[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20090813055550.GA3029@redhat.com>
Date: Thu, 13 Aug 2009 08:55:50 +0300
From: "Michael S. Tsirkin" <mst@...hat.com>
To: "Ira W. Snyder" <iws@...o.caltech.edu>
Cc: Arnd Bergmann <arnd@...db.de>,
virtualization@...ts.linux-foundation.org, netdev@...r.kernel.org,
kvm@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: [PATCH 2/2] vhost_net: a kernel-level virtio server
On Wed, Aug 12, 2009 at 10:48:21AM -0700, Ira W. Snyder wrote:
> On Wed, Aug 12, 2009 at 08:31:04PM +0300, Michael S. Tsirkin wrote:
> > On Wed, Aug 12, 2009 at 10:19:22AM -0700, Ira W. Snyder wrote:
>
> [ snip out code ]
>
> > > >
> > > > We discussed this before, and I still think this could be directly derived
> > > > from struct virtqueue, in the same way that vring_virtqueue is derived from
> > > > struct virtqueue. That would make it possible for simple device drivers
> > > > to use the same driver in both host and guest, similar to how Ira Snyder
> > > > used virtqueues to make virtio_net run between two hosts running the
> > > > same code [1].
> > > >
> > > > Ideally, I guess you should be able to even make virtio_net work in the
> > > > host if you do that, but that could bring other complexities.
> > >
> > > I have no comments about the vhost code itself, I haven't reviewed it.
> > >
> > > It might be interesting to try using a virtio-net in the host kernel to
> > > communicate with the virtio-net running in the guest kernel. The lack of
> > > a management interface is the biggest problem you will face (setting MAC
> > > addresses, negotiating features, etc. doesn't work intuitively).
> >
> > That was one of the reasons I decided to move most of code out to
> > userspace. My kernel driver only handles datapath,
> > it's much smaller than virtio net.
> >
> > > Getting
> > > the network interfaces talking is relatively easy.
> > >
> > > Ira
> >
> > Tried this, but
> > - guest memory isn't pinned, so copy_to_user
> > to access it, errors need to be handled in a sane way
> > - used/available roles are reversed
> > - kick/interrupt roles are reversed
> >
> > So most of the code then looks like
> >
> > if (host) {
> > } else {
> > }
> > return
> >
> >
> > The only common part is walking the descriptor list,
> > but that's like 10 lines of code.
> >
> > At which point it's better to keep host/guest code separate, IMO.
> >
>
> Ok, that makes sense. Let me see if I understand the concept of the
> driver. Here's a picture of what makes sense to me:
>
> guest system
> ---------------------------------
> | userspace applications |
> ---------------------------------
> | kernel network stack |
> ---------------------------------
> | virtio-net |
> ---------------------------------
> | transport (virtio-ring, etc.) |
> ---------------------------------
> |
> |
> ---------------------------------
> | transport (virtio-ring, etc.) |
> ---------------------------------
> | some driver (maybe vhost?) | <-- [1]
> ---------------------------------
> | kernel network stack |
> ---------------------------------
> host system
>
> >From the host's network stack, packets can be forwarded out to the
> physical network, or be consumed by a normal userspace application on
> the host. Just as if this were any other network interface.
>
> In my patch, [1] was the virtio-net driver, completely unmodified.
>
> So, does this patch accomplish the above diagram?
Not exactly. vhost passes packets to a physical device,
through a raw socket, not into host network stack.
> If so, why the copy_to_user(), etc?
Guest memory is not pinned. Memory access needs to go through
translation process, could cause page faults, etc.
> Maybe I'm confusing this with my system, where the
> "guest" is another physical system, separated by the PCI bus.
>
> Ira
Yes, that's different.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists