Received: by 2002:ac0:a594:0:0:0:0:0 with SMTP id m20-v6csp1195568imm; Wed, 23 May 2018 11:51:33 -0700 (PDT) X-Google-Smtp-Source: AB8JxZogCoAq4cxvA4H4MTVEJmzQ5w5/Uvk3cFTX+L9C+twqgY+AQ8ud7XYZsNtOuCJBA8SJ4l+R X-Received: by 2002:a62:991:: with SMTP id 17-v6mr4025896pfj.34.1527101493423; Wed, 23 May 2018 11:51:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527101493; cv=none; d=google.com; s=arc-20160816; b=X5QE3SqgvOJNZAC7o/W422Om0zNEYspThOW7UrLH4TPP3w/77Av6m8q3iOsdoGV4Vn eLW3CxrqErEKWQqdT+bup414oEcKlo46gSW0u2dYkdiYDsFc4zULTTAXdGJgGiS9uUwQ Whco2Qc8IN6w9sUqOyDC6w6po50YC/hcw+6SKqDVJuFltZGryfHFScnXnVPWVuSk1SuT VuN1T9rUL1iCNq9t7kJg8jn3uUfyfrWcF9vSDxaHSX8UW/1xZNTJpGdaENPZbX3DKsRX Dlo9MnsaQE3eOrLRN57A+gq8sYfGSFEvyyqcGDyogTsvyMOzAUWiRNeJCy8+FbOMcFm+ q2qQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :arc-authentication-results; bh=dgo5hpL0QITzfArZzmlM5LnEi7zOl3Gve7axfDOF4ZA=; b=XY625kQVIInbifcslMNE6x9PhzQII1iw7j/JTwaR61ahiRxUclcehVvxPSzdiOstOC sddaRDIEmr/Iljxe4LGaUq2k0yUF6p1z9Wdg04GyYyQyuJdpFM8aPvG5v5hV1Wa/03tp mgr+hN6koiAHNWL7l8G+5vyI+BM7YlGUYgTk0vNaJdZDmYX3IvBfsD+dL3LnuTVbfezb pKXGggdz4BTPNQc31c3mgOPGV3gkm+Cdoh9wg8iTIXwwbyL623E+seTrRWK8VC+XhDu/ nU9wEqjTuvMuqVNaT+tpXbqAwMMefZeATc6+UquNUqb8+voXgzGN36fs9aNH0E0mxmtF jlSg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z21-v6si18504507pfn.31.2018.05.23.11.51.18; Wed, 23 May 2018 11:51:33 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S934186AbeEWSuJ (ORCPT + 99 others); Wed, 23 May 2018 14:50:09 -0400 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:44446 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S933928AbeEWSuF (ORCPT ); Wed, 23 May 2018 14:50:05 -0400 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.rdu2.redhat.com [10.11.54.3]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id B633F401EF08; Wed, 23 May 2018 18:50:04 +0000 (UTC) Received: from redhat.com (ovpn-123-250.rdu2.redhat.com [10.10.123.250]) by smtp.corp.redhat.com (Postfix) with SMTP id F14E210C5653; Wed, 23 May 2018 18:50:02 +0000 (UTC) Date: Wed, 23 May 2018 21:50:02 +0300 From: "Michael S. Tsirkin" To: Anshuman Khandual Cc: virtualization@lists.linux-foundation.org, linux-kernel@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, aik@ozlabs.ru, robh@kernel.org, joe@perches.com, elfring@users.sourceforge.net, david@gibson.dropbear.id.au, jasowang@redhat.com, benh@kernel.crashing.org, mpe@ellerman.id.au, hch@infradead.org Subject: Re: [RFC V2] virtio: Add platform specific DMA API translation for virito devices Message-ID: <20180523213703-mutt-send-email-mst@kernel.org> References: <20180522063317.20956-1-khandual@linux.vnet.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180522063317.20956-1-khandual@linux.vnet.ibm.com> X-Scanned-By: MIMEDefang 2.78 on 10.11.54.3 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.5]); Wed, 23 May 2018 18:50:04 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.5]); Wed, 23 May 2018 18:50:04 +0000 (UTC) for IP:'10.11.54.3' DOMAIN:'int-mx03.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'mst@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org subj: s/virito/virtio/ On Tue, May 22, 2018 at 12:03:17PM +0530, Anshuman Khandual wrote: > This adds a hook which a platform can define in order to allow it to > force the use of the DMA API for all virtio devices even if they don't > have the VIRTIO_F_IOMMU_PLATFORM flag set. We want to use this to do > bounce-buffering of data on the new secure pSeries platform, currently > under development, where a KVM host cannot access all of the