From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from ws5-mx01.kavi.com (ws5-mx01.kavi.com [34.193.7.191]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id D0FF4EB64D9 for ; Mon, 19 Jun 2023 16:28:16 +0000 (UTC) Received: from lists.oasis-open.org (oasis.ws5.connectedcommunity.org [10.110.1.242]) by ws5-mx01.kavi.com (Postfix) with ESMTP id 1E5797A1CB for ; Mon, 19 Jun 2023 16:28:16 +0000 (UTC) Received: from lists.oasis-open.org (oasis-open.org [10.110.1.242]) by lists.oasis-open.org (Postfix) with ESMTP id D5419986429 for ; Mon, 19 Jun 2023 16:28:15 +0000 (UTC) Received: from host09.ws5.connectedcommunity.org (host09.ws5.connectedcommunity.org [10.110.1.97]) by lists.oasis-open.org (Postfix) with QMQP id BA7DB9863A6; Mon, 19 Jun 2023 16:28:15 +0000 (UTC) Mailing-List: contact virtio-dev-help@lists.oasis-open.org; run by ezmlm List-ID: Sender: Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: Received: from lists.oasis-open.org (oasis-open.org [10.110.1.242]) by lists.oasis-open.org (Postfix) with ESMTP id A68F09863B0 for ; Mon, 19 Jun 2023 16:28:15 +0000 (UTC) X-Virus-Scanned: amavisd-new at kavi.com X-MC-Unique: yd0qM8n1NpGnyEQPog8Emg-1 X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1687192092; x=1689784092; h=in-reply-to:content-transfer-encoding:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=KDTGPvqd58/bcHX3jF92qTjy63TbnZ5A88YwXz//FIU=; b=EQPttGdo1KwLDAa4cfpTJw8AGUfGUPbAnTCfpFOwa7I8XQCitl2areKlmzcX+HBlGY KhjmK7lS2SnuvrIE+vGyDlncpIZ+eXLghGjCDX58jNoLmHm7pM6nABKv5ayKyY1wG9qY cdlBl9SVaMMXyAh2jLNzEjln+A4JusivBcmqupk4Gl/z3kbPs4StanRUUb2gtchnEJeO DMwBPV7ZG23VHFNi7oZlo2+BEhE6LUZJWDES2MYMjxqXN97jLrPfu9KNjteUt3VpZzWg I7bgSg5Rm1onylhaXPzTxbD6hR7zvAd06nMIMH5vWMxigwQkpXlkqpDwwYySYj9fSLKy HMeQ== X-Gm-Message-State: AC+VfDzsnxaIJHHmSOoO48kYsxHllyRqd2z6OGRVIcPyNgXHS+nTLc+i UczrUXaNKQ8F37VojNBGVNhQHxOmu/EALxSPeMEvHqEVUQPA+c7Q9VcQ0cWEFhtBir82Xbv+U+B jHyt779JUdeSxmWeX0SAbygrSPY0s X-Received: by 2002:a05:6000:184:b0:309:1532:8287 with SMTP id p4-20020a056000018400b0030915328287mr6988308wrx.19.1687192091760; Mon, 19 Jun 2023 09:28:11 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ7rVHvlT9MNJ9LXVfLazfrXbnssooBJsH4ljfWxXxvSws7fn182lmRphdNcAnEYOr3YvOTExQ== X-Received: by 2002:a05:6000:184:b0:309:1532:8287 with SMTP id p4-20020a056000018400b0030915328287mr6988293wrx.19.1687192091421; Mon, 19 Jun 2023 09:28:11 -0700 (PDT) Date: Mon, 19 Jun 2023 12:28:07 -0400 From: "Michael S. Tsirkin" To: Parav Pandit Cc: virtio-comment@lists.oasis-open.org, cohuck@redhat.com, david.edmondson@oracle.com, virtio-dev@lists.oasis-open.org, sburla@marvell.com, jasowang@redhat.com, yishaih@nvidia.com, maorg@nvidia.com, shahafs@nvidia.com Message-ID: <20230619122751-mutt-send-email-mst@kernel.org> References: <20230613173015.1244486-1-parav@nvidia.com> MIME-Version: 1.0 In-Reply-To: <20230613173015.1244486-1-parav@nvidia.com> X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit Subject: [virtio-dev] Re: [PATCH v6 0/4] admin: Introduce legacy registers access using AQ On Tue, Jun 13, 2023 at 08:30:11PM +0300, Parav Pandit wrote: > This short series introduces legacy registers access commands for the owner > group member PCI PF to access the legacy registers of the member VFs. > > If in future any SIOV devices to support legacy registers, they > can be easily supported using same commands by using the group > member identifiers of the future SIOV devices. > > More details as overview, motivation, use case are further described > below. > > Patch summary: > -------------- > patch-1 split rows of admin opcode tables by a line > patch-2 adds administrative virtuqueue commands > patch-3 adds its conformance section and links numbering seems to have changed? > It uses the newly introduced administrative virtqueue facility with 4 new > commands which uses the existing virtio_admin_cmd. > > Usecase: > -------- > 1. A hypervisor/system needs to provide transitional > virtio devices to the guest VM at scale of thousands, > typically, one to eight devices per VM. > > 2. A hypervisor/system needs to provide such devices using a > vendor agnostic driver in the hypervisor system. > > 3. A hypervisor