() image, err := h.image()
if err != nil { if err != nil {
return vc.HypervisorConfig{}, err return vc.HypervisorConfig{}, err
} }
rootfsType, err := h.rootfsType()
if err != nil {
return vc.HypervisorConfig{}, err
}
kernelParams := h.kernelParams() kernelParams := h.kernelParams()
return vc.HypervisorConfig{ return vc.HypervisorConfig{
KernelPath: kernel, KernelPath: kernel,
ImagePath: image, ImagePath: image,
RootfsType: rootfsType,
KernelParams: vc.DeserializeParams(strings.Fields(kernelParams)), KernelParams: vc.DeserializeParams(strings.Fields(kernelParams)),
NumVCPUs: h.defaultVCPUs(), NumVCPUs: h.defaultVCPUs(),
DefaultMaxVCPUs: h.defaultMaxVCPUs(), DefaultMaxVCPUs: h.defaultMaxVCPUs(),
@ -1195,6 +1238,7 @@ func GetDefaultHypervisorConfig() vc.HypervisorConfig {
KernelPath: defaultKernelPath, KernelPath: defaultKernelPath,
ImagePath: defaultImagePath, ImagePath: defaultImagePath,
InitrdPath: defaultInitrdPath, InitrdPath: defaultInitrdPath,
RootfsType: defaultRootfsType,
FirmwarePath: defaultFirmwarePath, FirmwarePath: defaultFirmwarePath,
FirmwareVolumePath: defaultFirmwareVolumePath, FirmwareVolumePath: defaultFirmwareVolumePath,
MachineAccelerators: defaultMachineAccelerators, MachineAccelerators: defaultMachineAccelerators,

View File

@ -74,6 +74,7 @@ func createAllRuntimeConfigFiles(dir, hypervisor string) (config testRuntimeConf
kernelPath := path.Join(dir, "kernel") kernelPath := path.Join(dir, "kernel")
kernelParams := "foo=bar xyz" kernelParams := "foo=bar xyz"
imagePath := path.Join(dir, "image") imagePath := path.Join(dir, "image")
rootfsType := "ext4"
logDir := path.Join(dir, "logs") logDir := path.Join(dir, "logs")
logPath := path.Join(logDir, "runtime.log") logPath := path.Join(logDir, "runtime.log")
machineType := "machineType" machineType := "machineType"
@ -94,6 +95,7 @@ func createAllRuntimeConfigFiles(dir, hypervisor string) (config testRuntimeConf
HypervisorPath: hypervisorPath, HypervisorPath: hypervisorPath,
KernelPath: kernelPath, KernelPath: kernelPath,
ImagePath: imagePath, ImagePath: imagePath,
RootfsType: rootfsType,
KernelParams: kernelParams, KernelParams: kernelParams,
MachineType: machineType, MachineType: machineType,
LogPath: logPath, LogPath: logPath,
@ -153,6 +155,7 @@ func createAllRuntimeConfigFiles(dir, hypervisor string) (config testRuntimeConf
HypervisorPath: hypervisorPath, HypervisorPath: hypervisorPath,
KernelPath: kernelPath, KernelPath: kernelPath,
ImagePath: imagePath, ImagePath: imagePath,
RootfsType: rootfsType,
KernelParams: vc.DeserializeParams(strings.Fields(kernelParams)), KernelParams: vc.DeserializeParams(strings.Fields(kernelParams)),
HypervisorMachineType: machineType, HypervisorMachineType: machineType,
NumVCPUs: defaultVCPUCount, NumVCPUs: defaultVCPUCount,
@ -542,6 +545,7 @@ func TestMinimalRuntimeConfig(t *testing.T) {
KernelPath: defaultKernelPath, KernelPath: defaultKernelPath,
ImagePath: defaultImagePath, ImagePath: defaultImagePath,
InitrdPath: defaultInitrdPath, InitrdPath: defaultInitrdPath,
RootfsType: defaultRootfsType,
HypervisorMachineType: defaultMachineType, HypervisorMachineType: defaultMachineType,
NumVCPUs: defaultVCPUCount, NumVCPUs: defaultVCPUCount,
DefaultMaxVCPUs: defaultMaxVCPUCount, DefaultMaxVCPUs: defaultMaxVCPUCount,

