From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: <pve-devel-bounces@lists.proxmox.com> Received: from firstgate.proxmox.com (firstgate.proxmox.com [IPv6:2a01:7e0:0:424::9]) by lore.proxmox.com (Postfix) with ESMTPS id 92DE71FF168 for <inbox@lore.proxmox.com>; Tue, 4 Mar 2025 13:00:21 +0100 (CET) Received: from firstgate.proxmox.com (localhost [127.0.0.1]) by firstgate.proxmox.com (Proxmox) with ESMTP id 3C3691D3F9; Tue, 4 Mar 2025 12:59:36 +0100 (CET) From: Markus Frank <m.frank@proxmox.com> To: pve-devel@lists.proxmox.com Date: Tue, 4 Mar 2025 12:57:54 +0100 Message-Id: <20250304115803.194820-4-m.frank@proxmox.com> X-Mailer: git-send-email 2.39.5 In-Reply-To: <20250304115803.194820-1-m.frank@proxmox.com> References: <20250304115803.194820-1-m.frank@proxmox.com> MIME-Version: 1.0 X-SPAM-LEVEL: Spam detection results: 0 AWL -0.162 Adjusted score from AWL reputation of From: address BAYES_00 -1.9 Bayes spam probability is 0 to 1% DMARC_MISSING 0.1 Missing DMARC policy KAM_DMARC_STATUS 0.01 Test Rule for DKIM or SPF Failure with Strict Alignment KAM_SHORT 0.001 Use of a URL Shortener for very short URL POISEN_SPAM_PILL 0.1 Meta: its spam POISEN_SPAM_PILL_1 0.1 random spam to be learned in bayes POISEN_SPAM_PILL_3 0.1 random spam to be learned in bayes SPF_HELO_NONE 0.001 SPF: HELO does not publish an SPF Record SPF_PASS -0.001 SPF: sender matches SPF record Subject: [pve-devel] [PATCH docs v14 3/12] add doc section for the shared filesystem virtio-fs X-BeenThere: pve-devel@lists.proxmox.com X-Mailman-Version: 2.1.29 Precedence: list List-Id: Proxmox VE development discussion <pve-devel.lists.proxmox.com> List-Unsubscribe: <https://lists.proxmox.com/cgi-bin/mailman/options/pve-devel>, <mailto:pve-devel-request@lists.proxmox.com?subject=unsubscribe> List-Archive: <http://lists.proxmox.com/pipermail/pve-devel/> List-Post: <mailto:pve-devel@lists.proxmox.com> List-Help: <mailto:pve-devel-request@lists.proxmox.com?subject=help> List-Subscribe: <https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel>, <mailto:pve-devel-request@lists.proxmox.com?subject=subscribe> Reply-To: Proxmox VE development discussion <pve-devel@lists.proxmox.com> Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Errors-To: pve-devel-bounces@lists.proxmox.com Sender: "pve-devel" <pve-devel-bounces@lists.proxmox.com> Signed-off-by: Markus Frank <m.frank@proxmox.com> --- v14: * addressed formulation nits * added paragraph about expose-acl & expose-xattr qm.adoc | 99 +++++++++++++++++++++++++++++++++++++++++++++++++++++++-- 1 file changed, 97 insertions(+), 2 deletions(-) diff --git a/qm.adoc b/qm.adoc index 4bb8f2c..86b3877 100644 --- a/qm.adoc +++ b/qm.adoc @@ -1202,6 +1202,100 @@ recommended to always use a limiter to avoid guests using too many host resources. If desired, a value of '0' for `max_bytes` can be used to disable all limits. +[[qm_virtiofs]] +Virtio-fs +~~~~~~~~~ + +Virtio-fs is a shared filesystem designed for virtual environments. It allows to +share a directory tree available on the host by mounting it within VMs. It does +not use the network stack and aims to offer similar performance and semantics as +the source filesystem. + +To use virtio-fs, the https://gitlab.com/virtio-fs/virtiofsd[virtiofsd] daemon +needs to run in the background. This happens automatically in {pve} when +starting a VM using a virtio-fs mount. + +Linux VMs with kernel >=5.4 support virtio-fs by default. + +There is a guide available on how to utilize virtio-fs in Windows VMs. +https://github.com/virtio-win/kvm-guest-drivers-windows/wiki/Virtiofs:-Shared-file-system + +Known Limitations +^^^^^^^^^^^^^^^^^ + +* If virtiofsd crashes, its mount point will hang in the VM until the VM +is completely stopped. +* virtiofsd not responding may result in a hanging mount in the VM, similar to +an unreachable NFS. +* Memory hotplug does not work in combination with virtio-fs (also results