mirror of
https://github.com/qemu/qemu.git
synced 2024-12-17 09:13:44 +08:00
62a830b688
Migration with ivshmem needs to be carefully orchestrated to work. Exactly one peer (the "master") migrates to the destination, all other peers need to unplug (and disconnect), migrate, plug back (and reconnect). This is sort of documented in qemu-doc. If peers connect on the destination before migration completes, the shared memory can get messed up. This isn't documented anywhere. Fix that in qemu-doc. To avoid messing up register IVPosition on migration, the server must assign the same ID on source and destination. ivshmem-spec.txt leaves ID assignment unspecified, however. Amend ivshmem-spec.txt to require the first client to receive ID zero. The example ivshmem-server complies: it always assigns the first unused ID. For a bit of additional safety, enforce ID zero for the master. This does nothing when we're not using a server, because the ID is zero for all peers then. Signed-off-by: Markus Armbruster <armbru@redhat.com> Reviewed-by: Marc-André Lureau <marcandre.lureau@redhat.com> Message-Id: <1458066895-20632-40-git-send-email-armbru@redhat.com>
255 lines
10 KiB
Plaintext
255 lines
10 KiB
Plaintext
= Device Specification for Inter-VM shared memory device =
|
|
|
|
The Inter-VM shared memory device (ivshmem) is designed to share a
|
|
memory region between multiple QEMU processes running different guests
|
|
and the host. In order for all guests to be able to pick up the
|
|
shared memory area, it is modeled by QEMU as a PCI device exposing
|
|
said memory to the guest as a PCI BAR.
|
|
|
|
The device can use a shared memory object on the host directly, or it
|
|
can obtain one from an ivshmem server.
|
|
|
|
In the latter case, the device can additionally interrupt its peers, and
|
|
get interrupted by its peers.
|
|
|
|
|
|
== Configuring the ivshmem PCI device ==
|
|
|
|
There are two basic configurations:
|
|
|
|
- Just shared memory: -device ivshmem-plain,memdev=HMB,...
|
|
|
|
This uses host memory backend HMB. It should have option "share"
|
|
set.
|
|
|
|
- Shared memory plus interrupts: -device ivshmem,chardev=CHR,vectors=N,...
|
|
|
|
An ivshmem server must already be running on the host. The device
|
|
connects to the server's UNIX domain socket via character device
|
|
CHR.
|
|
|
|
Each peer gets assigned a unique ID by the server. IDs must be
|
|
between 0 and 65535.
|
|
|
|
Interrupts are message-signaled (MSI-X). vectors=N configures the
|
|
number of vectors to use.
|
|
|
|
For more details on ivshmem device properties, see The QEMU Emulator
|
|
User Documentation (qemu-doc.*).
|
|
|
|
|
|
== The ivshmem PCI device's guest interface ==
|
|
|
|
The device has vendor ID 1af4, device ID 1110, revision 1. Before
|
|
QEMU 2.6.0, it had revision 0.
|
|
|
|
=== PCI BARs ===
|
|
|
|
The ivshmem PCI device has two or three BARs:
|
|
|
|
- BAR0 holds device registers (256 Byte MMIO)
|
|
- BAR1 holds MSI-X table and PBA (only ivshmem-doorbell)
|
|
- BAR2 maps the shared memory object
|
|
|
|
There are two ways to use this device:
|
|
|
|
- If you only need the shared memory part, BAR2 suffices. This way,
|
|
you have access to the shared memory in the guest and can use it as
|
|
you see fit. Memnic, for example, uses ivshmem this way from guest
|
|
user space (see http://dpdk.org/browse/memnic).
|
|
|
|
- If you additionally need the capability for peers to interrupt each
|
|
other, you need BAR0 and BAR1. You will most likely want to write a
|
|
kernel driver to handle interrupts. Requires the device to be
|
|
configured for interrupts, obviously.
