[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20230403224517.GA3472913@bhelgaas>
Date: Mon, 3 Apr 2023 17:45:17 -0500
From: Bjorn Helgaas <helgaas@...nel.org>
To: Xinghui Li <korantwork@...il.com>
Cc: nirmal.patel@...ux.intel.com, kbusch@...nel.org,
jonathan.derrick@...ux.dev, lpieralisi@...nel.org,
linux-pci@...r.kernel.org, linux-kernel@...r.kernel.org,
Xinghui Li <korantli@...cent.com>
Subject: Re: [PATCH v4] PCI: vmd: Add the module param to adjust MSI mode
On Sun, Apr 02, 2023 at 11:02:07PM +0800, Xinghui Li wrote:
> On Thu, Mar 30, 2023 at 12:31 AM Bjorn Helgaas <helgaas@...nel.org> wrote:
> > On Wed, Mar 29, 2023 at 04:57:08PM +0800, Xinghui Li wrote:
> > > On Wed, Mar 29, 2023 at 5:34 AM Bjorn Helgaas <helgaas@...nel.org> wrote:
> > > > It would also be nice to include a hint about why a user would choose
> > > > "on" or "off". What is the performance effect? What sort of I/O
> > > > scenario would lead you to choose "on" vs "off"?
> > I don't think we need detailed performance numbers, but we need
> > something like:
> >
> > - "msi_remap=off" improves interrupt handling performance by
> > avoiding the VMD MSI-X domain interrupt handler
> >
> > - But "msi_remap=on" is needed when ...?
> >
> In the patch I send in last email, We speculate that the VMD
> Controller aggregate interrupts,
> making the PCIe port less stressed and improving iops. In this
> case(lots of 4k random IO), if we enable the VMD MSI
> remapping, we found the interrupts from VMD Controller's MSI are less
> and the IOPS is much higher.
Great, that's useful information about why users would want to use
this parameter.
Obviously the other half is to mention the reasons why they may not be
able to use it. If "msi_remap=off" were *always* safe and desirable,
we would just do that unconditionally and there would be no point in a
parameter.
> > > I place the "vmd_config_msi_remap_param" that is VMD MSI-X's mode
> > > param configuring helper front
> > > "vmd_enable_domain". So, It will not change the logic disabling
> > > remapping from ee81ee84f873, such as
> > > "Currently MSI remapping must be enabled in guest passthrough mode".
> > > So, if the user config the wrong type, it will not work, and they can
> > > find it by dmesg.
> >
> > That's kind of a problem. I'm not in favor of something failing and
> > the user having to debug it via dmesg. That causes user frustration
> > and problem reports.
>
> What about adding a sysfs node for it in VMD PCI bus dir, which allows
> users to catch VMD's MSI current working mode?
No, a sysfs node is not the answer to this. If we *can* avoid a
non-working situation, we should avoid it. If users see a non-working
situation, they will rightly complain, and somebody will have to debug
it. We don't want that.
> > I don't know what "guest passthrough mode" is. Can you detect that
> > automatically?
>
> I quote this from the commit ee81ee84f873's comment, it can be detected by the
> logic like this:
> if (!(features & VMD_FEAT_CAN_BYPASS_MSI_REMAP) ||
> offset[0] || offset[1])
> I just want to answer your comment: "There's also a hint that some
> virt configs require it."
> This patch will not modify the logic of determining whether MSI
> remapping is enabled
> when running VMD in Guest.
My point is that apparently guest passthrough mode is relevant and
maybe it should be part of the commit log about how this parameter
should be used.
Bjorn
Powered by blists - more mailing lists