View File

@ -255,7 +255,11 @@ func (a *Acrn) setup(ctx context.Context, id string, hypervisorConfig *Hyperviso
} }
a.id = id a.id = id
a.arch = newAcrnArch(a.config) var err error
a.arch, err = newAcrnArch(a.config)
if err != nil {
return err
}
return nil return nil
} }

View File

@ -64,7 +64,7 @@ type acrnArch interface {
appendBlockDevice(devices []Device, drive config.BlockDrive) []Device appendBlockDevice(devices []Device, drive config.BlockDrive) []Device
// handleImagePath handles the Hypervisor Config image path // handleImagePath handles the Hypervisor Config image path
handleImagePath(config HypervisorConfig) handleImagePath(config HypervisorConfig) error
} }
type acrnArchBase struct { type acrnArchBase struct {
@ -314,7 +314,7 @@ func MaxAcrnVCPUs() uint32 {
return uint32(8) return uint32(8)
} }
func newAcrnArch(config HypervisorConfig) acrnArch { func newAcrnArch(config HypervisorConfig) (acrnArch, error) {
a := &acrnArchBase{ a := &acrnArchBase{
path: acrnPath, path: acrnPath,
ctlpath: acrnctlPath, ctlpath: acrnctlPath,
@ -323,8 +323,11 @@ func newAcrnArch(config HypervisorConfig) acrnArch {
kernelParams: acrnKernelParams, kernelParams: acrnKernelParams,
} }
a.handleImagePath(config) if err := a.handleImagePath(config); err != nil {
return a return nil, err
}
return a, nil
} }
func (a *acrnArchBase) acrnPath() (string, error) { func (a *acrnArchBase) acrnPath() (string, error) {
@ -788,10 +791,11 @@ func (a *acrnArchBase) appendBlockDevice(devices []Device, drive config.BlockDri
return devices return devices
} }
func (a *acrnArchBase) handleImagePath(config HypervisorConfig) { func (a *acrnArchBase) handleImagePath(config HypervisorConfig) error {
if config.ImagePath != "" { if config.ImagePath != "" {
a.kernelParams = append(a.kernelParams, acrnKernelRootParams...) a.kernelParams = append(a.kernelParams, acrnKernelRootParams...)
a.kernelParamsNonDebug = append(a.kernelParamsNonDebug, acrnKernelParamsSystemdNonDebug...) a.kernelParamsNonDebug = append(a.kernelParamsNonDebug, acrnKernelParamsSystemdNonDebug...)
a.kernelParamsDebug = append(a.kernelParamsDebug, acrnKernelParamsSystemdDebug...) a.kernelParamsDebug = append(a.kernelParamsDebug, acrnKernelParamsSystemdDebug...)
} }
return nil
} }

View File

@ -503,10 +503,9 @@ func (clh *cloudHypervisor) CreateVM(ctx context.Context, id string, network Net
// Set initial amount of cpu's for the virtual machine // Set initial amount of cpu's for the virtual machine
clh.vmconfig.Cpus = chclient.NewCpusConfig(int32(clh.config.NumVCPUs), int32(clh.config.DefaultMaxVCPUs)) clh.vmconfig.Cpus = chclient.NewCpusConfig(int32(clh.config.NumVCPUs), int32(clh.config.DefaultMaxVCPUs))
// First take the default parameters defined by this driver params, err := GetKernelRootParams(hypervisorConfig.RootfsType, clh.config.ConfidentialGuest, false)
params := commonNvdimmKernelRootParams if err != nil {
if clh.config.ConfidentialGuest { return err
params = commonVirtioblkKernelRootParams
} }
params = append(params, clhKernelParams...) params = append(params, clhKernelParams...)

View File

@ -53,6 +53,7 @@ func newClhConfig() (HypervisorConfig, error) {
return HypervisorConfig{ return HypervisorConfig{
KernelPath: testClhKernelPath, KernelPath: testClhKernelPath,
ImagePath: testClhImagePath, ImagePath: testClhImagePath,
RootfsType: string(EXT4),
HypervisorPath: testClhPath, HypervisorPath: testClhPath,
NumVCPUs: defaultVCPUs, NumVCPUs: defaultVCPUs,
BlockDeviceDriver: config.VirtioBlock, BlockDeviceDriver: config.VirtioBlock,

