All of lore.kernel.org
 help / color / mirror / Atom feed
* [virtio-dev] [PATCH v3] content: support SR-IOV
@ 2018-05-22 10:26 Tiwei Bie
  2018-05-22 11:03 ` [virtio-dev] " Cornelia Huck
  2018-05-23 17:54 ` [virtio-dev] " Michael S. Tsirkin
  0 siblings, 2 replies; 9+ messages in thread
From: Tiwei Bie @ 2018-05-22 10:26 UTC (permalink / raw)
  To: mst, cohuck, stefanha, pbonzini, virtio-dev
  Cc: dan.daly, alexander.h.duyck, mark.d.rustad, cunming.liang, zhihong.wang

Allocate a feature bit for virtio devices which support SR-IOV.

Suggested-by: Michael S. Tsirkin <mst@redhat.com>
Signed-off-by: Tiwei Bie <tiwei.bie@intel.com>
Fixes: https://github.com/oasis-tcs/virtio-spec/issues/11
---
More details can be found from this thread:
https://patchwork.kernel.org/patch/10285541/

This patch needs below patch applied first:
https://github.com/oasis-tcs/virtio-spec/issues/10
https://lists.oasis-open.org/archives/virtio-dev/201805/msg00046.html

v2 -> v3:
- Improve the wording (Cornelia);

v1 -> v2:
- s/Reserve/Allocate/ (MST);
- Add a Fixes tag (MST);
- Be more explicit in driver requirement (MST);
- Remove the "device MAY fail" description (MST);
- Rebase on IO_BARRIER patch;

RFC -> v1:
- Mention PCI in the description (Cornelia);

 content.tex | 15 +++++++++++++--
 1 file changed, 13 insertions(+), 2 deletions(-)

diff --git a/content.tex b/content.tex
index 95c243f..e9e6f9a 100644
--- a/content.tex
+++ b/content.tex
@@ -95,10 +95,10 @@ Feature bits are allocated as follows:
 \begin{description}
 \item[0 to 23] Feature bits for the specific device type
 
-\item[24 to 36] Feature bits reserved for extensions to the queue and
+\item[24 to 37] Feature bits reserved for extensions to the queue and
   feature negotiation mechanisms
 
-\item[37 and above] Feature bits reserved for future extensions.
+\item[38 and above] Feature bits reserved for future extensions.
 \end{description}
 
 \begin{note}
@@ -5357,6 +5357,9 @@ Descriptors} and \ref{sec:Packed Virtqueues / Indirect Flag: Scatter-Gather Supp
   better performance.  This feature indicates whether
   a stronger form of barrier suitable for hardware
   devices is necessary.
+  \item[VIRTIO_F_SR_IOV(37)] This feature indicates that
+  the device supports Single Root I/O Virtualization.
+  Currently only PCI devices support this feature.
 \end{description}
 
 \drivernormative{\section}{Reserved Feature Bits}{Reserved Feature Bits}
@@ -5376,6 +5379,11 @@ A driver SHOULD accept VIRTIO_F_IO_BARRIER if it is offered.
 If VIRTIO_F_IO_BARRIER has been negotiated, a driver MUST use
 the barriers suitable for hardware devices.
 
+A driver SHOULD accept VIRTIO_F_SR_IOV if it is offered.
+If VIRTIO_F_SR_IOV has been negotiated, a driver can
+enable virtual functions through the device's PCI SR-IOV
+capability structure.
+
 \devicenormative{\section}{Reserved Feature Bits}{Reserved Feature Bits}
 
 A device MUST offer VIRTIO_F_VERSION_1.  A device MAY fail to operate further
@@ -5392,6 +5400,9 @@ buffers in the same order in which they have been available.
 A device MAY fail to operate further if VIRTIO_F_IO_BARRIER
 is not accepted.
 
+A device SHOULD offer VIRTIO_F_SR_IOV if it presents a PCI
+SR-IOV capability structure.
+
 \section{Legacy Interface: Reserved Feature Bits}\label{sec:Reserved Feature Bits / Legacy Interface: Reserved Feature Bits}
 
 Transitional devices MAY offer the following:
-- 
2.17.0


---------------------------------------------------------------------
To unsubscribe, e-mail: virtio-dev-unsubscribe@lists.oasis-open.org
For additional commands, e-mail: virtio-dev-help@lists.oasis-open.org


^ permalink raw reply related	[flat|nested] 9+ messages in thread

* [virtio-dev] Re: [PATCH v3] content: support SR-IOV
  2018-05-22 10:26 [virtio-dev] [PATCH v3] content: support SR-IOV Tiwei Bie
@ 2018-05-22 11:03 ` Cornelia Huck
  2018-05-23 17:54 ` [virtio-dev] " Michael S. Tsirkin
  1 sibling, 0 replies; 9+ messages in thread
From: Cornelia Huck @ 2018-05-22 11:03 UTC (permalink / raw)
  To: Tiwei Bie
  Cc: mst, stefanha, pbonzini, virtio-dev, dan.daly, alexander.h.duyck,
	mark.d.rustad, cunming.liang, zhihong.wang

On Tue, 22 May 2018 18:26:15 +0800
Tiwei Bie <tiwei.bie@intel.com> wrote:

> Allocate a feature bit for virtio devices which support SR-IOV.
> 
> Suggested-by: Michael S. Tsirkin <mst@redhat.com>
> Signed-off-by: Tiwei Bie <tiwei.bie@intel.com>
> Fixes: https://github.com/oasis-tcs/virtio-spec/issues/11

Reviewed-by: Cornelia Huck <cohuck@redhat.com>

---------------------------------------------------------------------
To unsubscribe, e-mail: virtio-dev-unsubscribe@lists.oasis-open.org
For additional commands, e-mail: virtio-dev-help@lists.oasis-open.org


^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [virtio-dev] [PATCH v3] content: support SR-IOV
  2018-05-22 10:26 [virtio-dev] [PATCH v3] content: support SR-IOV Tiwei Bie
  2018-05-22 11:03 ` [virtio-dev] " Cornelia Huck
@ 2018-05-23 17:54 ` Michael S. Tsirkin
  2018-05-23 19:34   ` Michael S. Tsirkin
  1 sibling, 1 reply; 9+ messages in thread
From: Michael S. Tsirkin @ 2018-05-23 17:54 UTC (permalink / raw)
  To: Tiwei Bie
  Cc: cohuck, stefanha, pbonzini, virtio-dev, dan.daly,
	alexander.h.duyck, mark.d.rustad, cunming.liang, zhihong.wang

On Tue, May 22, 2018 at 06:26:15PM +0800, Tiwei Bie wrote:
> Allocate a feature bit for virtio devices which support SR-IOV.
> 
> Suggested-by: Michael S. Tsirkin <mst@redhat.com>
> Signed-off-by: Tiwei Bie <tiwei.bie@intel.com>
> Fixes: https://github.com/oasis-tcs/virtio-spec/issues/11
> ---
> More details can be found from this thread:
> https://patchwork.kernel.org/patch/10285541/
> 
> This patch needs below patch applied first:
> https://github.com/oasis-tcs/virtio-spec/issues/10
> https://lists.oasis-open.org/archives/virtio-dev/201805/msg00046.html
> 
> v2 -> v3:
> - Improve the wording (Cornelia);
> 
> v1 -> v2:
> - s/Reserve/Allocate/ (MST);
> - Add a Fixes tag (MST);
> - Be more explicit in driver requirement (MST);
> - Remove the "device MAY fail" description (MST);
> - Rebase on IO_BARRIER patch;
> 
> RFC -> v1:
> - Mention PCI in the description (Cornelia);
> 
>  content.tex | 15 +++++++++++++--
>  1 file changed, 13 insertions(+), 2 deletions(-)
> 
> diff --git a/content.tex b/content.tex
> index 95c243f..e9e6f9a 100644
> --- a/content.tex
> +++ b/content.tex
> @@ -95,10 +95,10 @@ Feature bits are allocated as follows:
>  \begin{description}
>  \item[0 to 23] Feature bits for the specific device type
>  
> -\item[24 to 36] Feature bits reserved for extensions to the queue and
> +\item[24 to 37] Feature bits reserved for extensions to the queue and
>    feature negotiation mechanisms
>  
> -\item[37 and above] Feature bits reserved for future extensions.
> +\item[38 and above] Feature bits reserved for future extensions.
>  \end{description}
>  
>  \begin{note}
> @@ -5357,6 +5357,9 @@ Descriptors} and \ref{sec:Packed Virtqueues / Indirect Flag: Scatter-Gather Supp
>    better performance.  This feature indicates whether
>    a stronger form of barrier suitable for hardware
>    devices is necessary.
> +  \item[VIRTIO_F_SR_IOV(37)] This feature indicates that
> +  the device supports Single Root I/O Virtualization.
> +  Currently only PCI devices support this feature.

I guess the assumption is that all VFs and the PF are of the same type?

I feel it might be handy down the road to support mixing
types. For this reason, to avoid binding a wrong driver
to a VF, I propose that all VFs have this bit too,
and require that drivers ignore VFs without this bit.

What do you think?

>  \end{description}
>  
>  \drivernormative{\section}{Reserved Feature Bits}{Reserved Feature Bits}
> @@ -5376,6 +5379,11 @@ A driver SHOULD accept VIRTIO_F_IO_BARRIER if it is offered.
>  If VIRTIO_F_IO_BARRIER has been negotiated, a driver MUST use
>  the barriers suitable for hardware devices.
>  
> +A driver SHOULD accept VIRTIO_F_SR_IOV if it is offered.
> +If VIRTIO_F_SR_IOV has been negotiated, a driver can
> +enable virtual functions through the device's PCI SR-IOV
> +capability structure.

I feel the last sentence isn't clear enough.  How about

a driver MUST negotiate VIRTIO_F_SR_IOV and complete the feature
negotiation (including setting the DRIVER_OK \field{status} bit) before
enabling virtual functions through the device's PCI SR-IOV capability
structure.

> +
>  \devicenormative{\section}{Reserved Feature Bits}{Reserved Feature Bits}
>  
>  A device MUST offer VIRTIO_F_VERSION_1.  A device MAY fail to operate further
> @@ -5392,6 +5400,9 @@ buffers in the same order in which they have been available.
>  A device MAY fail to operate further if VIRTIO_F_IO_BARRIER
>  is not accepted.
>  
> +A device SHOULD offer VIRTIO_F_SR_IOV if it presents a PCI
> +SR-IOV capability structure.
> +
>  \section{Legacy Interface: Reserved Feature Bits}\label{sec:Reserved Feature Bits / Legacy Interface: Reserved Feature Bits}
>  
>  Transitional devices MAY offer the following:



> -- 
> 2.17.0
> 
> 
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: virtio-dev-unsubscribe@lists.oasis-open.org
> For additional commands, e-mail: virtio-dev-help@lists.oasis-open.org

---------------------------------------------------------------------
To unsubscribe, e-mail: virtio-dev-unsubscribe@lists.oasis-open.org
For additional commands, e-mail: virtio-dev-help@lists.oasis-open.org


^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [virtio-dev] [PATCH v3] content: support SR-IOV
  2018-05-23 17:54 ` [virtio-dev] " Michael S. Tsirkin
@ 2018-05-23 19:34   ` Michael S. Tsirkin
  2018-05-24  0:06     ` Tiwei Bie
  0 siblings, 1 reply; 9+ messages in thread
From: Michael S. Tsirkin @ 2018-05-23 19:34 UTC (permalink / raw)
  To: Tiwei Bie
  Cc: cohuck, stefanha, pbonzini, virtio-dev, dan.daly,
	alexander.h.duyck, mark.d.rustad, cunming.liang, zhihong.wang

On Wed, May 23, 2018 at 08:54:47PM +0300, Michael S. Tsirkin wrote:
> On Tue, May 22, 2018 at 06:26:15PM +0800, Tiwei Bie wrote:
> > Allocate a feature bit for virtio devices which support SR-IOV.
> > 
> > Suggested-by: Michael S. Tsirkin <mst@redhat.com>
> > Signed-off-by: Tiwei Bie <tiwei.bie@intel.com>
> > Fixes: https://github.com/oasis-tcs/virtio-spec/issues/11
> > ---
> > More details can be found from this thread:
> > https://patchwork.kernel.org/patch/10285541/
> > 
> > This patch needs below patch applied first:
> > https://github.com/oasis-tcs/virtio-spec/issues/10
> > https://lists.oasis-open.org/archives/virtio-dev/201805/msg00046.html
> > 
> > v2 -> v3:
> > - Improve the wording (Cornelia);
> > 
> > v1 -> v2:
> > - s/Reserve/Allocate/ (MST);
> > - Add a Fixes tag (MST);
> > - Be more explicit in driver requirement (MST);
> > - Remove the "device MAY fail" description (MST);
> > - Rebase on IO_BARRIER patch;
> > 
> > RFC -> v1:
> > - Mention PCI in the description (Cornelia);
> > 
> >  content.tex | 15 +++++++++++++--
> >  1 file changed, 13 insertions(+), 2 deletions(-)
> > 
> > diff --git a/content.tex b/content.tex
> > index 95c243f..e9e6f9a 100644
> > --- a/content.tex
> > +++ b/content.tex
> > @@ -95,10 +95,10 @@ Feature bits are allocated as follows:
> >  \begin{description}
> >  \item[0 to 23] Feature bits for the specific device type
> >  
> > -\item[24 to 36] Feature bits reserved for extensions to the queue and
> > +\item[24 to 37] Feature bits reserved for extensions to the queue and
> >    feature negotiation mechanisms
> >  
> > -\item[37 and above] Feature bits reserved for future extensions.
> > +\item[38 and above] Feature bits reserved for future extensions.
> >  \end{description}
> >  
> >  \begin{note}
> > @@ -5357,6 +5357,9 @@ Descriptors} and \ref{sec:Packed Virtqueues / Indirect Flag: Scatter-Gather Supp
> >    better performance.  This feature indicates whether
> >    a stronger form of barrier suitable for hardware
> >    devices is necessary.
> > +  \item[VIRTIO_F_SR_IOV(37)] This feature indicates that
> > +  the device supports Single Root I/O Virtualization.
> > +  Currently only PCI devices support this feature.
> 
> I guess the assumption is that all VFs and the PF are of the same type?
> 
> I feel it might be handy down the road to support mixing
> types. For this reason, to avoid binding a wrong driver
> to a VF, I propose that all VFs have this bit too,
> and require that drivers ignore VFs without this bit.
> 
> What do you think?

Thinking more about it, I can see how this might
interfere with passing VFs through to legacy nested guests.
How about reversing it then?

Require that drivers MUST NOT negotiate VIRTIO_F_SR_IOV
if device does not have an SRIOV capability or
is not a PCI device, in particular a VF.

And say a device without SRIOV cap SHOULD NOT expose this bit.



> >  \end{description}
> >  
> >  \drivernormative{\section}{Reserved Feature Bits}{Reserved Feature Bits}
> > @@ -5376,6 +5379,11 @@ A driver SHOULD accept VIRTIO_F_IO_BARRIER if it is offered.
> >  If VIRTIO_F_IO_BARRIER has been negotiated, a driver MUST use
> >  the barriers suitable for hardware devices.
> >  
> > +A driver SHOULD accept VIRTIO_F_SR_IOV if it is offered.
> > +If VIRTIO_F_SR_IOV has been negotiated, a driver can
> > +enable virtual functions through the device's PCI SR-IOV
> > +capability structure.
> 
> I feel the last sentence isn't clear enough.  How about
> 
> a driver MUST negotiate VIRTIO_F_SR_IOV and complete the feature
> negotiation (including setting the DRIVER_OK \field{status} bit) before
> enabling virtual functions through the device's PCI SR-IOV capability
> structure.
> 
> > +
> >  \devicenormative{\section}{Reserved Feature Bits}{Reserved Feature Bits}
> >  
> >  A device MUST offer VIRTIO_F_VERSION_1.  A device MAY fail to operate further
> > @@ -5392,6 +5400,9 @@ buffers in the same order in which they have been available.
> >  A device MAY fail to operate further if VIRTIO_F_IO_BARRIER
> >  is not accepted.
> >  
> > +A device SHOULD offer VIRTIO_F_SR_IOV if it presents a PCI
> > +SR-IOV capability structure.
> > +
> >  \section{Legacy Interface: Reserved Feature Bits}\label{sec:Reserved Feature Bits / Legacy Interface: Reserved Feature Bits}
> >  
> >  Transitional devices MAY offer the following:
> 
> 
> 
> > -- 
> > 2.17.0
> > 
> > 
> > ---------------------------------------------------------------------
> > To unsubscribe, e-mail: virtio-dev-unsubscribe@lists.oasis-open.org
> > For additional commands, e-mail: virtio-dev-help@lists.oasis-open.org

---------------------------------------------------------------------
To unsubscribe, e-mail: virtio-dev-unsubscribe@lists.oasis-open.org
For additional commands, e-mail: virtio-dev-help@lists.oasis-open.org


^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [virtio-dev] [PATCH v3] content: support SR-IOV
  2018-05-23 19:34   ` Michael S. Tsirkin
@ 2018-05-24  0:06     ` Tiwei Bie
  2018-05-24 13:44       ` Michael S. Tsirkin
  0 siblings, 1 reply; 9+ messages in thread
From: Tiwei Bie @ 2018-05-24  0:06 UTC (permalink / raw)
  To: Michael S. Tsirkin
  Cc: cohuck, stefanha, pbonzini, virtio-dev, dan.daly,
	alexander.h.duyck, mark.d.rustad, cunming.liang, zhihong.wang

On Wed, May 23, 2018 at 10:34:29PM +0300, Michael S. Tsirkin wrote:
> On Wed, May 23, 2018 at 08:54:47PM +0300, Michael S. Tsirkin wrote:
> > On Tue, May 22, 2018 at 06:26:15PM +0800, Tiwei Bie wrote:
> > > Allocate a feature bit for virtio devices which support SR-IOV.
> > > 
> > > Suggested-by: Michael S. Tsirkin <mst@redhat.com>
> > > Signed-off-by: Tiwei Bie <tiwei.bie@intel.com>
> > > Fixes: https://github.com/oasis-tcs/virtio-spec/issues/11
> > > ---
> > > More details can be found from this thread:
> > > https://patchwork.kernel.org/patch/10285541/
> > > 
> > > This patch needs below patch applied first:
> > > https://github.com/oasis-tcs/virtio-spec/issues/10
> > > https://lists.oasis-open.org/archives/virtio-dev/201805/msg00046.html
> > > 
> > > v2 -> v3:
> > > - Improve the wording (Cornelia);
> > > 
> > > v1 -> v2:
> > > - s/Reserve/Allocate/ (MST);
> > > - Add a Fixes tag (MST);
> > > - Be more explicit in driver requirement (MST);
> > > - Remove the "device MAY fail" description (MST);
> > > - Rebase on IO_BARRIER patch;
> > > 
> > > RFC -> v1:
> > > - Mention PCI in the description (Cornelia);
> > > 
> > >  content.tex | 15 +++++++++++++--
> > >  1 file changed, 13 insertions(+), 2 deletions(-)
> > > 
> > > diff --git a/content.tex b/content.tex
> > > index 95c243f..e9e6f9a 100644
> > > --- a/content.tex
> > > +++ b/content.tex
> > > @@ -95,10 +95,10 @@ Feature bits are allocated as follows:
> > >  \begin{description}
> > >  \item[0 to 23] Feature bits for the specific device type
> > >  
> > > -\item[24 to 36] Feature bits reserved for extensions to the queue and
> > > +\item[24 to 37] Feature bits reserved for extensions to the queue and
> > >    feature negotiation mechanisms
> > >  
> > > -\item[37 and above] Feature bits reserved for future extensions.
> > > +\item[38 and above] Feature bits reserved for future extensions.
> > >  \end{description}
> > >  
> > >  \begin{note}
> > > @@ -5357,6 +5357,9 @@ Descriptors} and \ref{sec:Packed Virtqueues / Indirect Flag: Scatter-Gather Supp
> > >    better performance.  This feature indicates whether
> > >    a stronger form of barrier suitable for hardware
> > >    devices is necessary.
> > > +  \item[VIRTIO_F_SR_IOV(37)] This feature indicates that
> > > +  the device supports Single Root I/O Virtualization.
> > > +  Currently only PCI devices support this feature.
> > 
> > I guess the assumption is that all VFs and the PF are of the same type?
> > 
> > I feel it might be handy down the road to support mixing
> > types. For this reason, to avoid binding a wrong driver
> > to a VF, I propose that all VFs have this bit too,
> > and require that drivers ignore VFs without this bit.
> > 
> > What do you think?
> 
> Thinking more about it, I can see how this might
> interfere with passing VFs through to legacy nested guests.
> How about reversing it then?
> 
> Require that drivers MUST NOT negotiate VIRTIO_F_SR_IOV
> if device does not have an SRIOV capability or
> is not a PCI device, in particular a VF.

I think driver can accept this feature as long as it's
able to handle the SR-IOV capability and there is no
need for it to check whether the device has the SR-IOV
capability. And device should make sure that it won't
offer this feature if it doesn't present this capability.

How about changing the driver requirement to:

A driver SHOULD accept VIRTIO_F_SR_IOV if it is offered.
If VIRTIO_F_SR_IOV has been negotiated, a driver can
enable virtual functions through the device's PCI SR-IOV
capability structure.  A driver MUST negotiate VIRTIO_F_SR_IOV
and complete the feature negotiation (including setting
the DRIVER_OK \field{status} bit) before enabling virtual
functions through the device's PCI SR-IOV capability
structure.


> 
> And say a device without SRIOV cap SHOULD NOT expose this bit.
> 

No problem. How about:

A device SHOULD offer VIRTIO_F_SR_IOV if it presents a
PCI SR-IOV capability structure.  A device SHOULD NOT
offer VIRTIO_F_SR_IOV if it doesn't presents a PCI SR-IOV
capability structure.

> 
> 
> > >  \end{description}
> > >  
> > >  \drivernormative{\section}{Reserved Feature Bits}{Reserved Feature Bits}
> > > @@ -5376,6 +5379,11 @@ A driver SHOULD accept VIRTIO_F_IO_BARRIER if it is offered.
> > >  If VIRTIO_F_IO_BARRIER has been negotiated, a driver MUST use
> > >  the barriers suitable for hardware devices.
> > >  
> > > +A driver SHOULD accept VIRTIO_F_SR_IOV if it is offered.
> > > +If VIRTIO_F_SR_IOV has been negotiated, a driver can
> > > +enable virtual functions through the device's PCI SR-IOV
> > > +capability structure.
> > 
> > I feel the last sentence isn't clear enough.  How about
> > 
> > a driver MUST negotiate VIRTIO_F_SR_IOV and complete the feature
> > negotiation (including setting the DRIVER_OK \field{status} bit) before
> > enabling virtual functions through the device's PCI SR-IOV capability
> > structure.
> > 
> > > +
> > >  \devicenormative{\section}{Reserved Feature Bits}{Reserved Feature Bits}
> > >  
> > >  A device MUST offer VIRTIO_F_VERSION_1.  A device MAY fail to operate further
> > > @@ -5392,6 +5400,9 @@ buffers in the same order in which they have been available.
> > >  A device MAY fail to operate further if VIRTIO_F_IO_BARRIER
> > >  is not accepted.
> > >  
> > > +A device SHOULD offer VIRTIO_F_SR_IOV if it presents a PCI
> > > +SR-IOV capability structure.
> > > +
> > >  \section{Legacy Interface: Reserved Feature Bits}\label{sec:Reserved Feature Bits / Legacy Interface: Reserved Feature Bits}
> > >  
> > >  Transitional devices MAY offer the following:
> > 
> > 
> > 
> > > -- 
> > > 2.17.0
> > > 
> > > 
> > > ---------------------------------------------------------------------
> > > To unsubscribe, e-mail: virtio-dev-unsubscribe@lists.oasis-open.org
> > > For additional commands, e-mail: virtio-dev-help@lists.oasis-open.org

---------------------------------------------------------------------
To unsubscribe, e-mail: virtio-dev-unsubscribe@lists.oasis-open.org
For additional commands, e-mail: virtio-dev-help@lists.oasis-open.org


^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [virtio-dev] [PATCH v3] content: support SR-IOV
  2018-05-24  0:06     ` Tiwei Bie
@ 2018-05-24 13:44       ` Michael S. Tsirkin
  2018-05-24 15:15         ` Tiwei Bie
  0 siblings, 1 reply; 9+ messages in thread
From: Michael S. Tsirkin @ 2018-05-24 13:44 UTC (permalink / raw)
  To: Tiwei Bie
  Cc: cohuck, stefanha, pbonzini, virtio-dev, dan.daly,
	alexander.h.duyck, mark.d.rustad, cunming.liang, zhihong.wang

On Thu, May 24, 2018 at 08:06:41AM +0800, Tiwei Bie wrote:
> On Wed, May 23, 2018 at 10:34:29PM +0300, Michael S. Tsirkin wrote:
> > On Wed, May 23, 2018 at 08:54:47PM +0300, Michael S. Tsirkin wrote:
> > > On Tue, May 22, 2018 at 06:26:15PM +0800, Tiwei Bie wrote:
> > > > Allocate a feature bit for virtio devices which support SR-IOV.
> > > > 
> > > > Suggested-by: Michael S. Tsirkin <mst@redhat.com>
> > > > Signed-off-by: Tiwei Bie <tiwei.bie@intel.com>
> > > > Fixes: https://github.com/oasis-tcs/virtio-spec/issues/11
> > > > ---
> > > > More details can be found from this thread:
> > > > https://patchwork.kernel.org/patch/10285541/
> > > > 
> > > > This patch needs below patch applied first:
> > > > https://github.com/oasis-tcs/virtio-spec/issues/10
> > > > https://lists.oasis-open.org/archives/virtio-dev/201805/msg00046.html
> > > > 
> > > > v2 -> v3:
> > > > - Improve the wording (Cornelia);
> > > > 
> > > > v1 -> v2:
> > > > - s/Reserve/Allocate/ (MST);
> > > > - Add a Fixes tag (MST);
> > > > - Be more explicit in driver requirement (MST);
> > > > - Remove the "device MAY fail" description (MST);
> > > > - Rebase on IO_BARRIER patch;
> > > > 
> > > > RFC -> v1:
> > > > - Mention PCI in the description (Cornelia);
> > > > 
> > > >  content.tex | 15 +++++++++++++--
> > > >  1 file changed, 13 insertions(+), 2 deletions(-)
> > > > 
> > > > diff --git a/content.tex b/content.tex
> > > > index 95c243f..e9e6f9a 100644
> > > > --- a/content.tex
> > > > +++ b/content.tex
> > > > @@ -95,10 +95,10 @@ Feature bits are allocated as follows:
> > > >  \begin{description}
> > > >  \item[0 to 23] Feature bits for the specific device type
> > > >  
> > > > -\item[24 to 36] Feature bits reserved for extensions to the queue and
> > > > +\item[24 to 37] Feature bits reserved for extensions to the queue and
> > > >    feature negotiation mechanisms
> > > >  
> > > > -\item[37 and above] Feature bits reserved for future extensions.
> > > > +\item[38 and above] Feature bits reserved for future extensions.
> > > >  \end{description}
> > > >  
> > > >  \begin{note}
> > > > @@ -5357,6 +5357,9 @@ Descriptors} and \ref{sec:Packed Virtqueues / Indirect Flag: Scatter-Gather Supp
> > > >    better performance.  This feature indicates whether
> > > >    a stronger form of barrier suitable for hardware
> > > >    devices is necessary.
> > > > +  \item[VIRTIO_F_SR_IOV(37)] This feature indicates that
> > > > +  the device supports Single Root I/O Virtualization.
> > > > +  Currently only PCI devices support this feature.
> > > 
> > > I guess the assumption is that all VFs and the PF are of the same type?
> > > 
> > > I feel it might be handy down the road to support mixing
> > > types. For this reason, to avoid binding a wrong driver
> > > to a VF, I propose that all VFs have this bit too,
> > > and require that drivers ignore VFs without this bit.
> > > 
> > > What do you think?
> > 
> > Thinking more about it, I can see how this might
> > interfere with passing VFs through to legacy nested guests.
> > How about reversing it then?
> > 
> > Require that drivers MUST NOT negotiate VIRTIO_F_SR_IOV
> > if device does not have an SRIOV capability or
> > is not a PCI device, in particular a VF.
> 
> I think driver can accept this feature as long as it's
> able to handle the SR-IOV capability and there is no
> need for it to check whether the device has the SR-IOV
> capability.

So my point is this, VFs themselves do not have
this feature.

Should all of them have it? None of them?
I don't see what use it is to VFs, but maybe
we will come with a use down the road.

I propose we require that
1. drivers ignore this if there is
no SRIOV cap, and

2. that devices do not expose it.

This way if we come up with a use down the road, only new drivers
will negotiate it.



> And device should make sure that it won't
> offer this feature if it doesn't present this capability.
> How about changing the driver requirement to:
> 
> A driver SHOULD accept VIRTIO_F_SR_IOV if it is offered.

This part won't address the issue above.


> If VIRTIO_F_SR_IOV has been negotiated, a driver can
> enable virtual functions through the device's PCI SR-IOV
> capability structure.  A driver MUST negotiate VIRTIO_F_SR_IOV
> and complete the feature negotiation (including setting
> the DRIVER_OK \field{status} bit) before enabling virtual
> functions through the device's PCI SR-IOV capability
> structure.
> 
> 
> > 
> > And say a device without SRIOV cap SHOULD NOT expose this bit.
> > 
> 
> No problem. How about:
> 
> A device SHOULD offer VIRTIO_F_SR_IOV if it presents a
> PCI SR-IOV capability structure.  A device SHOULD NOT
> offer VIRTIO_F_SR_IOV if it doesn't presents

doesn't present

> a PCI SR-IOV
> capability structure.

Assuming we teach drivers they should ignore it
if it is there without SRIOV, then this last one I'd make MUST NOT.

> > 
> > 
> > > >  \end{description}
> > > >  
> > > >  \drivernormative{\section}{Reserved Feature Bits}{Reserved Feature Bits}
> > > > @@ -5376,6 +5379,11 @@ A driver SHOULD accept VIRTIO_F_IO_BARRIER if it is offered.
> > > >  If VIRTIO_F_IO_BARRIER has been negotiated, a driver MUST use
> > > >  the barriers suitable for hardware devices.
> > > >  
> > > > +A driver SHOULD accept VIRTIO_F_SR_IOV if it is offered.
> > > > +If VIRTIO_F_SR_IOV has been negotiated, a driver can
> > > > +enable virtual functions through the device's PCI SR-IOV
> > > > +capability structure.
> > > 
> > > I feel the last sentence isn't clear enough.  How about
> > > 
> > > a driver MUST negotiate VIRTIO_F_SR_IOV and complete the feature
> > > negotiation (including setting the DRIVER_OK \field{status} bit) before
> > > enabling virtual functions through the device's PCI SR-IOV capability
> > > structure.
> > > 
> > > > +
> > > >  \devicenormative{\section}{Reserved Feature Bits}{Reserved Feature Bits}
> > > >  
> > > >  A device MUST offer VIRTIO_F_VERSION_1.  A device MAY fail to operate further
> > > > @@ -5392,6 +5400,9 @@ buffers in the same order in which they have been available.
> > > >  A device MAY fail to operate further if VIRTIO_F_IO_BARRIER
> > > >  is not accepted.
> > > >  
> > > > +A device SHOULD offer VIRTIO_F_SR_IOV if it presents a PCI
> > > > +SR-IOV capability structure.
> > > > +
> > > >  \section{Legacy Interface: Reserved Feature Bits}\label{sec:Reserved Feature Bits / Legacy Interface: Reserved Feature Bits}
> > > >  
> > > >  Transitional devices MAY offer the following:
> > > 
> > > 
> > > 
> > > > -- 
> > > > 2.17.0
> > > > 
> > > > 
> > > > ---------------------------------------------------------------------
> > > > To unsubscribe, e-mail: virtio-dev-unsubscribe@lists.oasis-open.org
> > > > For additional commands, e-mail: virtio-dev-help@lists.oasis-open.org

---------------------------------------------------------------------
To unsubscribe, e-mail: virtio-dev-unsubscribe@lists.oasis-open.org
For additional commands, e-mail: virtio-dev-help@lists.oasis-open.org


^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [virtio-dev] [PATCH v3] content: support SR-IOV
  2018-05-24 13:44       ` Michael S. Tsirkin
@ 2018-05-24 15:15         ` Tiwei Bie
  2018-05-24 15:20           ` Michael S. Tsirkin
  0 siblings, 1 reply; 9+ messages in thread
From: Tiwei Bie @ 2018-05-24 15:15 UTC (permalink / raw)
  To: Michael S. Tsirkin
  Cc: cohuck, stefanha, pbonzini, virtio-dev, dan.daly,
	alexander.h.duyck, mark.d.rustad, cunming.liang, zhihong.wang

On Thu, May 24, 2018 at 04:44:18PM +0300, Michael S. Tsirkin wrote:
> On Thu, May 24, 2018 at 08:06:41AM +0800, Tiwei Bie wrote:
> > On Wed, May 23, 2018 at 10:34:29PM +0300, Michael S. Tsirkin wrote:
> > > On Wed, May 23, 2018 at 08:54:47PM +0300, Michael S. Tsirkin wrote:
> > > > On Tue, May 22, 2018 at 06:26:15PM +0800, Tiwei Bie wrote:
> > > > > Allocate a feature bit for virtio devices which support SR-IOV.
> > > > > 
> > > > > Suggested-by: Michael S. Tsirkin <mst@redhat.com>
> > > > > Signed-off-by: Tiwei Bie <tiwei.bie@intel.com>
> > > > > Fixes: https://github.com/oasis-tcs/virtio-spec/issues/11
> > > > > ---
> > > > > More details can be found from this thread:
> > > > > https://patchwork.kernel.org/patch/10285541/
> > > > > 
> > > > > This patch needs below patch applied first:
> > > > > https://github.com/oasis-tcs/virtio-spec/issues/10
> > > > > https://lists.oasis-open.org/archives/virtio-dev/201805/msg00046.html
> > > > > 
> > > > > v2 -> v3:
> > > > > - Improve the wording (Cornelia);
> > > > > 
> > > > > v1 -> v2:
> > > > > - s/Reserve/Allocate/ (MST);
> > > > > - Add a Fixes tag (MST);
> > > > > - Be more explicit in driver requirement (MST);
> > > > > - Remove the "device MAY fail" description (MST);
> > > > > - Rebase on IO_BARRIER patch;
> > > > > 
> > > > > RFC -> v1:
> > > > > - Mention PCI in the description (Cornelia);
> > > > > 
> > > > >  content.tex | 15 +++++++++++++--
> > > > >  1 file changed, 13 insertions(+), 2 deletions(-)
> > > > > 
> > > > > diff --git a/content.tex b/content.tex
> > > > > index 95c243f..e9e6f9a 100644
> > > > > --- a/content.tex
> > > > > +++ b/content.tex
> > > > > @@ -95,10 +95,10 @@ Feature bits are allocated as follows:
> > > > >  \begin{description}
> > > > >  \item[0 to 23] Feature bits for the specific device type
> > > > >  
> > > > > -\item[24 to 36] Feature bits reserved for extensions to the queue and
> > > > > +\item[24 to 37] Feature bits reserved for extensions to the queue and
> > > > >    feature negotiation mechanisms
> > > > >  
> > > > > -\item[37 and above] Feature bits reserved for future extensions.
> > > > > +\item[38 and above] Feature bits reserved for future extensions.
> > > > >  \end{description}
> > > > >  
> > > > >  \begin{note}
> > > > > @@ -5357,6 +5357,9 @@ Descriptors} and \ref{sec:Packed Virtqueues / Indirect Flag: Scatter-Gather Supp
> > > > >    better performance.  This feature indicates whether
> > > > >    a stronger form of barrier suitable for hardware
> > > > >    devices is necessary.
> > > > > +  \item[VIRTIO_F_SR_IOV(37)] This feature indicates that
> > > > > +  the device supports Single Root I/O Virtualization.
> > > > > +  Currently only PCI devices support this feature.
> > > > 
> > > > I guess the assumption is that all VFs and the PF are of the same type?
> > > > 
> > > > I feel it might be handy down the road to support mixing
> > > > types. For this reason, to avoid binding a wrong driver
> > > > to a VF, I propose that all VFs have this bit too,
> > > > and require that drivers ignore VFs without this bit.
> > > > 
> > > > What do you think?
> > > 
> > > Thinking more about it, I can see how this might
> > > interfere with passing VFs through to legacy nested guests.
> > > How about reversing it then?
> > > 
> > > Require that drivers MUST NOT negotiate VIRTIO_F_SR_IOV
> > > if device does not have an SRIOV capability or
> > > is not a PCI device, in particular a VF.
> > 
> > I think driver can accept this feature as long as it's
> > able to handle the SR-IOV capability and there is no
> > need for it to check whether the device has the SR-IOV
> > capability.
> 
> So my point is this, VFs themselves do not have
> this feature.

