[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <49D4F97F.6040507@novell.com>
Date: Thu, 02 Apr 2009 13:44:31 -0400
From: Gregory Haskins <ghaskins@...ell.com>
To: Avi Kivity <avi@...hat.com>
CC: Patrick Mullaney <pmullaney@...ell.com>, anthony@...emonkey.ws,
andi@...stfloor.org, herbert@...dor.apana.org.au,
Peter Morreale <PMorreale@...ell.com>, rusty@...tcorp.com.au,
agraf@...e.de, kvm@...r.kernel.org, linux-kernel@...r.kernel.org,
netdev@...r.kernel.org
Subject: Re: [RFC PATCH 00/17] virtual-bus
Avi Kivity wrote:
> Gregory Haskins wrote:
>>> vbus (if I understand it right) is a whole package of things:
>>>
>>> - a way to enumerate, discover, and manage devices
>>>
>>
>> Yes
>>
>>> That part duplicates PCI
>>>
>>
>> Yes, but the important thing to point out is it doesn't *replace*
>> PCI. It simply an alternative.
>>
>
> Does it offer substantial benefits over PCI? If not, it's just extra
> code.
First of all, do you think I would spend time designing it if I didn't
think so? :)
Second of all, I want to use vbus for other things that do not speak PCI
natively (like userspace for instance...and if I am gleaning this
correctly, lguest doesnt either).
PCI sounds good at first, but I believe its a false economy. It was
designed, of course, to be a hardware solution, so it carries all this
baggage derived from hardware constraints that simply do not exist in a
pure software world and that have to be emulated. Things like the fixed
length and centrally managed PCI-IDs, PIO config cycles, BARs,
pci-irq-routing, etc. While emulation of PCI is invaluable for
executing unmodified guest, its not strictly necessary from a
paravirtual software perspective...PV software is inherently already
aware of its context and can therefore use the best mechanism
appropriate from a broader selection of choices.
If we insist that PCI is the only interface we can support and we want
to do something, say, in the kernel for instance, we have to have either
something like the ICH model in the kernel (and really all of the pci
chipset models that qemu supports), or a hacky hybrid userspace/kernel
solution. I think this is what you are advocating, but im sorry. IMO
that's just gross and unecessary gunk. Lets stop beating around the
bush and just define the 4-5 hypercall verbs we need and be done with
it. :)
FYI: The guest support for this is not really *that* much code IMO.
drivers/vbus/proxy/Makefile | 2
drivers/vbus/proxy/kvm.c | 726 +++++++++++++++++
and plus, I'll gladly maintain it :)
I mean, its not like new buses do not get defined from time to time.
Should the computing industry stop coming up with new bus types because
they are afraid that the windows ABI only speaks PCI? No, they just
develop a new driver for whatever the bus is and be done with it. This
is really no different.
>
> Note that virtio is not tied to PCI, so "vbus is generic" doesn't count.
Well, preserving the existing virtio-net on x86 ABI is tied to PCI,
which is what I was referring to. Sorry for the confusion.
>
>>> and it would be pretty hard to convince me we need to move to
>>> something new
>>>
>>
>> But thats just it. You don't *need* to move. The two can coexist side
>> by side peacefully. "vbus" just ends up being another device that may
>> or may not be present, and that may or may not have devices on it. In
>> fact, during all this testing I was booting my guest with "eth0" as
>> virtio-net, and "eth1" as venet. The both worked totally fine and
>> harmoniously. The guest simply discovers if vbus is supported via a
>> cpuid feature bit and dynamically adds it if present.
>>
>
> I meant, move the development effort, testing, installed base, Windows
> drivers.
Again, I will maintain this feature, and its completely off to the
side. Turn it off in the config, or do not enable it in qemu and its
like it never existed. Worst case is it gets reverted if you don't like
it. Aside from the last few kvm specific patches, the rest is no
different than the greater linux environment. E.g. if I update the
venet driver upstream, its conceptually no different than someone else
updating e1000, right?
>
>>
>>> . virtio-pci (a) works,
>>>
>> And it will continue to work
>>
>
> So why add something new?
I was hoping this was becoming clear by now, but apparently I am doing a
poor job of articulating things. :( I think we got bogged down in the
802.x performance discussion and lost sight of what we are trying to
accomplish with the core infrastructure.
So this core vbus infrastructure is for generic, in-kernel IO models.
As a first pass, we have implemented a kvm-connector, which lets kvm
guest kernels have access to the bus. We also have a userspace
connector (which I haven't pushed yet due to remaining issues being
ironed out) which allows userspace applications to interact with the
devices as well. As a prototype, we built "venet" to show how it all works.
In the future, we want to use this infrastructure to build IO models for
various things like high performance fabrics and guest bypass
technologies, etc. For instance, guest userspace connections to RDMA
devices in the kernel, etc.
>
>>
>>> (b) works on Windows.
>>>
>>
>> virtio will continue to work on windows, as well. And if one of my
>> customers wants vbus support on windows and is willing to pay us to
>> develop it, we can support *it* there as well.
>>
>
> I don't want to develop and support both virtio and vbus. And I
> certainly don't want to depend on your customers.
So don't. Ill maintain the drivers and the infrastructure. All we are
talking here is the possible acceptance of my kvm-connector patches
*after* the broader LKML community accepts the core infrastructure,
assuming that happens.
You can always just state that you do not support enabling the feature.
Bug reports with it enabled go to me, etc.
If that is still not acceptable and you are ultimately not interested in
any kind of merge/collaboration: At the very least, I hope we can get
some very trivial patches in for registering things like the
KVM_CAP_VBUS bits for vbus so I can present a stable ABI to anyone
downstream from me. Those things have been shifting on me a lot lately ;)
>
>
>>> - a different way of doing interrupts
>>>
>> Yeah, but this is ok. And I am not against doing that mod we talked
>> about earlier where I replace dynirq with a pci shim to represent the
>> vbus. Question about that: does userspace support emulation of MSI
>> interrupts?
>
> Yes, this is new. See the interrupt routing stuff I mentioned. It's
> probably only in kvm.git, not even in 2.6.30.
Cool, will check out, thanks.
>
>> I would probably prefer it if I could keep the vbus IRQ (or
>> IRQs when I support MQ) from being shared. It seems registering the
>> vbus as an MSI device would be more conducive to avoiding this.
>>
>
> I still think you want one MSI per device rather than one MSI per
> vbus, to avoid scaling problems on large guest. After Herbert's let
> loose on the code, one MSI per queue.
This is trivial for me to support with just a few tweaks to the kvm
host/guest connector patches.
>
>
>
>>> - a different ring layout, and splitting notifications from the ring
>>>
>> Again, virtio will continue to work. And if we cannot find a way to
>> collapse virtio and ioq together in a way that everyone agrees on, there
>> is no harm in having two. I have no problem saying I will maintain
>> IOQ. There is plenty of precedent for multiple ways to do the same
>> thing.
>>
>
> IMO we should just steal whatever makes ioq better, and credit you in
> some file no one reads. We get backwards compatibility, Windows
> support, continuity, etc.
>
>>> I don't see the huge win here
>>>
>>> - placing the host part in the host kernel
>>>
>>> Nothing vbus-specific here.
>>>
>>
>> Well, it depends on what you want. Do you want a implementation that is
>> virtio-net, kvm, and pci specific while being hardcoded in?
>
> No. virtio is already not kvm or pci specific. Definitely all the
> pci emulation parts will remain in user space.
blech :)
-Greg
Download attachment "signature.asc" of type "application/pgp-signature" (258 bytes)
Powered by blists - more mailing lists