View File

@ -89,7 +89,7 @@ const (
// Specify the minimum version of firecracker supported // Specify the minimum version of firecracker supported
var fcMinSupportedVersion = semver.MustParse("0.21.1") var fcMinSupportedVersion = semver.MustParse("0.21.1")
var fcKernelParams = append(commonVirtioblkKernelRootParams, []Param{ var fcKernelParams = []Param{
// The boot source is the first partition of the first block device added // The boot source is the first partition of the first block device added
{"pci", "off"}, {"pci", "off"},
{"reboot", "k"}, {"reboot", "k"},
@ -101,7 +101,7 @@ var fcKernelParams = append(commonVirtioblkKernelRootParams, []Param{
// Firecracker doesn't support ACPI // Firecracker doesn't support ACPI
// Fix kernel error "ACPI BIOS Error (bug)" // Fix kernel error "ACPI BIOS Error (bug)"
{"acpi", "off"}, {"acpi", "off"},
}...) }
func (s vmmState) String() string { func (s vmmState) String() string {
switch s { switch s {
@ -700,6 +700,11 @@ func (fc *firecracker) fcInitConfiguration(ctx context.Context) error {
return err return err
} }
params, err := GetKernelRootParams(fc.config.RootfsType, true, false)
if err != nil {
return err
}
fcKernelParams = append(params, fcKernelParams...)
if fc.config.Debug { if fc.config.Debug {
fcKernelParams = append(fcKernelParams, Param{"console", "ttyS0"}) fcKernelParams = append(fcKernelParams, Param{"console", "ttyS0"})
} else { } else {

View File

@ -91,25 +91,74 @@ var (
// cores. // cores.
var defaultMaxVCPUs = govmm.MaxVCPUs() var defaultMaxVCPUs = govmm.MaxVCPUs()
// agnostic list of kernel root parameters for NVDIMM // RootfsDriver describes a rootfs driver.
var commonNvdimmKernelRootParams = []Param{ //nolint: unused, deadcode, varcheck type RootfsDriver string
{"root", "/dev/pmem0p1"},
{"rootflags", "dax,data=ordered,errors=remount-ro ro"},
{"rootfstype", "ext4"},
}
// agnostic list of kernel root parameters for NVDIMM const (
var commonNvdimmNoDAXKernelRootParams = []Param{ //nolint: unused, deadcode, varcheck // VirtioBlk is the Virtio-Blk rootfs driver.
{"root", "/dev/pmem0p1"}, VirtioBlk RootfsDriver = "/dev/vda1"
{"rootflags", "data=ordered,errors=remount-ro ro"},
{"rootfstype", "ext4"},
}
// agnostic list of kernel root parameters for virtio-blk // Nvdimm is the Nvdimm rootfs driver.
var commonVirtioblkKernelRootParams = []Param{ //nolint: unused, deadcode, varcheck Nvdimm RootfsType = "/dev/pmem0p1"
{"root", "/dev/vda1"}, )
{"rootflags", "data=ordered,errors=remount-ro ro"},
{"rootfstype", "ext4"}, // RootfsType describes a rootfs type.
type RootfsType string
const (
// EXT4 is the ext4 filesystem.
EXT4 RootfsType = "ext4"
// XFS is the xfs filesystem.
XFS RootfsType = "xfs"
// EROFS is the erofs filesystem.
EROFS RootfsType = "erofs"
)
func GetKernelRootParams(rootfstype string, disableNvdimm bool, dax bool) ([]Param, error) {
var kernelRootParams []Param
// EXT4 filesystem is used by default.
if rootfstype == "" {
rootfstype = string(EXT4)
}
if disableNvdimm && dax {
return []Param{}, fmt.Errorf("Virtio-Blk does not support DAX")
}
if disableNvdimm {
// Virtio-Blk
kernelRootParams = append(kernelRootParams, Param{"root", string(VirtioBlk)})
} else {
// Nvdimm
kernelRootParams = append(kernelRootParams, Param{"root", string(Nvdimm)})
}
switch RootfsType(rootfstype) {
case EROFS:
if dax {
kernelRootParams = append(kernelRootParams, Param{"rootflags", "dax ro"})
} else {
kernelRootParams = append(kernelRootParams, Param{"rootflags", "ro"})
}
case XFS:
fallthrough
// EXT4 filesystem is used by default.
case EXT4:
if dax {
kernelRootParams = append(kernelRootParams, Param{"rootflags", "dax,data=ordered,errors=remount-ro ro"})
} else {
kernelRootParams = append(kernelRootParams, Param{"rootflags", "data=ordered,errors=remount-ro ro"})
}
default:
return []Param{}, fmt.Errorf("unsupported rootfs type")
}
kernelRootParams = append(kernelRootParams, Param{"rootfstype", rootfstype})
return kernelRootParams, nil
} }
// DeviceType describes a virtualized device type. // DeviceType describes a virtualized device type.
@ -273,6 +322,9 @@ type HypervisorConfig struct {
// ImagePath and InitrdPath cannot be set at the same time. // ImagePath and InitrdPath cannot be set at the same time.
InitrdPath string InitrdPath string
// RootfsType is filesystem type of rootfs.
RootfsType string
// FirmwarePath is the bios host path // FirmwarePath is the bios host path
FirmwarePath string FirmwarePath string

View File

@ -7,13 +7,167 @@ package virtcontainers
import ( import (
"fmt" "fmt"
"os"
"testing"
"github.com/kata-containers/kata-containers/src/runtime/virtcontainers/types" "github.com/kata-containers/kata-containers/src/runtime/virtcontainers/types"
"github.com/stretchr/testify/assert" "github.com/stretchr/testify/assert"
"os"
"testing"
) )
func TestGetKernelRootParams(t *testing.T) {
assert := assert.New(t)
tests := []struct {
rootfstype string
expected []Param
disableNvdimm bool
dax bool
error bool
}{
// EXT4
{
rootfstype: string(EXT4),
expected: []Param{
{"root", string(Nvdimm)},
{"rootflags", "data=ordered,errors=remount-ro ro"},
{"rootfstype", string(EXT4)},
},
disableNvdimm: false,
dax: false,
error: false,
},
{
rootfstype: string(EXT4),
expected: []Param{
{"root", string(Nvdimm)},
{"rootflags", "dax,data=ordered,errors=remount-ro ro"},
{"rootfstype", string(EXT4)},
},
disableNvdimm: false,
dax: true,
error: false,
},
{
rootfstype: string(EXT4),
expected: []Param{
{"root", string(VirtioBlk)},
{"rootflags", "data=ordered,errors=remount-ro ro"},
{"rootfstype", string(EXT4)},
},
disableNvdimm: true,
dax: false,
error: false,
},
// XFS
{
rootfstype: string(XFS),
expected: []Param{
{"root", string(Nvdimm)},
{"rootflags", "data=ordered,errors=remount-ro ro"},
{"rootfstype", string(XFS)},
},
disableNvdimm: false,
dax: false,
error: false,
},
{
rootfstype: string(XFS),
expected: []Param{
{"root", string(Nvdimm)},
{"rootflags", "dax,data=ordered,errors=remount-ro ro"},
{"rootfstype", string(XFS)},
},
disableNvdimm: false,
dax: true,
error: false,
},
{
rootfstype: string(XFS),
expected: []Param{
{"root", string(VirtioBlk)},
{"rootflags", "data=ordered,errors=remount-ro ro"},
{"rootfstype", string(XFS)},
},
disableNvdimm: true,
dax: false,
error: false,
},
// EROFS
{
rootfstype: string(EROFS),
expected: []Param{
{"root", string(Nvdimm)},
{"rootflags", "ro"},
{"rootfstype", string(EROFS)},
},
disableNvdimm: false,
dax: false,
error: false,
},
{
rootfstype: string(EROFS),
expected: []Param{
{"root", string(Nvdimm)},
{"rootflags", "dax ro"},
{"rootfstype", string(EROFS)},
},
disableNvdimm: false,
dax: true,
error: false,
},
{
rootfstype: string(EROFS),
expected: []Param{
{"root", string(VirtioBlk)},
{"rootflags", "ro"},
{"rootfstype", string(EROFS)},
},
disableNvdimm: true,
dax: false,
error: false,
},
// Unsupported rootfs type
{
rootfstype: "foo",
expected: []Param{
{"root", string(VirtioBlk)},
{"rootflags", "data=ordered,errors=remount-ro ro"},
{"rootfstype", string(EXT4)},
},
disableNvdimm: false,
dax: false,
error: true,
},
// Nvdimm does not support DAX
{
rootfstype: string(EXT4),
expected: []Param{
{"root", string(VirtioBlk)},
{"rootflags", "dax,data=ordered,errors=remount-ro ro"},
{"rootfstype", string(EXT4)},
},
disableNvdimm: true,
dax: true,
error: true,
},
}
for _, t := range tests {
kernelRootParams, err := GetKernelRootParams(t.rootfstype, t.disableNvdimm, t.dax)
if t.error {
assert.Error(err)
continue
} else {
assert.NoError(err)
}
assert.Equal(t.expected, kernelRootParams,
"Invalid parameters rootfstype: %v, disableNvdimm: %v, dax: %v, "+
"unable to get kernel root params", t.rootfstype, t.disableNvdimm, t.dax)
}
}
func testSetHypervisorType(t *testing.T, value string, expected HypervisorType) { func testSetHypervisorType(t *testing.T, value string, expected HypervisorType) {
var hypervisorType HypervisorType var hypervisorType HypervisorType
assert := assert.New(t) assert := assert.New(t)

