public inbox for pve-devel@lists.proxmox.com
 help / color / mirror / Atom feed
* [pve-devel] issues with Virtio-SCSI devicde on Proxmox...
@ 2024-08-12 10:40 Christian Moser
  2024-08-13  8:55 ` Fiona Ebner
                   ` (2 more replies)
  0 siblings, 3 replies; 11+ messages in thread
From: Christian Moser @ 2024-08-12 10:40 UTC (permalink / raw)
  To: pve-devel; +Cc: Christian Moser

Hello,

I work for VSI (VMS Software Inc) which is porting the OpenVMS operating system to x86. At this point we successfully on various
hypervisors, but have some issues on the KVM running on Proxmox.

The OpenVMS VM works just fine with SATA disks and it also works with for example virtio-network device etc., but trying to use
virtio-scsi hangs  the driver. I have debugged this and I can successfully configure the port/controller, send the IO request to the
device. It then gets processed by the device, which posts the results and sets the interrupt bit in the ISR register, but it never
asserts the interrupt hence the driver never gets notified and the I/O hangs.

I have tried both “virtio-scsi-pci” and “virtio-scsi-single”, but no luck. The emulated virtio-scsi device is a legacy device. But
then again, the virtio-network device is also a legacy device and here we are getting interrupts. One thing which bothers me is the
fact that the “legacy interrupt disable” bit is set in the PCI config space of the virtio-scsi device (i.e. bit 10 at offset 4)

Questions:
*	is there a way to configure a modern virtio-scsi devcie (i.e. disable_legacy=on) ?
*	why is the legacy interrupt bit set in the PCI config space ?
*	Are there any working driver for virtio-scsi on this KVM using Q35 machine? i.e. any other OS

Any thoughts why these interrupts are not getting delivered on the PCIE bus?

thanks

/cmos

_______________________________________________________
Christian Moser
Mobile:    +358-40-5022105			
Email:      cmos@maklee.com
URL:       www.maklee.com

_______________________________________________
pve-devel mailing list
pve-devel@lists.proxmox.com
https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel

^ permalink raw reply	[flat|nested] 11+ messages in thread

* Re: [pve-devel] issues with Virtio-SCSI devicde on Proxmox...
  2024-08-12 10:40 [pve-devel] issues with Virtio-SCSI devicde on Proxmox Christian Moser
@ 2024-08-13  8:55 ` Fiona Ebner
  2024-08-13  9:33   ` [pve-devel] FW: " Christian Moser
                     ` (2 more replies)
  2024-08-13 16:12 ` [pve-devel] " DERUMIER, Alexandre via pve-devel
       [not found] ` <67b222322506a9eab0f7cf7da5a9fd715c8a91ff.camel@groupe-cyllene.com>
  2 siblings, 3 replies; 11+ messages in thread
From: Fiona Ebner @ 2024-08-13  8:55 UTC (permalink / raw)
  To: Proxmox VE development discussion, Christian Moser

Hi,

Am 12.08.24 um 12:40 schrieb Christian Moser:
> Hello,
> 
> I work for VSI (VMS Software Inc) which is porting the OpenVMS operating system to x86. At this point we successfully on various
> hypervisors, but have some issues on the KVM running on Proxmox.
> 
> The OpenVMS VM works just fine with SATA disks and it also works with for example virtio-network device etc., but trying to use
> virtio-scsi hangs  the driver. I have debugged this and I can successfully configure the port/controller, send the IO request to the
> device. It then gets processed by the device, which posts the results and sets the interrupt bit in the ISR register, but it never
> asserts the interrupt hence the driver never gets notified and the I/O hangs.
> 
> I have tried both “virtio-scsi-pci” and “virtio-scsi-single”, but no luck. The emulated virtio-scsi device is a legacy device. But
> then again, the virtio-network device is also a legacy device and here we are getting interrupts. One thing which bothers me is the
> fact that the “legacy interrupt disable” bit is set in the PCI config space of the virtio-scsi device (i.e. bit 10 at offset 4)
> 
> Questions:
> *	is there a way to configure a modern virtio-scsi devcie (i.e. disable_legacy=on) ?

I've already answered this question when you asked in a mail addressed
directly to me:

Am 12.08.24 um 11:58 schrieb Fiona Ebner:
> Hi,
> 
> It seems that you either need to attach the "virtio-scsi-pci" device to
> a pcie bus or explicitly set the "disable_legacy=on" option for the
> device, neither of which Proxmox VE currently does or allows
> configuring. The only way right now seems to be to attach the disk
> yourself via custom arguments (the 'args' in the Proxmox VE VM
> configuration), but then the disk will be invisible to Proxmox VE
> operations which look at specific disk keys in the configuration!
> 
> Feel free to open a feature request on our bug tracker to make this
> configurable: https://bugzilla.proxmox.com/
> 
> P.S. Please write to the developer list rather than individual
> developers for such questions in the feature:
> https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel
> 
> Best Regards,
> Fiona

> *	why is the legacy interrupt bit set in the PCI config space ?

Most likely because the virtio-scsi-pci is configured without the
"disable_legacy=on" option. If not explicitly set, the option will be
"disable_legacy=auto" and when not attached to PCIe (which is the case
for Proxmox VE currently), then legacy mode will be enabled.

> *	Are there any working driver for virtio-scsi on this KVM using Q35 machine? i.e. any other OS

The virtio drivers for Windows and the ones in Linux work just fine with
our configuration.


> Any thoughts why these interrupts are not getting delivered on the PCIE bus?

We do not configure the virtio-scsi-pci on a PCIe bus currently, see my
initial answer.

Best Regards,
Fiona


_______________________________________________
pve-devel mailing list
pve-devel@lists.proxmox.com
https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel

^ permalink raw reply	[flat|nested] 11+ messages in thread

* [pve-devel] FW:  issues with Virtio-SCSI devicde on Proxmox...
  2024-08-13  8:55 ` Fiona Ebner
@ 2024-08-13  9:33   ` Christian Moser
  2024-08-14  6:44   ` [pve-devel] " DERUMIER, Alexandre via pve-devel
       [not found]   ` <1178cb3475d719ae31f0c375cd3930fc24d98401.camel@groupe-cyllene.com>
  2 siblings, 0 replies; 11+ messages in thread
From: Christian Moser @ 2024-08-13  9:33 UTC (permalink / raw)
  To: 'Proxmox VE development discussion'; +Cc: Christian Moser

Hello,

what I have been trying to tell is that both virtio-scsi and virtio-network device on Proxmox are both getting configured on PCIE. I do not understand why you claim that virtio-scsi is not configured on PCIE.

So both virtio-scsi and virtio-network devices on Proxmox are configured as legacy devices on PCIE and the virtio-network device works just fine and does get interrupts.
I also believe that the virtio-scsi device is working fine and it does set the interrupt bit in the ISR register, but no interrupt gets delivered to the driver.

I'm now trying to find out if the problem is on our side, i.e. that our PCIE "setup" is getting the interrupt, but not delivering it to the device. Or that we never got the interrupt and then the issue would most likely be in the Proxomox implementation. But your statement that other OS virtio-scsi devices are working fine might indicate the problem to be on our side.

We do have a problem with interrupt delivery on Virtualbox (by Oracle) and they acknowledged an issue with bridges and interrupt routing, that's why I was contacting Proxmox to see if there could be an issue there too

thanks

/cmos

_______________________________________________________
Christian Moser
Mobile:    +358-40-5022105			
Email:     cmos@maklee.com
URL:       www.maklee.com
-----Original Message-----
From: Fiona Ebner <f.ebner@proxmox.com> 
Sent: Tuesday, August 13, 2024 11:56
To: Proxmox VE development discussion <pve-devel@lists.proxmox.com>; Christian Moser <cmos@maklee.com>
Subject: Re: [pve-devel] issues with Virtio-SCSI devicde on Proxmox...

Hi,

Am 12.08.24 um 12:40 schrieb Christian Moser:
> Hello,
> 
> I work for VSI (VMS Software Inc) which is porting the OpenVMS 
> operating system to x86. At this point we successfully on various hypervisors, but have some issues on the KVM running on Proxmox.
> 
> The OpenVMS VM works just fine with SATA disks and it also works with 
> for example virtio-network device etc., but trying to use virtio-scsi 
> hangs  the driver. I have debugged this and I can successfully 
> configure the port/controller, send the IO request to the device. It then gets processed by the device, which posts the results and sets the interrupt bit in the ISR register, but it never asserts the interrupt hence the driver never gets notified and the I/O hangs.
> 
> I have tried both “virtio-scsi-pci” and “virtio-scsi-single”, but no 
> luck. The emulated virtio-scsi device is a legacy device. But then 
> again, the virtio-network device is also a legacy device and here we 
> are getting interrupts. One thing which bothers me is the fact that 
> the “legacy interrupt disable” bit is set in the PCI config space of 
> the virtio-scsi device (i.e. bit 10 at offset 4)
> 
> Questions:
> *	is there a way to configure a modern virtio-scsi devcie (i.e. disable_legacy=on) ?

I've already answered this question when you asked in a mail addressed directly to me:

Am 12.08.24 um 11:58 schrieb Fiona Ebner:
> Hi,
> 
> It seems that you either need to attach the "virtio-scsi-pci" device 
> to a pcie bus or explicitly set the "disable_legacy=on" option for the 
> device, neither of which Proxmox VE currently does or allows 
> configuring. The only way right now seems to be to attach the disk 
> yourself via custom arguments (the 'args' in the Proxmox VE VM 
> configuration), but then the disk will be invisible to Proxmox VE 
> operations which look at specific disk keys in the configuration!
> 
> Feel free to open a feature request on our bug tracker to make this
> configurable: https://bugzilla.proxmox.com/
> 
> P.S. Please write to the developer list rather than individual 
> developers for such questions in the feature:
> https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel
> 
> Best Regards,
> Fiona

> *	why is the legacy interrupt bit set in the PCI config space ?

Most likely because the virtio-scsi-pci is configured without the "disable_legacy=on" option. If not explicitly set, the option will be "disable_legacy=auto" and when not attached to PCIe (which is the case for Proxmox VE currently), then legacy mode will be enabled.

> *	Are there any working driver for virtio-scsi on this KVM using Q35 machine? i.e. any other OS

The virtio drivers for Windows and the ones in Linux work just fine with our configuration.


> Any thoughts why these interrupts are not getting delivered on the PCIE bus?

We do not configure the virtio-scsi-pci on a PCIe bus currently, see my initial answer.

Best Regards,
Fiona


_______________________________________________
pve-devel mailing list
pve-devel@lists.proxmox.com
https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel

^ permalink raw reply	[flat|nested] 11+ messages in thread

* Re: [pve-devel] issues with Virtio-SCSI devicde on Proxmox...
  2024-08-12 10:40 [pve-devel] issues with Virtio-SCSI devicde on Proxmox Christian Moser
  2024-08-13  8:55 ` Fiona Ebner
@ 2024-08-13 16:12 ` DERUMIER, Alexandre via pve-devel
       [not found] ` <67b222322506a9eab0f7cf7da5a9fd715c8a91ff.camel@groupe-cyllene.com>
  2 siblings, 0 replies; 11+ messages in thread
From: DERUMIER, Alexandre via pve-devel @ 2024-08-13 16:12 UTC (permalink / raw)
  To: pve-devel; +Cc: DERUMIER, Alexandre, cmos

[-- Attachment #1: Type: message/rfc822, Size: 19027 bytes --]

From: "DERUMIER, Alexandre" <alexandre.derumier@groupe-cyllene.com>
To: "pve-devel@lists.proxmox.com" <pve-devel@lists.proxmox.com>
Cc: "cmos@maklee.com" <cmos@maklee.com>
Subject: Re: [pve-devel] issues with Virtio-SCSI devicde on Proxmox...
Date: Tue, 13 Aug 2024 16:12:42 +0000
Message-ID: <67b222322506a9eab0f7cf7da5a9fd715c8a91ff.camel@groupe-cyllene.com>

Hi,

Currently they are no way to add custom options for virtio-devices
command line from vm config, so it should be patched to add support for
openvms os and add special tuning.

for 
example:https://git.proxmox.com/?p=qemu-server.git;a=blob_plain;f=PVE/QemuServer.pm;hb=HEAD
sub print_netdevice_full {
 ....

if ($conf->{ostype} && $conf->{ostype} eq 'openvms') {
    tmpstr .= ",disable_legacy=on";
}


>>I have tried both “virtio-scsi-pci” and “virtio-scsi-single”, but no
>>luck. The emulated virtio-scsi device is a legacy device
>>
>>
>>Questions:
>>*	is there a way to configure a modern virtio-scsi devcie (i.e.
>>disable_legacy=on) ?
>>

Do you mean than currently on proxmox, the default is legacy mode and
and not modern ?  I was pretty sure than qemu was defaulting to modern,

and that you need to use  ",disable-legacy=off,disable-modern=true" to
switch to legacy.

(and AFAIK, proxmox qemu version don't have any patch forcing legacy)

but maybe I'm wrong



maybe it's only enabled by default with pci-express (using q35 machine
model) ?

https://github.com/qemu/qemu/blob/9eb51530c12ae645b91e308d16196c68563ea883/docs/pcie.txt
"Virtio devices plugged into PCI Express ports are PCI Express devices
and
have "1.0" behavior by default without IO support.
In both cases disable-legacy and disable-modern properties can be used
to override the behaviour."


in qemu code I see:

https://github.com/qemu/qemu/blob/9eb51530c12ae645b91e308d16196c68563ea883/hw/core/machine.c#L258
GlobalProperty hw_compat_2_6[] = {
    { "virtio-mmio", "format_transport_address", "off" },
    /* Optional because not all virtio-pci devices support legacy mode
*/
    { "virtio-pci", "disable-modern", "on",  .optional = true },
    { "virtio-pci", "disable-legacy", "off", .optional = true },
};
const size_t hw_compat_2_6_len = G_N_ELEMENTS(hw_compat_2_6);

so I'm really not sure what is the real default


do you have qemu command line of another kvm hypervisor
(ovirt,rhev,...) where it's working correctly ?  Maybe they are
enabling modern bits manually , when a virtio device is supporting it ?



-------- Message initial --------
De: Christian Moser <cmos@maklee.com>
Répondre à: Proxmox VE development discussion <pve-
devel@lists.proxmox.com>
À: pve-devel@lists.proxmox.com
Cc: Christian Moser <cmos@maklee.com>
Objet: [pve-devel] issues with Virtio-SCSI devicde on Proxmox...
Date: 12/08/2024 12:40:10

Hello,

I work for VSI (VMS Software Inc) which is porting the OpenVMS
operating system to x86. At this point we successfully on various
hypervisors, but have some issues on the KVM running on Proxmox.

The OpenVMS VM works just fine with SATA disks and it also works with
for example virtio-network device etc., but trying to use
virtio-scsi hangs  the driver. I have debugged this and I can
successfully configure the port/controller, send the IO request to the
device. It then gets processed by the device, which posts the results
and sets the interrupt bit in the ISR register, but it never
asserts the interrupt hence the driver never gets notified and the I/O
hangs.

I have tried both “virtio-scsi-pci” and “virtio-scsi-single”, but no
luck. The emulated virtio-scsi device is a legacy device. But
then again, the virtio-network device is also a legacy device and here
we are getting interrupts. One thing which bothers me is the
fact that the “legacy interrupt disable” bit is set in the PCI config
space of the virtio-scsi device (i.e. bit 10 at offset 4)

Questions:
*	is there a way to configure a modern virtio-scsi devcie (i.e.
disable_legacy=on) ?
*	why is the legacy interrupt bit set in the PCI config space ?
*	Are there any working driver for virtio-scsi on this KVM using
Q35 machine? i.e. any other OS

Any thoughts why these interrupts are not getting delivered on the PCIE
bus?

thanks

/cmos

_______________________________________________________
Christian Moser
Mobile:    +358-40-5022105			
Email:      cmos@maklee.com
URL:       www.maklee.com

_______________________________________________
pve-devel mailing list
pve-devel@lists.proxmox.com
https://antiphishing.vadesecure.com/v4?f=MXNCQ25TYXBra2RFV0VXZHojMIIFPS
zCvkhJApFQpU82zfAhP9K7STA7y-
wx1jAbgWgLhPFHm0qw3LR0qKok0w&i=cVVpR014Sk93Z0c1QzFSMs3n08s7G9NqllHFFNJ9
1W0&k=ThnE&r=VWoxMWNDTTl5UmRwenhPYicvAeXd4xlreb0WEHQKfL1pVhoIeFvTknKKfK
g5BYLZ&s=c0303a1ebcdeef9c5d38eaa27d25b873b9eed7bddb72bc270d5944f93d63bb
ec&u=https%3A%2F%2Flists.proxmox.com%2Fcgi-
bin%2Fmailman%2Flistinfo%2Fpve-devel


[-- Attachment #2: Type: text/plain, Size: 160 bytes --]

_______________________________________________
pve-devel mailing list
pve-devel@lists.proxmox.com
https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel

^ permalink raw reply	[flat|nested] 11+ messages in thread

* [pve-devel] FW:  issues with Virtio-SCSI devicde on Proxmox...
       [not found] ` <67b222322506a9eab0f7cf7da5a9fd715c8a91ff.camel@groupe-cyllene.com>
@ 2024-08-14  6:42   ` Christian Moser
  0 siblings, 0 replies; 11+ messages in thread
From: Christian Moser @ 2024-08-14  6:42 UTC (permalink / raw)
  To: 'DERUMIER, Alexandre', pve-devel; +Cc: Christian Moser

Alexandre,

thank you for your information. On another KVM, the virtio-scsi device has the hardware id of 0x10481AF4, whereas on Proxmox is has 0x10041AF4, which is a legacy device.

But after more testing, I do not think that the issue is related to legacy vs modern device, but rather interrupt related, because our driver on Proxmox does not receive the device interrupt. I'm doing now more homework on our side to see if the system (i.e. OpenVMS) does get the interrupt, but is not delivering it to the device. So I'm looking at out bus support code to check out things related to interrupt delivery. If the system does get the interrupt (since the virtio-scsi device did set the interrupt bit in the ISR register), then the issue is on our side. If we do not get the interrupt at all, then there is still something going with Proxmox and OpenVMS guest OS.

Thanks for your answers and pointers, but for now, I do some more homework

/cmos 

_______________________________________________________
Christian Moser
Mobile:    +358-40-5022105			
Email:     cmos@maklee.com
URL:       www.maklee.com
-----Original Message-----
From: DERUMIER, Alexandre <alexandre.derumier@groupe-cyllene.com> 
Sent: Tuesday, August 13, 2024 19:13
To: pve-devel@lists.proxmox.com
Cc: cmos@maklee.com
Subject: Re: [pve-devel] issues with Virtio-SCSI devicde on Proxmox...

Hi,

Currently they are no way to add custom options for virtio-devices command line from vm config, so it should be patched to add support for openvms os and add special tuning.

for
example:https://git.proxmox.com/?p=qemu-server.git;a=blob_plain;f=PVE/QemuServer.pm;hb=HEAD
sub print_netdevice_full {
 ....

if ($conf->{ostype} && $conf->{ostype} eq 'openvms') {
    tmpstr .= ",disable_legacy=on";
}


>>I have tried both “virtio-scsi-pci” and “virtio-scsi-single”, but no 
>>luck. The emulated virtio-scsi device is a legacy device
>>
>>
>>Questions:
>>*	is there a way to configure a modern virtio-scsi devcie (i.e.
>>disable_legacy=on) ?
>>

Do you mean than currently on proxmox, the default is legacy mode and and not modern ?  I was pretty sure than qemu was defaulting to modern,

and that you need to use  ",disable-legacy=off,disable-modern=true" to switch to legacy.

(and AFAIK, proxmox qemu version don't have any patch forcing legacy)

but maybe I'm wrong



maybe it's only enabled by default with pci-express (using q35 machine
model) ?

https://github.com/qemu/qemu/blob/9eb51530c12ae645b91e308d16196c68563ea883/docs/pcie.txt
"Virtio devices plugged into PCI Express ports are PCI Express devices and have "1.0" behavior by default without IO support.
In both cases disable-legacy and disable-modern properties can be used to override the behaviour."


in qemu code I see:

https://github.com/qemu/qemu/blob/9eb51530c12ae645b91e308d16196c68563ea883/hw/core/machine.c#L258
GlobalProperty hw_compat_2_6[] = {
    { "virtio-mmio", "format_transport_address", "off" },
    /* Optional because not all virtio-pci devices support legacy mode */
    { "virtio-pci", "disable-modern", "on",  .optional = true },
    { "virtio-pci", "disable-legacy", "off", .optional = true }, }; const size_t hw_compat_2_6_len = G_N_ELEMENTS(hw_compat_2_6);

so I'm really not sure what is the real default


do you have qemu command line of another kvm hypervisor
(ovirt,rhev,...) where it's working correctly ?  Maybe they are enabling modern bits manually , when a virtio device is supporting it ?



-------- Message initial --------
De: Christian Moser <cmos@maklee.com>
Répondre à: Proxmox VE development discussion <pve- devel@lists.proxmox.com>
À: pve-devel@lists.proxmox.com
Cc: Christian Moser <cmos@maklee.com>
Objet: [pve-devel] issues with Virtio-SCSI devicde on Proxmox...
Date: 12/08/2024 12:40:10

Hello,

I work for VSI (VMS Software Inc) which is porting the OpenVMS operating system to x86. At this point we successfully on various hypervisors, but have some issues on the KVM running on Proxmox.

The OpenVMS VM works just fine with SATA disks and it also works with for example virtio-network device etc., but trying to use virtio-scsi hangs  the driver. I have debugged this and I can successfully configure the port/controller, send the IO request to the device. It then gets processed by the device, which posts the results and sets the interrupt bit in the ISR register, but it never asserts the interrupt hence the driver never gets notified and the I/O hangs.

I have tried both “virtio-scsi-pci” and “virtio-scsi-single”, but no luck. The emulated virtio-scsi device is a legacy device. But then again, the virtio-network device is also a legacy device and here we are getting interrupts. One thing which bothers me is the fact that the “legacy interrupt disable” bit is set in the PCI config space of the virtio-scsi device (i.e. bit 10 at offset 4)

Questions:
*	is there a way to configure a modern virtio-scsi devcie (i.e.
disable_legacy=on) ?
*	why is the legacy interrupt bit set in the PCI config space ?
*	Are there any working driver for virtio-scsi on this KVM using
Q35 machine? i.e. any other OS

Any thoughts why these interrupts are not getting delivered on the PCIE bus?

thanks

/cmos

_______________________________________________________
Christian Moser
Mobile:    +358-40-5022105			
Email:      cmos@maklee.com
URL:       www.maklee.com

_______________________________________________
pve-devel mailing list
pve-devel@lists.proxmox.com
https://antiphishing.vadesecure.com/v4?f=MXNCQ25TYXBra2RFV0VXZHojMIIFPS
zCvkhJApFQpU82zfAhP9K7STA7y-
wx1jAbgWgLhPFHm0qw3LR0qKok0w&i=cVVpR014Sk93Z0c1QzFSMs3n08s7G9NqllHFFNJ9
1W0&k=ThnE&r=VWoxMWNDTTl5UmRwenhPYicvAeXd4xlreb0WEHQKfL1pVhoIeFvTknKKfK
g5BYLZ&s=c0303a1ebcdeef9c5d38eaa27d25b873b9eed7bddb72bc270d5944f93d63bb
ec&u=https%3A%2F%2Flists.proxmox.com%2Fcgi-
bin%2Fmailman%2Flistinfo%2Fpve-devel



_______________________________________________
pve-devel mailing list
pve-devel@lists.proxmox.com
https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel

^ permalink raw reply	[flat|nested] 11+ messages in thread

* Re: [pve-devel] issues with Virtio-SCSI devicde on Proxmox...
  2024-08-13  8:55 ` Fiona Ebner
  2024-08-13  9:33   ` [pve-devel] FW: " Christian Moser
@ 2024-08-14  6:44   ` DERUMIER, Alexandre via pve-devel
       [not found]   ` <1178cb3475d719ae31f0c375cd3930fc24d98401.camel@groupe-cyllene.com>
  2 siblings, 0 replies; 11+ messages in thread
From: DERUMIER, Alexandre via pve-devel @ 2024-08-14  6:44 UTC (permalink / raw)
  To: pve-devel, cmos; +Cc: DERUMIER, Alexandre

[-- Attachment #1: Type: message/rfc822, Size: 19942 bytes --]

From: "DERUMIER, Alexandre" <alexandre.derumier@groupe-cyllene.com>
To: "pve-devel@lists.proxmox.com" <pve-devel@lists.proxmox.com>, "cmos@maklee.com" <cmos@maklee.com>
Subject: Re: [pve-devel] issues with Virtio-SCSI devicde on Proxmox...
Date: Wed, 14 Aug 2024 06:44:36 +0000
Message-ID: <1178cb3475d719ae31f0c375cd3930fc24d98401.camel@groupe-cyllene.com>

Hi,

I didn't see the responde of Fiona but indeed:

https://lists.gnu.org/archive/html/qemu-devel/2021-09/msg01567.html

"virtio devices can be exposed in upto three ways

 - Legacy - follows virtio 0.9 specification. always uses PCI
            ID range 0x1000-0x103F
 - Transitional - follows virtio 0.9 specification by default, but
                  can auto-negotiate with guest for 1.0 spce. Always
                  uses PCI ID range 0x1000-0x103F
 - Modern - follows virtio 1.0 specification. always uses PCI
            ID range 0x1040-0x107F

With QEMU, historically devices placed on a PCI bus will always default
to being in transitional mode, while devices placed on a PCI-E bus will
always dfault to being in modern mode.
"


-------- Message initial --------
De: Fiona Ebner <f.ebner@proxmox.com>
Répondre à: Proxmox VE development discussion <pve-
devel@lists.proxmox.com>
À: Proxmox VE development discussion <pve-devel@lists.proxmox.com>,
Christian Moser <cmos@maklee.com>
Objet: Re: [pve-devel] issues with Virtio-SCSI devicde on Proxmox...
Date: 13/08/2024 10:55:47

Hi,

Am 12.08.24 um 12:40 schrieb Christian Moser:
> Hello,
> 
> I work for VSI (VMS Software Inc) which is porting the OpenVMS
> operating system to x86. At this point we successfully on various
> hypervisors, but have some issues on the KVM running on Proxmox.
> 
> The OpenVMS VM works just fine with SATA disks and it also works with
> for example virtio-network device etc., but trying to use
> virtio-scsi hangs  the driver. I have debugged this and I can
> successfully configure the port/controller, send the IO request to
> the
> device. It then gets processed by the device, which posts the results
> and sets the interrupt bit in the ISR register, but it never
> asserts the interrupt hence the driver never gets notified and the
> I/O hangs.
> 
> I have tried both “virtio-scsi-pci” and “virtio-scsi-single”, but no
> luck. The emulated virtio-scsi device is a legacy device. But
> then again, the virtio-network device is also a legacy device and
> here we are getting interrupts. One thing which bothers me is the
> fact that the “legacy interrupt disable” bit is set in the PCI config
> space of the virtio-scsi device (i.e. bit 10 at offset 4)
> 
> Questions:
> * is there a way to configure a modern virtio-scsi devcie (i.e.
> disable_legacy=on) ?

I've already answered this question when you asked in a mail addressed
directly to me:

Am 12.08.24 um 11:58 schrieb Fiona Ebner:
> Hi,
> 
> It seems that you either need to attach the "virtio-scsi-pci" device
> to
> a pcie bus or explicitly set the "disable_legacy=on" option for the
> device, neither of which Proxmox VE currently does or allows
> configuring. The only way right now seems to be to attach the disk
> yourself via custom arguments (the 'args' in the Proxmox VE VM
> configuration), but then the disk will be invisible to Proxmox VE
> operations which look at specific disk keys in the configuration!
> 
> Feel free to open a feature request on our bug tracker to make this
> configurable:
> https://antiphishing.vadesecure.com/v4?f=MDk0SW9xRkhTVGYydkJlTIW3tbTr
> aK7neiUoWcvis0-pokd-Q2cwuWCZhgBcTw_yw4KqJS-oP6jCsk-zj-
> 1YMQ&i=ZURHSDhnY0huQ2tPS3VZahJdhRaQu1ItpJrYkl8wXrA&k=q1N6&r=RjIyR1Rob
> kVxVWlHTXhKT3I72JjP2S9ryFg3B_csBogfeb2oROpP8B8yUJUd6awk&s=1aab5a2ada7
> 3beb46aa02df4e18ff6c5ba2db6d6ff2d1f302a3c4c83b13c8ef6&u=https%3A%2F%2
> Fbugzilla.proxmox.com%2F
> 
> P.S. Please write to the developer list rather than individual
> developers for such questions in the feature:
> https://antiphishing.vadesecure.com/v4?f=MDk0SW9xRkhTVGYydkJlTIW3tbTr
> aK7neiUoWcvis0-pokd-Q2cwuWCZhgBcTw_yw4KqJS-oP6jCsk-zj-
> 1YMQ&i=ZURHSDhnY0huQ2tPS3VZahJdhRaQu1ItpJrYkl8wXrA&k=q1N6&r=RjIyR1Rob
> kVxVWlHTXhKT3I72JjP2S9ryFg3B_csBogfeb2oROpP8B8yUJUd6awk&s=50133960c87
> 16b5426bc084f398f7760f04af8739fd68cad36d17b1dcd887778&u=https%3A%2F%2
> Flists.proxmox.com%2Fcgi-bin%2Fmailman%2Flistinfo%2Fpve-devel
> 
> Best Regards,
> Fiona

> * why is the legacy interrupt bit set in the PCI config space ?

Most likely because the virtio-scsi-pci is configured without the
"disable_legacy=on" option. If not explicitly set, the option will be
"disable_legacy=auto" and when not attached to PCIe (which is the case
for Proxmox VE currently), then legacy mode will be enabled.

> * Are there any working driver for virtio-scsi on this KVM using Q35
> machine? i.e. any other OS

The virtio drivers for Windows and the ones in Linux work just fine
with
our configuration.


> Any thoughts why these interrupts are not getting delivered on the
> PCIE bus?

We do not configure the virtio-scsi-pci on a PCIe bus currently, see my
initial answer.

Best Regards,
Fiona


_______________________________________________
pve-devel mailing list
pve-devel@lists.proxmox.com
https://antiphishing.vadesecure.com/v4?f=MDk0SW9xRkhTVGYydkJlTIW3tbTraK
7neiUoWcvis0-pokd-Q2cwuWCZhgBcTw_yw4KqJS-oP6jCsk-zj-
1YMQ&i=ZURHSDhnY0huQ2tPS3VZahJdhRaQu1ItpJrYkl8wXrA&k=q1N6&r=RjIyR1RobkV
xVWlHTXhKT3I72JjP2S9ryFg3B_csBogfeb2oROpP8B8yUJUd6awk&s=50133960c8716b5
426bc084f398f7760f04af8739fd68cad36d17b1dcd887778&u=https%3A%2F%2Flists
.proxmox.com%2Fcgi-bin%2Fmailman%2Flistinfo%2Fpve-devel


[-- Attachment #2: Type: text/plain, Size: 160 bytes --]

_______________________________________________
pve-devel mailing list
pve-devel@lists.proxmox.com
https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel

^ permalink raw reply	[flat|nested] 11+ messages in thread

* [pve-devel] FW:  issues with Virtio-SCSI devicde on Proxmox...
       [not found]   ` <1178cb3475d719ae31f0c375cd3930fc24d98401.camel@groupe-cyllene.com>
@ 2024-08-14  7:20     ` Christian Moser
  2024-08-14 12:22       ` DERUMIER, Alexandre via pve-devel
       [not found]       ` <c851a27f4f5eca7c767fbffa48cb208e2d8fe1e6.camel@groupe-cyllene.com>
  0 siblings, 2 replies; 11+ messages in thread
From: Christian Moser @ 2024-08-14  7:20 UTC (permalink / raw)
  To: 'DERUMIER, Alexandre', pve-devel; +Cc: Christian Moser

Alexandre,

the statement below is not true for our case. The OpenVMS guest OS is using a PCIE bus, so the virtio-scsi device should be exposed as "modern", but is not. Not sure why not at this point

/cmos

_______________________________________________________
Christian Moser
Mobile:    +358-40-5022105			
Email:     cmos@maklee.com
URL:       www.maklee.com
-----Original Message-----
From: DERUMIER, Alexandre <alexandre.derumier@groupe-cyllene.com> 
Sent: Wednesday, August 14, 2024 09:45
To: pve-devel@lists.proxmox.com; cmos@maklee.com
Subject: Re: [pve-devel] issues with Virtio-SCSI devicde on Proxmox...

Hi,

I didn't see the responde of Fiona but indeed:

https://lists.gnu.org/archive/html/qemu-devel/2021-09/msg01567.html

"virtio devices can be exposed in upto three ways

 - Legacy - follows virtio 0.9 specification. always uses PCI
            ID range 0x1000-0x103F
 - Transitional - follows virtio 0.9 specification by default, but
                  can auto-negotiate with guest for 1.0 spce. Always
                  uses PCI ID range 0x1000-0x103F
 - Modern - follows virtio 1.0 specification. always uses PCI
            ID range 0x1040-0x107F

With QEMU, historically devices placed on a PCI bus will always default to being in transitional mode, while devices placed on a PCI-E bus will always dfault to being in modern mode.
"


-------- Message initial --------
De: Fiona Ebner <f.ebner@proxmox.com>
Répondre à: Proxmox VE development discussion <pve- devel@lists.proxmox.com>
À: Proxmox VE development discussion <pve-devel@lists.proxmox.com>, Christian Moser <cmos@maklee.com>
Objet: Re: [pve-devel] issues with Virtio-SCSI devicde on Proxmox...
Date: 13/08/2024 10:55:47

Hi,

Am 12.08.24 um 12:40 schrieb Christian Moser:
> Hello,
> 
> I work for VSI (VMS Software Inc) which is porting the OpenVMS 
> operating system to x86. At this point we successfully on various 
> hypervisors, but have some issues on the KVM running on Proxmox.
> 
> The OpenVMS VM works just fine with SATA disks and it also works with 
> for example virtio-network device etc., but trying to use virtio-scsi 
> hangs  the driver. I have debugged this and I can successfully 
> configure the port/controller, send the IO request to the device. It 
> then gets processed by the device, which posts the results and sets 
> the interrupt bit in the ISR register, but it never asserts the 
> interrupt hence the driver never gets notified and the I/O hangs.
> 
> I have tried both “virtio-scsi-pci” and “virtio-scsi-single”, but no 
> luck. The emulated virtio-scsi device is a legacy device. But then 
> again, the virtio-network device is also a legacy device and here we 
> are getting interrupts. One thing which bothers me is the fact that 
> the “legacy interrupt disable” bit is set in the PCI config space of 
> the virtio-scsi device (i.e. bit 10 at offset 4)
> 
> Questions:
> * is there a way to configure a modern virtio-scsi devcie (i.e.
> disable_legacy=on) ?

I've already answered this question when you asked in a mail addressed directly to me:

Am 12.08.24 um 11:58 schrieb Fiona Ebner:
> Hi,
> 
> It seems that you either need to attach the "virtio-scsi-pci" device 
> to a pcie bus or explicitly set the "disable_legacy=on" option for the 
> device, neither of which Proxmox VE currently does or allows 
> configuring. The only way right now seems to be to attach the disk 
> yourself via custom arguments (the 'args' in the Proxmox VE VM 
> configuration), but then the disk will be invisible to Proxmox VE 
> operations which look at specific disk keys in the configuration!
> 
> Feel free to open a feature request on our bug tracker to make this
> configurable:
> https://antiphishing.vadesecure.com/v4?f=MDk0SW9xRkhTVGYydkJlTIW3tbTr
> aK7neiUoWcvis0-pokd-Q2cwuWCZhgBcTw_yw4KqJS-oP6jCsk-zj-
> 1YMQ&i=ZURHSDhnY0huQ2tPS3VZahJdhRaQu1ItpJrYkl8wXrA&k=q1N6&r=RjIyR1Rob
> kVxVWlHTXhKT3I72JjP2S9ryFg3B_csBogfeb2oROpP8B8yUJUd6awk&s=1aab5a2ada7
> 3beb46aa02df4e18ff6c5ba2db6d6ff2d1f302a3c4c83b13c8ef6&u=https%3A%2F%2
> Fbugzilla.proxmox.com%2F
> 
> P.S. Please write to the developer list rather than individual 
> developers for such questions in the feature:
> https://antiphishing.vadesecure.com/v4?f=MDk0SW9xRkhTVGYydkJlTIW3tbTr
> aK7neiUoWcvis0-pokd-Q2cwuWCZhgBcTw_yw4KqJS-oP6jCsk-zj-
> 1YMQ&i=ZURHSDhnY0huQ2tPS3VZahJdhRaQu1ItpJrYkl8wXrA&k=q1N6&r=RjIyR1Rob
> kVxVWlHTXhKT3I72JjP2S9ryFg3B_csBogfeb2oROpP8B8yUJUd6awk&s=50133960c87
> 16b5426bc084f398f7760f04af8739fd68cad36d17b1dcd887778&u=https%3A%2F%2
> Flists.proxmox.com%2Fcgi-bin%2Fmailman%2Flistinfo%2Fpve-devel
> 
> Best Regards,
> Fiona

> * why is the legacy interrupt bit set in the PCI config space ?

Most likely because the virtio-scsi-pci is configured without the "disable_legacy=on" option. If not explicitly set, the option will be "disable_legacy=auto" and when not attached to PCIe (which is the case for Proxmox VE currently), then legacy mode will be enabled.

> * Are there any working driver for virtio-scsi on this KVM using Q35 
> machine? i.e. any other OS

The virtio drivers for Windows and the ones in Linux work just fine with our configuration.


> Any thoughts why these interrupts are not getting delivered on the 
> PCIE bus?

We do not configure the virtio-scsi-pci on a PCIe bus currently, see my initial answer.

