Received: by 2002:a05:6a10:eb17:0:0:0:0 with SMTP id hx23csp1544755pxb; Fri, 10 Sep 2021 08:13:43 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwL1g+09nKx9bOjuMIWuksfuV2bPaaUb+esS7lcs372nmCr8ZEOo5fvj3n/x0p31G2wipoO X-Received: by 2002:a05:6e02:1b08:: with SMTP id i8mr6707668ilv.161.1631286823644; Fri, 10 Sep 2021 08:13:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1631286823; cv=none; d=google.com; s=arc-20160816; b=Ojwzq+mCukipqMWbaZrnD9pEG66m+IEcsCOd5YRpZ6Wx7GbfixGyueehUvskE0Q0q6 4oP9DXjufSn4dlGSl8R4//QrRqEHHmJkxyxGgjY8NCv5A+TtX35CeML1mSyzlhQ6VoJN n4X6k7/NUFlhKJZJiBiW5tlljoDkLBFT5LAy62tCeEy6iaI70u+ZnlcvZ4JPTpc+RnlO +v/HDIZ+ouYkOIgXv44pv1TZHWbNZsEW0J5sjt1cINJ06cthqE088CrgnTH9U9s9lRgO 6mVeF5RZ0/6wfUoG+DSiBqbNeu1c0uuYeKZMcTffpHnNCs1PYg3zswpLRcRQ8tYJatgg Xixw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=IwrCoYv5n0QYjMcBw8iH1qZp7RHX+qf8AzH/tfopXmQ=; b=0laCVmz6hq5dTYWSItcXk4GUU9oVbUx7nMJBl2YWP35cwhnwGB+x9lPOSgnHMlFGSc htdpmPEybKJXrRlwL3MHgwL/8WZgPgOfqIusPE9OfSGXQEz/lS6BTJqQnsHpiNdTfr0K hsb60vCrqebvlmxZDmUllWbnWr6TUwnJ8guHppyp29UamRzY1LQag233iICGSy8Lz6ne vkAUvBAgtR/Yws9pajAu2KK3fDEfiPCkR34/Pq6F6l80IsCq2w8wzPbpc6PS2LZB8G42 vYyFRnmd20tal8qD4zVItpeP0Vp2sY7I3csDeV9XXpHkF50QhGKfJbbdbc8s34gLR248 SlMA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=hWQnlDF0; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id k35si4886952jac.46.2021.09.10.08.13.26; Fri, 10 Sep 2021 08:13:43 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=hWQnlDF0; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234155AbhIJPMj (ORCPT + 99 others); Fri, 10 Sep 2021 11:12:39 -0400 Received: from us-smtp-delivery-124.mimecast.com ([170.10.133.124]:49548 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234173AbhIJPMh (ORCPT ); Fri, 10 Sep 2021 11:12:37 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1631286683; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=IwrCoYv5n0QYjMcBw8iH1qZp7RHX+qf8AzH/tfopXmQ=; b=hWQnlDF0bbYpdWlfwxmQuNZmtXS/ll7A3RPQalZunypc1aSBoAIi1VJrV4lhsl6wm8sffm QSOGT4LuCDrV+o+lNityIXctX8/d6FtLBVZaONNrd7+042uiS/YZrHcVe23aq4sOQX2g7J Fkq1A0ot2bXFPqfpgQCj7CKfRTYk3Fg= Received: from mail-ej1-f69.google.com (mail-ej1-f69.google.com [209.85.218.69]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-248-Er7Df_ObMy-_qjjiiS7acg-1; Fri, 10 Sep 2021 11:11:22 -0400 X-MC-Unique: Er7Df_ObMy-_qjjiiS7acg-1 Received: by mail-ej1-f69.google.com with SMTP id q19-20020a1709064cd3b02904c5f93c0124so1194172ejt.14 for ; Fri, 10 Sep 2021 08:11:22 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=IwrCoYv5n0QYjMcBw8iH1qZp7RHX+qf8AzH/tfopXmQ=; b=pnPBuIZSOF77PWLyIE0vRMByV9lo/6vHXy0mO6K0maPlkmfQ7SEKg0S2PpIM5bBxzJ sypbBZALld/JD0Gppzp61xehrMinWl5pGogRvEJjr4VHVSAfgX87zcRQBZzTFz/VfQbt v4n6i3zaocJPzHy57Ouot/6Hjs+Ap6CfvqGWBBuhMvZ9WGjshMjsR3deLvmw4N7ZsW86 07GbTCdCnTRESYw9zWfTLbPXXt6iZ7czwehIvIrj8UKLUUB+rQOuKS/VOaWFAeY5gKOa KV0IhpSVo//2rYzMBWJ2Vj42b/ZGhXN4L457NmkHBZ2/QbBLWFLkVVbQebM61OowNuA2 uFGQ== X-Gm-Message-State: AOAM5305+wtAtCODTjf1x1XTWU6Ojs6ACTYyk5UTOkR0cXkFg0SRNCEp dOW1DK51CHK8hYINYmrtlzmnyR3/OMUl60XAnYkC0tCid5z67Kk19cjzZW3/G9IFYRrWHTbLbCh W6u0pGrOWOsDfzDonrwCVTuiggFheP53MHGL0qm9u X-Received: by 2002:a05:6402:4247:: with SMTP id g7mr9442776edb.287.1631286681048; Fri, 10 Sep 2021 08:11:21 -0700 (PDT) X-Received: by 2002:a05:6402:4247:: with SMTP id g7mr9442757edb.287.1631286680760; Fri, 10 Sep 2021 08:11:20 -0700 (PDT) MIME-Version: 1.0 References: <20210909080157.GA17383@L-PF27918B-1352.localdomain> <20210909095726.GA17469@L-PF27918B-1352.localdomain> <20210910073231.GA17715@L-PF27918B-1352.localdomain> <20210910092013.GA17783@L-PF27918B-1352.localdomain> In-Reply-To: <20210910092013.GA17783@L-PF27918B-1352.localdomain> From: Cindy Lu Date: Fri, 10 Sep 2021 23:10:40 +0800 Message-ID: Subject: Re: [PATCH 5/6] vdpa: add get_vq_num_unchangeable callback in vdpa_config_ops To: Wu Zongyong Cc: Jason Wang , virtualization , linux-kernel , mst , wei.yang1@linux.alibaba.com Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Sep 10, 2021 at 5:20 PM Wu Zongyong wrote: > > On Fri, Sep 10, 2021 at 04:25:18PM +0800, Cindy Lu wrote: > > , > > > > On Fri, Sep 10, 2021 at 3:33 PM Wu Zongyong > > wrote: > > > > > > On Fri, Sep 10, 2021 at 09:45:53AM +0800, Jason Wang wrote: > > > > On Thu, Sep 9, 2021 at 5:57 PM Wu Zongyong wrote: > > > > > > > > > > On Thu, Sep 09, 2021 at 05:28:26PM +0800, Jason Wang wrote: > > > > > > On Thu, Sep 9, 2021 at 4:02 PM Wu Zongyong wrote: > > > > > > > > > > > > > > On Thu, Sep 09, 2021 at 10:55:03AM +0800, Jason Wang wrote: > > > > > > > > On Wed, Sep 8, 2021 at 8:23 PM Wu Zongyong wrote: > > > > > > > > > > > > > > > > > > This new callback is used to indicate whether the vring size can be > > > > > > > > > change or not. It is useful when we have a legacy virtio pci device as > > > > > > > > > the vdpa device for there is no way to negotiate the vring num by the > > > > > > > > > specification. > > > > > > > > > > > > > > > > So I'm not sure it's worth bothering. E.g what if we just fail > > > > > > > > VHOST_SET_VRING_NUM it the value doesn't match what hardware has? > > > > > > > > > > > > > > > > Thanks > > > > > > > > > > > > > > > I think we should not call VHOST_SET_VRING_NUM in that case. > > > > > > > > > > > > > > If the hardware reports that the virtqueue size cannot be changed, we > > > > > > > should call VHOST_GET_VRING_NUM to get the static virtqueue size > > > > > > > firstly, then allocate the same size memory for the virtqueues and write > > > > > > > the address to hardware finally. > > > > > > > > > > > > > > For QEMU, we will ignore the properties rx/tx_queue_size and just get it > > > > > > > from the hardware if this new callback return true. > > > > > > > > > > > > This will break live migration. My understanding is that we can > > > > > > advertise those capability/limitation via the netlink management > > > > > > protocol then management layer can choose to use the correct queue > > > > > > size. > > > > > > > > > > > > Thanks > > > > > I agree, it is a good idea. > > > > > BTW, can we also advertise mac address of network device? I found the > > > > > mac address generated by libvirt or qemu will break the network datapath > > > > > down if I don't specify the right mac explicitly in the XML or qemu > > > > > commandline. > > > > > > > > We never saw this before, AFAIK when vhost-vdpa is used, currently > > > > qemu will probably ignore the mac address set via command line since > > > > the config space is read from the device instead of qemu itself? > > > > > > > > > > I saw the code below in qemu: > > > > > > static void virtio_net_device_realize(DeviceState *dev, Error **errp) > > > { > > > ... > > > if (nc->peer && nc->peer->info->type == NET_CLIENT_DRIVER_VHOST_VDPA) { > > > struct virtio_net_config netcfg = {}; > > > memcpy(&netcfg.mac, &n->nic_conf.macaddr, ETH_ALEN); > > > vhost_net_set_config(get_vhost_net(nc->peer), > > > (uint8_t *)&netcfg, 0, ETH_ALEN, VHOST_SET_CONFIG_TYPE_MASTER); > > > } > > > ... > > > } > > > > > > This write the mac address set via cmdline into vdpa device config, and > > > then guest will read it back. > > > If I remove these codes, it behaves like you said. > > > > > > > > Hi Zongyong > > I think this code only works while qemu get an all 0 mac address from > > hardware , you can get more information from the function > > virtio_net_get_config. > > It depends how vdpa_config_ops->set_config implements. > For mlx5, callback set_config do nothing. But for virtio-pci, callback > set_config will write the config register of the vdpa device, so qemu > will write the mac set via cmdline to hardware and the mac guest read > it back is the value writted by qemu just now. > So here comes a question, which MAC address has higher priority ? the MAC address in hardware or the MAC address from the cmdline? If both of these two MAC addresses exist, which should we use? I have checked the spec, not sure if the bit VIRTIO_NET_F_MAC is the right one? if yes, I will post a patch in qemu and add check for this bit before we set the mac to hardware https://docs.oasis-open.org/virtio/virtio/v1.1/csprd01/virtio-v1.1-csprd01.html Thanks cindy > > > > Thanks > > > > > > > > > > > > > > > > > > > > > > > > What do you think? > > > > > > > > > > > > > > > > > > Signed-off-by: Wu Zongyong > > > > > > > > > --- > > > > > > > > > drivers/vhost/vdpa.c | 19 +++++++++++++++++++ > > > > > > > > > drivers/virtio/virtio_vdpa.c | 5 ++++- > > > > > > > > > include/linux/vdpa.h | 4 ++++ > > > > > > > > > include/uapi/linux/vhost.h | 2 ++ > > > > > > > > > 4 files changed, 29 insertions(+), 1 deletion(-) > > > > > > > > > > > > > > > > > > diff --git a/drivers/vhost/vdpa.c b/drivers/vhost/vdpa.c > > > > > > > > > index 9479f7f79217..2204d27d1e5d 100644 > > > > > > > > > --- a/drivers/vhost/vdpa.c > > > > > > > > > +++ b/drivers/vhost/vdpa.c > > > > > > > > > @@ -350,6 +350,22 @@ static long vhost_vdpa_get_iova_range(struct vhost_vdpa *v, u32 __user *argp) > > > > > > > > > return 0; > > > > > > > > > } > > > > > > > > > > > > > > > > > > +static long vhost_vdpa_get_vring_num_unchangeable(struct vhost_vdpa *v, > > > > > > > > > + u32 __user *argp) > > > > > > > > > +{ > > > > > > > > > + struct vdpa_device *vdpa = v->vdpa; > > > > > > > > > + const struct vdpa_config_ops *ops = vdpa->config; > > > > > > > > > + bool unchangeable = false; > > > > > > > > > + > > > > > > > > > + if (ops->get_vq_num_unchangeable) > > > > > > > > > + unchangeable = ops->get_vq_num_unchangeable(vdpa); > > > > > > > > > + > > > > > > > > > + if (copy_to_user(argp, &unchangeable, sizeof(unchangeable))) > > > > > > > > > + return -EFAULT; > > > > > > > > > + > > > > > > > > > + return 0; > > > > > > > > > +} > > > > > > > > > + > > > > > > > > > static long vhost_vdpa_vring_ioctl(struct vhost_vdpa *v, unsigned int cmd, > > > > > > > > > void __user *argp) > > > > > > > > > { > > > > > > > > > @@ -487,6 +503,9 @@ static long vhost_vdpa_unlocked_ioctl(struct file *filep, > > > > > > > > > case VHOST_VDPA_GET_IOVA_RANGE: > > > > > > > > > r = vhost_vdpa_get_iova_range(v, argp); > > > > > > > > > break; > > > > > > > > > + case VHOST_VDPA_GET_VRING_NUM_UNCHANGEABLE: > > > > > > > > > + r = vhost_vdpa_get_vring_num_unchangeable(v, argp); > > > > > > > > > + break; > > > > > > > > > default: > > > > > > > > > r = vhost_dev_ioctl(&v->vdev, cmd, argp); > > > > > > > > > if (r == -ENOIOCTLCMD) > > > > > > > > > diff --git a/drivers/virtio/virtio_vdpa.c b/drivers/virtio/virtio_vdpa.c > > > > > > > > > index 72eaef2caeb1..afb47465307a 100644 > > > > > > > > > --- a/drivers/virtio/virtio_vdpa.c > > > > > > > > > +++ b/drivers/virtio/virtio_vdpa.c > > > > > > > > > @@ -146,6 +146,7 @@ virtio_vdpa_setup_vq(struct virtio_device *vdev, unsigned int index, > > > > > > > > > struct vdpa_vq_state state = {0}; > > > > > > > > > unsigned long flags; > > > > > > > > > u32 align, num; > > > > > > > > > + bool may_reduce_num = true; > > > > > > > > > int err; > > > > > > > > > > > > > > > > > > if (!name) > > > > > > > > > @@ -171,8 +172,10 @@ virtio_vdpa_setup_vq(struct virtio_device *vdev, unsigned int index, > > > > > > > > > > > > > > > > > > /* Create the vring */ > > > > > > > > > align = ops->get_vq_align(vdpa); > > > > > > > > > + if (ops->get_vq_num_unchangeable) > > > > > > > > > + may_reduce_num = !ops->get_vq_num_unchangeable(vdpa); > > > > > > > > > vq = vring_create_virtqueue(index, num, align, vdev, > > > > > > > > > - true, true, ctx, > > > > > > > > > + true, may_reduce_num, ctx, > > > > > > > > > virtio_vdpa_notify, callback, name); > > > > > > > > > if (!vq) { > > > > > > > > > err = -ENOMEM; > > > > > > > > > diff --git a/include/linux/vdpa.h b/include/linux/vdpa.h > > > > > > > > > index 35648c11e312..f809b7ada00d 100644 > > > > > > > > > --- a/include/linux/vdpa.h > > > > > > > > > +++ b/include/linux/vdpa.h > > > > > > > > > @@ -195,6 +195,9 @@ struct vdpa_iova_range { > > > > > > > > > * @vdev: vdpa device > > > > > > > > > * Returns the iova range supported by > > > > > > > > > * the device. > > > > > > > > > + * @get_vq_num_unchangeable Check if size of virtqueue is unchangeable (optional) > > > > > > > > > + * @vdev: vdpa device > > > > > > > > > + * Returns boolean: unchangeable (true) or not (false) > > > > > > > > > * @set_map: Set device memory mapping (optional) > > > > > > > > > * Needed for device that using device > > > > > > > > > * specific DMA translation (on-chip IOMMU) > > > > > > > > > @@ -262,6 +265,7 @@ struct vdpa_config_ops { > > > > > > > > > const void *buf, unsigned int len); > > > > > > > > > u32 (*get_generation)(struct vdpa_device *vdev); > > > > > > > > > struct vdpa_iova_range (*get_iova_range)(struct vdpa_device *vdev); > > > > > > > > > + bool (*get_vq_num_unchangeable)(struct vdpa_device *vdev); > > > > > > > > > > > > > > > > > > /* DMA ops */ > > > > > > > > > int (*set_map)(struct vdpa_device *vdev, struct vhost_iotlb *iotlb); > > > > > > > > > diff --git a/include/uapi/linux/vhost.h b/include/uapi/linux/vhost.h > > > > > > > > > index c998860d7bbc..184f1f7f8498 100644 > > > > > > > > > --- a/include/uapi/linux/vhost.h > > > > > > > > > +++ b/include/uapi/linux/vhost.h > > > > > > > > > @@ -150,4 +150,6 @@ > > > > > > > > > /* Get the valid iova range */ > > > > > > > > > #define VHOST_VDPA_GET_IOVA_RANGE _IOR(VHOST_VIRTIO, 0x78, \ > > > > > > > > > struct vhost_vdpa_iova_range) > > > > > > > > > +/* Check if the vring size can be change */ > > > > > > > > > +#define VHOST_VDPA_GET_VRING_NUM_UNCHANGEABLE _IOR(VHOST_VIRTIO, 0X79, bool) > > > > > > > > > #endif > > > > > > > > > -- > > > > > > > > > 2.31.1 > > > > > > > > > > > > > > > > > > > > > > > > >