View File

@ -148,7 +148,9 @@ func newQemuArch(config HypervisorConfig) (qemuArch, error) {
q.qemuMachine.Options += "sgx-epc.0.memdev=epc0,sgx-epc.0.node=0" q.qemuMachine.Options += "sgx-epc.0.memdev=epc0,sgx-epc.0.node=0"
} }
q.handleImagePath(config) if err := q.handleImagePath(config); err != nil {
return nil, err
}
return q, nil return q, nil
} }

View File

@ -129,7 +129,7 @@ type qemuArch interface {
setPFlash([]string) setPFlash([]string)
// handleImagePath handles the Hypervisor Config image path // handleImagePath handles the Hypervisor Config image path
handleImagePath(config HypervisorConfig) handleImagePath(config HypervisorConfig) error
// supportGuestMemoryHotplug returns if the guest supports memory hotplug // supportGuestMemoryHotplug returns if the guest supports memory hotplug
supportGuestMemoryHotplug() bool supportGuestMemoryHotplug() bool
@ -702,23 +702,27 @@ func (q *qemuArchBase) appendRNGDevice(_ context.Context, devices []govmmQemu.De
return devices, nil return devices, nil
} }
func (q *qemuArchBase) handleImagePath(config HypervisorConfig) { func (q *qemuArchBase) handleImagePath(config HypervisorConfig) error {
if config.ImagePath != "" { if config.ImagePath != "" {
kernelRootParams := commonVirtioblkKernelRootParams kernelRootParams, err := GetKernelRootParams(config.RootfsType, q.disableNvdimm, false)
if err != nil {
return err
}
if !q.disableNvdimm { if !q.disableNvdimm {
q.qemuMachine.Options = strings.Join([]string{ q.qemuMachine.Options = strings.Join([]string{
q.qemuMachine.Options, qemuNvdimmOption, q.qemuMachine.Options, qemuNvdimmOption,
}, ",") }, ",")
if q.dax { kernelRootParams, err = GetKernelRootParams(config.RootfsType, q.disableNvdimm, q.dax)
kernelRootParams = commonNvdimmKernelRootParams if err != nil {
} else { return err
kernelRootParams = commonNvdimmNoDAXKernelRootParams
} }
} }
q.kernelParams = append(q.kernelParams, kernelRootParams...) q.kernelParams = append(q.kernelParams, kernelRootParams...)
q.kernelParamsNonDebug = append(q.kernelParamsNonDebug, kernelParamsSystemdNonDebug...) q.kernelParamsNonDebug = append(q.kernelParamsNonDebug, kernelParamsSystemdNonDebug...)
q.kernelParamsDebug = append(q.kernelParamsDebug, kernelParamsSystemdDebug...) q.kernelParamsDebug = append(q.kernelParamsDebug, kernelParamsSystemdDebug...)
} }
return nil
} }
func (q *qemuArchBase) supportGuestMemoryHotplug() bool { func (q *qemuArchBase) supportGuestMemoryHotplug() bool {

View File

@ -65,7 +65,9 @@ func newQemuArch(config HypervisorConfig) (qemuArch, error) {
}, },
} }
q.handleImagePath(config) if err := q.handleImagePath(config); err != nil {
return nil, err
}
return q, nil return q, nil
} }

View File

@ -88,7 +88,9 @@ func newQemuArch(config HypervisorConfig) (qemuArch, error) {
} }
} }
q.handleImagePath(config) if err := q.handleImagePath(config); err != nil {
return nil, err
}
q.memoryOffset = config.MemOffset q.memoryOffset = config.MemOffset