memory > space of a secure KVM guest. The host can only access the pages which > the guest has explicitly requested to be shared with the host, thus > the virtio implementation in the guest has to copy data to and from > shared pages. > > With this hook, the platform code in the secure guest can force the > use of swiotlb for virtio buffers, with a back-end for swiotlb which > will use a pool of pre-allocated shared pages. Thus all data being > sent or received by virtio devices will be copied through pages which > the host has access to. > > Signed-off-by: Anshuman Khandual > --- > Changes in V2: > > The arch callback has been enabled through an weak symbol defintion > so that it is enabled only for those architectures subscribing to > this new framework. Clarified the patch description. The primary > objective for this RFC has been to get an in principle agreement > on this approach. > > Original V1: > > Original RFC and discussions https://patchwork.kernel.org/patch/10324405/ I re-read that discussion and I'm still unclear on the original question, since I got several apparently conflicting answers. I asked: Why isn't setting VIRTIO_F_IOMMU_PLATFORM on the hypervisor side sufficient? > arch/powerpc/include/asm/dma-mapping.h | 6 ++++++ > arch/powerpc/platforms/pseries/iommu.c | 11 +++++++++++ > drivers/virtio/virtio_ring.c | 10 ++++++++++ > 3 files changed, 27 insertions(+) > > diff --git a/arch/powerpc/include/asm/dma-mapping.h b/arch/powerpc/include/asm/dma-mapping.h > index 8fa3945..056e578 100644 > --- a/arch/powerpc/include/asm/dma-mapping.h > +++ b/arch/powerpc/include/asm/dma-mapping.h > @@ -115,4 +115,10 @@ extern u64 __dma_get_required_mask(struct device *dev); > #define ARCH_HAS_DMA_MMAP_COHERENT > > #endif /* __KERNEL__ */ > + > +#define platform_forces_virtio_dma platform_forces_virtio_dma > + > +struct virtio_device; > + > +extern bool platform_forces_virtio_dma(struct virtio_device *vdev); > #endif /* _ASM_DMA_MAPPING_H */ > diff --git a/arch/powerpc/platforms/pseries/iommu.c b/arch/powerpc/platforms/pseries/iommu.c > index 06f0296..a2ec15a 100644 > --- a/arch/powerpc/platforms/pseries/iommu.c > +++ b/arch/powerpc/platforms/pseries/iommu.c > @@ -38,6 +38,7 @@ > #include > #include > #include > +#include > #include > #include > #include > @@ -1396,3 +1397,13 @@ static int __init disable_multitce(char *str) > __setup("multitce=", disable_multitce); > > machine_subsys_initcall_sync(pseries, tce_iommu_bus_notifier_init); > + > +bool platform_forces_virtio_dma(struct virtio_device *vdev) > +{ > + /* > + * On protected guest platforms, force virtio core to use DMA > + * MAP API for all virtio devices. But there can also be some > + * exceptions for individual devices like virtio balloon. > + */ > + return (of_find_compatible_node(NULL, NULL, "ibm,ultravisor") != NULL); > +} Isn't this kind of slow? vring_use_dma_api is on data path and supposed to be very fast. > diff --git a/drivers/virtio/virtio_ring.c b/drivers/virtio/virtio_ring.c > index 21d464a..47ea6c3 100644 > --- a/drivers/virtio/virtio_ring.c > +++ b/drivers/virtio/virtio_ring.c > @@ -141,8 +141,18 @@ struct vring_virtqueue { > * unconditionally on data path. > */ > > +#ifndef platform_forces_virtio_dma > +static inline bool platform_forces_virtio_dma(struct virtio_device *vdev) > +{ > + return false; > +} > +#endif > + > static bool vring_use_dma_api(struct virtio_device *vdev) > { > + if (platform_forces_virtio_dma(vdev)) > + return true; > + > if (!virtio_has_iommu_quirk(vdev)) > return true; > > -- > 2.9.3