[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Purpose of translate MSI interrupt into INTx for guest passthrough


  • To: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  • From: Roger Pau Monné <roger.pau@xxxxxxxxxx>
  • Date: Thu, 14 Jan 2021 11:41:38 +0100
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com; dkim=pass header.d=citrix.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=x73Ti2GS3bL7Uw2fwj03EQJTfRLn8zb0vczMBq4/OVc=; b=fbuV+JGHXLzpgKbcfEiqZp+K+PtWOfxWSOpKDOubFpbD3dVpjeZZGFKbZhGLlCmiENMQsY7mWruV/BdF+2BKgciCJaHRJULdzshdeAsC04X9g49R7J75pNGv470WYD52B0Mfw6q16Yj/Qg3PtdcvR6DzvquqArNzxu24No3XR/6Rr91giSNCTej7hZDR6la3i9MPMf2ZcCqIGAjndB+Em2BiMUCgOJ3Tv+ODFu1kh9fw4fbrkJuozFXfILUpzt1bqrrCPNL1bk9Ak04O6h66j90KfA+NutTppHm+WIhqWL/vmN4rHu6AiiZq9uVncyovubIGECWhFKJGVZS1KF3ZMA==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=KZW+B65ivHb4SznA/V03kjR1qFFZpLN0men3BPCSYVLAOKRBhS7MXP1FAtSXgKiyqQrO46JY8AiH5rkPs6Ae713LUB/5amnYVJ6vKqKE79V98giah6neiwmHFUTb9ii9abDtQmJW5B5aN7h1He5MlKS0oeeJqsu1MVv4FXH8v2368umcqhI3rNGVpCKV+tLTx0mgc8ognaBlGOm9mZVqh/oX02aRaicWu7hXkCEtBksTWaqY7U+dx62gA4DQqYKgTZL71ekQ6DcVTxd2Ou4PZdgjYJuQP2sapkcGAGNM8/PGWI+I51L13Do2EGQvZWUjVKJcups/5OqZ07I1f/6ABw==
  • Authentication-results: esa6.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
  • Cc: Jason Andryuk <jandryuk@xxxxxxxxx>, xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>, Jan Beulich <jbeulich@xxxxxxxx>, Wei Liu <wl@xxxxxxx>
  • Delivery-date: Thu, 14 Jan 2021 10:42:11 +0000
  • Ironport-sdr: SrwbO18cWOZlN4Rq1PREY9wZ7cXWu1NB4F6camQGWaef4iB/NwZYu3ami+5LesMmfY9Q/D5Yjx HdXsVA5hxRJevpmkVLabTYbIIHvrv1MtyJ8ouAUb+oC3RVC/huNwHRu734uvjIMHyUPhQO9AXR HBXO+ziOcFxRVpXOiZ4XB8lEFLo8WVWm5AI7SJSmj3mj7WYhsNg2cI2oBNDtULvWlZrBWV65kD k6Lgpj6k/PAaV7kZ5vmhr9PuvyEer3r/gK3L8OT2xZzBOsWuFfpy6sn3ImqiSE60vsgjd0Xps2 GUU=
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On Wed, Jan 13, 2021 at 09:00:47PM +0000, Andrew Cooper wrote:
> On 12/01/2021 15:51, Roger Pau Monné wrote:
> > On Tue, Jan 12, 2021 at 09:48:17AM -0500, Jason Andryuk wrote:
> >> On Tue, Jan 12, 2021 at 9:25 AM Roger Pau Monné <roger.pau@xxxxxxxxxx> 
> >> wrote:
> >>> Dropping Qing He as this address bounces.
> >>>
> >>> On Tue, Jan 12, 2021 at 03:10:57PM +0100, Roger Pau Monné wrote:
> >>>> Hello,
> >>>>
> >>>> While trying to do some cleanup of the Xen interrupt support for pci
> >>>> pass though I came across the MSI to INTx translation that Xen is in
> >>>> theory capable of performing (ie: use a physical MSI interrupt source
> >>>> and inject that as an INTx to a guest).
> >>>>
> >>>> AFAICT such functionality is not wired up to the toolstack, so it's
> >>>> hard to tell what's the indented purpose, or whether it has seen any
> >>>> usage.
> >>> So apparently it is wired up to the toolstack for qemu-traditional,
> >>> albeit it's disabled by default. There's some documentation in
> >>> xl-pci-configuration:
> >>>
> >>> "When enabled, MSI-INTx translation will always enable MSI on the PCI
> >>> device regardless of whether the guest uses INTx or MSI."
> >>>
> >>> So the main purpose seem to be to always use the MSI interrupt source
> >>> regardless of whether the guest is using INTx or MSI. Maybe the
> >>> purpose was to workaround some bugs when using INTx? Or buggy devices