Best Regards,
Fiona


_______________________________________________
pve-devel mailing list
pve-devel@lists.proxmox.com
https://antiphishing.vadesecure.com/v4?f=MDk0SW9xRkhTVGYydkJlTIW3tbTraK
7neiUoWcvis0-pokd-Q2cwuWCZhgBcTw_yw4KqJS-oP6jCsk-zj-
1YMQ&i=ZURHSDhnY0huQ2tPS3VZahJdhRaQu1ItpJrYkl8wXrA&k=q1N6&r=RjIyR1RobkV
xVWlHTXhKT3I72JjP2S9ryFg3B_csBogfeb2oROpP8B8yUJUd6awk&s=50133960c8716b5
426bc084f398f7760f04af8739fd68cad36d17b1dcd887778&u=https%3A%2F%2Flists
.proxmox.com%2Fcgi-bin%2Fmailman%2Flistinfo%2Fpve-devel



_______________________________________________
pve-devel mailing list
pve-devel@lists.proxmox.com
https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel

^ permalink raw reply	[flat|nested] 11+ messages in thread

* Re: [pve-devel] FW:  issues with Virtio-SCSI devicde on Proxmox...
  2024-08-14  7:20     ` [pve-devel] FW: " Christian Moser
@ 2024-08-14 12:22       ` DERUMIER, Alexandre via pve-devel
       [not found]       ` <c851a27f4f5eca7c767fbffa48cb208e2d8fe1e6.camel@groupe-cyllene.com>
  1 sibling, 0 replies; 11+ messages in thread
From: DERUMIER, Alexandre via pve-devel @ 2024-08-14 12:22 UTC (permalink / raw)
  To: pve-devel, cmos; +Cc: DERUMIER, Alexandre

[-- Attachment #1: Type: message/rfc822, Size: 25233 bytes --]

From: "DERUMIER, Alexandre" <alexandre.derumier@groupe-cyllene.com>
To: "pve-devel@lists.proxmox.com" <pve-devel@lists.proxmox.com>, "cmos@maklee.com" <cmos@maklee.com>
Subject: Re: FW: [pve-devel] issues with Virtio-SCSI devicde on Proxmox...
Date: Wed, 14 Aug 2024 12:22:12 +0000
Message-ID: <c851a27f4f5eca7c767fbffa48cb208e2d8fe1e6.camel@groupe-cyllene.com>

>>Alexandre,
>>
>>the statement below is not true for our case. The OpenVMS guest OS is
>>using a PCIE bus, so the virtio-scsi device should be exposed as
>>"modern", but is not. Not sure why not at this point

See Fiona response,

the pci express bridge is present, but the virtio-net is plugged on a
simple pci bridge.

pci express slots are mostly used for passthrough devices

/usr/share/perl5/PVE/QemuServer/PCI.pm

my $pcie_addr_map;
sub get_pcie_addr_map {
    $pcie_addr_map = {
        vga => { bus => 'pcie.0', addr => 1 },
        hostpci0 => { bus => "ich9-pcie-port-1", addr => 0 },
        hostpci1 => { bus => "ich9-pcie-port-2", addr => 0 },
        hostpci2 => { bus => "ich9-pcie-port-3", addr => 0 },
        hostpci3 => { bus => "ich9-pcie-port-4", addr => 0 },
        hostpci4 => { bus => "ich9-pcie-port-5", addr => 0 },
        hostpci5 => { bus => "ich9-pcie-port-6", addr => 0 },
        hostpci6 => { bus => "ich9-pcie-port-7", addr => 0 },
        hostpci7 => { bus => "ich9-pcie-port-8", addr => 0 },
        hostpci8 => { bus => "ich9-pcie-port-9", addr => 0 },
        hostpci9 => { bus => "ich9-pcie-port-10", addr => 0 },
        hostpci10 => { bus => "ich9-pcie-port-11", addr => 0 },
        hostpci11 => { bus => "ich9-pcie-port-12", addr => 0 },
        hostpci12 => { bus => "ich9-pcie-port-13", addr => 0 },
        hostpci13 => { bus => "ich9-pcie-port-14", addr => 0 },
        hostpci14 => { bus => "ich9-pcie-port-15", addr => 0 },
        hostpci15 => { bus => "ich9-pcie-port-16", addr => 0 },
        # win7 is picky about pcie assignments
        hostpci0bus0 => { bus => "pcie.0", addr => 16 },
        hostpci1bus0 => { bus => "pcie.0", addr => 17 },
        hostpci2bus0 => { bus => "pcie.0", addr => 18 },
        hostpci3bus0 => { bus => "pcie.0", addr => 19 },
        ivshmem => { bus => 'pcie.0', addr => 20 },
        hostpci4bus0 => { bus => "pcie.0", addr => 9 },
        hostpci5bus0 => { bus => "pcie.0", addr => 10 },
        hostpci6bus0 => { bus => "pcie.0", addr => 11 },
        hostpci7bus0 => { bus => "pcie.0", addr => 12 },
        hostpci8bus0 => { bus => "pcie.0", addr => 13 },
        hostpci9bus0 => { bus => "pcie.0", addr => 14 },
        hostpci10bus0 => { bus => "pcie.0", addr => 15 },
        hostpci11bus0 => { bus => "pcie.0", addr => 21 },
        hostpci12bus0 => { bus => "pcie.0", addr => 22 },
        hostpci13bus0 => { bus => "pcie.0", addr => 23 },
        hostpci14bus0 => { bus => "pcie.0", addr => 24 },
        hostpci15bus0 => { bus => "pcie.0", addr => 25 },
}

_______________________________________________________
Christian Moser
Mobile:    +358-40-5022105			
Email:     cmos@maklee.com
URL:       www.maklee.com
-----Original Message-----
From: DERUMIER, Alexandre <alexandre.derumier@groupe-cyllene.com> 
Sent: Wednesday, August 14, 2024 09:45
To: pve-devel@lists.proxmox.com; cmos@maklee.com
Subject: Re: [pve-devel] issues with Virtio-SCSI devicde on Proxmox...

Hi,

I didn't see the responde of Fiona but indeed:

https://lists.gnu.org/archive/html/qemu-devel/2021-09/msg01567.html

"virtio devices can be exposed in upto three ways

 - Legacy - follows virtio 0.9 specification. always uses PCI
            ID range 0x1000-0x103F
 - Transitional - follows virtio 0.9 specification by default, but
                  can auto-negotiate with guest for 1.0 spce. Always
                  uses PCI ID range 0x1000-0x103F
 - Modern - follows virtio 1.0 specification. always uses PCI
            ID range 0x1040-0x107F

With QEMU, historically devices placed on a PCI bus will always default
to being in transitional mode, while devices placed on a PCI-E bus will
always dfault to being in modern mode.
"


-------- Message initial --------
De: Fiona Ebner <f.ebner@proxmox.com>
Répondre à: Proxmox VE development discussion <pve-
devel@lists.proxmox.com>
À: Proxmox VE development discussion <pve-devel@lists.proxmox.com>,
Christian Moser <cmos@maklee.com>
Objet: Re: [pve-devel] issues with Virtio-SCSI devicde on Proxmox...
Date: 13/08/2024 10:55:47

Hi,

Am 12.08.24 um 12:40 schrieb Christian Moser:
> Hello,
> 
> I work for VSI (VMS Software Inc) which is porting the OpenVMS 
> operating system to x86. At this point we successfully on various 
> hypervisors, but have some issues on the KVM running on Proxmox.
> 
> The OpenVMS VM works just fine with SATA disks and it also works with
> for example virtio-network device etc., but trying to use virtio-scsi
> hangs  the driver. I have debugged this and I can successfully 
> configure the port/controller, send the IO request to the device. It 
> then gets processed by the device, which posts the results and sets 
> the interrupt bit in the ISR register, but it never asserts the 
> interrupt hence the driver never gets notified and the I/O hangs.
> 
> I have tried both “virtio-scsi-pci” and “virtio-scsi-single”, but no 
> luck. The emulated virtio-scsi device is a legacy device. But then 
> again, the virtio-network device is also a legacy device and here we 
> are getting interrupts. One thing which bothers me is the fact that 
> the “legacy interrupt disable” bit is set in the PCI config space of 
> the virtio-scsi device (i.e. bit 10 at offset 4)
> 
> Questions:
> * is there a way to configure a modern virtio-scsi devcie (i.e.
> disable_legacy=on) ?

I've already answered this question when you asked in a mail addressed
directly to me:

Am 12.08.24 um 11:58 schrieb Fiona Ebner:
> Hi,
> 
> It seems that you either need to attach the "virtio-scsi-pci" device 
> to a pcie bus or explicitly set the "disable_legacy=on" option for
> the 
> device, neither of which Proxmox VE currently does or allows 
> configuring. The only way right now seems to be to attach the disk 
> yourself via custom arguments (the 'args' in the Proxmox VE VM 
> configuration), but then the disk will be invisible to Proxmox VE 
> operations which look at specific disk keys in the configuration!
> 
> Feel free to open a feature request on our bug tracker to make this
> configurable:
> https://antiphishing.vadesecure.com/v4?f=MDk0SW9xRkhTVGYydkJlTIW3tbTr
> aK7neiUoWcvis0-pokd-Q2cwuWCZhgBcTw_yw4KqJS-oP6jCsk-zj-
> 1YMQ&i=ZURHSDhnY0huQ2tPS3VZahJdhRaQu1ItpJrYkl8wXrA&k=q1N6&r=RjIyR1Rob
> kVxVWlHTXhKT3I72JjP2S9ryFg3B_csBogfeb2oROpP8B8yUJUd6awk&s=1aab5a2ada7
> 3beb46aa02df4e18ff6c5ba2db6d6ff2d1f302a3c4c83b13c8ef6&u=https%3A%2F%2
> Fbugzilla.proxmox.com%2F
> 
> P.S. Please write to the developer list rather than individual 
> developers for such questions in the feature:
> https://antiphishing.vadesecure.com/v4?f=MDk0SW9xRkhTVGYydkJlTIW3tbTr
> aK7neiUoWcvis0-pokd-Q2cwuWCZhgBcTw_yw4KqJS-oP6jCsk-zj-
> 1YMQ&i=ZURHSDhnY0huQ2tPS3VZahJdhRaQu1ItpJrYkl8wXrA&k=q1N6&r=RjIyR1Rob
> kVxVWlHTXhKT3I72JjP2S9ryFg3B_csBogfeb2oROpP8B8yUJUd6awk&s=50133960c87
> 16b5426bc084f398f7760f04af8739fd68cad36d17b1dcd887778&u=https%3A%2F%2
> Flists.proxmox.com%2Fcgi-bin%2Fmailman%2Flistinfo%2Fpve-devel
> 
> Best Regards,
> Fiona

> * why is the legacy interrupt bit set in the PCI config space ?

Most likely because the virtio-scsi-pci is configured without the
"disable_legacy=on" option. If not explicitly set, the option will be
"disable_legacy=auto" and when not attached to PCIe (which is the case
for Proxmox VE currently), then legacy mode will be enabled.

> * Are there any working driver for virtio-scsi on this KVM using Q35 
> machine? i.e. any other OS

The virtio drivers for Windows and the ones in Linux work just fine
with our configuration.


> Any thoughts why these interrupts are not getting delivered on the 
> PCIE bus?

We do not configure the virtio-scsi-pci on a PCIe bus currently, see my
initial answer.

Best Regards,
Fiona


_______________________________________________
pve-devel mailing list
pve-devel@lists.proxmox.com
https://antiphishing.vadesecure.com/v4?f=MDk0SW9xRkhTVGYydkJlTIW3tbTraK

7neiUoWcvis0-pokd-Q2cwuWCZhgBcTw_yw4KqJS-oP6jCsk-zj-
1YMQ&i=ZURHSDhnY0huQ2tPS3VZahJdhRaQu1ItpJrYkl8wXrA&k=q1N6&r=RjIyR1RobkV

xVWlHTXhKT3I72JjP2S9ryFg3B_csBogfeb2oROpP8B8yUJUd6awk&s=50133960c8716b5

426bc084f398f7760f04af8739fd68cad36d17b1dcd887778&u=https%3A%2F%2Flists

.proxmox.com%2Fcgi-bin%2Fmailman%2Flistinfo%2Fpve-devel




[-- Attachment #2: Type: text/plain, Size: 160 bytes --]

_______________________________________________
pve-devel mailing list
pve-devel@lists.proxmox.com
https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel

^ permalink raw reply	[flat|nested] 11+ messages in thread

* Re: [pve-devel] FW:  issues with Virtio-SCSI devicde on Proxmox...
       [not found]       ` <c851a27f4f5eca7c767fbffa48cb208e2d8fe1e6.camel@groupe-cyllene.com>
@ 2024-08-14 12:48         ` Christian Moser
  2024-08-14 13:05           ` DERUMIER, Alexandre via pve-devel
       [not found]           ` <6ea8c90b469da48525ed743b6541bb3644be4a6c.camel@groupe-cyllene.com>
  0 siblings, 2 replies; 11+ messages in thread
From: Christian Moser @ 2024-08-14 12:48 UTC (permalink / raw)
  To: 'DERUMIER, Alexandre'; +Cc: Christian Moser, pve-devel