View File

@ -83,7 +83,11 @@ func newQemuArch(config HypervisorConfig) (qemuArch, error) {
} }
if config.ImagePath != "" { if config.ImagePath != "" {
q.kernelParams = append(q.kernelParams, commonVirtioblkKernelRootParams...) kernelParams, err := GetKernelRootParams(config.RootfsType, true, false)
if err != nil {
return nil, err
}
q.kernelParams = append(q.kernelParams, kernelParams...)
q.kernelParamsNonDebug = append(q.kernelParamsNonDebug, kernelParamsSystemdNonDebug...) q.kernelParamsNonDebug = append(q.kernelParamsNonDebug, kernelParamsSystemdNonDebug...)
q.kernelParamsDebug = append(q.kernelParamsDebug, kernelParamsSystemdDebug...) q.kernelParamsDebug = append(q.kernelParamsDebug, kernelParamsSystemdDebug...)
} }

View File

@ -18,6 +18,7 @@ readonly lib_file="${script_dir}/../scripts/lib.sh"
readonly ext4_format="ext4" readonly ext4_format="ext4"
readonly xfs_format="xfs" readonly xfs_format="xfs"
readonly erofs_format="erofs"
# ext4: percentage of the filesystem which may only be allocated by privileged processes. # ext4: percentage of the filesystem which may only be allocated by privileged processes.
readonly reserved_blocks_percentage=3 readonly reserved_blocks_percentage=3
@ -83,7 +84,7 @@ Options:
-h Show this help -h Show this help
-o Path to generate image file. ENV: IMAGE -o Path to generate image file. ENV: IMAGE
-r Free space of the root partition in MB. ENV: ROOT_FREE_SPACE -r Free space of the root partition in MB. ENV: ROOT_FREE_SPACE
-f Filesystem type to use, only xfs and ext4 are supported. ENV: FS_TYPE -f Filesystem type to use, only ext4, xfs and erofs are supported. ENV: FS_TYPE
Extra environment variables: Extra environment variables:
AGENT_BIN: Use it to change the expected agent binary name AGENT_BIN: Use it to change the expected agent binary name
@ -100,7 +101,6 @@ Extra environment variables:
and the rootfs is built with SELINUX=yes. and the rootfs is built with SELINUX=yes.
DEFAULT value: "no" DEFAULT value: "no"
Following diagram shows how the resulting image will look like Following diagram shows how the resulting image will look like
.-----------.----------.---------------.-----------. .-----------.----------.---------------.-----------.
@ -351,12 +351,14 @@ format_loop() {
local device="$1" local device="$1"
local block_size="$2" local block_size="$2"
local fs_type="$3" local fs_type="$3"
local mount_dir="$4"
case "${fs_type}" in case "${fs_type}" in
"${ext4_format}") "${ext4_format}")
mkfs.ext4 -q -F -b "${block_size}" "${device}p1" mkfs.ext4 -q -F -b "${block_size}" "${device}p1"
info "Set filesystem reserved blocks percentage to ${reserved_blocks_percentage}%" info "Set filesystem reserved blocks percentage to ${reserved_blocks_percentage}%"
tune2fs -m "${reserved_blocks_percentage}" "${device}p1" tune2fs -m "${reserved_blocks_percentage}" "${device}p1"
return 0
;; ;;
"${xfs_format}") "${xfs_format}")
@ -366,7 +368,8 @@ format_loop() {
if mkfs.xfs -m reflink=0 -q -f -b size="${block_size}" "${device}p1" 2>&1 | grep -q "unknown option"; then if mkfs.xfs -m reflink=0 -q -f -b size="${block_size}" "${device}p1" 2>&1 | grep -q "unknown option"; then
mkfs.xfs -q -f -b size="${block_size}" "${device}p1" mkfs.xfs -q -f -b size="${block_size}" "${device}p1"
fi fi
;; return 0
;;
*) *)
error "Unsupported fs type: ${fs_type}" error "Unsupported fs type: ${fs_type}"
@ -395,6 +398,55 @@ create_disk() {
OK "Partitions created" OK "Partitions created"
} }
setup_selinux() {
local mount_dir="$1"
local agent_bin="$2"
