From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp2.osuosl.org (smtp2.osuosl.org [140.211.166.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 2797634189 for ; Thu, 14 Dec 2023 14:59:12 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b="g0vKSZaN" Received: from localhost (localhost [127.0.0.1]) by smtp2.osuosl.org (Postfix) with ESMTP id AEE2F4047B for ; Thu, 14 Dec 2023 14:59:12 +0000 (UTC) DKIM-Filter: OpenDKIM Filter v2.11.0 smtp2.osuosl.org AEE2F4047B Authentication-Results: smtp2.osuosl.org; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256 header.s=mimecast20190719 header.b=g0vKSZaN X-Virus-Scanned: amavisd-new at osuosl.org X-Spam-Flag: NO X-Spam-Score: -2.099 X-Spam-Level: Received: from smtp2.osuosl.org ([127.0.0.1]) by localhost (smtp2.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8-2y-obBFqpf for ; Thu, 14 Dec 2023 14:59:11 +0000 (UTC) Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by smtp2.osuosl.org (Postfix) with ESMTPS id E2369400EC for ; Thu, 14 Dec 2023 14:59:10 +0000 (UTC) DKIM-Filter: OpenDKIM Filter v2.11.0 smtp2.osuosl.org E2369400EC DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1702565949; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=1RLGe2L9X5Mr31nnAm9zgeYUzia+cx8yyVuWMarvBic=; b=g0vKSZaNK2SLPTgicZNqVCDUhhTm3ap1GNAno6T2kVDpEaA2K7czb+5xGQNAEYSQ7TYIP7 0hfo+BM+HU32K3PMk7thjY+bS/N8mwqXSL5eqr2wXlPSZFDVSTy9hHwxyFYB074tJAXq+9 78fVmmEi0oMjAxlaESsJAEc3DKEw+2I= Received: from mail-io1-f71.google.com (mail-io1-f71.google.com [209.85.166.71]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-315-YEBUtyihOz6rlTHLqgF0JA-1; Thu, 14 Dec 2023 09:59:08 -0500 X-MC-Unique: YEBUtyihOz6rlTHLqgF0JA-1 Received: by mail-io1-f71.google.com with SMTP id ca18e2360f4ac-7b6f8b66df0so838833339f.2 for ; Thu, 14 Dec 2023 06:59:08 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1702565947; x=1703170747; h=content-transfer-encoding:mime-version:organization:references :in-reply-to:message-id:subject:cc:to:from:date:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=1RLGe2L9X5Mr31nnAm9zgeYUzia+cx8yyVuWMarvBic=; b=enZAE/L3ATMEwgsE57Tjst5QW2JOGfosfqJlMjDZSANbPOdVx+g8Q50C7s3imjthvs D+ztEOuOorqxI/rli1jr4KxdL8Q0lwdUepHHa5+Xnzjj/8y7sQZwFwBmlmBf/NVr+kvu SwA2/Lp05INlvdqywmYi1ZId6Zbl+6nln70uUa28hQw0w0NTUIWMr8rPjPESXZS+6oQG SjhJPhHM1nCEwIpgE2CLEL2yPz2X3NIN6ogiv17vGMUHeq72xpiUWuMSr+Xxx9or6pdu xAvxJ9yV3dHRizBfcRuaShemL/pAHi0BOelK5Oqu5YRwBl1YJoqanIyBAdM6k3AAKH0f odWA== X-Gm-Message-State: AOJu0YzzWI8n7CeWU4LkroRqrgIQo7TJ9IGCbflhsVZ8ucpN3gTIntS8 NCkJtlalIBpDVB8jAvnideWbu3jn94+AbiiXkd0QXKwJQsnPGbfVem6h/pRQ9dCFie7DQDcIn0z B5ML0tVEUOh8TG5eQBC/bARn/RAk7qPcYMxKqvTCs9w== X-Received: by 2002:a6b:f009:0:b0:7b4:28f8:15bf with SMTP id w9-20020a6bf009000000b007b428f815bfmr12307543ioc.31.1702565947658; Thu, 14 Dec 2023 06:59:07 -0800 (PST) X-Google-Smtp-Source: AGHT+IFbyAkggAWBbMXyUieCNYPA1mTiegP4hsTpomTs9qhK+tzWrCgwcP8YTtEv5oNfnATzPT5zbA== X-Received: by 2002:a6b:f009:0:b0:7b4:28f8:15bf with SMTP id w9-20020a6bf009000000b007b428f815bfmr12307517ioc.31.1702565947300; Thu, 14 Dec 2023 06:59:07 -0800 (PST) Received: from redhat.com ([38.15.60.12]) by smtp.gmail.com with ESMTPSA id v3-20020a023843000000b00466b43f6b54sm3423834jae.156.2023.12.14.06.59.06 