OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.

 


Help: OASIS Mailing Lists Help | MarkMail Help

virtio-comment message

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]


Subject: Re: [virtio-comment] Re: [PATCH v1 3/8] device-context: Define the device context fields for device migration


On Wed, Oct 18, 2023 at 6:23âPM Parav Pandit <parav@nvidia.com> wrote:
>
>
> > From: Michael S. Tsirkin <mst@redhat.com>
> > Sent: Wednesday, October 18, 2023 3:26 PM
>
> > For completeness, and to shorten the thread, can you please list known
> > issues/use cases that are addressed by the status bit interface and how you plan
> > for them to be addressed?
>
> I will avoid listing known issues for a moment for status bit in this email.
>
> Status bit interface helps in following good ways.
> 1. suspend/resume the device fully by the guest by negotiating the new feature.
> This can be useful in the guest-controlled PM flows of suspend/resume.
> I still think for this, only feature bit is necessary, and device_status modification is not needed.

Which feature bit did you mean here?

> D0->D3 and D3->D0 transition of the pci can suspend and resume the device which can preserve the last device_status value before entering D3.

It's not only about the device status. I would not repeat the question
I've asked in another thread.

What's more, if you really want to suspend/freeze at PCI level and
deal with PCI specific issues like P2P.  You should really try to
leverage or invent a PCI mechanism instead of trying to carry such
semantics via a virtio specific stuff like adminq. Solving transport
specific problems at the virtio level is a layer violation.

> (Like preserving all rest of the fields of common and other device config).
> This is orthogonal and needed regardless of device migration.
>
> 2. If one does not want to passthrough a member device, but build a mediation-based device on top of existing virtio device,
> It can be useful with mediating software.
> Here the mediating software has ample duplicated knowledge of what the member device already has.

It is the way the hypervisors are doing for not only virtio but also
for CPU and MMU as well.

> This can fulfil the nested requirement differently provided a platform support it.
> (PASID limitation will be practical blocker here).

I don't think PASID is a blocker. It is only a blocker if you want to
do passthrough.

>
> How to I plan to address above two?
> a. #1 to be addressed by having the _F_PM bit, when the bit is negotiated PCI PM drives the state.

We can't duplicate every transport specific feature in virtio. This is
a layer violation again. We should reuse the PCI facility here.

> This will work orthogonal to VMM side migration and will co-exist with VMM based device migration.
>
> b. nested use case:
> L0 VMM maps a VF to L1 guest as PF with emulated SR-IOV capability.
> L1 guest to enable SR-IOV and mapping the VF to L2 guest.

Let me ask it again here, how can you migrate L2 using L1 "emulated"
PF? Emulation?

Thanks




> Consulting industry ecosystem to support nested outside of virtio.



[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]