system prefers to have single stack regardless of > virtio device type (net/blk) and be future compatible with a > single vfio stack using SR-IOV or other scalable device > virtualization technology to map PCI devices to the guest VM. > (as transitional or otherwise) > > Motivation/Background: > ---------------------- > The existing virtio transitional PCI device is missing support for > PCI SR-IOV based devices. Currently it does not work beyond > PCI PF, or as software emulated device in reality. Currently it > has below cited system level limitations: > > [a] PCIe spec citation: > VFs do not support I/O Space and thus VF BARs shall not indicate I/O Space. > > [b] cpu arch citiation: > Intel 64 and IA-32 Architectures Software Developer’s Manual: > The processor’s I/O address space is separate and distinct from > the physical-memory address space. The I/O address space consists > of 64K individually addressable 8-bit I/O ports, numbered 0 through FFFFH. > > [c] PCIe spec citation: > If a bridge implements an I/O address range,...I/O address range will be > aligned to a 4 KB boundary. > > Overview: > --------- > Above usecase requirements is solved by PCI PF group owner accessing > its group member PCI VFs legacy registers using an admin virtqueue of > the group owner PCI PF. > > Two new admin virtqueue commands are added which read/write PCI VF > registers. > > Software usage example: > ----------------------- > One way to use and map to the guest VM is by using vfio driver > framework in Linux kernel. > > +----------------------+ > |pci_dev_id = 0x100X | > +---------------|pci_rev_id = 0x0 |-----+ > |vfio device |BAR0 = I/O region | | > | |Other attributes | | > | +----------------------+ | > | | > + +--------------+ +-----------------+ | > | |I/O BAR to AQ | | Other vfio | | > | |rd/wr mapper | | functionalities | | > | +--------------+ +-----------------+ | > | | > +------+-------------------------+-----------+ > | | > | Driver notification > | | > | | > +----+------------+ +----+------------+ > | +-----+ | | PCI VF device A | > | | AQ |-------------+---->+-------------+ | > | +-----+ | | | | legacy regs | | > | PCI PF device | | | +-------------+ | > +-----------------+ | +-----------------+ > | > | +----+------------+ > | | PCI VF device N | > +---->+-------------+ | > | | legacy regs | | > | +-------------+ | > +-----------------+ > > 2. Virtio pci driver to bind to the listed device id and > use it in the host. > > 3. Use it in a light weight hypervisor to run bare-metal OS. > > Please review. > > Alternatives considered: > ======================== > 1. Exposing BAR0 as MMIO BAR that follows legacy registers template > Pros: > a. Kind of works with legacy drivers as some of them have used API > which is agnostic to MMIO vs IOBAR. > b. Does not require hypervisor intervantion > Cons: > a. Device reset is extremely hard to implement in device at scale as > driver does not wait for device reset completion > b. Device register width related problems persist that hypervisor if > wishes, it cannot be fixed. > > 2. Accessing VF registers by tunneling it through new legacy PCI capability > Pros: > a. Self contained, but cannot work with future PCI SIOV devices > Cons: > a. Equally slow as AQ access > b. Still requires new capability for notification access > c. Requires hardware to build low level registers access which is not worth > for long term future > > 3. Accessing VF notification region using new PF BAR > Cons: > a. Requires hardware to build new PCI steering logic per PF to forward > notification from the PF to VF, requires double the amount of logic > compared to today > b. Requires very large additional PF BAR whose size must be max_Vfs * BAR size. > > 4. Trapping CVQ, configuration region, LEGACY_HDR > Cons: > a. This does not fullfil the very basic requirement to not trap the > 1.x objects (configuration registers, vqs) > b. Requires feature negotiations mediation in hypervisor software > c. Requires constant device type specific knowledge in hypervisor driver > (Does not scale for 30+ device types) > > conclusion for picking AQ approach: > ================================== > 