if [ "${SELINUX}" == "yes" ]; then
if [ "${AGENT_INIT}" == "yes" ]; then
die "Guest SELinux with the agent init is not supported yet"
fi
info "Labeling rootfs for SELinux"
selinuxfs_path="${mount_dir}${SELINUXFS}"
mkdir -p "$selinuxfs_path"
if mountpoint $SELINUXFS > /dev/null && \
chroot "${mount_dir}" command -v restorecon > /dev/null; then
mount -t selinuxfs selinuxfs "$selinuxfs_path"
chroot "${mount_dir}" restorecon -RF -e ${SELINUXFS} /
# TODO: This operation will be removed after the updated container-selinux that
# includes the following commit is released.
# https://github.com/containers/container-selinux/commit/39f83cc74d50bd10ab6be4d0bdd98bc04857469f
# We use chcon as an interim solution until then.
chroot "${mount_dir}" chcon -t container_runtime_exec_t "/usr/bin/${agent_bin}"
umount "${selinuxfs_path}"
else
die "Could not label the rootfs. Make sure that SELinux is enabled on the host \
and the rootfs is built with SELINUX=yes"
fi
fi
}
setup_systemd() {
local mount_dir="$1"
info "Removing unneeded systemd services and sockets"
for u in "${systemd_units[@]}"; do
find "${mount_dir}" -type f \( \
-name "${u}.service" -o \
-name "${u}.socket" \) \
-exec rm -f {} \;
done
info "Removing unneeded systemd files"
for u in "${systemd_files[@]}"; do
find "${mount_dir}" -type f -name "${u}" -exec rm -f {} \;
done
info "Creating empty machine-id to allow systemd to bind-mount it"
touch "${mount_dir}/etc/machine-id"
}
create_rootfs_image() { create_rootfs_image() {
local rootfs="$1" local rootfs="$1"
local image="$2" local image="$2"
@ -409,60 +461,26 @@ create_rootfs_image() {
die "Could not setup loop device" die "Could not setup loop device"
fi fi
if ! format_loop "${device}" "${block_size}" "${fs_type}"; then if ! format_loop "${device}" "${block_size}" "${fs_type}" ""; then
die "Could not format loop device: ${device}" die "Could not format loop device: ${device}"
fi fi
info "Mounting root partition" info "Mounting root partition"
readonly mount_dir=$(mktemp -p ${TMPDIR:-/tmp} -d osbuilder-mount-dir.XXXX) local mount_dir=$(mktemp -p "${TMPDIR:-/tmp}" -d osbuilder-mount-dir.XXXX)
mount "${device}p1" "${mount_dir}" mount "${device}p1" "${mount_dir}"
OK "root partition mounted" OK "root partition mounted"
info "Copying content from rootfs to root partition" info "Copying content from rootfs to root partition"
cp -a "${rootfs}"/* "${mount_dir}" cp -a "${rootfs}"/* "${mount_dir}"
if [ "${SELINUX}" == "yes" ]; then info "Setup SELinux"
if [ "${AGENT_INIT}" == "yes" ]; then setup_selinux "${mount_dir}" "${agent_bin}"
die "Guest SELinux with the agent init is not supported yet"
fi
info "Labeling rootfs for SELinux"
selinuxfs_path="${mount_dir}${SELINUXFS}"
mkdir -p $selinuxfs_path
if mountpoint $SELINUXFS > /dev/null && \
chroot "${mount_dir}" command -v restorecon > /dev/null; then
mount -t selinuxfs selinuxfs $selinuxfs_path
chroot "${mount_dir}" restorecon -RF -e ${SELINUXFS} /
# TODO: This operation will be removed after the updated container-selinux that
# includes the following commit is released.
# https://github.com/containers/container-selinux/commit/39f83cc74d50bd10ab6be4d0bdd98bc04857469f
# We use chcon as an interim solution until then.
chroot "${mount_dir}" chcon -t container_runtime_exec_t "/usr/bin/${agent_bin}"
umount $selinuxfs_path
else
die "Could not label the rootfs. Make sure that SELinux is enabled on the host \
and the rootfs is built with SELINUX=yes"
fi
fi
sync sync
OK "rootfs copied" OK "rootfs copied"