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 14 Dec 2023 06:59:06 -0800 (PST) Date: Thu, 14 Dec 2023 07:59:05 -0700 From: Alex Williamson To: Yishai Hadas Cc: "Michael S. Tsirkin" , , , , , , , , , , , , Subject: Re: [PATCH V7 vfio 9/9] vfio/virtio: Introduce a vfio driver over virtio devices Message-ID: <20231214075905.59a4a3ba.alex.williamson@redhat.com> In-Reply-To: <37bcb2f0-a83d-4806-809c-ec5d004ddb20@nvidia.com> References: <20231207102820.74820-1-yishaih@nvidia.com> <20231207102820.74820-10-yishaih@nvidia.com> <20231214013642-mutt-send-email-mst@kernel.org> <20231214041515-mutt-send-email-mst@kernel.org> <37bcb2f0-a83d-4806-809c-ec5d004ddb20@nvidia.com> Organization: Red Hat Precedence: bulk X-Mailing-List: virtualization@lists.linux.dev List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit On Thu, 14 Dec 2023 11:37:10 +0200 Yishai Hadas wrote: > On 14/12/2023 11:19, Michael S. Tsirkin wrote: > > On Thu, Dec 14, 2023 at 11:03:49AM +0200, Yishai Hadas wrote: > >> On 14/12/2023 8:38, Michael S. Tsirkin wrote: > >>> On Thu, Dec 07, 2023 at 12:28:20PM +0200, Yishai Hadas wrote: > >>>> Introduce a vfio driver over virtio devices to support the legacy > >>>> interface functionality for VFs. > >>>> > >>>> Background, from the virtio spec [1]. > >>>> -------------------------------------------------------------------- > >>>> In some systems, there is a need to support a virtio legacy driver with > >>>> a device that does not directly support the legacy interface. In such > >>>> scenarios, a group owner device can provide the legacy interface > >>>> functionality for the group member devices. The driver of the owner > >>>> device can then access the legacy interface of a member device on behalf > >>>> of the legacy member device driver. > >>>> > >>>> For example, with the SR-IOV group type, group members (VFs) can not > >>>> present the legacy interface in an I/O BAR in BAR0 as expected by the > >>>> legacy pci driver. If the legacy driver is running inside a virtual > >>>> machine, the hypervisor executing the virtual machine can present a > >>>> virtual device with an I/O BAR in BAR0. The hypervisor intercepts the > >>>> legacy driver accesses to this I/O BAR and forwards them to the group > >>>> owner device (PF) using group administration commands. > >>>> -------------------------------------------------------------------- > >>>> > >>>> Specifically, this driver adds support for a virtio-net VF to be exposed > >>>> as a transitional device to a guest driver and allows the legacy IO BAR > >>>> functionality on top. > >>>> > >>>> This allows a VM which uses a legacy virtio-net driver in the guest to > >>>> work transparently over a VF which its driver in the host is that new > >>>> driver. > >>>> > >>>> The driver can be extended easily to support some other types of virtio > >>>> devices (e.g virtio-blk), by adding in a few places the specific type > >>>> properties as was done for virtio-net. > >>>> > >>>> For now, only the virtio-net use case was tested and as such we introduce > >>>> the support only for such a device. > >>>> > >>>> Practically, > >>>> Upon probing a VF for a virtio-net device, in case its PF supports > >>>> legacy access over the virtio admin commands