I'm talking about virtio-scsi. Our virtio-network device is working fine 

⁣Sent from BlueMail

Get BlueMail for Android ​

On Aug 14, 2024, 15:22, at 15:22, "DERUMIER, Alexandre" <alexandre.derumier@groupe-cyllene.com> wrote:
>>>Alexandre,
>>>
>>>the statement below is not true for our case. The OpenVMS guest OS is
>>>using a PCIE bus, so the virtio-scsi device should be exposed as
>>>"modern", but is not. Not sure why not at this point
>
>See Fiona response,
>
>the pci express bridge is present, but the virtio-net is plugged on a
>simple pci bridge.
>
>pci express slots are mostly used for passthrough devices
>
>/usr/share/perl5/PVE/QemuServer/PCI.pm
>
>my $pcie_addr_map;
>sub get_pcie_addr_map {
>    $pcie_addr_map = {
>        vga => { bus => 'pcie.0', addr => 1 },
>        hostpci0 => { bus => "ich9-pcie-port-1", addr => 0 },
>        hostpci1 => { bus => "ich9-pcie-port-2", addr => 0 },
>        hostpci2 => { bus => "ich9-pcie-port-3", addr => 0 },
>        hostpci3 => { bus => "ich9-pcie-port-4", addr => 0 },
>        hostpci4 => { bus => "ich9-pcie-port-5", addr => 0 },
>        hostpci5 => { bus => "ich9-pcie-port-6", addr => 0 },
>        hostpci6 => { bus => "ich9-pcie-port-7", addr => 0 },
>        hostpci7 => { bus => "ich9-pcie-port-8", addr => 0 },
>        hostpci8 => { bus => "ich9-pcie-port-9", addr => 0 },
>        hostpci9 => { bus => "ich9-pcie-port-10", addr => 0 },
>        hostpci10 => { bus => "ich9-pcie-port-11", addr => 0 },
>        hostpci11 => { bus => "ich9-pcie-port-12", addr => 0 },
>        hostpci12 => { bus => "ich9-pcie-port-13", addr => 0 },
>        hostpci13 => { bus => "ich9-pcie-port-14", addr => 0 },
>        hostpci14 => { bus => "ich9-pcie-port-15", addr => 0 },
>        hostpci15 => { bus => "ich9-pcie-port-16", addr => 0 },
>        # win7 is picky about pcie assignments
>        hostpci0bus0 => { bus => "pcie.0", addr => 16 },
>        hostpci1bus0 => { bus => "pcie.0", addr => 17 },
>        hostpci2bus0 => { bus => "pcie.0", addr => 18 },
>        hostpci3bus0 => { bus => "pcie.0", addr => 19 },
>        ivshmem => { bus => 'pcie.0', addr => 20 },
>        hostpci4bus0 => { bus => "pcie.0", addr => 9 },
>        hostpci5bus0 => { bus => "pcie.0", addr => 10 },
>        hostpci6bus0 => { bus => "pcie.0", addr => 11 },
>        hostpci7bus0 => { bus => "pcie.0", addr => 12 },
>        hostpci8bus0 => { bus => "pcie.0", addr => 13 },
>        hostpci9bus0 => { bus => "pcie.0", addr => 14 },
>        hostpci10bus0 => { bus => "pcie.0", addr => 15 },
>        hostpci11bus0 => { bus => "pcie.0", addr => 21 },
>        hostpci12bus0 => { bus => "pcie.0", addr => 22 },
>        hostpci13bus0 => { bus => "pcie.0", addr => 23 },
>        hostpci14bus0 => { bus => "pcie.0", addr => 24 },
>        hostpci15bus0 => { bus => "pcie.0", addr => 25 },
>}
>
>_______________________________________________________
>Christian Moser
>Mobile:    +358-40-5022105			
>Email:     cmos@maklee.com
>URL:       www.maklee.com
>-----Original Message-----
>From: DERUMIER, Alexandre <alexandre.derumier@groupe-cyllene.com> 
>Sent: Wednesday, August 14, 2024 09:45
>To: pve-devel@lists.proxmox.com; cmos@maklee.com
>Subject: Re: [pve-devel] issues with Virtio-SCSI devicde on Proxmox...
>
>Hi,
>
>I didn't see the responde of Fiona but indeed:
>
>https://lists.gnu.org/archive/html/qemu-devel/2021-09/msg01567.html
>
>"virtio devices can be exposed in upto three ways
>
> - Legacy - follows virtio 0.9 specification. always uses PCI
>            ID range 0x1000-0x103F
> - Transitional - follows virtio 0.9 specification by default, but
>                  can auto-negotiate with guest for 1.0 spce. Always
>                  uses PCI ID range 0x1000-0x103F
> - Modern - follows virtio 1.0 specification. always uses PCI
>            ID range 0x1040-0x107F
>
>With QEMU, historically devices placed on a PCI bus will always default
>to being in transitional mode, while devices placed on a PCI-E bus will
>always dfault to being in modern mode.
>"
>
>
>-------- Message initial --------
>De: Fiona Ebner <f.ebner@proxmox.com>
>Répondre à: Proxmox VE development discussion <pve-
>devel@lists.proxmox.com>
>À: Proxmox VE development discussion <pve-devel@lists.proxmox.com>,
>Christian Moser <cmos@maklee.com>
>Objet: Re: [pve-devel] issues with Virtio-SCSI devicde on Proxmox...
>Date: 13/08/2024 10:55:47
>
>Hi,
>
>Am 12.08.24 um 12:40 schrieb Christian Moser:
>> Hello,
>> 
>> I work for VSI (VMS Software Inc) which is porting the OpenVMS 
>> operating system to x86. At this point we successfully on various 
>> hypervisors, but have some issues on the KVM running on Proxmox.
>> 
>> The OpenVMS VM works just fine with SATA disks and it also works with
>> for example virtio-network device etc., but trying to use virtio-scsi
>> hangs  the driver. I have debugged this and I can successfully 
>> configure the port/controller, send the IO request to the device. It 
>> then gets processed by the device, which posts the results and sets 
>> the interrupt bit in the ISR register, but it never asserts the 
>> interrupt hence the driver never gets notified and the I/O hangs.
>> 
>> I have tried both “virtio-scsi-pci” and “virtio-scsi-single”, but no 
>> luck. The emulated virtio-scsi device is a legacy device. But then 
>> again, the virtio-network device is also a legacy device and here we 
>> are getting interrupts. One thing which bothers me is the fact that 
>> the “legacy interrupt disable” bit is set in the PCI config space of 
>> the virtio-scsi device (i.e. bit 10 at offset 4)
>> 
>> Questions:
>> * is there a way to configure a modern virtio-scsi devcie (i.e.
>> disable_legacy=on) ?
>
>I've already answered this question when you asked in a mail addressed
>directly to me:
>
>Am 12.08.24 um 11:58 schrieb Fiona Ebner:
>> Hi,
>> 
>> It seems that you either need to attach the "virtio-scsi-pci" device 
>> to a pcie bus or explicitly set the "disable_legacy=on" option for
>> the 
>> device, neither of which Proxmox VE currently does or allows 
>> configuring. The only way right now seems to be to attach the disk 
>> yourself via custom arguments (the 'args' in the Proxmox VE VM 
>> configuration), but then the disk will be invisible to Proxmox VE 
>> operations which look at specific disk keys in the configuration!
>> 
>> Feel free to open a feature request on our bug tracker to make this
>> configurable:
>> https://antiphishing.vadesecure.com/v4?f=MDk0SW9xRkhTVGYydkJlTIW3tbTr
>> aK7neiUoWcvis0-pokd-Q2cwuWCZhgBcTw_yw4KqJS-oP6jCsk-zj-
>> 1YMQ&i=ZURHSDhnY0huQ2tPS3VZahJdhRaQu1ItpJrYkl8wXrA&k=q1N6&r=RjIyR1Rob
>> kVxVWlHTXhKT3I72JjP2S9ryFg3B_csBogfeb2oROpP8B8yUJUd6awk&s=1aab5a2ada7
>> 3beb46aa02df4e18ff6c5ba2db6d6ff2d1f302a3c4c83b13c8ef6&u=https%3A%2F%2
>> Fbugzilla.proxmox.com%2F
>> 
>> P.S. Please write to the developer list rather than individual 
>> developers for such questions in the feature:
>> https://antiphishing.vadesecure.com/v4?f=MDk0SW9xRkhTVGYydkJlTIW3tbTr
>> aK7neiUoWcvis0-pokd-Q2cwuWCZhgBcTw_yw4KqJS-oP6jCsk-zj-
>> 1YMQ&i=ZURHSDhnY0huQ2tPS3VZahJdhRaQu1ItpJrYkl8wXrA&k=q1N6&r=RjIyR1Rob
>> kVxVWlHTXhKT3I72JjP2S9ryFg3B_csBogfeb2oROpP8B8yUJUd6awk&s=50133960c87
>> 16b5426bc084f398f7760f04af8739fd68cad36d17b1dcd887778&u=https%3A%2F%2
>> Flists.proxmox.com%2Fcgi-bin%2Fmailman%2Flistinfo%2Fpve-devel
>> 
>> Best Regards,
>> Fiona
>
>> * why is the legacy interrupt bit set in the PCI config space ?
>
>Most likely because the virtio-scsi-pci is configured without the
>"disable_legacy=on" option. If not explicitly set, the option will be
>"disable_legacy=auto" and when not attached to PCIe (which is the case
>for Proxmox VE currently), then legacy mode will be enabled.
>
>> * Are there any working driver for virtio-scsi on this KVM using Q35 
>> machine? i.e. any other OS
>
>The virtio drivers for Windows and the ones in Linux work just fine
>with our configuration.
>
>
>> Any thoughts why these interrupts are not getting delivered on the 
>> PCIE bus?
>
>We do not configure the virtio-scsi-pci on a PCIe bus currently, see my
>initial answer.
>
>Best Regards,
>Fiona
>
>
>_______________________________________________
>pve-devel mailing list
>pve-devel@lists.proxmox.com
>https://antiphishing.vadesecure.com/v4?f=MDk0SW9xRkhTVGYydkJlTIW3tbTraK
>
>7neiUoWcvis0-pokd-Q2cwuWCZhgBcTw_yw4KqJS-oP6jCsk-zj-
>1YMQ&i=ZURHSDhnY0huQ2tPS3VZahJdhRaQu1ItpJrYkl8wXrA&k=q1N6&r=RjIyR1RobkV
>
>xVWlHTXhKT3I72JjP2S9ryFg3B_csBogfeb2oROpP8B8yUJUd6awk&s=50133960c8716b5
>
>426bc084f398f7760f04af8739fd68cad36d17b1dcd887778&u=https%3A%2F%2Flists
>
>.proxmox.com%2Fcgi-bin%2Fmailman%2Flistinfo%2Fpve-devel
_______________________________________________
pve-devel mailing list
pve-devel@lists.proxmox.com
https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel

^ permalink raw reply	[flat|nested] 11+ messages in thread

* Re: [pve-devel] FW:  issues with Virtio-SCSI devicde on Proxmox...
  2024-08-14 12:48         ` Christian Moser
@ 2024-08-14 13:05           ` DERUMIER, Alexandre via pve-devel
       [not found]           ` <6ea8c90b469da48525ed743b6541bb3644be4a6c.camel@groupe-cyllene.com>
  1 sibling, 0 replies; 11+ messages in thread
From: DERUMIER, Alexandre via pve-devel @ 2024-08-14 13:05 UTC (permalink / raw)
  To: cmos; +Cc: DERUMIER, Alexandre, pve-devel

[-- Attachment #1: Type: message/rfc822, Size: 33368 bytes --]

From: "DERUMIER, Alexandre" <alexandre.derumier@groupe-cyllene.com>
To: "cmos@maklee.com" <cmos@maklee.com>
Cc: "pve-devel@lists.proxmox.com" <pve-devel@lists.proxmox.com>
Subject: Re: FW: [pve-devel] issues with Virtio-SCSI devicde on Proxmox...
Date: Wed, 14 Aug 2024 13:05:35 +0000
Message-ID: <6ea8c90b469da48525ed743b6541bb3644be4a6c.camel@groupe-cyllene.com>

>>I'm talking about virtio-scsi. Our virtio-network device is working
>>fine 

Yes, sorry, I wanted to said virtio-scsi.   