info "Removing unneeded systemd services and sockets" info "Setup systemd"
for u in "${systemd_units[@]}"; do setup_systemd "${mount_dir}"
find "${mount_dir}" -type f \( \
-name "${u}.service" -o \
-name "${u}.socket" \) \
-exec rm -f {} \;
done
info "Removing unneeded systemd files"
for u in "${systemd_files[@]}"; do
find "${mount_dir}" -type f -name "${u}" -exec rm -f {} \;
done
info "Creating empty machine-id to allow systemd to bind-mount it"
touch "${mount_dir}/etc/machine-id"
info "Unmounting root partition" info "Unmounting root partition"
umount "${mount_dir}" umount "${mount_dir}"
@ -473,7 +491,50 @@ and the rootfs is built with SELINUX=yes"
fi fi
losetup -d "${device}" losetup -d "${device}"
rmdir "${mount_dir}" rm -rf "${mount_dir}"
}
create_erofs_rootfs_image() {
local rootfs="$1"
local image="$2"
local block_size="$3"
local agent_bin="$4"
if [ "$block_size" -ne 4096 ]; then
die "Invalid block size for erofs"
fi
if ! device="$(setup_loop_device "${image}")"; then
die "Could not setup loop device"
fi
local mount_dir=$(mktemp -p "${TMPDIR:-/tmp}" -d osbuilder-mount-dir.XXXX)
info "Copying content from rootfs to root partition"
cp -a "${rootfs}"/* "${mount_dir}"
info "Setup SELinux"
setup_selinux "${mount_dir}" "${agent_bin}"
sync
OK "rootfs copied"
info "Setup systemd"
setup_systemd "${mount_dir}"
readonly fsimage="$(mktemp)"
mkfs.erofs -Enoinline_data "${fsimage}" "${mount_dir}"
local img_size="$(stat -c"%s" "${fsimage}")"
local img_size_mb="$(((("${img_size}" + 1048576) / 1048576) + 1 + "${rootfs_start}"))"
create_disk "${image}" "${img_size_mb}" "ext4" "${rootfs_start}"
dd if="${fsimage}" of="${device}p1"
losetup -d "${device}"
rm -rf "${mount_dir}"
return "${img_size_mb}"
} }
set_dax_header() { set_dax_header() {
@ -566,14 +627,23 @@ main() {
die "Invalid rootfs" die "Invalid rootfs"
fi fi
img_size=$(calculate_img_size "${rootfs}" "${root_free_space}" "${fs_type}" "${block_size}") if [ "${fs_type}" == 'erofs' ]; then
# mkfs.erofs accepts an src root dir directory as an input
# rather than some device, so no need to guess the device dest size first.
create_erofs_rootfs_image "${rootfs}" "${image}" \
"${block_size}" "${agent_bin}"
rootfs_img_size=$?
img_size=$((rootfs_img_size + dax_header_sz))
else
img_size=$(calculate_img_size "${rootfs}" "${root_free_space}" \
"${fs_type}" "${block_size}")
# the first 2M are for the first MBR + NVDIMM metadata and were already # the first 2M are for the first MBR + NVDIMM metadata and were already
# consider in calculate_img_size # consider in calculate_img_size
rootfs_img_size=$((img_size - dax_header_sz)) rootfs_img_size=$((img_size - dax_header_sz))
create_rootfs_image "${rootfs}" "${image}" "${rootfs_img_size}" \ create_rootfs_image "${rootfs}" "${image}" "${rootfs_img_size}" \
"${fs_type}" "${block_size}" "${agent_bin}" "${fs_type}" "${block_size}" "${agent_bin}"
fi
# insert at the beginning of the image the MBR + DAX header # insert at the beginning of the image the MBR + DAX header
set_dax_header "${image}" "${img_size}" "${fs_type}" "${nsdax_bin}" set_dax_header "${image}" "${img_size}" "${fs_type}" "${nsdax_bin}"
} }

View File

@ -36,6 +36,11 @@ CONFIG_AUTOFS_FS=y
CONFIG_TMPFS=y CONFIG_TMPFS=y
CONFIG_DEVTMPFS=y CONFIG_DEVTMPFS=y
CONFIG_DEVTMPFS_MOUNT=y CONFIG_DEVTMPFS_MOUNT=y
CONFIG_MISC_FILESYSTEMS=y
CONFIG_EROFS_FS=y
CONFIG_EROFS_FS_XATTR=y
CONFIG_EROFS_FS_ZIP=y
CONFIG_EROFS_FS_SECURITY=y
CONFIG_SIGNALFD=y CONFIG_SIGNALFD=y
CONFIG_TIMERFD=y CONFIG_TIMERFD=y
CONFIG_EPOLL=y CONFIG_EPOLL=y

View File

@ -1 +1 @@
99 100