Received: by 2002:a05:7412:d1aa:b0:fc:a2b0:25d7 with SMTP id ba42csp1260653rdb; Tue, 30 Jan 2024 12:52:29 -0800 (PST) X-Google-Smtp-Source: AGHT+IFYPg9qJht0fW8GSg0xHlbTUs2aWex3DCpQYzWc9O5Q14HjJS9pmL9KMnFgGgBqCFBvQRIQ X-Received: by 2002:a05:6a20:8ca1:b0:19a:4462:4ad6 with SMTP id k33-20020a056a208ca100b0019a44624ad6mr5171665pzh.31.1706647949294; Tue, 30 Jan 2024 12:52:29 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1706647949; cv=pass; d=google.com; s=arc-20160816; b=DXm1LOS/dABPaL47BdWqkZWeJLGFh6sSLFDoAHQFiphkofuhNuxTnoPqMJFIlMNCQx /nuww8Zqow+iJ/IgMuYw1IFeILNMh8GKhTWqWyNEChG84eBDYphz8RzrRe65ql4WnNGp jczRJghOiGDxdGfFivUAQ6xZ2igxJAWrB5KA7xpZGFhWb7APWd6bLS1SoUkIIipc6yya jx8kuyy7CT+/5ItOFxoSDiiOetDCrfLDNI4RhmNHaAA/XNd3+cp/5fjOXHALmhlvlNM2 ZTfp8myZTQWsKZb3L2eF3bqbi4GmijdfvxKv6k1EfxVphg+QXV0eduJxpQOBQSYlh91p Lq6g== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-transfer-encoding:content-disposition :mime-version:list-unsubscribe:list-subscribe:list-id:precedence :message-id:subject:cc:to:from:date:dkim-signature; bh=u6LCPh9wm0ONHJtOfV9OOF3/lU78jS7dhdKo0L9GL5U=; fh=XZStK1AMBWqaYRV6Qme96Ipvp+wQJ08PzOIMYdTL4lU=; b=z0bGslsnB71O9B07wLk2gfVTniAeyMGlz4PDk7NgG7WljEkppI/QD4lEZ6DLyBcjvU ixBAIrhmROAYEtNzVPAxs+iWUx5AXtI7fPkM1ymN1B4Eo3NNhtqfZpeI6xA3dGqSeiEo g5cSYaJX61T0H41ijUoE+J2Xq8ZNHV9Fv7InLoT/XMPFrkO8uzqTD1dnwaKZoxWzMlUY U6qwvuh0DfVkKGWWR52fpZ/odRoOemz+UZGceYV/DpA3hoIFszK0WmGcrydUxQ6FE3vS aaNj92ysCPgVENuJbc02PLURitDbPfxfc+9ddr05FpCB98FIQpZAI7gjlVXbJ7ec7kXn oclg== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="r3Am/ZUF"; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-45290-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-45290-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [2604:1380:45e3:2400::1]) by mx.google.com with ESMTPS id x9-20020a056a00188900b006dddff46330si8108606pfh.216.2024.01.30.12.52.29 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 30 Jan 2024 12:52:29 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-45290-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) client-ip=2604:1380:45e3:2400::1; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="r3Am/ZUF"; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-45290-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-45290-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id 9AACD28D240 for ; Tue, 30 Jan 2024 20:44:13 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 5A01471B32; Tue, 30 Jan 2024 20:44:06 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="r3Am/ZUF" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 72A6555E6B; Tue, 30 Jan 2024 20:44:05 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706647445; cv=none; b=RIWSysdzF7yfPSW8Kvud1ZrYObdBiaJKFqxJ5RyAsxE7DTgYn0ClGVLqAe5E5VseyIGCTAdPcJgvzRfB451iNVIYug+6R4sOGflQCI4LhaMM6wtlv0kZ3Zf31wmMii9+8w23FikEVgSEIBGBeN9SbZYMfUbLQkn5GhrIudeYzfU= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706647445; c=relaxed/simple; bh=bPw6ruebyasCXorT1LdxWx1GajiUvbLKrTDw9DFK5FA=; h=Date:From:To:Cc:Subject:Message-ID:MIME-Version:Content-Type: Content-Disposition:In-Reply-To; b=dHRxn6Jn+lZoPm0BJZL/P1o9RgsZjiSDL4ITbfhrSYYdbq0q/A2NLYCaoZbBPoGzYu4ImusDLta3CYEBK3oO4I/woOJ97aTjasjC+gJQ5S2YtrXXBOGBCoTue6+3kFAmGuoaPjgGryNMdn+0LY1XT/wJB23fYl+/asvyCwknga8= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=r3Am/ZUF; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id 94EBFC433F1; Tue, 30 Jan 2024 20:44:04 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1706647444; bh=bPw6ruebyasCXorT1LdxWx1GajiUvbLKrTDw9DFK5FA=; h=Date:From:To:Cc:Subject:In-Reply-To:From; b=r3Am/ZUFJ5LvciFl7LpCgQQZ28jpBwPyRmGVj9C9/vS9yk40Aa7U+KC6hq/oO2B7n wDQJ8uK7Ltr51lQF8BQiAA8Skty5QBeFsH0/3E1VTaUey75oUEjjsZccrwn+o0MZeE Miv8UzxNckXMSMLvDHFGUgNXH0sZypZ7xRpaMpeTurT916gRzkt54hEEq2RxhsCyxH s9nK0ukGPiRl9D3B/hcIKbaI2t/XGCd1zfkzJo3hNN89BP3waa48nxA5jOnij4C3r2 kY5KfQ5U4IsSneu4O25TjKls3lCrZLcTzm7OdlZZdjiu5xgCsOncdeDuXSXJQsxfgP 3wdiZdO2KG//w== Date: Tue, 30 Jan 2024 14:44:03 -0600 From: Bjorn Helgaas To: Roger Pau =?utf-8?B?TW9ubsOp?