All pci devices excluding passthrough devices (with pcie=on flag) are
actually plugged to pci bridge


sub get_pci_addr_map {
    $pci_addr_map = {
	piix3 => { bus => 0, addr => 1, conflict_ok => qw(ehci)  },
	ehci => { bus => 0, addr => 1, conflict_ok => qw(piix3) }, #
instead of piix3 on arm
	vga => { bus => 0, addr => 2, conflict_ok => qw(legacy-igd) },
	'legacy-igd' => { bus => 0, addr => 2, conflict_ok => qw(vga)
}, # legacy-igd requires vga=none
	balloon0 => { bus => 0, addr => 3 },
	watchdog => { bus => 0, addr => 4 },
	scsihw0 => { bus => 0, addr => 5, conflict_ok => qw(pci.3) },
	'pci.3' => { bus => 0, addr => 5, conflict_ok => qw(scsihw0)
}, # also used for virtio-scsi-single bridge
	scsihw1 => { bus => 0, addr => 6 },
	ahci0 => { bus => 0, addr => 7 },
	qga0 => { bus => 0, addr => 8 },
	spice => { bus => 0, addr => 9 },
	virtio0 => { bus => 0, addr => 10 },
	virtio1 => { bus => 0, addr => 11 },
	virtio2 => { bus => 0, addr => 12 },
	virtio3 => { bus => 0, addr => 13 },
	virtio4 => { bus => 0, addr => 14 },
	virtio5 => { bus => 0, addr => 15 },
	hostpci0 => { bus => 0, addr => 16 },
	hostpci1 => { bus => 0, addr => 17 },
	net0 => { bus => 0, addr => 18 },
	net1 => { bus => 0, addr => 19 },
	net2 => { bus => 0, addr => 20 },
	net3 => { bus => 0, addr => 21 },
	net4 => { bus => 0, addr => 22 },
	net5 => { bus => 0, addr => 23 },
	vga1 => { bus => 0, addr => 24 },
	vga2 => { bus => 0, addr => 25 },
	vga3 => { bus => 0, addr => 26 },
	hostpci2 => { bus => 0, addr => 27 },
	hostpci3 => { bus => 0, addr => 28 },
	#addr29 : usb-host (pve-usb.cfg)
	'pci.1' => { bus => 0, addr => 30 },
	'pci.2' => { bus => 0, addr => 31 },
	'net6' => { bus => 1, addr => 1 },
	'net7' => { bus => 1, addr => 2 },
	'net8' => { bus => 1, addr => 3 },
	'net9' => { bus => 1, addr => 4 },
	'net10' => { bus => 1, addr => 5 },
	'net11' => { bus => 1, addr => 6 },
	'net12' => { bus => 1, addr => 7 },
	'net13' => { bus => 1, addr => 8 },
	'net14' => { bus => 1, addr => 9 },
	'net15' => { bus => 1, addr => 10 },
	'net16' => { bus => 1, addr => 11 },
	'net17' => { bus => 1, addr => 12 },
	'net18' => { bus => 1, addr => 13 },
	'net19' => { bus => 1, addr => 14 },
	'net20' => { bus => 1, addr => 15 },
	'net21' => { bus => 1, addr => 16 },
	'net22' => { bus => 1, addr => 17 },
	'net23' => { bus => 1, addr => 18 },
	'net24' => { bus => 1, addr => 19 },
	'net25' => { bus => 1, addr => 20 },
	'net26' => { bus => 1, addr => 21 },
	'net27' => { bus => 1, addr => 22 },
	'net28' => { bus => 1, addr => 23 },
	'net29' => { bus => 1, addr => 24 },
	'net30' => { bus => 1, addr => 25 },
	'net31' => { bus => 1, addr => 26 },
	'xhci' => { bus => 1, addr => 27 },
	'pci.4' => { bus => 1, addr => 28 },
	'rng0' => { bus => 1, addr => 29 },
	'pci.2-igd' => { bus => 1, addr => 30 }, # replaces pci.2 in
case a legacy IGD device is passed through
	'virtio6' => { bus => 2, addr => 1 },
	'virtio7' => { bus => 2, addr => 2 },
	'virtio8' => { bus => 2, addr => 3 },
	'virtio9' => { bus => 2, addr => 4 },
	'virtio10' => { bus => 2, addr => 5 },
	'virtio11' => { bus => 2, addr => 6 },
	'virtio12' => { bus => 2, addr => 7 },
	'virtio13' => { bus => 2, addr => 8 },
	'virtio14' => { bus => 2, addr => 9 },
	'virtio15' => { bus => 2, addr => 10 },
	'ivshmem' => { bus => 2, addr => 11 },
	'audio0' => { bus => 2, addr => 12 },
	hostpci4 => { bus => 2, addr => 13 },
	hostpci5 => { bus => 2, addr => 14 },
	hostpci6 => { bus => 2, addr => 15 },
	hostpci7 => { bus => 2, addr => 16 },
	hostpci8 => { bus => 2, addr => 17 },
	hostpci9 => { bus => 2, addr => 18 },
	hostpci10 => { bus => 2, addr => 19 },
	hostpci11 => { bus => 2, addr => 20 },
	hostpci12 => { bus => 2, addr => 21 },
	hostpci13 => { bus => 2, addr => 22 },
	hostpci14 => { bus => 2, addr => 23 },
	hostpci15 => { bus => 2, addr => 24 },
	'virtioscsi0' => { bus => 3, addr => 1 },
	'virtioscsi1' => { bus => 3, addr => 2 },
	'virtioscsi2' => { bus => 3, addr => 3 },
	'virtioscsi3' => { bus => 3, addr => 4 },
	'virtioscsi4' => { bus => 3, addr => 5 },
	'virtioscsi5' => { bus => 3, addr => 6 },
	'virtioscsi6' => { bus => 3, addr => 7 },
	'virtioscsi7' => { bus => 3, addr => 8 },
	'virtioscsi8' => { bus => 3, addr => 9 },
	'virtioscsi9' => { bus => 3, addr => 10 },
	'virtioscsi10' => { bus => 3, addr => 11 },
	'virtioscsi11' => { bus => 3, addr => 12 },
	'virtioscsi12' => { bus => 3, addr => 13 },
	'virtioscsi13' => { bus => 3, addr => 14 },
	'virtioscsi14' => { bus => 3, addr => 15 },
	'virtioscsi15' => { bus => 3, addr => 16 },
	'virtioscsi16' => { bus => 3, addr => 17 },
	'virtioscsi17' => { bus => 3, addr => 18 },
	'virtioscsi18' => { bus => 3, addr => 19 },
	'virtioscsi19' => { bus => 3, addr => 20 },
	'virtioscsi20' => { bus => 3, addr => 21 },
	'virtioscsi21' => { bus => 3, addr => 22 },
	'virtioscsi22' => { bus => 3, addr => 23 },
	'virtioscsi23' => { bus => 3, addr => 24 },
	'virtioscsi24' => { bus => 3, addr => 25 },
	'virtioscsi25' => { bus => 3, addr => 26 },
	'virtioscsi26' => { bus => 3, addr => 27 },
	'virtioscsi27' => { bus => 3, addr => 28 },
	'virtioscsi28' => { bus => 3, addr => 29 },
	'virtioscsi29' => { bus => 3, addr => 30 },
	'virtioscsi30' => { bus => 3, addr => 31 },
	'scsihw2' => { bus => 4, addr => 1 },
	'scsihw3' => { bus => 4, addr => 2 },
	'scsihw4' => { bus => 4, addr => 3 },
    } if !defined($pci_addr_map);
    return $pci_addr_map;

> 
> > > Alexandre,
> > > 
> > > the statement below is not true for our case. The OpenVMS guest OS is
> > > using a PCIE bus, so the virtio-scsi device should be exposed as
> > > "modern", but is not. Not sure why not at this point
> > 
> 
> See Fiona response,
> 
> the pci express bridge is present, but the virtio-net is plugged on a
> simple pci bridge.
> ²
> pci express slots are mostly used for passthrough devices
> 
> 
> 
> my $pcie_addr_map;
> sub get_pcie_addr_map {
>     $pcie_addr_map = {
>         vga => { bus => 'pcie.0', addr => 1 },
>         hostpci0 => { bus => "ich9-pcie-port-1", addr => 0 },
>         hostpci1 => { bus => "ich9-pcie-port-2", addr => 0 },
>         hostpci2 => { bus => "ich9-pcie-port-3", addr => 0 },
>         hostpci3 => { bus => "ich9-pcie-port-4", addr => 0 },
>         hostpci4 => { bus => "ich9-pcie-port-5", addr => 0 },
>         hostpci5 => { bus => "ich9-pcie-port-6", addr => 0 },
>         hostpci6 => { bus => "ich9-pcie-port-7", addr => 0 },
>         hostpci7 => { bus => "ich9-pcie-port-8", addr => 0 },
>         hostpci8 => { bus => "ich9-pcie-port-9", addr => 0 },
>         hostpci9 => { bus => "ich9-pcie-port-10", addr => 0 },
>         hostpci10 => { bus => "ich9-pcie-port-11", addr => 0 },
>         hostpci11 => { bus => "ich9-pcie-port-12", addr => 0 },
>         hostpci12 => { bus => "ich9-pcie-port-13", addr => 0 },
>         hostpci13 => { bus => "ich9-pcie-port-14", addr => 0 },
>         hostpci14 => { bus => "ich9-pcie-port-15", addr => 0 },
>         hostpci15 => { bus => "ich9-pcie-port-16", addr => 0 },
>         # win7 is picky about pcie assignments
>         hostpci0bus0 => { bus => "pcie.0", addr => 16 },
>         hostpci1bus0 => { bus => "pcie.0", addr => 17 },
>         hostpci2bus0 => { bus => "pcie.0", addr => 18 },
>         hostpci3bus0 => { bus => "pcie.0", addr => 19 },
>         ivshmem => { bus => 'pcie.0', addr => 20 },
>         hostpci4bus0 => { bus => "pcie.0", addr => 9 },
>         hostpci5bus0 => { bus => "pcie.0", addr => 10 },
>         hostpci6bus0 => { bus => "pcie.0", addr => 11 },
>         hostpci7bus0 => { bus => "pcie.0", addr => 12 },
>         hostpci8bus0 => { bus => "pcie.0", addr => 13 },
>         hostpci9bus0 => { bus => "pcie.0", addr => 14 },
>         hostpci10bus0 => { bus => "pcie.0", addr => 15 },
>         hostpci11bus0 => { bus => "pcie.0", addr => 21 },
>         hostpci12bus0 => { bus => "pcie.0", addr => 22 },
>         hostpci13bus0 => { bus => "pcie.0", addr => 23 },
>         hostpci14bus0 => { bus => "pcie.0", addr => 24 },
>         hostpci15bus0 => { bus => "pcie.0", addr => 25 },
> }
> 
> 
> Christian Moser
> Mobile:    +358-40-5022105   
> Email:     cmos@maklee.com
> URL:       www.maklee.com
> -----Original Message-----
> From: DERUMIER, Alexandre <alexandre.derumier@groupe-cyllene.com> 
> Sent: Wednesday, August 14, 2024 09:45
> To: pve-devel@lists.proxmox.com; cmos@maklee.com
> Subject: Re: [pve-devel] issues with Virtio-SCSI devicde on Proxmox...
> 
> Hi,
> 
> I didn't see the responde of Fiona but indeed:
> 
> https://lists.gnu.org/archive/html/qemu-devel/2021-09/msg01567.html
> 
> "virtio devices can be exposed in upto three ways
> 
>  - Legacy - follows virtio 0.9 specification. always uses PCI
>             ID range 0x1000-0x103F
>  - Transitional - follows virtio 0.9 specification by default, but
>                   can auto-negotiate with guest for 1.0 spce. Always
>                   uses PCI ID range 0x1000-0x103F
>  - Modern - follows virtio 1.0 specification. always uses PCI
>             ID range 0x1040-0x107F
> 
> With QEMU, historically devices placed on a PCI bus will always default
> to being in transitional mode, while devices placed on a PCI-E bus will
> always dfault to being in modern mode.
> "
> 
> 
> -------- Message initial --------
> De: Fiona Ebner <f.ebner@proxmox.com>
> Répondre à: Proxmox VE development discussion <pve-
> devel@lists.proxmox.com>
> À: Proxmox VE development discussion <pve-devel@lists.proxmox.com>,
> Christian Moser <cmos@maklee.com>
> Objet: Re: [pve-devel] issues with Virtio-SCSI devicde on Proxmox...
> Date: 13/08/2024 10:55:47
> 
> Hi,
> 
> Am 12.08.24 um 12:40 schrieb Christian Moser:
> >  Hello,
> >  
> >  I work for VSI (VMS Software Inc) which is porting the OpenVMS 
> >  operating system to x86. At this point we successfully on various 
> >  hypervisors, but have some issues on the KVM running on Proxmox.
> >  
> >  The OpenVMS VM works just fine with SATA disks and it also works with
> >  for example virtio-network device etc., but trying to use virtio-scsi
> >  hangs  the driver. I have debugged this and I can successfully 
> >  configure the port/controller, send the IO request to the device. It 
> >  then gets processed by the device, which posts the results and sets 
> >  the interrupt bit in the ISR register, but it never asserts the 
> >  interrupt hence the driver never gets notified and the I/O hangs.
> >  
> >  I have tried both “virtio-scsi-pci” and “virtio-scsi-single”, but no 
> >  luck. The emulated virtio-scsi device is a legacy device. But then 
> >  again, the virtio-network device is also a legacy device and here we 
> >  are getting interrupts. One thing which bothers me is the fact that 
> >  the “legacy interrupt disable” bit is set in the PCI config space of 
> >  the virtio-scsi device (i.e. bit 10 at offset 4)
> >  
> >  Questions:
> >  * is there a way to configure a modern virtio-scsi devcie (i.e.
> >  disable_legacy=on) ?
> > 
> 
> I've already answered this question when you asked in a mail addressed
> directly to me:
> 
> Am 12.08.24 um 11:58 schrieb Fiona Ebner:
> >  Hi,
> >  
> >  It seems that you either need to attach the "virtio-scsi-pci" device 
> >  to a pcie bus or explicitly set the "disable_legacy=on" option for
> >  the 
> >  device, neither of which Proxmox VE currently does or allows 
> >  configuring. The only way right now seems to be to attach the disk 
> >  yourself via custom arguments (the 'args' in the Proxmox VE VM 
> >  configuration), but then the disk will be invisible to Proxmox VE 
> >  operations which look at specific disk keys in the configuration!
> >  
> >  Feel free to open a feature request on our bug tracker to make this
> >  configurable:
> >  https://antiphishing.vadesecure.com/v4?f=MDk0SW9xRkhTVGYydkJlTIW3tbTr
> >  aK7neiUoWcvis0-pokd-Q2cwuWCZhgBcTw_yw4KqJS-oP6jCsk-zj-
> >  1YMQ&i=ZURHSDhnY0huQ2tPS3VZahJdhRaQu1ItpJrYkl8wXrA&k=q1N6&r=RjIyR1Rob
> >  kVxVWlHTXhKT3I72JjP2S9ryFg3B_csBogfeb2oROpP8B8yUJUd6awk&s=1aab5a2ada7
> >  3beb46aa02df4e18ff6c5ba2db6d6ff2d1f302a3c4c83b13c8ef6&u=https%3A%2F%2
> >  Fbugzilla.proxmox.com%2F
> >  
> >  P.S. Please write to the developer list rather than individual 
> >  developers for such questions in the feature:
> >  https://antiphishing.vadesecure.com/v4?f=MDk0SW9xRkhTVGYydkJlTIW3tbTr
> >  aK7neiUoWcvis0-pokd-Q2cwuWCZhgBcTw_yw4KqJS-oP6jCsk-zj-
> >  1YMQ&i=ZURHSDhnY0huQ2tPS3VZahJdhRaQu1ItpJrYkl8wXrA&k=q1N6&r=RjIyR1Rob
> >  kVxVWlHTXhKT3I72JjP2S9ryFg3B_csBogfeb2oROpP8B8yUJUd6awk&s=50133960c87
> >  16b5426bc084f398f7760f04af8739fd68cad36d17b1dcd887778&u=https%3A%2F%2
> >  Flists.proxmox.com%2Fcgi-bin%2Fmailman%2Flistinfo%2Fpve-devel
> >  
> >  Best Regards,
> >  Fiona
> > 
> 
> >  * why is the legacy interrupt bit set in the PCI config space ?
> > 
> 
> Most likely because the virtio-scsi-pci is configured without the
> "disable_legacy=on" option. If not explicitly set, the option will be
> "disable_legacy=auto" and when not attached to PCIe (which is the case
> for Proxmox VE currently), then legacy mode will be enabled.
> 
> >  * Are there any working driver for virtio-scsi on this KVM using Q35 
> >  machine? i.e. any other OS
> > 
> 
> The virtio drivers for Windows and the ones in Linux work just fine
> with our configuration.
> 
> 
> >  Any thoughts why these interrupts are not getting delivered on the 
> >  PCIE bus?
> > 
> 
> We do not configure the virtio-scsi-pci on a PCIe bus currently, see my
> initial answer.
> 
> Best Regards,
> Fiona
> 
> 
> 
> pve-devel mailing list
> pve-devel@lists.proxmox.com
> https://antiphishing.vadesecure.com/v4?f=MDk0SW9xRkhTVGYydkJlTIW3tbTraK
> 
> 7neiUoWcvis0-pokd-Q2cwuWCZhgBcTw_yw4KqJS-oP6jCsk-zj-
> 1YMQ&i=ZURHSDhnY0huQ2tPS3VZahJdhRaQu1ItpJrYkl8wXrA&k=q1N6&r=RjIyR1RobkV
> 
> xVWlHTXhKT3I72JjP2S9ryFg3B_csBogfeb2oROpP8B8yUJUd6awk&s=50133960c8716b5
> 
> 426bc084f398f7760f04af8739fd68cad36d17b1dcd887778&u=https%3A%2F%2Flists
> 
> .proxmox.com%2Fcgi-bin%2Fmailman%2Flistinfo%2Fpve-devel
> 
> 
> 