in +hanging access). +* Memory related features such as live migration, snapshots, and hibernate are +not available with virtio-fs devices. +* Windows cannot understand ACLs in the context of virtio-fs. Therefore, do not +expose ACLs for Windows VMs, otherwise the virtio-fs device will not be +visible within the VM. + +Add Mapping for Shared Directories +^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ + +To add a mapping for a shared directory, you can use the API directly with +`pvesh` as described in the xref:resource_mapping[Resource Mapping] section: + +---- +pvesh create /cluster/mapping/dir --id dir1 \ + --map node=node1,path=/path/to/share1 \ + --map node=node2,path=/path/to/share2,announce-submounts=1 \ +---- + +Set `announce-submounts` to `1` if multiple filesystems are mounted in a shared +directory. This tells the guest which directories are mount points to prevent +data loss/corruption. With `announce-submounts`, virtiofsd reports a different +device number for each submount it encounters. Without it, duplicates may be +created because inode IDs are only unique on a single filesystem. + +Add virtio-fs to a VM +^^^^^^^^^^^^^^^^^^^^^ + +To share a directory using virtio-fs, add the parameter `virtiofs<N>` (N can be +anything between 0 and 9) to the VM config and use a directory ID (dirid) that +has been configured in the resource mapping. Additionally, you can set the +`cache` option to either `always`, `never`, or `auto` (default: `auto`), +depending on your requirements. How the different caching modes behave can be +read at https://lwn.net/Articles/774495/ under the "Caching Modes" section. To +enable writeback cache set `writeback` to `1`. + +Virtiofsd supports ACL and xattr passthrough (can be enabled with the +`expose-acl` and `expose-xattr` options), allowing the guest to access ACLs and +xattrs if the underlying host filesystem supports them, but they must also be +compatible with the guest filesystem (for example most Linux filesystems support +ACLs, while Windows filesystems do not). + +The `expose-acl` option automatically implies `expose-xattr`, that is, it makes +no difference if you set `expose-xattr` to `0` if `expose-acl` is set to `1`. + +If you want virtio-fs to honor the `O_DIRECT` flag, you can set the `direct-io` +parameter to `1` (default: `0`). This will degrade performance, but is useful if +applications do their own caching. + +---- +qm set <vmid> -virtiofs0 dirid=<dirid>,cache=always,direct-io=1 +qm set <vmid> -virtiofs1 <dirid>,cache=never,expose-xattr=1 +qm set <vmid> -virtiofs2 <dirid>,expose-acl=1,writeback=1 +---- + +To mount virtio-fs in a guest VM with the Linux kernel virtio-fs driver, run the +following command inside the guest: + +---- +mount -t virtiofs <mount tag> <mount point> +---- + +The dirid associated with the path on the current node is also used as the mount +tag (name used to mount the device on the guest). + +For more information on available virtiofsd parameters, see the +https://gitlab.com/virtio-fs/virtiofsd[GitLab virtiofsd project page]. + [[qm_bootorder]] Device Boot Order ~~~~~~~~~~~~~~~~~ @@ -1885,8 +1979,9 @@ in the relevant tab in the `Resource Mappings` category, or on the cli with [thumbnail="screenshot/gui-datacenter-mapping-pci-edit.png"] -Where `<type>` is the hardware type (currently either `pci` or `usb`) and -`<options>` are the device mappings and other configuration parameters. +Where `<type>` is the hardware type (currently either `pci`, `usb` or +xref:qm_virtiofs[dir]) and `<options>` are the device mappings and other +configuration parameters. Note that the options must include a map property with all identifying properties of that hardware, so that it's possible to verify the hardware did -- 2.39.5 _______________________________________________ pve-devel mailing list pve-devel@lists.proxmox.com https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel