From: Igor Mammedov <imammedo@redhat.com>
To: "Igor Kotrasiński" <i.kotrasinsk@partner.samsung.com>
Cc: peter.maydell@linaro.org, Jan Kiszka <jan.kiszka@siemens.com>,
pbonzini@redhat.com, qemu-devel@nongnu.org,
Stefan Hajnoczi <stefanha@gmail.com>
Subject: Re: [RFC 0/9] Add an interVM memory sharing device
Date: Fri, 7 Feb 2020 11:04:03 +0100 [thread overview]
Message-ID: <20200207110403.08a8a7cc@redhat.com> (raw)
In-Reply-To: <91d3f574-3a4f-8291-040e-520c5c58e77e@partner.samsung.com>
On Fri, 7 Feb 2020 10:00:50 +0100
Igor Kotrasiński <i.kotrasinsk@partner.samsung.com> wrote:
> On 2/5/20 3:49 PM, Jan Kiszka wrote:
> > On 05.02.20 15:39, Stefan Hajnoczi wrote:
> >> On Tue, Feb 04, 2020 at 12:30:42PM +0100,
> >> i.kotrasinsk@partner.samsung.com wrote:
> >>> From: Igor Kotrasinski <i.kotrasinsk@partner.samsung.com>
> >>>
> >>> This patchset adds a "memory exposing" device that allows two QEMU
> >>> instances to share arbitrary memory regions. Unlike ivshmem, it does not
> >>> create a new region of memory that's shared between VMs, but instead
> >>> allows one VM to access any memory region of the other VM we choose to
> >>> share.
> >>>
> >>> The motivation for this device is a sort of ARM Trustzone "emulation",
> >>> where a rich system running on one machine (e.g. x86_64 linux) is able
> >>> to perform SMCs to a trusted system running on another (e.g. OpTEE on
> >>> ARM). With a device that allows sharing arbitrary memory between VMs,
> >>> this can be achieved with minimal changes to the trusted system and its
> >>> linux driver while allowing the rich system to run on a speedier x86
> >>> emulator. I prepared additional patches for linux, OpTEE OS and OpTEE
> >>> build system as a PoC that such emulation works and passes OpTEE tests;
> >>> I'm not sure what would be the best way to share them.
> >>>
> >>> This patchset is my first foray into QEMU source code and I'm certain
> >>> it's not yet ready to be merged in. I'm not sure whether memory sharing
> >>> code has any race conditions or breaks rules of working with memory
> >>> regions, or if having VMs communicate synchronously via chardevs is the
> >>> right way to do it. I do believe the basic idea for sharing memory
> >>> regions is sound and that it could be useful for inter-VM communication.
> >>
> >> Hi,
> >> Without having looked into the patches yet, I'm already wondering if you
> >> can use the existing -object
> >> memory-backend-file,size=512M,mem-path=/my/shared/mem feature for your
> >> use case?
> >>
> >> That's the existing mechanism for fully sharing guest RAM and if you
> >> want to share all of memory then maybe a device is not necessary - just
> >> share the memory.
>
> That option adds memory in addition to the memory allocated with the
> '-m' flag, doesn't it? I looked into that option, and it seemed to me
> you can't back all memory this way.
with current QEMU you play with memory sharing using numa workaround
-m 512 \
-object memory-backend-file,id=mem,size=512M,mem-path=/my/shared/mem feature,share=on \
-numa node,memdev=mem
also on the list there is series that allows to share main ram
without numa workaround, see
"[PATCH v4 00/80] refactor main RAM allocation to use hostmem backend"
with it applied you can share main RAM with following CLI:
-object memory-backend-file,id=mem,size=512M,mem-path=/my/shared/mem feature,share=on \
-m 512 \
-M virt,memory-backend=mem
> Apart from that, the only advantage my solution has is that it's aware
> of any memory overlaying the memory-backed regions (i.e. memory backed
> by accessor functions). Maybe I don't need this for my use case, I'd
> have to test that.
>
> >
> > I suspect it's about sharing that memory in a discoverable way. Maybe it
> > is also about the signalling channel defined in the device.
> >
> > OTOH, when it's really about sharing everything, even bidirectional,
> > that rather looks like a pragmatic shortcut, not a generic model.
> >
> > The patches should clarify their use case a bit further, I think. The
> > title suggests a generic sharing solution, but my impression is that it
> > rather caters a specific case under specific boundary conditions.
> >
> > Jan
> >
>
> The solution does stem from a specific use case, the ARM Trustzone
> forwarding described in the cover letter. Normally both OSes can pass
> data around by sharing physical addresses (potentially from anywhere in
> memory), so giving VMs an ability to access one another's memory no
> matter how it's backed allows for minimal trusted OS modification, just
> offsetting physical addresses. The interrupt functionality also reflects
> this, it's intended to pass around SMC data.
>
> I realize that this kind of total memory sharing couples the two VMs
> tightly - this is why I'm asking for comments on this, perhaps there's a
> better solution for this specific scenario.
>
> For what it's worth, the extent of this sharing can be reduced by using
> a limited MemoryRegion like it's done for secure and non-secure memory
> views on ARM.
>
> Igor
>
next prev parent reply other threads:[~2020-02-07 10:04 UTC|newest]
Thread overview: 20+ messages / expand[flat|nested] mbox.gz Atom feed top
[not found] <CGME20200204113102eucas1p172cfb883c70cfc8d7c2832682df3df2a@eucas1p1.samsung.com>
2020-02-04 11:30 ` [RFC 0/9] Add an interVM memory sharing device i.kotrasinsk
[not found] ` <CGME20200204113104eucas1p2587768b7daa479ef5c01b45e1da99e45@eucas1p2.samsung.com>
2020-02-04 11:30 ` [RFC 1/9] memory: Add function for finding flat memory ranges i.kotrasinsk
[not found] ` <CGME20200204113105eucas1p2981e8d1e49ca9621255a4aedf8f1ec6e@eucas1p2.samsung.com>
2020-02-04 11:30 ` [RFC 2/9] memory: Support mmap offset for fd-backed memory regions i.kotrasinsk
[not found] ` <CGME20200204113106eucas1p2cf218553048c75f5a8b7771cde90f5f1@eucas1p2.samsung.com>
2020-02-04 11:30 ` [RFC 3/9] memory: Hack - use shared memory when possible i.kotrasinsk
[not found] ` <CGME20200204113107eucas1p2769c0c8204a57751a4e6c5d4fb40e2d5@eucas1p2.samsung.com>
2020-02-04 11:30 ` [RFC 4/9] hw/misc/memexpose: Add documentation i.kotrasinsk
[not found] ` <CGME20200204113108eucas1p232d86a495fa8200473047ffb58548201@eucas1p2.samsung.com>
2020-02-04 11:30 ` [RFC 5/9] hw/misc/memexpose: Add core memexpose files i.kotrasinsk
[not found] ` <CGME20200204113108eucas1p2526a9481bf8a4420d359c45f1183fe95@eucas1p2.samsung.com>
2020-02-04 11:30 ` [RFC 6/9] hw/misc/memexpose: Add memexpose pci device i.kotrasinsk
[not found] ` <CGME20200204113109eucas1p18527bb78c3d930d56e6ae9c205f64ba3@eucas1p1.samsung.com>
2020-02-04 11:30 ` [RFC 7/9] hw/misc/memexpose: Add memexpose memory region device i.kotrasinsk
[not found] ` <CGME20200204113110eucas1p2f9ab3639730113139730d1853772d100@eucas1p2.samsung.com>
2020-02-04 11:30 ` [RFC 8/9] hw/misc/memexpose: Add simple tests i.kotrasinsk
[not found] ` <CGME20200204113111eucas1p2a96ec20fbaf679215b50d9f03245b33e@eucas1p2.samsung.com>
2020-02-04 11:30 ` [RFC 9/9] hw/arm/virt: Hack in support for memexpose device i.kotrasinsk
2020-02-04 12:13 ` [RFC 0/9] Add an interVM memory sharing device no-reply
2020-02-04 12:16 ` no-reply
2020-02-05 14:39 ` Stefan Hajnoczi
2020-02-05 14:49 ` Jan Kiszka
2020-02-07 9:00 ` Igor Kotrasiński
2020-02-07 10:04 ` Igor Mammedov [this message]
2020-02-07 16:33 ` Stefan Hajnoczi
2020-02-10 13:01 ` Igor Kotrasiński
2020-02-12 13:57 ` Stefan Hajnoczi
2020-04-01 12:58 ` Igor Kotrasiński
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20200207110403.08a8a7cc@redhat.com \
--to=imammedo@redhat.com \
--cc=i.kotrasinsk@partner.samsung.com \
--cc=jan.kiszka@siemens.com \
--cc=pbonzini@redhat.com \
--cc=peter.maydell@linaro.org \
--cc=qemu-devel@nongnu.org \
--cc=stefanha@gmail.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).