Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp4105479pxu; Wed, 9 Dec 2020 08:29:11 -0800 (PST) X-Google-Smtp-Source: ABdhPJxdJNqHEfrfKbGP5vABuS2hWt+5Y9CHEYJM5lyOMcqEPfYKHlHbK1F202yNgAprO1V5I4uw X-Received: by 2002:a17:906:5841:: with SMTP id h1mr2713199ejs.77.1607531351297; Wed, 09 Dec 2020 08:29:11 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1607531351; cv=none; d=google.com; s=arc-20160816; b=p/EjdFwlDlG0M2++EIoh47ws6Q4I3AYwAE6c7bQOUD33UP4WD1jfm8pyN578d08al5 AW4Xp9vYP44KZGD1caRkRf4C2+NqXamSExiCN1BudmtFaGp0pHkSNWMcxKhyd5/OOYQ3 EEXcV4pxgpdByqR6U31BzxtnZjSge1/qzrzACOIYSwl8o10AeHqbot9+3qtdiLe5Ec35 3VYwDF0WZAIe+ph54EyTKW7Tx363iptbhmgdMaD8Nh+Gvw7XWL73oQWC+1XTCxtzjx7F c52Zn6MYHsn5yTjgHvId1qhqpJcWKKssrmcSg+JM9FS4B7/quvBEa8z4ET29aa+10aMR epow== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:ironport-sdr :ironport-sdr; bh=VLLGYKD0h07Tm/EGj4vFzoWEdLuW6DzVaILTCVBA65A=; b=iImsN/gmiOpwygl+UDQz7ToHrf5Mg7PjD+igaVAuCVXsBx7o5oy5cQgz5ymVOIgEvU 4gPzxPkNQ0kNyxnGL7iiVP8jIq+/OZY0QndNxHeKKdzRElK5A7sJWK/sf3BWqTLWf1fv lrRbxp2YgEO/1BTZYt/kYz0LFnou6/syZ0vna+fNbQ+wd+pnnPLuXbMYf4k0Vb0R8a1+ 6YoqHkChXM7Z59vyYElOS1u3/s5zy+CIJ2ONgvLO9g3HznfeSr6HpQJJWF4FzrrA1U3o A4VpIqTgibpD0HF8bDY71EYfwiHPxNj9X6bRqWwVD3mEWqb7I4jYaN1KMU3D8ug58bAK /33w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id q6si958583ejb.731.2020.12.09.08.28.47; Wed, 09 Dec 2020 08:29:11 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730258AbgLIQY3 (ORCPT + 99 others); Wed, 9 Dec 2020 11:24:29 -0500 Received: from mga17.intel.com ([192.55.52.151]:62275 "EHLO mga17.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727894AbgLIQY2 (ORCPT ); Wed, 9 Dec 2020 11:24:28 -0500 IronPort-SDR: I26gFkTZnKMQSAJuhEJj5p3VhUHIMRrUt0WrU0C17B6NVQOppr3rLNhFYfDkxDOZY6qXbcnKDY g99kaM5QIpJw== X-IronPort-AV: E=McAfee;i="6000,8403,9829"; a="153909871" X-IronPort-AV: E=Sophos;i="5.78,405,1599548400"; d="scan'208";a="153909871" Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by fmsmga107.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 09 Dec 2020 08:23:48 -0800 IronPort-SDR: XpkQFTTpJ2gqbFoeHRddvFv44Ge4qjGifLVBUXk51eW77JPL4KIYxhK56dyGEtJtWlMcNeADat W6nMAipa6Q9w== X-IronPort-AV: E=Sophos;i="5.78,405,1599548400"; d="scan'208";a="376418592" Received: from vishnuba-mobl.amr.corp.intel.com (HELO intel.com) ([10.252.137.226]) by fmsmga003-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 09 Dec 2020 08:23:46 -0800 Date: Wed, 9 Dec 2020 08:23:45 -0800 From: Ben Widawsky To: Dan Williams Cc: linux-cxl@vger.kernel.org, Linux Kernel Mailing List , Linux PCI , Linux ACPI , Ira Weiny , Vishal Verma , "Kelley, Sean V" , Rafael Wysocki , Bjorn Helgaas , Jonathan Cameron , Jon Masters , Chris Browy , Randy Dunlap , Christoph Hellwig Subject: Re: [RFC PATCH 09/14] cxl/mem: Add basic IOCTL interface Message-ID: <20201209162345.2vdyn2itfg7jkjf4@intel.com> References: <20201209002418.1976362-1-ben.widawsky@intel.com> <20201209002418.1976362-10-ben.widawsky@intel.com> <20201209021254.ne42jy6ovn2rk3cf@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 20-12-08 19:33:13, Dan Williams wrote: > On Tue, Dec 8, 2020 at 6:13 PM Ben Widawsky wrote: > > > > On 20-12-08 17:37:50, Dan Williams wrote: > > > On Tue, Dec 8, 2020 at 4:24 PM Ben Widawsky wrote: > > > > > > > > Add a straightforward IOCTL that provides a mechanism for userspace to > > > > query the supported memory device commands. > > > > > > > > Memory device commands are specified in 8.2.9 of the CXL 2.0 > > > > specification. They are submitted through a mailbox mechanism specified > > > > in 8.2.8.4. > > > > > > > > Signed-off-by: Ben Widawsky > > > > > > > > --- > > > > > > > > I did attempt to use the same struct for querying commands as well as > > > > sending commands (upcoming patch). The number of unused fields between > > > > the two made for a bad fit IMO. > > > > > > > > Signed-off-by: Ben Widawsky > > > > --- > > > > Documentation/cxl/memory-devices.rst | 9 +++ > > > > drivers/cxl/mem.c | 89 +++++++++++++++++++++++ > > > > include/uapi/linux/cxl_mem.h | 102 +++++++++++++++++++++++++++ > > > > 3 files changed, 200 insertions(+) > > > > create mode 100644 include/uapi/linux/cxl_mem.h > > > > > > > > diff --git a/Documentation/cxl/memory-devices.rst b/Documentation/cxl/memory-devices.rst > > > > index 5f723c25382b..ec54674b3822 100644 > > > > --- a/Documentation/cxl/memory-devices.rst > > > > +++ b/Documentation/cxl/memory-devices.rst > > > > @@ -32,6 +32,15 @@ CXL Memory Device > > > > .. kernel-doc:: drivers/cxl/mem.c > > > > :internal: > > > > > > > > +CXL IOCTL Interface > > > > +------------------- > > > > + > > > > +.. kernel-doc:: include/uapi/linux/cxl_mem.h > > > > + :doc: UAPI > > > > + > > > > +.. kernel-doc:: include/uapi/linux/cxl_mem.h > > > > + :internal: > > > > + > > > > External Interfaces > > > > =================== > > > > > > > > diff --git a/drivers/cxl/mem.c b/drivers/cxl/mem.c > > > > index bb6ea58f6c7b..2c4aadcea0e4 100644 > > > > --- a/drivers/cxl/mem.c > > > > +++ b/drivers/cxl/mem.c > > > > @@ -7,6 +7,7 @@ > > > > #include > > > > #include > > > > #include > > > > +#include > > > > #include "acpi.h" > > > > #include "pci.h" > > > > #include "cxl.h" > > > > @@ -73,6 +74,49 @@ static DEFINE_IDR(cxl_mem_idr); > > > > /* protect cxl_mem_idr allocations */ > > > > static DEFINE_MUTEX(cxl_memdev_lock); > > > > > > > > +/* > > > > + * This table defines the supported mailboxes commands for the driver. The id is > > > > + * ordinal and thus gaps in this table aren't allowed. This table is made up of > > > > + * a UAPI structure. Non-negative values in the table will be validated against > > > > + * the user's input. For example, if size_in is 0, and the user passed in 1, it > > > > + * is an error. > > > > + */ > > > > +#define CXL_CMD(_id, _flags, sin, sout, _name, _enable, op) \ > > > > + { \ > > > > + { .id = CXL_MEM_COMMAND_ID_##_id, \ > > > > + .flags = CXL_MEM_COMMAND_FLAG_##_flags, \ > > > > + .size_in = sin, \ > > > > + .size_out = sout, \ > > > > + .name = _name }, \ > > > > + .enable = _enable, .opcode = op \ > > > > + } > > > > > > Seems the ordinality requirement could be dropped if the definition was: > > > > > > #define CXL_CMD(_id, _flags, sin, sout, _name, _enable, op) \ > > > [CXL_MEM_COMMAND_ID_##_id] = { > > > \ > > > { .id = CXL_MEM_COMMAND_ID_##_id, \ > > > ... > > > > > > Then command 0 and 42 could be defined out of order in the table. > > > Especially if we need to config-disable or deprecate commands, I think > > > it would be useful if this table was tolerant to being sparse. > > > > > > > How sparse are we talking? The current form does support sparseness, but > > obviously gets quite large if the ID numbering is similar to random > > distribution. > > "Sparse" may have been the wrong word to use. I was implying sparse > enough that if I add command N+1 I don't need to be careful where I > put it in mem_commands, but still be able to rely on lookups into > mem_commands being indexed by the command-id. > I'm not sure I understand the issue then. It's already demonstrated via the first command being reserved - ie. already sparse. CXL_CMD(INVALID, NONE, 0, 0, "Reserved", false, 0) As long as the command doesn't have @enable set, it's effectively ignored for all user interactions. If you look at the last patch in the series, WIP, there is an example for enabling one. > > I think if we do see this being more like random distribution, it can be > > supported, but I think it adds a decent amount of complexity for what I see as > > not much reward - unless you know of a fairly simple way to create this data > > structure with full sparse ID support? > > I'm expecting the command distribution to be mostly uniform, it's more > of the lookup property that I think would be useful especially for the > dynamic case of walking mem_commands to update it relative to what the > hardware supports or other metadata. Speaking of which I think @enable > should be turned into @flags of which 'enable' is one, in case we want > to define more flags in the future. > I like the idea of moving enable to flags. I still don't see a reason to change how it's defined today, can you give me an example where what is there won't work? > > > > > > + > > > > +/** > > > > + * struct cxl_mem_command - Driver representation of a memory device command > > > > + * @info: Command information as it exists for the UAPI > > > > + * @opcode: The actual bits used for the mailbox protocol > > > > + * @enable: Whether the command is enabled. The driver may support a large set > > > > + * of commands that may not be enabled. The primary reason a command > > > > + * would not be enabled is for commands that are specified as optional > > > > + * and the hardware doesn't support the command. > > > > + * > > > > + * The cxl_mem_command is the driver's internal representation of commands that > > > > + * are supported by the driver. Some of these commands may not be supported by > > > > + * the hardware (!@enable). The driver will use @info to validate the fields > > > > + * passed in by the user then submit the @opcode to the hardware. > > > > + * > > > > + * See struct cxl_command_info. > > > > + */ > > > > +struct cxl_mem_command { > > > > + const struct cxl_command_info info; > > > > + const u16 opcode; > > > > + bool enable; > > > > +}; > > > > + > > > > +static struct cxl_mem_command mem_commands[] = { > > > > + CXL_CMD(INVALID, NONE, 0, 0, "Reserved", false, 0), > > > > +}; > > > > + > > > > static int cxl_mem_wait_for_doorbell(struct cxl_mem *cxlm) > > > > { > > > > const int timeout = msecs_to_jiffies(2000); > > > > @@ -268,8 +312,53 @@ static int cxl_mem_open(struct inode *inode, struct file *file) > > > > return 0; > > > > } > > > > > > > > +static int cxl_mem_count_commands(void) > > > > +{ > > > > + int i, n = 0; > > > > + > > > > + for (i = 0; i < ARRAY_SIZE(mem_commands); i++) { > > > > + struct cxl_mem_command *c = &mem_commands[i]; > > > > + > > > > + if (c->enable) > > > > + n++; > > > > + } > > > > + > > > > + return n; > > > > +} > > > > + > > > > static long cxl_mem_ioctl(struct file *file, unsigned int cmd, unsigned long arg) > > > > { > > > > + if (cmd == CXL_MEM_QUERY_COMMANDS) { > > > > + struct cxl_mem_query_commands __user *q = (void __user *)arg; > > > > + u32 n_commands; > > > > + int i, j; > > > > + > > > > + if (get_user(n_commands, (u32 __user *)arg)) > > > > + return -EFAULT; > > > > + > > > > + if (n_commands == 0) > > > > + return put_user(cxl_mem_count_commands(), > > > > + (u32 __user *)arg); > > > > + > > > > + for (i = 0, j = 0; > > > > + i < ARRAY_SIZE(mem_commands) && j < n_commands; i++) { > > > > + struct cxl_mem_command *c = &mem_commands[i]; > > > > + const struct cxl_command_info *info = &c->info; > > > > + > > > > + if (!c->enable) > > > > + continue; > > > > + > > > > + if (copy_to_user(&q->commands[j], info, sizeof(*info))) > > > > + return -EFAULT; > > > > + > > > > + if (copy_to_user(&q->commands[j].name, info->name, > > > > + strlen(info->name))) > > > > + return -EFAULT; > > > > > > Not sure why this is needed, see comment below about @name in > > > cxl_mem_query_commands. > > > > > > > + > > > > + j++; > > > > + } > > > > + } > > > > + > > > > return -ENOTTY; > > > > } > > > > > > > > diff --git a/include/uapi/linux/cxl_mem.h b/include/uapi/linux/cxl_mem.h > > > > new file mode 100644 > > > > index 000000000000..1d1e143f98ec > > > > --- /dev/null > > > > +++ b/include/uapi/linux/cxl_mem.h > > > > @@ -0,0 +1,102 @@ > > > > +/* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */ > > > > +/* > > > > + * CXL IOCTLs for Memory Devices > > > > + */ > > > > + > > > > +#ifndef _UAPI_CXL_MEM_H_ > > > > +#define _UAPI_CXL_MEM_H_ > > > > + > > > > +#if defined(__cplusplus) > > > > +extern "C" { > > > > +#endif > > > > + > > > > +/** > > > > + * DOC: UAPI > > > > + * > > > > + * CXL memory devices expose UAPI to have a standard user interface. > > > > + * Userspace can refer to these structure definitions and UAPI formats > > > > + * to communicate to driver > > > > + */ > > > > + > > > > +#define CXL_MEM_QUERY_COMMANDS _IOR('C', 1, struct cxl_mem_query_commands) > > > > + > > > > +#define CXL_MEM_COMMAND_NAME_LENGTH 32 > > > > + > > > > +/** > > > > + * struct cxl_command_info - Command information returned from a query. > > > > + * @id: ID number for the command. > > > > + * @flags: Flags that specify command behavior. > > > > + * > > > > + * - CXL_MEM_COMMAND_FLAG_TAINT: Using this command will taint the kernel. > > > > + * @size_in: Expected input size, or -1 if variable length. > > > > + * @size_out: Expected output size, or -1 if variable length. > > > > + * @name: Name describing the command. > > > > + * > > > > + * Represents a single command that is supported by both the driver and the > > > > + * hardware. The is returned as part of an array from the query ioctl. The > > > > + * following would be a command named "foobar" that takes a variable length > > > > + * input and returns 0 bytes of output. > > > > + * > > > > + * - @id = 10 > > > > + * - @name = foobar > > > > + * - @flags = 0 > > > > + * - @size_in = -1 > > > > + * - @size_out = 0 > > > > + * > > > > + * See struct cxl_mem_query_commands. > > > > + */ > > > > +struct cxl_command_info { > > > > + __u32 id; > > > > +#define CXL_MEM_COMMAND_ID_INVALID 0 > > > > + > > > > + __u32 flags; > > > > +#define CXL_MEM_COMMAND_FLAG_NONE 0 > > > > +#define CXL_MEM_COMMAND_FLAG_TAINT BIT(0) > > > > + > > > > + __s32 size_in; > > > > + __s32 size_out; > > > > + > > > > + char name[32]; > > > > > > Why does the name for a command need to be shuffled back and forth > > > over the ioctl interface. Can't this be handled by a static lookup > > > table defined in the header? > > > > > > > I was thinking of cases where the userspace application doesn't match the > > current kernel's UAPI and giving the driver flexibility to return whatever. > > How / why would the application by looking at @name for UAPI compatibility? > > > OTTOMH, I also can't think of a way to do this if you want to do define the > > table sparsely though. Do you have ideas for that? > > I don't think the name lookup would be sparse. i.e. it would be ok for > mem_commands to not have an entry for everything in the name lookup > table. As for defining the table it could use C preprocessor trick > popularized by Steven Rostedt: > > #define CMDS \ > C(CMD1, "command one"), \ > C(CMD2, "command two") \ > #undef C > #define C(a, b) a > enum commands_enum { CMDS }; > #undef C > #define C(a, b) { b } > static struct { > const char *name; > } commands[] = { CMDS }; > #undef C > > ...then there's no way for the command ids to get out of sync with the names. I will move it to the header and drop name[32] from UAPI. My personal preference is to have the driver fill in the field, but I have no objective reason for that.