[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [PATCH v6 10/12] hostmem: add a new memory backend based on POSIX sh
From: |
Markus Armbruster |
Subject: |
Re: [PATCH v6 10/12] hostmem: add a new memory backend based on POSIX shm_open() |
Date: |
Wed, 29 May 2024 16:50:20 +0200 |
User-agent: |
Gnus/5.13 (Gnus v5.13) |
Stefano Garzarella <sgarzare@redhat.com> writes:
> shm_open() creates and opens a new POSIX shared memory object.
> A POSIX shared memory object allows creating memory backend with an
> associated file descriptor that can be shared with external processes
> (e.g. vhost-user).
>
> The new `memory-backend-shm` can be used as an alternative when
> `memory-backend-memfd` is not available (Linux only), since shm_open()
> should be provided by any POSIX-compliant operating system.
>
> This backend mimics memfd, allocating memory that is practically
> anonymous. In theory shm_open() requires a name, but this is allocated
> for a short time interval and shm_unlink() is called right after
> shm_open(). After that, only fd is shared with external processes
> (e.g., vhost-user) as if it were associated with anonymous memory.
>
> In the future we may also allow the user to specify the name to be
> passed to shm_open(), but for now we keep the backend simple, mimicking
> anonymous memory such as memfd.
>
> Acked-by: David Hildenbrand <david@redhat.com>
> Acked-by: Stefan Hajnoczi <stefanha@redhat.com>
> Signed-off-by: Stefano Garzarella <sgarzare@redhat.com>
> ---
> v5
> - fixed documentation in qapi/qom.json and qemu-options.hx [Markus]
> v4
> - fail if we find "share=off" in shm_backend_memory_alloc() [David]
> v3
> - enriched commit message and documentation to highlight that we
> want to mimic memfd (David)
> ---
> docs/system/devices/vhost-user.rst | 5 +-
> qapi/qom.json | 19 +++++
> backends/hostmem-shm.c | 123 +++++++++++++++++++++++++++++
> backends/meson.build | 1 +
> qemu-options.hx | 16 ++++
> 5 files changed, 162 insertions(+), 2 deletions(-)
> create mode 100644 backends/hostmem-shm.c
>
> diff --git a/docs/system/devices/vhost-user.rst
> b/docs/system/devices/vhost-user.rst
> index 9b2da106ce..35259d8ec7 100644
> --- a/docs/system/devices/vhost-user.rst
> +++ b/docs/system/devices/vhost-user.rst
> @@ -98,8 +98,9 @@ Shared memory object
>
> In order for the daemon to access the VirtIO queues to process the
> requests it needs access to the guest's address space. This is
> -achieved via the ``memory-backend-file`` or ``memory-backend-memfd``
> -objects. A reference to a file-descriptor which can access this object
> +achieved via the ``memory-backend-file``, ``memory-backend-memfd``, or
> +``memory-backend-shm`` objects.
> +A reference to a file-descriptor which can access this object
> will be passed via the socket as part of the protocol negotiation.
>
> Currently the shared memory object needs to match the size of the main
> diff --git a/qapi/qom.json b/qapi/qom.json
> index 38dde6d785..d40592d863 100644
> --- a/qapi/qom.json
> +++ b/qapi/qom.json
> @@ -721,6 +721,21 @@
> '*hugetlbsize': 'size',
> '*seal': 'bool' } }
>
> +##
> +# @MemoryBackendShmProperties:
> +#
> +# Properties for memory-backend-shm objects.
> +#
> +# The @share boolean option is true by default with shm. Setting it to false
> +# will cause a failure during allocation because it is not supported by this
> +# backend.
docs/devel/qapi-code-gen.rst:
For legibility, wrap text paragraphs so every line is at most 70
characters long.
Separate sentences with two spaces.
Result:
# Properties for memory-backend-shm objects.
#
# The @share boolean option is true by default with shm. Setting it
# to false will cause a failure during allocation because it is not
# supported by this backend.
However, this contradicts the doc comment for @share:
# @share: if false, the memory is private to QEMU; if true, it is
# shared (default: false)
Your intention is to override that text. But that's less than clear.
Moreover, the documentation of @share is pretty far from this override.
John Snow is working on patches that'll pull it closer.
Hmm, MemoryBackendMemfdProperties has the same override.
I think we should change the doc comment for @share to something like
# @share: if false, the memory is private to QEMU; if true, it is
# shared (default depends on the backend type)
and then document the actual default with each backend type.
> +#
> +# Since: 9.1
> +##
> +{ 'struct': 'MemoryBackendShmProperties',
> + 'base': 'MemoryBackendProperties',
> + 'data': { } }
Let's add 'if': 'CONFIG_POSIX' here.