> >>> with INTx interrupts?
> >>>
> >>> qemu-upstream doesn't seem to support it anymore, so I would still
> >>> like to remove it if we get consensus.
> >> The cover letter from
> >> http://old-list-archives.xenproject.org/archives/html/xen-devel/2009-01/msg00228.html
> >> """
> >> This patchset enables MSI-INTx interrupt translation for HVM
> >> domains. The intention of the patch is to use MSI as the physical
> >> interrupt mechanism for passthrough device as much as possible,
> >> thus reducing the pirq sharing among domains.
> >>
> >> When MSI is globally enabled, if the device has the MSI capability
> >> but doesn't used by the guest, hypervisor will try to user MSI as
> >> the underlying pirq and inject translated INTx irq to guest
> >> vioapic. When guest itself enabled MSI or MSI-X, the translation
> >> is automatically turned off.
> >>
> >> Add a config file option to disable/enable this feature. Also, in
> >> order to allow the user to override the option per device, a
> >> per-device option mechanism is implemented and an MSI-INTx option
> >> is added
> >> """
> >>
> >> It seems like it could be a good idea, but I don't know if it presents
> >> compatibility issues when actually used.
> > Hm, MSI interrupts are edge triggered, while INTx is (usually) level.
> > Also devices capable of multiple MSI vectors will be limited to a
> > single one, and I'm not sure whether the transition from translated
> > MSI to INTx into multiple MSIs would work correctly, as seems tricky.
> >
> >> As you say, it's not supported by qemu-upstream, so maybe it should
> >> just be dropped.
> > I don't really see much value in forcing Xen to always use MSI
> > regardless of whether the guest is using INTx or MSI, and it's likely
> > to cause more issues than benefits.
> >
> > IMO I think we should get rid of this, as the only real value is
> > having Xen using MSI intend of INTx, but it's not introducing any kind
> > of functionality from a guest PoV.
> 
> I find this feature very dubious.
> 
> While I agree that reducing INTx sharing between domains is obviously a
> good thing, I don't see how the device can possibly be expected to work
> if the in-guest driver doesn't have an accurate idea of what's going on.
> 
> There are up to 4 INTx lines, but absolutely nothing to suggest that
> these would logically map to the first 4 MSIs enabled on the device.

Multiple MSI interrupts routed to INTx will never work IMO.

> Even in the simplified case of only INTA and a single MSI, there's
> nothing to suggest that the device will behave in the same way when it
> comes to generating interrupts.

IIRC (at least for plain MSI with message groups) it's possible to
enable a single vector even when multiple ones are available, and that
single vector will be used to deliver all events, kind of similar to
the PCI INTx stuff. But as you note MSI is edge triggered while INTx is
level, so there's likely all kind of weird interactions that could
happen from the 'translation' done by Xen.

I'm up for removing it, we don't have it in qemu-upstream and no one
has complained, so I think it's a good sign that this feature was
unused.

Unless someone objects I will prepare a patch to remove it.

Thanks, Roger.



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.