= Cc: "Chen, Jiqian" , "Rafael J . Wysocki" , Len Brown , Juergen Gross , Stefano Stabellini , Oleksandr Tyshchenko , Boris Ostrovsky , Bjorn Helgaas , "xen-devel@lists.xenproject.org" , "linux-pci@vger.kernel.org" , "linux-kernel@vger.kernel.org" , "linux-acpi@vger.kernel.org" , "Hildebrand, Stewart" , "Huang, Ray" , "Ragiadakou, Xenia" Subject: Re: [RFC KERNEL PATCH v4 3/3] PCI/sysfs: Add gsi sysfs for pci_dev Message-ID: <20240130204403.GA562912@bhelgaas> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: On Tue, Jan 30, 2024 at 10:07:36AM +0100, Roger Pau Monné wrote: > On Mon, Jan 29, 2024 at 04:01:13PM -0600, Bjorn Helgaas wrote: > > On Thu, Jan 25, 2024 at 07:17:24AM +0000, Chen, Jiqian wrote: > > > On 2024/1/24 00:02, Bjorn Helgaas wrote: > > > > On Tue, Jan 23, 2024 at 10:13:52AM +0000, Chen, Jiqian wrote: > > > >> On 2024/1/23 07:37, Bjorn Helgaas wrote: > > > >>> On Fri, Jan 05, 2024 at 02:22:17PM +0800, Jiqian Chen wrote: > > > >>>> There is a need for some scenarios to use gsi sysfs. > > > >>>> For example, when xen passthrough a device to dumU, it will > > > >>>> use gsi to map pirq, but currently userspace can't get gsi > > > >>>> number. > > > >>>> So, add gsi sysfs for that and for other potential scenarios. > > > >> ... > > > > > > > >>> I don't know enough about Xen to know why it needs the GSI in > > > >>> userspace. Is this passthrough brand new functionality that can't be > > > >>> done today because we don't expose the GSI yet? > > > > I assume this must be new functionality, i.e., this kind of > > passthrough does not work today, right? > > > > > >> has ACPI support and is responsible for detecting and controlling > > > >> the hardware, also it performs privileged operations such as the > > > >> creation of normal (unprivileged) domains DomUs. When we give to a > > > >> DomU direct access to a device, we need also to route the physical > > > >> interrupts to the DomU. In order to do so Xen needs to setup and map > > > >> the interrupts appropriately. > > > > > > > > What kernel interfaces are used for this setup and mapping? > > > > > > For passthrough devices, the setup and mapping of routing physical > > > interrupts to DomU are done on Xen hypervisor side, hypervisor only > > > need userspace to provide the GSI info, see Xen code: > > > xc_physdev_map_pirq require GSI and then will call hypercall to pass > > > GSI into hypervisor and then hypervisor will do the mapping and > > > routing, kernel doesn't do the setup and mapping. > > > > So we have to expose the GSI to userspace not because userspace itself > > uses it, but so userspace can turn around and pass it back into the > > kernel? > > No, the point is to pass it back to Xen, which doesn't know the > mapping between GSIs and PCI devices because it can't execute the ACPI > AML resource methods that provide such information. > > The (Linux) kernel is just a proxy that forwards the hypercalls from > user-space tools into Xen. But I guess Xen knows how to interpret a GSI even though it doesn't have access to AML? > > It seems like it would be better for userspace to pass an identifier > > of the PCI device itself back into the hypervisor. Then the interface > > could be generic and potentially work even on non-ACPI systems where > > the GSI concept doesn't apply. > > We would still need a way to pass the GSI to PCI device relation to > the hypervisor, and then cache such data in the hypervisor. > > I don't think we have any preference of where such information should > be exposed, but given GSIs are an ACPI concept not specific to Xen > they should be exposed by a non-Xen specific interface. AFAIK Linux doesn't expose GSIs directly to userspace yet. The GSI concept relies on ACPI MADT, _MAT, _PRT, etc. A GSI is associated with some device (PCI in this case) and some interrupt controller entry. I don't understand how a GSI value is useful without knowing something about that framework in which GSIs exist. Obviously I know less than nothing about Xen, so I apologize for asking all these stupid questions, but it just doesn't all make sense to me yet. Bjorn