[-- Attachment #2: Type: text/plain, Size: 160 bytes --]

_______________________________________________
pve-devel mailing list
pve-devel@lists.proxmox.com
https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel

^ permalink raw reply	[flat|nested] 11+ messages in thread

* [pve-devel] FW: FW: issues with Virtio-SCSI devicde on Proxmox...
       [not found]           ` <6ea8c90b469da48525ed743b6541bb3644be4a6c.camel@groupe-cyllene.com>
@ 2024-08-15  5:35             ` Christian Moser
  0 siblings, 0 replies; 11+ messages in thread
From: Christian Moser @ 2024-08-15  5:35 UTC (permalink / raw)
  To: 'DERUMIER, Alexandre', pve-devel; +Cc: Christian Moser

I finally got it to work. The virtio-scsi device has 2 interrupt models, either the legacy "wire" interrupt or MSIX interrupts. During boot, the OpenVMS bus support code is probing the bus and configures the devices. It will default to the traditional IOAPIC interrupt and if the capability bit is set in the PCI config status register it will parse the device capabilities. Virtio-SCSI reports that it has MSIX capability, so now the bus support code is setting the interrupt mechanism to MSIX. But our OpenVMS driver for the virtio-scsi device does not yet support MSIX, hence the disconnect and hang, because we do not get any interrupts delivered.

I can special case the virtio-scsi device in the PCI config routine to ignore the MSIX capability and then everything is working fine. I checked on other hypervisors, like for example Virtualbox and here the virtio-scsi device is reporting capability as "vendor specific" which are ignored by our bus support code.

I guess there is no way of disabling the MSIX capability on Proxmox with some flags forvirtio-scsi? In the long run, we should modify our driver to support MSIX interrupts. But I had issues enabling them correctly on virtio-scsi, I need to find some driver for Linux or Windows which supports MSIX and verify what is incorrect on our side.

thanks for your help and information

/cmos

_______________________________________________________
Christian Moser
Mobile:    +358-40-5022105			
Email:     cmos@maklee.com
URL:       www.maklee.com
-----Original Message-----
From: DERUMIER, Alexandre <alexandre.derumier@groupe-cyllene.com> 
Sent: Wednesday, August 14, 2024 16:06
To: cmos@maklee.com
Cc: pve-devel@lists.proxmox.com
Subject: Re: FW: [pve-devel] issues with Virtio-SCSI devicde on Proxmox...

>>I'm talking about virtio-scsi. Our virtio-network device is working 
>>fine

Yes, sorry, I wanted to said virtio-scsi.   

All pci devices excluding passthrough devices (with pcie=on flag) are actually plugged to pci bridge


sub get_pci_addr_map {
    $pci_addr_map = {
	piix3 => { bus => 0, addr => 1, conflict_ok => qw(ehci)  },
	ehci => { bus => 0, addr => 1, conflict_ok => qw(piix3) }, # instead of piix3 on arm
	vga => { bus => 0, addr => 2, conflict_ok => qw(legacy-igd) },
	'legacy-igd' => { bus => 0, addr => 2, conflict_ok => qw(vga) }, # legacy-igd requires vga=none
	balloon0 => { bus => 0, addr => 3 },
	watchdog => { bus => 0, addr => 4 },
	scsihw0 => { bus => 0, addr => 5, conflict_ok => qw(pci.3) },
	'pci.3' => { bus => 0, addr => 5, conflict_ok => qw(scsihw0) }, # also used for virtio-scsi-single bridge
	scsihw1 => { bus => 0, addr => 6 },
	ahci0 => { bus => 0, addr => 7 },
	qga0 => { bus => 0, addr => 8 },
	spice => { bus => 0, addr => 9 },
	virtio0 => { bus => 0, addr => 10 },
	virtio1 => { bus => 0, addr => 11 },
	virtio2 => { bus => 0, addr => 12 },
	virtio3 => { bus => 0, addr => 13 },
	virtio4 => { bus => 0, addr => 14 },
	virtio5 => { bus => 0, addr => 15 },
	hostpci0 => { bus => 0, addr => 16 },
	hostpci1 => { bus => 0, addr => 17 },
	net0 => { bus => 0, addr => 18 },
	net1 => { bus => 0, addr => 19 },
	net2 => { bus => 0, addr => 20 },
	net3 => { bus => 0, addr => 21 },
	net4 => { bus => 0, addr => 22 },
	net5 => { bus => 0, addr => 23 },
	vga1 => { bus => 0, addr => 24 },
	vga2 => { bus => 0, addr => 25 },
	vga3 => { bus => 0, addr => 26 },
	hostpci2 => { bus => 0, addr => 27 },
	hostpci3 => { bus => 0, addr => 28 },
	#addr29 : usb-host (pve-usb.cfg)
	'pci.1' => { bus => 0, addr => 30 },
	'pci.2' => { bus => 0, addr => 31 },
	'net6' => { bus => 1, addr => 1 },
	'net7' => { bus => 1, addr => 2 },
	'net8' => { bus => 1, addr => 3 },
	'net9' => { bus => 1, addr => 4 },
	'net10' => { bus => 1, addr => 5 },
	'net11' => { bus => 1, addr => 6 },
	'net12' => { bus => 1, addr => 7 },
	'net13' => { bus => 1, addr => 8 },
	'net14' => { bus => 1, addr => 9 },
	'net15' => { bus => 1, addr => 10 },
	'net16' => { bus => 1, addr => 11 },
	'net17' => { bus => 1, addr => 12 },
	'net18' => { bus => 1, addr => 13 },
	'net19' => { bus => 1, addr => 14 },
	'net20' => { bus => 1, addr => 15 },
	'net21' => { bus => 1, addr => 16 },
	'net22' => { bus => 1, addr => 17 },
	'net23' => { bus => 1, addr => 18 },
	'net24' => { bus => 1, addr => 19 },
	'net25' => { bus => 1, addr => 20 },
	'net26' => { bus => 1, addr => 21 },
	'net27' => { bus => 1, addr => 22 },
	'net28' => { bus => 1, addr => 23 },
	'net29' => { bus => 1, addr => 24 },
	'net30' => { bus => 1, addr => 25 },
	'net31' => { bus => 1, addr => 26 },
	'xhci' => { bus => 1, addr => 27 },
	'pci.4' => { bus => 1, addr => 28 },
	'rng0' => { bus => 1, addr => 29 },
	'pci.2-igd' => { bus => 1, addr => 30 }, # replaces pci.2 in case a legacy IGD device is passed through
	'virtio6' => { bus => 2, addr => 1 },
	'virtio7' => { bus => 2, addr => 2 },
	'virtio8' => { bus => 2, addr => 3 },
	'virtio9' => { bus => 2, addr => 4 },
	'virtio10' => { bus => 2, addr => 5 },
	'virtio11' => { bus => 2, addr => 6 },
	'virtio12' => { bus => 2, addr => 7 },
	'virtio13' => { bus => 2, addr => 8 },
	'virtio14' => { bus => 2, addr => 9 },
	'virtio15' => { bus => 2, addr => 10 },
	'ivshmem' => { bus => 2, addr => 11 },
	'audio0' => { bus => 2, addr => 12 },
	hostpci4 => { bus => 2, addr => 13 },
	hostpci5 => { bus => 2, addr => 14 },
	hostpci6 => { bus => 2, addr => 15 },
	hostpci7 => { bus => 2, addr => 16 },
	hostpci8 => { bus => 2, addr => 17 },
	hostpci9 => { bus => 2, addr => 18 },
	hostpci10 => { bus => 2, addr => 19 },
	hostpci11 => { bus => 2, addr => 20 },
	hostpci12 => { bus => 2, addr => 21 },
	hostpci13 => { bus => 2, addr => 22 },
	hostpci14 => { bus => 2, addr => 23 },
	hostpci15 => { bus => 2, addr => 24 },
	'virtioscsi0' => { bus => 3, addr => 1 },
	'virtioscsi1' => { bus => 3, addr => 2 },
	'virtioscsi2' => { bus => 3, addr => 3 },
	'virtioscsi3' => { bus => 3, addr => 4 },
	'virtioscsi4' => { bus => 3, addr => 5 },
	'virtioscsi5' => { bus => 3, addr => 6 },
	'virtioscsi6' => { bus => 3, addr => 7 },
	'virtioscsi7' => { bus => 3, addr => 8 },
	'virtioscsi8' => { bus => 3, addr => 9 },
	'virtioscsi9' => { bus => 3, addr => 10 },
	'virtioscsi10' => { bus => 3, addr => 11 },
	'virtioscsi11' => { bus => 3, addr => 12 },
	'virtioscsi12' => { bus => 3, addr => 13 },
	'virtioscsi13' => { bus => 3, addr => 14 },
	'virtioscsi14' => { bus => 3, addr => 15 },
	'virtioscsi15' => { bus => 3, addr => 16 },
	'virtioscsi16' => { bus => 3, addr => 17 },
	'virtioscsi17' => { bus => 3, addr => 18 },
	'virtioscsi18' => { bus => 3, addr => 19 },
	'virtioscsi19' => { bus => 3, addr => 20 },
	'virtioscsi20' => { bus => 3, addr => 21 },
	'virtioscsi21' => { bus => 3, addr => 22 },
	'virtioscsi22' => { bus => 3, addr => 23 },
	'virtioscsi23' => { bus => 3, addr => 24 },
	'virtioscsi24' => { bus => 3, addr => 25 },
	'virtioscsi25' => { bus => 3, addr => 26 },
	'virtioscsi26' => { bus => 3, addr => 27 },
	'virtioscsi27' => { bus => 3, addr => 28 },
	'virtioscsi28' => { bus => 3, addr => 29 },
	'virtioscsi29' => { bus => 3, addr => 30 },
	'virtioscsi30' => { bus => 3, addr => 31 },
	'scsihw2' => { bus => 4, addr => 1 },
	'scsihw3' => { bus => 4, addr => 2 },
	'scsihw4' => { bus => 4, addr => 3 },
    } if !defined($pci_addr_map);
    return $pci_addr_map;