|
|
|
|
Before QEMU 2.6.0, BAR2 can initially be invalid if the device is
|
|
configured for interrupts. It becomes safely accessible only after
|
|
the ivshmem server provided the shared memory. These devices have PCI
|
|
revision 0 rather than 1. Guest software should wait for the
|
|
IVPosition register (described below) to become non-negative before
|
|
accessing BAR2.
|
|
|
|
Revision 0 of the device is not capable to tell guest software whether
|
|
it is configured for interrupts.
|
|
|
|
=== PCI device registers ===
|
|
|
|
BAR 0 contains the following registers:
|
|
|
|
Offset Size Access On reset Function
|
|
0 4 read/write 0 Interrupt Mask
|
|
bit 0: peer interrupt (rev 0)
|
|
reserved (rev 1)
|
|
bit 1..31: reserved
|
|
4 4 read/write 0 Interrupt Status
|
|
bit 0: peer interrupt (rev 0)
|
|
reserved (rev 1)
|
|
bit 1..31: reserved
|
|
8 4 read-only 0 or ID IVPosition
|
|
12 4 write-only N/A Doorbell
|
|
bit 0..15: vector
|
|
bit 16..31: peer ID
|
|
16 240 none N/A reserved
|
|
|
|
Software should only access the registers as specified in column
|
|
"Access". Reserved bits should be ignored on read, and preserved on
|
|
write.
|
|
|
|
In revision 0 of the device, Interrupt Status and Mask Register
|
|
together control the legacy INTx interrupt when the device has no
|
|
MSI-X capability: INTx is asserted when the bit-wise AND of Status and
|
|
Mask is non-zero and the device has no MSI-X capability. Interrupt
|
|
Status Register bit 0 becomes 1 when an interrupt request from a peer
|
|
is received. Reading the register clears it.
|
|
|
|
IVPosition Register: if the device is not configured for interrupts,
|
|
this is zero. Else, it is the device's ID (between 0 and 65535).
|
|
|
|
Before QEMU 2.6.0, the register may read -1 for a short while after
|
|
reset. These devices have PCI revision 0 rather than 1.
|
|
|
|
There is no good way for software to find out whether the device is
|
|
configured for interrupts. A positive IVPosition means interrupts,
|
|
but zero could be either.
|
|
|
|
Doorbell Register: writing this register requests to interrupt a peer.
|
|
The written value's high 16 bits are the ID of the peer to interrupt,
|
|
and its low 16 bits select an interrupt vector.
|
|
|
|
If the device is not configured for interrupts, the write is ignored.
|
|
|
|
If the interrupt hasn't completed setup, the write is ignored. The
|
|
device is not capable to tell guest software whether setup is
|
|
complete. Interrupts can regress to this state on migration.
|
|
|
|
If the peer with the requested ID isn't connected, or it has fewer
|
|
interrupt vectors connected, the write is ignored. The device is not
|
|
capable to tell guest software what peers are connected, or how many
|
|
interrupt vectors are connected.
|
|
|
|
The peer's interrupt for this vector then becomes pending. There is
|
|
no way for software to clear the pending bit, and a polling mode of
|
|
operation is therefore impossible.
|
|
|
|
If the peer is a revision 0 device without MSI-X capability, its
|
|
Interrupt Status register is set to 1. This asserts INTx unless
|
|
masked by the Interrupt Mask register. The device is not capable to
|
|
communicate the interrupt vector to guest software then.
|
|
|
|
With multiple MSI-X vectors, different vectors can be used to indicate
|
|
different events have occurred. The semantics of interrupt vectors
|
|
are left to the application.
|
|
|
|
|
|
== Interrupt infrastructure ==
|
|
|
|
When configured for interrupts, the peers share eventfd objects in
|
|
addition to shared memory. The shared resources are managed by an
|
|
ivshmem server.
|
|
|
|
=== The ivshmem server ===
|
|
|
|
The server listens on a UNIX domain socket.
|
|
|
|
For each new client that connects to the server, the server
|
|
- picks an ID,
|
|
- creates eventfd file descriptors for the interrupt vectors,
|
|
- sends the ID and the file descriptor for the shared memory to the
|
|
new client,
|
|
- sends connect notifications for the new client to the other clients
|
|
(these contain file descriptors for sending interrupts),
|
|
- sends connect notifications for the other clients to the new client,
|
|
and
|
|
- sends interrupt setup messages to the new client (these contain file
|
|
descriptors for receiving interrupts).
