On 21/08/2023 20:32, Laine Stump wrote: > A "VFIO variant" driver is a kernel driver for a device that supports > all the APIs of the basic vfio-pci driver (which enables assigning a > host PCI device to a QEMU guest) plus "some extra stuff" (e.g. to > enable things like saving/restoring device state in order to support > live migration.) > > Way back last year I posted a couple attempts to support VFIO variant > drivers; here is V2 (along with a later followup discussion from a > couple months ago): > > https://listman.redhat.com/archives/libvir-list/2022-August/233661.html > https://listman.redhat.com/archives/libvir-list/2023-May/240108.html > > The mlx5-vfio-pci driver has now been upstream for quite awhile (and > even in the downstream Fedora 38 kernel, for example), as are the > sysfs bits that allow us to determine whether or not a driver is a > VFIO variant, and I've updated the patch(es) to use this. > > I've also been working on auto-binding to the "best-match" VFIO > variant driver based on comparing the device's modalias file in sysfs > to the contents of the kernel's modules.alias file, but that isn't > quite ready (partly code that isn't yet working, but also partly > indecision about exactly where in the XML to put the driver name when > it is specified; I won't take up more space here with that though). > Don't we have a: <interface type='hostdev' managed='yes'> ... <driver name='vfio'> ... </interface/ ... that could be re-used somehow to specify the VFIO variant driver of choice? Somewhat similar to the nodedev-detach equivalent? OTOH, it would only cover networking hostdevs... :/ > In the meantime, there are people who want to use the mlx5-vfio-pci > driver (and Cedric Le Goater also has written vfio-pci-igbvf and > vfio-pci-e1000e drivers (which area very useful for testing), although > I don't think he has posted them anywhere yet), Interesting, e1000e and igbvf have quiesce/resume/dirty-tracking commands? Sounds too old to have :D unless of course this is Qemu-created commands and not actual IGB/E1000e hardware doing those > so I would like to get > the basic patches here merged in upstream now while I continue working > on "Part 2". > > These patches provide two improvements that make testing/using VFIO > drivers much more convenient: > > 1) The specific driver can be given in the virsh nodedev-detach > command (or the virNodeDeviceDetachFlags() API call), e.g.: > > virsh nodedev-detach pci_0000_04_11_5 --driver vfio-pci-igbvf > > 2) If the <hostdev> (or "<interface> ... <type='hostdev'/>" has > "managed='no'", then libvirt will recognize any VFIO variant driver > (rather than the current behavior of rejecting anything that isn't > exactly "vfio-pci") > > With these two capabilities, it's simple and straightforward to bind a > device to a VFIO variant driver, and then start a guest that uses that > device. > Nice Provided the initial use of VFIO variant drivers have been to support live migration, should the hostdev blocker be lifted too *just in case it is simple addition of course* ? In vfio 8.1 it is enabled by default, so there isn't much else to do other than unblock migration with hostdevs. Something like below is <interface> specific; which works but it is likely too specific: diff --git a/src/qemu/qemu_migration.c b/src/qemu/qemu_migration.c index d21551ab07d9..6edc8583c539 100644 --- a/src/qemu/qemu_migration.c +++ b/src/qemu/qemu_migration.c @@ -1316,13 +1316,15 @@ qemuMigrationSrcIsAllowedHostdev(const virDomainDef *def) continue; } - /* all other PCI hostdevs can't be migrated */ + /* some PCI hostdevs can't be migrated */ if (hostdev->parentnet) { - virDomainNetType actualType = virDomainNetGetActualType(hostdev->parentnet); - - virReportError(VIR_ERR_OPERATION_UNSUPPORTED, - _("cannot migrate a domain with <interface type='%1$s'>"), - virDomainNetTypeToString(actualType)); + /* + * Some VFIO network devices can be migrated if vendor + * VFIO driver is used e.g. via mlx5-vfio-pci. + * We leave it up to the live migration blocker in Qemu to + * stop us from proceeding. + */ + continue; } else { virReportError(VIR_ERR_OPERATION_UNSUPPORTED, _("cannot migrate a domain with <hostdev mode='subsystem' type='%1$s'>"), Or even something like this generic to the hostdev as long as it's assigned to a variant driver. For any off shot case that isn't a migration vfio driver then Qemu will fail for us as it will fail to probe the right things e.g. (below is totally untested, it is just for illustration purposes, we can probably do away with just VIR_DOMAIN_HOSTDEV_PCI_BACKEND_VFIO and let Qemu block migration for us?) diff --git a/src/qemu/qemu_migration.c b/src/qemu/qemu_migration.c index d21551ab07d9..1f29493aa0c2 100644 --- a/src/qemu/qemu_migration.c +++ b/src/qemu/qemu_migration.c @@ -1301,6 +1301,8 @@ qemuMigrationSrcIsAllowedHostdev(const virDomainDef *def) return false; case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_PCI: + g_autoptr(virPCIDevice) pci = NULL; + /* * if the device has a <teaming type='transient'> * element, then migration *is* allowed because the @@ -1316,6 +1318,22 @@ qemuMigrationSrcIsAllowedHostdev(const virDomainDef *def) continue; } + if ((hostdev->source.subsys.u.pci.backend == VIR_DOMAIN_HOSTDEV_PCI_BACKEND_VFIO) && + !virHostdevGetPCIHostDevice(hostdev, &pci) && pci) { + g_autofree char *drvPath = NULL; + g_autofree char *drvName = NULL; + + /* + * Some VFIO network devices can be migrated if non standard + * VFIO driver is used. We leave it up to the live migration + * blocker in Qemu to stop us from proceeding. + */ + if (!virPCIDeviceGetCurrentDriverPathAndName(pci, &drvPath, + &drvName) && + !STREQ(drvName, "vfio-pci")) + continue; + } + /* all other PCI hostdevs can't be migrated */ if (hostdev->parentnet) { virDomainNetType actualType = virDomainNetGetActualType(hostdev->parentnet);