Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp173835pxu; Thu, 7 Jan 2021 01:35:05 -0800 (PST) X-Google-Smtp-Source: ABdhPJyDeyhHM8LRF2hs2EHj8p95oDHq3UuteFtZoSNcZQjCQ1RntNFBXsbEzp4y3aysaE0iTuge X-Received: by 2002:a50:84a9:: with SMTP id 38mr1022386edq.378.1610012105469; Thu, 07 Jan 2021 01:35:05 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1610012105; cv=none; d=google.com; s=arc-20160816; b=ti96fSXhGesPbJW7NYY+MAFI68zGbL3bm4kBGyT1vKp1m8VlanM4TSDduqAjsxe5cc Dh8AN5JCa1ynljuSl9XiU0AIXhSZFLwfwBWzZBhpKTpI99aQlBLHwuXjRUwM96Wb2ma5 I3ivy6VM5KskYMzJrpAaKXz0EJxuNi4de4t6b2V4aGX5Bj/ckrx8/8d3IzE6PIKdoEkI gDnnAf9B4cvI69ArhyXwwUuxGlYGe0FrSpjfCRxBIHoQyZceyZ5CM4RlVe5ry/ztd6WZ 43Y+4Y1IshzNLMfeiPjChMKYUpl/Kp73AUJ1HLJZzmkU763PI8rXFqk7BhQuNgsRp59r Z40Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:references:in-reply-to:message-id :date:subject:cc:to:from; bh=VXplSIc8kkfjnu53AyfZAr7f27BMZRonATjjkKcAejs=; b=g4Qbm63cOReICdw7jDQTphVDxY/RO2MKdY2EwBNBNgKlQB+oPsGxrUvVpk4AUvPLDz dj3yKtT4fZB+RUp102RGwRfzA8ltOT/HihFpl24R4vVA4gjaslRQVygJDGrg0e5cLapa YeMlb0wxvUg9PlsoXgUps0j7ZJngbZbCRFdCBYOTOEiJb+6zBq9FFsTd52Hw8GJWIIYd zQB5pZdI19nnlsEalLZ6k4On7ZpZJarw56y8d6Mn7iRMASkWBaEjVTHNhbbYQ8bXTEob 5Q4T9vLBvdvYgGoQx8iqHjj2AQraLctscc2W2P2v0S9mxieOasO22x/Doa6w4Dl5vZzR wWig== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a15si2007567eda.177.2021.01.07.01.34.42; Thu, 07 Jan 2021 01:35:05 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727879AbhAGJau (ORCPT + 99 others); Thu, 7 Jan 2021 04:30:50 -0500 Received: from szxga04-in.huawei.com ([45.249.212.190]:10113 "EHLO szxga04-in.huawei.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726607AbhAGJaW (ORCPT ); Thu, 7 Jan 2021 04:30:22 -0500 Received: from DGGEMS404-HUB.china.huawei.com (unknown [172.30.72.58]) by szxga04-in.huawei.com (SkyGuard) with ESMTP id 4DBLWv36XKz15nXd; Thu, 7 Jan 2021 17:28:43 +0800 (CST) Received: from DESKTOP-5IS4806.china.huawei.com (10.174.184.42) by DGGEMS404-HUB.china.huawei.com (10.3.19.204) with Microsoft SMTP Server id 14.3.498.0; Thu, 7 Jan 2021 17:29:31 +0800 From: Keqian Zhu To: , , , , , Alex Williamson , Kirti Wankhede , Cornelia Huck , Will Deacon , Marc Zyngier , Catalin Marinas CC: Mark Rutland , James Morse , Robin Murphy , Joerg Roedel , "Daniel Lezcano" , Thomas Gleixner , Suzuki K Poulose , Julien Thierry , Andrew Morton , Alexios Zavras , , Subject: [PATCH 3/5] vfio/iommu_type1: Populate dirty bitmap when attach group Date: Thu, 7 Jan 2021 17:28:59 +0800 Message-ID: <20210107092901.19712-4-zhukeqian1@huawei.com> X-Mailer: git-send-email 2.8.4.windows.1 In-Reply-To: <20210107092901.19712-1-zhukeqian1@huawei.com> References: <20210107092901.19712-1-zhukeqian1@huawei.com> MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.174.184.42] X-CFilter-Loop: Reflected Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Attach an iommu backend group will potentially access all dma ranges. We should traverse all dma ranges to mark dirty. Fixes: d6a4c185660c ("vfio iommu: Implementation of ioctl for dirty pages tracking") Signed-off-by: Keqian Zhu --- drivers/vfio/vfio_iommu_type1.c | 18 +++++++++++++++++- 1 file changed, 17 insertions(+), 1 deletion(-) diff --git a/drivers/vfio/vfio_iommu_type1.c b/drivers/vfio/vfio_iommu_type1.c index 29c8702c3b6e..26b7eb2a5cfc 100644 --- a/drivers/vfio/vfio_iommu_type1.c +++ b/drivers/vfio/vfio_iommu_type1.c @@ -255,6 +255,17 @@ static void vfio_dma_populate_bitmap(struct vfio_iommu *iommu, vfio_dma_populate_bitmap_full(dma, pgsize); } +static void vfio_iommu_populate_bitmap(struct vfio_iommu *iommu) +{ + struct rb_node *n; + struct vfio_dma *dma; + + for (n = rb_first(&iommu->dma_list); n; n = rb_next(n)) { + dma = rb_entry(n, struct vfio_dma, node); + vfio_dma_populate_bitmap(iommu, dma); + } +} + static int vfio_dma_bitmap_alloc_all(struct vfio_iommu *iommu) { struct rb_node *n; @@ -2190,7 +2201,12 @@ static int vfio_iommu_type1_attach_group(void *iommu_data, * demotes the iommu scope until it declares itself dirty tracking * capable via the page pinning interface. */ - iommu->pinned_page_dirty_scope = false; + if (iommu->pinned_page_dirty_scope) { + iommu->pinned_page_dirty_scope = false; + if (iommu->dirty_page_tracking) + vfio_iommu_populate_bitmap(iommu); + } + mutex_unlock(&iommu->lock); vfio_iommu_resv_free(&group_resv_regions); -- 2.19.1