Re: [PATCH v3 0/2] VFIO mdev aggregated resources handling

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, 10 Jul 2020 09:58:49 +0800
Yan Zhao <yan.y.zhao@xxxxxxxxx> wrote:

> On Thu, Jul 09, 2020 at 02:22:26PM -0600, Alex Williamson wrote:
> > On Thu, 9 Jul 2020 15:23:34 +0800
> > Yan Zhao <yan.y.zhao@xxxxxxxxx> wrote:
> >   
> > > On Thu, Jul 09, 2020 at 02:53:05AM +0000, Tian, Kevin wrote:
> > > 
> > > <...>  
> > > > > We also can't even seem to agree that type is a necessary requirement
> > > > > for compatibility.  Your discussion below of a type-A, which is
> > > > > equivalent to a type-B w/ aggregation set to some value is an example
> > > > > of this.  We might also have physical devices with extensions to
> > > > > support migration.  These could possibly be compatible with full mdev
> > > > > devices.  We have no idea how an administrative tool would discover
> > > > > this other than an exhaustive search across every possible target.
> > > > > That's ugly but feasible when considering a single target host, but
> > > > > completely untenable when considering a datacenter.    
> > > > 
> > > > If exhaustive search can be done just one-off to build the compatibility
> > > > database for all assignable devices on each node, then it might be
> > > > still tenable in datacenter?    
> > > yes, Alex, do you think below behavior to build compatibility database is
> > > acceptable?
> > > 
> > > management stack could do the exhaustive search in one shot to build the
> > > compatibility database for all devices in every node. Meanwhile, it caches
> > > migration version strings for all tested devices.
> > > when there's a newly created/attached device, management stack could write
> > > every cached strings to migration version attribute of the newly
> > > created/attached device in order to update the migration compatibility
> > > database. Then it caches the migration version string of the newly
> > > created/attached device as well.
> > > once a device attribute is modified, e.g. after changing its aggregation
> > > count or updating its parent driver, update its cached migration version
> > > string and update the compatibility database by testing against migration
> > > version attribute of this device.  
> > 
> > This is exactly the scenario that I think is untenable.  You're asking
> > a management application to keep a live database of the opaque version
> > string of every device type and likely every instance of a device,
> > which it's not allowed to compare on its own, it can only pipe them  
> if management stack is allowed to compare on its own, then the migration
> version strings have to be standardized.
> 
> But it's a little hard to do it.
> e.g. 
> for GVT, string format can be
> "parent device PCI ID" + "version of gvt driver" + "mdev type" +
> "aggregator count".
> 
> for an NVMe VF connecting to a remote storage. it is
> "PCI ID" + "driver version" + "configured remote storage URL"
> 
> for a QAT VF, it's
> "PCI ID" + "driver version" + "supported encryption set".
> 
> The management stack also needs to understand how to compare those
> strings, which is also hard. e.g.
> two device with different PCI IDs are incompatible initially, but later
> because of software upgrade, they are compatible again.

You're rehashing all the reasons we decided to make the string opaque.
Your examples include driver version information, but different driver
versions don't necessarily imply incompatibility.  Therefore the only
means that a consumer of the version string really has for determining
compatibility is to push that version string back into the driver and
ask whether it it's compatible.  The absolute only test that a
management tool could do on its own would be a simple strcmp(), but
clearly that can't support different driver versions or parent device
IDs, or any other field of the proposed version string.  These examples
are also extremely PCI biased, we need a solution that supports any
type of device.

> > through to every other device across the datacenter to determine which
> > are comparable.  It would need to respond to not only devices being
> > added and removed, but bound and unbound from drivers, and entire nodes
> > being added and removed.  That seems like a lot of overhead, in  
> those responses are also required if the management stack wants to
> compare on its own, right?

I think there needs to be an efficient mechanism to ask, given this
source device, does a target system have a compatible device, or
resources and capacity to create one.  The proposals we're discussing
fail that efficiency qualification in my mind.
 
> > addition to the effect of essentially fuzzing the version interface
> > across all vendors and types.  We need a better solution or we need
> > someone from openstack and ovirt to agree that this is more viable than
> > I suspect. Thanks  
> before we have a better solution, do you think it's good to ask people
> from openstack and ovirt first? what if the problem is not as complicated
> as we thought?

That's exactly what I just suggested here and in the other fork of this
thread.  Thanks,

Alex




[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]

  Powered by Linux