Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp136735pxk; Thu, 24 Sep 2020 01:25:05 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwXSEcNYUrA8PIJDA2lOsgQCekPjkodR4evdp+YrRX1S39sLFCixI8ibzMcr0Nc1mX+13Xl X-Received: by 2002:a17:906:4b18:: with SMTP id y24mr3348747eju.471.1600935904796; Thu, 24 Sep 2020 01:25:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1600935904; cv=none; d=google.com; s=arc-20160816; b=zoFp9eKyzqHL1nmczUfp/SZuo/r8rq47O0c+embKOJv7p3nTlYEoJqMsDuOCBnDh3y /oPkkv5FxDprCMQDzoyZwnA3G8RkDPuzvuz8JtNNg/F+eSxGFH3/MfXioNbs/M8Hz1Ol 7WTtNFaCDvJkM3DwY3Zw4poVypa7hXotkqaiBmPI91Cca38075MYRtTUf3skMf5xyBJM YHw/D6Y+jPPx7v6TXch0/7Yxwe2FMNBElS8XBqXtakQon4nszrUJTCZDilN8FNGrghZ9 zEA3lIbANomvXqM5mw33xOycq++Szao+IEVL+Ec/Il2yyXJEIjAUc63ww+pibqfoBWb2 DM6A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :to:subject; bh=6oPO8jkey3Y3nSsD/DG3FdlaCmscXLgjsz8uKZ4LMfY=; b=ky2bb4QKbEG0c+kGjGeJQiB5iuFGivDan0hKLQUdaLpR01yBYSfULxg90cAgHPqkgq PlFWXXor7zQLrJRJCxaZUjUOzaNztSaQKMCUbiZ6rxMXqj3dW4aVYXjvAJZgOlzs8E3u 3iCvNTzIzsiZQPqkQx9wDTxgOut5svugoh0CdzzL/GeBGHRqr4NjhhumMUgc5wm39rsr 79+ZxJXJ4zMMMNvAjaoKxR6CeVYjGoEyCup3jSM2wgqWXI4f7C1sXjvKeCVHJaNEx8+G 9GBfgE496qeJy2A4zNN8Kxm+U+0RbAIEr6rPeWy4rVpslbLffFSuUuBUfpG2aNNK9Ono xp1w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n4si1499465ejs.15.2020.09.24.01.24.41; Thu, 24 Sep 2020 01:25:04 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727088AbgIXIXV (ORCPT + 99 others); Thu, 24 Sep 2020 04:23:21 -0400 Received: from szxga07-in.huawei.com ([45.249.212.35]:54512 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726837AbgIXIXV (ORCPT ); Thu, 24 Sep 2020 04:23:21 -0400 Received: from DGGEMS404-HUB.china.huawei.com (unknown [172.30.72.59]) by Forcepoint Email with ESMTP id BED77B6AD300A22DF907; Thu, 24 Sep 2020 16:23:17 +0800 (CST) Received: from [10.174.185.226] (10.174.185.226) by DGGEMS404-HUB.china.huawei.com (10.3.19.204) with Microsoft SMTP Server id 14.3.487.0; Thu, 24 Sep 2020 16:23:10 +0800 Subject: Re: [PATCH v10 04/11] vfio/pci: Add VFIO_REGION_TYPE_NESTED region type To: Eric Auger , , , , , , , , , , References: <20200320161911.27494-1-eric.auger@redhat.com> <20200320161911.27494-5-eric.auger@redhat.com> From: Zenghui Yu Message-ID: Date: Thu, 24 Sep 2020 16:23:10 +0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:68.0) Gecko/20100101 Thunderbird/68.9.0 MIME-Version: 1.0 In-Reply-To: <20200320161911.27494-5-eric.auger@redhat.com> Content-Type: text/plain; charset="utf-8"; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Originating-IP: [10.174.185.226] X-CFilter-Loop: Reflected Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Eric, On 2020/3/21 0:19, Eric Auger wrote: > Add a new specific DMA_FAULT region aiming to exposed nested mode > translation faults. > > The region has a ring buffer that contains the actual fault > records plus a header allowing to handle it (tail/head indices, > max capacity, entry size). At the moment the region is dimensionned > for 512 fault records. > > Signed-off-by: Eric Auger [...] > diff --git a/drivers/vfio/pci/vfio_pci.c b/drivers/vfio/pci/vfio_pci.c > index 379a02c36e37..586b89debed5 100644 > --- a/drivers/vfio/pci/vfio_pci.c > +++ b/drivers/vfio/pci/vfio_pci.c > @@ -260,6 +260,69 @@ int vfio_pci_set_power_state(struct vfio_pci_device *vdev, pci_power_t state) > return ret; > } > > +static void vfio_pci_dma_fault_release(struct vfio_pci_device *vdev, > + struct vfio_pci_region *region) > +{ > +} > + > +static int vfio_pci_dma_fault_add_capability(struct vfio_pci_device *vdev, > + struct vfio_pci_region *region, > + struct vfio_info_cap *caps) > +{ > + struct vfio_region_info_cap_fault cap = { > + .header.id = VFIO_REGION_INFO_CAP_DMA_FAULT, > + .header.version = 1, > + .version = 1, > + }; > + return vfio_info_add_capability(caps, &cap.header, sizeof(cap)); > +} > + > +static const struct vfio_pci_regops vfio_pci_dma_fault_regops = { > + .rw = vfio_pci_dma_fault_rw, > + .release = vfio_pci_dma_fault_release, > + .add_capability = vfio_pci_dma_fault_add_capability, > +}; > + > +#define DMA_FAULT_RING_LENGTH 512 > + > +static int vfio_pci_init_dma_fault_region(struct vfio_pci_device *vdev) > +{ > + struct vfio_region_dma_fault *header; > + size_t size; > + int