1. Overall AQ based access is simpler to implement with combination of > best from software and device so that legacy registers do not get baked > in the device hardware > 2. AQ allows hypervisor software to intercept legacy registers and make > corrections if needed > 3. Provides trade-off between performance, device complexity vs spec, > while still maintaining passthrough mode for the VFs with minimal > hypervisor intercepts only for legacy registers access > 4. AQ mechanism is designed for accessing other member devices registers > as noted in AQ submission, it utilizes the existing infrastructure over > other alternatives. > 5. Uses existing driver notification region similar to legacy notification > saves hardware resources > > Fixes: https://github.com/oasis-tcs/virtio-spec/issues/167 > Signed-off-by: Parav Pandit > > --- > changelog: > v5->v6: > - fixed previous missed abbreviation of LCC and LD > - added text for the PCI capability for the group member device > v4->v5: > - split pci transport and generic command section to new patch > - removed multiple references to the VF > - written the description of the command as generic with member > and group device terminology > - reflected many section names to remove VF > - split from pci transport specific patch > - split conformance to transport and generic sections > - written the description of the command as generic with member > and group device terminology > - reflected many section names to remove VF > - rename fields from register to region > - avoided abbreviation for legacy, device and config > v3->v4: > - moved noted to the conformance section details in next patch > - removed queue notify address query AQ command on Michael's suggestion, > though it is fine. Instead replaced with extending virtio_pci_notify_cap > to indicate that legacy queue notifications can be done on the > notification location > - fixed spelling errors > - replaced administrative virtqueue to administration virtqueue > - moved legacy interface normative references to legacy conformance > section > v2->v3: > - added new patch to split raws of admin vq opcode table > - adddressed Jason and Michael's comment to split single register > access command to common config and device specific commands. > - dropped the suggetion to introduce enable/disable command as > admin command cap bit already covers it. > - added other alternative design considered and discussed in detail in v0, v1 and v2 > v1->v2: > - addressed comments from Michael > - added theory of operation > - grammar corrections > - removed group fields description from individual commands as > it is already present in generic section > - added endianness normative for legacy device registers region > - renamed the file to drop vf and add legacy prefix > - added overview in commit log > - renamed subsection to reflect command > v0->v1: > - addressed comments, suggesetions and ideas from Michael Tsirkin and Jason Wang > - far more simpler design than MMR access > - removed complexities of MMR device ids > - removed complexities of MMR registers and extended capabilities > - dropped adding new extended capabilities because if if they are > added, a pci device still needs to have existing capabilities > in the legacy configuration space and hypervisor driver do not > need to access them > > > Parav Pandit (4): > admin: Split opcode table rows with a line > admin: Fix section numbering > admin: Add group member legacy register access commands > transport-pci: Introduce group legacy group member config region > access > > admin-cmds-legacy-access.tex | 138 ++++++++++++++++++++++++++++++++++ > admin.tex | 18 ++++- > conformance.tex | 5 ++ > transport-pci-legacy-regs.tex | 48 ++++++++++++ > transport-pci.tex | 20 +++++ > 5 files changed, 226 insertions(+), 3 deletions(-) > create mode 100644 admin-cmds-legacy-access.tex > create mode 100644 transport-pci-legacy-regs.tex > > -- > 2.26.2 --------------------------------------------------------------------- To unsubscribe, e-mail: virtio-dev-unsubscribe@lists.oasis-open.org For additional commands, e-mail: virtio-dev-help@lists.oasis-open.org