Yeah. I also think VFs shouldn't present this feature.

> 
> Should all of them have it? None of them?
> I don't see what use it is to VFs, but maybe
> we will come with a use down the road.
> 
> I propose we require that
> 1. drivers ignore this if there is
> no SRIOV cap, and
> 
> 2. that devices do not expose it.
> 
> This way if we come up with a use down the road, only new drivers
> will negotiate it.

I got your point now. Thanks!

How about:

If VIRTIO_F_SR_IOV has been negotiated, a driver can enable
virtual functions through the device's PCI SR-IOV capability
structure.  A driver MUST NOT negotiate VIRTIO_F_SR_IOV if
the device does not have a PCI SR-IOV capability structure
or is not a PCI device.  A driver MUST negotiate
VIRTIO_F_SR_IOV and complete the feature negotiation
(including setting the DRIVER_OK \field{status} bit) before
enabling virtual functions through the device's PCI SR-IOV
capability structure.


> 
> 
> 
> > And device should make sure that it won't
> > offer this feature if it doesn't present this capability.
> > How about changing the driver requirement to:
> > 
> > A driver SHOULD accept VIRTIO_F_SR_IOV if it is offered.
> 
> This part won't address the issue above.
> 
> 
> > If VIRTIO_F_SR_IOV has been negotiated, a driver can
> > enable virtual functions through the device's PCI SR-IOV
> > capability structure.  A driver MUST negotiate VIRTIO_F_SR_IOV
> > and complete the feature negotiation (including setting
> > the DRIVER_OK \field{status} bit) before enabling virtual
> > functions through the device's PCI SR-IOV capability
> > structure.
> > 
> > 
> > > 
> > > And say a device without SRIOV cap SHOULD NOT expose this bit.
> > > 
> > 
> > No problem. How about:
> > 
> > A device SHOULD offer VIRTIO_F_SR_IOV if it presents a
> > PCI SR-IOV capability structure.  A device SHOULD NOT
> > offer VIRTIO_F_SR_IOV if it doesn't presents
> 
> doesn't present

Right. Thanks for catching it!

> 
> > a PCI SR-IOV
> > capability structure.
> 
> Assuming we teach drivers they should ignore it
> if it is there without SRIOV, then this last one I'd make MUST NOT.

Okay, how about

A device SHOULD offer VIRTIO_F_SR_IOV if it is a PCI
device and presents a PCI SR-IOV capability structure,
otherwise it MUST NOT offer VIRTIO_F_SR_IOV.

Best regards,
Tiwei Bie

> 
> > > 
> > > 
> > > > >  \end{description}
> > > > >  
> > > > >  \drivernormative{\section}{Reserved Feature Bits}{Reserved Feature Bits}
> > > > > @@ -5376,6 +5379,11 @@ A driver SHOULD accept VIRTIO_F_IO_BARRIER if it is offered.
> > > > >  If VIRTIO_F_IO_BARRIER has been negotiated, a driver MUST use
> > > > >  the barriers suitable for hardware devices.
> > > > >  
> > > > > +A driver SHOULD accept VIRTIO_F_SR_IOV if it is offered.
> > > > > +If VIRTIO_F_SR_IOV has been negotiated, a driver can
> > > > > +enable virtual functions through the device's PCI SR-IOV
> > > > > +capability structure.
> > > > 
> > > > I feel the last sentence isn't clear enough.  How about
> > > > 
> > > > a driver MUST negotiate VIRTIO_F_SR_IOV and complete the feature
> > > > negotiation (including setting the DRIVER_OK \field{status} bit) before
> > > > enabling virtual functions through the device's PCI SR-IOV capability
> > > > structure.
> > > > 
> > > > > +
> > > > >  \devicenormative{\section}{Reserved Feature Bits}{Reserved Feature Bits}
> > > > >  
> > > > >  A device MUST offer VIRTIO_F_VERSION_1.  A device MAY fail to operate further
> > > > > @@ -5392,6 +5400,9 @@ buffers in the same order in which they have been available.
> > > > >  A device MAY fail to operate further if VIRTIO_F_IO_BARRIER
> > > > >  is not accepted.
> > > > >  
> > > > > +A device SHOULD offer VIRTIO_F_SR_IOV if it presents a PCI
> > > > > +SR-IOV capability structure.
> > > > > +
> > > > >  \section{Legacy Interface: Reserved Feature Bits}\label{sec:Reserved Feature Bits / Legacy Interface: Reserved Feature Bits}
> > > > >  
> > > > >  Transitional devices MAY offer the following:
> > > > 
> > > > 
> > > > 
> > > > > -- 
> > > > > 2.17.0
> > > > > 
> > > > > 
> > > > > ---------------------------------------------------------------------
> > > > > To unsubscribe, e-mail: virtio-dev-unsubscribe@lists.oasis-open.org
> > > > > For additional commands, e-mail: virtio-dev-help@lists.oasis-open.org
> 
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: virtio-dev-unsubscribe@lists.oasis-open.org
> For additional commands, e-mail: virtio-dev-help@lists.oasis-open.org
> 

---------------------------------------------------------------------
To unsubscribe, e-mail: virtio-dev-unsubscribe@lists.oasis-open.org
For additional commands, e-mail: virtio-dev-help@lists.oasis-open.org


^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [virtio-dev] [PATCH v3] content: support SR-IOV
  2018-05-24 15:15         ` Tiwei Bie
@ 2018-05-24 15:20           ` Michael S. Tsirkin
  2018-05-24 15:27             ` Tiwei Bie
  0 siblings, 1 reply; 9+ messages in thread
From: Michael S. Tsirkin @ 2018-05-24 15:20 UTC (permalink / raw)
  To: Tiwei Bie
  Cc: cohuck, stefanha, pbonzini, virtio-dev, dan.daly,
	alexander.h.duyck, mark.d.rustad, cunming.liang, zhihong.wang

