> From: Michael S. Tsirkin <m...@redhat.com>
> Sent: Wednesday, June 21, 2023 4:31 PM
> To: Parav Pandit <pa...@nvidia.com>
> Cc: virtio-comm...@lists.oasis-open.org; coh...@redhat.com;
> david.edmond...@oracle.com; virtio-dev@lists.oasis-open.org;
> sbu...@marvell.com; jasow...@redhat.com; Yishai Hadas
> <yish...@nvidia.com>; Maor Gottlieb <ma...@nvidia.com>; Shahaf Shuler
> <shah...@nvidia.com>
> Subject: Re: [virtio-comment] RE: [PATCH v6 4/4] transport-pci: Introduce 
> group
> legacy group member config region access
> 
> On Wed, Jun 21, 2023 at 08:22:58PM +0000, Parav Pandit wrote:
> >
> >
> > > From: Michael S. Tsirkin <m...@redhat.com>
> > > Sent: Wednesday, June 21, 2023 4:06 PM
> >
> > [..]
> > > > > To put it in our terms, something like this:
> > > > >       when a legacy driver accesses a member device of
> > > > >       a group using the
> > > > >       legacy interface, a modern driver can intercept
> > > > >       the access and forward it to the owner device.
> > > > >
> > > > I will not mention "modern driver" as it has zero reference in
> > > > spec and don't
> > > want to bring Linux terms here.
> > > > "the driver can intercept" is enough.
> 
> Maybe a (non legacy) driver can intercept? Would that be acceptable?
> Just to clarify the confusion above.
> 
Non legacy driver wording is fine.

> > >   when a legacy member device driver accesses a member device of
> > >   a group using the
> > >   legacy interface, an owner device driver can intercept
> > >   the access and forward it to the owner device.
> > >
> > Above is not correct.
> >
> > We have 3 drivers in picture.
> > 1. guest driver
> 
> this is legacy driver, so easy
> 
> > 2. hypervisor level member device driver
> 
> this is just for notifications, optionally, yes?
> 
For notifications (optionally) and for configuration region access.

> 
> > 3. group owner device driver
> >
> > Trying to write without introducing guest and hypervisor term,
> >
> > A group owner device driver provides the service to access member device's
> configuration region.
> > A member device driver avail this service when it wants to access the member
> device's configuration region.
> 
> 
> I agree, it's getting complicated.
>
> >
> > > > I will rewrite it as,
> > > >
> > > > The group owner device should not expose PCI BAR0 in the PCI
> > > > SR-IOV extended capability for the group member PCI VF devices
> > > > when it prefers to
> > > support legacy interface for legacy configuration access using this group
> owner.
> > >
> > >
> > > This seems to ignore all my comments.
> > >
> > I replied after that, probably missed in exchanges.
> >
> > How about:
> > The group owner device MUST hardwire PCI BAR0 in the PCI SR-IOV extended
> capability for the group member PCI VF devices when it supports legacy
> configuration access commands.
> >
> 
> better but it's not a PCI BAR0. let's add link to sriov spec, and name it VF 
> BAR0
> same as in that spec.
>
Yes, VF BAR0, will correct it.

---------------------------------------------------------------------
To unsubscribe, e-mail: virtio-dev-unsubscr...@lists.oasis-open.org
For additional commands, e-mail: virtio-dev-h...@lists.oasis-open.org

Reply via email to