Received: by 2002:a05:6a10:d5a5:0:0:0:0 with SMTP id gn37csp3921820pxb; Mon, 4 Oct 2021 12:42:23 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwetZLImkj6YI3aS0lVbYNzeoQu28BNYaUYPRU6gz5nhoYD7GYGUWeEthwDfdpZ0PJ18hkv X-Received: by 2002:a50:d948:: with SMTP id u8mr20600370edj.306.1633376542782; Mon, 04 Oct 2021 12:42:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1633376542; cv=none; d=google.com; s=arc-20160816; b=CM4ZuKK/4Wb9/WuB3DXIY8yC29q6i4Z+hhUo+3UPgMy+4q84gI3X4jb8tiG34KjR8v oLzUTkkPcaiVFqxCgWLVILrX9TXyOPj6SA6GnVLEDr0Ai7YcKpFwk/AjoYmNAriUFMQQ US0lTQY2BDzI9ln4vCO2XkSVBAD0Z9Lp7WpcnF7q3uZg5IpPvAwJUqmok0t5JuIgZGL7 yGe7+6nn+h96pOEreWjVbRh3ZDxayLm5spF8el0ZcPhU5OJhez9hBkNUqR1h2FyiIPJ9 JE4CpCMMRkFtzLNgJKCLzFA9NMa6sobzwqU+bokKltNagNVPwy6zKOi6LlgSd6lu4UxH XJiA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=6lrk0fk6ms6xnGimLrtDXbPUtIp40gvE+EO71fUNGKg=; b=la91QRST0ybpOWquVv/ia76Iu6Z9PFA6WmJCEqcx8AU2kgqazUklJVy/qfwCJZsbj3 KpvOsv7vMmm+Y06mY/d8ShWLtA6NqcExOP3/UT/kIjjIvhnpzR5LEXtoeCuVUqyb4HBW KMi7mGfH0oRtMFEHlChUpyuYqn7MRiNJELgU6M3JOjGAqTOIIhLpb/M3DL1Ph70EGClA /ouNy9Dc0Z9REctfHKsj+iT9NKydjDOl/E72buZCBnjr1aoMRVDIKRK7oIeFYpBttEhu JOZrAX9tNxazzZWfGVgEjTNygwHZVkVT3QPNXlrcIQmKWgtQhSH/t+Cq8F6PWCx5yyMM QQug== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=UOGSQBsz; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id c19si23654328ede.102.2021.10.04.12.41.58; Mon, 04 Oct 2021 12:42:22 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=UOGSQBsz; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233482AbhJDM4h (ORCPT + 99 others); Mon, 4 Oct 2021 08:56:37 -0400 Received: from us-smtp-delivery-124.mimecast.com ([216.205.24.124]:22830 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233478AbhJDM4U (ORCPT ); Mon, 4 Oct 2021 08:56:20 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1633352071; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=6lrk0fk6ms6xnGimLrtDXbPUtIp40gvE+EO71fUNGKg=; b=UOGSQBszwEplaAs1E5kii7Ogm4PFnIMSQZhdfZIzv3tG2tBzz/DbmFEnqcz+9Av9ePLrbi vobQ23D1Rgrpod2MO2fiyMKE5Ud1Xi60F/Y62HF+qLiC4OGvaIwD3HgN4ase/TKy1b0Qg5 qwPGMLOXvMplTgsCfWo0CfegcOGEBNk= Received: from mail-wr1-f70.google.com (mail-wr1-f70.google.com [209.85.221.70]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-79-yx-mmRKmPGiQqcQwbsBqpw-1; Mon, 04 Oct 2021 08:54:30 -0400 X-MC-Unique: yx-mmRKmPGiQqcQwbsBqpw-1 Received: by mail-wr1-f70.google.com with SMTP id f11-20020adfc98b000000b0015fedc2a8d4so4659906wrh.0 for ; Mon, 04 Oct 2021 05:54:30 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=6lrk0fk6ms6xnGimLrtDXbPUtIp40gvE+EO71fUNGKg=; b=YXXNPB8bIS0zYJB6iQ4T++SeXOmjI4OWefjJsiaW9ROJOiQt2pRqEBMSNd1rVLgeWt DwSDHI5j/r89/IuZiJESq7dcvk5ICxFTZYDrSaAwbmJUEmzK6zR2cPZoHmQa7aiNorsg 0w/jt3GNzWBSxlPYJQIO2aBUnoifjqllhtFbkqU2lQpt7pHTnyOexJF9OUogNUGKXqSv bx++Ely+odeb20y0XTNUMs5dDrAKZ3hJODdSX0alkTQsy6QpXIyTtdNvT1sH7lMGKe/F SRsTWjfuDklmpK5/uwY2Geu1nH/s4bQLsxISOi8IHejrY1qRKvBq9paYWPLWHz9yVYFu 3nJA== X-Gm-Message-State: AOAM533iGXQ5RUAu8dno/ZueO0F1/o20Etkrd7X44vVDjIfZ/yQ0zyu6 vtzw78UKJVFS5KMdE2emlwaP4NRNuiuE1zJzMf1r7LN7wsXQsjHlcGu4SbDmD8I2jDWuV9qmJRB 5TmMOJUqbQnQ2EENeduVjBHnB X-Received: by 2002:adf:a184:: with SMTP id u4mr14267971wru.69.1633352068876; Mon, 04 Oct 2021 05:54:28 -0700 (PDT) X-Received: by 2002:adf:a184:: with SMTP id u4mr14267947wru.69.1633352068680; Mon, 04 Oct 2021 05:54:28 -0700 (PDT) Received: from redhat.com ([2.55.134.94]) by smtp.gmail.com with ESMTPSA id p3sm7707340wmp.43.2021.10.04.05.54.26 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 04 Oct 2021 05:54:28 -0700 (PDT) Date: Mon, 4 Oct 2021 08:54:24 -0400 From: "Michael S. Tsirkin" To: Cornelia Huck Cc: Halil Pasic , Jason Wang , Xie Yongji , virtualization@lists.linux-foundation.org, linux-kernel@vger.kernel.org, markver@us.ibm.com, Christian Borntraeger , linux-s390@vger.kernel.org, virtio-dev@lists.oasis-open.org Subject: Re: [RFC PATCH 1/1] virtio: write back features before verify Message-ID: <20211004083455-mutt-send-email-mst@kernel.org> References: <20210930012049.3780865-1-pasic@linux.ibm.com> <20210930070444-mutt-send-email-mst@kernel.org> <87fstm47no.fsf@redhat.com> <20211002141351-mutt-send-email-mst@kernel.org> <20211003070030.658fc94e.pasic@linux.ibm.com> <20211003021027-mutt-send-email-mst@kernel.org> <20211003032253-mutt-send-email-mst@kernel.org> <87ee912e45.fsf@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <87ee912e45.fsf@redhat.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Oct 04, 2021 at 02:01:14PM +0200, Cornelia Huck wrote: > On Sun, Oct 03 2021, "Michael S. Tsirkin" wrote: > > > Sent too early. So here's what I propose. Could you pls take a look > > and if you like this, post a ccw section? > > We have not talked about the mmio transport so far, but I guess it > should be fine as legacy and standard are separated. > > > There's also an attempt to prevent fallback from modern to legacy > > here since if driver does fallback then failing FEATURES_OK can't work > > properly. > > That's a separate issue, will be a separate patch when I post > > this for consideration by the TC. > > > > > > diff --git a/content.tex b/content.tex > > index 1398390..06271f4 100644 > > --- a/content.tex > > +++ b/content.tex > > @@ -140,10 +140,13 @@ \subsection{Legacy Interface: A Note on Feature > > Bits}\label{sec:Basic Facilities of a Virtio Device / Feature > > Bits / Legacy Interface: A Note on Feature Bits} > > > > -Transitional Drivers MUST detect Legacy Devices by detecting that > > -the feature bit VIRTIO_F_VERSION_1 is not offered. > > -Transitional devices MUST detect Legacy drivers by detecting that > > -VIRTIO_F_VERSION_1 has not been acknowledged by the driver. > > +Transitional drivers MAY support operating legacy devices. > > +Transitional devices MAY support operation by legacy drivers. > > Why 'MAY'? Isn't the whole point of transitional that it can deal with > both? I guess. OK we can make it MUST. > > + > > +Transitional drivers MUST detect legacy devices in a way that is > > +transport specific. > > +Transitional devices MUST detect legacy drivers in a way that > > +is transport specific. > > > > In this case device is used through the legacy interface. > > > > @@ -160,6 +163,33 @@ \subsection{Legacy Interface: A Note on Feature > > Specification text within these sections generally does not apply > > to non-transitional devices. > > > > +\begin{note} > > +The device offers different features when used through > > +the legacy interface and when operated in accordance with this > > +specification. > > +\end{note} > > + > > +Transitional drivers MUST use Devices only through the legacy interface > > s/Devices only through the legacy interface/devices through the legacy > interface only/ > > ? Both versions are actually confused, since how do you find out that device does not offer VIRTIO_F_VERSION_1? I think what this should really say is Transitional drivers MUST NOT accept VIRTIO_F_VERSION_1 through the legacy interface. Does linux actually satisfy this? Will it accept VIRTIO_F_VERSION_1 through the legacy interface if offered? > > +if the feature bit VIRTIO_F_VERSION_1 is not offered. > > +Transitional devices MUST NOT offer VIRTIO_F_VERSION_1 when used through > > +the legacy interface. > > + > > +When the driver uses a device through the legacy interface, then it > > +MUST only accept the features the device offered through the > > +legacy interface. > > + > > +When used through the legacy interface, the device SHOULD > > +validate that the driver only accepted the features it > > +offered through the legacy interface. > > + > > +When operating a transitional device, a transitional driver > > +SHOULD NOT use the device through the legacy interface if > > +operation through the modern interface has failed. > > +In particular, a transitional driver > > +SHOULD NOT fall back to using the device through the > > +legacy interface if feature negotiation failed > > +(since that would defeat the purpose of the FEATURES_OK bit). > > + > > \section{Notifications}\label{sec:Basic Facilities of a Virtio Device > > / Notifications} > > > > @@ -1003,6 +1033,12 @@ \subsubsection{Common configuration structure layout}\label{sec:Virtio Transport > > > > The driver MUST NOT write a 0 to \field{queue_enable}. > > > > +\paragraph}{Legacy Interface: Common configuration structure layout}\label{sec:Virtio Transport Options / Virtio Over PCI Bus / PCI Device Layout / Legacy Interface: Common configuration structure layout} > > +Transitional drivers SHOULD detect legacy devices by detecting > > +that the device has the Transitional PCI Device ID in > > +the range 0x1000 to 0x103f and lacks a VIRTIO_PCI_CAP_COMMON_CFG > > +capability specifying the location of a common configuration structure. > > + > > \subsubsection{Notification structure layout}\label{sec:Virtio Transport Options / Virtio Over PCI Bus / PCI Device Layout / Notification capability} > > > > The notification location is found using the VIRTIO_PCI_CAP_NOTIFY_CFG > > @@ -1288,6 +1324,10 @@ \subsubsection{Legacy Interfaces: A Note on PCI Device Layout}\label{sec:Virtio > > Transitional devices MUST present part of configuration > > registers in a legacy configuration structure in BAR0 in the first I/O > > region of the PCI device, as documented below. > > + > > +Transitional devices SHOULD detect legacy drivers by detecting > > +access to the legacy configuration structure. > > + > > When using the legacy interface, transitional drivers > > MUST use the legacy configuration structure in BAR0 in the first > > I/O region of the PCI device, as documented below. > > Generally, looks good to me. Do we want to also add explanation that features can be changed until FEATURES_OK?