On Thu, May 24, 2018 at 11:15:26PM +0800, Tiwei Bie wrote:
> On Thu, May 24, 2018 at 04:44:18PM +0300, Michael S. Tsirkin wrote:
> > On Thu, May 24, 2018 at 08:06:41AM +0800, Tiwei Bie wrote:
> > > On Wed, May 23, 2018 at 10:34:29PM +0300, Michael S. Tsirkin wrote:
> > > > On Wed, May 23, 2018 at 08:54:47PM +0300, Michael S. Tsirkin wrote:
> > > > > On Tue, May 22, 2018 at 06:26:15PM +0800, Tiwei Bie wrote:
> > > > > > Allocate a feature bit for virtio devices which support SR-IOV.
> > > > > > 
> > > > > > Suggested-by: Michael S. Tsirkin <mst@redhat.com>
> > > > > > Signed-off-by: Tiwei Bie <tiwei.bie@intel.com>
> > > > > > Fixes: https://github.com/oasis-tcs/virtio-spec/issues/11
> > > > > > ---
> > > > > > More details can be found from this thread:
> > > > > > https://patchwork.kernel.org/patch/10285541/
> > > > > > 
> > > > > > This patch needs below patch applied first:
> > > > > > https://github.com/oasis-tcs/virtio-spec/issues/10
> > > > > > https://lists.oasis-open.org/archives/virtio-dev/201805/msg00046.html
> > > > > > 
> > > > > > v2 -> v3:
> > > > > > - Improve the wording (Cornelia);
> > > > > > 
> > > > > > v1 -> v2:
> > > > > > - s/Reserve/Allocate/ (MST);
> > > > > > - Add a Fixes tag (MST);
> > > > > > - Be more explicit in driver requirement (MST);
> > > > > > - Remove the "device MAY fail" description (MST);
> > > > > > - Rebase on IO_BARRIER patch;
> > > > > > 
> > > > > > RFC -> v1:
> > > > > > - Mention PCI in the description (Cornelia);
> > > > > > 
> > > > > >  content.tex | 15 +++++++++++++--
> > > > > >  1 file changed, 13 insertions(+), 2 deletions(-)
> > > > > > 
> > > > > > diff --git a/content.tex b/content.tex
> > > > > > index 95c243f..e9e6f9a 100644
> > > > > > --- a/content.tex
> > > > > > +++ b/content.tex
> > > > > > @@ -95,10 +95,10 @@ Feature bits are allocated as follows:
> > > > > >  \begin{description}
> > > > > >  \item[0 to 23] Feature bits for the specific device type
> > > > > >  
> > > > > > -\item[24 to 36] Feature bits reserved for extensions to the queue and
> > > > > > +\item[24 to 37] Feature bits reserved for extensions to the queue and
> > > > > >    feature negotiation mechanisms
> > > > > >  
> > > > > > -\item[37 and above] Feature bits reserved for future extensions.
> > > > > > +\item[38 and above] Feature bits reserved for future extensions.
> > > > > >  \end{description}
> > > > > >  
> > > > > >  \begin{note}
> > > > > > @@ -5357,6 +5357,9 @@ Descriptors} and \ref{sec:Packed Virtqueues / Indirect Flag: Scatter-Gather Supp
> > > > > >    better performance.  This feature indicates whether
> > > > > >    a stronger form of barrier suitable for hardware
> > > > > >    devices is necessary.
> > > > > > +  \item[VIRTIO_F_SR_IOV(37)] This feature indicates that
> > > > > > +  the device supports Single Root I/O Virtualization.
> > > > > > +  Currently only PCI devices support this feature.
> > > > > 
> > > > > I guess the assumption is that all VFs and the PF are of the same type?
> > > > > 
> > > > > I feel it might be handy down the road to support mixing
> > > > > types. For this reason, to avoid binding a wrong driver
> > > > > to a VF, I propose that all VFs have this bit too,
> > > > > and require that drivers ignore VFs without this bit.
> > > > > 
> > > > > What do you think?
> > > > 
> > > > Thinking more about it, I can see how this might
> > > > interfere with passing VFs through to legacy nested guests.
> > > > How about reversing it then?
> > > > 
> > > > Require that drivers MUST NOT negotiate VIRTIO_F_SR_IOV
> > > > if device does not have an SRIOV capability or
> > > > is not a PCI device, in particular a VF.
> > > 
> > > I think driver can accept this feature as long as it's
> > > able to handle the SR-IOV capability and there is no
> > > need for it to check whether the device has the SR-IOV
> > > capability.
> > 
> > So my point is this, VFs themselves do not have
> > this feature.
> 
> Yeah. I also think VFs shouldn't present this feature.
> 
> > 
> > Should all of them have it? None of them?
> > I don't see what use it is to VFs, but maybe
> > we will come with a use down the road.
> > 
> > I propose we require that
> > 1. drivers ignore this if there is
> > no SRIOV cap, and
> > 
> > 2. that devices do not expose it.
> > 
> > This way if we come up with a use down the road, only new drivers
> > will negotiate it.
> 
> I got your point now. Thanks!
> 
> How about:
> 
> If VIRTIO_F_SR_IOV has been negotiated, a driver can enable
> virtual functions through the device's PCI SR-IOV capability
> structure.  A driver MUST NOT negotiate VIRTIO_F_SR_IOV if
> the device does not have a PCI SR-IOV capability structure
> or is not a PCI device.  A driver MUST negotiate
> VIRTIO_F_SR_IOV and complete the feature negotiation
> (including setting the DRIVER_OK \field{status} bit) before
> enabling virtual functions through the device's PCI SR-IOV
> capability structure.

Sounds good.

> 
> > 
> > 
> > 
> > > And device should make sure that it won't
> > > offer this feature if it doesn't present this capability.
> > > How about changing the driver requirement to:
> > > 
> > > A driver SHOULD accept VIRTIO_F_SR_IOV if it is offered.
> > 
> > This part won't address the issue above.
> > 
> > 
> > > If VIRTIO_F_SR_IOV has been negotiated, a driver can
> > > enable virtual functions through the device's PCI SR-IOV
> > > capability structure.  A driver MUST negotiate VIRTIO_F_SR_IOV
> > > and complete the feature negotiation (including setting
> > > the DRIVER_OK \field{status} bit) before enabling virtual
> > > functions through the device's PCI SR-IOV capability
> > > structure.
> > > 
> > > 
> > > > 
> > > > And say a device without SRIOV cap SHOULD NOT expose this bit.
> > > > 
> > > 
> > > No problem. How about:
> > > 
> > > A device SHOULD offer VIRTIO_F_SR_IOV if it presents a
> > > PCI SR-IOV capability structure.  A device SHOULD NOT
> > > offer VIRTIO_F_SR_IOV if it doesn't presents
> > 
> > doesn't present
> 
> Right. Thanks for catching it!
> 
> > 
> > > a PCI SR-IOV
> > > capability structure.
> > 
> > Assuming we teach drivers they should ignore it
> > if it is there without SRIOV, then this last one I'd make MUST NOT.
> 
> Okay, how about
> 
> A device SHOULD offer VIRTIO_F_SR_IOV if it is a PCI
> device and presents a PCI SR-IOV capability structure,
> otherwise it MUST NOT offer VIRTIO_F_SR_IOV.
> 
> Best regards,
> Tiwei Bie

Sounds good.