> +
> ##
> # @MemoryBackendEpcProperties:
> #
> @@ -985,6 +1000,8 @@
> { 'name': 'memory-backend-memfd',
> 'if': 'CONFIG_LINUX' },
> 'memory-backend-ram',
> + { 'name': 'memory-backend-shm',
> + 'if': 'CONFIG_POSIX' },
> 'pef-guest',
> { 'name': 'pr-manager-helper',
> 'if': 'CONFIG_LINUX' },
> @@ -1056,6 +1073,8 @@
> 'memory-backend-memfd': { 'type': 'MemoryBackendMemfdProperties',
> 'if': 'CONFIG_LINUX' },
> 'memory-backend-ram': 'MemoryBackendProperties',
> + 'memory-backend-shm': { 'type': 'MemoryBackendShmProperties',
> + 'if': 'CONFIG_POSIX' },
> 'pr-manager-helper': { 'type': 'PrManagerHelperProperties',
> 'if': 'CONFIG_LINUX' },
> 'qtest': 'QtestProperties',
[...]
> diff --git a/qemu-options.hx b/qemu-options.hx
> index 8ca7f34ef0..ad6521ef5e 100644
> --- a/qemu-options.hx
> +++ b/qemu-options.hx
> @@ -5240,6 +5240,22 @@ SRST
>
> The ``share`` boolean option is on by default with memfd.
>
> + ``-object
> memory-backend-shm,id=id,merge=on|off,dump=on|off,share=on|off,prealloc=on|off,size=size,host-nodes=host-nodes,policy=default|preferred|bind|interleave``
> + Creates a POSIX shared memory backend object, which allows
> + QEMU to share the memory with an external process (e.g. when
> + using vhost-user).
> +
> + ``memory-backend-shm`` is a more portable and less featureful version
> + of ``memory-backend-memfd``. It can then be used in any POSIX system,
> + especially when memfd is not supported.
This actually explains the purpose, unlike the doc comment in qom.json.
Same for the existing memory backends; can't fault you for doing your
new one the same way. We ought to fix them all. I'm not demanding you
do it.
> +
> + Please refer to ``memory-backend-file`` for a description of the
> + options.
> +
> + The ``share`` boolean option is on by default with shm. Setting it to
> + off will cause a failure during allocation because it is not
> supported
> + by this backend.
> +
Not this patch's fault: documentation for -object memory-backend-epc is
missing.
> ``-object iommufd,id=id[,fd=fd]``
> Creates an iommufd backend which allows control of DMA mapping
> through the ``/dev/iommu`` device.
- [PATCH v6 01/12] libvhost-user: set msg.msg_control to NULL when it is empty, (continued)
- [PATCH v6 01/12] libvhost-user: set msg.msg_control to NULL when it is empty, Stefano Garzarella, 2024/05/28
- [PATCH v6 02/12] libvhost-user: fail vu_message_write() if sendmsg() is failing, Stefano Garzarella, 2024/05/28
- [PATCH v6 04/12] vhost-user-server: do not set memory fd non-blocking, Stefano Garzarella, 2024/05/28
- [PATCH v6 05/12] contrib/vhost-user-blk: fix bind() using the right size of the address, Stefano Garzarella, 2024/05/28
- [PATCH v6 06/12] contrib/vhost-user-*: use QEMU bswap helper functions, Stefano Garzarella, 2024/05/28
- [PATCH v6 03/12] libvhost-user: mask F_INFLIGHT_SHMFD if memfd is not supported, Stefano Garzarella, 2024/05/28
- [PATCH v6 07/12] vhost-user: enable frontends on any POSIX system, Stefano Garzarella, 2024/05/28
- [PATCH v6 08/12] libvhost-user: enable it on any POSIX system, Stefano Garzarella, 2024/05/28
- [PATCH v6 09/12] contrib/vhost-user-blk: enable it on any POSIX system, Stefano Garzarella, 2024/05/28
- [PATCH v6 10/12] hostmem: add a new memory backend based on POSIX shm_open(), Stefano Garzarella, 2024/05/28
- Re: [PATCH v6 10/12] hostmem: add a new memory backend based on POSIX shm_open(),
Markus Armbruster <=
- [PATCH v6 11/12] tests/qtest/vhost-user-blk-test: use memory-backend-shm, Stefano Garzarella, 2024/05/28
- [PATCH v6 12/12] tests/qtest/vhost-user-test: add a test case for memory-backend-shm, Stefano Garzarella, 2024/05/28