Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp284745pxy; Thu, 22 Apr 2021 02:00:53 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy96PW/LHHgGBGvti+7aQ0mo4e1KeCSAm9TfokvgqhR9RLS5RB1epPrvGJ12/AS5ymiOYe6 X-Received: by 2002:a17:906:9bd3:: with SMTP id de19mr2175859ejc.329.1619082053528; Thu, 22 Apr 2021 02:00:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619082053; cv=none; d=google.com; s=arc-20160816; b=Avaj+4LNRTDzjAhugEM9gJgo0Yh5mBTvXAm9ghj7VL8KvYGg2cnALJVuIXXOFgrZXY FC84JY0awKTlRzs3lPzEXXR0wMElw6E+xgu2UYtsvfHQ83XcUzeOPtg0yKDshufLljEK VDXJlYpOWDTew9eibUdPX/5So7RldHtBbKh7uqbx/SDV3G5EmSM6S/w4FBAjt3wS8yW6 liLquHf6MivPADpbsYkhL+qk53kEnvxVR5uU6n3pLhxq/Ruiw+rzRIOtCWcbXtIG+Ju/ fnTewvX0sIbH3OaSGplFR6dpK4VmUlgqbxByzqVHleR0BslvPkmT8n9/q8TnOKcAP+Pw ymAQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to :mime-version:user-agent:date:message-id:from:references:cc:to :subject:dkim-signature; bh=JfOVe3Y2pHcez7ttpJdj+ZOGuypmISBrFuEMjlM7SWw=; b=lTAZiafARIER1q+NbdWno3ewOArBFIntPsVYyLCCrAGFdWFjY6QXOnVT/Vvis6LG/v CeZVlQfsZU8ZU8rkNlvOI0i3ijnsJ1OMuJKS3e8pjz1XE/csLHCM9CV67l92QpxcBL95 /fqTU5/V1/3oTeNtA0LjzpMcmVaF3jLXHc+R2C/sEFv9uXWis2Vwhd27cnXLSk2IstGQ r/O5laZbfafwJ8fBMI33lOMXto+z0YRKxYJ0b/eUAq+1wWwXSlVyVgsSqXQ3qQv5MkTx a7GxQ0hNP8SbfabJ6v0hpMhGyye/v87uXWN5C0HFZeVMGGI1esWrZn0yU8JIlUpj7y3E W7eA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=VwtCojXt; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id bq23si1636984edb.111.2021.04.22.02.00.30; Thu, 22 Apr 2021 02:00:53 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=VwtCojXt; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235099AbhDVI76 (ORCPT + 99 others); Thu, 22 Apr 2021 04:59:58 -0400 Received: from us-smtp-delivery-124.mimecast.com ([170.10.133.124]:39904 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230285AbhDVI76 (ORCPT ); Thu, 22 Apr 2021 04:59:58 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1619081963; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=JfOVe3Y2pHcez7ttpJdj+ZOGuypmISBrFuEMjlM7SWw=; b=VwtCojXtJjyScmH2v1ZPmj0X8wHD7NbKTXSoPtn5mJ5kmXNwtwCRzBZ6Er2j6QIFgln/gQ hJGnZMUaZi40Vh+ibmTYmXpSegHYbj3nsX5bTNRVZFGNdknvwFPZIHpAbASRyN1hVACl3+ T4tt/dNd+3cZ8lgrS4AzmYLyj2cJQdg= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-4-wOlUl2CiOTmPIkIts6VkwQ-1; Thu, 22 Apr 2021 04:59:19 -0400 X-MC-Unique: wOlUl2CiOTmPIkIts6VkwQ-1 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.phx2.redhat.com [10.5.11.13]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id C6CAD1926DA0; Thu, 22 Apr 2021 08:59:18 +0000 (UTC) Received: from wangxiaodeMacBook-Air.local (ovpn-13-137.pek2.redhat.com [10.72.13.137]) by smtp.corp.redhat.com (Postfix) with ESMTP id 3804360938; Thu, 22 Apr 2021 08:59:12 +0000 (UTC) Subject: Re: [PATCH] vdpa/mlx5: Add support for doorbell bypassing To: Eli Cohen Cc: mst@redhat.com, virtualization@lists.linux-foundation.org, linux-kernel@vger.kernel.org, "Zhu, Lingshan" References: <20210421104145.115907-1-elic@nvidia.com> <20210422060358.GA140698@mtl-vdi-166.wap.labs.mlnx> <20210422080725.GB140698@mtl-vdi-166.wap.labs.mlnx> <9d3d8976-800d-bb14-0a4a-c4b008f6872c@redhat.com> <20210422083902.GA146406@mtl-vdi-166.wap.labs.mlnx> From: Jason Wang Message-ID: Date: Thu, 22 Apr 2021 16:59:11 +0800 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:78.0) Gecko/20100101 Thunderbird/78.10.0 MIME-Version: 1.0 In-Reply-To: <20210422083902.GA146406@mtl-vdi-166.wap.labs.mlnx> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.79 on 10.5.11.13 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 在 2021/4/22 下午4:39, Eli Cohen 写道: > On Thu, Apr 22, 2021 at 04:21:45PM +0800, Jason Wang wrote: >> 在 2021/4/22 下午4:07, Eli Cohen 写道: >>> On Thu, Apr 22, 2021 at 09:03:58AM +0300, Eli Cohen wrote: >>>> On Thu, Apr 22, 2021 at 10:37:38AM +0800, Jason Wang wrote: >>>>> 在 2021/4/21 下午6:41, Eli Cohen 写道: >>>>>> Implement mlx5_get_vq_notification() to return the doorbell address. >>>>>> Size is set to one system page as required. >>>>>> >>>>>> Signed-off-by: Eli Cohen >>>>>> --- >>>>>> drivers/vdpa/mlx5/core/mlx5_vdpa.h | 1 + >>>>>> drivers/vdpa/mlx5/core/resources.c | 1 + >>>>>> drivers/vdpa/mlx5/net/mlx5_vnet.c | 6 ++++++ >>>>>> 3 files changed, 8 insertions(+) >>>>>> >>>>>> diff --git a/drivers/vdpa/mlx5/core/mlx5_vdpa.h b/drivers/vdpa/mlx5/core/mlx5_vdpa.h >>>>>> index b6cc53ba980c..49de62cda598 100644 >>>>>> --- a/drivers/vdpa/mlx5/core/mlx5_vdpa.h >>>>>> +++ b/drivers/vdpa/mlx5/core/mlx5_vdpa.h >>>>>> @@ -41,6 +41,7 @@ struct mlx5_vdpa_resources { >>>>>> u32 pdn; >>>>>> struct mlx5_uars_page *uar; >>>>>> void __iomem *kick_addr; >>>>>> + u64 phys_kick_addr; >>>>>> u16 uid; >>>>>> u32 null_mkey; >>>>>> bool valid; >>>>>> diff --git a/drivers/vdpa/mlx5/core/resources.c b/drivers/vdpa/mlx5/core/resources.c >>>>>> index 6521cbd0f5c2..665f8fc1710f 100644 >>>>>> --- a/drivers/vdpa/mlx5/core/resources.c >>>>>> +++ b/drivers/vdpa/mlx5/core/resources.c >>>>>> @@ -247,6 +247,7 @@ int mlx5_vdpa_alloc_resources(struct mlx5_vdpa_dev *mvdev) >>>>>> goto err_key; >>>>>> kick_addr = mdev->bar_addr + offset; >>>>>> + res->phys_kick_addr = kick_addr; >>>>>> res->kick_addr = ioremap(kick_addr, PAGE_SIZE); >>>>>> if (!res->kick_addr) { >>>>>> diff --git a/drivers/vdpa/mlx5/net/mlx5_vnet.c b/drivers/vdpa/mlx5/net/mlx5_vnet.c >>>>>> index 10c5fef3c020..680751074d2a 100644 >>>>>> --- a/drivers/vdpa/mlx5/net/mlx5_vnet.c >>>>>> +++ b/drivers/vdpa/mlx5/net/mlx5_vnet.c >>>>>> @@ -1865,8 +1865,14 @@ static void mlx5_vdpa_free(struct vdpa_device *vdev) >>>>>> static struct vdpa_notification_area mlx5_get_vq_notification(struct vdpa_device *vdev, u16 idx) >>>>>> { >>>>>> + struct mlx5_vdpa_dev *mvdev = to_mvdev(vdev); >>>>>> struct vdpa_notification_area ret = {}; >>>>>> + struct mlx5_vdpa_net *ndev; >>>>>> + >>>>>> + ndev = to_mlx5_vdpa_ndev(mvdev); >>>>>> + ret.addr = (phys_addr_t)ndev->mvdev.res.phys_kick_addr; >>>>>> + ret.size = PAGE_SIZE; >>>>> Note that the page will be mapped in to guest, so it's only safe if the >>>>> doorbeel exclusively own the page. This means if there're other registers in >>>>> the page, we can not let the doorbell bypass to work. >>>>> >>>>> So this is suspicious at least in the case of subfunction where we calculate >>>>> the bar length in mlx5_sf_dev_table_create() as: >>>>> >>>>> table->sf_bar_length = 1 << (MLX5_CAP_GEN(dev, log_min_sf_size) + 12); >>>>> >>>>> It looks to me this can only work for the arch with PAGE_SIZE = 4096, >>>>> otherwise we can map more into the userspace(guest). >>>>> >>>> Correct, so I guess I should return here 4096. >> >> I'm not quite sure but since the calculation of the sf_bar_length is doen >> via a shift of 12, it might be correct. >> >> And please double check if the doorbell own the page exclusively. > I am checking if it is safe to map the any part of the SF's BAR to > userspace without harming other functions. If this is true, I will check > if I can return PAGE_SIZE without compromising security. It's usally not safe and a layer violation if other registers are placed at the same page. > I think we may > need to extend struct vdpa_notification_area to contain another field > offset which indicates the offset from addr where the actual doorbell > resides. The movitiaton of the current design is to be fit seamless into how Qemu model doorbell layouts currently: 1) page-per-vq, each vq has its own page aligned doorbell 2) 2 bytes doorbell, each vq has its own 2 byte aligend doorbell Only 1) is support in vhost-vDPA (and vhost-user) since it's rather simple and secure (page aligned) to be modelled and implemented via mmap(). Exporting a complex layout is possbile but requires careful design. Actually, we had antoher option 3) shared doorbell: all virtqueue shares a single page aligned doorbell This is not yet supported by Qemu. Thanks >> >>>> I also think that the check in vhost_vdpa_mmap() should verify that the >>>> returned size is not smaller than PAGE_SIZE because the returned address >>> Actually I think it's ok since you verify the size equals vma->vm_end - >>> vma->vm_start which must be at least PAGE_SIZE. >> >> Yes. >> >> Thanks >> >> >>>> might just be aligned to PAGE_SIZE. I think this should be enoght but >>>> maybe also use the same logic in vhost_vdpa_fault().