|
|
|
|
The first client to connect to the server receives ID zero.
|
|
|
|
When a client disconnects from the server, the server sends disconnect
|
|
notifications to the other clients.
|
|
|
|
The next section describes the protocol in detail.
|
|
|
|
If the server terminates without sending disconnect notifications for
|
|
its connected clients, the clients can elect to continue. They can
|
|
communicate with each other normally, but won't receive disconnect
|
|
notification on disconnect, and no new clients can connect. There is
|
|
no way for the clients to connect to a restarted server. The device
|
|
is not capable to tell guest software whether the server is still up.
|
|
|
|
Example server code is in contrib/ivshmem-server/. Not to be used in
|
|
production. It assumes all clients use the same number of interrupt
|
|
vectors.
|
|
|
|
A standalone client is in contrib/ivshmem-client/. It can be useful
|
|
for debugging.
|
|
|
|
=== The ivshmem Client-Server Protocol ===
|
|
|
|
An ivshmem device configured for interrupts connects to an ivshmem
|
|
server. This section details the protocol between the two.
|
|
|
|
The connection is one-way: the server sends messages to the client.
|
|
Each message consists of a single 8 byte little-endian signed number,
|
|
and may be accompanied by a file descriptor via SCM_RIGHTS. Both
|
|
client and server close the connection on error.
|
|
|
|
Note: QEMU currently doesn't close the connection right on error, but
|
|
only when the character device is destroyed.
|
|
|
|
On connect, the server sends the following messages in order:
|
|
|
|
1. The protocol version number, currently zero. The client should
|
|
close the connection on receipt of versions it can't handle.
|
|
|
|
2. The client's ID. This is unique among all clients of this server.
|
|
IDs must be between 0 and 65535, because the Doorbell register
|
|
provides only 16 bits for them.
|
|
|
|
3. The number -1, accompanied by the file descriptor for the shared
|
|
memory.
|
|
|
|
4. Connect notifications for existing other clients, if any. This is
|
|
a peer ID (number between 0 and 65535 other than the client's ID),
|
|
repeated N times. Each repetition is accompanied by one file
|
|
descriptor. These are for interrupting the peer with that ID using
|
|
vector 0,..,N-1, in order. If the client is configured for fewer
|
|
vectors, it closes the extra file descriptors. If it is configured
|
|
for more, the extra vectors remain unconnected.
|
|
|
|
5. Interrupt setup. This is the client's own ID, repeated N times.
|
|
Each repetition is accompanied by one file descriptor. These are
|
|
for receiving interrupts from peers using vector 0,..,N-1, in
|
|
order. If the client is configured for fewer vectors, it closes
|
|
the extra file descriptors. If it is configured for more, the
|
|
extra vectors remain unconnected.
|
|
|
|
From then on, the server sends these kinds of messages:
|
|
|
|
6. Connection / disconnection notification. This is a peer ID.
|
|
|
|
- If the number comes with a file descriptor, it's a connection
|
|
notification, exactly like in step 4.
|
|
|
|
- Else, it's a disconnection notification for the peer with that ID.
|
|
|
|
Known bugs:
|
|
|
|
* The protocol changed incompatibly in QEMU 2.5. Before, messages
|
|
were native endian long, and there was no version number.
|
|
|
|
* The protocol is poorly designed.
|
|
|
|
=== The ivshmem Client-Client Protocol ===
|
|
|
|
An ivshmem device configured for interrupts receives eventfd file
|
|
descriptors for interrupting peers and getting interrupted by peers
|
|
from the server, as explained in the previous section.
|
|
|
|
To interrupt a peer, the device writes the 8-byte integer 1 in native
|
|
byte order to the respective file descriptor.
|
|
|
|
To receive an interrupt, the device reads and discards as many 8-byte
|
|
integers as it can.
|