and the VF doesn't have BAR > >>>> 0, we set some specific 'vfio_device_ops' to be able to simulate in SW a > >>>> transitional device with I/O BAR in BAR 0. > >>>> > >>>> The existence of the simulated I/O bar is reported later on by > >>>> overwriting the VFIO_DEVICE_GET_REGION_INFO command and the device > >>>> exposes itself as a transitional device by overwriting some properties > >>>> upon reading its config space. > >>>> > >>>> Once we report the existence of I/O BAR as BAR 0 a legacy driver in the > >>>> guest may use it via read/write calls according to the virtio > >>>> specification. > >>>> > >>>> Any read/write towards the control parts of the BAR will be captured by > >>>> the new driver and will be translated into admin commands towards the > >>>> device. > >>>> > >>>> Any data path read/write access (i.e. virtio driver notifications) will > >>>> be forwarded to the physical BAR which its properties were supplied by > >>>> the admin command VIRTIO_ADMIN_CMD_LEGACY_NOTIFY_INFO upon the > >>>> probing/init flow. > >>>> > >>>> With that code in place a legacy driver in the guest has the look and > >>>> feel as if having a transitional device with legacy support for both its > >>>> control and data path flows. > >>>> > >>>> [1] > >>>> https://github.com/oasis-tcs/virtio-spec/commit/03c2d32e5093ca9f2a17797242fbef88efe94b8c > >>>> > >>>> Reviewed-by: Jason Gunthorpe > >>>> Signed-off-by: Yishai Hadas > >>>> --- > >>>> MAINTAINERS | 7 + > >>>> drivers/vfio/pci/Kconfig | 2 + > >>>> drivers/vfio/pci/Makefile | 2 + > >>>> drivers/vfio/pci/virtio/Kconfig | 16 + > >>>> drivers/vfio/pci/virtio/Makefile | 4 + > >>>> drivers/vfio/pci/virtio/main.c | 567 +++++++++++++++++++++++++++++++ > >>>> 6 files changed, 598 insertions(+) > >>>> create mode 100644 drivers/vfio/pci/virtio/Kconfig > >>>> create mode 100644 drivers/vfio/pci/virtio/Makefile > >>>> create mode 100644 drivers/vfio/pci/virtio/main.c > >>>> > >>>> diff --git a/MAINTAINERS b/MAINTAINERS > >>>> index 012df8ccf34e..b246b769092d 100644 > >>>> --- a/MAINTAINERS > >>>> +++ b/MAINTAINERS > >>>> @@ -22872,6 +22872,13 @@ L: kvm@vger.kernel.org > >>>> S: Maintained > >>>> F: drivers/vfio/pci/mlx5/ > >>>> +VFIO VIRTIO PCI DRIVER > >>>> +M: Yishai Hadas > >>>> +L: kvm@vger.kernel.org > >>>> +L: virtualization@lists.linux-foundation.org > >>>> +S: Maintained > >>>> +F: drivers/vfio/pci/virtio > >>>> + > >>>> VFIO PCI DEVICE SPECIFIC DRIVERS > >>>> R: Jason Gunthorpe > >>>> R: Yishai Hadas > >>>> diff --git a/drivers/vfio/pci/Kconfig b/drivers/vfio/pci/Kconfig > >>>> index 8125e5f37832..18c397df566d 100644 > >>>> --- a/drivers/vfio/pci/Kconfig > >>>> +++ b/drivers/vfio/pci/Kconfig > >>>> @@ -65,4 +65,6 @@ source "drivers/vfio/pci/hisilicon/Kconfig" > >>>> source "drivers/vfio/pci/pds/Kconfig" > >>>> +source "drivers/vfio/pci/virtio/Kconfig" > >>>> + > >>>> endmenu > >>>> diff --git a/drivers/vfio/pci/Makefile b/drivers/vfio/pci/Makefile > >>>> index 45167be462d8..046139a4eca5 100644 > >>>> --- a/drivers/vfio/pci/Makefile > >>>> +++ b/drivers/vfio/pci/Makefile > >>>> @@ -13,3 +13,5 @@ obj-$(CONFIG_MLX5_VFIO_PCI) += mlx5/ > >>>> obj-$(CONFIG_HISI_ACC_VFIO_PCI) += hisilicon/ > >>>> obj-$(CONFIG_PDS_VFIO_PCI) += pds/ > >>>> + > >>>> +obj-$(CONFIG_VIRTIO_VFIO_PCI) += virtio/ > >>>> diff --git a/drivers/vfio/pci/virtio/Kconfig b/drivers/vfio/pci/virtio/Kconfig > >>>> new file mode 100644 > >>>> index 000000000000..3a6707639220 > >>>> --- /dev/null > >>>> +++ b/drivers/vfio/pci/virtio/Kconfig > >>>> @@ -0,0 +1,16 @@ > >>>> +# SPDX-License-Identifier: GPL-2.0-only > >>>> +config VIRTIO_VFIO_PCI > >>>> + tristate "VFIO support for VIRTIO NET PCI devices" > >>>> + depends on VIRTIO_PCI > >>>> + select VFIO_PCI_CORE > >>>> + help > >>>> + This provides support for exposing VIRTIO NET VF devices which support > >>>> + legacy IO access, using the VFIO framework that can work with a legacy > >>>> + virtio driver in the guest. > >>>> + Based on PCIe spec, VFs do not support I/O Space; thus, VF BARs shall > >>>> + not indicate I/O Space. > >>>> + As of that this driver emulated I/O BAR in software to let a VF be > >>>> + seen as a transitional device in the guest and let it work with > >>>> + a legacy driver. > >>>> + > >>>> + If you don't know what to do here, say N. > >>> > >>> BTW shouldn't this driver be limited to X86? Things like lack of memory > >>> barriers will make legacy virtio racy on e.g. ARM will they not? > >>> And endian-ness will be broken on PPC ... > >>> > >> > >> OK, if so, we can come with the below extra code. > >> Makes sense ? > >> > >> I'll squash it as part of V8 to the relevant patch. > >> > >> diff --git a/drivers/virtio/virtio_pci_modern.c > >> b/drivers/virtio/virtio_pci_modern.c > >> index 37a0035f8381..b652e91b9df4 100644 > >> --- a/drivers/virtio/virtio_pci_modern.c > >> +++ b/drivers/virtio/virtio_pci_modern.c > >> @@ -794,6 +794,9 @@ bool virtio_pci_admin_has_legacy_io(struct pci_dev > >> *pdev) > >> struct virtio_device *virtio_dev = virtio_pci_vf_get_pf_dev(pdev); > >> struct virtio_pci_device *vp_dev; > >> > >> +#ifndef CONFIG_X86 > >> + return false; > >> +#endif > >> if (!virtio_dev) > >> return false; > >> > >> Yishai > > > > Isn't there going to be a bunch more dead code that compiler won't be > > able to elide? > > > > On my setup the compiler didn't complain about dead-code (I simulated it > by using ifdef CONFIG_X86 return false). > > However, if we suspect that some compiler might complain, we can come > with the below instead. > > Do you prefer that ? > > index 37a0035f8381..53e29824d404 100644 > --- a/drivers/virtio/virtio_pci_modern.c > +++ b/drivers/virtio/virtio_pci_modern.c > @@ -782,6 +782,7 @@ static void vp_modern_destroy_avq(struct > virtio_device *vdev) > BIT_ULL(VIRTIO_ADMIN_CMD_LEGACY_DEV_CFG_READ) | \ > BIT_ULL(VIRTIO_ADMIN_CMD_LEGACY_NOTIFY_INFO)) > > +#ifdef CONFIG_X86 > /* > * virtio_pci_admin_has_legacy_io - Checks whether the legacy IO > * commands are supported > @@ -807,6 +808,12 @@ bool virtio_pci_admin_has_legacy_io(struct pci_dev > *pdev) > return true; > return false; > } > +#else > +bool virtio_pci_admin_has_legacy_io(struct pci_dev *pdev) > +{ > + return false; > +} > +#endif > EXPORT_SYMBOL_GPL(virtio_pci_admin_has_legacy_io); Doesn't this also raise the question of the purpose of virtio-vfio-pci on non-x86? Without any other features it offers nothing over vfio-pci and we should likely adjust the Kconfig for x86 or COMPILE_TEST. Thanks, Alex