> > 
> > > > 
> > > > 
> > > > > >  \end{description}
> > > > > >  
> > > > > >  \drivernormative{\section}{Reserved Feature Bits}{Reserved Feature Bits}
> > > > > > @@ -5376,6 +5379,11 @@ A driver SHOULD accept VIRTIO_F_IO_BARRIER if it is offered.
> > > > > >  If VIRTIO_F_IO_BARRIER has been negotiated, a driver MUST use
> > > > > >  the barriers suitable for hardware devices.
> > > > > >  
> > > > > > +A driver SHOULD accept VIRTIO_F_SR_IOV if it is offered.
> > > > > > +If VIRTIO_F_SR_IOV has been negotiated, a driver can
> > > > > > +enable virtual functions through the device's PCI SR-IOV
> > > > > > +capability structure.
> > > > > 
> > > > > I feel the last sentence isn't clear enough.  How about
> > > > > 
> > > > > a driver MUST negotiate VIRTIO_F_SR_IOV and complete the feature
> > > > > negotiation (including setting the DRIVER_OK \field{status} bit) before
> > > > > enabling virtual functions through the device's PCI SR-IOV capability
> > > > > structure.
> > > > > 
> > > > > > +
> > > > > >  \devicenormative{\section}{Reserved Feature Bits}{Reserved Feature Bits}
> > > > > >  
> > > > > >  A device MUST offer VIRTIO_F_VERSION_1.  A device MAY fail to operate further
> > > > > > @@ -5392,6 +5400,9 @@ buffers in the same order in which they have been available.
> > > > > >  A device MAY fail to operate further if VIRTIO_F_IO_BARRIER
> > > > > >  is not accepted.
> > > > > >  
> > > > > > +A device SHOULD offer VIRTIO_F_SR_IOV if it presents a PCI
> > > > > > +SR-IOV capability structure.
> > > > > > +
> > > > > >  \section{Legacy Interface: Reserved Feature Bits}\label{sec:Reserved Feature Bits / Legacy Interface: Reserved Feature Bits}
> > > > > >  
> > > > > >  Transitional devices MAY offer the following:
> > > > > 
> > > > > 
> > > > > 
> > > > > > -- 
> > > > > > 2.17.0
> > > > > > 
> > > > > > 
> > > > > > ---------------------------------------------------------------------
> > > > > > To unsubscribe, e-mail: virtio-dev-unsubscribe@lists.oasis-open.org
> > > > > > For additional commands, e-mail: virtio-dev-help@lists.oasis-open.org
> > 
> > ---------------------------------------------------------------------
> > To unsubscribe, e-mail: virtio-dev-unsubscribe@lists.oasis-open.org
> > For additional commands, e-mail: virtio-dev-help@lists.oasis-open.org
> > 

---------------------------------------------------------------------
To unsubscribe, e-mail: virtio-dev-unsubscribe@lists.oasis-open.org
For additional commands, e-mail: virtio-dev-help@lists.oasis-open.org


^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [virtio-dev] [PATCH v3] content: support SR-IOV
  2018-05-24 15:20           ` Michael S. Tsirkin
@ 2018-05-24 15:27             ` Tiwei Bie
  0 siblings, 0 replies; 9+ messages in thread
From: Tiwei Bie @ 2018-05-24 15:27 UTC (permalink / raw)
  To: Michael S. Tsirkin
  Cc: cohuck, stefanha, pbonzini, virtio-dev, dan.daly,
	alexander.h.duyck, mark.d.rustad, cunming.liang, zhihong.wang

On Thu, May 24, 2018 at 06:20:36PM +0300, Michael S. Tsirkin wrote:
> On Thu, May 24, 2018 at 11:15:26PM +0800, Tiwei Bie wrote:
> > On Thu, May 24, 2018 at 04:44:18PM +0300, Michael S. Tsirkin wrote:
> > > On Thu, May 24, 2018 at 08:06:41AM +0800, Tiwei Bie wrote:
> > > > On Wed, May 23, 2018 at 10:34:29PM +0300, Michael S. Tsirkin wrote:
> > > > > On Wed, May 23, 2018 at 08:54:47PM +0300, Michael S. Tsirkin wrote:
> > > > > > On Tue, May 22, 2018 at 06:26:15PM +0800, Tiwei Bie wrote:
[...]
> > > 
> > > So my point is this, VFs themselves do not have
> > > this feature.
> > 
> > Yeah. I also think VFs shouldn't present this feature.
> > 
> > > 
> > > Should all of them have it? None of them?
> > > I don't see what use it is to VFs, but maybe
> > > we will come with a use down the road.
> > > 
> > > I propose we require that
> > > 1. drivers ignore this if there is
> > > no SRIOV cap, and
> > > 
> > > 2. that devices do not expose it.
> > > 
> > > This way if we come up with a use down the road, only new drivers
> > > will negotiate it.
> > 
> > I got your point now. Thanks!
> > 
> > How about:
> > 
> > If VIRTIO_F_SR_IOV has been negotiated, a driver can enable
> > virtual functions through the device's PCI SR-IOV capability
> > structure.  A driver MUST NOT negotiate VIRTIO_F_SR_IOV if
> > the device does not have a PCI SR-IOV capability structure
> > or is not a PCI device.  A driver MUST negotiate
> > VIRTIO_F_SR_IOV and complete the feature negotiation
> > (including setting the DRIVER_OK \field{status} bit) before
> > enabling virtual functions through the device's PCI SR-IOV
> > capability structure.
> 
> Sounds good.
> 
[...]
> > > 
> > > Assuming we teach drivers they should ignore it
> > > if it is there without SRIOV, then this last one I'd make MUST NOT.
> > 
> > Okay, how about
> > 
> > A device SHOULD offer VIRTIO_F_SR_IOV if it is a PCI
> > device and presents a PCI SR-IOV capability structure,
> > otherwise it MUST NOT offer VIRTIO_F_SR_IOV.
> > 
> > Best regards,
> > Tiwei Bie
> 
> Sounds good.

Thanks a lot! I'll send a new version.

Best regards,
Tiwei Bie

---------------------------------------------------------------------
To unsubscribe, e-mail: virtio-dev-unsubscribe@lists.oasis-open.org
For additional commands, e-mail: virtio-dev-help@lists.oasis-open.org


^ permalink raw reply	[flat|nested] 9+ messages in thread

end of thread, other threads:[~2018-05-24 15:26 UTC | newest]

Thread overview: 9+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2018-05-22 10:26 [virtio-dev] [PATCH v3] content: support SR-IOV Tiwei Bie
2018-05-22 11:03 ` [virtio-dev] " Cornelia Huck
2018-05-23 17:54 ` [virtio-dev] " Michael S. Tsirkin
2018-05-23 19:34   ` Michael S. Tsirkin
2018-05-24  0:06     ` Tiwei Bie
2018-05-24 13:44       ` Michael S. Tsirkin
2018-05-24 15:15         ` Tiwei Bie
2018-05-24 15:20           ` Michael S. Tsirkin
2018-05-24 15:27             ` Tiwei Bie

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.