ret; > + > + mutex_init(&vdev->fault_queue_lock); > + > + /* > + * We provision 1 page for the header and space for > + * DMA_FAULT_RING_LENGTH fault records in the ring buffer. > + */ > + size = ALIGN(sizeof(struct iommu_fault) * > + DMA_FAULT_RING_LENGTH, PAGE_SIZE) + PAGE_SIZE; > + > + vdev->fault_pages = kzalloc(size, GFP_KERNEL); > + if (!vdev->fault_pages) > + return -ENOMEM; > + > + ret = vfio_pci_register_dev_region(vdev, > + VFIO_REGION_TYPE_NESTED, > + VFIO_REGION_SUBTYPE_NESTED_DMA_FAULT, > + &vfio_pci_dma_fault_regops, size, > + VFIO_REGION_INFO_FLAG_READ | VFIO_REGION_INFO_FLAG_WRITE, > + vdev->fault_pages); > + if (ret) > + goto out; > + > + header = (struct vfio_region_dma_fault *)vdev->fault_pages; > + header->entry_size = sizeof(struct iommu_fault); > + header->nb_entries = DMA_FAULT_RING_LENGTH; > + header->offset = sizeof(struct vfio_region_dma_fault); > + return 0; > +out: > + kfree(vdev->fault_pages); > + return ret; > +} > + > static int vfio_pci_enable(struct vfio_pci_device *vdev) > { > struct pci_dev *pdev = vdev->pdev; > @@ -358,6 +421,10 @@ static int vfio_pci_enable(struct vfio_pci_device *vdev) > } > } > > + ret = vfio_pci_init_dma_fault_region(vdev); > + if (ret) > + goto disable_exit; > + > vfio_pci_probe_mmaps(vdev); > > return 0; > @@ -1383,6 +1450,7 @@ static void vfio_pci_remove(struct pci_dev *pdev) > > vfio_iommu_group_put(pdev->dev.iommu_group, &pdev->dev); > kfree(vdev->region); > + kfree(vdev->fault_pages); > mutex_destroy(&vdev->ioeventfds_lock); > > if (!disable_idle_d3) > diff --git a/drivers/vfio/pci/vfio_pci_private.h b/drivers/vfio/pci/vfio_pci_private.h > index 8a2c7607d513..a392f50e3a99 100644 > --- a/drivers/vfio/pci/vfio_pci_private.h > +++ b/drivers/vfio/pci/vfio_pci_private.h > @@ -119,6 +119,8 @@ struct vfio_pci_device { > int ioeventfds_nr; > struct eventfd_ctx *err_trigger; > struct eventfd_ctx *req_trigger; > + u8 *fault_pages; What's the reason to use 'u8'? It doesn't match the type of header, nor the type of ring buffer. > + struct mutex fault_queue_lock; > struct list_head dummy_resources_list; > struct mutex ioeventfds_lock; > struct list_head ioeventfds_list; > @@ -150,6 +152,14 @@ extern ssize_t vfio_pci_vga_rw(struct vfio_pci_device *vdev, char __user *buf, > extern long vfio_pci_ioeventfd(struct vfio_pci_device *vdev, loff_t offset, > uint64_t data, int count, int fd); > > +struct vfio_pci_fault_abi { > + u32 entry_size; > +}; This is not used by this patch (and the whole series). > + > +extern size_t vfio_pci_dma_fault_rw(struct vfio_pci_device *vdev, > + char __user *buf, size_t count, > + loff_t *ppos, bool iswrite); > + > extern int vfio_pci_init_perm_bits(void); > extern void vfio_pci_uninit_perm_bits(void); > > diff --git a/drivers/vfio/pci/vfio_pci_rdwr.c b/drivers/vfio/pci/vfio_pci_rdwr.c > index a87992892a9f..4004ab8cad0e 100644 > --- a/drivers/vfio/pci/vfio_pci_rdwr.c > +++ b/drivers/vfio/pci/vfio_pci_rdwr.c > @@ -274,6 +274,51 @@ ssize_t vfio_pci_vga_rw(struct vfio_pci_device *vdev, char __user *buf, > return done; > } > > +size_t vfio_pci_dma_fault_rw(struct vfio_pci_device *vdev, char __user *buf, > + size_t count, loff_t *ppos, bool iswrite) > +{ > + unsigned int i = VFIO_PCI_OFFSET_TO_INDEX(*ppos) - VFIO_PCI_NUM_REGIONS; > + loff_t pos = *ppos & VFIO_PCI_OFFSET_MASK; > + void *base = vdev->region[i].data; > + int ret = -EFAULT; > + > + if (pos >= vdev->region[i].size) > + return -EINVAL; > + > + count = min(count, (size_t)(vdev->region[i].size - pos)); > + > + mutex_lock(&vdev->fault_queue_lock); > + > + if (iswrite) { > + struct vfio_region_dma_fault *header = > + (struct vfio_region_dma_fault *)base; > + u32 new_tail; > + > + if (pos != 0 || count != 4) { > + ret = -EINVAL; > + goto unlock; > + } > + > + if (copy_from_user((void *)&new_tail, buf, count)) > + goto unlock; > + > + if (new_tail > header->nb_entries) { Maybe new_tail >= header->nb_entries ? > + ret = -EINVAL; > + goto unlock; > + } > + header->tail = new_tail; > + } else { > + if (copy_to_user(buf, base + pos, count)) > + goto unlock; > + } > + *ppos += count; > + ret = count; > +unlock: > + mutex_unlock(&vdev->fault_queue_lock); > + return ret; > +} > + > + > static int vfio_pci_ioeventfd_handler(void *opaque, void *unused) > { > struct vfio_pci_ioeventfd *ioeventfd = opaque; Thanks, Zenghui