> 
> > > Alexandre,
> > > 
> > > the statement below is not true for our case. The OpenVMS guest OS 
> > > is using a PCIE bus, so the virtio-scsi device should be exposed 
> > > as "modern", but is not. Not sure why not at this point
> > 
> 
> See Fiona response,
> 
> the pci express bridge is present, but the virtio-net is plugged on a 
> simple pci bridge.
> ²
> pci express slots are mostly used for passthrough devices
> 
> 
> 
> my $pcie_addr_map;
> sub get_pcie_addr_map {
>     $pcie_addr_map = {
>         vga => { bus => 'pcie.0', addr => 1 },
>         hostpci0 => { bus => "ich9-pcie-port-1", addr => 0 },
>         hostpci1 => { bus => "ich9-pcie-port-2", addr => 0 },
>         hostpci2 => { bus => "ich9-pcie-port-3", addr => 0 },
>         hostpci3 => { bus => "ich9-pcie-port-4", addr => 0 },
>         hostpci4 => { bus => "ich9-pcie-port-5", addr => 0 },
>         hostpci5 => { bus => "ich9-pcie-port-6", addr => 0 },
>         hostpci6 => { bus => "ich9-pcie-port-7", addr => 0 },
>         hostpci7 => { bus => "ich9-pcie-port-8", addr => 0 },
>         hostpci8 => { bus => "ich9-pcie-port-9", addr => 0 },
>         hostpci9 => { bus => "ich9-pcie-port-10", addr => 0 },
>         hostpci10 => { bus => "ich9-pcie-port-11", addr => 0 },
>         hostpci11 => { bus => "ich9-pcie-port-12", addr => 0 },
>         hostpci12 => { bus => "ich9-pcie-port-13", addr => 0 },
>         hostpci13 => { bus => "ich9-pcie-port-14", addr => 0 },
>         hostpci14 => { bus => "ich9-pcie-port-15", addr => 0 },
>         hostpci15 => { bus => "ich9-pcie-port-16", addr => 0 },
>         # win7 is picky about pcie assignments
>         hostpci0bus0 => { bus => "pcie.0", addr => 16 },
>         hostpci1bus0 => { bus => "pcie.0", addr => 17 },
>         hostpci2bus0 => { bus => "pcie.0", addr => 18 },
>         hostpci3bus0 => { bus => "pcie.0", addr => 19 },
>         ivshmem => { bus => 'pcie.0', addr => 20 },
>         hostpci4bus0 => { bus => "pcie.0", addr => 9 },
>         hostpci5bus0 => { bus => "pcie.0", addr => 10 },
>         hostpci6bus0 => { bus => "pcie.0", addr => 11 },
>         hostpci7bus0 => { bus => "pcie.0", addr => 12 },
>         hostpci8bus0 => { bus => "pcie.0", addr => 13 },
>         hostpci9bus0 => { bus => "pcie.0", addr => 14 },
>         hostpci10bus0 => { bus => "pcie.0", addr => 15 },
>         hostpci11bus0 => { bus => "pcie.0", addr => 21 },
>         hostpci12bus0 => { bus => "pcie.0", addr => 22 },
>         hostpci13bus0 => { bus => "pcie.0", addr => 23 },
>         hostpci14bus0 => { bus => "pcie.0", addr => 24 },
>         hostpci15bus0 => { bus => "pcie.0", addr => 25 }, }
> 
> 
> Christian Moser
> Mobile:    +358-40-5022105   
> Email:     cmos@maklee.com
> URL:       www.maklee.com
> -----Original Message-----
> From: DERUMIER, Alexandre <alexandre.derumier@groupe-cyllene.com>
> Sent: Wednesday, August 14, 2024 09:45
> To: pve-devel@lists.proxmox.com; cmos@maklee.com
> Subject: Re: [pve-devel] issues with Virtio-SCSI devicde on Proxmox...
> 
> Hi,
> 
> I didn't see the responde of Fiona but indeed:
> 
> https://lists.gnu.org/archive/html/qemu-devel/2021-09/msg01567.html
> 
> "virtio devices can be exposed in upto three ways
> 
>  - Legacy - follows virtio 0.9 specification. always uses PCI
>             ID range 0x1000-0x103F
>  - Transitional - follows virtio 0.9 specification by default, but
>                   can auto-negotiate with guest for 1.0 spce. Always
>                   uses PCI ID range 0x1000-0x103F
>  - Modern - follows virtio 1.0 specification. always uses PCI
>             ID range 0x1040-0x107F
> 
> With QEMU, historically devices placed on a PCI bus will always 
> default to being in transitional mode, while devices placed on a PCI-E 
> bus will always dfault to being in modern mode.
> "
> 
> 
> -------- Message initial --------
> De: Fiona Ebner <f.ebner@proxmox.com>
> Répondre à: Proxmox VE development discussion <pve- 
> devel@lists.proxmox.com>
> À: Proxmox VE development discussion <pve-devel@lists.proxmox.com>, 
> Christian Moser <cmos@maklee.com>
> Objet: Re: [pve-devel] issues with Virtio-SCSI devicde on Proxmox...
> Date: 13/08/2024 10:55:47
> 
> Hi,
> 
> Am 12.08.24 um 12:40 schrieb Christian Moser:
> >  Hello,
> >  
> >  I work for VSI (VMS Software Inc) which is porting the OpenVMS  
> > operating system to x86. At this point we successfully on various  
> > hypervisors, but have some issues on the KVM running on Proxmox.
> >  
> >  The OpenVMS VM works just fine with SATA disks and it also works 
> > with  for example virtio-network device etc., but trying to use 
> > virtio-scsi  hangs  the driver. I have debugged this and I can 
> > successfully  configure the port/controller, send the IO request to 
> > the device. It  then gets processed by the device, which posts the 
> > results and sets  the interrupt bit in the ISR register, but it 
> > never asserts the  interrupt hence the driver never gets notified and the I/O hangs.
> >  
> >  I have tried both “virtio-scsi-pci” and “virtio-scsi-single”, but 
> > no  luck. The emulated virtio-scsi device is a legacy device. But 
> > then  again, the virtio-network device is also a legacy device and 
> > here we  are getting interrupts. One thing which bothers me is the 
> > fact that  the “legacy interrupt disable” bit is set in the PCI 
> > config space of  the virtio-scsi device (i.e. bit 10 at offset 4)
> >  
> >  Questions:
> >  * is there a way to configure a modern virtio-scsi devcie (i.e.
> >  disable_legacy=on) ?
> > 
> 
> I've already answered this question when you asked in a mail addressed 
> directly to me:
> 
> Am 12.08.24 um 11:58 schrieb Fiona Ebner:
> >  Hi,
> >  
> >  It seems that you either need to attach the "virtio-scsi-pci" 
> > device  to a pcie bus or explicitly set the "disable_legacy=on" 
> > option for  the  device, neither of which Proxmox VE currently does 
> > or allows  configuring. The only way right now seems to be to attach 
> > the disk  yourself via custom arguments (the 'args' in the Proxmox 
> > VE VM  configuration), but then the disk will be invisible to 
> > Proxmox VE  operations which look at specific disk keys in the 
> > configuration!
> >  
> >  Feel free to open a feature request on our bug tracker to make this
> >  configurable:
> >  
> > https://antiphishing.vadesecure.com/v4?f=MDk0SW9xRkhTVGYydkJlTIW3tbT
> > r
> >  aK7neiUoWcvis0-pokd-Q2cwuWCZhgBcTw_yw4KqJS-oP6jCsk-zj-
> >  
> > 1YMQ&i=ZURHSDhnY0huQ2tPS3VZahJdhRaQu1ItpJrYkl8wXrA&k=q1N6&r=RjIyR1Ro
> > b
> >  
> > kVxVWlHTXhKT3I72JjP2S9ryFg3B_csBogfeb2oROpP8B8yUJUd6awk&s=1aab5a2ada
> > 7
> >  
> > 3beb46aa02df4e18ff6c5ba2db6d6ff2d1f302a3c4c83b13c8ef6&u=https%3A%2F%
> > 2
> >  Fbugzilla.proxmox.com%2F
> >  
> >  P.S. Please write to the developer list rather than individual  
> > developers for such questions in the feature:
> >  
> > https://antiphishing.vadesecure.com/v4?f=MDk0SW9xRkhTVGYydkJlTIW3tbT
> > r
> >  aK7neiUoWcvis0-pokd-Q2cwuWCZhgBcTw_yw4KqJS-oP6jCsk-zj-
> >  
> > 1YMQ&i=ZURHSDhnY0huQ2tPS3VZahJdhRaQu1ItpJrYkl8wXrA&k=q1N6&r=RjIyR1Ro
> > b
> >  
> > kVxVWlHTXhKT3I72JjP2S9ryFg3B_csBogfeb2oROpP8B8yUJUd6awk&s=50133960c8
> > 7
> >  
> > 16b5426bc084f398f7760f04af8739fd68cad36d17b1dcd887778&u=https%3A%2F%
> > 2  Flists.proxmox.com%2Fcgi-bin%2Fmailman%2Flistinfo%2Fpve-devel
> >  
> >  Best Regards,
> >  Fiona
> > 
> 
> >  * why is the legacy interrupt bit set in the PCI config space ?
> > 
> 
> Most likely because the virtio-scsi-pci is configured without the 
> "disable_legacy=on" option. If not explicitly set, the option will be 
> "disable_legacy=auto" and when not attached to PCIe (which is the case 
> for Proxmox VE currently), then legacy mode will be enabled.
> 
> >  * Are there any working driver for virtio-scsi on this KVM using 
> > Q35  machine? i.e. any other OS
> > 
> 
> The virtio drivers for Windows and the ones in Linux work just fine 
> with our configuration.
> 
> 
> >  Any thoughts why these interrupts are not getting delivered on the  
> > PCIE bus?
> > 
> 
> We do not configure the virtio-scsi-pci on a PCIe bus currently, see 
> my initial answer.
> 
> Best Regards,
> Fiona
> 
> 
> 
> pve-devel mailing list
> pve-devel@lists.proxmox.com
> https://antiphishing.vadesecure.com/v4?f=MDk0SW9xRkhTVGYydkJlTIW3tbTra
> K
> 
> 7neiUoWcvis0-pokd-Q2cwuWCZhgBcTw_yw4KqJS-oP6jCsk-zj-
> 1YMQ&i=ZURHSDhnY0huQ2tPS3VZahJdhRaQu1ItpJrYkl8wXrA&k=q1N6&r=RjIyR1Robk
> V
> 
> xVWlHTXhKT3I72JjP2S9ryFg3B_csBogfeb2oROpP8B8yUJUd6awk&s=50133960c8716b
> 5
> 
> 426bc084f398f7760f04af8739fd68cad36d17b1dcd887778&u=https%3A%2F%2Flist
> s
> 
> .proxmox.com%2Fcgi-bin%2Fmailman%2Flistinfo%2Fpve-devel
> 
> 
> 



_______________________________________________
pve-devel mailing list
pve-devel@lists.proxmox.com
https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel

^ permalink raw reply	[flat|nested] 11+ messages in thread

end of thread, other threads:[~2024-08-19  8:37 UTC | newest]

Thread overview: 11+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2024-08-12 10:40 [pve-devel] issues with Virtio-SCSI devicde on Proxmox Christian Moser
2024-08-13  8:55 ` Fiona Ebner
2024-08-13  9:33   ` [pve-devel] FW: " Christian Moser
2024-08-14  6:44   ` [pve-devel] " DERUMIER, Alexandre via pve-devel
     [not found]   ` <1178cb3475d719ae31f0c375cd3930fc24d98401.camel@groupe-cyllene.com>
2024-08-14  7:20     ` [pve-devel] FW: " Christian Moser
2024-08-14 12:22       ` DERUMIER, Alexandre via pve-devel
     [not found]       ` <c851a27f4f5eca7c767fbffa48cb208e2d8fe1e6.camel@groupe-cyllene.com>
2024-08-14 12:48         ` Christian Moser
2024-08-14 13:05           ` DERUMIER, Alexandre via pve-devel
     [not found]           ` <6ea8c90b469da48525ed743b6541bb3644be4a6c.camel@groupe-cyllene.com>
2024-08-15  5:35             ` [pve-devel] FW: " Christian Moser
2024-08-13 16:12 ` [pve-devel] " DERUMIER, Alexandre via pve-devel
     [not found] ` <67b222322506a9eab0f7cf7da5a9fd715c8a91ff.camel@groupe-cyllene.com>
2024-08-14  6:42   ` [pve-devel] FW: " Christian Moser

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox
Service provided by Proxmox Server Solutions GmbH | Privacy | Legal